paper_id
stringlengths 9
16
| version
stringclasses 26
values | yymm
stringclasses 311
values | created
timestamp[s] | title
stringlengths 6
335
| secondary_subfield
sequencelengths 1
8
| abstract
stringlengths 25
3.93k
| primary_subfield
stringclasses 124
values | field
stringclasses 20
values | fulltext
stringlengths 0
2.84M
|
---|---|---|---|---|---|---|---|---|---|
1809.07685 | 1 | 1809 | 2018-08-09T10:12:48 | Finding Explanations of Entity Relatedness in Graphs: A Survey | [
"cs.SI"
] | Analysing and explaining relationships between entities in a graph is a fundamental problem associated with many practical applications. For example, a graph of biological pathways can be used for discovering a previously unknown relationship between two proteins. Domain experts, however, may be reluctant to trust such a discovery without a detailed explanation as to why exactly the two proteins are deemed related in the graph. This paper provides an overview of the types of solutions, their associated methods and strategies, that have been proposed for finding entity relatedness explanations in graphs. The first type of solution relies on information inherent to the paths connecting the entities. This type of solution provides entity relatedness explanations in the form of a list of ranked paths. The rank of a path is measured in terms of importance, uniqueness, novelty and informativeness. The second type of solution relies on measures of node relevance. In this case, the relevance of nodes is measured w.r.t. the entities of interest, and relatedness explanations are provided in the form of a subgraph that maximises node relevance scores. This paper uses this classification of approaches to discuss and contrast some of the key concepts that guide different solutions to the problem of entity relatedness explanation in graphs. | cs.SI | cs |
Finding Explanations of Entity Relatedness in Graphs: A
Survey
Raoul Biagioni1*, Pierre-Yves Vandenbussche2, V´ıt Nov´acek1,
1 Fujitsu Ireland Ltd., Co. Dublin, Ireland
2 Insight Centre for Data Analytics at NUI Galway, Co. Galway, Ireland
* [email protected]
Abstract
Analysing and explaining relationships between entities in a graph is a fundamental
problem associated with many practical applications. For example, a graph of biological
pathways can be used for discovering a previously unknown relationship between two
proteins. Domain experts, however, may be reluctant to trust such a discovery without a
detailed explanation as to why exactly the two proteins are deemed related in the graph.
This paper provides an overview of the types of solutions, their associated methods and
strategies, that have been proposed for finding entity relatedness explanations in graphs.
The first type of solution relies on information inherent to the paths connecting the
entities. This type of solution provides entity relatedness explanations in the form of a
list of ranked paths. The rank of a path is measured in terms of importance, uniqueness,
novelty and informativeness. The second type of solution relies on measures of node
relevance. In this case, the relevance of nodes is measured w.r.t. the entities of interest,
and relatedness explanations are provided in the form of a subgraph that maximises
node relevance scores. This paper uses this classification of approaches to discuss and
contrast some of the key concepts that guide different solutions to the problem of entity
relatedness explanation in graphs.
1
Introduction
Graphs can conveniently represent large amounts of information as networks of rela-
tionships between objects. Structuring information as a graph allows to search for
relationships between some entities of interest. However, in large graphs, information
may range from trivial to meaningful, and a need thus exists for extracting only those
relationships that are relevant and meaningful in a particular context. For example,
a graph of biological pathways can be used for discovering a previously unknown re-
lationship between two proteins. Domain experts, however, may be reluctant to trust
such a discovery without a detailed explanation as to why exactly the two proteins are
deemed related in the graph. Judgement of what constitutes a relationship, and what is
meaningful and non-trivial is nonetheless a subjective matter. For this reason solutions
have been proposed in the literature to find meaningful and non-trivial relationships
between entities of interest in objective ways. In this paper we provide an overview of
the types of solutions, their associated methods and strategies proposed for finding such
relationships, henceforth referred to as entity relatedness explanations.
1/10
1.1 Focus of this Paper
The focus of this paper is to present and discuss strategies and methods that are able
to select relevant relationships between entities of interest in a graph in order to make
the knowledge embedded in a graph more usable e.g.
for visualisation or analytical
purposes. Although this paper does not claim to be exhaustive, it provides an overview
of key methods that are representative solutions to this problem. We distinguish two
solutions to the problem of finding entity relatedness explanations. The first type of
solution relies on information inherent to the paths connecting the entities. This type of
solution provides entity relatedness explanations in the form of a ranked list of relevant
paths. The rank of a path is measured in terms of importance, uniqueness, novelty and
informativeness. The second type of solution relies on measures of node relevance. In
this case, the relevance of a node is measured w.r.t. the entities of interest and related-
ness explanations are provided in the form of an explanation subgraph that maximises
node relevance scores. This paper uses this classification of approaches to discuss and
contrast some of the key concepts that guide different solutions to the problem of entity
relatedness explanation in graphs.
1.2 Summary of Contributions
The main contributions of this survey are the following:
• We identify two possible solutions to the problem of entity relatedness explanations
in graphs. One focusing on the graph theoretic and, where applicable, semantic
information inherent to the path connecting entities of interest; the second focusing
on finding one or more optimal subgraphs by measuring the relevance of nodes
w.r.t. entities of interest.
• For each solution type, we provide a synthesis of core methods and strategies.
• Finally we discuss the assumptions underpinning the graph theoretic concepts
from which solutions are derived and how these assumptions may or may not be
applicable to the entity relatedness explanation problem.
To the best of the authors' knowledge only one similar survey of entity relatedness
explanations in graphs exists [3]. To explain the relationships among entities of inter-
est, the survey groups papers by whether solutions to finding relatedness explanations
concern two entities of interest, or whether they concern two or more entities. In this
survey we extend this view by framing the discussion around the strategies and rationale
behind identifying and extracting relevant relationships between entities of interest.
The requirement for this survey emanated from a specific biomedical research case.
As part of this research a knowledge graph of biomedical entities had been assembled
from multiple heterogeneous data sources. However, finding relevant relationships for
two given entities of interest, among the myriad of paths connecting those entities was
challenging and prompted the requirement for surveying the existing entity relatedness
literature in search for possible solutions. Relevant research publications were selected
through a process of reference exploration, starting from two seed papers [16, 17]. From
the seed paper, related works references were repeatedly explored with the goal of finding
papers that discuss directly or indirectly the entity relatedness explanation problem.
The initial search returned 336 articles and 19 met the requirement for detailed review.
1.3 Organisation of this Paper
This paper is organised around the two proposed types of solutions to the problem of
finding entity relatedness explanations in a graph. Section 2 introduces relevant paths
2/10
extraction, a solution that retrieves explanations in the form of a list of ranked paths.
Section 3 introduces relevant subgraph extraction, a solution that retrieves entity relat-
edness in the form of optimised subgraphs. We propose to distinguish between maximal
relevance (Section 3.1), minimum cost (Section 3.2) and node grouping (Section 3.3)
strategies. Finally, in Section 4 we discuss and contrast some of the key concepts that
guide both relevant paths and relevant subgraph extraction solutions.
2 Relevant Paths Extraction
One possible solution to the entity relatedness explanation problem is to consider all
paths that connect two entities of interest and to identify those paths that best explain
the relationship between those entities. Relatedness of nodes in paths w.r.t. entities
of interest is assumed and the task is to rank paths in terms of their relevance to the
context, their uniqueness, novelty and informativeness. This is achieved by exploiting
graph theoretic, statistical and semantic information embedded in paths. Relevant paths
extraction solutions are limited to two entities of interest.
The research areas covered by relevant paths extraction solutions include literature-
based discovery (LBD) [23], link discovery [12] and the Semantic Web [2, 4, 16, 17].
Examples of input graphs used include co-citation graphs [12] and biochemical net-
works [23].
Input graphs used in Semantic Web research papers are based on the
Resource Description Framework (RDF), a data model based on named relationships
between resources [2]. A well known example of an RDF-based input graph is Freebase
and DBPedia.
The primary graph theoretic measures used for path ranking are node degree and
path length. Node degree is considered indicative of e.g. activity in a social network or
interaction in a genetic regulatory network. High node degree suggests importance and
paths containing such nodes are ranked higher. For example, in [23], the importance of
a given path is scored using the arithmetic sum of the degree centrality values dc for all
n nodes B in the path (Eq. 1).
score = X
dc(Bn)
n
(1)
The length of paths connecting entities of interest is used as a proxy measure for
association strength. The shorter a path, the stronger the association. However, a
strong association does not necessarily lead to a higher rank. In certain contexts one
may want to give preference to weak associations i.e.
long paths. For example, as
described in [2], money laundering involves transactions that may change several hands.
Hence, in a graph representing financial transactions, one may want to include long
paths in a relatedness explanation for sender and receiver entities. For this reason, the
authors define the weight L of a path A such that the contribution of a path's length
to its rank be informed by whether preference should be given to short (Eq. 2a) or long
paths (Eq. 2b), where length(A) is the number of nodes in A.
LA =
LA = 1 −
1
length(A)
1
length(A)
(2a)
(2b)
Statistical path scoring measures are based on frequency of occurrence counts, e.g.
the number of similar paths [12], the number of nodes in a path [2], or the number
of edges in a path [4].
In [12] and [4], low frequency of occurrence counts represent
3/10
rarity and specificity. Similarly, in [16], high frequency of occurrence counts represent
diversity. In this case, the authors use the frequency of occurrence of nodes and edges
to define path diversity and path informativeness measures. Path informativeness is
based on the frequency of occurrence of edges and the inverse frequency of occurrence
of nodes [16]. Path diversity σ is measured by the ratio of common labels to the
total number of labels between two paths π1 and π2 (Eq. 3). Both measures are
complementary. Path diversity ensures that paths with rare edges, potentially discarded
if they appear in paths with low informativeness, are retained. As illustrated by this
example, statistics-based ranking is typically framed in terms of conceptual ideas. The
properties of information associated with those concepts are novelty, uniqueness, non-
triviality and informativeness. In general, those properties are deemed desirable and
result in a higher rank.
σ(π1, π2) =
Labels(π1) ∩ Labels(π2)
Labels(π1) ∪ Labels(π2)
(3)
Path ranking measures are often used in combination. For example, in [2], the
overall frequency of occurrence rari of a node i in an input graph is combined with
the association length weight LA described above to produce an overall weight of path
rarity RA (Eq. 4a for short and Eq. 4b for long paths).
RA =
1
length(A)
RA = 1 −
1
length(A)
length(A)
X
i=1
length(A)
X
i=1
rari
rari
(4a)
(4b)
Similarly, [4] and [17] combine measures of specificity and of diversity. Specifically,
where a graph is composed of multiple schemas (i.e. domains), this information can be
used to determine whether a given path "spans" several domains. The more schemas
are covered by the edges in a path, the higher the rank. Lastly, semantic information
is extracted, where applicable, from RDF [17] and ontology schema hierarchy [2]. Such
hierarchies represent a partial ordering of entities and, the deeper an entity lies in the
hierarchy, the more specific or informative it is.
3 Relevant Subgraph Extraction
A second approach to solving the entity relatedness explanation problem is to extract
a subgraph such that its nodes are as relevant as possible to some entities of interest.
We distinguish between strategies that focus on maximal relevance (Section 3.1), min-
imum cost (Section 3.2) and node grouping (Section 3.3) methods. Relevant subgraph
extraction is suited to cases with more than two entities of interest e.g. Q = {q1, ..., qn}
or with two sets of entities Q1 and Q2.
The research areas covered by relevant subgraph extraction solutions include data
mining [13], knowledge discovery [11], graph mining [18], graph theory [1] and graph
databases [7, 8]. Examples of input graphs used in the reviewed papers include domain-
specific knowledge bases, social networks, food networks, protein-protein interaction
networks, co-authorship graphs.
3.1 Maximal Relevance Approaches
Maximal relevance approaches select an explanation subgraph by maximising a good-
ness function that measures and optimises the relevance of candidate subgraphs. The
4/10
relevance of a subgraph is assessed through the relevance and/or importance of its con-
stituent nodes. Relevance relates to the entities of interest, importance relates to the
network as a whole. A globally important node may be one that acts as an important
information bridge, authority or hub; as opposed to nodes that are isolated, with little
influence on the rest of the network. The importance and relevance of nodes is used to
search for the most informative explanation subgraph. The computation of importance
and relevance scores is discussed next.
3.1.1 Node Scoring
Node relevance scores are typically computed using random walk (RW) [6,7,9,11,19,21,
22]. The RW method allows to compute a probability distribution over the set of nodes
in a graph. This probability information can be used to measure node relevance i.e. how
much each node contributes to the relationships with the nodes of interest. RW-based
methods are also suitable for measuring the overall, or global, importance of nodes [6,13]
in a graph. In this case a small probability is assigned to the walker "jumping" to any
node in the graph, rather than moving to an adjacent node. A well-known example is
PageRank [15].
The most commonly used random walk "flavour" is Random Walk with Restart
(RWR) [6, 7, 11, 13, 22]. Another similar type of random walk, the Absorbing Random
Walk (ARW) is proposed in [9].
In a RWR, a small probability is assigned to the
walker restarting the walk from where it began. This restart probability makes the
RWR method an attractive choice in light of the "w.r.t. entities of interest" aspect of
node relevance scoring. In an ARW, a walker stops (i.e.
is absorbed) when an entity
of interest is reached. ARW is used to compute the expected number of times a node
is used when randomly walking through the graph, starting from one entity of interest
until eventually being absorbed by a distinct entity of interest. The relevance of a node
is proportional to these quantities.
The relevance r of a node j w.r.t. the entire set Q of entities of interest qi ∈ Q can
be computed, as seen in e.g. [21], by multiplying individual pair-wise relevance scores
(Eq. 5).
r(Q, j) =
Q
Y
i=1
r(i, j)
(5)
The above approach has, however, one potential weakness. It assumes that candidate
explanatory nodes have a relationship with all entities of interest. This can be addressed
by relaxing the way in which node relevance w.r.t. the entire set of entities of interest
[21] allow for two additional scenarios. Node relevance may
is computed. For example,
relate to at least one (Eq. 6) or to at least k entities of interest, where k (1 ≤ k ≤ Q).
The same idea is adopted in [19]. In their paper, the authors propose entity relatedness
explanations for two sets of entities of interest Q1 and Q2. The authors search for
"central nodes" to which entities of interest are related in some relevant way e.g. through
common geo-political events. An essential aspect of the methodology consists of relaxing
the stringency requirements on how many of the entities of interest in each of the sets
must exhibit such commonalities with the central nodes.
r(Q, j) , r(Q, j, 1) = 1 −
Q
Y
i=1
(1 − r(i, j))
(6)
5/10
3.1.2 Subgraph Optimisation
Methods that provide entity relatedness explanations in the form of a subgraph H [6,10,
13, 21] are designed such as to maximise the "goodness" of this subgraph (Eq. 7). The
goodness of H is measured by the sum of the relevance scores of the nodes it contains
(Eq. 8) where r(Q, j) is the relevance score of node j w.r.t. all nodes of interest in Q.
H ∗ = argmaxH g(H)
g(H) = X
r(Q, j)
j∈H
(7)
(8)
The above approach can easily be adapted to cases where the relatedness explanation
is composed of more than one subgraph. This case is illustrated in [13]. The authors
partition the input graph into k groups (P1 to Pk). In this case, the goodness of H is
measured by the sum of the maximised goodness score of each group Pi where Q′
Pi is a
subset of Q and all the nodes in Q′
Pi belong to Pi (Eq. 9).
g(H) = X
X
r(j, Q′
Pi )
Pi
j∈Pi
(9)
3.2 Minimum Cost Approaches
Minimum cost approaches select relevant subgraphs based on the assumption that re-
lated nodes are close to each other. The proposition made is that entity relatedness
explanations can be extracted by interconnecting the entities of interest through short-
est paths, subject to the input graph being fully connected. The minimum cost approach
minimises the number of edges (for unweighted graphs) or the weights of the edges (for
weighted graphs) in the subgraph. The resulting subgraph is known as a spanning tree
and the problem of producing a spanning tree for a set of entities of interest is known
as the Steiner Tree problem. Authors that frame the entity relatedness explanation
problem as a Steiner Tree problem include [1, 7, 11, 18].
3.3 Node Grouping
As described in Section 3.1.1, explanatory nodes may not necessarily be related to all
entities of interest and a possible solution for dealing with this scenario is to relax
relevance requirements.
In this section, we briefly describe an alternative solution,
namely grouping nodes, that have high relevance w.r.t. each other [1, 7, 8, 13]. In this
case, the intention is to spread entities of interest across groups. This then allows for
connecting paths to be restricted to a subset of entities of interest at a time before
inter-connecting the groups. A diverse and eclectic set of methods has been proposed in
the literature to achieve this task. In [7], nodes are grouped by their correlation to one
of the entities of interest. For each entity of interest q, the authors find a set of nodes
that are pair-wise correlated to q. A pair of nodes u and v are correlated if r(u, v) ≥ σ
and r(v, u) ≥ σ, where σ is a predefined minimum relevance threshold. Other methods
include clustering nodes into domain-specific communities [8], grouping nodes based on
density of linkages [13], methods based on Information Theory [1] and methods based
on flow information in networks [8]. Approaches to inter-connecting groups of related
nodes include minimum cost methods [7].
6/10
4 Discussion and Conclusion
In this paper, we presented a survey of strategies and methods for finding entity related-
ness explanations in graphs. We identified two possible solutions to this problem. One
focusing on graph theoretic and semantic information embedded in paths connecting
entities of interest; the second focusing on finding an optimal subgraph in which the
relevance scores of nodes w.r.t. entities of interest is maximised. In this Section, we
discuss and contrast some of the key concepts that guide both the relevant paths and
relevant subgraph extraction solutions.
4.1 Relevance and Shortest Paths
An interesting observation made in the process of this survey is the lack of adoption of
some of the traditional node centrality measures such as closeness 1 and betweenness 2.
This may appear surprising at first considering how node centrality is a fundamental
measure for understanding the roles played by nodes in networks [14]. The lack of adop-
tion can be explained by the fact that graph centrality measures assume that information
travels along shortest paths. However, adopting this assumption without considering
the nature of the information being represented as a graph may be problematic. For
example, in an industry-news network on the one hand, the shortest path is known and
information travels in a targeted manner. On the other hand, in a social network, gos-
sip propagates without specific target; using shortest path-based centrality measures to
explain the flow of gossip is likely to produce low quality results [5]. Similarly, in many
of the domains in which entity relatedness explanation are sought, information does not
take any sort of ideal path from source to target and, in such cases, node centrality
measures could fail to adequately model entity relationships [10].
Whether shortest paths methods are deemed applicable to the entity relatedness
problem differs among authors. For example, in [6] and in [11], shortest paths are
used as indicators of relevance that adequately capture entity relatedness while in [4]
preference is given to long paths because they are seen as more specific thus "more
likely to reveal rare and uncommon associations" between entities of interest. The
solution proposed in [2] allows for both views. Shorter paths are seen as representing
direct relationships, while longer paths represent indirect relationships. Both direct and
indirect relationships can be meaningful, depending on the problem at hand, and it is
up to the practitioners to define their preference.
How can the ambivalence concerning the use of shortest paths as means of extracting
relatedness explanations from graphs be addressed? Is it more useful to try extracting
relatedness explanations by modelling information flow as a random process? Indeed,
in [9] and in [14] it is argued that, if information flows randomly, then contributions from
all paths, not just the shortest, should contribute to entity relatedness explanations. It is
precisely this observation which led to the prevalence of RW-based methods in relevant
subgraph extraction methods. RW-based methods allow to compute node relevance
scores on all possible ways to connect entities of interest, each way having a certain
likelihood, rather than relying only on shortest distance.
4.2 The Subjective Nature of Relevance
Whether a relatedness explanation is relevant is, as noted in Section 1, a matter of
subjective judgement. Different people will almost certainly have differing notions of
1Closeness is the mean shortest-path distance between a node and all other nodes reachable from
it [14].
2Betweenness is calculated as the fraction of shortest paths between node pairs that pass through
the node of interest [14].
7/10
relevance. An entity relatedness explanation grounded in LBD will need to be based
on the uncommon and novel in order to support the discovery of new, yet unknown
relationships. In this case, solutions and methods that favour nodes in a graph that
have low degree will be preferred because high degree can be seen as a weak measure
because a node through which many entities are connected is too general for contributing
to succinctly explain how entities of interest are related [20]. Conversely, an entity
relatedness explanation which deals with biological knowledge such as a gene interaction
graph will need to take into account that high connectivity is an important property of
the underlying graph [23]. In this case, high node degree is desirable and is seen as an
appropriate indicator of relevance.
The above example illustrates that there is no one correct answer to the question
whether high, or low, node degree is a good indicator of relevance. The advantage of
relevant paths extraction over relevant subgraph extraction lies in that the former allows
to more easily adapt to the configurations deemed most appropriate for a given context.
Specifically, entity relatedness explanations are configurable through the path ranking
scheme inherent to the relevant paths extraction. Examples of papers that implemented
relevant paths extraction solutions as configurable, user-driven and interactive applica-
tions include [2, 4, 16, 17].
In contrast, relevant subgraph extraction allows for only
limited "tuning" to account for subjective notions of relevance. The advantages of this
type of solution over relevant paths extraction are two-fold. First, relevant subgraph
extraction methods allow for more than two entities of interest to be specified. Second,
as discussed in Section 4.1, the way in which information flow is modelled, namely as
a random process, can be seen as a more adequate way of representing knowledge in
graphs.
4.3 Final Remarks
In Section 1.2, we described how the requirement for this survey arose from the chal-
lenges associated with manually inspecting the myriad of connecting paths between
entities of interest in a graph. The solutions, methods and strategies described in this
paper can help practitioners make decisions in a more informed way when faced with
implementing solutions to the task of explaining the relationships between entities of
interest. Based on the input graph at hand, the particularities of the context and the
information represented, our paper helps practitioners assess which one of the two types
of solutions, and their corresponding methods and strategies best suits their needs and
context.
Acknowledgements
The work presented in this paper was supported by the TOMOE project funded by Fu-
jitsu Laboratories Ltd., Japan and Insight Centre for Data Analytics at National Univer-
sity of Ireland Galway (supported by the Science Foundation Ireland grant 12/RC/2289).
References
1. L. Akoglu, D. H. Chau, J. Vreeken, N. Tatti, H. Tong, and C. Faloutsos. Mining
Connection Pathways for Marked Nodes in Large Graphs. In Proceedings of the
2013 SIAM International Conference on Data Mining, pages 37 -- 45. Society for
Industrial and Applied Mathematics, 2013.
8/10
2. B. Aleman-Meza, C. Halaschek-Weiner, I. B. Arpinar, C. Ramakrishnan, and
A. P. Sheth. Ranking complex relationships on the semantic Web. IEEE Internet
Computing, 9(3):37 -- 44, 2005.
3. N. M. K. Alsudairy, V. V. Raghavan, A. M. Hafez, and H. I. Mathkour. Connec-
tion Subgraphs: A Survey. Journal of Applied Sciences, 11:3221 -- 3232, 2011.
4. K. Anyanwu, A. Maduko, and A. Sheth. SemRank: Ranking Complex Relation-
ship Search Results on the Semantic Web. In Proceedings of the 14th International
Conference on World Wide Web, WWW '05, pages 117 -- 127. ACM, 2005.
5. S. P. Borgatti. Centrality and network flow. Social Networks, 27(1):55 -- 71, 2005.
6. C. Chen, G. Wang, H. Liu, J. Xin, and Y. Yuan. SISP: A New Framework
for Searching the Informative Subgraph Based on PSO.
In Proceedings of the
20th ACM International Conference on Information and Knowledge Management,
CIKM '11, pages 453 -- 462. ACM, 2011.
7. J. Cheng, Y. Ke, and W. Ng. Efficient Processing of Group-oriented Connection
Queries in a Large Graph. In Proceedings of the 18th ACM Conference on Infor-
mation and Knowledge Management, CIKM '09, pages 1481 -- 1484. ACM, 2009.
8. J. Cheng, Y. Ke, W. Ng, and J. X. Yu. Context-Aware Object Connection
In 2009 IEEE 25th International Conference on
Discovery in Large Graphs.
Data Engineering, pages 856 -- 867, 2009.
9. P. Dupont, J. Callut, G. Dooms, J.-N. Monette, Y. Deville, and B. P. Sainte. Rel-
evant subgraph extraction from random walks in a graph. Universite Catholique
de Louvain, UCL/INGI, Research Report RR, 380167, 2006.
10. C. Faloutsos, K. S. McCurley, and A. Tomkins. Fast discovery of connection
subgraphs. In Proceedings of the Tenth ACM SIGKDD International Conference
on Knowledge Discovery and Data Mining, KDD '04, pages 118 -- 127. ACM, 2004.
11. G. Kasneci, S. Elbassuoni, and G. Weikum. MING: Mining Informative Entity
Relationship Subgraphs. In Proceedings of the 18th ACM Conference on Infor-
mation and Knowledge Management, CIKM '09, pages 1653 -- 1656. ACM, 2009.
12. S.-d. Lin and H. Chalupsky. Unsupervised link discovery in multi-relational data
In Third IEEE International Conference on Data Mining,
via rarity analysis.
pages 171 -- 178, 2003.
13. H. Liu, C. Chen, J. Xin, and L. Zhang. Searching the Informative Subgraph
Based on the PeakGraph Model. The Computer Journal, 59(8):1207 -- 1219, 2016.
14. M. E. J. Newman. A measure of betweenness centrality based on random walks.
Social Networks, 27(1):39 -- 54, 2005.
15. L. Page, S. Brin, R. Motwani, and T. Winograd. The PageRank citation ranking:
Bringing order to the web. Technical report, Stanford InfoLab, 1999.
16. G. Pirr´o. Explaining and Suggesting Relatedness in Knowledge Graphs. In The
Semantic Web - ISWC 2015, Lecture Notes in Computer Science, pages 622 -- 639.
Springer, Cham, 2015.
17. C. Ramakrishnan, W. H. Milnor, M. Perry, and A. P. Sheth. Discovering Infor-
mative Connection Subgraphs in Multi-relational Graphs. ACM SIGKDD Explo-
rations Newsletter, 7(2):56 -- 63, 2005.
9/10
18. N. Ruchansky, F. Bonchi, D. Garcia-Soriano, F. Gullo, and N. Kourtellis. To be
connected, or not to be connected: That is the minimum inefficiency subgraph
problem. In Proceedings of the 2017 ACM on Conference on Information and
Knowledge Management, CIKM '17, pages 879 -- 888. ACM, 2017.
19. S. Seufert, K. Berberich, S. J. Bedathur, S. K. Kondreddi, P. Ernst, and
G. Weikum. ESPRESSO: Explaining Relationships Between Entity Sets.
In
Proceedings of the 25th ACM International on Conference on Information and
Knowledge Management, CIKM '16, pages 1311 -- 1320. ACM, 2016.
20. P. Shiralkar, A. Flammini, F. Menczer, and G. L. Ciampaglia. Finding streams
in knowledge graphs to support fact checking. In 2017 IEEE International Con-
ference on Data Mining, ICDM 2017, New Orleans, LA, USA, November 18-21,
2017, pages 859 -- 864, 2017.
21. H. Tong and C. Faloutsos. Center-piece Subgraphs: Problem Definition and Fast
Solutions. In Proceedings of the 12th ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining, KDD '06, pages 404 -- 413. ACM, 2006.
22. H. Wang, C. K. Chang, H.-I. Yang, and Y. Chen. Estimating the Relative Impor-
tance of Nodes in Social Networks. Journal of Information Processing, 21(3):414 --
422, 2013.
23. B. Wilkowski, M. Fiszman, C. M. Miller, D. Hristovski, S. Arabandi, G. Rosem-
blat, and T. C. Rindflesch. Graph-Based Methods for Discovery Browsing with
Semantic Predications. AMIA Annual Symposium Proceedings, 2011:1514 -- 1523,
2011.
10/10
|
1603.09164 | 1 | 1603 | 2016-03-30T13:00:15 | Spider and the Flies : Focused Crawling on Tumblr to Detect Hate Promoting Communities | [
"cs.SI"
] | Tumblr is one of the largest and most popular microblogging website on the Internet. Studies shows that due to high reachability among viewers, low publication barriers and social networking connectivity, microblogging websites are being misused as a platform to post hateful speech and recruiting new members by existing extremist groups. Manual identification of such posts and communities is overwhelmingly impractical due to large amount of posts and blogs being published every day. We propose a topic based web crawler primarily consisting of multiple phases: training a text classifier model consisting examples of only hate promoting users, extracting posts of an unknown tumblr micro-blogger, classifying hate promoting bloggers based on their activity feeds, crawling through the external links to other bloggers and performing a social network analysis on connected extremist bloggers. To investigate the effectiveness of our approach, we conduct experiments on large real world dataset. Experimental results reveals that the proposed approach is an effective method and has an F-score of 0.80. We apply social network analysis based techniques and identify influential and core bloggers in a community. | cs.SI | cs | Spider and the Flies : Focused Crawling on Tumblr to
Detect Hate Promoting Communities
Indraprastha Institute of Information Technology,
Swati Agarwal
Delhi (IIIT-D), India
[email protected]
Ashish Sureka
ABB Corporate Research Labs
Bangalore, India
[email protected]
6
1
0
2
r
a
M
0
3
]
I
S
.
s
c
[
1
v
4
6
1
9
0
.
3
0
6
1
:
v
i
X
r
a
ABSTRACT
Tumblr is one of the largest and most popular microblog-
ging website on the Internet. Studies shows that due to high
reachability among viewers, low publication barriers and so-
cial networking connectivity, microblogging websites are be-
ing misused as a platform to post hateful speech and re-
cruiting new members by existing extremist groups. Manual
identification of such posts and communities is overwhelm-
ingly impractical due to large amount of posts and blogs
being published every day. We propose a topic based web
crawler primarily consisting of multiple phases: training a
text classifier model consisting examples of only hate pro-
moting users, extracting posts of an unknown tumblr micro-
blogger, classifying hate promoting bloggers based on their
activity feeds, crawling through the external links to other
bloggers and performing a social network analysis on con-
nected extremist bloggers. To investigate the effectiveness
of our approach, we conduct experiments on large real world
dataset. Experimental results reveals that the proposed ap-
proach is an effective method and has an F-score of 0.80. We
apply social network analysis based techniques and identify
influential and core bloggers in a community.
Keywords
Hate and Extremism Detection, Information Retrieval, Mi-
croblogging, Mining User Generated Content, Online Radi-
calization, Social Network Analysis, Topical Crawler
1.
INTRODUCTION
Tumblr is the second largest microblogging platform, has
gained phenomenal momentum recently. It is widely used
by fandoms: communities of users having similar interests in
various TV shows and movies [15]. Therefore, it is especially
popular among young generation users and provides them
a platform to discuss daily events. They communicate by
blogging and publishing GIF images as their reactions and
emotions on several topics [5]. According to Tumblr statis-
tics 2015 1, over 219 million blogs are registered on Tumblr
and 420 million are the active users. 80 million posts are be-
ing published everyday, while the number of new blogs and
subscriptions are 0.1 million and 45 thousands respectively.
Tumblr is also posed as a social networking website that
facilitates users to easily connect to each other by following
other users and blogs without having a mutual confirmation.
Bloggers can also communicate via direct messages that can
be sent privately or can be posted publicly using 'ask box'.
It facilitates bloggers to send these messages anonymously
if they don't want to reveal their Tumblr identity [13]. Sim-
ilar to other social networking websites, Tumblr has very
low publication barriers. A blogger can publish a new post
and can re-blog an existing public post which is automati-
cally broadcasted to it's followers unless it is enabled as a
private post [7]. The type of posts can be chosen among
seven different categories including multi-media and other
content: text, quote, link, photo, audio, video and URL.
Unlike Twitter, Tumblr has no limit on the length of textual
posts. Similar to hashtags in Twitter, there are separated
tags associated with the blog content that make a post eas-
ier to be searchable on Tumblr 2. Tumblr also allows users
to update their other connected social networking profiles
when something is posted.
The simplicity of navigation, high reachability across wide
range of viewers, low publication barriers, social networking
and anonymity has led users to misuse Tumblr in several
ways. Previous studies shows that these features of Tumblr
are exclusive factors to gain the attention of modern extrem-
ist groups [4][16]. This is because Tumblr provides every
kind of multimedia posts which is a great medium to share
your views with your target audiences. These groups form
their own communities that share a common propaganda.
They post rude comments against a religion to express their
hatred and spread extremist content. Social networking fa-
cilitates these groups to recruit more people to promote their
beliefs and ideology among global audiences [8][12]. Fig-
ure 1 illustrates a concrete example of various types of hate
promoting posts and their associated tags on Tumblr. The
number of notes shows the number of times that post has
been liked and re-blogged by other blogs.
Online-radicalization and posting hateful speech is a crime
against the humanity and mainstream morality; it has a ma-
jor impact on society [8]. Presence of such extremist content
on social media is a concern for law enforcement and intelli-
gence agencies to stop such promotion in country as it poses
the threat to the society [3][9]. It also degrades the repu-
tation of the website and therefore is a concern for website
moderators to identify and remove such communities. Due
to the dynamic nature of website, automatic identification
of extremist posts and bloggers is a technically challenging
problem [17]. Tumblr is a large repository of text, pictures
and other multimedia content which makes it impractical to
search for every hate promoting post using keyword based
flagging. The textual posts are user generated data that con-
1https://www.tumblr.com/about
2https://www.tumblr.com/docs/en/using tags
Figure 1: A Concrete Example of Different Types (Text, Video, Audio) of Hate Promoting Post on Tumblr
tain noisy content such as spelling, grammatical mistakes,
presence of internet slangs and abbreviations. Presence of
low quality content in contextual metadata poses technical
challenges to text mining and linguistic analysis [3][13]. The
work presented in this paper is motivated by the need of
investigating solutions to counter and combat the online ex-
tremism on Tumblr.
The research aim of the work presented in this paper is
the following:
1. To investigate the application of topical crawling based
algorithm for retrieving hate promoting bloggers on
Tumblr. Our aim is to examine the effectiveness of
random walk in social network graph graph traversal
and measuring its performance.
2. To investigate the effectiveness of contextual metadata
such as content of the body, tags and caption or title
of a post for computing the similarity between nodes
in graph traversal. To examine the effectiveness of re-
blogging and like on a post as the links between two
bloggers.
3. To conduct experiments on large real world dataset
and demonstrate the effectiveness of proposed approach
in order to locate virtual and hidden communities of
hate and extremism promoting bloggers and apply So-
cial Network Analysis based techniques to locate cen-
tral and influential users.
2. LITERATURE SURVEY
In this section, we discuss closely related work to the
study presented in this paper. Based on our review of exist-
ing work, we observe that most of the researches for detect-
ing online radicalization are performed on Twitter, YouTube
and various discussion forums [1]. We conduct a literature
survey in the area of identifying hate promoting commu-
nities on social networking websites and short text classi-
fication of Tumblr microblog . O'Callaghan et. al.
[14]
describe an approach to identify extreme right communities
on multiple social networking websites. They use Twitter as
a possible gateway to locate these communities in a wider
network and track dynamic communities. They perform a
case study using two different datasets to investigate English
and German language communities. They implement a het-
erogeneous network within a homogeneous network and use
four different social networking platforms (Twitter accounts,
Facebook profiles, YouTube channels and all other websites)
as extreme right entities or peers and edges are the possible
interactions among these accounts.
Mahmood S. [12] describes several mechanisms that can
be useful in order to detect presence of terrorists on social
networking websites by analyzing their activity feeds. They
use Google search and monitor terror attack using keyword-
based flagging mechanism. They monitor sentiments and
opinions of users following several terrorism groups on on-
line social networks and propose a counter-terrorism mech-
anism to identify those users who are more likely to commit
a violent act of terror. They also discuss honeypots and
counter-propaganda techniques that can be used to rehabil-
itate radicalized users back to normal users. The disadvan-
tage of keyword based flagging approach is the large number
of false alarms. David and Morcelli [8] present a keyword
based search to detect several criminal organizations and
gangs on Twitter & Facebook. They discuss a study of ana-
lyzing the presence of organized crime and how these gangs
use social media platforms to recruit new members, broad-
cast their messages and coordinate their illegal activities on
web 2.0. They perform a qualitative analysis on 28 groups
and compare their organized crime between 2010 and 2011
on Facebook.
Agarwal et. al. propose a one-class classification model
to identify hate and extremism promoting tweets [16]. They
conducted a case study on Jihad and identified several lin-
guistic and stylistic features from free form text such as pres-
ence of war, religious, negative emotions and offensive terms.
They conduct experiments on large real world dataset and
demonstrate a correlation between hate promoting tweets
and discriminatory features. They also perform a leave-p-
out strategy to examine the influence of each feature on
classification model.
In context to existing work, the study presented in this
paper makes the following unique contributions extending
our previous work [2]:
1. We present an application of topical crawler based ap-
proach for locating extremism promoting bloggers on
Tumblr. While there has been work done in the area
of topical based crawling of social media platforms, to
the best of our knowledge this paper is the first study
on topical crawling for navigating connections between
Tumblr bloggers.
Figure 2: Flow Sequence of Exemplary Data Collection Process
2. We conduct experiments on large real world dataset to
demonstrate the effectiveness of one class classifier and
filtering hate promoting blog posts (text). We retrieve
Tumblr blogger profiles and their links with other hate
promoting bloggers and apply Social Network Analy-
sis to locate strongly connected communities and core
bloggers.
3. EXPERIMENTAL SETUP
We conduct our experiments on an open source and real
time data extracted from Tumblr micro-blogging website.
In a social networking website, a topical crawler extracts
the external link to a profile and returns the nodes that are
relevant to a defined topic. We define the relevance of a
node based on extent of similarity of it's activity feeds and
training document. Topical crawler learns the features and
characteristics from these training documents and classify a
profile to be relevant. Figure 2 illustrates the general frame-
work to obtain these documents. As shown in Figure 2,
we implement a bootstrapping methodology to collect the
training samples. We perform a manual search on Tumblr
and create a lexicon of popular and commonly used tags as-
sociated with hate promoting posts. Figure 3 shows a word
cloud of such terms. To collect our training samples, we per-
form a keyword (search tag) based flagging and extract their
associated textual posts. We also acquire the related tags
and the linked profiles (users who made these posts). We ex-
pand our list of keywords by extracting associated tags from
these posts and their related tags. We run this framework
iteratively until we get a reasonable number of exemplary
documents (400 training samples). As mentioned above, we
train our classifier for only hate promoting users. Therefore,
the training documents contain the content and caption of
only extremist posts.
We use these linked bloggers and posts to compute the
threshold value for language modeling. We take a sample
of 30 bloggers and compare their posts with the exemplary
documents. For each blogger we get a relevance score. To
compute the threshold value for similarity computation we
take an average of these scores. Figure 4 illustrates the rel-
evance score statistics of each blogger (Sorted in increasing
order). We notice that 80% of the bloggers have relevance
score between −2.7 and −1.5. We take average (turns out
to be −2.58) of these scores to avoid the under-fitting and
Figure 3: A Word Cloud of Key Terms Commonly Used by
Extremist Bloggers
Figure 4: Illustrating the Relevance Score Statistics of
Positive Class Bloggers
over-fitting of bloggers during classification.
4. RESEARCH METHODOLOGY
In this section, we present the general research frame-
work and methodology of proposed approach for classifying
extremist bloggers on Tumblr (refer to Figure 5). The pro-
posed approach is an iterative multi-step that uses a hate
promoting blogger as a seed channel and results a connected
graph where nodes represents the extremist bloggers and
links represents the relation between two bloggers (like and
re-blog). As shown in Figure 5, proposed framework is a
multi-step process primarily consists of four phases:
i) ex-
Algorithm 1: Extracting Textual Posts on Tumblr
Data: User U , Consumer Key Ck, Consumer Secret
Cs, Search Tag tag name
Result: Text based posts made by User U or
associated with tag tag name
1 SetParameters()
2 TaggedPost()
3 BloggerPost()
Generate URL of post to fetch post content and
caption
4 for all postP ∈ P osts do
5
6
7
8
9
10
Slug=P.getSlug()
id=P.getID()
URL="http://blog name.tumblr.com/post/id/slug"
Document=Jsoup.connect(URL).get()
post content=Document.getDescription()
post caption=Document.getTitle()
end
SetParameters() {
11 Authenticate the client via API Keys Ck and Cs
12 params.put("type", "text")
13 params.put("filter", "text")
14 params.put("reblog info", true)
15 params.put("notes info", true) }
16 Posts = client.tagged(tag name, params) }
17 Posts = client.tagged(tag name, params) }
TaggedPost() {
BloggerPost(){
gorithm. We use uniform distribution to select next blogger
and extract it's frontiers. We extract these bloggers until the
graph converges without re-visiting a blogger. The proposed
framework results into a connected graph that represents a
Tumblr network. We perform social network analysis on the
output graph to locate hidden virtual groups and extremist
bloggers playing major roles in community.
5. SOLUTION IMPLEMENTATION
A topical crawler starts from a seed node, traverses in a
graph navigating through some links and returns all relevant
nodes to a given topic. In proposed solution approach we
divide our problem into three sub-problems. First we clas-
sify the given seed node S as hate promoting or unknown
according to the published post (originally posted by blog-
ger or re-blogged from other Tumblr users). Second, if the
node is relevant then we extend this node into it's frontiers
and it further leads us to more hate promoting bloggers. In
third sub-problem, we perform topical crawling on Tumblr
network and use random walk algorithm to traverse along
the graph.
5.1 Retrieval of Published Posts
Algorithm 1 describes the method to search Tumblr posts
using keyword based flagging and extraction of posts pub-
lished by a given blogger. The work presented in this paper
focus on mining textual metadata on Tumblr therefore we
set a few parameters and extract only text based posts for
further analysis. For each blogger we set the limit of 100
posts published recently. Function SetParameters() (steps
12 and 13) filters the search results and displays only the tex-
Figure 5: Proposed Architecture for Extremist Community
Detection. Source: Agarwal et. al. [2]
traction of activity feeds of a blogger, ii) training a text clas-
sification model and filtering hate promoting and unknown
bloggers, iii) navigating through external links to bloggers
and extracting linked frontiers and iv) traversing through
spider network for selecting next blogger. In Phase 1, we use
a positive blogger Ui (annotated as hate promoting during
manual inspection) called as 'seed'. We extract n number of
textual posts (either re-blogged or newly posted by user)of
Ui by using Tumblr API 3. We further use Jsoup Java li-
brary 4 to extract the content and caption of these posts.
Tumblr allows users to post content in multiple languages.
However, our focus of this paper is to mine only English lan-
guage posts. Therefore, we perform data-preprocessing on
all extracted posts and by using Java language detection li-
brary 5, we filter all non-English language posts. In Phase 2,
we train our classification model over training samples (refer
to Section 3). We perform character level n-gram language
modeling6 on English language posts and compute their ex-
tent of similarity against training samples. We classify a
blogger as hate promoting based on the relevance score and
computed threshold value (refer to Section 3).
If a channel is classified as hate promoting or relevant,
we further proceed to Phase 3 and extract the notes infor-
mation for each posts (collected in phase 1). Notes in a
Tumblr post contains the information about bloggers who
liked or re-blogged a post. These user hits on a post indi-
cates the similar interest among bloggers who may or may
not be direct followers of each other. We extract the Tumblr
ids of profiles from notes for the following reasons:
i) due
to privacy policy, Tumblr does not allow users/developers
to extract the followers list unless the list is public and ii)
Tumblr facilitates users to track any number of search tags
or keywords. Whenever a new post is published on Tumblr
containing any of these tags, it appears on the dashboard
of user and a blogger no longer need to follow the origi-
nal poster. We manage a queue of all extracted bloggers
and traverse through the network using Random Walk al-
3https://www.tumblr.com/docs/en/api/v2
4http://jsoup.org/apidocs/
5https://code.google.com/p/language-detection/
6http://alias-i.com/lingpipe/index.html
Algorithm 3: Graph Traversal Using Random Walk
Algorithm
Data: S, th, Ng, Sg, Wg, De
Result: Directed Graph G
1 SetParameters()
2 Ui = S, F.add(S)
TopicalCrawlerS{
3 while (graphsize < Sg OR F.size > 0) do
4
Posts=ExtractPost(Ui)
Relevance Score = LanguageModeling(De, P osts,
Ng)
if (score >th) then
5
6
7
8
9
10
11
12
13
14
15
16
17
Linked Users=ExtractFrontiers(Ui)
ProcessedNodes PN.add(Ui)
for all LU ∈ Linked U sers do
if (!(F.contains(LU ) AND
(PN.contains(LU ))) then
F.add(LU )
else
Discard the node LU
end
end
else
Discard the node Ui
end
Compute the Markov Chain over graph G
New Blogger= node with maximum probability in
Markov chain array
F.remove(New Blogger)
TopicalCrawler(New Blogger )
end}
we extract 25 bloggers for each relation i.e. users who have
liked and re-blogged that post recently. If a blogger B1 re-
blog and as well as likes a post published by another blogger
B2 then in the graph G, we create an edge with both labels
i.e.
(B1, B2, <like, re-blog>). To avoid the redundancy
we extract one more frontier who have either liked or re-
blogged the post recently. To extract the linked bloggers of
a Tumblr user we first need to extract the posts made by
U . We can extract notes information only when notes and
re-blog information parameters are set to be true (refer to
steps 14 and 15 of Algorithm 1). As described in Algorithm
2, in step 4, we extract notes for each textual post (hate
promoting) made by User U . In steps 5 to 8, we extract the
name of unique bloggers who liked and re-blogged the post
P . In step 8, F represents the list of frontiers and relation
of U with each frontier. We maintain a list of all processed
bloggers and the number of hit counts on their recent 100
posts. These number of notes varied from 0 to 25K therefore
we perform smoothing on data points and plot median of
these values. Figure 6 shows the statistics of number of
notes collected on 100 posts of each blogger extracted during
topical crawler. Figure 6 reveals that overall number of hit
counts (number of reblog and like) for extremism promoting
users is very high. These hit counts reveals the popularity
of extremist content and the number of viewers connected
to such bloggers.
5.3 Topical Crawler Using Random Walk
Figure 6: Illustrating the Number of Notes For Each
Blogger Traversed in Topical Crawler
tual posts (quote, chat, text, url). Function TaggedPost()
with given parameters search for text posts that exclusively
contain given tag name. BloggerPost() fetches the tex-
tual posts published by given blogger ID. Both the functions
make a Tumblr API request to fetch these data. Function
ExtractPost() filters the response and extract body content
& caption of each post. Tumblr API allows us to only ex-
tract the summary of large posts. Therefore we use HTML
parsing for extracting the whole message in blog post. In
steps 4 to 7, we generate the URL from post summary and
id to fetch the remaining post details. ID is a unique iden-
tifier of Tumblr posts and slug is a short text summary of
that post which is appended in the end of every URL. We
invoke this URL using Jsoup library and parse the HTML
document to get the post content.
Algorithm 2: Extracting Frontiers of a Given Blog
Data: Blogger U
Result: Frontiers F < name, type > of U
ExtractFrontiersU{
1 SetParameters()
2 Posts=BloggerPost(U )
3 for all postP ∈ P osts do
4
5
6
7
8
Notes=P.getNotes()
for all N oteN ∈ N otes do
Linked Blog Name=N.getBlogName()
Note Type=N.getType()
Frontiers F .add(Linked Blog Name,
Note Type)
Liked or Reblog
end
end}
5.2 Retrieval of External Links to Bloggers
Algorithm 2 describes the steps to extract frontiers of a
given node U . Due to the privacy policies, Tumblr API does
not allow developers to extract subscriptions and followers
of a Tumblr user. The link between two bloggers indicates
the similar interest between them so that number of frontiers
vary for every post published by a blogger. For each user,
Algorithm 3 describes the proposed crawler for locating
a group of hidden extremist bloggers on Tumblr. The goal
of this algorithm is to compare each blogger against train-
ing examples and then connecting all positive class (hate
promoting or relevant) bloggers. Algorithm 3 takes several
inputs: seed blogger (positive class user) S, size of the graph
Sg i.e. maximum number of nodes in a graph, width of the
graph Wg i.e. the maximum number of frontiers or adja-
cency nodes for each blogger, a set of exemplary documents
De, threshold th and n-gram value Ng for relevance compu-
tation. We create a list of 30 positive class bloggers extracted
during experimental setup (refer to section 3) and compute
their relevance score against the exemplary documents. We
take an average of these scores and compute the thresh-
old value for language modeling. We use n-gram language
modeling (Ng=3) to build our statistical model. Algorithm
3 is a recursive process that results into a cyclic directed
graph. We run this algorithm until we get a graph of size
S (1000 bloggers) or there is no node left in the queue for
further extension. We perform a self-avoiding random walk
that means we make sure a node is never being re-visited.
If a node re-appears in the frontiers list then there are two
possibilities: 1) the frontier has already been processed (ex-
tended or discarded based upon the relevance score- Steps 4
to 7). If it exists in the processed nodes list then we create
a directed edge between the node and it's parent and avoid
further extension. 2) If the re-appearing node is in frontiers
list and is not yet processed, we created a directed edge in
the graph and continue the traversal.
The topical crawler is a recursive process that adds and
removes nodes after each iteration. The resultant graph
is dynamic and not irreducible that means given a graph
G(V, E), if there is a directed edge between two nodes u and
v, it is not necessary that there exists a directed path from v
to u. Consider that object (topical crawler) processed node
i at time t − 1.
In the next iteration object moves to an
adjacency node of i. The probability that object moves to
node j at time t is 1
when there exists a direct edge from
d+
i
i to j. Mij= 1
d+
i
in one step where d+
i
we can define:
denotes the probability to reach from i to j
is the out-degree of node i. Therefore
(1)
1
d+
i
0,
Mi,j =
,
if (i, j) is an edge in digraph G
otherwise
Therefore for each vertex i, the sum of the probability to
traverse an adjacency node of i is 1.
(cid:88)
j∈A(i)
∀i
Mij = 1
(2)
Where, A(i) denotes the list of adjacency nodes i. In random
walk on graph G topical crawler traverse along the nodes ac-
cording to the probability of Mij. Graph G is a dynamic so-
cial networking graph, therefore we compute a Markov chain
M after each iteration and compute the probability matrix
over graph G. Markov chain is a random process where the
probability distribution of node j depends on the current
state of matrix. The probability matrix M k gives us a pic-
ture of graph G after k iterations of topical crawler. Using
this matrix, we compute the probability distribution P that
object moves to a particular vertex. P k is the probability
Table 1: Confusion Matrix and Accuracy Results for
Unary Classification Performed During Topical Crawler.
Source: Agarwal et. al. [2]
(a) Confusion Matrix
Predicted
Positive Unknown
Actual
Positive
Unknown
290
92
45
173
(b) Accuracy Results
Precision Recall F-Score Accuracy
0.75
0.86
0.80
0.77
distribution of a node j after k iteration then probability of
i to be traversed in k + 1th iteration is the following:
P k+1 = P k.M where, P k = P 0 ∗ M k
(3)
Where P 0 is the initial distribution fixed for the seed
node.
6. EXPERIMENTAL RESULTS
6.1 Topical Crawler Results
We hired 30 graduate students from different depart-
ments as volunteers to annotate all 600 bloggers processed
or traversed during the topical crawling. We provided them
guidelines for annotation and to remove the bias, we per-
formed horizontal and vertical partitioning on the bloggers'
dataset. We divided annotators into 10 different groups, 3
members each. We asked each group to to annotate 60 blog-
gers. Therefore, we got 3 reviews for each blogger. We used
majority voting approach (a blogger labeled as X by at least
two annotators) for annotating each blogger as hate promot-
ing or unknown. We compute the effectiveness of our classi-
fication by using precision, recall and f-measure as accuracy
matrices. Table 1 shows the confusion matrix and accu-
racy results for unary classification performed during graph
traversal. Table 1(a) reveals that among 600 bloggers, our
model classifies 382(290+92) bloggers as hate promoting and
218(173+45) bloggers as unknown with a misclassification of
13% and 34% in predicting extremist and unknown bloggers
respectively. Table 1(b) shows the standard information re-
trieval matrices for accuracy results. our results shows that
the both the precision and recall are high, as it is important
to reduce the number of false alarms and also not to miss an
extremist blogger in order to locate their communities. We
use F-score as the accuracy metrics for our classifier and the
results reveal that we are able to predict extremist blogger
with an f-score of 80%.
6.2 Social Network Analysis
We perform social network analysis on topical crawler's
network resulted into a directed graph G(V, E), where V
represent a set of Tumblr bloggers accounts and E represent
a directed edge between two bloggers. We define this edge
as a relation having two labels 'posts liked by' and 'post re-
blogged by'. To examine the effectiveness of these relations
we generate two independent networks exclusively for 'like'
and 're-blog' links between bloggers. Figure 7 illustrates the
Table 2: Illustrating The Network Level Measurements for Topical Crawler.Dia= Network Diameter, Mod= Modularity,
ACC= Average Clustering Coefficient, IBC= In- Betweenness Centrality, CC= In- Closeness Centrality, #SCC= Number of
Strongly Connected Components.
Graph #Nodes #Edges Dia #SCC #ACC #Mod
TC
LB
RB
382
27
355
275
60
215
4
1
6
137
21
185
0.026
0.0231
0.021
12.00
1.307
7.01
IBC ICC
0.20
11.36
0.38
0.40
6.284
0
(a)
(b)
(c)
Figure 7: Cluster Representation of Social Network Graphs- Topical Crawler using Random Walk (a), 'Posts Liked by' (b)
and 'Posts Re-blogged By' (c)
representations of these networks. In each graph, size of the
node is directionally proportional to its out-degree. A node
with maximum number of adjacency vertices is biggest in
size. Colours in the graph represents the clusters of nodes
having similar properties. Here, we define the similarity
measure as the ratio of out-degree and in-degree.
We also perform several network level measurements on
these graphs. Table 2 reveals that re-blogging is a strong
indicator of links between two Tumblr profiles. Here, we ob-
serve that the graphs generated for topical crawler and re-
blogging link have same pattern in network measurements.
Both graphs are dense (also evident from the Figure 7) and
have higher modularity in comparison to the graph created
for 'liked' link. Table 2 and Figure 7 also reveal that by nav-
igating through re-blogging links we can locate large num-
ber of connected components in a extreme right community.
While following 'like' as a link we are able to detect small
number of connected blogs. Though as illustrated in Figure
7(b), we can not completely avoid this feature as a set of
blogs extracted using this link are irreducible. Table 2 also
shows that the graph created for 'like' relation has slightly
larger value for average clustering co-efficient. This is be-
cause the number of nodes in the graph is very less and a
major set of these nodes is strongly connected. Higher value
of In-between centrality shows the presence of bloggers who
are being watched by a large number of users. As the Figure
7(c) shows there are many users which are not directly con-
nected to each other (shown in red colour) but has a huge
network of common bloggers. These disjoint bloggers are
two or three hop away and are connected via other bloggers
(having second largest number of adjacency nodes). These
bloggers are connected with maximum number of other blog-
gers present in the graph and has a wide spread network in
extreme right communities. These nodes have the maximum
closeness centrality and play central role in the community.
Nodes represented as black dots have minimum number of
out-degree. They don't have a directed path to the central
users or original source of extremist posts. Based upon our
study we find these bloggers to be the target audiences who
share these posts in their own network. These users are very
crucial for such communities though they don't play a major
role in the network.
7. CONCLUSIONS
In this paper, we perform a case study on Jihadist groups
and locate their existing extreme right communities on Tum-
blr. We conduct experiments on real world dataset and use
topical crawler based approach to collect textual data (pub-
lished posts) from Tumblr users. We perform one class clas-
sification and identify hate promoting bloggers according to
the content present in their posts. We use random walk algo-
rithm for graph traversal and extract exclusive links to these
bloggers. We conclude that by performing social network-
ing analysis on a graph (vertices are the Tumblr bloggers
and edges are the links among these bloggers: re-blog and
like) we are able to uncover hidden virtual communities of
extremist bloggers with an accuracy of 77%. We compute
various centrality measures to locate the influential bloggers
playing major roles in extremist groups. We also investigate
the effectiveness of link features (likes and re-blogs) in or-
der to find the communities. Our results reveal re-blogging
is a strong indicator and a discriminatory feature to mine
strongly connected communities on Tumblr.
We perform a manual inspection on Tumblr and perform
a characterization on several hate promoting posts. Our
study reveals that these posts are very much popular among
extremist bloggers and get large number of hits. These posts
are published targeting some specific audiences. Keywords
present in the blog content, tags associated with post and
comments by other bloggers are clear evidence of hate pro-
motion among their viewers.
8. REFERENCES
[1] S. Agarwal and A. Sureka. Applying social media
intelligence for predicting and identifying on-line
radicalization and civil unrest oriented threats. arXiv
preprint arXiv:1511.06858, 2015.
[2] S. Agarwal and A. Sureka. A topical crawler for
uncovering hidden communities of extremist
micro-bloggers on tumblr. In 5th Workshop on Making
Sense of Microposts (MICROPOSTS), 2015.
[3] S. Agarwal, A. Sureka, and V. Goyal. Big Data
Analytics: 4th International Conference, BDA 2015,
Hyderabad, India, December 15-18, 2015, Proceedings,
chapter Open Source Social Media Analytics for
Intelligence and Security Informatics Applications,
pages 21 -- 37. Springer International Publishing, 2015.
[4] R. A. Bates and M. Mooney. Psychological operations
and terrorism: The digital domain. The Journal of
Public and Professional Sociology, 6(1):2, 2014.
[5] E. Bourlai and S. C. Herring. Multimodal
communication on tumblr: "i have so many feels!". In
Proceedings of the 2014 ACM Conference on Web
Science, WebSci '14, pages 171 -- 175, New York, NY,
USA, 2014. ACM.
[6] R. Bury, R. Deller, A. Greenwood, and B. Jones. From
usenet to tumblr: The changing role of social media.
Participations, 10(1):299 -- 318, 2013.
[7] Y. Chang, L. Tang, Y. Inagaki, and Y. Liu. What is
tumblr: A statistical overview and comparison. CoRR,
abs/1403.5206, 2014.
[8] D. D´ecary-H´etu and C. Morselli. Gang presence in
social network sites. International Journal of Cyber
Criminology, 5(2), 2011.
[9] M. R. DeVore. Exploring the iran-hezbollah
relationship: A case study of how state sponsorship
affects terrorist group decision-making. Perspectives
on Terrorism, 6(4-5), 2012.
[10] J. Gies and S. Martino. Uncovering ed: A qualitative
analysis of personal blogs managed by individuals
with eating disorders. The Qualitative Report,
19(29):1 -- 15, 2014.
[11] D. Jurgens. That's what friends are for: Inferring
location in online social media platforms based on
social relationships. In ICWSM, 2013.
[12] S. Mahmood. Online social networks: The overt and
covert communication channels for terrorists and
beyond. In Homeland Security (HST), 2012 IEEE
Conference on Technologies for, pages 574 -- 579. IEEE,
2012.
[13] E. Marquart. Microblog sensation: The growing
popularity of tumblr. 3PM Journal of Digital Research
and Publishing, Session, 2:70 -- 75, 2010.
[14] D. O'Callaghan, D. Greene, M. Conway, J. Carthy,
and P. Cunningham. Uncovering the wider structure
of extreme right communities spanning popular online
networks. In Proceedings of the 5th Annual ACM Web
Science Conference, pages 276 -- 285. ACM, 2013.
[15] L. Renwick. Audience research project: Tumblr study
group research 'how do 'fandoms' on tumblr react to
new media content?'. Enquiry-The ACES Journal of
Undergraduate Research, 4, 2014.
[16] A. Sureka and S. Agarwal. Learning to classify hate
and extremism promoting tweets. In Intelligence and
Security Informatics Conference (JISIC), 2014 IEEE
Joint, pages 320 -- 320. IEEE, 2014.
[17] A. S. Wilner and C.-J. Dubouloz. Transformative
radicalization: Applying learning theory to islamist
radicalization. Studies in Conflict & Terrorism,
34(5):418 -- 438, 2011.
[18] J. Xu, R. Compton, T.-C. Lu, and D. Allen. Rolling
through tumblr: Characterizing behavioral patterns of
the microblogging platform. In Proceedings of the 2014
ACM Conference on Web Science, WebSci '14, pages
13 -- 22, New York, NY, USA, 2014. ACM.
[19] J. Xu, T.-C. Lu, R. Compton, and D. Allen. Civil
unrest prediction: A tumblr-based exploration. In
Social Computing, Behavioral-Cultural Modeling and
Prediction, pages 403 -- 411. Springer, 2014.
|
1710.11539 | 1 | 1710 | 2017-10-31T15:48:12 | Local Core Members Aided Community Structure Detection | [
"cs.SI",
"physics.soc-ph"
] | The relationship of friends in social networks can be strong or weak. Some research works have shown that a close relationship between friends conducts good community structure. Based on this result, we propose an effective method in detecting community structure in social networks based on the closeness of relations among neighbors. This method calculates the gravity between each neighbor node to core nodes, then makes judgement if the node should be classified in the community or not, and finally form the process of community detection. The experimental results show that the proposed method can mine the social structure efficiently with a low computational complexity | cs.SI | cs | Local Core Members Aided Community Structure Detection
Xiaoping Fan 1.2 Zhijie Chen 2 Fei Cai 3 Jinsong Wu 4 Shengzong Liu2 Zhining Liao5 Zhifang Liao 3,*
(1) School of Information Science and Engineering, Central South University, China
(2) Information Management Department, Hunan University of Finance and Economics, Changsha, Hunan, China
1.
(3) School of Information Science and Engineering, Central South University, China
(4) Department of Electrical Engineering, Universidad de Chile,Santiago, Chile
(5) Division of Health & Social Care Research, Faculty of Life Sciences &Medicine, King's College London, UK
Correspondence Author: [email protected]
Abstract: The relationship of friends in social networks can be strong or weak. Some research works have shown
that a close relationship between friends conducts good community structure. Based on this result, we propose an
effective method in detecting community structure in social networks based on the closeness of relations among
neighbors. This method calculates the gravity between each neighbor node to core nodes, then makes judgement if
the node should be classified in the community or not, and finally form the process of community detection. The
experimental results show that the proposed method can mine the social structure efficiently with a low computational
complexity.
Key words: social network; community detection; core members
1 Introduction
Community discovery is one of the core research areas in social network
analysis [1] which is also benefit to other related research areas, such as public opinion
monitoring, advertising precision delivery, impact analysis. As early as in 1927, Stuart
Rice [2] proposed the discovery of small political groups based on voting patterns. Until
2002, Newman et al. proposed the GN algorithm [2], and community analysis began to
flourish. The GN algorithm is a classical graph splitting algorithm, which uses the edge
betweenness to measure the importance of the edge in the entire network, the larger
betweenness the edge has, the edge is more likely to connect two different communities.
Newman proposed a fast agglomeration algorithm based on the GN algorithm[3] via
repeatedly calculating the network shortest path to update the edge betweennesses until
the network is divided into appropriate community structures, for an unweighted graph
with n nodes and m edges, the time complexity is as high as (𝑛3) . Through
continuously merging nodes and communities, the highest modularity of the
community is generated. The efficiency of the algorithm is greatly improved. In order
to further reduce the computational complexity, many improved algorithms, such as
CNM algorithm [4] and FastUnfolding algorithm [5] based on modularity optimization,
have largely sacrificed the quality of the results in order to ensure the speed of
computation. Rosvall et al. [6] proposed the Infomap algorithm, a method based on
information theory and random walks, which uses Huffman coding optimized by the
code length to encode the traveling path and the objective function. Raghavan et al. [7]
proposed a Label Propagation Algorithm (LPA) based on the idea of message passing.
Each member keeps transmitting the label information he or she obtains, and according
to the most frequent occurrences in his or her neighbor tags to update their own labels,
and finally the nodes with the same label is divided into the same community. The
computational complexity of the LPA algorithm is (𝑘𝑚) , so the LPA algorithm can
deal with a large-scale network efficiently. But the algorithm does not have a unique
community division, and the quality of community partitioning is lower in low-density
networks. Beyond LPA algorithm, there have been many improved algorithms, such as
HANP algorithm[8], SLPA algorithm[9] and BMLPA algorithm[10]. In addition, there
have been many research works using probability models to generate the target
networks for community discovery issues. Yang et al. [11] proposed a community
discovery algorithm (BigCLAM method) based on the node-community affiliation. By
designing the probability function of the connection between nodes and using the EM
algorithm to iterate the membership value of the node to the community until the
algorithm converges, the algorithm is suitable for large-scale networks with millions of
nodes, but it is necessary to change the value of K (the number of communities) and
repeat the calculation, and get the best number of communities. Wang et al. [12] utilized
multiple social features of the nodes' behaviors to quantify the nodes pairs' social links
and these social links can be used to construct the friendship communities of the nodes.
The algorithm shortens the routing delay and increases the successful delivery ratio,
thereby improving the routing efficiency. Wang et al. [13] presented a trustworthy
crowdsourcing model in SIoT(Social Internet of Things), social cloud provides
compute and storage functions, and works as a service provider to bridge end users and
sensing entities; sensing entities receive tasks and rewards from a service provider and
feedback data. Then they incorporated a reputation-based auction mechanism into
crowdsourcing to perform winner selection and payment determination by evaluating
the reliability of crowdsourcing participants. However the algorithm mainly focus on
availability threat issues relevant to designing trustworthy crowdsourcing in SIoT.
In the process of community discovery, most of the previous algorithms have used
modularity as the optimization function to divide the community, or measure the node's
importance by the degree of nodes to discover the community[14]. These methods
neglect the local community characteristics of neighborhood sets in the network, and
the close neighborhood sets also can produce good community structure [14]. Meanwhile
the core nodes in the community structure can affect the community structure and guide
the community development trend. Under this consideration, in this paper, we propose
a local core node-based diffusion method to discover the community structure in the
network via analyzing the neighborhoods community importance of nodes in local
networks and using the conductivity to measure the importance of nodes. The structure
of the paper is as follows: Section 1 introduces the relevant content of community
structure, and briefly discusses several community discovery methods; Section 2 gives
the relevant definition and algorithm model of community discovery; Section 3 is the
experimental results and analysis; Section 4 summarizes the full text.
2 NCB Algorithm
In the real world, community always appears around some influential nodes of the
social network at the beginning, so we can use these nodes and their neighborhoods to
simulate the progress of community's appearance in order to explore the structure of
social network. According to power-law distribution of the node degree, we
experientially conclude three rules as follow:
(1) Some nodes in a network are more important than others, and these nodes build
connections between nodes with their significant influence, which contributes to
the appearance of community. Thus,
the key nodes
in community
play a decisive role in maintaining the stability of the community.
(2) Community cannot be star-like structure, so the node with big degree may not be
the core node. And nodes in the network follow the Long Tail Effect and
the ternary closure. We assume that there are four people in the network, C is a
friend of A and B, but A and B are strangers, D is a stranger of A, B and C. Then,
A is more likely to be a friend of B than D.
(3) The key nodes will appear in community, and they are not supposed to appear on
the bridge which connects different communities.
According to above rules, we proposed NCB(Community Detection Algorithm
based on Core Members in Neighbourhood), a new model to describe the progress of
community's appearance. NCB has three stages, including original, extension and
update, which are shown in Figure 1.
(a)Initial (b) Extension (c) Update
Figure 1 Three Stages of NCB
Initial stage: Find all the key nodes, and merge closer nodes into a community
according to the connections between key nodes. For instance, nodes B and G are
chosen to be the key nodes of community because they are most infective.
Extension stage: Merge the direct neighbors of key nodes into community, and
judge the degree of other nodes that are not directly connected to key node whether
these nodes join in this community. In Figure 1, nodes C, E and H joined in community
C1, and nodes L, M and N joined in community C2. D joined in C1 because D has a
tighter connection with C1.
Update stage: Choose the nodes from the expanded neighbor set of key nodes,
merge the nodes that are most likely to join the current community into the network. As
shown in Figure 1, node K joins in community C1 and node F joins in community C2.
Expand the cover area from the center during all the process, if the node who has not
merged into any community, we compute the closeness between the nodes of each
community.
NCB stimulates community's appearance via analyzing how closely a node
connects to community. Three key questions in the stimulation progress are raised as
follow:
(1) How to find the key nodes in the network ?
(2) How to judge which community the other common nodes want to join in ?
(3) How to judge whether a community accepts a node ?
2.1 The node importance calculation
Given a node set 𝑆,the set 𝑆 is a complement of 𝑆, 𝑉 = 𝑆 + 𝑆. For any disjoint
of two node sets, such as 𝑆 and 𝑇, 𝐸(𝑆, 𝑇) represents the edges between set 𝑆 and 𝑇,
𝑐𝑢𝑡(𝑆) represents the size of the partition produced by the𝐸(𝑆, 𝑇), which is the number
of edges between two node sets.
We randomly select a node to start a random walk test. The conductivity is the
probability that the point goes in and out of the node set, let 𝑑(𝑆) to represents the
summation of degrees of all nodes in set 𝑆, and let 𝑒𝑑𝑔𝑒𝑠(𝑆) to represent twice of the
total number of edges , The following expression can be obtained.
𝑒𝑑𝑔𝑒𝑠(𝑆) = 𝑑(𝑆) − 𝑐𝑢𝑡(𝑆) (1)
𝜙(𝑆) is the conductivity of the node set S, then 𝜙(𝑆) can be expressed as follows,
𝜙(𝑆) =
𝑐𝑢𝑡(𝑆)
min (𝑑(𝑆),𝑑(𝑆))
∈ [0,1] (2)
The conductivity is measured by the smallest values of the set 𝑆 and 𝑆, 𝜙(𝑆) is
the probability that an edge can be selected from a smaller set to cross the segmentation.
Let the neighbor set of node 𝑣 is (𝑣) , then smaller 𝜙(𝑁(𝑣)) means closer the node
𝑣 with its neighbors, the more obvious the local community characteristics.
2.2 Notions
Definition 1. Vertex Neighborhood. The neighborhood of a node can be defined as:
𝑁1(𝑣) = { 𝑤𝑑(𝑤, 𝑣) = 1}, and the neighborhood of a community can be described
as: 𝑁1(𝐶) = { 𝑤𝑑(𝑤, 𝐶) = 1} . 𝑑(𝑤, 𝑣) stands for the shortest distance from node
𝑤 to 𝑣 , and 𝑑(𝑤, 𝐶) represents the shortest distance between 𝑤 and the
community 𝐶.
Take each node and the neighborhood of the node as a cut, and define the cut as a
neighborhood community. If the neighborhood of a node has a less conductance score
than all other neighbors, then the neighborhood is said to be a best local community.
That is, each of the best local community to meet the following condition,
∀𝑤 ∈ 𝑁1(𝑣), 𝜙(𝑁1(𝑣)) ≤ 𝜙(𝑁1(𝑤)) (3)
where 𝑁1(𝑣) stands for a set of neighbor nodes 𝑣 with a distance of 1.
According to the definition of conductance and the best local community, smaller
the conductivity of the local minimum community is, more obvious the community
structure is, and the core node in the best local community can be regarded as the initial
community.
Definition 2. Community Gravitation. When studying the relationship between the
node and the community, we can refer to the law of gravitation, take the community as
a star and the node as an asteroid, the number of common neighbors between the
community and the node can be used as an element to calculate the magnitude of the
gravity between them. The greater the gravity is for 𝑣, the more desire to join the
community for 𝑣 . As 𝑣 perhaps will be accepted the gravitation from multiple
communities, it can be normalized by the degree (𝑑𝑢) of 𝑣 for gravitation attracted of
𝑣 as follows,.
𝐶𝐹𝑢(𝐶) =
𝑢
𝑒𝐶
𝑑𝑢
(4)
where 𝑒𝐶
𝑢 is the number of edges from 𝑢 to 𝐶, and 𝑑𝑢is the degree of node 𝑢.
Definition 3. Community Stability. The stability of a community is determined by the
connection degree of its internal membership, the closer the membership is, the more
stable the community is. Thus, the ratio of the twice number of edges within the
community to the sum of degrees of the nodes can be used as the stability of the
community.
𝑠(𝐶) =
𝑖𝑛
2∙𝑒𝐶
𝑑(𝐶)
(5)
where 𝑒𝐶
𝑖𝑛 represents the number of edges in the community 𝐶, 𝑑(𝐶) stands for
the sum of degrees of all nodes in the community . In the social network, the size of the
community is a small part relative to the entire network, that means that (𝑆) ≪ 𝑑(𝑆) ,
thus 𝑠(𝐶) = 1 − 𝑐𝑜𝑛𝑑𝑢𝑐𝑡𝑎𝑛𝑐𝑒(𝐶) .
Definition 4 Capture Factor. If the community
becomes more stable after
trapping the node , then
accepts that the node joins in the community, otherwise
does not accepts
𝜀 = 𝑠(𝐶 ∪ {𝑣}) − 𝑠(𝐶) (6)
If > 0 , node 𝑣 will increase the stability of the community, otherwise it will
weaken.
2.3 The Description of Algorithm
NCB algorithm is a kind of heuristic community detection algorithm based on
local optimal neighbor set. Unlike other heuristic community detection algorithms,
NCB algorithm does not select the degree of nodes as the seeds of community, but the
nodes with the best conductivity as the core node. Then, the algorithm applies the
community's gravitation to the node to measure whether the node is willing to join the
community and adopts the community's stability as the capture factor to judge whether
the community accepts the node.
The pseudo-code of the algorithm is as follow:
Input:The original Network(nodes and edges)
CvCvCOutput: Community structure
1: put all the nodes into the List
2: For each node in List do
3: Get the node's neighborhoods
4: Compute conductive
5: Find the smallest conductive node and neighborhood
6: End for
7: For each node not in do
8: select the node with the largest gravitation as candidate node
9: If the stability of community
10: accepts the node
11: End For
12: Return
2.4 The Analysis of Algorithm
NCB algorithm applies a heuristic approach, which starts the search in the
neighbor nodes set of the core nodes. The computational complexity for each output of
a community depends only on the size of the community's neighbor set, not the size of
the entire network. The analysis on the computational complexity of each step is
provided as follows.
We define the total number of nodes in the network is N, the total number of edges
is E, the average degree of nodes is m, the number of communities is c, and the average
number of nodes in the community is k.
(1) The computational complexity on the process of node conductivity
calculation is 𝑂(𝑁𝑚);
(2) The computational complexity on constructing seed sequences by Minimum
Heap is 𝑂(𝑁𝑙𝑜𝑔𝑁);
(3) The average time spent in constructing the initial community and solving
the gravitation of a neighbor(𝑐 ∙ 𝑚) ;
(4) The total time complexity on the process of iterating the community's
expansion and using the binary sort tree to update the node's neighbors and their
gravitational value is 𝑂(𝑘 ∙ 𝑚 ∙ log(𝑘 ∙ 𝑚)).Owing to 𝑐 ∙ 𝑘 ∙ 𝑚 = 𝐸 ,𝑘 ∙ 𝑚 = 𝐸/𝑐 ,
𝑂(𝑐 ∙ 𝑘 ∙ 𝑚 ∙ log(𝑘 ∙ 𝑚)) = 𝑂(𝐸 log(𝐸) − 𝐸 log(𝑐)), the time complexity of the NCB
algorithm is 𝑂(𝐸 log(𝐸)) . Moreover, the NCB algorithm uses the core node to
iteratively calculate in the local area, and the community size increases gradually, so
𝑂(𝐸 log(𝐸)) is only the complexity of the worst case.
3 Experiments
3.1 The dataset
In this experiment, we explore two different genres of data: (1) Dataset with real
community partition, it includes Karate Club Network and Dolphin SocialNetwork; (2)
Real network dataset without community from Cond-matscientific collaboration
network, Twitter network, Brightkite network. Detailed descriptions are shown in Table
1.
Dataset
Karate
Dolphins
Cond-mat
Twitter
Brightkite
Table 1 The Data set
Node message
Edge message Node number
Edge number
member
communication
dolphin
communication
author
cooperation
user
user
follow
friends
34
62
40,421
23,370
58,228
78
159
175,692
33,101
214,078
3.2 Result Analysis
There exist obvious long tail effects in the social network, and degree of the node
obeys the power law distribution. Figure 2 shows the scatter diagram of the node degree
and the frequency of five networks, including Karate, Dolphin and so on. The size of
Data in Karate and Dolphins is smaller and the data distribution is discrete, most of the
nodes have lower degrees, and only a few nodes have higher degrees, which is
consistent with power-law distribution.
Fig.2.The scatter diagram of node degree
Fig.3.The karate and dolphins Network node conduction scatter diagram
Fig.3 shows the karate and dolphins Network node conduction, the horizontal axis
denotes the nodes number, the vertical axis denotes the corresponding value of
conductivity, and the area of scattered points relies on the degree. In the karate network,
it is obvious that the maximum degree and minimum conduction prove the community
structure, and node 0 and node3 could explain the situation. Meanwhile, it shows that
the relationship between conductivity and degree is directly proportional in the strong
community network, and both of them can be used to evaluate the importance of nodes.
However, in the Dolphins network, there is no significant positive correlation between
the node's degree and the node's conductivity. The node20 has a higher degree, when
it has higher conductivity, which shows that the social circles with a large degree node
may not necessarily have the obvious community characteristics. Therefore, the higher
degree of a node may not necessarily lead to a higher quality of a community.
Fig.4 shows the logarithmic distribution of the conductivity in Cond-mat scientific
collaboration network, the Twitter network, and the Brightkite network. It shows that
the degrees of nodes between 10 and 100 have lower conductivity values. If the degrees
of nodes are large, but the conductivity value of its neighbor set is small, then it
demonstrates the neighbor set with large degree gets less difference between the
closeness of internal neighbor and the external neighbor set, and that is to say, the
community structure is not obvious. Thus, selecting the seed that depends on the node
degree will lead to a poor quality of the community division.
Fig.4.The conductivity of neighbor sets
In this paper, we choose FastUnfolding, CNM, LPA and Infomap algorithm for
comparisons by the parameters of time complexity and the modularity. Table 2 shows
the modularity about the NCB algorithm and the four algorithms on the Karate, Football
and Dolphins data sets. FastUnfolding, CNM are the optimization algorithm based on
the modularity, so the two algorithms achieve a high degree of modularity. And the
result of the LPA algorithm is not unique, so we use the average degree of modularity
which runs the LPA algorithm on three data sets for 5 times. The results of the LPA
algorithm have high fluctuations. Infomap algorithm uses Huffman encoding by
random walk for community structure detection, it can find a better community in the
network if the community structure is obviously; and the NCB algorithm cannot
produce the highest modularity, but the results perform closely to the FastUnfolding
algorithm.
Algorithm
CNM
LPA
Infomap
FastUnfolding
NCB
Table 2 The results of community division
Karate
0.381
Football
0.550
Dolphins
0.495
0.345[0.132,0.402]
0.581[0.563,0.602] 0.458[0.373,0.502]
0.402
0.419
0.378
0.600
0.605
0.585
0.528
0.519
0.510
Fig.5 Comparison of NMI
In this paper, we use normalized mutual information to evaluate the algorithm,
Since the result of LPA algorithm is not stable, we will set the maximum value of the 5
operations. As shown in Figure 5 (NMI), the correct rate of the LPA algorithm and the
NCB algorithm are the best, the accuracy rate of NCB algorithm on Karate data set is
100%, the second is LPA, the accuracy of the other three algorithms are below 80%.
According to the NMI value, the FastUnfolding, CNM, and Infomap algorithms
have achieved larger Q values but the accuracy are lower than the results with LPA and
NCB. This shows a large difference between the cluster structure and the topology
structure in the datasets with real background. In Figure 5, the overall score and
performance of NCB algorithm are the best.
Table 3 Compare the number of communities found by different algorithms on the three datasets.
Algorithm
Cond-mat
Twitter
Brightkite
CNM
LPA
Infomap
1910
3590
3233
FastUnfolding
1667
NCB
2267
168
648
607
136
366
1034
1569
4829
951
1260
We use CNM, LPA, Infomap, FastUnfolding and NCB algorithms to do the
experiments with three datasets (Cond-Mat-2005, Twitter, Brightkite) respectively,and
try to calculate the number of communities, the degree of modularity of the community,
and the time it takes (in seconds). Since the results of LPA are not unique, the results of
LPA are the average value over the five times.
Table 3 lists the communities numbers found by each algorithm. LPA algorithm is
a label-based diffusion algorithm, so in the larger network, the smaller the number of
iterations can get the results. Infomap algorithm takes random walk to get the
optimization function, so the community size are small and the number of communities
is large. As shown in Table 3, the number of community found by Infomap and LPA
algorithm is more than twice as much as the number of community found by other three
algorithms on the three data sets. This indicates that LPA and Infomap algorithms tend
to find smaller communities when the network size is large. CNM and FastUnfolding
algorithms are modularity optimization algorithm, so the number of communities found
by them is closer. And the NCB algorithm is a heuristic algorithm based on a local best
community, so it can both ensures the discovery of larger communities and prevents the
small communities to annexe by large communities. Therefore, the number of
communities found by the NCB algorithm is between the results of the two algorithms
described above, and the number of communities found by the NCB algorithm on
Cond-mat-2005, Twitter, and Brightkite datasets are 2267, 366, and 1560, respectively.
On the Cond-mat-2005 dataset, there are not many differences in modularity for
the community partitioning by each algorithm, but it can be seen that the modularity of
CNM, FastUnfolding and NCB are slightly higher than that of LPA and Informap, as
shown in Table 4.
Table 4 Comparison with the Modularity
Algorithm
Cond-mat
Twitter
Brightkite
CNM
LPA
Infomap
FastUnfolding
NCB
0.679
0.662
0.674
0.722
0.681
0.869
0.794
0.825
0.896
0.826
0.603
0.455
0.581
0.664
0.611
In Table 5, the theoretical time complexity of the five algorithms and their actual
time spent on community discovery on three datasets are presented. Brightkite has
58,228 nodes and 214,078 edges, so the algorithm takes the longest time on this data
set, and the shortest time on the Twitter. The Infomap gets the highest time complexity
and the actual execution time is also the longest, the time is 869.767s; And the time
complexity of NCB, LPA and FastUnfolding are all ο(n), the actual lengths of execution
time are different. The running time of FastUnfolding algorithm is the shortest, the
efficiency is obviously better than the other four algorithms.
Table 5 Community partitioning results(time s)
Algorithm
Cond-mat
Twitter
Brightkite
CNM
LPA
250.7
72.40
68.15
358.88
49.74
151.63
Infomap
639.766
51.663
869.767
FastUnfolding
NCB
45.39
56.19
18.79
127.60
23.64
161.30
Based on the three kinds of statistical data, the Fast Unfolding algorithm is the best
in terms of time and modularity, but it is less effective for small-grained communities
and has the least number of communities found. The NCB algorithm has less
complexity in time complexity than FastUnfolding algorithm, and the modularity of
community partitioning is closer to FastUnfolding, but NCB algorithm finds more
communities than FastUnfolding algorithm, so NCB algorithm can be also applied to
small-grained communities.
4 Conclusion
In this paper, we have proposed a kind of community discovery algorithm based
on local core members (NCB algorithm) to solve the problem of community detection
in social networks. The NCB algorithm calculates the local core nodes in the network
via computing the conductivity values. Then, through using the neighbor sets, the core
nodes are processed to form the initial community. Finally, the nodes of the unmarked
community are updated iteratively. The conductivity value of the community
determines the community ownership. Experiments on Karate and Dolphins networks
with real communities have shown that the community structure obtained by NCB
algorithm is the closest to the true community structure, and the accuracy is the highest.
In addition, although the NCB algorithm cannot produce the maximum Q value on
Twitter and Cond-mat networks, the NCB algorithm can find small-sized and better-
quality communities, and can complete the computation in a linear time complexity.
Compared with other algorithms in terms of modularity, community number, running
time and accuracy, NCB algorithm has the best overall performance. But we do not
consider the influence of node attributes in the diffusion model, and will try to find such
community structure in the future works.
References
[1] Y.F. Lin, T.Y. Wang, R.Tang. An efficient community network discovery
model and algorithm [J] . Computer Research and Development,2012,
49(2):337-345.
[2] Girvan M, Newman M E. Community structure in social and biological
networks.[J]. Proceedings of the National Academy of Sciences of the United
States of America, 2002, 99(12):7821.
[3] Clauset A, Newman M, Moore C. Finding community structure in very large
networks [J]. Physical Review E, 2004, 70(6):264-277.
[4] Palla G, Derényi I, Farkas I, et al. Uncovering the overlapping community
structure of complex networks in nature and society.[J]. Nature, 2005,
435(7043):814.
[5] Blondel V D, Guillaume J L, Lambiotte R, et al. Fast unfolding of communities
in large networks[J]. Journal of Statistical Mechanics Theory & Experiment,
2008, 2008(10):155-168.
[6] Rosvall M, Bergstrom C T. Maps of random walks on complex networks reveal
community structure[J]. Proceedings of the National Academy of Sciences of the
United States of America, 2008, 105(4):1118-1123.
[7] Raghavan U N, Albert R, Kumara S. Near linear time algorithm to detect
community structures in large-scale networks[J]. Physical Review E Statistical
Nonlinear & Soft Matter Physics, 2007, 76(2):036106.
[8] Leung I, Hui P, Lio P, etal. Towards Real-time Community Detection in Large
Networks[j]. Physical Review E, 2009, 79(6): 66107.
[9] Xie J, Szymanski B K, Liu X. SLPA: Uncovering Overlapping Communities
in Social Networks via a Speaker-Listener Interaction Dynamic Process[C]//
IEEE, International Conference on Data Mining Workshops. IEEE Computer
Society, 2011:344-349.
[10] Wu Z H, Lin Y F, Gregory S. Balanced Multi-Label Propagation for
Overlapping Community Detection in Social Networks[J]. Journal of
Computer Science and Technology, 2012, 27(3):468-479.
[11] Yang J, Leskovec J. Overlapping community detection at scale:a nonnegative
matrix factorization approach[C]// ACM International Conference on Web
Search and Data Mining. ACM, 2013:587-596.
[12] Wang K, Guo H. An Improved Routing Algorithm Based on Social Link Awareness in
Delay Tolerant Networks[J]. Wireless Personal Communications, 2014, 75(1):397-
414.
[13] Wang K, Qi X, Shu L, et al. Toward trustworthy crowdsourcing in the social
internet of things[J]. IEEE Wireless Communications, 2016, 23(5):30-36.
[14] Gleich D, Seshadhri C. Neighborhoods are good communities[J]. Computer
Science, 2011.
|
1711.00462 | 1 | 1711 | 2017-09-18T06:03:09 | Early prediction of the duration of protests using probabilistic Latent Dirichlet Allocation and Decision Trees | [
"cs.SI",
"cs.AI"
] | Protests and agitations are an integral part of every democratic civil society. In recent years, South Africa has seen a large increase in its protests. The objective of this paper is to provide an early prediction of the duration of protests from its free flowing English text description. Free flowing descriptions of the protests help us in capturing its various nuances such as multiple causes, courses of actions etc. Next we use a combination of unsupervised learning (topic modeling) and supervised learning (decision trees) to predict the duration of the protests. Our results show a high degree (close to 90%) of accuracy in early prediction of the duration of protests.We expect the work to help police and other security services in planning and managing their resources in better handling protests in future. | cs.SI | cs | Early prediction of the duration of protests using
probabilistic Latent Dirichlet Allocation and
Decision Trees
7
1
0
2
p
e
S
8
1
]
I
S
.
s
c
[
1
v
2
6
4
0
0
.
1
1
7
1
:
v
i
X
r
a
Satyakama Paul∗, Madhur Hasija† and Tshilidzi Marwala‡
∗Oracle India Pvt. Ltd, Prestige Tech Park, Bengaluru, India - 560103
Email: [email protected]
†WNS Global Pvt. Ltd, Whitefield, Bengaluru, India - 560048
‡University of Johannesburg, Johannesburg, South Africa - 2006
Email: [email protected]
Email: [email protected]
Abstract-Protests and agitations are an integral part of every
democratic civil society. In recent years, South Africa has seen
a large increase in its protests. The objective of this paper
is to provide an early prediction of the duration of protests
from its free flowing English text description. Free flowing
descriptions of the protests help us in capturing its various
nuances such as multiple causes, courses of actions etc. Next
we use a combination of unsupervised learning (topic modeling)
and supervised learning (decision trees) to predict the duration
of the protests. Our results show a high degree (close to 90%) of
accuracy in early prediction of the duration of protests. We expect
the work to help police and other security services in planning
and managing their resources in better handling protests in
future.
I. INTRODUCTION
Protests and agitations are an integral part of any democratic
civil society. Not to be left behind when compared with the
rest of the world, South Africa in recent years has also seen
a massive increase in public protests. The causes of these
protest were varied and have ranged from service delivery,
labor related issues, crime, education, to environmental issues.
While in the past multiple studies and news articles have
analyzed the nature and cause of such protests, this research
uses a combination of unsupervised (topic modeling using
probabilistic Latent Dirichlet Allocation (pLDA)) and super-
vised (single and ensemble decision trees) learning to predict
the duration of future protests. We develop an approach in
which an user inputting a description of a protest in free
flowing English text, the system predicts the duration of the
protest to a high (close to 90%) degree of accuracy . We expect
that an early correct prediction of the duration of the protest
by the system will allow police and other security services to
better plan and allocate resources to manage the protests.
II. PROBLEM STATEMENT
The objective of this research is to provide an early
prediction of the duration of a protest based on South African
protest data. The master dataset is obtained from the website
TABLE I
IMPORTANT STATISTICAL FEATURES
Whether Metro or not
Coordinates
End date
Police station
Start date
Cause of protest
Status of protest (Violent or not)
Reason for protest (text data)
PERCENTAGE OF PROTESTS VIS-A-VIS PROVINCES
TABLE II
Provinces
Gauteng
Western Cape
Kwazulu Natal
Eastern Cape
North West
% of protests
37
18
14
9
6
Provinces
Limpopo
Mpumalanga
Free State
Northern Cape
% of protests
6
5
3
2
- Code for South Africa [1]. It consisted of 20 features
(columns) describing 876 instances (rows) of protests over
the period of 1st February 2013 to 3rd March 2014. Among
the 20 features, the statistically important and hence selected
ones are shown in Table I . The rest are repeated codification
of the important features that convey the same statistical
information as the important features. Hence they are ignored.
Also detailed addresses of the location (Town or city name,
First street, Cross street, Suburb area place name etc) of
the protests are not considered. Instead the more accurate
measures - Coordinates (latitudes and longitudes) are used.
Table II, III, IV and V shows the overall descriptive
statistics of the protests during the above mentioned period.
From the 876 rows, three are removed for which the one
or more columns are missing1. Thus our modeling exercise
is based upon 873 instances of protests. Table II shows
1Since an insignificant percentage (0.34%) of our data is missing we
conveniently remove them without doing missing value imputation.
PERCENTAGE OF PROTESTS VIS-A-VIS ISSUES
TABLE III
Issue
% of protests
Service delivery
Labour
Crime
Election
Vigilantism
Education
31
30
12
6
5
5
Issue
Political
Transport
Xenophobia
Individual causes
Environment
% of protests
4
3
2
1
1
PERCENTAGE OF PROTESTS VIS-A-VIS STATE
TABLE IV
State
Peaceful
Violent
% of protests
55
45
PERCENTAGE OF PROTESTS VIS-A-VIS DURATION IN DAYS
TABLE V
Duration
% of protests
0 (less than 24 hrs)
1
2
3
4
74.34
11.34
4.58
2.06
2.17
5-13,19, 21-23, 31, 34, 37, 39, 57, 65
less than 1%
that Gauteng2 as the seat of commerce, and President and
Cabinet; and Western Cape3 as the legislative capital has the
largest concentration of protests, followed by the others. Table
III shows that the three largest issues of protests are from
service delivery, labor related issues, and crime related at
respectively 31%, 30% and 12% of the total. From table IV it
can be seen that the difference between peaceful and violent
protests is low at 55% and 45% respectively. However the
most interesting insight comes from the duration of protests4.
From table V it can be observed that the majority of protests
(at 74.34% of the total) last for less than 24 hours. Thus this
feature is highly skewed.
The idea behind this work is to use only the text description
of the protests (predictor variable) to predict
the duration
of future protest(s) (response variable). Some typical exam-
ples of the descriptions of protests are as follows. Flagged
as service delivery and violent - "Residents of both towns
Butterworths and Centane blockaded the R-47 between the
two towns, accusing the Mnquma Municipality of ignoring
their request for repairs to the road." Eyeballing the text
does not indicate any violence. A second example flagged as
2Gauteng has in it Johannesburg and Pretoria. Johannesburg is the com-
mercial hub of South Africa, and the office of President and Cabinet is in
Pretoria.
3Cape Town as the seat of South African parliament is situated in Western
Cape.
Day of the protest.
4Duration of protests is the difference between the End day and the Start
nor epistemologically.
service delivery and peaceful protest is "ANGRY community
leaders in four North West villages under the Royal Bafokeng
Nations jurisdiction protested this week against poor services
and widespread unemployment among the youth. Now they
not only demand their land back, but want a 30% stake in
the mines which are said to employ labour from outside the
villages.". While the first line of the text referred to the cause
of the protest as service delivery, the second line referred to
political (demand for return of land) and labor issues (3%
stake in mines and corresponding increase in employment). In
this sense, we believe that strict flagging of protests into one
category or another restricts the knowledge of the protests.
We also believe that it is normal for human social concerns to
spill from one area to another during protests that is not well
captured by only one restrictive flag attached to one protest.
Thus we drop the categorical features (with strict class labels)
and consider only the text descriptions of the protests as a
predictor of its duration. Another important advantage of using
text descriptions is that they give flow/progress of events that
occurred during a protest and other relevant details. Figure
1 shows the word cloud of the entire protest corpus. Prior
building the word cloud the usual preprocessing on the text
corpus such as removal of punctuation, numbers, common
English stopwords, white spaces etc have been carried out.
The cloud consists of 75 words5 and words that occur with
a minimum of at least 25 times are included. The more the
frequency of the words occurring in the text corpus, the bigger
is its font size. Lastly due to word stemming, resid is created
from words like residence and residing.
III. THEORETICAL CONCEPT - PROBABILISTIC
LATENT DIRICHLET ALLOCATION
In this subsection we provide a short introduction to pLDA.
LDA is an unsupervised generative probabilistic model pri-
marily used for topic discovery. It states that for a collection
of words in a large number of documents, each document is
a mixture of a number of "latent topics" 6 and each word in
a document is a result of a latent topic. Following [2], [3]; a
document is a random mixture of latent topics and each topic7
in turn is created by the distribution of words. Mathematically
the LDA model can be stated as follows. For each document
w in a corpus D
1) Choose N ∼ P oison(ξ)
2) Choose θ ∼ Dir(α)
3) For each of the N words wn:
a) Choose a topic wn ∼ M ultinomial(θ)
b) Choose a word wn from p(wnzn, β), a multino-
mial probability conditioned on the topic zn
where a document w is a cobination of N words, for example
w = (w1, w2, ...., wN ). A corpus D is a collection of M
documents such that D = (w1, w2, ...., wM ). α and β are
5The number of words is kept low for better visibility.
6Note that the topics are latent because they are neither defined semantically
7Topic and latent topic are the same and used interchangeably
Fig. 2. Setting of two class classification problem
panel of figure 2 shows the percentage of protests falling in
less than one day (74.34%) and one or more days (25.66%).
Thus the binary classification problem now is to correctly
predict the response variable (less than one day against one
or more days) for the text corpus of the protest descriptions.
However before getting into the classification exercise we
need to perform two tasks. One, we need to find the optimal
number of latent
topics from the text corpus. Two, since
classification algorithms per se cannot take text documents, we
need to extract a set of latent topics for each text description
of a protest. In the next section we discuss the above tasks
and their results.
V. RESULTS AND DISCUSSIONS
Finding the optimal number of hidden topics from the text
corpus is an important task. If the chosen number of topics is
too low, then the LDA model is unable to identify the accurate
classifiers. However if the number is too high, the model
becomes increasingly complex and thus less interpretable [4]
[5]. In contrast to the often used procedure of intelligently
guessing the optimal number of topics in a text corpus,
following [2] we use the perplexity approach to find the
optimal number of topics. Often used in language/text based
models, perplexity is a measure of "on average how many
different equally most probable words can follow any given
word" [6]. In other words its a measure of how well a statistical
model (in our case LDA) describes a dataset [4] where a lower
perplexity denotes a better model. It is mathematically denoted
by:
perplexity(Dtest) = exp{−
d=1 logp(wd)
}
(4)
(cid:80)M
(cid:80)M
d=1 Nd
where the symbols have the same meaning as in section III.
Using a trial number of topics that range between 2 to 308,
we use perplexity to find the optimal number of topics from
our text corpus. The text corpus is broken into a training and
test set. A ten fold cross validation is carried out using 1000
iterations. The black dots show the perplexity score for each
fold of cross validation on the test set for various numbers of
topics. The average perplexity score is shown by the blue line
in figure 3 and the score is least for 24 latent topics. Thus
the optimal number of topics for our text corpus is 24.
8x axis of fig 3 shows the trial number of topics
Fig. 1. Word cloud of the entire text courpus of the protests
parameters of the Dirichlet prior on per document topic and
per topic word distribution respectively. z is a vector of topics.
The central idea of LDA is to find the posterior distribution
(θ) of the topics (z) when the document (w) is given, i.e.
p(θ, zw, α, β) =
p(θ, z, wα, β)
p(wα, β)
(1)
Since it is beyond the scope of this paper to derive the
detailed formula, we summarize the two other important
results that will subsequently be required in our analysis. The
marginal distribution of a document is:
(cid:90)
(cid:88)
N(cid:89)
n=1
)
p(wα, β) =
p(θα)(
p(znθ)p(wnzn, β)dθ (2)
The probability of a corpus is:
m(cid:89)
(cid:88)
Nd(cid:89)
p(wdnzdn, β)dθ)
(3)
p(Dα, β) =
p(θdα)(
d=1
IV. EXPERIMENTAL SETUP
n=1
As seen in table V, our response variable - duration of
protests is highly schewed. Protests lasting for less than 24
hours is 74.34% of the total number of protests. Protests
above one day is less than 5% of the total number. In effect it
means that in reality, South Africa rarely experiences protests
that stretches beyond one day. So for practical purposes, we
couple protests lasting above 24 hours into one class and
compare it against protests lasting below 24 hours. The right
024681119233765Number of days% in total0204060less than one dayone or more daysClasses of number of days% in total0204060AN EXAMPLE OF TEXT DESCRIPTION AND ITS ASSOCIATED
HIGHEST PROBABILITY TOPICS
TABLE VII
Text
LP
The residents wanted
municip
2nd LP
march
3rd LP
resid
4th LP
hospit
Sterkspruit to be
moved from the
Senqu municipality
and be a municipality
on its own
Fig. 3. Finding the optimal number of topics
*** P(Tn) refers to probability of the nth topic where n varies from 1 to
24. Here T1 = shop, T8 = march, T20 = municip and T24 = anc.
AN EXAMPLE OF A TEXT DESCRIPTION AND ITS ASSOCIATED
TABLE VI
TOPIC PROBABILITIES
P(T1)..
0.0027
..P(T8)
0.15
...
...
..P(T20)
0.79
..P(T24)
0.0028
Text
The residents wanted
Sterkspruit to be
moved from the
Senqu municipality
and be a municipality
on its own
PERFORMANCE METRICS OF VARIOUS ALGORITHMS ON THE
TABLE VIII
TEST SET
Balanced accuracy
Kappa
Sensitivity
Specificity
C5.0
Treebag
79.38% 88.40%
0.590
0.769
87.03% 94.59%
72.41% 82.76%
Random forest
89.69%
0.795
95.68%
84.24%
*** P(Tn) refers to probability of the nth topic where n varies from 1 to
24. Here T1 = shop, T8 = march, T20 = municip and T24 = anc.
*** P(Tn) refers to probability of the nth topic where n varies from 1 to
24. Here T1 = shop, T8 = march, T20 = municip and T24 = anc.
Next we perform a LDA with 24 topics on our text corpus.
Table VI shows an example of a text description and the
probabilities associated with the various topics.
The topic names are given in the bottom of the table.
The topics court and resid have the highest probabilities
for the text. It might also be noted that since the topics are
multinomial distributed to the entire text corpus and the words
in corpus, hence there is no direct or visible relationship
that connects the topics with the text descriptions. We can
only assume that the topics are complexly related to the text
descriptions.
Table VII shows the topics with four largest probabilities
(largest, 2nd largest,... 4th largest) associated with a text
description. With computational concerns in mind, we restrict
the largest probabilities to only four.
It might be recollected from the last paragraph of section
IV where we stated that classification algorithms per se
cannot
take text documents as a predictor variable. Table
VII shows a way in which a single text description can be
represented as a set of most relevant9 topics. Thus for an
entire corpus of 873 text documents, the predictor side of the
classification model would consist of a topic matrix of 873x4
dimensions. Including the response variable, our modeling
data would have 873x5 dimensions.
9The most relevant topics are the ones with highest probabilities.
In addition, it might also be recalled that our response
variable duration of protest is unbalanced with the percentage
of values falling in the class - less than one day at 74.34%
and one or more days at 25.66%. Since unbalanced classes
are not learned well by decision trees, so we use both way
balanced sampling strategies to balance the modeling data.
Next the modeling data is split into a training and test set in
the 7:3 ratio. The dimensions of the training and test sets are
910x5 and 388x5 respectively.
In the next step we use decision tree based classification
algorithms to model the relationship between the topic matrix
and the duration of the protests. Specifically we use three
algorithms - C 5.0,
treebag, and random forest and do a
ten fold cross validation with five repeated iterations. The
prediction results for the class one or more days on the test
dataset is shown in table VIII.
Treebag with a number of decision trees is able to better
predict
the response variable than a single tree in C5.0
because multiple trees help in reducing variance without
increasing bias. Again, random forest performs better than
treebag because in addition to multiple trees it also randomly
selects a subset of the total number of features at each node.
Further best split feature from the subset is used to split
each node of the tree. This salient feature of random forest
is absent in treebag. The combination of a number of trees
and random selection of a subset of features at each node of
the tree helps in further reducing the variance of the model.
510152025301200130014001500160017001800Ten fold cross−validation to find the optimal value of kNumber of topicsPerplexity when fitting the trained model to the test setThus in effect, random forest performs best in predicting the
duration of the protests on the test dataset.
The
codes
for
the
analysis
are
in
https:
//www.dropbox.com/s/dzyj2lviqnlgk5x/
dropbox_ieee_la_cci_2017.zip?dl=0
VI. LIMITATIONS
The first limitation of this research is that LDA does not
allow for evolution of topics over time. This means that if the
nature and scope of the protests remain pretty stagnant over
time then our model is expected to perform fairly well. Second,
since it is a bag of words model, so sentence structures are
not considered. And third, topics are not independent of one
another. Thus it might happen that the same word represents
two topics creating a problem of interpretability.
VII. CONCLUSION
This paper is an combination of unsupervised and super-
vised learning to predict the duration of protests in South
African context. Protests and agitations being social issues;
have multiple nuances in terms of causes, courses of actions
etc that cannot be very well captured by restrictive tags.
Thus we discard the approach of restrictive characterization
of protests and use free flowing English texts to understand
its nature, cause(s), course of action(s) etc. Topic discovery
(unsupervised learning using pLDA) and subsequent classifi-
cation (supervised learning using various decision tree algo-
rithms) provides promising results in predicting the duration of
protests. We expect that the implementation of the framework
can help police and other security services in better allocating
resources to manage the protests in future.
REFERENCES
[1] Code for South Africa, Protest Data, https://data.code4sa.org/dataset/
Protest-Data/7y3u-atvk.
[2] D.M. Blei, A.Y Ng and M.I Jordan, Latent Dirichlet Allocation, Journal
of Machine Learning Research, Vol. 3, pp.993-1022, 2003.
[3] C. Reed, Latent Dirichlet Allocation: Towards a Deeper Understanding,
http://obphio.us/pdfs/ldatutorial.pdf.
[4] W. Zhao, J.J Chen, R. Perkins, Z. Liu, W. Ge, Y. Ding and W. Zou, A
heuristic approach to determine an appropriate number of topics in topic
modeling, 12th Annual MCBIOS Conference, March, 2015.
[5] W. Zhao, W. Zou, J.J Chen, Topic modeling for cluster analysis of large
biological and medical datasets, BMC Bioinformatics, Vol. 15 (Suppl
11), 2014.
[6] NCLab, Perplexity, http://nclab.kaist.ac.kr/twpark/htkbook/node218 ct.
html.
|
1709.03777 | 2 | 1709 | 2017-10-01T15:40:33 | Establishing Personal Trust-based Connections in Distributed Teams | [
"cs.SI",
"cs.CY"
] | Trust is a factor that dramatically contributes to the success or failure of distributed software teams. We present a research model showing that social communication between distant developers enables the affective appraisal of trustworthiness even from a distance, thus increasing project performance. To overcome the limitations of self-reported data, typically questionnaires, we focus on software projects following a pull request-based development model and approximate the overall performance of a software project with the history of successful collaborations occurring between developers. | cs.SI | cs | DOI: 10.1002/itl2.6
L E T T E R
(cid:34)(cid:86)(cid:85)(cid:73)(cid:80)(cid:83)(cid:104)(cid:84)(cid:1)(cid:81)(cid:70)(cid:83)(cid:84)(cid:80)(cid:79)(cid:66)(cid:77)(cid:1)(cid:68)(cid:80)(cid:81)(cid:90)
Establishing personal trust-based connections in distributed teams
Fabio Calefato1
Filippo Lanubile2
1Dipartimento Jonico, University of Bari, Bari,
Italy
2Dipartimento di Informatica, University of Bari,
Bari, Italy
Correspondence
Filippo Lanubile, Dipartimento di Informatica,
University of Bari, Via Orabona, 4 – Dip.
Informatica, 70125 Bari, Italy.
Email: [email protected]
Trust is a factor that dramatically contributes to the success or failure of distributed
software teams. We present a research model showing that social communication
between distant developers enables the affective appraisal of trustworthiness even
from a distance, thus increasing project performance. To overcome the limitations of
self-reported data, typically questionnaires, we focus on software projects following
a pull request-based development model and approximate the overall performance
of a software project with the history of successful collaborations occurring between
developers.
KEYWORDS
collaboration, distributed software teams, project performance, pull request, social
communication, trust
1
INTRODUCTION
Computer-Supported(cid:1)Cooperative(cid:1)Work(cid:1)(CSCW)(cid:1)addresses(cid:1)collaboration(cid:1)problems(cid:1)faced(cid:1)by(cid:1)virtual(cid:1)teams,(cid:1)including(cid:1)com-
munication(cid:1) breakdowns,(cid:1) coordination(cid:1) problems,(cid:1) and(cid:1) lack(cid:1) of(cid:1) knowledge(cid:1) about(cid:1) colleagues'(cid:1) activities.1(cid:1) Distributed(cid:1) software
teams(cid:1)are(cid:1)no(cid:1)different.(cid:1)When(cid:1)developers(cid:1)work(cid:1)for(cid:1)large-scale,(cid:1)distributed(cid:1)projects,(cid:1)"distances"(cid:1)(ie,(cid:1)temporal,(cid:1)geographical,(cid:1)and
socio-cultural)(cid:1)get(cid:1)in(cid:1)the(cid:1)way,(cid:1)aggravating(cid:1)collaboration(cid:1)problems(cid:1)between(cid:1)teams.(cid:1)Software(cid:1)development(cid:1)is,(cid:1)in(cid:1)fact,(cid:1)an(cid:1)intensely
collaborative(cid:1)process(cid:1)where(cid:1)people(cid:1)are(cid:1)required(cid:1)to(cid:1)constantly(cid:1)interact(cid:1)with(cid:1)others(cid:1)to(cid:1)create,(cid:1)share,(cid:1)and(cid:1)integrate(cid:1)information.
In their study on the challenges of distributed development caused by distance, Agerfalk and Fitzgerald2 stressed the negative
impact of reduced trust faced by distributed teams. Trust within teams typically grows and reinforces through direct contact.
Face-to-face communication is the most effective solution for team members to the problem of creating ties with others and
becoming aware of both technical aspects, such as terminology and established procedures, and even more subtle aspects, such
as existing social connections between team members, norms, and cultural differences. Despite being so vital for establishing
connections between developers, face-to-face interaction is the activity that is mostly affected by distance in distributed devel-
opment contexts. Over the last 2 decades, software development organizations have become more and more distributed and, yet,
the following research question remains mostly unanswered: How do we establish personal, trust-based connections between
members of distributed teams?
2
BACKGROUND
The topic of trust has received a considerable amount of attention in several research domains, from cognitive science to economy
and software engineering. To date, several definitions of trust have been given due to the complexity of the matter, which
involves both interpersonal relationships (eg, cultural issues between trustee and trustor) and facets of human behavior (eg,
personal traits).
Trust may be defined as the belief that the trustee will behave as expected by the trustor.3 This definition explicates that
the trustor decides to take the risk of trusting the trustee based on the judgment of existing information available from both
direct and indirect observation. As such, trust is often modeled as of a 3-phase process that involves formation, dissolution, and
Internet Technology Letters. 2017;e6.
https://doi.org/10.1002/itl2.6
1 of 4
2 of 4
CALEFATO AND LANUBILE
FIGURE 1 The proposed research framework to investigate how increasing social
communication and trust can turn into increased project performance
restoration, depending on whether the expectations of the trustor are met.4 In other words, positive trust emerges when others'
actions meet our expectation; otherwise, negative trust (or mistrust) arises.
Other definitions of trust distinguish between cognitive (or rational) and affective (or social) perspectives.5 Accordingly,
cognitive trust is defined as the expectations about others' skills and reliability when executing critical tasks that the trustor
cannot monitor. Conversely, affective trust relates to reciprocal emotional ties, concerns, and care between the trustee and
the trustor. When affective trust is established, the trustee is pushed to do something for the trustor because the former feels
responsible and perceives the action to take as a moral duty.
Albeit important to teams of any kind, trust is vital to the well-being of distributed software teams as it prevents physical
distance from leading to psychological distance too.6 Indeed, reduced trust exacerbates the feeling of being distinct teams with
different and conflicting goals, affects benevolence toward others when settling differences, and decreases team members'
disposition to share information and cooperate in solving issues.(7,8)
RESEARCH MODEL
3
The existing literature has proposed several approaches for fostering trust.9 These models build on the underlying idea that trust
develops along several dimensions called trust antecedents,10 that is, the properties that trigger the trustor's judgment when
evaluating the trustworthiness of the trustee.
Jarvenpaa and Leidner11 studied how trust evolves in global
teams who only had chances of interaction through
computer-mediated communication. They observed that teams who ended up establishing a low level of trust were those lacking
in social communication at the beginning of projects. Instead, those teams who had an initial focus on social communication,
which later reduced in favor of technical and task-focused interaction, were capable of establishing a high level of trust by
the end of projects. Consistently, Wang and Redmiles12 studied the communication patterns of globally distributed software
developers interacting over Internet Relay Chat (IRC) and found that positive, nonwork-related interactions promoted trust and
cooperation within teams. Accordingly, in Figure 1 (see the blue box on the left), we depict a research model showing that
social communication between distant developers helps to get access to trust antecedents, otherwise unavailable in distributed
contexts, which enable the affective appraisal of trustworthiness even from a distance.
One common limitation of prior research is that there is no explicit measure of how much improving trust contributes to
project performance. Indeed, it is challenging to prove the existence of a cause and effect relations between the amount of
trust established between developers and the performance of a software project as many confounding factors that are difficult
or impossible to control (eg, project type, individual skills and experience, and company's culture) may interfere. Treinen and
Miller-Frost13 studied how trust develops across remote sites of distributed software projects at IBM. They observed that distant
sites with increased level of trust could resolve issues from afar (eg, through videoconferences) and even anticipate future
difficulties, thus resulting in increased overall project efficiency. However, to the best of our knowledge, no previous study has
provided evidence that directly connects and quantified the relation existing between the amount of trust established between
developers and project performance.
Besides, existing research on trust has so far relied mostly on self-reported data (ie, questionnaires) to measure trust levels.9
In our previous work,14 we proposed to overcome this limitation by approximating the overall performance of a software project
(intended as broadly as possible) with the history of successful collaborations between developers, which constitute a large
part of the project lifecycle. We called a successful collaboration any situation involving at least 2 software developers who
cooperate successfully (eg, adding a new feature, refactoring poor-quality code, and fixing a bug), thus producing a project
advancement. A successful collaboration is, therefore, a finer-grain unit of analysis that enables measuring the extent to which
trust increases project performance more directly. Furthermore, recent work has found that the social distance between devel-
opers (eg, history of previous interactions and the existence of connections in social coding platforms) is strongly predictive of
whether a contribution will be accepted.15 Many open source software projects rely today on GitHub, a social-coding platform
that enables developers to collaborate through pull requests. A pull request is a proposed set of source code changes submit-
CALEFATO AND LANUBILE
3 of 4
TABLE 1 Breakdown of datasets and results from the Apache Groovy and Drill projects
Analysis time window
Core team
Overall contributors
Closed PRs
Emails
Effect of high propensity to trust on merging pull requests
Apache Groovy
Apache Drill
March 2015–December 2016
November 2014–September 2017
Merged
Rejected
6
211
200
18
4948
+34%
22
88
668
66
29 514
+26%
ted by a potential contributor that is integrated upon inspection and acceptance by one or more core team members. As such,
according to our definition, an accepted pull request represents a successful collaboration between the pull-request contribu-
tor and the integration manager(s). Hence, we argue that trust catalyzes the process of reviewing and accepting pull requests,
which, in turn, boost project performance (see the red box on the left in Figure 1).
4
DISCUSSION AND CONCLUSIONS
As a first step, to assess the hypothesis that social communication may foster trust building in distributed software teams,
we developed SocialCDE,(16–18) a tool that extends Microsoft Team Foundation Server and GitHub by disclosing information
collected from popular social networks such as Facebook, Twitter, and LinkedIn.
In our recent work,14 we took one further step toward collecting quantitative evidence that establishing trust between devel-
opers contributes to project performance. Because trust has several facets, we focused initially on the propensity to trust, that is,
the natural, personal disposition to perceive the others as trustworthy.19 We run an experiment where we used the IBM Watson
Tone Analyzer service to measure the propensity to trust of Apache Groovy project's core team members through the analysis
of their emails (see the first column in Table 1). Tone Analyzer has been built upon the Big-five personality model,20 a general
taxonomy of personality traits including openness, conscientiousness, extraversion, agreeableness, and neuroticism. We focused
on agreeableness, the personality trait associated with the tendency to trust others. In the experiment, we first identified the
integration managers from the Groovy projects; then, we parsed the entire email archive to compute their agreeableness score
and use it as a proxy measure of their high vs low level of propensity to trust. Finally, we built a logistic regression model to esti-
mate the probability of pull requests being accepted after being reviewed by the project's integration managers. As compared
to those with a low level of propensity to trust, we found that the distributed team members with a high propensity to trust are
more likely (+34%) to accept external contributions in form of pull requests.
To increase the validity of our findings, here we report the results from the analysis of Drill, another project from the Apache
Software Foundation. In particular, we identified 22 core team members out of 88 overall contributors. As of this writing, the
project counts almost 800 closed pull requests (ie, merged or rejected). Again, we mined the project's mailing lists archives
to compute the agreeableness score for each of the core team members. In line with our previous findings, we found that pull
requests reviewed by Drill integrators who have a high propensity to trust get accepted more often (+26%).
To the best of our knowledge, this is the first attempt at quantifying the effects that trust or other developers' personal traits
have on software projects that follow a pull request-based development model. As such, the main result of our work is the initial
evidence that the personality traits of the integrators who perform the review of a code contribution are a strong predictor of the
probability of its merge with the code base. This is a novel finding that highlights the role of trust in the execution of complex,
software development tasks such as code review.
As future work, first, we intend to replicate the experiment to compare several tools and assess their reliability in extracting
personality from different types of technical text other than emails (eg, Q&A posts, commits messages, and error reports).
Second, we intend to enlarge the dataset in terms of number and types of projects to understand whether developers' trust
changes depending on the project, how it evolves over time, and whether negative events (eg, missed deadlines) recorded in
project lifecycles can be traced back to observed cases of trust dissolution and restoration involving core team members.
ORCID
Fabio Calefato
Filippo Lanubile
http://orcid.org/0000-0003-2654-1588
http://orcid.org/0000-0003-3373-7589
4 of 4
CALEFATO AND LANUBILE
REFERENCES
1. Schmidt K, Simonee C. Coordination mechanisms: towards a conceptual foundation of CSCW systems design. Comput Support Cooper Work. 1996;5(2–3):155–200.
https://doi.org/10.1007/bf00133655.
2. Agerfalk J, Fitzgerald B. Flexible and distributed software processes: old petunias in new bowls. Comm ACM. 2006;49:27–34.
3.
Jarvenpaa SL, Knoll K, Leidner DE. Is anybody out there? Antecedents of trust in global virtual teams. J Manage Inform Syst. 1998;14(4):29–64. https://doi.org/
10.1080/07421222.1998.11518185.
4. Fulmer CA, Gelfand MJ. Dynamic trust processes: trust dissolution and restoration. Proceedings of the 23rd Annual International Association for Conflict
5. Wilson JM, Straus SG, McEvily B. All in due time: the development of trust in computer-mediated and face-to-face teams. Organ Behav Hum Decis Process.
Management (IACM'10). 2010. http://dx.doi.org/10.2139/ssrn.1612497.
2006;99(1):16–33. https://doi.org/10.1016/j.obhdp.2005.08.001.
6. Marlow J, Dabbish L. Designing interventions to reduce psychological distance in globally distributed teams. Proceedings of Conference on Computer-Supported
Cooperative Work and Social Computing (CSCW 2017) 2012. ACM Press; 2012. https://doi.org/10.1145/2141512.2141568.
7. Akgün AE, Keskin H, Cebecioglu AY, Dogan D. Antecedents and consequences of collective empathy in software development project teams. Inform Manag.
2015;52(2):247–259. https://doi.org/10.1016/j.im.2014.11.004.
8. Al-Ani B, Wilensky H, Redmiles D, Simmons E. An understanding of the role of Trust in Knowledge Seeking and Acceptance Practices in distributed development
teams. Proceedings of 6th IEEE International Conference on Global Software Engineering; 2011. https://doi.org/10.1109/icgse.2011.25.
9. Calefato F, Lanubile F, Novielli N. The role of social media in affective trust building in customer supplier relationships. Electron Commerce Res.
2015;15(4):453–482. https://doi.org/10.1007/s10660-015-9194-3.
10. Rusman E, van Bruggen J, Sloep P, Koper R. Fostering trust in virtual project teams: towards a design framework grounded in a trust worthiness antecedents
(TWAN) schema. Int J Human-Comput Studies. 2010;68(11):834–850. https://doi.org/10.1016/j.ijhcs.2010.07.003.
Jarvenpaa SL, Leidner DE. Communication and trust in global virtual teams. J Comput Mediated Commun 2006;3(4): https://doi.org/10.1111/j.1083-6101.1998.
tb00080.x.
12. Wang Y, Redmiles D. Cheap talk cooperation, and trust in global software engineering. Empir Software Eng. 2015;21(6):2233–2267. https://doi.org/10.1007/
11.
s10664-015-9407-3.
13. Treinen JJ, Miller-Frost SL. Following the sun: case studies in global software development. IBM Syst J. 2006;45(4):773–783. https://doi.org/10.1147/sj.454.0773.
14. Calefato F, Lanubile F, Novielli N. A preliminary analysis on the effects of propensity to trust in distributed software development. Proceedings of 12th IEEE
International Conference on Global Software Engineering (ICGSE 2017). Piscataway, NJ, USA: IEEE Press; 2017:56–60. https://doi.org/10.1109/ICGSE.2017.1.
15. Tsay J, Dabbish L, Herbsleb J. Influence of social and technical factors for evaluating contribution in GitHub. Proceedings of 36th International Conference on
Software Engineering-ICSE 2014. ACM Press; 2014. https://doi.org/10.1145/2568225.2568315.
16. Calefato F, Lanubile F. SocialCDE: a social awareness tool for global software teams. Proceedings of 9th Joint Meeting of the European Software Engineering
Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE'13). ACM Press; 2013: 587–590. https://doi.org/10.
1145/2491411.2494592.
17. Lanubile F, Calefato F, Ebert C. C. Group awareness in global software engineering. IEEE Software. 2013;30(2):18–23. https://doi.org/10.1109/MS.2013.30.
18. Calefato F, Lanubile F, Sanitate N, Santoro G. Augmenting social awareness in a collaborative development environment. Proceedings of the 4th International
Workshop on Social Software Engineering (SSE'11); New York, NY, USA: ACM Press; 2011: 39–42. https://doi.org/10.1145/2024645.2024656
19. Wang Y, Redmiles D. The diffusion of trust and cooperation in teams with individuals- variations on baseline trust. Proceedings of 19th Conference on
Computer-Supported Cooperative Work & Social Computing-CSCW 2016. ACM Press; 2016. https://doi.org/10.1145/2818048.2820064.
20. Costa PT, McCrae RR. The five-factor model, five-factor theory, and interpersonal psychology. Handbook of Interpersonal Psychology. Hoboken, NJ: John Wiley
& Sons Inc.; 2012:91–104. https://doi.org/10.1002/9781118001868.ch6.
How to cite this article: Fabio Calefato, Filippo Lanubile. Establishing personal trust-based connections in distributed
teams, Internet Technology Letters, 2017;e2. https://doi.org/10.1001/itl2.6
|
1603.04643 | 1 | 1603 | 2016-03-15T11:32:10 | Generalized threshold-based epidemics in random graphs: the power of extreme values | [
"cs.SI",
"physics.soc-ph"
] | Bootstrap percolation is a well-known activation process in a graph, in which a node becomes active when it has at least $r$ active neighbors. Such process, originally studied on regular structures, has been recently investigated also in the context of random graphs, where it can serve as a simple model for a wide variety of cascades, such as the spreading of ideas, trends, viral contents, etc. over large social networks. In particular, it has been shown that in $G(n,p)$ the final active set can exhibit a phase transition for a sub-linear number of seeds. In this paper, we propose a unique framework to study similar sub-linear phase transitions for a much broader class of graph models and epidemic processes. Specifically, we consider i) a generalized version of bootstrap percolation in $G(n,p)$ with random activation thresholds and random node-to-node influences; ii) different random graph models, including graphs with given degree sequence and graphs with community structure (block model). The common thread of our work is to show the surprising sensitivity of the critical seed set size to extreme values of distributions, which makes some systems dramatically vulnerable to large-scale outbreaks. We validate our results running simulation on both synthetic and real graphs. | cs.SI | cs | Generalized threshold-based epidemics in random
graphs: the power of extreme values
Michele Garetto
University of Torino
[email protected]
Emilio Leonardi
Politecnico di Torino
[email protected]
Giovanni-Luca Torrisi
IAC-CNR
[email protected]
6
1
0
2
r
a
M
5
1
]
I
S
.
s
c
[
1
v
3
4
6
4
0
.
3
0
6
1
:
v
i
X
r
a
ABSTRACT
Bootstrap percolation is a well-known activation process
in a graph, in which a node becomes active when it has at
least r active neighbors. Such process, originally studied
on regular structures, has been recently investigated also
in the context of random graphs, where it can serve as a
simple model for a wide variety of cascades, such as the
spreading of ideas, trends, viral contents, etc. over large
social networks.
In particular, it has been shown that
in G(n, p) the final active set can exhibit a phase transi-
tion for a sub-linear number of seeds. In this paper, we
propose a unique framework to study similar sub-linear
phase transitions for a much broader class of graph mod-
els and epidemic processes. Specifically, we consider i)
a generalized version of bootstrap percolation in G(n, p)
with random activation thresholds and random node-to-
node influences; ii) different random graph models, in-
cluding graphs with given degree sequence and graphs
with community structure (block model). The common
thread of our work is to show the surprising sensitivity
of the critical seed set size to extreme values of distribu-
tions, which makes some systems dramatically vulnerable
to large-scale outbreaks. We validate our results running
simulation on both synthetic and real graphs.
1. INTRODUCTION AND RELATED WORK
Many fundamental phenomena occurring in various kinds
of complex systems, ranging from technological networks
(e.g., transportation, communication, energy), to biologi-
cal networks (e.g., neural, ecological, biochemical) and so-
cial networks (in the real world or over the Internet) can
be described by dynamical processes taking place over the
underlying graph representing the system structure. Such
processes modify over time the internal state of nodes
and spread across the network following the edges of the
graph.
One of the most widely studied example of such dy-
namical processes is the epidemic process, which starts
from an initial set of infected nodes (usually referred to
as seeds, chosen either deterministically or random) that
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full cita-
tion on the first page. Copyrights for components of this work owned by others than
ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re-
publish, to post on servers or to redistribute to lists, requires prior specific permission
and/or a fee. Request permissions from [email protected].
To appear at SIGMETRICS '16, June 14 -- 18, 2016, Antibes Juan-Les-Pins,
France.
c(cid:13) 2016 ACM. ISBN 978-1-4503-4266-7/16/06. . . $15.00
DOI: http://dx.doi.org/XXXX.XXXX
can pass the infection to other (susceptible) nodes (under
many possible models), possibly causing a major outbreak
throughout the network.
In our work we consider a generalized model for the
spreading of an 'epidemic', in which nodes are charac-
terized by an infection threshold r (either deterministic
or random), and become infected when they collect from
their neighbors an amount of influence larger than r. A
special case of our model is the well known bootstrap per-
colation process, in which r is an integer (r ≥ 2) and each
edge exerts an influence equal to one: simply put, a node
becomes infected when it has at least r infected neighbors.
Bootstrap percolation has a rich history, having been
initially proposed in the area of statistical physics [1]. Due
to its many physical applications (see [2] for a survey) it
has been primarily studied over the years in the case of
regular structures (lattices, grids, trees), most notably in
a series of papers by Balogh and Bollob´as (e.g., [3]). More
recently, bootstrap percolation has been investigated also
in the context of random graphs, which is the focus of this
paper.
In our work we are especially interested in epi-
demics occurring on very large, irregular structures such
as those representing friendship relationships among peo-
ple. This interest is motivated by the great popularity
gained by online social platforms (e.g., Facebook, Twit-
ter, Instagram, etc.), which, coupled with the increasing
availability of always-on connectivity through mobile per-
sonal devices, has created an unprecedented opportunity
for the rapid dissemination of various kinds of news, ad-
vertisements, viral videos, as well as a privileged environ-
ment for online discussion, creation and consolidation of
beliefs, political opinions, memes and many other forms
of collective reasoning. In this respect, bootstrap percola-
tion provides a simple, primitive model that can be used
to understand the diffusion of a generic 'idea' which re-
quires a certain amount of 'reinforcement' from neighbors
to be locally adopted.
Some results have already been obtained for particu-
lar random graph models. In particular, [4] first consid-
ered bootstrap percolation in the random regular graph
G(n, d), while [5] has extended the analysis to random
graphs with given vertex degrees (configuration model).
The above two papers assume that node degree is either
fixed [4] or it has both finite expectation and finite sec-
ond moment [5], implying that the cardinality of the seed
set must scale linearly with n to observe a non-negligible
growth of the epidemics. Both papers make use of the dif-
ferential equation method to analyze the discrete Markov
Chain associated with the epidemic process. The analysis
in [5] also allows the threshold to vary among the nodes.
A very different technique has been recently proposed in
[6] to study bootstrap percolation in Erdos -- R´enyi G(n, p)
graphs. This technique allows to analyze also scenarios in
which a sharp phase transition occurs with a number of
seeds which is sublinear in n: below a critical seed set
size, for which one can get a closed-form asymptotic ex-
pression, the infection essentially does not evolve, whereas
above the critical size n−o(n) nodes get infected with high
probability1.
In G(n, p), this behavior is possible only
when the average node degree itself grows with n (i.e.,
p ≫ 1/n). The technique proposed in [6] has been ap-
plied by [7] to power-law random graphs generated by the
Chung-Lu model (with power law exponent 2 < β < 3),
obtaining the interesting result that, under bounded av-
erage node degree, a sublinear seed set size is enough to
reach a linear fraction of the nodes.
Also our work started from the approach proposed in
[6], which provides a simple and elegant way to explore
phase transitions taking place at sub-linear scale. To op-
erate at this scale, we let, if needed, the average node
degree to grow with n, since this can be considered an
acceptable assumption in many cases. Indeed, real social
networks (and in particular online social networks), which
evolve over time with the addition/removal of nodes/edges,
often exhibit the so called densification phenomenon [8],
meaning that the number of edges grows faster than the
number of nodes (hence the average degree grows with
time)2.
The main thread of our work is to show the high 'vulner-
ability' (in terms of critical number of seeds) that arises
in networks when we add inhomogeneities in any one of
many possible ways (i.e., by adding variability in thresh-
olds, edge weights, node degree, or network structure).
Although this effect has already been observed in epi-
demic processes, the way in which inhomogeneities af-
fect bootstrap percolation can be so dramatic that just
extreme values of distributions (and not their particular
shape) can determine the critical size of the seed set. We
believe that this result, which apparently has not been
recognized before, is of fundamental importance to better
understand the dynamics of epidemics in complex sys-
tems.
2. NOTATION AND PRELIMINARIES
We start introducing some background material and
notation taken from [6], which is necessary to follow the
rest of the paper. As already mentioned, [6] provides a full
picture of standard bootstrap percolation in Erdos -- R´enyi
graphs G(n, p). Nodes are characterized by a common
integer threshold r ≥ 2, and the process starts with an
initial set A(0) of vertices (the seeds), of cardinality a,
which are chosen uniformly at random among the nodes.
1Throughout this paper we shall use the following (stan-
dard) asymptotic notation. Let f, g : R → R be two
functions. We write: f (x) = o(g(x)) or f (x) ≪ g(x)
f (x)
and g(x) = ω(f (x)) or g(x) ≫ f (x) if limx→∞
g(x) = 0;
f (x) = O(g(x)) if there exist K > 0, x0 ∈ R:
f (x) ≤
f (x)
Kg(x), for any x ≥ x0; f (x) ∼ g(x) if limx→∞
g(x) = 1.
in this paper all limits are
Unless otherwise specified,
taken as n → ∞.
2in practice, asymptotic results provide very good predic-
tions of what happens in large (but finite) systems when-
ever the average degree is not too small, say significantly
larger than r.
We will use the same terminology adopted in [6], where
infected nodes are called 'active', whereas non-infected
nodes are said to be inactive. An inactive node becomes
active as soon as at least r of its neighbors are active. Note
that seeds are declared to be active irrespective of the
state of their neighbors. Active nodes never revert to be
inactive, so the set of active nodes grows monotonically.
The bootstrap percolation process naturally evolves through
generations of vertices that become active. The first gen-
eration is composed of all those vertices which are acti-
vated by the seeds. The second generation of active nodes
is composed by all the nodes which are activated by the
joint effect of seeds and first generation nodes, etc. The
process stops when either an empty generation is obtained
or all nodes are active.
Now, it turns out that there is a useful reformulation
of the problem that makes the process especially simple
to analyze. This reformulation, which was originally pro-
posed in [9], consists in changing the time scale, by in-
troducing a virtual (discrete) time step t ∈ N, such that
a single active node is 'explored' at each time step (if
the process has not yet stopped). By so doing, we forget
about the generations, obtaining a more amenable pro-
cess which is equivalent to the original one, in terms of
the final size of the epidemic.
The above reformulation requires to introduce, besides
the set A(t) of nodes which are active at time t, another
set Z(t) ⊆ A(t), referred to as used vertices, which is
the subset of active vertices, of cardinality t, explored up
to time t. More precisely, at time zero the set A(0) is
initialized to the seed set, while the set of used vertices
is initialized to the empty set: Z(0) = ∅. Each node i is
given a counter Mi(t) ∈ N, initialized to 0 at time t = 0.
At time t = 1 we arbitrarily choose a node z(1) ∈ A(0)
and we 'fire' its edges, incrementing by one the counter of
all its neighbors. By so doing, we use node z(1), adding
it to the set of used nodes, so that Z(1) = {z(1)}. We
continue recursively: at each time t, we arbitrarily se-
lect an active node which has not been already used, i.e.,
z(t) ∈ A(t−1)\ Z(t−1), and we distribute new 'marks' to
its neighbors, which are not in Z(t−1), incrementing their
counters. Node z(t) is added to the set of used vertices:
Z(t) = Z(t− 1)∪{z(t)}. We then check whether there are
some inactive vertices, denoted by set ∆A(t), that become
active for effect of the marks distributed at time t (i.e.,
vertices whose counter reaches r at time t). Such newly
activated vertices are added to the set of active vertices:
A(t) = A(t − 1) + ∆A(t) (note that no vertices can be
activated at time 1, being r ≥ 2).
The process stops as soon as Z(t) = A(t), i.e. when
all active nodes have been used. Let T = min{t : Z(t) =
A(t)}. By construction, the final size A∗ of the epidemic
is exactly equal to T : A∗ := A(T ) = Z(T ) = T .
The above reformulation of the problem is particularly
useful because the counter associated to each inactive
node can be expressed as:
Mi(t) =
Ii(s)
tXs=1
(1)
i.e., as the sum of t independent Bernoulli random vari-
ables Ii(s) of average p, each associated with the exis-
tence/non existence of an edge in the underlying graph,
between the node used at time s and node i. Indeed, it is
perfectly sound to 'reveal' the edges going out of a node
just when the node itself is used (principle of deferred
decision). Moreover we can, for convenience, express the
counters of all of the nodes at any time t ≥ 1 just like
(1), without affecting the analysis of the final size of the
epidemics. Indeed, by so doing we introduce extra marks
that are not assigned in the real process (where each edge
is revealed at most one, in a single direction), specifically,
when a used node is 'infected back' by a neighboring used
node. However, this 'error' does not matter, since it has
no impact on the percolation process. Note that counters
Mi(t) expressed in such a way are independent from node
to node.
The dynamics of the epidemic process are determined
by the behavior of the number A(t) of 'usable' nodes (i.e.,
active nodes which have not been already used):
A(t) = A(t) \ Z(t) = a − t + S(t)
where S(t) represents the number of vertices, which are
not in the original seed set, that are active at time t.
Note that the final size of the epidemics equals the first
time T at which A(T ) = 0. Moreover, by construction,
the number of used vertices at time t equals t. Now, let
π(t) := P(M1(t) ≥ r) = P(Bin(t, p) ≥ r) be the probabil-
ity that an arbitrary node not belonging to the seed set is
active at time t. There are n − a such nodes, each active
independently of others, hence S(t) ∈ Bin(n − a, π(t)).
In essence, we need to characterize trajectories of pro-
cess A(t) which, besides a deterministic component a − t
(decreasing with time), includes a random variable S(t)
which is binomially distributed, with time-dependent pa-
rameter π(t) (increasing with time):
A(t) = a − t + Bin(n − a, P(Bin(t, p) ≥ r))
(2)
In particular, whenever we can prove that, for a given t,
P((inf τ ≤t A(t)) < 0) → 0, then we can conclude that at
least t vertices get infected w.h.p. Similarly, if, for a given
t, P(A(t) < 0) → 1, we can conclude that the percolation
terminates w.h.p. before t, thus the final number of in-
fected vertices will be smaller than t. We now present a
simplified form of the main theorem in [6], together with
a high-level description of its proof.
Theorem 2.1
(Janson [6]). Consider bootstrap per-
colation in G(n, p) with r ≥ 2, and a number a of seeds
selected uniformly at random among the n nodes. Let
p = p(n) be such that p = ω(1/n), p = o(n−1/r). Define:
tc
ac
:= (cid:18) (r − 1)!
npr (cid:19)1/(r−1)
r(cid:19) tc
:= (cid:18)1 −
1
(3)
(4)
If a/ac → α < 1 (subcritical case), then w.h.p. the final
size is A∗ < 2a. If a/ac → α ≥ 1 + δ, for some δ > 0
(supercritical case), then w.h.p. A∗ = n − o(n).
Note that, under the above assumptions on p(n), the 'crit-
ical time' tc is such that both tc = ω(1) and tc = o(n),
and the same holds for the critical number of seeds ac,
which differs from tc just by the constant factor (1− 1/r),
i.e., we get a phase transition for a sublinear number of
seeds.
The methodology proposed in [6] to obtain the above
result is based on the following idea: A(t) is sufficiently
concentrated around its mean that we can approximate
it as A(t) ≈ E(A(t)) = a − t + (n − a)π(t). Now, for
a wide range of values of t (i.e., whenever pt → 0, and
in particular around tc), π(t) can be expressed as π(t) =
tr pr
r! (1 + O(pt + t−1)). Therefore function E(A(t)) has a
clear trend: it starts from a at t = 0 and first decreases
up to a minimum value reached at t ≈ tc, after which it
grows to a value of the order of n. Hence, time tc acts
as a sort of bottleneck: if E(A(tc)) is positive (negative),
we are in the supercritical (subcritical) case. Finally, we
can compute the asymptotic value of tc by finding the
minimum of function f (t) = n tr pr
The result then follows considering that, starting from
a seeds, we get E(A(tc)) = a − ac + o(ac), and that by
changing a we deterministically move up or down the pro-
cess A(t). Hence, if we assume that a/ac is asymptotically
bounded away from 1 we obtain a sufficient 'guard factor'
around the trajectory of the mean process to conclude
that the real process is either supercritical or subcritical
(see Fig. 1).
r! − t.
]
)
t
(
A
[
E
,
s
e
d
o
n
e
l
b
a
s
u
f
o
r
e
b
m
u
n
e
g
a
r
e
v
A
a > ac
a = ac
a < ac
0
tc
time step, t
Figure 1: Example of (asymptotic) trajectories of
the mean number of usable nodes, E(A(t)), with
r = 3. The plot also illustrates by shaded regions
the concept of 'guard zone'.
We emphasize that in [6] authors use a martingale ap-
proach to show that A(t) is sufficiently concentrated around
its mean, which allows them to establish their results
w.h.p.
As last premise, it is better to clarify why we assume
r ≥ 2. The reason is that the case in which a node can be
infected by just a single neighbor is degenerate, and leads
to the trivial fact that a single seed is enough to infect
the entire connected components it belongs to. Hence,
one has to apply a totally different set of tools [10] to
characterize the final size of the epidemic. This case,
however, is not interesting to us, since the networks of
many real systems are connected by construction, or they
at least have a giant connected component. Hence, no
phase transitions occur here in the number of seeds.
3. SUMMARY OF CONTRIBUTIONS
In this work we extend the approach of [6] along three
'orthogonal' directions that allow us to study more gen-
eral threshold-based epidemic processes in inhomogeneous
scenarios.
1. We consider a generalized version of bootstrap per-
in which thresholds of nodes
colation in G(n, p),
are i.i.d.
random variables Ri > 0, and infected
nodes transmit a random amount of infection to
their neighbors. Specifically, we assume that i.i.d.
weights Wij are assigned to the edges of the graph,
representing the amount of infection transmitted through
P[W ]
ij
D1
D3
D
2
P[R ]i
D
4
−3
−2
−1
0
1 2 3 4 5 6 7 8 9 10
11
Figure 2: Examples of distributions of Wij and Ri
leading to the same (asymptotic) critical number
of seeds ac.
the edge. For this case, we obtain the asymptotic
closed form expression of the critical number of seeds,
and an exponential law for the probability that the
process is supercritical or subcritical, strengthen-
ing the results in [6] (where results hold, instead,
w.h.p.). The most significant outcome of our analy-
sis is that the critical number of seeds typically does
not depend on the entire distribution of Ri and Wij,
but just on values taken in proximity of the lower
(for Ri) and upper (for Wij) extreme of their sup-
port. For instance, in Figure 2 we show examples
of two (discrete) distributions for Wij, labelled D1
and D2, and two (discrete) distributions for Ri, la-
belled D3 and labelled D4.
It turns out that any
combination of them (Da, Db), with a ∈ {1, 2} and
b ∈ {3, 4} leads to the same asymptotic critical num-
ber of seeds ac. Note that the various distributions
have different means, and that one of them (D2) has
even negative mean.
2. We extend the problem reformulation originally pro-
posed in [9], where a single node is used at each
time, to a similar reformulation in which a single
edge is used at a time. This view is more conve-
nient to apply the approach of [6] to other random
graph models.
In particular, we consider graphs
with given degree sequence (configuration model),
obtaining a closed-form expression of the asymp-
totic critical number of seeds. We then compute
the scaling order of ac for the particular (but most
significant) case of power-law degree sequence, con-
sidering a wider range of parameters with respect to
the one studied by [7]. Again, we observe the inter-
esting phenomenon that in some cases the precise
shape of the degree distribution (i.e., the power law
exponent) does not matter, since ac is determined
by the largest degree.
3. We extend the analysis to the so-called block model,
which provides a simple way to incorporate a com-
munity structure into a random graph model while
preserving the analytical tractability of G(n, p). We
observe once more the interesting effect that the
critical number of seeds might be determined by a
single entry of the matrix of inter- (or intra-) com-
munity edge probabilities (i.e., the most vulnerable
community).
Although we consider (for simplicity) the above three
forms of inhomogeneity 'in isolation', it is not particu-
larly difficult to combine them, if desired.
Indeed, we
show that all extensions above can be studied within a
unique framework. We emphasize that in this paper we
generally assume that seeds are selected uniformly at ran-
dom among the nodes, without knowledge of thresholds,
weights, degrees, network structure. This differentiates
our analysis from existing works addressing the so called
influence maximization problem, i.e., finding the seed set
that maximizes the final size of the epidemic (e.g., [11]).
We observe that in the influence maximization frame-
work many authors have already considered generalized
models taking into account the impact of edge weights,
node-specific thresholds, etc. (e.g., variants of the linear
threshold model proposed in [12]). However, to the best of
our knowledge, asymptotic properties of such generalized
models are still not well understood. This paper makes a
step forward in this direction analysing sublinear phase-
transitions occurring when seeds are allocated uniformly
at random in the network.
Interestingly, in all cases that we consider the epidemic
is triggered among the most vulnerable nodes, and then
it spreads out hitting less and less vulnerable components
of the network. This fact can have dramatic consequences
on the minimum number of seeds that can produce a
network-wide outbreak.
In the following sections we present the above three
contributions one at a time. Simulation experiments are
presented along the way, to validate and better illustrate
our analytical results.
4. GENERALIZED BOOTSTRAP PERCO-
LATION IN G(n, p)
4.1 System model
We start considering Erdos -- R´enyi random graphs G(n, p),
extending basic bootstrap percolation to the case in which
node thresholds and/or node-to-node influences are i.i.d
random variables. We denote by Ri > 0 the (real-valued)
threshold associated to node i. We then assign a (real-
valued) random weight Wij to each edge of the graph,
representing the influence that one node exerts on the
other (see later). Node i becomes active when the sum
of the weights on the edges connecting i to already active
neighbors becomes greater than or equal to Ri.
Recall that each edge of the graph is 'used' by the
process at most once. Hence our analysis encompasses
both the 'symmetric' case in which the influence (possi-
bly) given by i to j equals the influence (possibly) given by
j to i, and the 'asymmetric' case in which weights along
the two directions of an edge are different (i.i.d.) random
variables. In both cases, we can consider a single random
weight on each edge.
We do not pose particular restrictions to the distribu-
tions of Ri and Wij , except for the following one, which
avoids the degenerate case in which a node can get in-
fected by a single edge (the case r = 1 in basic bootstrap
percolation):
ess inf Ri > ess sup Wij > 0.
(5)
Note that we can also allow Wij to take negative values,
which could represent, in the context of social networks,
neighbors whose behavior steers us away from the adop-
tion of an idea. This generalization produces, indeed,
rather surprising results, as we will see. However, nega-
tive weights require to introduce some extra assumptions
on the dynamics of the epidemics process, which are not
needed when weights are always non-negative. Specifi-
cally, with negative weights we must assume that i) once
a node becomes infected, it remains infected for ever; ii)
some random delays are introduced in the infection pro-
cess of a node and/or on the edges, to avoid that a node
receives the combined effect of multiple (simultaneous)
influences from active neighbors. We argue that assump-
tion ii) is not particularly restrictive, since in many real
systems influences received by a node take place atomi-
cally (e.g., a user reading ads, posts, twits, and the like).
Assumption i) instead is crucial, because with negative
weights counters no longer increase monotonically, and
thus they can traverse the threshold many times in oppo-
site directions. Assumption i) can be adopted, however,
to study many interesting epidemic processes whose dy-
namics are triggered by nodes crossing the threshold for
the first time3.
The analysis of the general case can be carried out by
exploiting the same problem reformulation described in
Sec. 2, in which a single active node is used at each
time step. Indeed, we can associate to inactive nodes a
(real-valued) counter, initialized to 0 at time t = 0, which
evolves according to:
Mi(t) =
tXs=1
Ii(s)Wi(s)
(6)
where Ii(s), ∀s,∀i, is a Bernoulli r.v. with average p re-
vealing the presence of edge (z(s), i) and Wi(s), ∀s,∀i,
is the random weight associated to the same edge. Simi-
larly to the basic case, the above expression of Mi(t) can
be extended to all nodes and all times, without affecting
the results. By so doing, counters Mi(t) are independent
from node to node.
We then re-define π(t), as the probability that an ar-
bitrary node which is initially inactive (take node 1), has
become active at any time τ ≤ t:
π(t) := P(M1(τ ) ≥ R1, τ ≤ t)
With the above definition, the system behavior is still
determined by trajectories of process (2). We have:
τ ≤t
π(t) = P sup
I1(s)W1(s) ≥ R1!
τXs=1
ρ!pρ(1 − p)t−ρ · P sup
tXρ=0 t
ρ!pρ(1 − p)t−ρqρ
tXρ=0 t
(a)
=
=
m≤ρ
W1(s) ≥ R1!
mXs=1
(7)
where equation (a) is obtained by conditioning over the
number ρ of variables I1(s) = 1, and we have defined qρ:
qρ := P sup
m≤ρ
mXs=1
W1(s) ≥ R1!
which can be interpreted as the probability that a node,
which has sequentially received the influence of ρ infected
neighbors, has become active. Let q∞ := limρ→∞ qρ.
3For example, on some online platforms, notifications that
a user has watched a given viral video, bought a product,
expressed interest for an event, etc., might be sent im-
mediately (and once) to his friends, no matter if the user
changes his mind later on.
Note that, as consequence of elementary properties of ran-
dom walks, q∞ = 1 when E[Wij ] ≥ 0 (recall also (5)). We
introduce the following fundamental quantity:
ρ∗ := min{ρ ≥ 2 : qρ > 0}
(8)
In words, ρ∗ is the minimum number of infected neigh-
bors that can potentially (with probability qρ∗ ) activate a
node. Note that, as consequence of (5), it must be ρ∗ ≥ 2.
For example, under the distributions shown in Fig. 2, we
have ρ∗ = 3, qρ∗ = P(Ri = 6) · P(Wij = 2)3.
4.2 Main results
We are now in the position to state our main results for
the generalized bootstrap percolation model in G(n, p).
First, we define:
tc :=(cid:18) (ρ∗ − 1!)
npρ∗qρ∗ (cid:19) 1
ρ∗−1
;
ac :=(cid:18)1 −
1
ρ∗(cid:19) tc
Moreover, we shall consider the function:
H(x) := 1 − x + x log x,
H(x) := +∞,
x < 0
x > 0, H(0) := 1,
Theorem 4.1
C1(ρ∗, α) :=
min
x∈[α ρ∗−1
(Super-critical case). Under the as-
), a/ac → α for
sumptions: 1/(np) → 0, p = o(n−1/ρ∗
some α > 1. Then,
A∗
α(ρ∗ − 1)
For the sub-critical case, we define the function
∀ δ > 0, P(cid:18)(cid:12)(cid:12)(cid:12)
where C1(ρ∗, α) is the constant:
xρ∗
n − q∞(cid:12)(cid:12)(cid:12) > δ(cid:19) = O(cid:16)e−C1(ρ∗,α)a+o(a)(cid:17) ,
H(cid:18) xρ∗ − α(ρ∗ − 1)
(cid:19) .
h(x) := x − (ρ∗)−1xρ∗
− α(1 − (ρ∗)−1), for x ∈ [0, 1],
α ∈ (0, 1), and we we denote by ϕ(α) the only4 solution
of h(x) = 0, x ∈ [0, 1]. Furthermore, having defined the
interval I :=(cid:0)0, (1 − α)(1 − (ρ∗)−1)(cid:1), it holds:
∀δ > 0, ∃εδ ∈ I : [−δ, δ] ⊇ [h−1(−εδ) − ϕ(α), h−1(εδ) − ϕ(α)]
(Sub-critical case). Under the as-
) and a/ac → α for
sumptions: 1/(np) → 0, p = o(n−1/ρ∗
some α ∈ (0, 1). Then, ∀δ > 0,
Theorem 4.2
ρ∗ ,∞)
xρ∗
A∗
a −
ρ∗
ρ∗ − 1
P(cid:18)(cid:12)(cid:12)(cid:12)
ϕ(α)
α (cid:12)(cid:12)(cid:12) > δ(cid:19) = O(cid:16)e−C2(ρ∗,α,εδ)a+o(a)(cid:17) ,
where εδ and ϕ(α) are defined as above, and
C2(ρ∗, α, ε) :=
H (1 + ερ∗) .
1
α(ρ∗ − 1)
We shall provide here a sketch of the proof of Theorems
4.1 and 4.2. The complete proofs, including all mathemat-
ical details, can be found in [14].
At high level, we can show that almost complete per-
colation occurs under super-critical conditions, by:
i) analysing the trajectory of the mean of process (2),
E[A(t)] = a − t + (n − a)π(t), finding conditions
under which the above quantity is positive (with a
sufficient guard factor) for any t < (q∞ − δ)n, for
arbitrarily small δ > 0.
4Function h is
ing
h(1) = (1 − (ρ∗)−1)(1 − α) > 0.
continuous
on [0, 1] with h(0) = −α(1 − (ρ∗)−1) < 0
and strictly
increas-
and
ii) showing that the actual process A(t) is sufficiently
concentrated around its mean that we can conclude
that A(t) > 0 w.h.p. for any t < (q∞ − δ)n.
For the sub-critical regime we can use similar arguments,
showing that E[A(t)] becomes negative at early stages,
and that A(t) is sufficiently concentrated around its av-
erage that we can claim that the actual process stops at
early stages w.h.p.
We start from the asymptotic approximation of π(t):
π(t) =
(pt)ρ∗
ρ∗!
(qρ∗ + O(pt + t−1)).
(9)
which holds for any t such that pt → 0. The above ap-
proximation allows us to write, for any t ≪ p−1:
E[A(t)] = a−t+(n−a)π(t) = a−t+n
under the further assumption that a = o(n). Thus, having
defined for any t ∈ R+ function f (t) = a − t + (pt)ρ∗
ρ∗! qρ∗ ,
for n large enough we can determinate the sign of E[A(t)]
for any t ≪ p−1 by analysing the behavior of f (t). Ele-
mentary calculus reveals that f (t) has a unique minimum
at:
(pt)ρ∗
ρ∗!
qρ∗ (1+o(1))
tc =(cid:18) (ρ∗ − 1!)
with f (tc) = a−ac, ac =(cid:16)1 − 1
npρ∗ qρ∗ (cid:19) 1
ρ∗−1
ρ∗(cid:17) tc. Thus, we obtain an
1
n ≪ p ≪ n
asymptotic closed-form expression for the critical number
of seeds ac (one can easily verify that, under the assump-
tion 1
ρ∗ , it holds tc → ∞, ac → ∞, ptc → 0,
ac
n → 0).
The difficult part of the proofs is to show that A(t)
is sufficiently concentrated around its expectation that
we can establish exponential bounds (as n → ∞) on the
probability that the final size of the epidemics falls outside
the intervals stated in Theorems 4.1 (super-critical case)
and 4.2 (sub-critical case).
For the super-critical case, we adapt a methodology
proposed in [6], which separately considers four time seg-
ments5: i) segment6 [a, Ktc] (where K is a constant); ii)
segment [Ktc, p−1];
iii) segment [p−1, cn] (where c is a
constant); iv) segment [cn, n(q∞ − δ)]. Note that segment
i) contains the most crucial, initial phase of the process.
The following lemma provides a fundamental property
related to segment i), which provides the key to obtain
the result in Theorem 4.1:
Lemma 4.3. Under the assumptions of Theorem 4.1,
let K > α(1 − (ρ∗)−1) be an arbitrarily fixed constant.
P(cid:18) inf
t∈[a,Ktc]{a − t + S(t)} ≤ 0(cid:19) = O(cid:16)e−C1(ρ∗,α)a+o(a)(cid:17) ,
where C1(ρ∗, α) is given in the statement of Theorem 4.1.
The detailed proof is reported in Appendix A. We
outline here the three main ingredients to prove Lemma
4.3:
i) we exploit standard concentration results for the
binomial distribution, providing exponential bounds to
P (S(t) − E[S(t)] > ǫtc) at any t in the considered do-
main; ii) we employ the union bound to upper bound the
probability P (supt S(t)− E[S(t)] > ǫtc) byPt P (S(t)−
iii) we use the property E[S(xtc)] =
E[S(t)] > ǫtc);
xρ∗ tc
ρ∗ + o(tc).
We emphasize that in this paper we employ different
techniques with respect to those used in [6], where au-
thors rely on concentration results for supt S(t)− E[S(t)]
derived from Martingale theory (Doob's inequality). In-
stead, we combine deviation bounds specifically tailored
to the binomial distribution (see Appendix A) with the
union bound, obtaining a conceptually simpler approach
which also permits us to obtain explicit exponential laws
for probabilities related to the final size of the epidemics
(i.e., a stronger result with respect to main Theorem 3.1
in [6], which holds just w.h.p.).
As immediate consequence of Lemma 4.3 we can say
that the process does not stop before Ktc with probability
1 − ζ(n), being ζ(n) = O(cid:16)e−C1(ρ∗,α)a+o(a)(cid:17).
Considering that E[S(xtc)] ∼ xρ∗ tc
ρ∗ quickly (super-
linearly) increases after Ktc (as long as approximation
(9) holds), we can expect that the process is extremely
unlikely to stop in segment [Ktc, p−1], if it survives the
first bottleneck segment. The proof of this fact is reported
in Appendix A, where we also handle segment [p−1, cn].
Here we focus instead on the last temporal segment,
where the value of q∞ comes into play determining the
final size of the epidemics. Indeed, we are going to show
that q∞n + o(n) are infected with probability 1− ζ(n). In
general, we can assume that qρ = q∞−v(ρ) with v(ρ) → 0.
Given an arbitrary ρ such that ρ∗ ≤ ρ < cnp, we make
use of concentration inequality (20) to write:
π(cn) ≥
≥
cnXρ= ρ cn
cnXρ= ρ cn
ρ!pρ(1 − p)cn−ρqρ
ρ!pρ(1 − p)cn−ρ(q∞ − v(ρ))
= P(Bin(cn, p) ≥ ρ)(q∞ − v(ρ))
≥ (q∞ − v(ρ))(1 − e−cnpH( ρ/(cnp)))
≥ q∞ − (v(ρ) + e−cnpH( ρ/(cnp)))
≥ q∞ −
ǫ
2
(10)
for any arbitrary ǫ > 0 (and n large enough). We have:
P(cid:18)
inf
t∈[cn,n(q∞−ǫ)]
a − t + S(t) ≤ 0(cid:19) ≤ P(S(cn) + a ≤ n(q∞ − ǫ))
≤ P (Bin(n, 1 − π(cn)) ≥ n(1 − q∞ + ǫ))
Exploiting (21), the above probability goes to 0 faster
than ζ(n) for any ǫ > 0, proving that at least n(q∞ − ǫ)
nodes are infected. When q∞ < 1, we can similarly show
that no more than n(q∞ + ǫ) nodes are infected. Indeed,
considering that π(n(q∞ + ǫ)) < q∞, we can apply (20)
to show that P(S(n(q∞ + ǫ) + a − n(q∞ + ǫ) < 0) goes to
1 faster than ζ(n), for any ǫ > 0.
4.3 Validation
5The boundaries of all segments are to be meant as inte-
gers. However, to simplify the notation, we will omit ⌊·⌋
and ⌈·⌉ symbols.
6note that the process cannot stop at t < a.
To validate our analysis, and understand how well asymp-
totic results can predict what happens in large (but fi-
nite) systems, we have run Monte-Carlo simulations of
our generalized bootstrap percolation model. In each run
s
e
d
o
n
d
e
t
c
e
f
n
i
f
o
n
o
i
t
c
a
r
f
e
g
a
r
e
v
a
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
D1
D2
D3
n = 105, ¯d = 20
n = 108, ¯d = 200
125
500
1250
number of seeds, a
5000
Figure 3: Phase transitions in G(n, p) for different threshold distributions D1, D2, D3, averaging the results
of 10, 000 simulations. Analytical predictions are shown as vertical dotted lines.
we change both the identity of the seeds and the structure
of the underlying G(n, p) graph. We compute the aver-
age fraction of nodes that become infected, averaging the
results of 10,000 runs.
We first look at the impact of random thresholds, while
keeping equal weight Wij = 1 on all edges. We consider
three different distributions of Ri:
i) constant threshold
equal to 2 (denoted D1); ii) uniform threshold in the set
{2, 3, 4, 5}, (denoted D2); iii) two-valued threshold, with
P(Ri = 2) = 1/4 and P(Ri = 10) = 3/4 (denoted D3);
Note that all three distributions have ρ∗ = 2, but their
expected values are quite different. Moreover, qρ∗ = 1 for
D1, whereas qρ∗ = 1/4 for both D2 and D3.
The asymptotic formula for the critical number of seeds
gives in this scenario ac = n/(2 ¯d2qρ∗ ). We consider either
a 'small' system, in which n = 105, ¯d = 20, or a 'large' sys-
tem, in which n = 108, ¯d = 200. Results are shown in Fig.
3 using a log horizontal scale on which we have marked
the values of ac derived from the asymptotic formula. We
use the same line style for each threshold distribution, and
different line width to distinguish the small system (thick
curves) from the large system (thin curves).
We make the following observations: i) the position of
the phase transition (i.e., the critical number of seeds) is
well estimated by the asymptotic formula; ii) despite hav-
ing quite different shapes, distributions D2 and D3 lead
asymptotically to the same critical number of seeds, as
suggested by results obtained in the large system, where
the corresponding curves are barely distinguishable (at
ac = 5000);
iii) phase transitions become sharper for
higher values of the critical number of seeds, confirming
that the probability law by which the process is supercrit-
ical/subcritical depends strongly on ac itself (as stated in
Theorems 4.1 and 4.2).
We next move to a scenario in which the threshold is
fixed, Ri = 2, and we vary the weights on the edges. We
will consider, for simplicity, a simple case in which the
influence exerted between two nodes can take just two
values: +1, with probability z, and -1, with probability
1−z. Note that the average influence, E[Wij ] = 2z−1, can
even be negative, if we select z < 1/2. In this scenario,
we have ρ∗ = 2, qρ∗ = z2, hence ac = n/(2( ¯dz)2). We
consider either a 'small' system, in which n = 105, ¯d = 20,
or a 'large' system, in which n = 107, ¯d = 200, which
produce the same value of ac, for any z.
Results are shown in Fig. 4 (left plot), using a log
horizontal scale on which we have marked the values of
ac derived from the asymptotic formula. We use the same
line style for each value of z, and different line width to
distinguish the small system (thick curves) from the large
system (thin curves). We observe that in the small system
the average fraction of infected nodes saturates to a value
s
e
d
o
n
d
e
t
c
e
f
n
i
f
o
n
o
i
t
c
a
r
f
e
g
a
r
e
v
a
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
z=0.8
z=0.6
z=0.4
195
347
781
number of seeds, a
y
t
i
l
i
b
a
b
o
r
p
n
o
i
t
p
r
o
s
b
a
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
z
100
90
80
70
60
50
40
30
20
10
0
n
o
i
t
p
r
o
s
b
a
o
t
e
m
i
t
n
a
e
m
Figure 4: (left plot) Phase transitions in G(n, p)
for fixed threshold Ri = 2, and random weights
±1, with P(Wij = 1) = z. (right plot) results for
the corresponding simple random walk.
significantly smaller than one for z = 0.6, although we
expect that, as n → ∞, all nodes should get infected in
this case (for which q∞ = 1).
In the large system, the
discrepancy between simulation and asymptotic results
disappears.
This phenomenon can be explained by considering that
the counter of inactive nodes behaves as a simple random
walk (i.e., with steps ±1) with an absorbing barrier at
ρ∗ = 2. Recall [13] that for this simple random walk the
absorption probability is 1 for z ≥ 1/2, while it is equal
to (z/(1 − z))2 for z < 1/2. Moreover, the mean time to
absorption (conditioned to the event that the walk is ab-
sorbed) is 2/1−2z (see right plot in Fig. 4). On the other
hand, the time horizon of this equivalent random walk is
limited by the node degree, since a node cannot receive
a number of contributions to its counter greater than the
number of its neighbors. In the small system the average
degree ( ¯d = 20) is too small to approach the asymptotic
prediction, whereas in the large system the average de-
gree ( ¯d = 200) is large enough (i.e., much larger than the
mean time to absorption) to observe convergence of the
final size to the asymptotic prediction obtained with q∞.
Interestingly, a finite fraction of nodes (asymptotically,
around 0.44) gets infected with z = 0.4, a case in which
the average node-to-node influence is negative!
5. RANDOM GRAPHS WITH ARBITRARY
DEGREE DISTRIBUTION
Up to now we have considered the G(n, p) random graph
model, and we have followed the same problem reformu-
lation adopted in [6], in which a single node is used at a
time, revealing all its outgoing edges. This approach is
especially suitable to G(n, p), since marks Mi(t) are i.i.d
binomial random variables. We introduce now an alter-
native description of the percolation process, in which a
single edge is used at a time. This approach is more con-
venient to analyze other random graph models, such as
G(n, M ) (graphs with pre-established number of edges),
G(n, d) (where all nodes have the same degree), or the
configuration model.
5.1 Edge-based reformulation for G(n, M )
We consider the (multi)-graph G(n, M ) in which, start-
ing from a graph with no edges, M edges are sequen-
tially added, each connecting two nodes selected (inde-
pendently) uniformly at random. Note that by so doing
we can generate parallel edges, as well as self loops. How-
ever, following the same approach as in Corollary 3 of [5],
it is possible to show that sequences of events that occur
w.h.p. over G(n, M ), occur w.h.p. also over G(n, M ),
with G(n, M ) denoting the class of (simple)-graphs hav-
ing M edges, with associated uniform probability law.
Therefore our results apply to G(n, M ) as well.
To analyze bootstrap percolation in G(n, M ), we con-
sider the following dynamical process: when a node be-
comes active, all edges connecting this node to other nodes
which are still non active are denoted as 'usable', and
added to a set B of usable edges. At a given time step
t, one usable edge is selected uniformly at random from
B(t − 1), adding one mark to the endpoint that was in-
active (when the edge became usable), provided that this
endpoint is still inactive. The selected edge is then re-
moved from B(t). Set B(0) is initialized with the edges
connecting seeds to non-seeds. By construction, at most
one node can become active at each time instant. Hence,
denoting with A(t) the number of active nodes at time t
(initialized to a), we have A(t) ≤ a + t.
Let π(t) be the probability that a node, which is not a
seed, has been activated at time τ ≤ t. While it is not
easy to write an exact expression of π(t), we can provide
asymptotically tight bounds on π(t), as follows:
1 −
1 −
1
r−1Xj=0 t
j!(cid:16) 1
n(cid:17)j(cid:16)1 −
n(cid:17)t−j
j!(cid:16)
r−1Xj=0 t
n − a − t(cid:17)j(cid:16)1 −
1
≤ π(t) ≤
1
n − a − t(cid:17)t−j
1
This because we can reveal the endpoint of an active edge
only when this edge is used, by choosing uniformly at
random one of the nodes that were non active at the time
instant τ ′ at which the considered edge became active.
Hence, an inactive node i receives a mark at time τ with
probability
n−A(τ ′) (independently from other previously
collected marks). Furthermore, by construction, we have
n−a−τ ≤ 1
1
n ≤
n−a−t . At timescale
t = o(n), we can approximate π(t) as:
n(cid:17)t−j
j!(cid:16) 1
r−1Xj=0 t
n(cid:17)j(cid:16)1−
r!(cid:18) t
n(cid:19)r
(11)
The dynamics of B(t) (whose size is denoted by B(t))
π(t) = 1−
n−A(τ ′) ≤
n−A(τ ) ≤
+o(1) =
1
1
1
1
1
+o(1)
obey the following equation:
B(t) = B(0) + Σ(t) − t
where Σ(t) represents the (cumulative) number of edges
activated at τ ≤ t. The process stops at time T = min{t :
B(t) = 0}. Similarly to the G(n, p) case, the number S(t)
of nodes that have become active by time t is the sum of
n − a identically distributed Bernoulli random variables
Note that by construction marks are distributed only
to inactive nodes, therefore a node i stops receiving marks
as soon as Mi(t) = r. Differently from G(n, p), however,
variables 11Mi(t)=r are not independent, given that at most
with average π(t). Indeed, S(t) =Pi∈V\A(0) 11Mi(t)=r.
t marks have been distributed by time t (i.e.,Pi Mi(t) ≤
t). Note that we still have E[S(t)] = (n − a)π(t).
For what concerns the total number of edges activated
by time t, Σ(t), we can express it as the sum of random
variables Xk associated with nodes in A(t), representing
the numbers of edges activated along with node k (i.e. the
number of edges connecting node k with inactive nodes):
Σ(t) =
Xk.
A(t)Xk=1
2
2
We can evaluate Xk by dynamically unveiling, for every
inactive edge, whether node k is one of its endpoints (but
not both). It turns out Xk = Bin(cid:16)M − Σ(τk − 1)− B(0),
(n−A(τk−1))2(cid:17) where τk is the time instant at
n−A(τk−1) −
which the k-th node was activated. Indeed, M − Σ(τk −
1) − B(0) represents the number of edges still to be ac-
tivated at time τk, while
(n−A(τk −1))2 is the
probability that node k is an endpoint (but not both) of
any such edges. Observe that variables Xk are not inde-
pendent, as consequence of the fact that that sum of all
edges in the graph is constrained to be M . However, Xk
is conditionally independent from Xk′ , with k′ < k, given
Σ(τk − 1) and A(τk − 1). Moreover, for any k we have:
n−A(τk −1) −
2
2
Bin(cid:16)M − Σ(t) − B(0),
2
n −
≤st Bin(cid:16)M,
n − a − t −
2
2
2
n2(cid:17) ≤st Xk
(n − a − t)2(cid:17).
A(t)(cid:21) ≤ E[Σ(t)] ≤
(12)
In particular, the expectation of Σ(t) satisfies:
n2
E(cid:20) 2(n − 1)(M − Σ(t) − B(0))
2M E[A(t)]
n − a − t
Moreover, under the assumption a ≪ n, since for t ≪ n,
A(t) ≤ a + t ≪ n and Σ(t) + B(0) = o(M ), we have:
E[A(t)](1 + o(1)) = 2M π(t)(1 + o(1))
E[Σ(t)] =
.
2M
n
while B(0) = 2M
conclusion:
n a(1 + o(1))). Recalling (11), we have in
E[B(t)] =(cid:18) 2M
n
a +
2M
r! (cid:18) t
n(cid:19)r
− t(cid:19) (1 + o(1))
Now, similarly to the case of G(n, p), we can determine
the critical number of seeds by: i) determining sufficient
and necessary conditions under which E[B(t)] > δ M
n a
for some arbitrary δ > 0 and any t ≪ n; so doing we
determine the critical number of seeds ac. ii) Exploiting
the fact that B(t) is sufficiently concentrated around its
mean for t ≤ K M
n ac, where K > 1 is a properly defined
n ac < t < M (1 − ǫ),
constant.
B(t) can be bounded from below away from 0.
iii) Showing that for K M
For what concerns point i) we follow the same lines as
nr − t,
for G(n, p), defining function g(t) = 2 M
and finding the minimum of g(t), which is achieved at:
n a + 2M
tr
r!
r−1
r−1
2M
=
2M
n ( 2M
2M (cid:19) 1
n (r − 1)!
n2 )r−1! 1
tc =(cid:18) (r − 1)!nr
with tc = o(n) as long as M ≫ n. Observe that 2M
n is the
average node degree (replacing np in the expression of tc
obtained for G(n, p)) while 2M
n2 can be interpreted as the
probability that two specific vertices are connected by at
least an edge (replacing p for G(n, p)). Evaluating g(tc)
and imposing g(tc) = 0, we obtain the critical number of
seeds:
ac =(cid:18)1 −
1
r(cid:19) (r − 1)!
n2 )r−1! 1
n ( 2M
2M
r−1
(13)
which is exactly the same as what we get in G(n, p) through
the substitution 2M
n → np and 2M
n2 → p.
n ac) = o(M ) and A(K M
For what concerns ii) and iii) we can proceed in analogy
with the case of G(n, p), exploiting standard concentra-
tion results. In particular, we first focus on time instants
t ≤ K M
n ac for suitable K > 2. We need to show that
B(t) > 0 w.h.p. provided that E[B(t)] > ǫac for arbitrary
ǫ > 0 (i.e., a > (1 + ǫ)ac). To this end observe that from
(12), the fact that Σ(K M
n ac) =
o(n), and recalling the above mentioned property of con-
ditional mutual independence of variables Xk, it descends
that w.h.p., for any t ≤ K M
n ac: P (Σ(t) ≤ t − B(0)) ≤
P (PA(t)
1 X k ≤ t − B(0)) with X k mutually independent
and X k = Bin(cid:16)M (1− ǫ), 2
ǫ > 0. At last observe that P (PA(t)
1 X k ≤ t − B(0)) can
For what concerns iii) we adopt arguments conceptually
similar to the case of G(n, p), exploiting the fact that
E[B(t)] quickly (super-linearly) increases after K M
n2(cid:17) for an arbitrarily small
be easily bounded using inequalities (20) and (21).
n − 2
n ac.
5.2 Configuration Model
The edge-based problem reformulation described in pre-
vious section can be easily extended to the configuration
model G(n, p(d)), in which we specify a given degree se-
quence (possibly dependent on n) with associated empiri-
cal distribution function p(d). For simplicity, we limit our-
selves to describing the computation of the critical num-
ber number of seeds ac. However, the approach can be
made rigorous by following the same lines as for G(n, M ).
As before, properties of multi-graphs G(n, p(d)) apply as
well to simple-graphs G(n, p(d)).
Similarly to what we have done for G(n, M ), we focus
on the evolution of the number of activable edges:
B(t) = B(0) + Σ(t) − t
and compute the critical time tc by finding the minimum
of E[B(t)].
The impact of node degree can be taken into account by
evaluating the probability π(t, d) that a node with degree
d has been activated by time t. Moreover, we need to
consider the amount of edges that a node contributes to B
after being activated. There are in total n ¯d 'end-of-edges'
in the network, so the probability that a given end-of-edge
is active at time t is t/(n ¯d). Hence, we can write:
π(t, d) = 1−
n ¯d(cid:19)j(cid:18)1 −
t
n ¯d(cid:19)d−j
+ o(1), (14)
r−1Xj=0 d
j!(cid:18) t
n ¯d(cid:19)r
r!(cid:18) dt
1
Since t/(n ¯d) is small, we can approximate it as
π(t, d) =
+ o(1)
(d ≥ r)
Observe that since, by construction, a node gets activated
thanks to exactly r active edges, it contributes d − r new
edges to B. Then for t ≪ n since A(t) ≤ t + a ≪ n we
can approximate the average value of B(t) as:
1
¯d
p(d)
Now, if we define
E[B(t)] ∼ B(0) + nXd≥r
d∗ =Xd≥r(cid:18) d
we obtain E[B(t)] ∼ B(0) + ¯dntr
tc = n(cid:18) (r − 1)!
derive the critical time tc:
(d − r)p(d) − t.
n ¯d(cid:19)r
r!(cid:18) dt
¯d(cid:19)r d − r
r!nr d∗− t, from which we can
¯d d∗ (cid:19) 1
r(cid:19) n(cid:18) (r − 1)!
¯dr d∗ (cid:19) 1
ac =(cid:18)1 −
and the critical number of seeds:
(16)
(15)
r−1
r−1
1
One can easily check that the above formula is consis-
tent with what we get in G(n, p) or G(n, M ), for which
d∗ ∼ 1. The above formula holds when seeds are selected
uniformly at random. However, note that our analysis
could be immediately extended to the important case in
which seeds are chosen on the basis of the node degree.
Indeed, what really matters is only the cardinality of the
initial set of edges connecting seeds to non-seeds.
s
e
d
o
n
d
e
t
c
e
f
n
i
f
o
n
o
i
t
c
a
r
f
e
g
a
r
e
v
a
1
0.8
0.6
0.4
0.2
0
100
248
555 595
G(n,M)
G(n,d)
10-50
200
300
400
500
600
700
number of seeds, a
Figure 5: Phase transitions of basic bootstrap per-
colation with r = 2,
in different random graph
models with n = 106, ¯d = 30.
Figure 5 reports simulation results for three different
random graph models having n = 106 nodes, and aver-
age node degree ¯d = 30. We consider basic bootstrap
percolation with r = 2. We compare the G(n, M ) model,
the regular G(n, d) (in which nodes have constant degree),
and a configuration model in which half of the nodes have
degree 10 while the other half have degree 50 (curve la-
belled '10-50'). Analytical results obtained by (13) (for
G(n, M )), and by (16) (for the other two graph models)
are marked on the top margin. As expected, for fixed
average degree, the critical number of seeds decreases for
increasing variance of the degree distribution.
We experimented also with a real online social net-
work, considering user-user friendship relations of Orkut,
a former social networking site run by Google.
In par-
ticular, we have used a crawled sub-graph of Orkut with
n = 3, 072, 441 nodes [15], hereinafter referred to as Orkut
graph, although it represents only a small percentage (11%)
of the entire social network. The average node degree
of this graph is ¯d = 76.3, and the maximum degree is
dmax = 33, 313. An interesting question that arises here
is the following: does a configuration model with the same
number of nodes as the Orkut graph, and exactly the same
degree sequence, produce also a similar value of ac? If
the answer is affirmative, it would tell us that the degree
distribution alone, and not the entire network structure,
could be used to predict (even analytically) the onset of
large-scale outbreaks in this kind of systems (as suggested
also by [16]). We partially answer this question by run-
ning simulations on both the original Orkut graph and
the matched configuration model, as well as by analyti-
cally evaluating ac using (16).
Besides basic bootstrap percolation, we explored also
the interesting variation in which r is a deterministic func-
tion of the node degree. Indeed, note that (14) can be im-
mediately generalized to r = r(d), although in this case
we do not get a closed-form expression for ac, and the
minimum of E[B(t)] has to be computed numerically (we
omit the details of this computation).
s
e
d
o
n
d
e
t
c
e
f
n
i
f
o
n
o
i
t
c
a
r
f
e
g
a
r
e
v
a
1
0.8
0.6
0.4
0.2
0
r=2
10
94
852
16800
r=5
log law
square
root law
10000
100
number of seeds, a
1000
Figure 6: Phase transitions in the Orkut graph
and the matched configuration model, for different
threshold functions.
Results are shown in Fig. 6, where thick lines refers
to the real Orkut graph, while thin lines refers to the
matched configuration model. We use different line styles
for i) basic bootstrap percolation with r = 2 or r = 5;
ii) the logarithmic law r(d) = max{2,⌈log2(d)⌉}; iii) the
square root law r(d) = max{2, ⌈√d⌉}; Analytical pre-
dictions of ac are shown as vertical dotted lines (except
for r = 2, for which (16) provides a value of ac even
smaller than r = 2). We observe similar phase transi-
tions in the Orkut graph and the associated configuration
model, while the analysis captures quite well the point
after which a major outbreak occurs.
5.3 Impact of power-law degree distribution
Large networks observed in a variety of different do-
mains (social, technological, biological networks) are char-
acterized by the scale-free property, which implies a power
law degree distribution. Hence, it is interesting to under-
stand the impact of power-law degree distributions on the
critical seed set size. We will consider here power-law de-
gree distributions of the form
p(d) =
C
dβ
for dmin ≤ d ≤ dmax
(17)
where β is the power-law exponent (typically larger than
2), and C is the normalization factor. We will further
assume that dmax → ∞, while dmin = o(dmax). Note
that by letting dmin scale up with n we can obtain an
increasing average node degree (graph densification) in
the most common case in which β > 2.
by solving the inequalityR ∞
The reason why we introduce a maximum node degree
dmax is instead more subtle, and has to do with the fact
that p(d) must be the limiting distribution function of a
sequence of empirical distribution function (for each n) as-
sociated with the configuration model. Clearly, we cannot
have in any case a degree larger than n−1, but it turns out
that, for the common case of β > 2, nodes with very large
degree are so rare that is preferable to avoid them at all,
setting to zero p(d) after a given dmax = nζ , with ζ < 1.
The maximum value of ζ, for β > 1, can be obtained
nζ Cx−β dx > n−1. For exam-
ple, when β > 1, dmin = Θ(1), we have ζ ≤ 1/(β − 1). In
practice, we never see nodes with extremely large degree7,
and it is actually customary in many random graph mod-
els to assume that the maximum degree is smaller than,
say, n1/2.
In our model, we try to be more flexible by
allowing a generic dmax = nζ ≪ n, satisfying the above
constraint (if β > 1).
In practice, one can starts with a desired distribution
p(d) of the form (17), having chosen dmin and dmax (de-
pending on n), and construct a sequence {di}n of degrees
for the configuration model by assigning to node i the de-
gree di = inf{d : 1− Fn(d) < i/n}, where Fn(d) is the cdf
of p(d). Under our assumptions we have, asymptotically,
1−β
d1−β
max
β−1
dβ−1
min
if β < 1
if β > 1
C ∼
β−1
β−k−1
The following expression for the generic k-th moment of
p(d) will come in handy in the following:
E[dk] ∼
dk
min
dβ−1
min dk+1−β
dk
max
max
1−β
k+1−β
β−1
k+1−β
if β > k + 1
if 1 < β < k + 1
if β < 1
(18)
Note that moments of order k < β − 1 depend only on
dmin (e.g., the average node degree (k = 1), when β > 2).
Instead, moments of order k > β − 1 may depend also (or
exclusively) on dmax.
Recall that our methodology to compute the critical
seed set size requires that ac is both ω(1) and o(n). This
regime implies that the average node degree ¯d cannot be
either too small nor too large. Recall that in the G(n, p)
r−1
model we need that ¯d ≫ 1 and ¯d ≪ n
r . Under a
general degree distribution, it is not stricly necessary that
¯d ≫ 1, since (look at formula (16)) we could just have
d∗ → ∞, resulting into a number of seeds o(n).
To better understand how the critical number of seeds
depends on parameters of the power-law distribution, we
evaluate its scaling order with n, assuming for simplicity
that dmin = nγ , with 0 ≤ γ < ζ. When β > 1, we further
assume ζ ≤ 1
β−1 − γ to avoid rare nodes having very large
degree. We see from (15) that d∗ depends essentially on
the (r + 1)-th moment of p(d), i.e., d∗ = Θ(cid:16) E[dr+1]
(E[d])r+1(cid:17)
7In many real systems the tail of the degree distribution
exhibits an exponential cut-off, and often the degree can-
not exceed a maximum value imposed by physical or tech-
nological constraints.
(assuming E[d] > r). We can thus use the expressions in
(18), and obtain that the scaling exponent of ac is 8
e(ac) =
r−1
1 − γr
1 − γ(β−2)+ζ(r+2−β)
1 − ζr
r−1
r−1
γ > 0
if β > r + 2,
if 2 < β < r + 2,
γ ≥ 0
if β < 2,
γ ≥ 0
(19)
s
e
d
o
n
d
e
t
c
e
f
n
i
f
o
n
o
i
t
c
a
r
f
e
g
a
r
e
v
a
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
β = 2.5
dmax = 104
r = 2
ac = 2
β = 3
dmax = 103
r = 2
ac = 53
β = 0
dmax = 300
r = 4
ac = 981
β = 2.5
dmax = 104
r = 6
ac = 112
β = 1
dmax = 300
r = 4
ac = 1152
10
100
1000
number of seeds, a
Figure 7: Phase transitions of basic bootstrap per-
colation in random graphs with n = 106 nodes and
power-law degree.
We should mention that our results are only partially
aligned with those obtained for Chung-Lu graphs9 with
power-law degree distribution in [7], where authors con-
sider the case 2 < β < 3, γ = 0. In particular, in [7] they
suggest that, when dmax = Θ(n1/(β−1)), ac is of the order
of n
β−2
β−1 , independently of r.
Figure 7 reports simulation results under our power-
law configuration model. The number of nodes is always
n = 106, dmin = 10, and we try different combinations of
β, dmax and r. The values of ac computed by (16) are also
shown on the plot. We see that, with β = 2.5, dmax =
n1/(β−1) = 104, very few seeds are needed with r = 2, and
many more with r = 6. We also consider two cases with
β < 2, dmax = 300, r = 4, to show that, in accordance
with (19), when β < 2, ac depends essentially only on
the extreme value of the node degree distribution (i.e.,
dmax), on not on its shape. Indeed, the phase transitions
obtained with β = 0 and β = 1 are not that far away, as
predicted by our computed values of ac, despite the fact
that the average degree is quite different in the two cases
(i.e., 84 (β = 1) vs 155 (β = 0)).
6. COMMUNITY BASED GRAPHS: THE
BLOCK MODEL
Another important feature of many graphs represent-
ing real systems is the presence of a community structure
(i.e., a non-negligible clustering coefficient). This feature
is not captured by any of the random graph models con-
sidered so far. In this section, we extend the analysis of
basic bootstrap percolation to the so called block model,
which naturally extends the G(n, p) model to incorporate
a community structure. We will start from the simple
case of just two communities, and then extend our results
to K < ∞ communities.
8The scaling exponent of a generic function f (n) is defined
as e(f ) := limn→∞
9Interestingly, our scaling exponent in (19), for 2 < β < 3,
γ = 0, perfectly matches quantity a+
c in [7] (Theorem 2.3).
log(f (n))
log(n)
.
6.1 The case of two communities
We consider a G(n1, n2, p1, p2, q) block model compris-
ing two communities of n1 and n2 nodes, respectively
(with n1 + n2 = n). The sub-graph induced by nodes be-
longing to community i (with i = 1, 2) is an Erdos-R´enyi's
graph G(ni, pi). Pairs of nodes belonging to different com-
munities are independently connected with probability q.
We assume q < min(p1, p2) and q = Ω(max( 1
)). We
n1
denote by Vi the set of nodes belonging to community i.
Bootstrap percolation in G(n1, n2, p1, p2, q) can be re-
formulated in two different ways, which allow us to obtain
different (complementary) results. We explain here our
first approach. An alternative reformulation is described
in Appendix B.
, 1
n2
In our first approach we assume that, at each discrete
time step t, two active nodes (one in community 1 and
one in community 2) are simultaneously used, whenever
they are both available. If a community runs out of (ac-
tive) usable nodes, while the other still has some available
(active) usable nodes, a single node is used at a time. We
denote by Ai(t) and Zi(t), respectively, the set of active
nodes and the set of used nodes in community i at time
t. Let Ai(t) = Ai(t) \ Zi(t) be the cardinality of the
set of active usable nodes in community i. Observe that
it is entirely possible that, say, A1(t) hits zero at some
point, but later on it increases again for effect of marks
received by inactive nodes in V1 from nodes used in V2.
This event makes an exact analysis of the system partic-
ularly difficult. Note that the process definitely dies at
time T : T := min{t ∈ N+ : A1(t) = 0, A2(t) = 0}.
We introduce a new quantity Ti(t), representing the
number of nodes that have been used in community i up
to time t: Ti(t) := Zi(t). From the above discussion,
observe that Ti(t) is not necessarily equal to t, for t ≤ T ,
in constrast to what happens in G(n, p), where Zi(t) = t,
∀t ≤ T .
The number S1(t) of initially inactive nodes in V1 that
are active at time t can then be expressed as:
S1(t) = Bin(n − a1,bπi(T1(t), T2(t))
where bπ1(t1, t2) = P (Bin(t1, p1) + Bin(t2, q) ≥ r). For
p1t1 ≪ 1 we have:
r!
ρ=0
tr, as in G(n, p).
(similar expressions can be written for S2(t) andbπ2(t1, t2)
provided that p2t2 ≪ 1). Note that, whenever t1 =
t2 = t, previous approximation simplifies to: bπ1(t, t) ∼
Pr
pρ
1 qr−ρ
ρ!(r−ρ)! tr. Moreover, if q ≪ p1, the latter further
simplifies tobπ1(t, t) ∼ (p1)r
To characterize the system behavior, we stochastically
upper and lower bound Si(t), for i = 1, 2, by two virtual
processes Si(t) and S i(t) obtained in the following shadow
systems: a shadow reduced system, in which inter-community
edges are removed, and thus each community evolves as
in isolation. Note that process Si(t) associated to the
reduced system is equivalent to what we would get in a
G(ni, pi) model; a shadow augmented system (viewed by
community i), in which we assume that a new node can
always be used in the other community (if the other com-
munity has no usable nodes, an arbitrary inactive node in
the other community is selected and used).
rXρ=0
bπ1(t1, t2) ∼
(p1t1)ρ
ρ!
(qt2)r−ρ
(r − ρ)!
It immediately descends from their definitions that:
S1(t) = Bin(n1 − a1,bπ1(T 1(t), 0))
S1(t) = Bin(n1 − a2,bπ1(T 1(t), t))
Furthermore, by induction over time, it can be immedi-
ately shown that: S1(t) ≤st S1(t) ≤st S1(t), where ≤st
indicates the less or equal operator under usual stochas-
tic ordering (also known as 'first order stochastic domi-
nance'). Now, under the joint conditions A1(τ ) 6= Z1(τ )
and A2(τ ) 6= Z2(τ ) for any τ < t, by construction S1(τ ) =
S1(τ ) and S2(τ ) = S 2(τ ) for any τ < t, which allows
us to conclude that also at time t: S1(t) = S1(t) and
S2(t) = S2(t). Then, by induction over time:
{A1(τ ) 6= Z1(τ ), A2(τ ) 6= Z2(τ ),∀τ ≤ t}
τ <t
=(cid:26)inf
=(cid:26)inf
τ <t
min(S1(τ ) − τ + a1, S2(τ ) − τ + a2) > 0(cid:27)
min(S1(τ ) − τ + a1, S2(τ ) − τ + a2) > 0(cid:27) .
In particular, whenever S1(t) and S2(t) both satisfy su-
percritical conditions, then necessarily Ai(t) 6= Zi(t) and
Si(t) = Si(t), for any t < max(n1, n2) − o(max(n1, n2)).
More formally, exploiting the results in 4.2, we get:
Theorem 6.1. Suppose 1/(nipi) → 0 , pi = o(n−1/r
c → αi, for some αi > 1 with i = {1, 2}, and:
i
ai/a(i)
),
a(i)
c =(cid:18)1 −
where bpi = rq(r!) ·Pr
∀ε > 0, P(cid:18)1−
maxi(ni)
T
1
pρ
i qr−ρ
ρ!(r−ρ)! . Then, having defined
ni(bpi)r(cid:19)(r−1)−1
r(cid:19)(cid:18) (r − 1)!
> ε(cid:19)= O(cid:16)e−C1(r,mini(αi))a+o(a)(cid:17)
T = inf t{mini(ai − t + Si(t)) < 0} we have:
ρ=0
where C1(r, α) is the same function as in Theorem 4.1.
Theorem 6.1 provides sufficient (but not necessary) con-
ditions for almost complete percolation of G(n1, n2, p1, p2, q).
To complement previous result, suppose that S1(t) sat-
isfies supercritical conditions (while to avoid trivialities
we assume S2(t) to be sub-critical). In this case complete
or almost complete percolation occurs in V1 as immedi-
ate consequence of Theorem 4.1 applied to community 1
in isolation, and the fact that S1(t) ≤ S1(t). Then, under
the assumption that q ≥ Ω(max( 1
)), we obtain com-
plete or almost complete percolation also in community
2, since any node in V2 would have finite probability of
having at least r neighbors in V1
, 1
n2
10.
n1
It remains to analyze the case in which S1(t) is super-
critical (but S1(t) is sub-critical), and S2(t) is not super-
critical (or viceversa). This case, which can occur only
when q and p1 are of the same order, is more involved
and we leave it to future study.
6.2 Extension to the general block model
Results obtained for the case of two communities can be
rather easily extended to a more general block model with
10More in general, for q ≪ 1
, we could study percolation
in community 2 in isolation after:
i) adding to a2 the
nodes in V2 that have at least r neighbors in V1; ii) reduce
the threshold r for all inactive nodes in V2 to a stochastic
threshold R ≤ r accounting for marks received from V1.
n2
K < ∞ heterogeneous communities, specified by a sym-
metric matrix P , whose element pjk represents the proba-
bility that a node belonging to community j is connected
to a node belonging to community k (with i.i.d. proba-
bilities for all such pairs). Note that diagonal elements
of P provide inter-community edge probabilities. In Ap-
pendix C, besides our system assumptions, we present two
different upper bounds on the critical number of seeds.
Interestingly, both bounds depends critically on extreme
values of the model parameters, and in some cases a sin-
gle community can determine the phase transition of the
entire system.
7. CONCLUSIONS
We proposed a unique framework to study sub-linear
phase transitions of threshold-based 'activation processes'
in random graphs, adding inhomogeneities in the system
along different (orthogonal) directions. We found that in
several cases the critical seed set size depends critically
just on extreme values of distributions, providing novel
insights into the dynamics of epidemic processes in com-
plex systems.
8. REFERENCES
[1] J. Chalupa, P.L. Leath, G.R. Reich, "Bootstrap
percolation on a Bethe lattice," J. Phys. C, Vol. 12,
L31 -- L35 (1979).
[2] J. Adler, U. Lev, "Bootstrap percolation: visualizations
and applications," Braz. J. Phys, 33(3), (2003).
[3] J. Balogh, B. Bollob´as, H. Duminil-Copin, R. Morris,
"The sharp threshold for bootstrap percolation in all
dimensions," Trans. A. Math. Soc., 36, (2012).
[4] J. Balogh, B.G. Pittel, "Bootstrap percolation on the
random regular graph," Random Struct. Algor., 30(1 -- 2),
257 -- 286 (2007).
[5] H. Amini, "Bootstrap percolation and diffusion in
random graphs with given vertex degrees," Electron. J.
Combin. 17, R25 (2010).
[6] S. Janson, T. Luczak, T. Turova and T. Vallier.
Bootstrap percolation on the random graph Gn,p. Ann.
Appl. Probab., 22(5):1989 -- 2047, 2012.
[7] H. Amini and N. Fountoulakis, "Bootstrap percolation in
power-law random graphs", Journal of Statistical
Physics, 155:72 -- 92, 2014.
[8] J. Leskovec, J. Kleinberg, and C. Faloutsos, "Graphs
over time: Densification and shrinking diameters," ACM
Trans. on Knowledge Discovery from Data, 1(1), 2007.
[9] G. Scalia-Tomba, "Asymptotic Final-Size Distribution
for Some Chain-Binomial Processes", Advances in
Applied Probability, 17(3), 477 -- 495, 1985.
[10] A. Martin-Lof, "Symmetric Sampling Procedures,
General Epidemic Processes and Their Threshold Limit
Theorems", Journal of Applied Probability 23(2),
265 -- 282, 1986.
[11] D. Kempe, J. Kleinberg, E. Tardos, "Maximizing the
spread of influence in a social network," in Proc. ACM
SIGKDD, 2003.
[12] D. Watts, "A simple model of global cascades in random
networks," In Proc. Natl. Acad. Sci, pp. 5766 -- 71, 2002.
[13] W. Feller, "An Introduction to Probability Theory and
its Applications," Wiley, 1968.
[14] Companion technical report, available at https://www.
dropbox.com/s/o01wx3a2cg0nx4x/Techrep.pdf?dl=0.
[15] A. Mislove, M. Marcon, K.-P. Gummadi, P. Druschel,
and B. Bhattacharjee, "Measurement and analysis of
online social networks," IMC '07.
[16] P. Brach, A. Epasto, A. Panconesi, P. Sankowski,
"Spreading rumours without the network," in Proc. ACM
COSN, 2014.
[17] M. Penrose. Random Geometric Graphs. Oxford
University Press, Oxford, 2004.
APPENDIX
A. THEOREM 4.1
First we introduce the following concentration inequal-
ities for the binomial distribution Bin(n, p), taken from
[17]: Let H(b) = 1 − b + b log b, for b > 0. Let µ = np.
If k ≤ µ then:
If k > µ then:
µ(cid:19)(cid:19)
P(Bin(n, p)) ≤ k) ≤ exp(cid:18)−µH(cid:18) k
µ(cid:19)(cid:19)
P(Bin(n, p)) ≥ k) ≤ exp(cid:18)−µH(cid:18) k
(20)
(21)
Proof of Lemma 4.3.
For any δ > 0, We have a = α ac + o(1) > (α − δ)ac,
and so, by the definition of ac, for any t = a, . . . , ⌊Ktc⌋,
{S(t) − t + a ≤ 0} ⊆(cid:8)S(t) − t + (α − δ)(1 − (ρ∗)−1)tc ≤ 0(cid:9)
=(cid:8)S(t) ≤ t − (α − δ)(1 − (ρ∗)−1)tc(cid:9)
(cid:26) inf
⊆ [t∈[a,⌊Ktc⌋](cid:8)S(t) ≤ t − (α − δ)(1 − (ρ∗)−1)tc(cid:9)
S(t) − t + a ≤ 0(cid:27) = [t∈[a,⌊Ktc⌋]
{S(t) − t + a ≤ 0}
Hence:
t[a,⌊Ktc⌋]
Moreover, defining x = t/tc, it can be be proved that:
have {a − t + S(t) < 0 for some t ∈ [tj , tj+1]} ⊆ {S(tj ) <
tj+1}. In conclusion, under super-critical conditions the
process never stops before p−1 with probability 1 − ζ(n).
Segment [p−1, c n]. Beyond time p−1 we can no longer
use (9). However, we can easily handle segment [p−1, cn]
and already conclude that, in all cases, the process reaches
at least a constant fraction of the nodes (if it survives the
bottleneck). For this, we exploit the fact that π(⌈p−1⌉) ≥
qρ∗ P (Bin(p−1, p) > Ri) > 2c for some constant c > 0.
Using again union bound and concentration inequalities,
we then show that the process never stops before cn with
probability 1 − ζ(n).
B. ALTERNATIVE APPROACH FOR TWO
COMMUNITIES
We introduce a different approach for the G(n1, n2, p1, p2, q)
block model, which allows us to understand how seeds
should be optimally partitioned between the two com-
munities in order to minimize their number and achieve
almost complete percolation in the whole system. This
time, we assume that at each time step t a single active
node, selected uniformly at random among all usable ac-
tive nodes in the system, is used.
To simplify the exposition, we will focus on a perfectly
symmetric scenario in which p1 = p2 and n1 = n2 = n/2.
However, the same approach can be easily extended to
the general case G(n1, n2, p1, p2, q).
Differently from our first reformulation, now we have,
E[S(xtc)] = xρ∗ tc
ρ∗ + o(tc).
Using (22) and (20), we have for any δ > 0,
P (S(t) ≤ t − (α − δ)(1 − (ρ∗)−1)tc) <
−(1−δ)xρ∗ tc
e
xtc −(α−δ)(1−(ρ∗ )−1 )tc
ρ∗ H
(1−δ)xρ∗ tc
ρ∗
Thus, by sub-additivity of probability:
(22)
for any t < T :
T1(t) + T2(t) = t
where Ti(t) denotes the (random) number of nodes used
in community i up to time t.
Now, if we consider any two different sequences in which
active nodes are selected, such that T1(t) in one sequence
is larger than T ′
1(t) in the other sequence, we easily see
that,
S(t) − t + a ≤ 0(cid:19) ≤
−(1−δ)xρ∗ tc
e
ρ∗ H
xtc −(α−δ)(1−(ρ∗ )−1 )tc
(1−δ)xρ∗ tc
ρ∗
t[a,⌊Ktc⌋]
P(cid:18) inf
Xt∈[a,⌊Ktc⌋]
≤
α(1 − (ρ∗)−1)(1 + δ)
(1−δ)xρ∗
a
α(1−(ρ∗ )−1)ρ∗ (1+δ)
− infx∈[a/tc,K]
e
K
H
x−(α−δ)(1−(ρ∗ )−1)
(1−δ) xρ∗
ρ∗
(23)
the assertion descends immediately taking the inf of (23)
with respect to δ > 0 and letting K → ∞.
Segment [Ktc, p−1]. We basically follow [6], choosing
K = 8 and defining a sequence of time instants tj =
8 · 2j tc for j = {0, 1, 2··· J} with J = min{j : ptj ≥ 1}.
We first show that E[S(tj )] > (1 + δ)tj+1 for every j
and a properly specified δ > 0. Then, applying again
union bound and concentration inequality (20) we can
prove that P (S(tj) ≤ tj+1, for some j) goes to zero faster
than ζ(n). This implies P (S(t) − t ≤ 0, for some t ∈
[8tc, ⌈p−1⌉]) goes to 0 faster than ζ(n) under super-critical
Indeed, given the monotonicity of S(t), we
conditions.
(24)
(25)
=
(26)
2(t))
2(t))
(pT1(t))ρ(qT2(t))r−ρ
S1(T1(t), T2(t)) ≥st S1(T ′
S2(T1(t), T2(t)) ≤st S2(T ′
1(t), T ′
1(t), T ′
Furthermore, for 1 ≪ t ≪ p−1 we have:
E[S1(T1(t), T2(t)) + S2(T1(t), T2(t))] ∼
rXρ=0
f(cid:18)T1(t)
t (cid:19)
being f (x) =Pρ[ (ptx)ρ(qt(1−x))r−ρ
ρ!(r − ρ)!
rXρ=0
ρ!(r−ρ)!
+
(qT1(t))ρ(pT2(t))r−ρ
ρ!(r − ρ)!
a continuous function over [0, 1], indefinitely derivable in
(0, 1) and satisfying the following properties:
i) f (x) =
f (1 − x); ii) f (x) decreases for x ∈ [0, 1/2) (and increases
for x ∈ (1/2, 1]). Previous observations lead to:
Theorem B.1. To minimize the number of seeds that
are needed to achieve complete or almost complete per-
colation in the symmetric graph G(n/2, n/2, p, p, q), with
q < p and q = Ω( 1
n ), all seeds have to be placed within the
same community.
The proof is reported in the companion technical report
[14]. At high level, the result descends from the fact that,
+ (qtx)ρ(pt(1−x))r−ρ
ρ!(r−ρ)!
]
of the assumptions that: i) the graph is connected at com-
munity level; ii) for non null off diagonal elements of P ,
pik = Ω( 1
). In particular, note that if we get (al-
ni
most) complete percolation in just one community, the
infection propagates to the entire system.
, 1
nk
We can also ask ourselves which is the optimal seed
allocation in the system, in the case in which we know
the community membership of the nodes. A straightfor-
ward extension of Theorem B.2 provides the answer to
this question:
Theorem C.2. Consider a general block model graph
with K < ∞ communities as defined before; assume that
1/(npk,k) → 0 , pk,k = o(n−1/r) for any k.
In order
to minimize the number of seeds that produce (almost)
complete percolation of the entire graph, all seeds must be
placed within a single community that maximizes quantity
nk(pk)r.
As consequence, it turns out that a number of seeds:
a = (1 + ǫ)(cid:18)1 −
1
r(cid:19) min
k (cid:18) (r − 1)!
nk(pk,k)r(cid:19)(r−1)−1
(28)
for any ǫ > 0, is enough to guarantee an almost complete
percolation of the graph. Indeed, by placing these a nodes
all within a single community that maximizes quantity
nk(pk)r, let this community be k0, we have that process
Sk0 (t), and thus process Sk0 (t) is super-critical, which is
enough to trigger system-wide percolation.
At last, we can exploit Theorem C.2 also to get a differ-
ent upper bound to the critical number of seeds in the case
in which seeds are selected uniformly at random among
all nodes. Indeed, it turns out that a n
seeds, where a
nk0
is the same as in (28), are enough, since w.h.p. at least
a(1 − ε/2) seeds will fall within community k0, produc-
ing super-critical conditions in community k0 (and then
in the entire system). In the case of very heterogeneous
communities, this last bound might be tighter than (27).
for any given total number of seeds, extremal trajectories
of T1(t) and T2(t) are obtained when all seeds are placed
in the same community, as a consequence of (24), (25),
and properties of (26).
Theorem B.1 can be easily generalized to the asymmet-
ric case (see [14]):
Theorem B.2. To minimize the number of seeds that
are needed to achieve complete or almost complete perco-
lation in G(n1, n2, p1, p2, q) with q = Ω( 1
n ), all seeds have
to be placed in the community having the maximum value
of ni(pi)r.
C. GENERAL BLOCK MODEL
Let nk(n) be the number of nodes in community k (k =
1, . . . , K), with n =Pk nk. We will assume that nk(n) ≫
1, for any k. We focus on a community structure in which
pik < min(pii, pkk) for any (i, k). Moreover, whenever
pik 6= 0, we will assume that pik = Ω( 1
). At last,
but without loss of generality, we assume the graph to be
connected at the community level; i.e. we assume P to be
of maximal rank (equal to K − 1). Indeed, if this in not
true we can always partition the community-level graph
into connected components and apply our results to each
connected component.
, 1
nk
ni
We first generalize the result in Theorem 6.1:
Theorem C.1. Consider a block model with K < ∞
communities as defined before; suppose, for any k, that
1/(n pk,k) → 0 , pk,k = o(n−1/r), ak/a(k)
c → αk > 1,
with:
where:
1
¯a(k)
c =(cid:18)1 −
nk(bpk,k)r(cid:19)(r−1)−1
r(cid:19)(cid:18) (r − 1)!
bpk,k =(r!) · Xρ1 ···ρk ···ρK
k,kQj6=k p
ρk!Qj6=k ρj!
with P ρj =r
pρk
1
r
ρj
jk
Let T = inf t{mink(ak − t + Sk(t)) < 0}. We have:
∀ε > 0, P(cid:18)1 −
T
maxk(nk)
> ε(cid:19) = O(cid:16)e−C1(r,mink(r,αk ))a+o(a)(cid:17)
where C1(r, α) is the same function as in Theorem 4.1.
Theorem C.1 can be used to derive a simple upper
bound to the minimum number of seeds that can produce
super-critical conditions in all communities, in the case
in which seeds are selected uniformly at random among
all nodes.
Indeed, Theorem C.1 coupled with standard
concentration arguments lead to the result that a global
number of seeds:
a = (1 + ǫ)n max
k
¯a(k)
c
nk
(27)
for any ǫ > 0, is enough to guarantee (almost) complete
percolation of the entire graph.
More in general, given an arbitrary allocation of seeds
among communities, Theorem C.1 can be used to check
whether the considered seed allocation is able to trigger
system-wide percolation. On this regard, note that Theo-
rem C.1 can be applied to any community-level connected
sub-graph of the entire system: if at least one sub-graph
satisfies the conditions of Theorem C.1, we get (almost)
complete percolation of the entire system, as consequence
|
1607.00537 | 2 | 1607 | 2016-07-05T02:02:52 | Badge System Analysis and Design | [
"cs.SI",
"cs.GT"
] | To incentivize users' participations and steer their online activities, online social networks start to provide users with various kinds of rewards for their contributions to the sites. The most frequently distributed rewards include account levels, reputation scores, different kinds of badges, and even material awards like small gifts and cash back, etc. Attracted by these rewards, users will spend more time using the network services. In this paper, we will mainly focus on "badges reward systems" but the proposed models can be applied to other reward systems as well. Badges are small icons attached to users' homepages and profiles denoting their achievements. People like to accumulate badge for various reasons and different badges can have specific values for them. Meanwhile, to get badges, they also need to exert efforts to finish the required tasks, which can lead to certain costs. To understand and model users' motivations in badge achievement activities, we will study an existing badge system launched inside a real-world online social network, Foursquare, in this paper. At the same time, to maximize users' contributions to online social networks, social network system designers need to determine the optimal badge system mechanism carefully. Badge system mechanism describes various detailed aspects of the system and can involve many parameters, e.g., categories of existing badges, number of badges available as well as the minimum contributions required to obtain the badges, which all need to be designed with meticulous investigations. Based on the model of users' badges accumulating activities, in this paper, we will also study how to design the badge system that can incentivize the maximum users' contributions to the social networks. | cs.SI | cs | Badge System Analysis and Design
University of Illinois at Chicago
Worcester Polytechnic Institute
Jiawei Zhang
Chicago, IL, USA
[email protected]
Xiangnan Kong
Worcester, MA, USA
[email protected]
Philip S. Yu
University of Illinois at Chicago
Chicago, IL, USA
[email protected]
6
1
0
2
l
u
J
5
]
I
S
.
s
c
[
2
v
7
3
5
0
0
.
7
0
6
1
:
v
i
X
r
a
ABSTRACT
To incentivize users' participations and steer their online activities,
online social networks start to provide users with various kinds of
rewards for their contributions to the sites. The most frequently dis-
tributed rewards include account levels, reputation scores, different
kinds of badges, and even material awards like small gifts and cash
back, etc. Attracted by these rewards, users will spend more time
using the network services. In this paper, we will mainly focus on
"badges reward systems" but the proposed models can be applied
to other reward systems as well.
Badges are small icons attached to users' homepages and pro-
files denoting their achievements. People like to accumulate badge
for various reasons and different badges can have specific values
for them. Meanwhile, to get badges, they also need to exert ef-
forts to finish the required tasks, which can lead to certain costs.
To understand and model users' motivations in badge achievement
activities, we will study an existing badge system launched inside
a real-world online social network, Foursquare, in this paper.
At the same time, to maximize users' contributions to online
social networks, social network system designers need to deter-
mine the optimal badge system mechanism carefully. Badge sys-
tem mechanism describes various detailed aspects of the system
and can involve many parameters, e.g., categories of existing badges,
number of badges available as well as the minimum contributions
required to obtain the badges, which all need to be designed with
meticulous investigations. Based on the model of users' badges
accumulating activities, in this paper, we will also study how to
design the badge system that can incentivize the maximum users'
contributions to the social networks.
Categories and Subject Descriptors
H.2.8 [Database Management]: Database Applications-Data Min-
ing
Keywords
Badge System, Social Network, Game Theory, Data Mining
1.
INTRODUCTION TO BADGE SYSTEM
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that copies
bear this notice and the full citation on the first page. To copy otherwise, to
republish, to post on servers or to redistribute to lists, requires prior specific
permission and/or a fee.
Copyright 20XX ACM X-XXXXX-XX-X/XX/XX ...$15.00.
(a) shared badge distribution
(b) peer pressure distribution
Figure 1: Statistical information: (a) #shared badges between
pairs in a randomly sampled pair set; (b) fraction of badges
obtained at a certain friend ratio.
Figure 2: Power law distribution of user fraction and number
of achieved badges.
Social networks, e.g., Facebook, Twitter and Foursquare, have
achieved remarkable success in recent years. These social networks
are mostly driven by user-generated content, e.g., posts, photos and
location checkins. To incentivize users' participations and steer
their online activities, many social networks start to offer users var-
ious rewards for their contributions to the networks. In this paper,
we will mainly focus on "badge reward systems" but the proposed
models can be applied to other reward systems as well. Badge sys-
tems have been adopted by a wide range of social networks: (1)
Foursquare1, a famous location-based social network (LBSN), is
distributing different badges to users for their geo-location check-
ins; (2) Weibo2, a social media in China, launches a badge system
to give users badges for writing posts and replies; (3) Stack Over-
1https://foursquare.com
2http://www.weibo.com
0.02.04.06.08.010.012.0# Pairs0.020.040.060.080.0100.0120.0140.0160.0# Shared Badges103103peernon peer0.00.20.40.60.81.0Ratio of Peers0.050.000.050.100.150.200.250.300.35Fraction of Badges10-1100101102103104# Badges10-410-310-210-1Fraction of UsersTable 1: Properties of the Badge System Dataset
nodes
links
property
user
badge
follow
achieved
level
number
4,240
1,431
81,291
176,301
47,342
flow3, a popular question and answer (Q&A) site for computer pro-
gramming, adopts a system where users can get badges by answer-
ing questions in the site; and (4) In Khan Academy4, a popular mas-
sive open online course (MOOC) site, users are awarded badges for
watching course videos and answering questions.
1.1 User Activity Observations
People like to accumulate badges for various reasons and dif-
ferent badges can have specific values for them. Extensive anal-
yses have been done on a real-world badge system launched in
Foursquare. The badge system dataset was crawled from Foursquare
during the April of 2014. We collected 4, 240 users together with
all the 1, 430 categories of badges achieved by them. These users
are crawled with BFS search from several random seed users via
the social connections in Foursquare, who are connected by follow
links of number 81, 291. To denote that a user has achieved certain
badges, we add achieve links between users and badges, whose to-
tal number is 176, 301 in the crawled dataset. On average, each
user has achieved 42 badges in Foursquare. In addition, each cat-
egory of badges can involve different badge levels, where badges
of consequential levels can be connected by the level links. For ex-
ample, badges of higher level, e.g., l (l > 1), can have level links
pointing to badge of level l−1 and the number of level links among
badges is 47, 342. A more detailed information about the dataset is
available in Table 1.
The statistical analyses results about the badge system dataset
are available in Figure 1 and Table 2, from which many interesting
phenomena can be observed:
1. Generally, users who are friends are more likely to share
common badges. We randomly sample a certain number of
user pairs who are (1) friends (i.e., connected by social links)
and (2) not friends from Foursquare, and count the number of
common badges shared by these user pairs respectively. The
results are given in Figure 1(a), where the x axis is the num-
ber of randomly sampled user pairs and the y axis denotes the
number of shared badges between these sampled pairs. From
Figure 1(a), we can observe that online badge achievement in
social networks is correlated with social connections among
users and friends are more likely to have common badges.
2. In many cases, users are likely to obtain badges which have
never been achieved by his friends. As shown in Figure 1(b),
for each badge bj, obtained by user ui, we get the timestamp
when ui get bj and the ratio of ui's friends who obtain bj
before ui. The distribution of the percentage of badges ob-
tained at different ratios is given in Figure 1(b), from which
we can observe that a large proportion of badges are obtained
at small ratios, i.e., few of ui's friends have achieved the
badge before ui.
3http://stackoverflow.com
4https://www.khanacademy.org
Figure 3: Top 10 badges achieved by most users
Figure 4: Tasks needed to unlock "JetSetter" badges.
3. In some cases, users will follow their friends when most of
their peers have obtained a certain badge. Still in Figure 1(b),
when the ratio is close to 1.0, i.e., almost all the peers have
obtained a certain badge, the fraction of badge obtained will
increase to 0.1, representing that about 10% of the badges
are obtained by users when all his friends have achieved the
badge. As a result, users' badge achievement activities in on-
line social networks are highly related to those of their peers.
These three observed effects of peers' badges on users' ac-
tivities are called the peer leadership value of badges in Sec-
tion 3.1.
4. Users are keen on getting badges that are to their interests.
In Table 2, we extract top 10 popular badges achieved by the
most users in Foursquare and each of these badges has 10
different levels. Numbers of users who have obtained certain
levels of each kind of badge as well as the total number of
badges achieved (i.e., summation of each row of the table)
are provided. The corresponding icons of these badges are
shown in Figure 3. Generally, higher-level badges require
more efforts from the users, but from Table 2, we observe
there are still a large number of users are willing to devote
such high efforts to get the badges due to their personal in-
terests. For example, among the 2, 468 users who achieved
the "Fresh Brew" badge of level 1, 22.5% of them will con-
tinue to get badge of level 5, which may denote these users
like drinking coffee a lot. Similarly, for users who get differ-
ent levels of "Mall Rat" badges, they should like shopping a
lot; users who get the "JetSetter" badges are those who travel
frequently. As a result, badges can reveal users personal in-
terests, especially higher-level badges. Such a kind of effects
Fresh BrewMall RatJetSetterFresh OutdoorsPizzaioloHot TamaleSwimmiesBentoZoetropeFlame Broiledbadge
name
Fresh Brew
Mall Rat
JetSetter
Hot Tamale
Great Outdoors
Pizzaiolo
Swimmies
Bento
Zoetrope
Flame Broiled
Table 2: Number of users achieving top 10 badges
obtain it by
checking-in at
Coffee Shops
Shopping Malls
Airport Terminals
Mexican Restaurants
Parks and Outdoors
Pizza Restaurants
Lake/Pond/Beach
Sushi Restaurants
Movie Theaters
Burger Restaurants
1
2468
2545
2357
2305
2119
2192
1888
1741
1985
1944
3
# users achieving badges of different levels
8
144
81
102
58
95
16
47
21
6
3
1235
1076
972
989
801
605
538
459
309
337
4
817
624
564
583
468
267
281
209
103
105
6
374
224
210
191
200
62
107
63
16
13
5
555
366
339
336
295
116
159
104
34
40
7
255
130
147
105
132
26
74
34
12
6
2
1914
1907
1703
1733
1535
1450
1214
1121
1106
1044
total
number
7878
7028
6468
6355
5728
4746
4361
3774
3580
3494
9
78
46
63
37
53
8
36
14
5
1
10
38
29
11
18
30
4
17
8
4
1
of badges for users is defined as the personal interest value
of badges in Section 3.3.
5. Users in online social networks are enthusiastic in earning
badges. As shown in Figure 2, the distribution of user frac-
tions obtaining a certain number badges follows the power
law [5] and the majority of the users in Foursquare have
obtained more than 50 badges in Foursquare.
In Table 2,
we observe that over 2, 000 have ever obtained the "Fresh
Brew", "Mall Rat", "JetSetter", "Hot Tamale", "Great Out-
doors" and "Pizzaiolo" badges. Considering that there are
only 4, 240 users in the dataset, we can observe that most
users in Foursquare have achieved these badges. One poten-
tial explanation of the observation can be that: initially, peo-
ple use social network services independently of the badges;
meanwhile, after using the network for a while, users start
to lose interesting, and the badges start to play their roles
in keeping users within the network. Such a kind of effects
of badges on users is defined as the network trend value of
badges in Section 3.2.
1.2 Badge System Analysis
To get badges, users in online social networks are required to
finish certain tasks, which can be (1) finishing a certain number of
checkins at required locations in Foursquare, (2) answering a num-
ber of questions proposed by other users in Stack Overflow, and
(3) publishing required numbers of posts in Weibo. These tasks
of higher-level badges are usually more challenging. For instance,
as shown in Figure 4, by checking at 20 different airports, users
can get the "JetSetter" badges from level 1 to level 5. However, to
unlock the "JetSetter" badge of level 6, users need to check in at an-
other 5 new airports. Obviously, these tasks can yield some costs,
which can be time, money or knowledge spent on the tasks. The
payoff of achieving certain badges is defined as "(value - cost)",
i.e., the utility of badges for users. Besides the above badge val-
ues, users can also get other benefits from the network, e.g., enjoy
the social network services. With the same model to be proposed
in this paper, such benefits can be handled by either incorporat-
ing them into the above corresponding badge value categories or
introducing a new value category. Since we mainly focus on the
badges system design problem in this paper, we will only consider
the above badge values to simplify the problem settings. When the
value of badges can exceed the cost, users may try to get the badge;
otherwise, they will not devote their efforts as they can get no pay-
offs from these badges. Costs of obtaining badges are fixed but the
value of badges can be influenced by other users' badge achieve-
ment activities. Each user in online social network is assumed to
be "selfish" and wants to maximize his payoff (i.e., the utility) and
the badge achieving activities will form a game with other users in
the network.
Meanwhile, badges in online social networks are used to incen-
tivize users' contributions to the sites. To achieve such a goal, the
system designer needs to determine the optimal settings for a badge
system, which is formally defined as the badge system mechanism
in this paper. Badge system mechanism covers every aspect of the
system and contains many parameters, which include:
• Categories of Badges: A badge is said to be contributing if
it can attract lots of users' contributions to the social net-
work. We will study the contributions attracted by different
categories of badges from users and find the most contribut-
ing ones in online social networks. This problem is helpful
for badge designer to determine which categories of badges
should be placed in social networks.
• Number of Badges: The number of badges to be placed in on-
line social networks is very important for an effective badge
system. If a large number of badges are placed in social net-
works, users can always get badges to their interests or have
never be obtained by others before very easily, which will
make the system fail to work in steering users' online activi-
ties.
• Badge Threshold: Setting the badge contribution threshold
(i.e., the minimum required contribution to get the badge) is
very tricky. If the threshold is set too low, most users will
get the badge easily with little efforts and the total amount
of contributions drawn by these badges will be low. On the
other hand, if the threshold is set too high, very few people
will devote their effort to getting the badge as these badges
are difficult to obtain and the total amount of users' contri-
butions will be low as well.
1.3 Badge System Modeling Challenges
The badge system analysis and design problem studied in this
paper is a new research problem and it is very challenging to solve
due to the following reasons:
• Badge Value Definition: The value of badges for users in
online social networks is unclear. Formal definition, quan-
tification and inference of the badge values for users can be
the prerequisite for a comprehensive modeling users' badge
achievement activities.
• User Utility Function: Users can get reward from the achieved
badges, i.e., the value of badges, but also needs devote their
efforts, i.e., the cost. Formal definition of the payoff by
achieving badges, i.e., the utility, is still an open problem.
• Game Among Users: Each user aims at maximizing his over-
all utility, which can be influenced by other users' activities
at the same time. As a result, users' online badge achieving
activities can lead to a game involving all users. Formulation
and analysis of such a game among users in online social
networks is very difficult.
• Optimal Badge Mechanism: Users' utility in badge achieve-
ment is determined by the badge system mechanism set by
the designer. Users aim at maximizing their overall utility
with as few efforts as possible, while the designer aims at
maximizing users' overall contribution to the network. As
a result, there also exists a game between users and the de-
signer, which will make the problem more challenging.
The following parts of this paper are organized as follows. Sec-
tion 2 is about the definitions of many important concepts. Various
value functions of badges for users will be introduced and com-
bined in the comprehensive value function in Section 3. Users'
utility function is given in Section 4. In Section 5, we study the
game among users in online social network. In Section 6, we solve
the badge system design problem by formulating it as a game be-
tween users and the designer and provide basic simulation analysis
about various aspects in the badge system design problem. The re-
lated works are introduced in Section 7. Finally, we conclude the
paper in Section 8.
2. TERMINOLOGY DEFINITION
Users in social networks can be gifted in different areas and they
can finish the tasks required to get badges corresponding to their
gifts effortlessly. For instance, in Foursquare, sports enthusiasts
can get Gym Rat badges easily as they do sports in gyms regularly,
while travel lovers can obtain JetSetter or Trainspotter badges by
checking in at train stations and airports frequently. However, for
users who want to get badges of areas that they are not good at,
it would be very difficult to finish the required tasks. For exam-
ple, a sports enthusiast may need to spend lots of time and money
to get the JetSetter or Trainspotter badges by travelling. Simi-
larly, gourmets who seldom do sports may suffer a lot to get Gym
Rat badges by visiting gyms. Let U = {u1, u2,··· , un} and
B = {b1, b2,··· , bm} be the sets containing n users and m badges
respectively in the network. To depict such phenomena, we for-
mally define the concepts of ability, effort and contribution of users
in U as well as contribution threshold of badges in B as follows.
Definition 1. (Ability): User ui's talents or advantages in fields
corresponding to badges in B can be represented as the ability vec-
tor ai = [ai,1, ai,2,··· , ai,m], where ai,j ≥ 0 denotes ui's ability
in the field of badge bj or simply ui's ability to get badge bj.
All people are assumed to be created equally talented. People
can be talented at different aspects but the total intelligence each
people have can be quite close. For simplicity, we assume the
total abilities of different users are equal, i.e., ai1 = aj1, for
∀ui, uj ∈ U. Besides talents, to make achievements in certain ar-
eas, every people need to devote their efforts and passion, which
can be either money, time, energy or knowledge. In this paper, the
resources users will devote to the system is time and the formal
definition of unit time effort is available as follows.
Definition 2. (Unit Time Effort): Vector ei = [ei,1, ei,2,··· , ei,m]
denotes user ui's efforts devoted to the field corresponding badges
in B in unit time, where ei,j ≥ 0 represents ui's effort devoted in
the area of badge bj, or simply ui's effort in getting badge bj.
Users' unit time effort can vary with time and can be represented
as a function on time, e.g., ei,j(t). The total amount of unit time
effort in different areas of all users are assumed to be equal, i.e.,
ei1 = ej1, for ∀ui, uj ∈ U. Meanwhile, the more time people
devote to certain area, the more cumulative efforts he will devote to
the area.
Definition 3. (Cumulative Effort): Term ei,j = (cid:82) t
t ei,j(t) dt is
defined as the cumulative effort that user ui devotes to badge bj
during time period [t, t]. For both users and designer, cumula-
tive effort is more meaningful as they only care about the total
amount of effective efforts devoted to the system. Vector ei =
[ei,1, ei,2,··· , ei,m] is defined as the cumulative efforts that user
ui pays to the network.
In this paper, active users are assumed to have more cumula-
tive efforts as they spend more time using the social network. The
achievements people obtain depend on not only their ability in a
certain area but also the efforts the devoted to the area, which can
be formally defined as their contributions to the network.
Definition 4. (User Contribution): The effectiveness of users'
cumulative efforts devoted to a social network is formally defined
as their contributions. Vector ci = [ci,1, ci,2,··· , ci,m] is defined
to be user ui's contributions to the whole system, where ci,j is the
contribution of user ui devoted to the network in getting badge bj
during [t, t]:
(cid:90) t
(cid:90) t
ci,j =
ai,jei,j(t) dt = ai,j
ei,j(t) dt = ai,j ei,j.
t
t
As a result, the more effort people devote to areas they are gifted
at, the more remarkable achievements they can get in the areas. In
social networks, whether a user can receive a badge depends on
not only the contributions he/she make but also the contribution
threshold of the badge.
Definition 5. (Badge Threshold): A badge's threshold denotes
the minimum required contributions required for users to get the
badge. For badges in B, their threshold can be represented as θ =
[θ1, θ2,··· , θm].
For a given user ui, if his/her contribution to badge bj, i.e., ci,j,
is greater than bj's threshold θj, then ui will get bj, which can be
represented with the following badge indicator function:
(cid:40)
I(ci,j ≥ θj) =
if ci,j ≥ θj,
1,
0, otherwise.
Furthermore, the badges that user ui have received can be repre-
sented as the badge indicator vector Ii = [I(ci,1 ≥ θ1), I(ci,2 ≥
θ2),··· , I(ci,m ≥ θm)]. Before the system starts to operate and
players begin to invest their efforts, the badge system designer needs
to specify the badge system settings in advance, which is formally
defined as the badge system mechanism in this paper.
Definition 6. (Badge System Mechanism): Badge system mech-
anism describes various detailed aspects of the system. In addition
to badge thresholds, the mechanism of badge system in online so-
cial networks can also involve the categories, number, names, IDs,
levels of badges, as well as methods to get the badges, etc.
(a) linear value function
(b) quadratic value function
(c) cubic value function
Figure 5: Estimated value functions by fitting the data.
(d) exp. value function
3. BADGE VALUE FUNCTIONS
The motivation of users being willing to devote efforts to get
badges in online social networks is because these badges are valu-
able to them. Depending on the specific scenarios, the value of
badges for users can be quite different. According to the observa-
tions in Section 1, the effects of badges on users' social activities
can be models as three different kinds of values of these badges. In
this section, we will introduce three different value functions which
can capture the badge values from different perspectives: (1) per-
sonal interest value function, (2) peer leadership value function,
and (3) network trend value function.
3.1 Peer Leadership Value Function
In our daily life, on the one hand, people want to be different
from the public, but, on the other hand, they may also want to fol-
low the mainstream as well. We have similar observations about
users badge achieving activities in online social networks. Users
in online social networks want to be the first to win certain badges
in their communities, which can show their uniqueness and make
them stand out from his/her peers. Meanwhile, if most of the peers
have obtained a certain badge, users will follow their friends to get
the badge to extract themselves from the backward position. To
depict the effectiveness of badges to make users be either more su-
perior to his peers or closer to other leading peers, we formally
define the peer leadership badge value in this part.
3.1.1 Peer Leadership Value Function Definition
Definition 7. (Peer Leadership Value): The peer leadership value
of badge bj for a user ui is defined as a function about the ratio of
ui's peers who have obtained badge bj already. Let Γ(ui) be the
neighbor set of user ui ∈ U, in which users who have achieved
badge bj before ui can be represented as Ψ(ui, bj) = {um(um ∈
Γ(ui)) ∧ (Im(j) = 1)}. The peer leadership value function of
badge bj for user ui can be represented as function
vps(ui, bjΓ(ui)) = f (
Ψ(ui, bj)
Γ(ui)
), Ψ(ui, bj) ⊂ Γ(ui).
The concrete representation of the peer leadership value func-
tions can be quite diverse depending on the selected function f (·).
In this paper, we try 4 different functions, and the corresponding
peer leadership value functions are listed as follows:
• linear peer leadership value function
(cid:18)Ψ(ui, bj )
Γ(ui)
• quadratic peer leadership value function
(cid:19)2
l (ui, bjΓ(ui)) = a
vps
(cid:18)Ψ(ui, bj )
p (ui, bjΓ(ui)) = a
vps
+ b
Γ(ui)
(cid:19)
+ b,
(cid:18)Ψ(ui, bj )
Γ(ui)
(cid:19)
+ c,
• cubic peer leadership value function
(cid:19)3
(cid:18)Ψ(ui, bj )
(cid:19)
(cid:18)Ψ(ui, bj )
c (ui, bjΓ(ui)) = a
vps
Γ(ui)
(cid:18)Ψ(ui, bj )
Γ(ui)
(cid:19)2
+ b
+ c
Γ(ui)
+ d,
• exponential leadership value function
−b
e (ui, bjΓ(ui)) = a × e
vps
(cid:18) Ψ(ui,bj )
Γ(ui)
(cid:19)
+ c,
where a, b, c and d are the coefficients in the functions which can
be learnt from the historical data.
Given the real peer leadership value function of badges in the
social network, f (x), the optimal parameters can be learnt by min-
imizing the following objective function:
(cid:90) 1
0
ω = arg min
ω
f (x) − vps(x) dx
where ω is the vector of coefficients (e.g., ω = [a, b] in the linear
Ψ(ui,bj )
Γ(ui) ∈ [0, 1]. To
peer leadership value function) and x =
resolve the function, we propose to learn the coefficients by fitting
the 11 discrete points shown in Figure 1(b) and can get different
estimated peer leadership value functions in Figures 5(a)-5(d) re-
spectively.
3.1.2 Peer Leadership Value Function Evaluation
Experiment Settings
The higher peer leadership value a badge has, the more likely a
user will try to obtain it. To test the effectiveness of the above intro-
duced peer leadership value functions, we conduct an experiments
on the Foursquare badge system dataset introduced in Section ??.
In the experiment, badges achieved by less than 100 users are re-
moved and the remaining badges achieved by users are organized
in a sequence of (user, badge) pairs according to their achieving
timestamps. These (user, badge) pairs are divided into two subse-
quences according to their relative timestamps order: the training
set and testing set, the proportion of whose sizes is 9 : 1. In addi-
tion, a set of non-existing (user, badge) pairs which is of the same
size as the positive test set are randomly sampled from the network
as the negative test set, which together with the positive test set
are used to form the final testing set. Pairs in the training set are
regarded as the historical data, based on which we calculate the
values of pairs in the testing set and output them as the confidence
scores of these pairs.
The evaluation metrics applied in the experiment is AUC. In
statistics, a receiver operating characteristic (ROC), or ROC curve,
is a graphical plot that illustrates the performance of a binary clas-
sifier system as its discrimination threshold is varied. The curve
is created by plotting the true positive rate (TPR) against the false
positive rate (FPR) at various threshold settings. The area under
0.00.20.40.60.81.0Ratio of Peers0.050.000.050.100.150.200.250.300.35Fraction of Badgesf(x)=−0.19x+0.180.00.20.40.60.81.0Ratio of Peers0.050.000.050.100.150.200.250.300.35Fraction of Badgesf(x)=0.4x2−0.58x+0.240.00.20.40.60.81.0Ratio of Peers0.050.000.050.100.150.200.250.300.35Fraction of Badgesf(x)=−0.35x3+0.92x2−0.78x+0.260.00.20.40.60.81.0Ratio of Peers0.050.000.050.100.150.200.250.300.350.40Fraction of Badgesf(x)=0.24e−6.39x+0.05the ROC curve is usually quantified as the AUC score. When using
normalized units, the area under the curve (i.e.„ AUC) is equal to
the probability that a classifier will rank a randomly chosen posi-
tive instance higher than a randomly chosen negative one (assum-
ing "positive" ranks higher than "negative"). Generally speaking,
larger AUC score corresponds to better performance of the predic-
tion model.
Experiment Results
We learn the coefficients of different value functions with the
training set and apply the learnt function to calculate the peer lead-
ership values of pairs in the testing set. The results are available in
Figure 6. From the results, we observe that AUC achieved by the
quadratic peer leadership function is 0.65, which is slightly bet-
ter than other value functions, and the AUC scores obtained by the
linear, cubic and exponential peer leadership functions are 0.58,
0.63, and 0.62 respectively. Here, quadratic function can outper-
form cubic and exponential functions can because of the reason
that cubic function may suffer from the overfitting problems a lot.
Next, we will use the quadratic peer leadership function as the only
peer leadership function, which will be compared with other value
functions in Figure 7.
3.2 Network Trend Value Function
1, bi
2, ..., b1
1, b2
2, ..., b2
p before bi
2,··· , bi
Besides the effects of personal interests and peer pressure, there
exists some global trend about the network steering users badge
achievement activities in the whole network. In online social net-
work, users achieve badges in a sequential time order. For exam-
ple, badges achieved by user ui can be organized into a sequential
l(cid:105) according to the achieving timestamps,
transaction (cid:104)bi
q if p < q. For all users in U, we can
where ui got badge bi
represent the badge achievement sequential transactions as {u1 :
(cid:104)b1
o(cid:105),··· , un : (cid:104)bn
l (cid:105), u2 : (cid:104)b2
1, b1
The network influence can be captured by extracting the fre-
quent badge achieving sequential patterns from the transactions and
many different pattern extraction methods have been proposed so
far. In this paper, PrefixSpan proposed by Pei et al. [15] is applied.
Consider, for example, we extract two frequent sequence patterns:
pattern 1: (cid:104)bl, bo,··· , bp(cid:105) and pattern 2: (cid:104)bl, bo,··· , bp, bq(cid:105) with
supports support(pattern 1) and support(pattern 2) respectively
from the network. Rule r can be generated based on pattern 1 and
pattern 2 representing that for users who have obtained badges in
(cid:104)bl, bo,··· , bp(cid:105) has a chance of conf to get badge bq:
1 , bn
2 , ..., bn
q (cid:105)}
r : (cid:104)bl, bo,··· , bp(cid:105) → (cid:104)bq(cid:105), conf =
support(pattern 2)
support(pattern 1)
,
where (cid:104)bl, bo,··· , bp(cid:105) is called the antecedent of rule r (i.e., ant.(r))
and (cid:104)bq(cid:105) is named as the consequent of r (i.e., con.(r)). Score
conf (r) = support(pattern 2)
is called the confidence of rule r.
support(pattern 1)
Various rules together with their confidence scores can be gener-
ated based on the frequent sequence pattern mining results, which
can be represented as set R, based on which we can define the net-
work trend value function as follow.
Definition 8. (Network Trend Value Function): For a given user
ui, who has achieved a sequence of badges H = (cid:104)bi1 , bi2 ,··· , biH(cid:105)
already, the network trend value function of badge bj for ui is de-
fined as the maximal confidence score of rules that can be applied
to badges in H and badge bj, i.e.,
vnt(ui, bjH) = max{conf (r)r ∈ R, ant.(r) ⊂ H, con.(r) = bj}.
We evaluate the effectiveness of the introduced network trend
value of badges based on the same experiment setting introduced
in Section 3.1.2. As shown in Figure 7, network trend value based
badge predictor along can achieve an AUC score of 0.68 in infer-
ring potential badge achievement activities.
3.3 Personal Interest Value Function
Users can have their personal interests, which can steer their so-
cial activities in online social networks. For example, sport enthusi-
asts may visit gyms and outdoor places frequently, while gourmets
tend to go to good restaurants on the other hand. Users' personal
interests can be revealed from the badges obtained in the past. For
example, for a given user ui who has already achieved the "Gym
Rat" badges of levels from 1 to 4, it can show that ui can like doing
sports a lot and "Gym Rat" of level 5 can meet his interest and can
be of great value to him. Viewed in this way, the value of badges
can be evaluated with the badges that users obtained in the past.
Definition 9. (Personal Interest Value): For a given user ui and
the set of badges obtained by ui in the past, i.e., H, the personal
interest value of badge bj for user ui is defined to be
(cid:80)
vpi(ui, bjH) =
bk∈H s(bj, bk)vpi(ui, bk)
,
H
where s(bj, bk) denotes the similarity score between badge bj and
bk and vpi(ui, bk) represents the personal interest value of badge
bk for user ui.
For badge bk ∈ H that ui has obtained in the past, we define the
personal interest value of ui to badge bj as 1.0 (i.e., vpi(ui, bk) =
1.0, for ∀bk ∈ H). The similarity score between any two badges,
e.g., bj and bk, is defined as the Jaccard's Coefficient score [14]
of user sets who have achieved bj and bk (i.e., Γ(bj) and Γ(bk))
respectively in the network:
s(bj, bk) =
Γ(bj) ∩ Γ(bk)
Γ(bj) ∪ Γ(bk) .
Based on the above descriptions, the personal interest value of
badge bj for user ui can be represented as
(cid:80)
bk∈H
Γ(bj )∩Γ(bk)
Γ(bj )∪Γ(bk)
H
.
vpi(ui, bjH) =
The effectiveness of the personal interest value of badge is eval-
uated with a similar experiment setting, whose result is available
in Figure 7. We can observe that ranking badges according to their
personal interest values for each user can achieve an AUC score of
0.66.
3.4 Comprehensive Value Function Definition
and Evaluation
To capture the information from all the three aspects in calculat-
ing badge values, we define the comprehensive value value function
as a combination of the personal interest value, peer leadership
value and network trend value functions:
vc(ui, bj ) = α · vpi(ui, bj ) + β · vpp(ui, bj ) + (1 − α − β)vns(ui, bj ),
where parameters α, β are assigned with value 1
this paper.
3 for simplicity in
To show the effectiveness of the above defined badge value func-
tions in modeling users' badge obtaining activities, we also com-
pare their performance in inferring users' badge achieving proba-
bilities in the Foursquare badge system dataset. For the peer leader-
ship value function, the quadratic function is used as it can achieve
Figure 6: Comparison of peer leadership value functions
the best performance in Figure 6. Experiment setting here is iden-
tical to that introduced in Section 3.1.2 and the results is available
in Figure 7. From the result we observe that network trend value
function performs better than personal interest and peer leadership
value functions, which can achieve AUC scores about 0.68, 0.66,
and 0.65 respectively. Meanwhile, the comprehensive value func-
tion that merge the isolated value functions together can improve
the performance greatly and can obtain AUC score is 0.77, which
is 13.2%, 16.7%, and 18.5% higher than the AUC scores achieved
by personal interest, peer leadership and network trend value func-
tions.
4. USER UTILITY FUNCTION
Value of badges is the reward that users can receive from the sys-
tem. Meanwhile, to get the reward, they also need to afford certain
costs introduced when finishing the required tasks. Generally, if the
reward is greater than the cost, the badge will deserve the efforts.
For example, if user ui can get badge bj eventually, then ui can
get a reward, i.e., the value of bj to ui (e.g., vc(ui, bj)) and also
needs to pay some costs, i.e., his cumulative efforts ei,j devoted to
bj. The payoff user ui can receive by devoting efforts to badge bj
is defined to be the utility of bj for ui. The formal definitions of the
reward, cost and utility functions of badges for users are available
as follows:
4.1 User Utility Function Definition
Definition 10. (Reward Function): The reward function of user
ui in achieving badge bj is defined as
reward(ui, bj) = I(ci,j ≥ θj)vc(ui, bj).
If ui can obtain bj, then the reward ui can achieve will be the
comprehensive value of badge bj for ui; otherwise, the reward will
be 0.
Definition 11. (Cost Function): To achieve a certain badge, e.g.,
bj, the cost that ui needs to pay is defined as the cumulative effort
that ui invests on bj:
cost(ui, bj) = ei,j.
The minimum efforts ei,j required for user ui to get badge bj
is determined by ui's ability in achieving bj as well as the badge
threshold of bj, which can be represented as
ei,j = arg min
e
(ai,j ei,j ≥ θj) =
θj
ai,j
Figure 7: Comparison of comprehensive value function and
other isolated value functions
Definition 12. (Utility Function): The utility function of ui in
achieving bj is defined as
utility(ui, bj) = reward(ui, bj) − cost(ui, bj)
= I(ci,j ≥ θj)vc(ui, bj) − ei,j.
If ui can get bj, i.e., ai,j ei,j ≥ θj, then utility(ui, bj) = vc(ui, bj)−
ei,j; otherwise, utility(ui, bj) = −ei,j.
The overall utility function of users ui over all badges in B is
represented as
(cid:88)
utility(ui) =
utility(ui, bj)
bj∈B
(cid:62)
i vc
= I
i − (cid:107)ei(cid:107)1 ,
where I(cid:62)
i denotes the transpose of the badge indicator vector of
i,m) is the comprehensive value vector
ui, vc
of all badges for ui, ei is the cumulative effort vector of ui and
i,2,··· , vc
i,1, vc
i = (vc
(cid:107)ei(cid:107)1 =(cid:80)m
j=1 ei,j is the L1 norm of vector ei.
4.2 User Utility Function Evaluation
To demonstrate the effectiveness of the utility in modeling users'
badge achieving activities, we conduct the experiments to show the
performance of user utility function in inferring users badge achiev-
ing activities. Experiment settings here is identical to those intro-
duced before but, to calculate the utilities of different badges for
users, we need to know users' total cumulative efforts, ability dis-
tributions, and badge thresholds in advance.
Inference of Cumulative Effort: Active users in online social net-
works are assumed to have more cumulative efforts. In our dataset,
the activeness measure can be defined as the number of badges
users achieved. And the cumulative effort of user, e.g., ui, can be
obtained by normalizing the badge numbers to the range of [0, 1]
with equation #(ui)−#min
#max−#min , where #(ui) is the number of badges
achieved by ui and #max and #min are the maximal and mini-
mal number of badges achieved by users in U respectively.
Inference of User Ability Vector: In the training set, user ui's in-
= (ai,1, ai,2,··· , ai,m)
ferred ability vector is defined to be ainf er
of length m = B, where ai,j is the number of times that ui ob-
tained badge of category bj in the training set. Each user is assumed
to have the same amount of ability but can be distributed differ-
ently. Vector ainf er
is normalized by the total number of achieved
i
badges to ensure
= 1. Considering that users can have
(cid:12)(cid:12)(cid:12)ainf er
i
i
(cid:12)(cid:12)(cid:12)1
0.560.580.600.620.640.660.68AUC0.580.650.630.62linearquadcubicexp0.550.600.650.700.750.800.85AUC0.770.660.650.68comprehensivepersonal interestpeer leadershipnetwork trendas well. Meanwhile, what users can do in the game is to deter-
mine the distribution of their cumulative efforts, which is formally
defined as the strategy as follows.
Definition 13. (Strategy): A user's strategy refers to the options
that he chooses in a setting where the outcome depends not only
on his own actions but also on the actions of other users. A user's
strategy can determine the actions the user will take at any stage of
the game.
In badge systems, users strategy can cover various aspects of
their social activities but, in this paper, we refer to the strategy of
users as the way how they distribute their cumulative efforts for
simplicity. In game theory, strategy can be divided into two cat-
egories: (1) pure strategy, and (2) mixed strategy. The strategy
which is to select one single action in the game is referred to as the
pure strategy. In the given badge set B, a user ui can choose to
get one badge only, e.g., bj ∈ B, and devote all his/her efforts to
obtaining that badge, the strategy of which is a pure strategy.
Meanwhile, let Π(X ) be the set of all possible distributions over
set X . Then the set of mixed strategies for user ui is si = Π(Ai),
where Ai is the set of all possible actions that ui can take. The set
of all possible mixed strategy that ui can apply is represented as set
Si. For simplicity, we can just regard the cumulative effort distri-
bution vector ei = [ei,1, ei,2,··· , ei,m] as the action distribution
Π(Ai), i.e., user ui's strategy si = ei.
Given the user set U, we can represent the strategies of all users
in U except ui as s−i = (s1, s2,··· , si−1, si+1,··· , sn). Thus
we can write the strategies of all users in U as s = (si, s−i), where
sk = ek, k ∈ {1, 2,··· , n}. Meanwhile, depending on users'
various mixed strategies, different kinds of social activities will be
exerted in achieving badges, which can lead to different utilities.
Definition 14. (Strategy Utility Function): Given user ui's and
other users' strategies: si and s−i, the utility that ui can get based
on si and s−i can be represented as:
u(si, s−i) = utility(uisi, s−i)
m(cid:88)
=
utility(ui, bjsi, s−i).
j=1
Definition 15. (Strategy Domination): Let si and s(cid:48)
i be two mixed
strategies of user ui and s−i be the strategies of all other users in
U except ui. Then,
• Strict Domination: for ui, si strictly dominates s(cid:48)
i, s−i) for ∀s−i ∈ S−i, where S−i represents the set of
u(s(cid:48)
all potential strategies of other users except ui;
• Weak Domination: for ui, si weakly dominates s(cid:48)
i iff u(si, s−i) ≥
i, s−i) ∀s−i ∈ S−i and ∃s−i ∈ S−i, such that u(si, s−i) >
i, s−i);
i iff u(si, s−i) >
u(s(cid:48)
u(s(cid:48)
• Very Weak Domination: for ui, si very weakly dominates s(cid:48)
iff u(si, s−i) ≥ u(s(cid:48)
i, s−i) for ∀s−i ∈ S−i.
i
Definition 16. (Dominant Strategy): Let si be a mixed strat-
egy of user ui, si is a (strictly, weakly, very weakly) dominant
strategy iff si can (strictly, weakly, very weakly) dominate s(cid:48)
i for
i ∈ Si, s(cid:48)
i (cid:54)= si, regardless of other users' strategies (i.e., s−i).
s(cid:48)
The optimal distribution of ui's cumulative efforts is identical to
the dominant strategy of ui, which can be obtained by solving the
following maximization objective function:
si = arg max
si
u(si, s−i),
Figure 8: Comparison of utility function and comprehensive
value function
i
i
i
1, uj
1, uj
2,··· , uj
2,··· , uj
+ (1.0 − α) · arandom
their hidden abilities, a random ability vector arandom
of length
m is generated whose cells contain random numbers in [0, 1] and
α · ainf er
is used as the final ability vector
of user ui. In this paper, we set parameter α = 0.85.
Inference of Badge Threshold: Badges which are hard to achieve
will be obtained later. For each badge bj ∈ B, we get all the users
who have achieved bj from the training set: {uj
k}. For
i ∈ {uj
k}, we organize all the badges obtained
user uj
by uj
i from the training set in a sequence according to their achiev-
ing timestamps, the index of bj in uj
i 's achieved badge list is ex-
tracted to calculate bj's threshold. For example, if ui have achieved
p badges in all and the index of bj in the list is q, then the thresh-
q . The threshold of badge
old of bj for ui is estimated as θj,i = p
bj is defined as the average of thresholds calculated for all these
users: θj = ηj
where ηj is a scaling parameter. Value
ηj is selected as large as possible but, at the same time, ηj needs to
ensure that for all users who have obtained badge bj in the training
2,··· , uj
set (i.e., ∀uj
1, uj
i devotes all his cumu-
lative effort to get bj, uj
i 's contribution can obtain bj in our model
and, in other words, his contribution can exceed θj.
k}). When uj
i ∈ {uj
(cid:80)k
o=1 θj,o
k
Based on the above inferred cumulative efforts, ability of users as
well as badge thresholds, we show the results achieved by the user
utility function in Figure 8 and also compare it with the compre-
hensive value function introduced before. From the results, we can
observe that the introduced user utility function can perform very
well in modeling users badge achieving activities. The AUC score
achieved by the user utility function is 0.83, which is 7.8% larger
than the AUC score achieved by comprehensive value function (i.e.,
0.77). As a result, user utility function can provide a more compre-
hensive modeling about users' badge achievement activities.
5. GAME AMONG USERS
In social networks, every user wants to maximize his/her util-
ity in achieving badges and the value of different badges for cer-
tain user may depend on other users social activities. As a result,
the badge achieving activities in online social networks can form
a game among users.
In traditional game theory, all the agents
(e.g., users in social networks) are all assumed to be self-interested,
which means that they have their own description about the states
of world they like the most and they will act in an attempt to bring
about these states of the world. "Self-interested" doesn't neces-
sarily mean that users tend to harm other users to maximize their
payoff, as it can also include good things happening to other users
0.600.650.700.750.800.850.90AUC0.830.77utilitycomprehensiveTable 3: Contributions of top 10 badges
badge name
Fresh Brew
Mall Rat
JetSetter
total contributions
27.6
26.2
24.5
23.2
21.8
17.8
16.4
13.7
12.9
12.6
total #
7878
7028
6468
6355
5728
4746
4361
3774
3580
3494
Hot Tamale
Great Outdoors
Pizzaiolo
Swimmies
Bento
Zoetrope
Flame Broiled
where si is the dominant strategy of ui and other users strategies
s−i ∈ S−i can take any potential value.
The above objective function is very hard to solve mathemati-
cally, as we may need to enumerate all potential strategies of all the
users (including both ui and other users) in the network to obtain
the global optimal strategy of ui. Based on the assumption that all
users are "self-interested", in this paper, we propose to calculate
the equilibrium state of all users strategy selection process instead
as follows:
We let the users to decide their optimal strategies in a random
order iteratively until convergence. At first, in the 1st round, we let
users to decide their optimal strategies in a random order. For ex-
ample, if we let ui be the first one to choose his "optimal strategy"
when other users are not involved in the system (i.e., s−i = 0), we
can represent strategy selected by ui's as:
si = arg max
si
u(si, 0).
Based on ui's "optimal strategy", other users in U −{ui} (e.g., uj)
will take turns to decide their own "optimal" strategies by utilizing
the selected strategies of other users. For example, let uj be the 2nd
user to decide his/her strategy right after ui. The "optimal strategy"
of uj can be represented as
sj = arg max
sj
u(sj,{si} ∪ 0).
And let uk be the last user to select the "optimal strategy" in the
1st round. Based on the known strategies selected by all the other
users, the "optimal strategy" of uk can be represented as
sk = arg max
sk
u(sk,{s1, s2,··· , sk−1, sk+1,··· , sU}).
After finishing the 1st round, we will start the 2nd round and all
users will decide their strategies in a random order. Such a process
will continue until all users' "optimal strategies" selected in round
k is identical to those in round k − 1 (i.e., the stationary state),
which will be outputted as the final optimal strategies of all users.
6. BADGE SYSTEM DESIGN
In addition to the game among users, there also exists a game
between users and badge system designer. Users in online social
networks want to maximize their utilities with as few efforts as pos-
sible. Meanwhile, badge system designer who decides the badge
system mechanism aims at maximizing all users contributions to
the network on the other hand. In this section, we will study how to
determine the optimal badge system mechanism, and provide de-
tailed simulation analysis about the designed badge system based
on the model of user badge achievement activities learnt from the
previous sections.
Figure 9: Simulation analysis of contributions achieved by
badge mechanisms containing different numbers of badges
For simplicity, we define the amount of contribution attracted by
a badge as the contribution of the badge as follows:
Definition 17. (Badge Contribution): For a given badge mecha-
nism M, where the placed badge set is B, the contribution of badge
bj ∈ B is defined as the total amount of contributions that users de-
voted to getting bj. Based on the optimal strategy si of user ui
obtained from the game objective function proposed in the previ-
ous section, badge bj's contribution can be represented as
c(bjM) =
ai,j si,j,
(cid:88)
ui∈U
where si,j is the optimal strategy ui selected to get badge bj.
Furthermore, for a given badge mechanism M, where the badge
set is B, the contribution of badge set B(cid:48) ⊂ B selected in badge
mechanism M can be represented as
c(B(cid:48)M) =
ai,j si,j.
(cid:88)
(cid:88)
bj∈B(cid:48)
ui∈U
Different badge system mechanisms can lead to different amounts
of contributions from users and the optimal one that can attract the
maximum contribution is defined as the dominant badge mecha-
nism.
Definition 18. (Dominant Badge Mechanism): Given a badge
mechanism M, in which the placed badge set is B, if M can lead
to more user contributions to the system than all the other badge
mechanisms, then M is defined as the dominant badge mechanism:
M = arg maxM c(M) = arg maxM c(BM).
Badge Mechanism can cover lots of different aspects, e.g., badge
categories, the total number of badges, tasks required to get these
badges, etc. In the following parts, we will analyze these aspects
one by one.
Definition 19. (Dominant Badge Category) For the given badge
mechanism M (in which the badge set is B), the dominant badge
category is defined as the badge category that can lead to the max-
imal contribution to the social network,
bj = arg max
bj∈B c(bjM).
According to the experiment settings introduced in Section 4,
users decide their optimal strategies with methods proposed in the
previous section. Based on users' optimal strategies, the top 10
most badge categories that can lead to the maximum contribution
are available in Table 3. In the table, we show the badge names,
number of times that users have obtain certain kind of badges and
123451020304050100200300400500Badge Number0100200300400500600700Contribution21.5941.7760.2777.5293.34187.53251.72307.24345.58380.67453.24474.41508.32520.25528.73Reward systems, e.g., badge system, have been widely employed
in online social networks, like Foursquare [3, 1, 4]. Antin et. al.
study the badges in online social networks from a social psycho-
logical perspective and give some basic introduction of badges in
Foursquare [3]. Large amount of badges are placed in Foursquare
and a complete list of Foursquare badges is available [1]. To ob-
tain badges in Foursquare, users need to reveal their locations by
checking in at certain locations. Carbunar et. al. study the problem
between privacy preservation and badge achievement in Foursquare
[4].
Users are all assumed to be "selfish" and want to maximize their
payoff, which will form a game among users in online social net-
works to compete with each other. There has been a growing litera-
ture on analyzing the game among users in online social networks.
Ghosh et. al.
[10, 7, 9] provide a game-theoretic model within
which to study the problem of incentivizing high quality user gen-
erated content, in which contributors are strategic and motivated by
exposure. Jain et. al. [13] present a simple game-theoretic model
of the ESP game and characterize the equilibrium behavior in their
model. Their equilibrium analysis supports the fact that users ap-
pear to be coordinating on low effort words.
To achieve the maximal contribution to the sites, many works
have been done on designing the badge system for online social
networks. Jain et. al. [12] study the problem of incentive design
for online question and answer sites. Anderson et. al. [2] study how
badges can influence and steer users behavior on social networks,
which can lead both to increased participation and to changes in
the mix of activities a user pursues in the network. Ghosh et. al.
[8] study the problem of implementing a mechanism which can
lead to optimal outcomes in social computing based on a game-
theoretic approach. Immorlica et. al. [11] study the badge system
design whose goal is to maximize contributions. Easley et. al.
[6] take a game-theoretic approach to badge design, analyzing the
incentives created by badges and potential contributors as well as
their contribution to the sites.
The badge system analysis and design problem studied in this
paper is a novel problem and different from existing works on re-
ward system analysis: (1) "steering user behavior with badges" [2],
which studies the incentives of badges in guiding users online ac-
tivities without considering the effects of social connections among
users; (2) "social status and the design of optimal badges" [11],
which provides theoretical derivations of the optimal badge system
design problem but fails to consider the game among users and the
game between users and badge system designer; and (3) "imple-
menting optimal outcomes in social computing: a game-theoretic
approach" [8], which tries to use a game theory based method to
analyze the motivations of users in getting badges but doesn't con-
sider the "badge system design" problem.
8. CONCLUSION
In this paper, we study the badge system analysis and design
problem, which covers (1) badge system analysis and (2) badge
system design problem. We introduce the three different categories
of badges value functions for users in online social networks. To
depict users' payoff by achieving badges in online social networks,
we formally define the utility function for users. We solve the
"badge system analysis" problem as a game among users in so-
cial network and address the "badge system design" problem as a
game between badge system designer and the users. Experiments
conducted on real-world badge system dataset demonstrate that our
model can capture users' motivations in achieving badges online
very well and design badge system mechanism that can lead to
maximal contributions.
Figure 10: Simulation analysis of contributions achieved by
badge mechanisms of different badge thresholds
the contributions of each badge. Generally, popular badges (i.e.,
badges achieved by many users) can attract more contributions from
users according to the results.
Definition 20. (Dominant Badge Category Set) For the given
badge mechanism M and badge set B, the dominant badge cat-
egory set of size K is defined as the badge subset B', B(cid:48) = K,
which can lead to the maximal contribution to the social network,
B(cid:48)
= arg
max
B(cid:48)⊂B,B(cid:48)=K
c(B(cid:48)M).
To analyze the effects of badge numbers on the global contribu-
tions of badge system, we select the top K, K ∈ {1, 2,··· , 5, 10, 20,
··· , 50, 100, 200,··· , 500} categories of badges from the network
and calculate the contribution of these badges. The simulation re-
sults are given in Figure 9, where the total contribution of all these
top K badges will increase as K increases, but the speed of the
growth will slow down when K is large enough (e.g., K ≥ 100).
It supports that small number of badges are already enough to ap-
proximate the optimal revenue as introduced in [11].
Another key factor in badge system design is the badge thresh-
olds and the optimal badge thresholds is formally defined as the
dominant badge threshold as follows.
Definition 21. (Dominant Badge Threshold) For the given badge
mechanism M and badge set B, the dominant badge threshold θ is
defined as
θ = arg max
θ
c(BM, θ).
We also study the effects of badge thresholds on the overall con-
tributions of these badges to the network and the simulation analy-
sis results are given in Figure 10. To simplify the experiment set-
ting, we set the thresholds of all badges with the same value in
{0.0, 0.1,··· , 0.9, 1.0} and get the contributions obtained by the
badges. As shown in Figure 10, the contribution of all these badges
is 0 when the threshold is 0 and 1.0, where threshold 0 denotes
that users can get badges without paying any efforts; threshold 1.0
means that users need to devote all their efforts on getting the badge
corresponding to the area that all their ability lies in (i.e., ability in
this area is 1.0). Contributions made to the network will increases
fast as badge threshold increase at the beginning and can achieve
the maximal contribution when threshold is 0.3 and 0.4 and then it
will decreases.
7. RELATED WORK
0.00.10.20.30.40.50.60.70.80.91.0Badge Threshold0100200300400500600700Contribution0.0258.47476.98559.34534.92352.14219.46113.7943.2112.560.09. REFERENCES
[1] Foursquare badge list. Badge list available at
http://www.4squarebadges.com/
foursquare-badge-list/.
[2] A. Anderson, D. Huttenlocher, J. Kleinberg, and J. Leskovec.
Steering user behavior with badges. In WWW, 2013.
[3] J. Antin and E. Churchill. Badges in Social Media: A Social
Psychological Perspective. In CHI, 2011.
[4] R. Potharaju B. Carbunar, R. Sion and M. Ehsan. Private
badges for geosocial networks. TMC, 2013.
[5] A. Clauset, C. Shalizi, and M. Newman. Power-law
distributions in empirical data. SIAM Review, 2009.
[6] D. Easley and A. Ghosh. Incentives, gamification, and game
theory: An economic approach to badge design. In EC, 2013.
[7] A. Ghosh and P. Hummel. A game-theoretic analysis of
rank-order mechanisms for user-generated content. In EC,
2011.
[8] A. Ghosh and P. Hummel. Implementing optimal outcomes
in social computing: A game-theoretic approach. In WWW,
2012.
[9] A. Ghosh and P. Hummel. Learning and incentives in
user-generated content: Multi-armed bandits with
endogenous arms. In ITCS, 2013.
[10] A. Ghosh and P. McAfee. Incentivizing high-quality
user-generated content. In WWW, 2011.
[11] N. Immorlica, G. Stoddard, and V. Syrgkanis. Social status
and the design of optimal badges. arXiv:1312.2299v2, 2013.
[12] S. Jain, Y. Chen, and D. Parkes. Designing incentives for
online question and answer forums. In EC, 2009.
[13] S. Jain and D. Parkes. A game-theoretic analysis of the esp
game. TEAC, 2013.
[14] D. Liben-Nowell and J. Kleinberg. The link prediction
problem for social networks. In CIKM, 2003.
[15] J. Pei, J. Han, B. Mortazavi-Asl, H. Pinto, Q. Chen,
U. Dayal, and M. Hsu. Prefixspan: Mining sequential
patterns efficiently by prefix-projected pattern growth. In
ICDE, 2001.
|
1606.08103 | 2 | 1606 | 2017-10-10T01:04:51 | State power and elite autonomy in a networked civil society: The board interlocking of Chinese non-profits | [
"cs.SI",
"nlin.AO",
"physics.soc-ph"
] | In response to failures of central planning, the Chinese government has experimented not only with free-market trade zones, but with allowing non-profit foundations to operate in a decentralized fashion. A network study shows how these foundations have connected together by sharing board members, in a structural parallel to what is seen in corporations in the United States and Europe. This board interlocking leads to the emergence of an elite group with privileged network positions. While the presence of government officials on non-profit boards is widespread, government officials are much less common in a subgroup of foundations that control just over half of all revenue in the network. This subgroup, associated with business elites, not only enjoys higher levels of within-elite links, but even preferentially excludes government officials from the NGOs with higher degree. The emergence of this structurally autonomous sphere is associated with major political and social events in the state-society relationship. Cluster analysis reveals multiple internal components within this sphere that share similar levels of network influence. Rather than a core-periphery structure centered around government officials, the Chinese non-profit world appears to be a multipolar one of distinct elite groups, many of which achieve high levels of independence from direct government control. | cs.SI | cs |
State power and elite autonomy in a networked civil
society:
The board interlocking of Chinese non-profits
Ji Maa,b, Simon DeDeoc,d,∗
aIndiana University Lilly Family School of Philanthropy, 301 N. University Boulevard,
Indianapolis, IN 46202, USA
bIntetix Institute, Beijing 100875, PRC
cSocial and Decision Sciences, Carnegie Mellon University, 5000 Forbes Avenue,
dSanta Fe Institute, 1399 Hyde Park Road, Santa Fe, NM 87501, USA
Pittsburgh, PA 15213, USA
Abstract
In response to failures of central planning, the Chinese government has exper-
imented not only with free-market trade zones, but with allowing non-profit
foundations to operate in a decentralized fashion. A network study shows
how these foundations have connected together by sharing board members,
in a structural parallel to what is seen in corporations in the United States
and Europe. This board interlocking leads to the emergence of an elite group
with privileged network positions. While the presence of government officials
on non-profit boards is widespread, government officials are much less com-
mon in a subgroup of foundations that control just over half of all revenue in
the network. This subgroup, associated with business elites, not only enjoys
higher levels of within-elite links, but even preferentially excludes govern-
ment officials from the NGOs with higher degree. The emergence of this
structurally autonomous sphere is associated with major political and so-
cial events in the state-society relationship. Cluster analysis reveals multiple
internal components within this sphere that share similar levels of network
influence. Rather than a core-periphery structure centered around govern-
ment officials, the Chinese non-profit world appears to be a multipolar one
of distinct elite groups, many of which achieve high levels of independence
from direct government control.
Keywords: board interlock, NGO, civil society, elites, state corporatism,
state power, state-society relationship, social network, People's Republic of
1
China, non-profit foundations, common knowledge
∗To whom correspondence should be addressed.
Email addresses: [email protected] (Ji Ma), [email protected] (Simon
DeDeo)
Preprint submitted to Social Networks
October 11, 2017
1. Introduction
1.1. Board Interlock and State Power
When the boards of different organizations have members in common-
when their boards interlock -they can synchronize both their values and
behaviors in the absence of explicit central control [1, 2, 3, 4, 5]. Organiza-
tions that share key members in this fashion can reap the benefits of network
connections and solve coordination problems [6, 7].
Board interlock is widespread in free-market societies, where it emerges
in the business sector as means for coordinating decisions and building social
influence [8]. In many countries, it spans multiple sectors, and links together
the nonprofit, commercial, and political worlds [9, 10].
In the donation-
based charity sector, board interlock helps coordinate of efforts and share
of information [11], and enhances both a nonprofit's perceived legitimacy
and its capacity to acquire resources [12]. Among ethnic associations, the
"broker function" of board interlock generates and spreads political trust,
helping to build stronger civic communities and strengthening trust towards
government [13].
Much less is known about the political implications of board interlock
under authoritarian governments. For a government concerned with the dan-
gers of independent agents, interlock may be a benefit, because the resulting
coordination reduce the independence between organizations and make non-
government agents easier to control. However, these benefits exist only if the
government maintains control of the most central organizations in the result-
ing network. If it does not, board interlock may shift from an opportunity to
a threat: organizations may not only reap the benefits of coordination, but
now do so by coordinating around an independent agent.
Board interlock is crucial to understanding "infrastructural" forms of
state power [14].
Infrastructural power refers to the capacity of the state
to act through civil society, by penetrating, and thereby influencing, its in-
stitutions.
Infrastructural power is often contrasted with despotic power:
the ability of state elites to act without formal negotiations with civil soci-
ety, through top-down, unilateral action. The coordination enabled by board
interlock provides an important means by which a state might amplify infras-
tructural power-or, conversely, a means by which non-governmental actors
may reduce it.
The world of non-profit foundations in the People's Republic of China
provides a key test case for how a central authority confronts the challenges
3
of an emergent network of non-governmental organizations. In short: how
does an authoritarian regime deal with the counter-power that may develop
when agents of a putative civil society connect together?
1.2. How Much Autonomy? A Brief Introduction to Civil Society and the
Chinese Nonprofit Sector
While charities and "social organizations" appear early in China's history,
the majority were closed down during the Cultural Revolution in the 1960s
and 1970s [15]. The nonprofit sector only re-emerged during the reform era
of the 1980s, as part of the government's push to decentralize and devolve
power away from direct state control [16, 17]. In the following decades, the
sector has expanded so rapidly that scholars today ask whether or not it
represents the rise of a Chinese civil society: a dense network of groups that
bring together citizens to accomplish activities outside of government control.
That concept, civil society, has its origin in the 19th Century, when Alexis
de Tocqueville connected the early stages of American democracy to the
growth of voluntary associations of ordinary citizens for everything from the
promotion of temperance to the founding of schools [18]. Ever since, political
theorists and sociologists have tried to understand the role that these associ-
ations might play in the liberalization of authoritarian regimes and the early
stages of democratic rule [19]. The concept of civil society has continued to
evolve; in a recent study of the "illegal" NGO sector within China, Ref. [20]
quotes Ref. [21] to describe a neo-Tocquevillian concept of civil society as "an
autonomous sphere of social power within which citizens can pressure author-
itarians for change, protect themselves from tyranny, and democratize from
below". For these reasons, hard-line members of the Chinese government are
liable to view the very concept of civil society as a "trap" [22]. A central
theme of research on the Chinese nonprofit world is thus how autonomous
organizations can be in presence of state control [16, 23].
Yet the existence of non-governmental associations does not necessarily
imply a civil society in the Tocquevillian mode or even a threat to authori-
tarian rule. While countries in the West have accepted nonprofits that oper-
ate independent of government control, foundations in China must contend
with a one-party system potentially intolerant of organizations that might
hold it accountable or draw attention to its deficiencies, and that therefore
strives to control and monitor it. Concerns about the lack of autonomy
in the nonprofit sector have led many observers to talk in terms of state-
corporatism [24, 16], where the nonprofit sector is an auxiliary and dependent
4
system of the state. In the classic definition of Ref. [25], the relevant orga-
nizations in state-corporatism parallel those of government agencies, being
"singular, noncompetitive, hierarchically ordered, sectorally compartmental-
ized, interest associations exercising representational monopolies".
In general, civil society can be understood through a paradigm focused ei-
ther on conflict, or on contingent cooperation. Theories that focus on conflict
assume that the state and non-state organizations have goals that are in fun-
damental tension. These theories leave little room for extensive cooperation
between the two sectors. The neo-Tocquevillian conception of civil society
is the most explicit form of this conception, while, in the particular case of
Chinese non-profits, the idea of civil society as a challenge to state power can
be found in Ref. [26] which describes a "system of graduated control" where
the state exerts different control strategies over different types of nonprofits,
depending on the level of threat these extra-government organizations are
seen to pose.
By contrast, the contingent cooperation paradigm sees non-profits as po-
tential service arms of the state, at times able to implement the state's goals
in a more efficient and effective fashion. Spires' 2011 paper [20] popularized
an account of this form, based around the idea of a "contingent symbiosis"
between government and civil society, in which illegal NGOs are allowed to
operate as long as they relieve the state's responsibilities for social welfare.
Another example is provided by Ref. [17], which describes a "consultative
authoritarianism" that promotes at one and the same time an "operationally
autonomous civil society" and a "sophisticated authoritarianism that uses
more indirect tools of social control".
1.3. Networked Civil Society
Because of the power of the Chinese state, research into its nonprofit world
tends to focus on how much autonomy can exist in the presence of state con-
trol [16, 26, 23, 27]. Previous studies have documented the strategies and
tactics of individual nonprofits, either through case studies or the identifica-
tion of qualitative patterns of behavior across multiple cases [28, 29, 30, 17].
Civil society, however, is more than just the existence, and even the au-
tonomy, of non-governmental organizations.
It is how these organizations
connect together, in a horizontal fashion, to form something more than a
catalog of distinct endeavors [31]: organized "multiple, overlapping, and in-
tersecting sociospatial networks of power" [32].
5
To understand civil society in China, in other words, we must study not
only how the state acts on individual foundations, but also how it interacts
with the networks through which these foundations share personnel, infor-
mation, and resources. The infrastructural power the state exercises may be
both enhanced, and dissipated, by the horizontal connections between the or-
ganizations it penetrates. Board interlock is one of the primary mechanisms
for this self-organization to take place, and yet we know next to nothing
about how this process has unfolded, and the implications of this evolution
for civil society in twenty-first century China.
We will study the Chinese state-society relationship by looking at the
evolution of the non-profit board interlock network. To do this, we draw
on a large dataset of officially-registered nonprofit foundations. This dataset
records not only important information about each foundation, but also the
list of board members, enabling us to construct the board interlock network.
Our analysis can then operate at two levels simultaneously: (1) at the level
of the individual foundation, and (2) at the level of the network, where edges
between foundations are defined by the sharing of board members.
At the level of individual foundations, our data show the high level of
presence of government officials on foundation boards. Examination of how
the number of government officials varies by working areas and foundation
type shows how the presence of government officials correlates with activities,
and legal status, that the government is expected to be most concerned to
control.
At the network level, we find that board appointments connect together
a significant fraction of legal Chinese foundations into a single network. Our
results show the existence of network elites, associated with business en-
trepreneurs and their foundations, that form preferential ties to each other.
This subnetwork appears to preferentially exclude government officials from
its most central nodes, providing evidence that the network acts in part to
frustrate the magnification of state control that might be expected to arise
in the presence of board interlock.
The sharing of board members not only connects foundations together,
it also appears to preferentially connect them into clusters: groups of nodes
that, taken together, tend to preferentially connect to each other rather than
the other nodes in the network. This phenomenon has been studied quan-
titatively by Ref. [33], for the case of the board interlock network among
large corporations. In that study, the authors were particularly interested
to determine whether the interlock network showed either a classical "core-
6
periphery" structure based around a single hegemon, or evidence for a the
existence of a more "multipolar global order".
Such an analysis has a natural analog to the question of the extent of
civil society within a nation: do foundations interlock with a government-
controlled core, or do they associate into independent structures with central
positions that rival that of any putative hegemonic core? We find strong
evidence for the latter, detecting distinct clusters at the very center of the
network. These clusters show a strong bimodaility in levels of government
control, either preferentially excluding, or including, government officials.
The Chinese non-profit world is a multipolar one, with different groups at
the center showing distinct relationships to government control.
Taken together, our findings suggest the emergence of a form of network
autonomy that exists despite high levels of individual-level government ap-
pointments to nonprofit boards. At the same time, the association of this
network autonomy with the business elite-rather than "ordinary" citizens-
means that this autonomy may not lead to the kind of pluralism associated
with a Tocquevillian civil society.
2. Methods
2.1. Dataset and Network Construction
Our primary dataset is the Research Infrastructure of China Founda-
tions (RICF [34]; the underlying data is available at Ref. [35], and addi-
tional, processed files including the networks derived for this analysis are
available at [36]). The RICF database contains the records of the 3,344
legally-registered foundations within mainland China between 1981 and 2013.
Information about each foundation is drawn from six different sources, in-
cluding both official government reports and information submitted to the
government, or reported on websites, by the foundations themselves. Com-
paring RICF's counts to other reference sources, the RICF's data appears to
be at least 90% complete. The data is restricted to foundations allowed to
conduct fundraising; while these foundations are outnumbered by the much
larger number of less formal "associations", they are the most developed form
of non-profit institution, and control just over 76% of all non-profit funding
in the nation.1
1The 3,344 foundations in the RICF database control approximately 35.3 billion RMB
(B(cid:85)); this amounts to a large fraction of the 45.9 B(cid:85) of non-profit funding, tracked by
7
RICF strives to be as comprehensive as possible; it includes foundations
that may, for example, may be essentially defunct. Within RICF data is a
subset of foundations that have undergone an evaluation process, which rates
the foundations according to a set of criteria including governance structure,
financial transparency, and program effectiveness. Foundations which receive
a "3A" or above (3A+) are considered to have passed this evaluation. Be-
cause the 3A+ evaluation includes checks on transparency and reporting,
we expect the data associated with 3A+ foundations to be more reliable;
because it also includes checks on effectiveness and governance, we expect
these foundations to be more active. Comparing our analyses with the 3A+
set allows us to test for unexpected sensitivities to both data quality, and
foundation activity levels, in the database as a whole.
For each foundation, RICF logs the names, gender, and date of birth of
the board members. This allows us to resolve name collision and therefore
construct the board interlock network: two foundations are connected when
they share one (or more) board members. For simplicity in this analysis,
our network is unweighted: we consider only the presence or absence of at
least one shared member, and do not distinguish whether links are created
by sharing presidents, secretaries, or ordinary members. Extensions to the
study of weighted ties are certainly possible: one could, for example, con-
sider weighting the edge by the number of board members shared. Such a
weighting would add additional methodological complexities, however, since
foundations with larger boards will have the ability to form stronger ties with
each other. This may or may not correctly represent the underlying social
dynamics: if two foundations with very large boards share two members, it
may not make sense to represent them has having stronger ties to each other
compared to two foundations with very small boards and only a single mem-
ber in common. One could attempt to normalize the weights by board size;
in the case, however, that the two foundations so connected have different
sizes, we now have asymmetric edge weights. More sophisticated models yet
could be constructed, on the basis of a probabilistic model for connection
formation:
for example, one could consider edge weight relative to a null
model where ties are formed at random. In this analysis, for both simplicity
and to allow direct comparison to prior literature in other areas of the world,
the Ministry of Civil Affairs of China in 2013, for all "associations" and related classifica-
tions [37].
8
we follow the standard choice of unweighted edges.
The RICF data also contains the date of incorporation for each foun-
dation, allowing us to study how the final network assembled over time.
Inconsistencies in historical reporting rates and availability of data make it
difficult, if not impossible, to produce an exact history of entrances and de-
partures over time. We can, however, approximate this process by seeing how
the network would have assembled if the foundation's board had remained
unchanged to the present.
This is only an imperfect tracer of the more detailed question that includes
both the formation of a foundation, and the ways in which the network might
be altered by the addition or removal of board members. However, prior work
suggests that this approximation may not be that bad. A study of non-profits
in Spain found that initial boards were usually assembled by the founders,
and that while nonprofits needed a period of development to attract outsiders
as potential board members [38], this early growth appeared to stop when
the non-profit reached maturity. A study in the United Kingdom found
that the majority of nonprofit boards remained unchanged on timescales of
three years, and that it was difficult for to recruit new board members [39].
Little is known about the Chinese case, however; where relevant, we draw
attention to cases where "the structure at time t, given board compositions
in 2015" is only an approximation, at best, to "the structure at time t, given
board compositions at time t". In general, our dynamical analysis is limited
to asking questions of the form "when did organizations responsible for the
current trend join the system?".
2.2. Variables
Four critical variables help us characterize foundations at the individual
level.
Public Fundraising vs. Non-Public Fundraising. The main legal distinc-
tions in the Chinese nonprofit sector governs the scope of fundraising. "Pub-
lic fundraising" foundations are allowed to raise money from the general
public-for example, through fund drives and advertising-while "non-public
fundraising" foundations may not (as shorthand, we refer to these as "pub-
lic" and "non-public" hereafter). Moreover, public foundations are further
constrained by geography; "central-level" foundations may raise funds at the
national scale, while province-level and city-level foundations are restricted
geographically. The Chinese Charity Law, effective from 1 September 2016,
9
will nullify the distinction between public and non-public fundraising; how-
ever, the ability of organizations to raise funds from general public will still
be controlled by license issued from the state.2
Politically Sensitive vs. Politically Non-Sensitive. We supplement the
RICF by hand-coding the foundations' mission statements by whether or not
they are involved in a potentially controversial or politically sensitive area
("sensitive" vs. "non-sensitive"). Tracking this variable allows us to look
for systematic attempts to selectively control certain topics. If a foundation
has one or more of the following characteristics it is coded as "sensitive,"
otherwise it is coded as "non-sensitive" [20, 26, 40, 41]:
1. Involving advocacy, e.g., human rights, labor issues, and environmental
policy.
2. Involving international affairs, e.g., programs promoting international
cultural exchanges.
3. Involving religious or ethnic issues, e.g., Christian activities and Tibet
issues.
4. Involving the police or the legal system, or related "social stability"
(weiwen) issues.
In order to control the researchers' bias toward coding, two assistants,
who were unaware of the research purpose, were asked to independently
classify foundations, solely according to the information provided in their
mission statements. Discrepancies between the two assistants were finalized
by a third person who is a doctoral candidate in China studies.
State Power. Our main tracker of state penetration into the non-profit
sector is the number of government officials in senior management positions.
The presence of government officials on a foundation board is a clear mech-
anism by which the state can exercise control; at the same time the state,
at least explicitly, forbids government officials from serving on these boards.
Official law (Article 23) is that "principals" (the board chair (president),
deputy chair, or secretary general) should not be currently employed by the
state.3
2Xinhua News Agency: NPC hopes charity law can help poverty fight, available
at http://news.xinhuanet.com/english/2016-03/09/c_135172544.htm, last accessed
June 14, 2016.
3"Regulations
on
the Management
of
Foundations"
(4
February
10
Law against direct government involvement are commonly violated. The
standard annual reporting forms even asks foundations to report the number
of principals who are government staff; a non-negligible fraction (18%) report
non-zero numbers of current government officials. As a different measure of
state influence, we hand-coded the 3A+ foundations, noting whether or not
the board president is a current or retired government official. Hand-coding
is a difficult and laborious task; because it can be difficult to ascertain the
current status of individual, our 3A hand-coding includes both retired and
currently-serving government officials, and is thus not directly comparable
to the self-reporting set.
We thus count the number of government officials in three different ways.
The RICF counts the number of current government officials who serve as
principals; it also counts the number of simultaneously retired and senior
government officials who serve as principals; and (for a hand-coded subset)
it counts the number of either current or retired government officials who
serve as the board president. Note that the Article 23 law does not forbid
retired government officials from serving as board principals, and these people
may well still represent government influence [42].
Registration Level. Depending on their scope of operation, foundations
may be registered at the city level, the province level, or the central level.
Central-level registrations enable the foundation to operate on a national
scale. Registration level gives us information on both the scope of foundation
operation, and also allow us to look for preferential interlocking as a function
of both scope (e.g., do central-level foundations preferentially connect to
each other) geography (e.g., do same-city registrations connect preferentially
versus different-city).
3. Results
3.1. Individual-Level Statistics and the Presence of State Power
Table 1 shows the breakdown of the foundations in the RICF data. Col-
lectively, the 3,344 foundations in our data have a combined income of 35.3
Article
23;
original
text
2004),
cn/article/yw/shjzgl/fgwj/201507/20150700850200.shtml,
glish
regulations-on-the-management-of-foundations-chinese-text,
18 April 2016.
http://www.mca.gov.
En-
http://www.cecc.gov/resources/legal-provisions/
accessed
translation
available
at
see
last
at
11
Total Numbers
Yearly Income
Public
Non-Public
Non-sensitive Sensitive
954 (28%)
1913 (57%)
356 (11%)
121 (3%)
Public
Non-Public
Non-sensitive Sensitive
13.9 B(cid:85)
3.2 B(cid:85)
0.7 B(cid:85)
17.5 B(cid:85)
Table 1: Foundation status, activity, and yearly budgets (in billions of yuan; 1 B(cid:85) ≈
150 M$ in 2016) for the 3,344 foundations in our database. The majority of the foundations
are concerned with neutral (non-sensitive) activities, and the majority are restricted to
private fundraising. Despite the fact that non-public foundations can not raise money
from the general public, they actually control the majority of nonprofit revenue in the
network.
Official or Retired-Official President
(Hand-coded subset)
Official Principal
(Self-reports)
Public
Non-Public
Non-Sensitive Sensitive
74% ± 3%
79% ± 5%
41% ± 3%
29% ± 9%
Public
Non-Public
Non-Sensitive Sensitive
34% ± 1%
54% ± 3%
9% ± 2%
19% ± 4%
Table 2: Government presence on foundation boards is widespread, but variable. Despite
explicit laws against the practice, foundations often have government officials as board
principals. Hand-coding of a subset of 520 foundation presidents (left panel) shows that
the practice of incorporating current or retired government officials is widespread. In both
hand-coded data, and self-reports in annual filings (right panel), foundations able to raise
funds from the general public, and foundations concerned with government unfavorable
activities, are more likely to be controlled in this fashion.
billion RMB; approximately 5.5 billion USD at current exchange rates. Par-
alleling Tocqueville's accounts of the diverse initiatives of citizens in 19th
Century America, foundations in contemporary China range in activity in
everything from the promotion of the board game w´eiq´ı (Go) to legal aid
for the indigent. The majority are restricted to non-public fundraising, and
work in non-sensitive areas. These non-public foundations control just over
half of the total yearly nonprofit revenue in the country.
Despite laws to the contrary, our results confirm persistent and high levels
of state involvement in the governance of foundations. Table 2 shows the
relationship between fundraising scope and activity, relying on both the hand-
coded 3A subsample that tracks the affiliations of board presidents, and
official self-reports in the full database. Because the 3A hand-coding includes
12
Central
Provincial
City
Public
Non-Public
82% ± 1% 72% ± 1%
47% ± 2% 36% ± 2%
67% ± 1% 24% ± 1%
Table 3: The fraction of nodes of each type that share board members with other foun-
dations. The board interlock network extends to a significant fraction of all Chinese non-
profits. Both public and non-public fundraising foundations are highly integrated into the
overall network, with central-level foundations able to raise from the general public the
most connected of all.
retired officials, the two methods track slightly different phenomena.
Both methods confirm that the presence of government officials is less
for non-public foundations. The government is most involved in foundations
that are able to raise funds from the general public. (Self-reports, but not
our hand-coding, show additional supervision when the foundation itself is
associated with sensitive activities. Because this signal does not appear in the
hand-coded subset, it may be best-explained by differing incentives: public
foundations involved with sensitive activities may be more willing to report
government officials on their boards, despite the fact that this violates Article
23.)
3.2. Board Interlocking: Super-Connectors and Elites
Board interlock is widespread. A significant fraction of the foundations
are integrated into the network: of the 3,344 foundations, 1,411 (42%) share
board members with at least one other foundation, for a total of 1,863 links.
As shown in Table 3, foundations at the central level are the most likely to
be connected. Both public and private foundations show significant network
integration. A large fraction of this network is connects together, into a single
giant component that contains 1,022 foundations (see Fig. 1).
While the existence of board interlock parallels the dominant corporate
cases studied in the West, there are significant differences. Most notably, the
network is not small world: the average path length between nodes in the
giant component is 7.71, and the network diameter is 27; in both cases much
larger than the corporate board interlock seen in the United States [43].
The board interlock network in Chinese foundations, in other words, has
a tendency to isolate nodes from each other. Even if we restrict to the 77
central-level foundations in the giant component, the diameter remains large
(9 steps); by comparison, the network of Fortune 800 firms in the 1970s,
13
Figure 1: The giant component of the board interlock network, containing 1022 nodes
and 1626 edges; 75% of the nodes with non-zero degree, and 30% of the full database.
A simple spring loaded network layout algorithm allows us to visualize which nodes are
tightly coupled to many others (end up at the center), and which are connected to the
main network by only a small number of links to peripheral nodes. At the center are a
small number of interlinking elite super-connectors with high degree (Fig. 2; Fig. 3). Node
size is scaled by PageRank; node colors label the top ten largest clusters found using the
Louvain algorithm (see Table 7).
14
Figure 2: The degree distribution of the board interlock network. The distribution is
log-normal (dashed-line fit), and a small fraction of the nodes have unusually high degree.
nearly ten times larger, had a diameter of five [44]. Chinese foundations
connect to each other, but the existence of these long paths shows that board
interlocks are fundamentally limited in their ability to coordinate action on
the very largest scales.
While the network has few shortcuts and hubs that connect otherwise
distant nodes, it is also the case that a small number of foundations have very
high degree-they share an unusually large number of board members with
other foundations. We show the network degree distribution in Fig. 2. The
existence of these "super-connectors" can be empirically confirmed by testing
for heavy-tailed degree distributions; standard methods strongly prefer a log-
normal distribution to both an exponential (i.e., random-graph) and power-
law fit [45, 46].
These super-connectors appear to preferentially connect to each other,
suggesting the existence of highly connected elite groups (the "rich-club phe-
nomenon", first noted by Ref. [47]). Fig. 3 shows the rich-club coefficient in
the full, the public, and the non-public subnetworks. To read this figure, first
follow the solid line; that this line is rising as a function of k shows that, in
the full network, nodes with higher degree are more likely to connect to each
other than in a null model that preserves the node degree distribution but
otherwise shuffled connections. Now follow the dashed line, which considers
just the internal connections of the non-public subnetwork. This line shows
that this same phenomenon, seen in the full network, is even stronger here:
non-public elites are even more likely to preferentially connect within this
15
Figure 3: The rich-club coefficient as a function of k-core. High-degree organizations
("network elites") preferentially connect to other network elites, particularly in the non-
public network. This is apparent in how the rich-club coefficient grows as a function of
k-core level for the full network (solid line), the public network (dotted line), and the non-
public network (dashed line); 95% confidence ranges are shown. Nodes with high degree
are far more likely to connect to each other, compared to a null model that preserves
the degree distribution but otherwise breaks interlock correlations [74]. Taken separately,
the non-public network shows a stronger rich club effect than the network as a whole.
Meanwhile, the majority of high-degree links in the public network are due to cross-links
with the non-public foundations; the maximal degree for the public network in isolation
is much smaller.
16
subnetwork. Finally, note the (very short) dotted line. This shows at best
weak evidence for a rich-club effect when restricting to the public network.
The line is much shorter, because the public network, considered in isolation,
has few high-degree nodes: if a public foundation has high-degree in the full
network, it is usually because it connects to non-public foundations.
If we code nodes by the board president's profession, we find that the
highest degree nodes include both the government and the business elite.
Of the ten highest-degree foundations, six are associated with businesses,
four with government. For example, the most connected foundation is the
YouChange China Social Entrepreneurs Foundation, set up to encourage
philanthropic giving by wealthy entrepreneurs; the second is the Forbidden
City Cultural Heritage Conservation Foundation, which manages the state-
owned historical treasure. The top ten most connected board members are
also a mixture of both government and business elites; three are business
elites, six are current government officials, including members of the National
People's Congress, the CPPCC, and the Guangzhou People's Congress; and
one is a retired government official.
Considering the public and non-public networks separately allows us to
see how different groups dominate. In the public network, the highest-degree
nodes are nearly all associated with the government: of the top ten high-
est degree foundations, only two have a president with a non-governmental
background (a television celebrity, and the head of a hospital). By contrast,
six of the ten highest degree nodes in the non-public network are associated
with business elites. The highest degree node, for example, the YouChange
Foundation, is run by the businesswoman Ping Wang, whose background is
in international finance and law.
Board interlock is influenced by both geography and registration level; see
Table 4, paralleling classic results for corporate networks, co-located founda-
tions are far more likely to connect [48, 49, 50]. We also find evidence for
preferential connections between sensitive foundations; there are 70% ± 10%
more links between sensitive foundations than found in the null. However,
public- and non-public foundations appear to intermix freely and preferences
(though detectable) are weak; public foundations are only 16% ± 3% more
likely to link to each other than null, and only 17% ± 3% less likely to link
to non-public foundations.
17
Province
Central
×2.1 ± 0.1 ×0.73 ± 0.03 ×1.2 ± 0.2
Central
×7.05 ± 0.08 ×4.7 ± 0.5
-
Province (same)
×0.42 ± 0.01 ×0.46 ± 0.05
Province (different) -
×14.6 ± 0.9
-
-
City (same)
0
City (different)
-
-
City
Table 4: The number of links found between nodes of each type, compared to a degree-
preserving null. Foundations in the same region, and at the same registration level, tend
to cross link. Centrally-registered foundations are more than twice as likely to connect
to each other than in the null; province-level foundations connect to others in the same
province at rates seven times higher than the null, and city-level foundations are the most
cross-linked of all, linking to other city-level foundations in the same place at rates 14
times higher than expected.
Predictor
(Legal Status)
Central Level
Evaluation 3A+
Public
(State Power)
Current Official
Retired, Senior Official
(Intrinsic)
Board Size (z)
Income (z)
Age (z)
Sensitive Area
Non-Public
Network
Public
Network
0.72 ± 0.15(cid:63)(cid:63)(cid:63) 0.90 ± 0.16(cid:63)(cid:63)(cid:63)
0.33 ± 0.12(cid:63)(cid:63)(cid:63) 0.55 ± 0.12(cid:63)(cid:63)(cid:63)
-
0.17 ± 0.08(cid:63)
0.0 ± 0.1
0.31 ± 0.04(cid:63)(cid:63)(cid:63) 0.28 ± 0.04(cid:63)(cid:63)(cid:63)
0.19 ± 0.04(cid:63)(cid:63)(cid:63) 0.16 ± 0.04(cid:63)(cid:63)(cid:63)
0.00 ± 0.04
−0.03 ± 0.05
0.33 ± 0.16(cid:63)
−0.10 ± 0.08
R = 0.34
R = 0.42
-
−0.44 ± 0.13(cid:63)(cid:63)(cid:63) −0.15 ± 0.11
0.1 ± 0.2
Joint
Network
1.6 ± 0.2(cid:63)(cid:63)(cid:63)
0.66 ± 0.12(cid:63)(cid:63)(cid:63)
−0.1 ± 0.1
0.2 ± 0.2
0.52 ± 0.04(cid:63)(cid:63)(cid:63)
0.40 ± 0.04(cid:63)(cid:63)(cid:63)
−0.06 ± 0.04
0.13 ± 0.11
R = 0.44
Table 5: Predictors of node degree, in public and non-public fundraising networks, and in
the joint network, in a multiple linear regression. Non-public foundations preferentially
exclude current government officials from the highest degree nodes, even when controlling
for other variables. (z) indicates z-scored transformed real variables; all other variables are
binary for presence/absence. (cid:63) superscripts label significance: (cid:63) (p < 0.05); (cid:63)(cid:63) (p < 0.01);
(cid:63) (cid:63) (cid:63) (p < 0.001).
18
3.3. Network Effects: Penetration of State Power
We next consider how the presence or absence of government officials
predicts node degree. We use a multiple linear regression model, with node
degree as the dependent variable and nine independent variables: three vari-
ables describing the node's legal status (public vs. non-public; registration
level; evaluation level), four "nuisance" variables describing the intrinsic
properties of the foundation (board size, income, sensitive area, and age),
and two variables operationalizing the state power: (1) current government
officials, and (2) retired, senior-level government officials, the two fields in
the main RICF database. We consider both the full network, and the two
public and non-public networks separately. The results are shown in Table 5.
The most surprising results concern the relationship between the pres-
ence or absence of government officials, and node degree. Foundation de-
gree is (weakly) positively correlated with government presence in the public
foundations: nodes with higher degree are more likely to have government
officials. However, in the non-public network, high degree is strongly (and
significantly, p < 10−3) correlated with reduced government presence. When
the two networks are joined together, the two effects compete against each
other, partially canceling out. Significantly, we find no correlation for the
presence or absence of retired senior officials; only the absence of currently-
serving officials is predicted by node degree. To allow comparisons between
different networks, we use z-score transformed data; for example, in Table 5,
the presence of a current official as board principal in the non-public network
shifts node degree down by roughly 0.44 standard deviations (controlling for
other factors), where a standard deviation is measured for all the nodes in
the non-public degree distribution.
Because Table 5's results rely on self-reports, it is possible that these
effects may be driven in part due to differences in self-reporting. We can
check for this effect by using the hand-coded 3A subset; these results are
shown in Table 6; because the 3A hand-coding tracks only presidents, and
includes both current and retired officials, our results here are not strictly
comparable to the Table 5 case. The smaller size of this set also means that
our signal-to-noise is lower.
In this subset, the weaker correlation in the
public data is no longer detectable, but we still see the negative correlation
between network position and state presence.
19
Predictor
(Legal Status)
Central Level
Public
(Government Control)
President Official
(Intrinsic)
Board Size (z)
Income (z)
Age (z)
Sensitive Area
Joint
Network
2.6 ± 0.4(cid:63)(cid:63)(cid:63)
−0.3 ± 0.3
Public
Non-Public
Network
Network
1.06 ± 0.26(cid:63)(cid:63)(cid:63) 1.0 ± 0.5(cid:63)
-
0.06 ± 0.25
0.42 ± 0.09(cid:63)(cid:63)(cid:63) 0.60 ± 0.19(cid:63)(cid:63)
0.28 ± 0.09(cid:63)
0.38 ± 0.18(cid:63)
−0.04 ± 0.09
0.0 ± 0.2
0.4 ± 0.6
−0.40 ± 0.20
R = 0.32
R = 0.48
-
−0.68 ± 0.37(cid:63) −0.65 ± 0.34(cid:63)
0.81 ± 0.16(cid:63)(cid:63)(cid:63)
0.75 ± 0.15(cid:63)(cid:63)(cid:63)
0.0 ± 0.15
−0.4 ± 0.4
R = 0.44
Table 6: Predictors of node degree, in public and non-public fundraising networks, and in
the joint network; hand-coded 3A. Use of a different, hand-coded dataset for government
presence confirms the results of Table 5: non-public foundations preferentially exclude
current government officials from the highest degree nodes. The "president official" code
includes retired officials.
3.4. Network Clusters: Multipolarity
Following Ref. [33], we use the Louvain algorithm [51] to detect clustering
among the foundations in the network. The Louvain algorithm groups nodes
into clusters that maximize the total modularity, Q; informally, the modular-
ity for a cluster is defined the fraction of edges within that cluster, minus the
fraction of edges expected under a degree-preserving null model. When the
modularity is close to one, nodes in a cluster are strongly connected to each
other, and only weakly connected to nodes outside. When the modularity is
close to zero, by contrast, there is little evidence for the existence of clusters
of nodes that preferentially interconnect.
The foundation network shows strong modularity: the average Q for the
network is 0.816, and we find a total of 29 clusters. The top ten clusters by
membership include just over 50% of all foundations in the network. They are
shown, using different colors, in Fig. 1. The strong modularity of the network
points to the existence of structurally independent groups, a precondition
for multipolarity. However, it is possible for clusters to exist in the presence
of a strong core-periphery structure: a core hegemonic cluster could be at
the center of a set of more peripheral clusters. To test for this effect, we
20
Cluster Size (Nodes) Average Degree PageRank Government Presence
1
2
3
4
5
6
7
8
9
10
2.1%(cid:63)(cid:63)(cid:63) (low)
2.9%(cid:63)(cid:63)(cid:63) (low)
11%
15%
30%(cid:63)(cid:63)(cid:63) (high)
16%
24%
28%(cid:63) (high)
28%(cid:63) (high)
34%(cid:63)(cid:63)(cid:63) (high)
91
68
66
55
53
50
46
43
39
38
5.4 ± 0.6
3.3 ± 0.4
3.9 ± 0.4
4.3 ± 0.6
2.7 ± 0.4
3.1 ± 0.4
2.6 ± 0.2
2.9 ± 0.3
2.7 ± 0.2
2.6 ± 0.4
11%
7.0%
6.5%
5.7%
5.2%
5.1%
4.2%
4.0%
3.7%
3.5%
Table 7: Size (in nodes), average degree, total PageRank, and rates of government presence
on boards, in the ten largest clusters of the foundation network. Network power, as
measured by PageRank, is shared reasonably equally among the clusters. Six of the ten
networks show anomalously high or low levels of government presence compared to the
baseline rate of 17%.
consider the average degree of nodes within the cluster, as well as the total
PageRank of each cluster; PageRank provides an independent measure of
network centrality, based on a random-walker model, and can be interpreted
as a consensus measure of attention [52] or power [53].
The results argue for the multipolarity hypothesis. While the largest
cluster has higher average degree, and larger PageRank than the others in
the top ten, the effect is not strong, and power is shared remarkably evenly
among the largest clusters. We can quantify this using the Gini coefficient,
which for the top-ten clusters is 19%, where zero is perfect equality. Put
another way, the distribution of PageRank among the top ten clusters is
more equal than the famously egalitarian income distribution in Denmark
(Gini coefficient 25% [54]), and far less than seen in PageRank distributions
found in networks among pages in the world-wide web [52]. The existence of
multiple clusters with high degree and high PageRank is consistent with the
rich club effect found above: these highly central clusters preferentially link
within themselves.
Finally, for each cluster, we compute the fraction of nodes within the
system that have government officials on the board. This allows us to test
whether or not the clusters are defined by characteristic levels of government
involvement. For the top ten clusters, we find strong evidence for bimodality
21
in levels of government control. Clusters are much less likely to show "av-
erage" levels of government presence on boards, and tend to either extreme,
either strongly excluding government officials, or having far more than ex-
pected given the base-rate. Cluster-by-cluster in the top ten, we have four
cases where rates of government presence are either anomalously high, or
low, at the p < 10−3 level, and two more at the p < 0.05 level. The largest
and most central cluster of all has the lowest rates of government presence:
2.1%, eight times lower than the expected (null) rate of 17%. The exis-
tence of these extreme values in either direction allow us to reject the null
hypothesis-that rates of government presence are independent of cluster
membership-at p (cid:28) 10−6 in the standard Fisher test. A Bayesian model,
which explicitly models clusters as draws from one of two binomials with dif-
ferent values for the probability of government control, is strongly preferred
over a single binomial distribution at similar levels. These relationships are
shown in Table 7.
Taken together, these results suggest that the foundation network is a
fundamentally multipolar structure, where clusters have roughly equal levels
of network power and are subject to distinct levels of government control.
These clusters are further defined both by geography (since foundations with
provincial or city-level registrations tend to strongly associate, see Table 4)
and public/non-public status.
3.5. Longitudinal Analysis: the Emergence of Autonomy
How did these network effects evolve over time? Because board member-
ship changes over time, a full answer to this question would require knowledge
of the dates of both joining and departure for each member. In the absence
of this information, we can conduct an analysis of the evolution of this net-
work using the board compositions observed in 2015. This amounts to a
longitudinal analysis of civil society growth rather than a direct study of
network dynamics since we expect, particularly for the older organizations,
some changes in board composition due (at the very least) to retirement.
While this is, on short timescales and under the assumption that most or-
ganizations have relatively stable compositions year to year, a potentially
good approximation, such an analysis is better understood as answering the
question "when did the organizations responsible for the current structure
join the network".
Fig. 4 shows the three critical metrics over time, under these assumptions:
(1) the size of the public and non-public network over time; (2) the changing
22
Figure 4: Network evolution over time. As the non-public network grew (top panel), it
reported lower levels of government presence (middle panel); this contrasts with the growth
of the public network which began to report increasing levels of government presence in the
same period. In the years after 2008 (see text), the formation of new non-profits leads to
the emergence of a detectably negative relationship between node degree and government
presence in the non-public network (bottom panel): the highest degree nodes now appear
to preferentially exclude government presence.
23
levels of government presence on boards; and (3) the evolution of the node
degree–government presence relationship.
Overlaid on these panels are five critical dates in the recent history of the
non-profit sector: (1) 4 June 1989, the Tiananmen Square protests, and the
emergence of civil society in China [16]; (2) 15 September 1995, the Fourth
World Conference on Women, associated with the accelerating development
of civil society in China [55]; (3) 1 June 2004, the day the Regulations on the
Management of Foundations, including the above-discussed Article 23, took
effect; (4) the Sichuan Earthquake of 12 May 2008, according to Ref. [56], a
critical date in the expansion of the non-profit sector's horizontal linkages;
and (5) the 12th Five-Year plan for 2011–2015, introduced March 2011, which
devoted a full chapter to "social management innovation" as a key govern-
ment target. Fig. 5 shows the same plots, but now for the 3A+ hand-coded
subset, as discussed above.
Significant numbers of non-public foundations appear soon after the Tianan-
men Square protests, though none of the foundations from that year retain
3A+ status today. The effect of the 2004 Regulations on the growth rate is
clear: for at least the next five years, it led to literally exponential growth
in the number of both public and non-public foundations. The growth rate
in the non-public sector was significantly stronger, so that, by 2011, the
non-public sector was larger than the public one.
The effect of these same regulations on the levels of government super-
vision is more complex. The 2004 regulations meant that new organizations
reported lower levels of government principals in the non-public network.
This is consistent with new foundations becoming aware of, and responding
to, the restrictions of Article 23. This decline does not appear as strongly
in the 3A+ hand-coded subset, however, which suggests one of two explana-
tions: that new foundations are continuing to include government officials,
but staying within the letter of the law by including only retired officials, or,
that new foundations are continuing to include currently-serving government
officials, but under-reporting their presence in official paperwork. The effects
of Article 23 are inconsistent: the decline in reported government presence
does not occur in the public network; indeed, after 2008, reported government
presence starts to rise.
Most interesting are the effects of network growth on the relationship
between node degree and government presence.
In both the full network,
and the 3A+ hand coded subset, we see that organizations responsible for
the current negative relationship between degree and government presence
24
Figure 5: Network evolution over time; hand-coded 3A+ subset. Differences in overall
levels of supervision are do both to reporting effects, and the necessary inclusion of retired
officials in this set. Despite these coding differences, we see the same emergence of elite
autonomy signal (bottom panel) as in the full network; here the signal becomes detectably
negative after the introduction of the 2011 "Five Year Plan".
25
joined only late in the network history. Today the non-public network acts
to systematically exclude government officials from high degree nodes.
In
the full network, the negative relationship becomes strong enough to detect
soon after the Sichuan earthquake. In the 3A hand-coded subset, the down-
ward trend towards increasingly negative relationships between degree and
government presence becomes detectable only after the 2011 Five Year Plan.
4. Discussion
Our quantitative work here confirms the unusual nature of the state-
society relationship in contemporary China, one that appears to give signif-
icant network powers to independent, non-governmental agents. There are
high levels of network clustering and autonomy, and a strong, inverse rela-
tionship between network centrality and government supervision. The world
of Chinese non-profits is not simple one of command-and-control, where gov-
ernmental agents dictate by direct presence the actions of the most important
players in the network. The nature and strength of these ties may allow for
the kinds of decentralized decision-making and policy influence seen in a
recent qualitative study of civil society organizations in the country [57].
At the same time, our analysis shows that these foundations are hardly a
free-wheeling sector beyond the reach of government power. Our most basic
results confirm the persistent and high levels of state presence throughout
the non-profit world. The appointment of government officials to high-level
positions on foundation boards means that the government continues to hold
significant levels of direct influence. In Tocqueville's account of civil society
in the 19th Century United States, citizens formed voluntary associations
independent of the government itself. Whatever they are doing, the non-
profits of 21st century China are far from this 19th Century model, and far,
also, from models of post-Soviet democratization in Eastern Europe [19]. Our
quantitative results fit with what is widely seen in case studies and fieldwork
in China itself: state power may not be complete, but it cannot be ignored.
4.1. Inconsistent Control
Our results show significant differences in the level of governmental pene-
tration of the non-profit sector. This is most apparent among the non-public
foundations where, at least officially, only one in ten foundations have a cur-
rent government official as board principal. The government's relationship
to its foundations is bimodal, with public foundations showing the highest
26
levels of government involvement; not surprisingly, of this more supervised
group, the public foundations engaged in politically-sensitive topics receive
the greatest levels of supervision of all.
The unusual nature of these less-supervised, non-public foundations be-
comes apparent at the network level. A set of network elites are at the
center of the non-public network. These elites not only serve as hubs for
large numbers of other foundations, but preferentially connect to each other.
Examination of the profiles of the highest degree nodes shows that, in a par-
allel to the United States [9], the nodes responsible for these interconnections
are, primarily, the business elites.
Detection of this rich club effect provides a new view on the development
of horizontal relationships that can enable communication and cooperation-
a process captured in fieldwork studies of horizontal connections during the
2008 Sichuan Earthquake [56], and a missing piece for understanding the
development of state that increasingly devolves government functions to non-
government agencies [29].
That business elites play such a central role in the NGO network fits with
recent work that shows an increasing importance of non-corporate venues as
corporate networks fragment [58, 59, 60]. Our results go beyond a simple
demonstration of elite homophily, however, in showing how elites in an au-
thoritarian regime manage relationships with government officials.
In particular, our network analysis reveals an unexpected negative re-
lationship between node degree and government presence in the non-public
network. Not only is government penetration much lower overall in the non-
public foundations, it appears to have even less penetration to the founda-
tions at the network's center. Horizontal relationships between foundations
appear to selectively exclude the top-down "vertical" control of the state in
a form of structural autonomy.
These horizontal relationships are arranged in such a way to create a mul-
tipolar structure at the heart of the foundation network. Rather than a set of
core-periphery relationships, the network's high levels of clustering suggest
that the world of Chinese NGOs is fundamentally multipolar [33]. Distinct
clusters appear to share central places in the network, and the largely equal
share of network power given to each cluster means that there is little ev-
idence of a dominant hegemon to which all other clusters uniquely attach.
What inequality in network power exists appears, if anything, to be asso-
ciated with reduced levels of government presence: the two largest clusters
in the network have significantly lower levels of government presence than
27
expected.
4.2. Emergence of Elite Autonomy
A dynamical analysis of network formation, shows how recent the cre-
ation of this partially autonomous sphere has been. Negative relationships
between network power and government control appeal soon after the 2008
Earthquake (the downward trend in the 3A subset appears around this time
as well, but only becomes statistically significant in 2011). This result lends
new support to the qualitative studies of Ref. [56], which associated the earth-
quake to lasting cultural, political, and social changes in the non-profit world
that led to new forms of autonomous civil society. Ref. [61] supports these re-
sults from a different angle, suggesting the increasing importance of private,
as opposed to state-controlled, organizations in non-profit relief. In a com-
parative of study of how government-controlled and private firms responded
to the 2008 Earthquake, they found that private firms donated to relief more
rapidly, and at greater levels of financial assistance, that state-owned firms.
Even many years after the 2008 Earthquake, these effects persist.
One more recent political change comes from the government: the pro-
motion of "social management innovation" (chuangxin shehui guanli), a core
concept of state policy first introduced in the 4th Plenum of the 16th CCP
Congress in 2004 [62, 63]; the 12th Five-Year plan for 2011–2015 elabo-
rated the policy as a governance target, proposing "party leadership, govern-
ment responsibility, societal cooperation, public participation" as key princi-
ples [64], the use of civil society to provide social services, and a correspond-
ingly less rigid approach to controlling it [65]. Our results confirm the impact
of these further reforms: in the post-plan era, the negative relationship be-
tween government presence and node degree has persisted.
Crucially, our data does not include the so-called "grassroots", or illegal
NGOs that, while tolerated by the state, operate without legal sanction [20].
These NGOs sometimes include Communist party members on staff, are
largely tolerated by the state and often seen as socially legitimate organiza-
tions, and often provide essential services in cases where the state can not.
Despite their technical illegality, government officials sometimes even lend
explicit support to their mission. This qualitative work further suggests that
members of illegal NGOs are largely uninterested in organizing independently
in ways that might appear to threaten the state. Taken at face value, these
suggest that were data on the staff or board members of illegal NGOs to
28
be incorporated into our networks, we would find them in a core-periphery
relationships to the officially-sanctioned actors we study here.
4.3. Civil Society and the Meaning of Network Connectivity
Network connectivity is associated with the ability to form common knowl-
edge [66], and both simulations and theory suggest that nodes of high degree
play a crucial role when common knowledge is required for joint action [67].
The negative relationship between node degree and government presence ob-
served in our data then amounts to a form of structural autonomy. Taken
at face value, these results seem to suggest that foundations within this non-
public subset may be part of the emergence of a new civil society, whose
interlocks occur increasingly independently of the state, and whose resul-
tant capacity for independent coordination might even be seen as a threat to
authoritarian control.
The identification of these links with a Tocquevillian civil society is com-
plicated, however, by the fact that when the most connected of the non-public
foundations are not government in origin, they appear, instead, to be drawn
from the business elite. The extensive ties between the state and business
then suggest that this civil society is something less than might be expected;
ever since the reforms of the 1980s, scholars have suggested that the business
elite act as an agent of the government itself [68].
Indeed, this provides a clear alternate explanation: if the highest degree
nodes are sufficiently aligned with the government to begin with, they can
be allowed to operate without direct supervision-precisely as we see in our
data. Whether or not the elite are truly independent of the government,
their special position in society, and their ability to influence the government
financially [69] suggests that this civil society, such as it is, is far from the
pluralist Tocquevillian world of the ordinary citizen. Understood in this
context, and with the caveat that our work here is able to cover only the
official NGOs, and not the illegal sector, these results are perhaps more
consistent with the theory of "consultative authoritarianism", argued for by
Ref. [17], in which the government tolerates increasing levels of autonomy
among non-governmental organizations while developing new strategies of
indirect control. Networks of state power may overlap with ones defined by
economic exchange, but need not be coextensive [32].
Our results show that the government has come to tolerate communities of
interlocking associations that operate with lower levels of direct government
presence. Today, the total number of these organizations is small. The new
29
Charity Law, effective from 1 September 2016, allows a far greater number of
associations-potentially in the hundreds of thousands-to raise funds from
the general public. We expect the rapid expansion in both the size and
scale of the Chinese non-profit sector will radically increase its impact on the
state-society relationship.
4.4. Networked Civil Society and Multipolar Structure
Finally, our cluster analysis suggests that the social actors in civil society
are organized into larger clusters by horizontal relationships, and arranged
in such a way to creature a relatively equal relationship between the most
important clusters in the network: a multipolar world [33] of Chinese NGOs.
Distinct clusters appear to share central places in the network, and the equal
shares of network power given to each cluster is very different from a system
with a dominant hegemon to which all other clusters uniquely attach.
The clusters are not perfectly equal in network power. The inequality in
network power that does exist appears to be associated with reduced levels
of government presence: the two largest clusters in the network have sig-
nificantly lower levels of government presence than expected. This result,
concerning the most powerful clusters of individual nodes, parallels the re-
sults on elite autonomy among the nodes with greatest network power on the
individual level.
By allowing these more egalitarian, more horizontal structures to emerge-
and, further, by allowing the most important of these structures to operate
with increased independence from central monitoring-the state may have
made it possible for organizations to make more efficient use of local and dis-
tributed knowledge [70]. The patterns in which these new structures arrange
themselves call to mind classic theories of decentralized decision-making in
liberal societies that draw attention to autonomous, spontaneous, and "poly-
centric" orders [71, 72]. At the same time, persistently high levels of state
involvement in the sector frustrate a simple analogy to descriptions of liberal
states. Our account of Chinese civil society here, in terms of the simultaneous
presence of both horizontal (group-to-group), and vertical (group-to-state)
linkages, and the structural tensions between the two, finds parallels in re-
cent work on collective action in rural China [73], which identifies a new
class of "semi-integrated" organizations that can mobilize both horizontal
and vertical linkages at once.
Remarkably, the Chinese government does not appear to be combating
the emergence of a potential civil society counter-power either through direct
30
monitoring, or through disruption of network ties. There is plenty of evidence
that individual foundations in the official Chinese non-profit sector today are
relatively tame, with a strong tendency to align their goals with that of the
state [17]. Yet the underlying network structures that these organizations
have implicitly created have the potential to enable more independent ac-
tion and decision-making than one would expect; they are certainly very far
away from the highly centralized social structure and planned economy that
characterized mainland China during Mao's rule. Our work suggests that
the government will either increasingly employ less-visible strategies of con-
trol, or, conversely, come to accept the delivery of social and economic needs
through a rapidly-growing, complex, and increasingly autonomous sphere.
31
Acknowledgments
J.M. thanks Dr. Zhaonan Zhu and Bin Chen for assistance with coding; Qun
Wang and the RICF data quality team for data collection and data quality
control. S.D. thanks the Santa Fe Institute and the Alan Turing Institute
for their hospitality while this work was completed. We thank Dr. Peter
Frumkin and the 2016 Penn Summer Doctoral Fellows Program fellows, Dr.
Richard Steinberg, Dr. Lehn Benjamin, Dr. Bin Chen, Dr. Xinsong Wang,
Xunyu Xiang, Xiaoyun Wang, Bradi Heaberlin, and Torrin Liddell for their
valuable comments. The RICF project is supported in part by the Dunhe
Foundation.
32
References
References
[1] M. Fennema, H. Schijf, Analysing interlocking directorates: Theory and
methods, Social Networks 1 (4) (1978) 297 – 332. doi:http://dx.doi.
org/10.1016/0378-8733(78)90002-3.
[2] B. Mintz, M. Schwartz, Interlocking directorates and interest group for-
mation, American Sociological Review (1981) 851–869.
[3] M. S. Mizruchi, What do interlocks do? an analysis, critique, and as-
sessment of research on interlocking directorates, Annual Review of So-
ciology (1996) 271–298.
[4] G. F. Davis, H. R. Greve, Corporate elite networks and governance
changes in the 1980s, American Journal of Sociology 103 (1) (1997) 1–
37.
[5] D. D. Michael Dreiling, Corporate unity in American trade policy: A
network analysis of corporate-dyad political action, American Journal
of Sociology 116 (5) (2011) 1514–63.
URL http://www.jstor.org/stable/10.1086/657524
[6] C. Pombo, L. H. Guti´errez, Outside directors, board interlocks and firm
performance: Empirical evidence from Colombian business groups, Jour-
nal of Economics and Business 63 (4) (2011) 251–277.
[7] L. Faulk, J. Willems, J. McGinnis Johnson, A. J. Stewart, Network
connections and competitively awarded funding: The impacts of board
network structures and status interlocks on nonprofit organizations foun-
dation grant acquisition, Public Management Review (2015) 1–31.
[8] G. F. Davis, The significance of board interlocks for corporate gover-
nance, Corporate Governance: An International Review 4 (3) (1996)
154–159.
[9] G. Moore, S. Sobieraj, J. A. Whitt, O. Mayorova, D. Beaulieu, Elite
interlocks in three u.s. sectors: Nonprofit, corporate, and government,
Social Science Quarterly 83 (3) (2002) 726–744.
URL http://www.jstor.org/stable/42955819
33
[10] R. C. Barnes, Structural redundancy and multiplicity within networks
of us corporate directors, Critical Sociology 43 (1) (2017) 37–57. doi:
10.1177/0896920515580177.
[11] J. Galaskiewicz, W. Bielefeld, M. Dowell, Networks and organizational
growth: A study of community based nonprofits, Administrative Science
Quarterly 51 (3) (2006) 337–380.
[12] N. Esparza, S. H. Jeon, Interlocking boards of trustees and grant ac-
quisition among homeless service organizations, Public Performance &
Management Review 36 (4) (2013) 637–664.
[13] M. Fennema, J. Tillie, Civic community, political participation and po-
litical trust of ethnic groups, in: Multikulturelle Demokratien im Ver-
gleich, Springer, 2001, pp. 198–217.
[14] M. Mann, The autonomous power of the state: its origins, mechanisms
and results, European Journal of Sociology 25 (02) (1984) 185–213.
[15] Z. Ye, China's emerging civil society, Brookings Institution Center for
Northeast Asian Policy Studies, 2003.
[16] Q. Ma, The governance of NGOs in China since 1978: how much auton-
omy?, Nonprofit and Voluntary Sector Quarterly 31 (3) (2002) 305–328.
[17] J. C. Teets, Let many civil societies bloom: The rise of consultative
authoritarianism in China, The China Quarterly 213 (2013) 19–38.
doi:10.1017/S0305741012001269.
URL
S0305741012001269
http://journals.cambridge.org/article_
[18] A. de Tocqueville, Democracy in America, University of Chicago Press,
Chicago, IL, USA, 2000, edited and translated by Harvey C. Mansfield
and Delba Winthrop. Book II, Chapter 5.
[19] M. Walzer, The civil society argument, in: C. Mouffe (Ed.), Dimen-
sions of Radical Democracy: Pluralism, Citizenship, Community, Verso,
London, 1992, pp. 89–107.
[20] A. J. Spires, Contingent symbiosis and civil society in an authoritarian
state: Understanding the survival of Chinas grassroots NGOs, American
34
Journal of Sociology 117 (1) (2011) 1–45.
URL http://www.jstor.org/stable/10.1086/660741
[21] M. W. Foley, B. Edwards, The paradox of civil society, Journal of
Democracy 7 (3) (1996) 38–52.
[22] M. C. Keith Zhai, Provincial chiefs named as a new generation steps
up, South China Morning Post.
URL
provincial-chiefs-named-new-generation-steps
http://www.scmp.com/news/china/article/1195746/
[23] C. Hsu, Beyond Civil Society: An Organizational Perspective on State–
NGO Relations in the People's Republic of China, Journal of Civil So-
ciety 6 (3) (2010) 259–277. doi:10.1080/17448689.2010.528949.
URL http://dx.doi.org/10.1080/17448689.2010.528949
[24] S. H. Whiting, The politics of NGO development in China, Voluntas:
International Journal of Voluntary and Nonprofit Organizations 2 (2)
(1991) 16–48.
[25] P. C. Schmitter, Still the century of corporatism?, The Review of Politics
36 (01) (1974) 85–131, quotation from pp. 99-100.
[26] X. Kang, H. Han, Graduated Controls The State-Society Relationship
in Contemporary China, Modern China 34 (1) (2008) 36–55, c48. doi:
10.1177/0097700407308138.
URL http://mcx.sagepub.com/content/34/1/36
[27] J. Y. Hsu, C. L. Hsu, R. Hasmath, NGO strategies in an authoritarian
context, and their implications for citizenship: The case of the People's
Republic of China, Available at SSRN 2657187.
[28] R. J. Estes, Emerging Chinese foundations: The role of private philan-
thropy in the new China, Regional Development Studies 4.
[29] T. Saich, Negotiating the state: The development of social organizations
in China, The China Quarterly 161 (2000) 124–141.
URL http://www.jstor.org/stable/655983
[30] L. Yiyi, The autonomy of Chinese NGOs: a new perspective, China: An
International Journal 5 (02) (2007) 173–203.
35
[31] T. Salmenkari, Theoretical Poverty in the Research on Chinese
(2013) 682–711.
Civil Society, Modern Asian Studies 47 (02)
doi:10.1017/S0026749X12000273.
URL
S0026749X12000273
http://www.journals.cambridge.org/abstract_
[32] M. Mann, The Sources of Social Power: Volume 1, A History of Power
from the Beginning to AD 1760, Cambridge paperback library, Cam-
bridge University Press, Cambridge, UK, 1986.
[33] E. M. Heemskerk, F. W. Takes, The corporate elite community structure
of global capitalism, New Political Economy 21 (1) (2016) 90–118.
[34] J. Ma, Q. Wang, C. Dong, H. Li, A Database for Chinese Civil So-
ciety Studies: The Research Infrastructure of Chinese Foundations,
SSRN Scholarly Paper ID 2673879, Social Science Research Network,
Rochester, NY (Oct. 2015).
URL https://papers.ssrn.com/abstract=2896414
[35] J. Ma, Q. Wang, C. Dong, H. Li, The research infrastructure of Chinese
foundations, a database for Chinese civil society studies, Scientific Data
4 (2017) 170094. doi:10.1038/sdata.2017.94;.
URL http://dx.doi.org/10.1038/sdata.2017.94
[36] S. DeDeo, J. Ma, The Chinese NGO Board Interlock Network, http:
//bit.ly/china_ngo. Last accessed 18 August 2017 (2017).
[37] Ministry of Civil Affairs
statistics bulletin,
available at http://www.mca.gov.cn/article/zwgk/mzyw/201406/
20140600654488.shtml; last accessed 25 June 2016.
of China,
2013
[38] P. de Andr´es-Alonso, V. Azofra-Palenzuela, M. E. Romero-Merino, De-
terminants of nonprofit board size and composition the case of spanish
foundations, Nonprofit and Voluntary Sector Quarterly 38 (5) (2009)
784–809.
[39] C. Cornforth, C. Simpson, Change and continuity in the governance
of nonprofit organizations in the united kingdom: The impact of or-
ganizational size, Nonprofit Management and Leadership 12 (4) (2002)
451–470.
36
[40] M. Dai, Policing in the People's Republic of China: a review of recent
literature, Crime, Law and Social Change 50 (3) (2008) 211–227.
[41] A. Y. Jiao, Police and culture: A comparison between China and the
United States, Police Quarterly 4 (2) (2001) 156–185.
[42] D. D. Li, Changing incentives of the Chinese bureaucracy, The American
Economic Review 88 (2) (1998) 393–397.
URL http://www.jstor.org/stable/116954
[43] G. F. Davis, M. Yoo, W. E. Baker, The small world of the American
corporate elite, 1982–2001, Strategic organization 1 (3) (2003) 301–326.
[44] J. H. Levine, The network of corporate interlocks in the United States:
An overview, in: American Sociological Association Annual Meeting,
1977, cited in Ref. [43].
URL http://www.dartmouth.edu/~jlevine/Corporate1977.pdf
[45] A. Clauset, C. R. Shalizi, M. E. Newman, Power-law distributions in
empirical data, SIAM Review 51 (4) (2009) 661–703.
[46] J. Alstott, E. Bullmore, D. Plenz, powerlaw: A python package for
analysis of heavy-tailed distributions, PLoS ONE 9 (1) (2014) 1–11.
doi:10.1371/journal.pone.0085777.
[47] S. Zhou, R. J. Mondrag´on, The rich-club phenomenon in the internet
topology, IEEE Communications Letters 8 (3) (2004) 180–182. doi:
10.1109/LCOMM.2004.823426.
[48] T. E. Stuart, Network positions and propensities to collaborate: An in-
vestigation of strategic alliance formation in a high-technology industry,
Administrative Science Quarterly (1998) 668–698.
[49] O. Sorenson, T. E. Stuart, Syndication networks and the spatial distri-
bution of venture capital investments, American Journal of Sociology
106 (6) (2001) 1546–1588.
[50] J. Owen-Smith, W. W. Powell, Knowledge networks as channels and
conduits: The effects of spillovers in the boston biotechnology commu-
nity, Organization Science 15 (1) (2004) 5–21.
37
[51] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, E. Lefebvre, Fast unfold-
ing of communities in large networks, Journal of Statistical Mechanics:
Theory and Experiment 2008 (10) (2008) P10008.
[52] B. Heaberlin, S. DeDeo, The evolution of Wikipedia's norm network,
Future Internet 8 (2) (2016) 14. doi:10.3390/fi8020014.
URL http://www.mdpi.com/1999-5903/8/2/14
[53] E. R. Brush, D. C. Krakauer, J. C. Flack, A family of algorithms for com-
puting consensus about node state from network data, PLoS Computa-
tional Biology 9 (7) (2013) 1–17. doi:10.1371/journal.pcbi.1003109.
URL http://dx.doi.org/10.1371%2Fjournal.pcbi.1003109
[54] Central
online
Intelligence Agency, The World Factbook
2013–14,
available
https://www.cia.gov/library/publications/
the-world-factbook/rankorder/2172rank.html. Last accessed 25
September 2016 (2013).
[55] Q. Ma, Non-Governmental Organizations in Contemporary China:
Paving the Way to Civil Society?, Routledge Contemporary China Se-
ries, Taylor & Francis, 2005.
URL https://books.google.com/books?id=07KTtSVH2hUC
[56] S. Shieh, G. Deng, An Emerging Civil Society: The Impact of the 2008
Sichuan Earthquake on Grass-roots Associations in China, The China
Journal 65 (2011) 181–194, c48.
URL http://www.jstor.org/stable/25790563
[57] J. Teets, The power of policy networks in authoritarian regimes: Chang-
ing environmental policy in China: Teets, Governancedoi:10.1111/
gove.12280.
URL http://doi.wiley.com/10.1111/gove.12280
[58] G. Domhoff, Who Rules America? Challenges to Corporate and Class
Dominance, McGraw-Hill, New York, NY, USA, 2009.
[59] W. Carroll, The Making of a Transnational Capitalist Class: Corporate
Power in the 21st Century, Zed Books, London, United Kingdom, 2010.
38
[60] N. de Graaff, Oil elite networks in a transforming global oil market,
International Journal of Comparative Sociology 53 (4) (2012) 275–297.
doi:10.1177/0020715212460042.
[61] R. Zhang, Z. Rezaee, J. Zhu, Corporate philanthropic disaster response
and ownership type: Evidence from chinese firms response to the sichuan
earthquake, Journal of Business Ethics 91 (1) (2010) 51–63.
[62] F. N. Pieke, The Communist Party and social management in China,
China Information 26 (2) (2012) 149–165, c20.
URL http://cin.sagepub.com/content/26/2/149.short
[63] J. Schlaeger, M. Jiang, Official microblogging and social management by
local governments in china, China Information 28 (2) (2014) 189–213.
doi:10.1177/0920203X14533901.
URL http://cin.sagepub.com/content/28/2/189.abstract
[64] S.-J. Shi, The bounded welfare pluralism: public–private partnerships
under social management in China, Public Management Review (2016)
1–16doi:10.1080/14719037.2016.1183700.
[65] W. Shan, Social Management:
China Goes beyond Maintain-
(2013) 36–46.
ing Social Stability, East Asian Policy 05 (02)
doi:10.1142/S1793930513000147.
URL
S1793930513000147
http://www.worldscientific.com/doi/abs/10.1142/
[66] M. S.-Y. Chwe, Structure and strategy in collective action, American
Journal of Sociology 105 (1) (1999) 128–156.
[67] T. M. Liddell,
arXiv:1507.08282.
URL https://arxiv.org/abs/1507.08282
S. DeDeo, Common knowledge on networks
[68] M. M. Pearson, China's New Business Elite: The Political Consequences
of Economic Reform, University of California Press, 1997.
[69] D. Ma, W. L. Parish, Tocquevillian Moments: Charitable Contributions
by Chinese Private Entrepreneurs, Social Forces 85 (2) (2006) 943–964.
URL http://www.jstor.org/stable/4494945
39
[70] F. A. Hayek, The use of knowledge in society, The American Economic
Review 35 (4) (1945) 519–530.
URL http://www.jstor.org/stable/1809376
[71] M. Polanyi, The Logic of Liberty, Routledge & Kegan Paul, 1951.
[72] F. A. v. Hayek, The Constitution of Liberty: The Definitive Edition,
University of Chicago Press, Chicago, 2011, edited by Ronald Hamowy.
Originally published 1960.
URL http://site.ebrary.com/id/10578472
[73] Y. Lu, R. Tao, Organizational structure and collective action: Lineage
networks, semiautonomous civic associations, and collective resistance
in rural China, American Journal of Sociology 122 (6) (2017) 1726–1774.
[74] J. J. McAuley, L. da Fontoura Costa, T. S. Caetano, Rich-club phe-
nomenon across complex network hierarchies, Applied Physics Letters
91 (8) (2007) 084103.
40
|
1205.1456 | 1 | 1205 | 2012-05-07T16:45:09 | Dynamic Multi-Relational Chinese Restaurant Process for Analyzing Influences on Users in Social Media | [
"cs.SI",
"cs.LG",
"physics.soc-ph"
] | We study the problem of analyzing influence of various factors affecting individual messages posted in social media. The problem is challenging because of various types of influences propagating through the social media network that act simultaneously on any user. Additionally, the topic composition of the influencing factors and the susceptibility of users to these influences evolve over time. This problem has not studied before, and off-the-shelf models are unsuitable for this purpose. To capture the complex interplay of these various factors, we propose a new non-parametric model called the Dynamic Multi-Relational Chinese Restaurant Process. This accounts for the user network for data generation and also allows the parameters to evolve over time. Designing inference algorithms for this model suited for large scale social-media data is another challenge. To this end, we propose a scalable and multi-threaded inference algorithm based on online Gibbs Sampling. Extensive evaluations on large-scale Twitter and Facebook data show that the extracted topics when applied to authorship and commenting prediction outperform state-of-the-art baselines. More importantly, our model produces valuable insights on topic trends and user personality trends, beyond the capability of existing approaches. | cs.SI | cs | Dynamic Multi-Relational Chinese Restaurant Process
for Analyzing Influences on Users in Social Media
Himabindu Lakkaraju
IBM Research - India
[email protected]
Indrajit Bhattacharya
Indian Institute of Science
[email protected]
Chiranjib Bhattacharyya
Indian Institute of Science
[email protected]
2
1
0
2
y
a
M
7
]
I
S
.
s
c
[
1
v
6
5
4
1
.
5
0
2
1
:
v
i
X
r
a
ABSTRACT
We study the problem of analyzing influence of various fac-
tors affecting individual messages posted in social media.
The problem is challenging because of various types of influ-
ences propagating through the social media network that act
simultaneously on any user. Additionally, the topic composi-
tion of the influencing factors and the susceptibility of users
to these influences evolve over time. This problem has not
studied before, and off-the-shelf models are unsuitable for
this purpose. To capture the complex interplay of these var-
ious factors, we propose a new non-parametric model called
the Dynamic Multi-Relational Chinese Restaurant Process.
This accounts for the user network for data generation and
also allows the parameters to evolve over time. Designing
inference algorithms for this model suited for large scale
social-media data is another challenge. To this end, we
propose a scalable and multi-threaded inference algorithm
based on online Gibbs Sampling. Extensive evaluations on
large-scale Twitter and Facebook data show that the ex-
tracted topics when applied to authorship and comment-
ing prediction outperform state-of-the-art baselines. More
importantly, our model produces valuable insights on topic
trends and user personality trends, beyond the capability of
existing approaches.
1.
INTRODUCTION
Social networking sites, such as Twitter, Facebook, MyS-
pace etc, have proven to be extremely popular platforms for
users for sharing views and opinions using short posts1. Un-
derstanding and analyzing topics in social media has become
immensely important for a variety of stakeholders, such as
companies advertising products and identifying customer
segments, social scientists and national security agencies,
leading to a surge in research interest [15, 12, 14, 21, 1, 17,
23]. There are two major distinguishing features of social
media data. First, users are influenced by a variety of fac-
tors when posting messages. The four major factors have
been identified to be personal preferences of the users, their
immediate network of friends on the network, geographic or
regional issues and events and world-wide happenings [23].
While all factors typically affect all users, different users
have different 'personalities', in that they are influenced by
these factors in different degrees. Secondly, social media
data is inherently dynamic. Topics follow different 'trends';
individual interests of influential users, or issues starting off
within a small network of friends, sometimes lead to global
1Our work focuses on such micro-blogging sites.
upheavals, while other enjoying global popularity are slowly
relegated to individual favorites. Similarly, user personali-
ties also evolve and show trends over a geography or sub-
network.
Owing to these multitude of factors, and the intrinsic in-
terplay between them, analysis of social media data has been
a major challenge. Most existing approaches fall short of ad-
dressing the problem in its entirety, and only model isolated
factors and their interactions [17, 21, 1]. A major hurdle for
sophisticated models is the scale of the data; the associated
inference algorithms need to be scalable and efficient.
In this paper, we propose a non-parametric probabilistic
approach for analyzing social media data. Specifically, we
first propose an augmentation of the Chinese Restaurant
Process[16], called the Multi-Relational Chinese Restaurant
Process (MRelCRP), that accommodates users and multi-
ple relationships over them, for assigning topics to posts. By
using relationships, the MRelCRP defines a new and differ-
ent family of distributions compared to the traditional non-
parametric processes such as the Dirichlet Process [4], and
its hierarchical versions [20]. We further propose a dynamic
version of the MRelCRP (D-MRelCRP) that allows tempo-
ral evolution of the model parameters to capture topic and
personality trends. The rich interactions of various parame-
ters in the model are able to capture the various interplays
in social media data. Crucially, we propose an efficient and
multi-threaded algorithm, based on online collapsed Gibbs
sampling, for performing learning and inference for Dynamic
MRelCRPs.
We evaluate the proposed model on two large scale datasets.
The first dataset consists of 360 million posts from Twitter.
The second dataset consists of 300K posts from Facebook.
We demonstrate both qualitatively and quantitatively the
goodness of the topics discovered by our model. When em-
ployed for predicting authorship and user activity, models
using these topics significantly outperform state-of-the-art
baselines. More importantly, our model is able to discover
interesting and insightful topic and personality trends. For
example, our analysis shows that users posts are mostly in-
fluenced by personal preferences, rather than global, regional
or social-network factors, except in times of major world
events, when users become swayed by global influences at
the cost of personal preferences. We are not aware of any
existing model that can perform such a wide array of anal-
yses effectively on social media data.
The rest of the paper is structured as follows. We discuss
related work on social media analysis and topic models in
Section 2. We describe our proposed model in Section 3 and
the associated inference algorithm in Section 4. Experimen-
tal results are presented in Section 5 and we conclude in
Section 6.
2. RELATED WORK
Here, we discuss our contributions in the light of related
work in non-parametric probabilistic modeling and social
media analysis.
Non-parametric models: The Dirichlet Process (DP)
[4] is a prior over a countably infinite set of atoms, and is
popularly used as a prior for mixture models (DP Mixture
Model) in applications, where the number of clusters is dif-
ficult to provide as a parameter. The Chinese Restaurant
Process [16] provides a generative description for the Dirich-
let Process, and is useful for designing sampling algorithms
for DP mixture models. The distributions defined by these
models are exchangeable, in that different permutations of
the data are equally probable.
CRPs have been extended to handle distances and rela-
tions. The distance dependent CRP (DD-CRP) [7] takes
into account a distance matrix over the input data points.
Unlike the DP-HDP family, this results in a distribution that
is not exchangeable, which is a feature of many applications.
In comparison, the RelCRP uses an additional non-unique
label for each data point, and a general graph defined over
them. The resultant distribution is exchangeable. As such,
the DD-CRP and the RelCRP define different families of
distributions, and one cannot be represented by the other.
There is different body of work that use CRPs for modeling
relations [13] and their dynamic evolution [11]. These are
unsuitable for our current application, where we do topical
analysis of the data points, based on relations between their
(user) labels.
Many applications require multiple coupled Dirichlet Pro-
cesses. The Hierarchical Dirichlet Process (HDP) [20] is one
way to introduce coupling using a two level structure. The
HDP can be useful, for example, for extending the popular
Latent Dirichlet Allocation (LDA) model [8], for countably
infinite number of topics [1]. The HDP can be equivalently
represented by an extension of the CRP called the Chinese
Restaurant Franchise (CRF) [20]. Just as the CRF intro-
duces coupling between CRPs, the MultiRelCRP introduces
coupling between RelCRPs. However, the nature of the cou-
pling in the MultiRelCRP can be much richer, depending on
the relationships, as we explain in Section 3.2.
Temporal evolution has been addressed in the context of
non-parametric models [2, 3, 1], where the parameters of the
the corresponding static model become functions of time.
Some of the approaches are amenable to scalable inference,
while others are not. For the Dynamic MRelCRP, we use the
dynamic evolution of the parameters proposed in the con-
text of Recurrent CRF [3, 1], because of the scalability of
the associated inference problem. Note, however, that the
similarity between the Recurrent CRF and the Dynamic-
MRelCRP is only in the temporal evolution of model pa-
rameters. The static model is a HDP/CRF, as compared to
the RelCRP in our case.
Social Media Analysis: There has been a surge of lit-
erature on problems involving social media content. Work
has mostly been focused around (a) Content analysis on mi-
croblogs, (b) Inferring user interests and (c) Mining patterns
of variation on social media, as we discuss below.
(a) Most content analysis papers [10] use standard topic
models such as LDA [8] or basic metrics like tf-idf. Focusing
on the specific content of miroblogs, Ramage et. al. [17] pro-
posed an LDA variant that accounts for hashtags in content
analysis. One problem with this approach is that hastags
are not general features of social media data, and are of-
ten unreliable. There is little modeling work that takes into
account the rich features of social media such as network,
geography, etc.
(b) In the context of microblogging sites, content recom-
mendation approaches [15, 12, 14] assessing user interests
based on their activities. Recently, Wen et. al [21] have pro-
posed an approach which studies the influence of the network
on users. Ahmed et. al. [1] model the dynamics of user in-
terest and also the account generic popularity of a particular
item, but do not consider the influence of various external
factors like network of users and geography. Thus most of
related work either deals with the influence of a single factor
or user preferences.
(c) Yang et. al.
[23] made one of the first attempts at
understanding the temporal evolution of patterns on social
networking sites like Twitter. Apart from temporal dynam-
ics, study of such patterns with respect to geography and
other factors has not been explored for content on social
networking sites.
3. MODEL FOR SOCIAL MEDIA
In this section, we describe our Dynamic Multi-Relational
Chinese Restaurant Process model, which we employ to study
the interplay of world-wide, geographic, network and user
specific factors, and their dynamics, in social media. We
build up our model in steps, first describing the static Rela-
tional Chinese Restaurant Process, then incorporating mul-
tiple relations, and finally adding temporal evolution to it.
In our application, the basic task is to associate topics with
individual posts or tweets. The topics correspond to con-
cepts such as 'movies', 'sports', 'politics' etc. Unlike topic
models such as LDA [8], which associate a distribution over
topics with each document, we assume that each post, con-
sidering its shortness, corresponds to exactly one topic. This
makes the model simpler and the associated inference algo-
rithm more efficient and scalable.
3.1 Relational Chinese Restaurant Process
The Dirichlet Process [4] has become a popular non-parametric
prior in clustering applications, where the number of clus-
ters is not needed to be specified apriori, but instead grows
with the data size. The Chinese Restaurant Process (CRP)
[16] provides a fanciful description of the Dirichlet Process,
by imagining data points as customers being seated at ta-
bles, which represent clusters, as they enter the restaurant.
Let wi denote the ith data point, or post in our case, and zi
denote the cluster (or table assignment) for the post. Then,
given the assignments z1:i−1 of the first i − 1 customers to K
tables, the conditional distribution for the table assignment
of the ith customer is given by the CRP as follows:
P (zi = kz1:(i−1), α) ∝ nk
α
k ≤ K
k = K + 1
(1)
where nk is the number of customers already assigned to
table k. Note that this a 'rich gets richer' model, where
tables with more customers have a higher probability of get-
ting new customers, but new tables also have a non-zero
probability (α) of getting customers.
When each table i is associated with a (topic) distribution,
with parameters φi drawn iid from an appropriate base dis-
tribution H, the CRP can be used as a prior for mixture
distributions. Once the ith customer is seated at a table zi,
the corresponding data item wi can be drawn independently
from the distribution φzi associated with the table. For a
generative model for posts, each topic distribution can be
a multinomial M ult(φi) over the post vocabulary, so that
each word wij of the post is generated independently from
that topic, and the base distribution H can be chosen to be
a Dirichlet Dir(β), since it is conjugate to the multinomial.
Though defined as a sequential process, the CRP mix-
ture model can be easily shown to be exchangeable, which
means that all permutations of observed data {wi} have the
same probability under the model. The Chinese Restaurant
Process has been widely used in generative models for dif-
ferent applications [20, 19, 22]. However, it is unsuitable
for social media data, since it ignores a fundamental aspect
- the social network over users who generate the content.
Specifically, each post has associated with it a user variable
ui, that takes values from a finite set of users U. These
users are further connected by a network of relationships.
To accommodate this, we augment the Chinese Restaurant
Process to handle such relationships.
In the Relational Chinese Restaurant Process (RelCRP),
each customer (data point) is associated with a label ui ∈ U.
In the context of social media data, we will refer to each
element in U as a user, and say that each data point or post
has a user label. In addition, we have a relationship R, such
that each element r ∈ R is a subset of U. We can imagine
R as defining a set of hyper-edges over elements in U. Note
that we do not fix the candinality of the elements in R. We
will see the need for this shortly. Using R, we can define the
neighbors N (u, R) of an element u ∈ U as all other elements
that share a relation with u: N (u, R) = {u′ ∈ U : ∃r ∈
R, u ∈ r, u′ ∈ r}.
Given the additional ui labels and the relationship R, the
conditional distribution of the table assigned to the ith cus-
tomer is defined in RelCRP as follows:
P (zi = kz1:(i−1), u1:i, R, α) ∝ nN(R,ui)
k
α
k ≤ K
k = K + 1 (2)
where nN(R,ui)
assigned to table k.
k
is the number of neighbors of ui in R already
Let us now look at some example uses of the RelCRP in
the context of social media data. We start from the trivial
case, where the RelCRP reduces to the CRP, and then move
on to more interesting ones.
Influence of World-wide Factors: Very commonly
users are influenced by globally popular events or entities
when choosing a post topic. For example, users who are
not fans of Michael Jackson tweeted on this topic in the
event of his unexpected death. This can be captured in
the RelCRP by associating a unique label ui with each data
point, along with a 'complete' relationship Rw, that contains
a single relation (hyper-edge) over all u ∈ U. In this case,
Equation (2) reduces to:
Pw(zi = kz1:(i−1), u1:i, Rw, α) ∝ nk
α
k ≤ K
k = K + 1 (3)
where nN(Rw ,ui)
= nk is the number posts by all users
(which is the neighbor set of ui) already assigned to table
k
(topic) k. Note that this is the same as Equation (1). Thus
the RelCRP is able to recover the traditional CRP, using
unqiue data labels and a 'complete relationship'.
User's Personal Preferences: One of the most sig-
nificant factors influencing the content of a post is the pref-
erence of the associated user. A specific user may be more
interested in 'movies' that in 'sports' or 'politics'. Evidence
of this can be found in the topics of this user's earlier posts
- a user is more likely to post on a topic that she has used
more frequently. To capture this in the RelCRP, we set ui
to be user identifier, and simply construct an empty relation
Ru over U. Given (U, Ru), Equation (2) reduces to:
Pu(zi = kz1:(i−1),u1:i , Ru, α) ∝ nui
k
α
k ≤ K
k = K + 1 (4)
k
= nui
k
where nN(Ru,ui)
is the number of posts by user ui
(who is her only neighbor) already been assigned to table k.
Note that even the case of the empty relation Ru cannot be
captured by the traditional CRP.
Influence of Friend Network: A user is often influ-
enced by the post topics of her friends. To capture this,
as before, we set the label ui of the post to be the user id,
and construct Rn based on the friendship network: for each
follower or friendship relation between users ui and uj , we
add a tuple (ui, uj ) to Rn. Note that in this case all el-
ements of Rn have cardinality 2. Given (U, Rn), Pn(zi =
kz1:(i−1), u1:i, Rn, α) has the same form as Equation (2),
where nN(Rn,ui)
is now the number of times followees or
friends of user ui have posted on topic k.
k
Influence of Geography: As a final example, a user's
posts may also be influenced by geographic trends. For in-
stance, an national election draws a lot of attention from cit-
izens of that country. This can be captured by the RelCRP,
by again associating labels ui with user id's, and construct-
ing Rg to capture geographic locations: adding a hyper-
edge in Rg over all users in a specific country. Typically,
the geographic location can be known from the profile of
the user, and we assume such a construction to be possi-
ble. Note that in this case every edge has a different car-
dinality, and most will be extremely large.
Interestingly,
the RelCRP does not require maintaining the explicit rela-
tions, but only simple statistics over them. Given (U, Rg),
Pg(zi = kz1:(i−1), u1:i, Rg, α) again takes the form of Equa-
tion (2), where nN(Rg ,ui)
is now the number of times users
in the same geography as user ui have posted on topic k.
k
Thus, the RelCRP can be used to capture the different
posting patterns in social media within a single framework,
in a way that the traditional CRP cannot. Just like the CRP,
however, the RelCRP can be used to define a mixture model
by associating a topic with each table. It can be shown that
the resultant distribution remains exchangeable.
3.2 Multi-Relational CRP
We have seen that the RelCRP is able to model the in-
dividual effect of the world-wide factors, user preferences,
friend network and geographic factors when the labels and
relationships are appropriately defined. However, in real-
ity, all of these influences act simultaneously on any user,
and their interplay determines the content of each of her
posts. Further, this aggregate influence pattern is user-
specific. For example, different users are affected differently
by the same combination of world and geographic events.
We now present the Multi-Relational Chinese Restaurant
Process (MRelCRP) that captures such aggregate influences
using multiple relations defined over the same user labels.
The MRelCRP is characterized by a set of labels U, along
with m relations {Ri}m
i=1 defined over U. With the ith
data point (post), we associate an additional variable fi,
which takes values from {1 . . . m}, indicating the relation-
ship that influenced this data point. This depends on the
associated label (user) ui. For each label u ∈ U, there is a
m-dimensional multinomial distribution M ult(πu). Each πu
is assumed to be generated iid from a Dirichlet Dir(α). We
interpret πuj as the probability of label u being influenced
by the jth relationship Rj , i.e. P (fi = jui = u). We may
imagine πu as reflecting the 'personality' of user u. Given
these parameters, and the assignment of the first i − 1 posts
to K topics, the MRelCRP defines the conditional distribu-
tion of the topic assignment of the ith post with label ui as
follows:
P (zi = kzi:i−1, u1:i, α, {Rj }, {πu})
= X
j
πuijP (zi = kzi:i−1, u1:i, α, Rj )
(5)
which is a mixture of m individual RelCRP distributions,
defined according to Equation (2). This can be interpreted
as first selecting a particular RelCRP from a prior distribu-
tion specific to the label ui, and then selecting a table using
the selected RelCRP.
The aggregated influences in the post generation process
can now be captured by the MRelCRP framework, by con-
sidering the set of 4 relationships {Rw, Ru, Rn, Rg}. A 4-
dimensional influence factor πu is sampled for each user u
from Dir(αw, αu, αn, αg). This can be imagined to reflect
the personality of the user. Then, for each post, a topic is
selected for it, in two steps, using Equation (5). Finally,
the individual words in the post are sampled iid from this
selected topic. This is described in Table 3.2.
Table 1: Generative Process for MRelCRP
1. For each topic k
a. Sample φk ∼ Dir(β)
2. For each user u
a. Choose πu ∼ Dir(αw, αu, αn, αg)
3. For each post i
a. Choose fi ∼ M ult(πui )
b. Choose zi ∼ P (ziz1:i−1, u1:i, α, Rfi )
c. For the each word j of post i
i. Choose wij ∼ M ult(φzi )
Couplings in the MRelCRP:
It is important to ob-
serve the coupling that the MRelCRP creates between dif-
ferent RelCRPs, that helps capture the interplay of various
factors for social media. (a) First, we analyze the dependen-
cies for a single relationship Ri. Observe that there are N
RelCRPs, one for each user (label). However, all of these N
RelCRPs need not be distinct. This depends on the nature
of the relationship. For example, in the setting above, Rw
is a 'complete' relationship. As a consequence, the neighbor
sets are the same for all users, and the world-wide RelCRP
is identical for all users. For the geographic relationship
Rg, since the individual relations do not overlap, the ge-
ographic RelCRP is identical for all users from the same
country. This creates one type of dependence across users.
In contrast, for the friend relationship Rn, in general dis-
tinct users have different sets of friends, and their RelCRPs
are distinct. However, they are still coupled, since the un-
derlying topics are the same, and a post by user u on topic k
increases the count nN(Rn,u′)k for all friends u′ of u. Thus,
for all of these three relationships, evidence can flow between
users over hyper-edges in the relationship. Finally, for the
user preference relationship Ru, the RelCRP for each user
is distinct, and there are no dependencies. (b) Now, we an-
alyze the new dependencies that are created when multiple
relationships are coupled in the MRelCRP. Observe that for
m relationships, there is a total of m × N RelCRPs, m for
each user, but all of these need not be distinct, as above.
The m distinct RelCRPs for each user are now coupled; ev-
idence can flow between relationships through the users. In
the context of social media, this leads to interplay between
world-wide, geographic, network factors and personal pref-
erences.
3.3 Dynamic Multi-relational CRP
The two key distinguishing aspects of social media data
are the network structure, and the dynamic nature of the
topics and user influence patterns or personalities. The
MRelCRP captures the network aspect, but falls short on
the second count. Before extending our model, we first enu-
merate the different aspects of the data that evolve with
time. (a) The number of topics changes as old topics die out
and new topics are born. (b) Popularity of topics change,
world-wide, in specific geographies, sub-networks and in the
preferences of individual users. We call these topic trends.
(c) User personalities change, and they become more or less
susceptible to being influenced by world-wide, geographic,
network and individual preferences. (d) Existing topics also
evolve as new words enter the vocabulary and existing words
go out of fashion. We now propose the Dynamic Multi-
relational Chinese Restaurant Process (D-MRelCRP) that
accounts for all of these temporal evolutions. In reality, the
number of users also change over time and the network grows
or shrinks, but we do not consider this aspect in our current
model.
We assume that the data has been segmented into epochs,
or in other words, each data element is labeled with a time-
stamp that takes values from {1 . . . T }. In practice, epochs
may be appropriately defined (eg. hour, day, week, etc) de-
pending on the application. The Dynamic MRelCRP con-
sists of one MRelCRP for each epoch. We introduce depen-
dencies between the parameters of the MRelCRPs across
epochs to capture the different aspects of temporal evolu-
tion, as we describe next. We use additional subscripts on
parameters to indicate epochs.
Note that individual RelCRP's naturally allow the num-
ber of topics to change. We do not need to address this
separately in the D-MRelCRP.
3.3.1 Topic Trends
Different topics have different trends, in that some start
out being popular in certain geographies, to being global
hits. Some others may start as preferences of influential
individual users and evolve to regional or world favorites. To
capture this, topic popularities in our model need to change
over epochs. Since we have modeled popularity of topics
using counts, to make this approach dynamic, topic counts
of specific epochs are made dependent on those of earlier
epochs, following the approach of [1]. We extend the basic
RelCRP conditional distribution (Equation (2)) with epoch
indices as follows:
Pt(zi = kz1:(i−1), u1:i, R, α) ∝ nN(R,ui)
+ ¯nN(R,ui)
k ≤ K
k,t
k,t
α k = K + 1
k,t
is the number of neighbors of u in R already
where nN(R,u)
assigned to table k in the tth epoch, while ¯nN(R,u)
captures
the historical counts in recent epochs, with exponentially
decaying weights, as follows:
k,t
∆
¯nN(R,u)
k,t
=
X
e−δ/λnN(R,u)
k,t−δ
δ=1
where λ is the decay factor. The MRelCRP for tth epoch
is now defined using a mixture of such RelCRP conditionals
as in Equation (5).
3.3.2 User Personality Trends
It is natural for user personalities to be time dependent as
well. A user may become more susceptible to the influence of
her friends and deviate from her earlier personal preferences.
In the MRelCRP framework, this corresponds to the mixture
distribution πu for each user u being a function of the epoch.
Recall that each πu is sampled iid from a Dirichlet prior
Dir(αw, αu, αn, αg). We introduce a temporal dependence
by adding a dynamic component to the prior parameter, in
the spirit of [1], as follows:
the topic distributions φk and the personalities πu of the
users. The two problems are coupled, and solving them
exactly is intractable [8]. We resort to approximate tech-
niques based on collapsed Gibbs sampling. However, the
traditional approach [9], where the topic and influence la-
bels of each post are repeatedly sampled until convergence
from the conditional distributions given all other labels, is
infeasible for us given the size of the data. Even Sequen-
tial Monte Carlo methods [9], that rejuvenate a few older
labels, are infeasible. We adopt the online algorithm [6],
which was proposed for parametric models, and modify it
appropriately for our model. In this approach, earlier labels
are not revisited. This allows the algorithm to scale, at the
expense of sub-optimal estimates at the beginning, and is
also concordant with the online nature of social media data
[1]. Before describing the details, we first describe the con-
ditional distributions that are required by the algorithm.
Conditional Distributions:
In the online setting, the
distribution for the influence factor fi for the ith post is
conditioned on the topic and influence labels of all earlier
posts, their user labels and the content of the current post.
For the Dynamic MRelCRP, this looks as follows:
∝ (mu,f,t + ¯αu,f,t + αf ) × (n
P (fi = f α, ui, z1:i, f1:(i−1), w1:i, R)
N(Rf ,ui)
k,t
N(Rf ,ui)
k,t
+ ¯n
)
(6)
where, α ≡ {αw, αu, αn, αg}, and the counts are as defined
in Section 3.
The conditional distribution for topic label zi, additionally
conditioned on influence factor fi, is given by:
πu,t ∼ Dir(αw + ¯αu,w,t, αu + ¯αu,u,t, αn + ¯αu,n,t, αg + ¯αu,g,t)
¯αu,f,t = P∆
δ=1 e−δ/λmu,f,t−δ
∝ (n
N(Rfi
k,t
P (zi = kfi, β, z1:(i−1), u1:i, w1:i, R, α)
nk,v,t + ¯βk,v,t+β
r=1(nk,r,t+ ¯βk,r,t+β) k ≤ K
) QNi
N(Rfi
k,t
+ ¯n
,ui)
,ui)
k = K + 1
(7)
for f ∈ {w, u, n, g}, and mu,f,t being the number of times
user u was influenced by relationship f in epoch t.
3.3.3 Evolving Topic Distributions
The topic-word distributions φj also evolve with time. To
capture this, we again introduce a temporal dependence in
the prior distribution. Specifically, each topic distribution
φk,t is now sampled from Dir(βk,t + β). The element βk,w,t
of dynamic component βk,t depends on how frequently the
word w in the vocabulary has been historically observed un-
der topic k until epoch t − 1:
¯βk,w,t =
∆
X
δ=1
e−δ/λmk,w,t−δ
where mk,w,t corresponds to the number of times word w is
associated with the topic k in epoch t.
These three dynamic dependences introduced between the
parameters of the MRelCRPs corresponding to different epochs,
defines our complete D-MRelCRP.
4.
INFERENCE
In this section, we discuss the key challenges in performing
inference for the proposed D-MRelCRP model, and present
our inference algorithm addressing these challenges. The
inference problem involves determining the posterior dis-
tribution over the two latent variables variables, the topic
label zi,t and the influence variable fi,t, for all posts i in
all epochs t. The parameter estimation problem involves
finding the posterior distribution of the model parameters,
∝ α QNi
l=1
l=1
PV
nk,v,t + ¯βk,v,t+β
PV
r=1(nk,r,t+ ¯βk,r,t+β)
where, wil corresponds to the vth word of the vocabulary,
nk,v,t corresponds to the number of times vth word in the
vocabulary is associated with topic k during epoch t. Note
that online inference, the counts in the equations above cor-
respond to the data instances (posts) which have arrived
before the ith instance. Also, the conditional distributions
for the static model (MRelCRP) can be obtained by remov-
ing the historical counts in the above expression, specifi-
cally by setting ¯αu,f,t = ¯nN(R,ui)
= 0 in Equation (6), and
¯nN(R,ui)
= ¯βk,v,t = 0 in Equation (7). Similarly, the condi-
k,t
tional distribution for RelCRP, which has a single relation-
ship R can be obtained as a special case of the MRelCRP,
by taking counts nN(R,ui)
with respect to R.
k,t
Parallel Inference Algorithm:
A straight-forward
online algorithm, that makes a single sequential pass over
the data, is infeasible considering the scale of social media
data. This necessitates a parallelized inference algorithm.
Sampling based parallel inference algorithms for hierarchi-
cal bayesian models has received attention in the literature
[5, 18]. These approaches split data across threads or pro-
cessors, execute Gibbs iteration on them independently, and
finally, consolidates labels across threads asynchronously at
the end of each iteration.
In contrast, parallelization of
our algorithm results in independent, online updates in each
thread. Additionally, D-MRelCRP being a non-parametric
model, new topics are created by each thread, and in the
absence of repeated Gibbs iterations, are not sufficiently
k,t
consolidated. As a result, we require a synchronous archi-
tecture, where all new topics are explicitly consolidated by
a master thread at the end of each iteration. Our multi-
threaded inference algorithm is described in Table 2.
Table 2: Parallel Inference Algorithm
For each post i, sample zi, fi
Read first N posts
Iterate t times
Update joint counts
Iterate until no new post
Master Thread
1.
2.
3.
4.
5.
6.
7.
8.
9.
10. Wait until child threads complete
11.
12.
13. Update joint counts
Iterate t times
Read next N posts
For child thread j=1 to K
Send posts j(N/K) + (j+1)N/K, joint counts
Receive labels {zi, fi} for N/K posts
For each post with new label zi, sample zi, fi
Child Thread
1.
2.
3.
4.
5.
Sleep until invoked by Master Thread
Receive N/K posts, joint counts
Iterate t times
For each post i, sample zi, fi
Return N/K labels {zi, fi} to Master Thread
After an initial batch phase (master thread: steps 1-4),
the algorithm iterates over three phases: data access (master
thread: step 6), computation (child threads: steps 2-5) and
synchronization (master thread: steps 8-9, 11-13). The ini-
tial batch phase is necessary to prevent creation of too many
new topics at the beginning by different child threads. Note
that the computation phase happens in parallel across the K
child threads. Each child thread creates multiple new top-
ics, whose counts are maintained locally. These counts are
passed back to the master thread, along with other counts
at the end of the computation phase. After receiving back
labels from all child threads, the master thread re-samples
labels for all posts assigned new topics by child threads. This
helps in the consolidation of new topics, many of which may
otherwise be quite similar. The iterations continue until all
posts have been processed.
5. EXPERIMENTAL RESULTS
In this section we discuss in detail the experiments that
we carried out using the proposed D-MRelCRP model on
multiple large real social media datasets. We evaluate the
following aspects of the model:
(a) Model goodness: Ability to explain unseen data
(b) Topics and topic labels: Our inference and learning al-
gorithms assign a topic to each post, and also finds a distri-
bution over words for each topic. We evaluate both aspects
qualitatively and quantitatively.
(c) User personalities and their trends: The major distinc-
tive feature of our model is the influence label associated
with each post. Using this label, we are able to estimate the
user personalities, or the susceptibility of the user to various
influencing factors, and their dynamics. We discuss various
insights that we were able to find from personality trends.
(d) Scalability: One of the main strengths of our inference
algorithm is the ability to scale to hundreds of millions of
data samples. We evaluate how the running time of our
multi-threaded implementation scales with data size.
(e) Relative importance of factors: The MRelCRP and D-
MRelCRP models are able to combine together various influ-
ence factors and their dynamics. We analyze the usefulness
of the different factors for social media analysis.
We would like to point out that no other single model is
able to perform such a wide array of tasks in social me-
dia analysis. Wherever possible, we make use of available
ground truth or surrogates of it for quantitative evaluation
and compare against best available baselines. However, as
regards our main contribution - discovering user person-
ality trends - there does not exist any existing algorithm
that can perform this.
Datasets: We carried out all our experiments on two
different datasets: (1) Twitter: a collection of 360 million
tweets crawled between June and December 2009, and (2)
Facebook: a collection of about 300,000 posts obtained by
extracting feeds from publicly available profiles over a span
of three months.
Default Parameter Settings: The hyper-parameters of
our online Gibbs Sampler were initialized as : α = 0.1/K+1
and β = 0.1.
Baselines: We compare the performance of our models
against the following state of the art models that have been
shown to be effective for analyzing microblogs. (a) Latent
Dirichlet Allocation (LDA) [8] (b) Labeled LDA [17],
and (c) Timeline [3]. Labeled LDA is not very generally
applicable since it makes use of hashtags assigned to the
posts to identify topic labels. While this meta-information
is available on Twitter, Facebook does not support it. The
Timeline model is the closest to our model in that it is a non-
parametric topic model that also captures topic dynamics.
5.1 Model Goodness
Goodness of a model is evaluated by how well it is able
to fit previously unseen data. Perplexity is a commonly
used to measure generalization ability of topic models [8].
It is defined as the inverse of the geometric mean per-word
likelihood:
Per(Dt) = exp{− PM
d=1 Nd(cid:9),where Nd is
the number of words in the dth post in the held-out test
set Dt, and logP (wd) is its log-likelihood. Lower values of
perplexity indicate better generalization ability.
d=1 logP (wd)/ PM
We consider two different datasets for this experiment.
For each model under consideration, we first train it on Twit-
ter data, and then consider as test set a sample of 8 million
tweets from the last one month in our dataset. Similarly,
each model is trained on Facebook data, and evaluated on a
sample of 40K posts from the last month's activity. Perplex-
ities of various models are recorded in Table 3. Note that
unlike our model, LDA requires the number of topics to be
specified. We set it to the average number of topics discov-
ered by our model across epochs. Labeled-LDA cannot be
applied for Facebook data, since it requires hashtags. It can
be seen that D-MRelCRP has the least perplexity in both
the cases.Among baselines, Timeline has the best perplexity.
This demonstrates that capturing both temporal evolution
and relationships is important for explaining future data.
5.2 Quality of topics
The D-MRelCRP model assigns a topic label to each post,
indicating its category, and also finds a distribution over vo-
cabulary words for each unique topic label, indicating the
semantics of the topic. Our hypothesis is that by modeling
the different influences on the users, D-MRelCRP is able to
Table 3: Perplexity and Clustering Accuracy.
Model
DMRelCRP
Timeline
L-LDA
LDA
Perplexity
Twitter
1188.29
1582.86
1982.76
2932.06
Facebook
1562.34
1802.9
NA
3602.0
Clustering Acc. (Twitter)
nMI R-Index
0.93
0.81
F1
0.86
0.73
0.88
0.72
1
0.55
1
0.52
1
0.48
Table 4: Prediction Task Accuracies.
Facebook
Facebook
Model
DMRelCRP
Timeline
LDA
L-LDA
Authorship Prediction Commenting Prediction
Twitter
0.793
0.718
0.521
0.647
Twitter
0.683
0.582
0.429
0.542
0.648
0.579
0.482
NA
0.734
0.669
0.432
NA
better identify topics. To evaluate this, we check topic qual-
ity in different ways. We directly evaluate the topic labels
of posts by comparing against a reasonable gold-standard.
Then, we indirectly evaluate the topic labels of posts by us-
ing them as features in two prediction tasks. Finally, we
identify significant topic trends and compare them qualita-
tively with world knowledge. We provide more details on
these three evaluations next.
Clustering posts using topic labels.
In our proposed models, there is a single topic label asso-
ciated with each post. This results in a hard clustering of
the posts according to topics. Therefore, one way to evalu-
ate the topic assignment quality is to evaluate the clustering
accuracy. Gold standard clusters of posts is typically hard
to obtain. As an alternative, in the case of Twitter data, we
consider hastags as cluster indicators. Since it is well known
that hashtags are often poor indicators of post clusters, we
consider only a few authoritative hasgtags as follows. We
collected ∼ 16K posts with hashtags corresponding to highly
specific topics, such as #NIPS2009, #ICML2009, #bolly-
wood, #hollywood, #www2009 etc. We consider this as the
test set with gold-standard labels for evaluation.
We use three standard metrics to evaluate clustering ac-
curacy - Normalized mutual information, Rand index and
F-measure.
In Table 3, we record the performance of our
D-MRelCRP model, and those of the three baselines on the
Twitter dataset. Not surprisingly, labeled LDA correctly
identifies the clusters all the time, by virtue of taking hash-
tags as inputs. DMRelCRP comes close, in spite not using
knowledge of hashtags at all, and performs better than all
other models across all the three evaluation metrics. Fur-
ther, on closer inspection, we found that the Labeled LDA
clustering is not as good as the numbers indicate, and the
two proposed models are often better. For example, DM-
RelCRP splits the ∼3K posts corresponding to the #movies
hashtag into two topics, and separates out posts originat-
ing from India. Comparison using KL-divergence shows this
topic to be very similar to the #bollywood hashtag. The
#sports hashtag shows a similar split. Such fine-grained dis-
tinction is not possible for Labeled LDA, or Timeline, which
do not capture geographic or other influencing factors.
Prediction Tasks.
Since the cluster gold-standards for posts are unreliable
for Twitter, and unavailable for Facebook, we additionally
perform the following indirect evaluation of topic assignment
to posts. Topic labels are commonly used as reliable low-
dimensional features for learning classifiers [8]. We use the
topic labels for posts for two representative prediction tasks
in social media with reliable gold-standards: predicting post
authorship and predicting commenting activity.
Predicting Authorship: Given a post p and user u, this
task is to predict if user u is the author of post p. We con-
struct a Twitter test set having 20M tweets from the last
15 days, and a Facebook test set having 40K posts from the
last one month. For each user, we create training sets for
Twitter and Facebook by including as positives all posts au-
thored by that user, and as negatives a equal-sized random
sample from posts authored by other users in the recent
past. As features, we use the topic label of the post in-
ferred by a specific algorithm, and the time-stamp. We use
k-nearest neighbor classifier (k=5), where we consider mini-
mum distance between the post p posts authored by u, with
KL-divergence as topic distance and number of in-between
days as the time difference.
Predicting Commenting Activity: Given a post p by some
user v, the task is to predict if user u comments on the post.
We similarly construct test and training sets from Twitter
and Facebook. As an additional feature, we consider the
number of past interactions between users u and v. We
again use a k − N N classifier (k=5) for prediction.
The accuracies for both prediction tasks for different al-
gorithms are recorded in Table 4. It can be seen that DM-
RelCRP performs significantly better on both datasets. The
standard topic model baselines, and also Timeline, do not
perform very well on this task. This shows the usefulness of
topics inferred by considering both relationships and tem-
poral evolution. Labeled-LDA performs better than LDA,
but in spite of using hash-tags, is significantly outperformed
by our proposed approaches.
In summary, the topics inferred using our model are signif-
icantly more useful for prediction tasks involving users and
posts compared to state of the art topic models.
Topic Trending and Major Event Detection.
The inferred topic label for each post, in conjunction with
the user label, can be used to identify various topic trends.
From the joint counts nk,u,t of the number of posts by user
u at time epoch t on topic k, the probability pk,u,t of user u
posting on topic k at epoch t can be estimated by normal-
ization. By subsequent aggregation over subsets of users,
popularities of different topics across different user segments
can be plotted against epochs. When a particular topic k
dominates over all others in an epoch, we flag that topics as
a major event, and analyze it using the dominant words in
the topic distribution φk. We were able to identify several
break-out events using DMRelCRP topics labels, as we de-
scribe below.
World-wide Events: World wide popularity of a topic k at
epoch t is estimated by aggregating pk,u,t over all users u.
The major world-wide events discovered by D-MRelCRP in-
clude the demise of Michael Jackson (Jun 30) (top words:
mj, michael, dead, singer, jackson, pop), the Fifa World Cup
(Sep 15-30) (football, soccer, fifa, worldcup) and the launch
of Google Wave (Dec 1-15) (wave, invite, google, launching)
Geographic Events: The popularity of a topic k in a specific
geography at epoch t is estimated by aggregating pk,u,t only
over all users u in that geography. Jeff Goldblum's demise
(Jul 1-15) (death, jeff, actor, goldblum, dies, end, era) was
detected as major event in Australia and the UK.
We were able to verify these world-wide and geographic
major events using Google Insights2. The words from the
specific topics appeared in the top searches during these spe-
cific intervals, world-wide or in the specific geographies. We
were similarly able to find major events for small networks
of users (e.g. official page for Microsoft on Twitter @MSFT-
News and its followed pages) and for important individual
users (such as @ICML2009). In summary, DMRelCRP en-
ables us to discover interesting topic trends and major events
at different levels of granularity.
5.3 Analysis of Influences
The distinctive aspect of our model is the label fi indicat-
ing the influencing factor behind the ith post. It is difficult
to evaluate the accuracy of these inferred factors directly.
Instead, we focus on aggregate analysis that can performed
using this label, and the rich insights that we were able to
unearth using this.
Using the joint counts nk,u,f,t of topics (k), users (u) and
influence factors (f ) in each epoch (t), we can estimate the
probability pk,u,f,t of a specific user u posting on a topic k af-
ter being influenced by a factor f in epoch t, by normalizing
appropriately. On aggregating over topics k, the distribution
pu,f,t (corresponding to model parameter πu,t) over factors
f indicates the personality of the user u at epoch t. Plotting
these distributions over epochs t shows the personality trend
for user u. Since trends over individual anonymous users are
not insightful, below we plot aggregate trends over different
interesting user subsets. For this, we use heat-maps, where
the matrix rows correspond to influence factors, columns to
epochs and hotter colors indicate higher probability values.
World-wide Personality Trends: First, we aggregate
pu,f,t over all users to estimate the world-wide susceptibil-
ity of users to specific factors at a specific epoch (15 day
period). This trend is shown in the heat-map of Figure 1
(best viewed in color). The positions of the hotter colors
and the color gradients are of interest. We can observe that
the world-wide factor has the largest variance, followed by
personal preferences, while the other trends are largely flat.
Also, we can see that surges in world-wide influence happens
mostly as the expense of personal preference. The largest
such surge happens around Jun 30. This is when the news
of Michael Jackson's death broke on Twitter, and we can see
that users discarded their personal preferences and posted
about this event. The strength of world-wide influence then
subsides gradually, and users return to their personal pref-
erences. We can see that world-wide influence rises again
around Sep 15 and Dec 1, again at the expense of personal
preference. The most popular topics at these times were
FIFA World Cup and Google Wave. In summary, users are
usually influenced mostly by their personal preferences and
friend network, apart from times of significant world-events.
Personality trends in specific geographies: Next,
we aggregate pu,f,t over users in specific geographies to es-
timate susceptibility of users to specific factors in different
parts of the world. Personality trends for 5 different geogra-
phies, USA, UK, Australia, China, India, are shown using
heat-maps in Figure 2. We can see many interesting pat-
terns. The personality trends in USA, UK and Australia are
largely similar, apart from the geographic influences which
2http://www.google.com/insights/search/
User
Global
Geo
s
r
o
t
c
a
F
e
c
n
e
u
l
f
n
I
Network
World Wide
Time
0.6
0.55
0.5
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.1
Figure 1: World-wide personality trends
USA
UK
0.6
0.55
0.5
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.1
0.6
0.55
0.5
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.1
s
r
o
t
c
a
F
e
c
n
e
u
l
f
n
I
s
r
o
t
c
a
F
e
c
n
e
u
l
f
n
I
User
World
Geo
Network
User
World
Geo
Network
s
r
o
t
c
a
F
e
c
n
e
u
l
f
n
I
User
World
Geo
Network
User
0.6
0.55
0.5
Time
China
Time
Australia
0.45
0.4
s
r
o
t
c
a
F
e
c
n
e
u
l
f
n
I
World
Geo
0.35
0.3
0.25
0.2
0.15
Network
0.1
Time
Time
User
World
Geo
s
r
o
t
c
a
F
e
c
n
e
u
l
f
n
I
Network
India
Time
0.6
0.55
0.5
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.1
Figure 2: Personality trends in specific geos
are high at different epochs. For USA, one such high occurs
around Sep 15, when US Open is a dominating topic. For
UK, we can see at high around Aug 15 (Football, Premiere
League) and for Australia around Jul 1 (Jeff Goldblum's
demise). For India, the relative strengths of world-wide and
geographic influences are somewhat weaker. For China, the
pattern looks different. The strengths of the various influ-
ences stay relatively stable, and geographic influence is much
stronger than the other 4 cases.
Topic Character Trends: As a final example of the
variety of analysis that D-MRelCRP can perform, we look
at trends in topic characters. By aggregating pk,u,f,t over
all users and then using Bayes rule, we can find the pos-
terior distribution pf k,t over different influence factors for
each topic k at epoch t. By plotting this over epochs, we
can see how a topic changes its 'character', and moves from
a 'geographic' topic to a 'world-wide' topic, for example. We
illustrate this in Figure 3 (best viewed in color), using 3 top-
ics. Japan Earthquake evolved from a geographic topic to a
world-wide topic, Google Wave from a personal preference
topic to a world-wide topic, and Tiger Woods from a per-
sonal preference topic, to a geographic topic, and finally a
world-wide topic.
In summary, DMelCRP enables a wide variety of analysis
of influences, leading to many interesting insights, beyond
the capability of existing models.
5.4 Other Experiments
In our experiments, we have employed a Java-based multi-
threaded framework over an 8-core, 32 GB RAM machine.
We employed K = 7 child threads, read N = 35K posts in a
mini-batch, and used t = 100 Gibbs iterations per batch. In
Figure 4, we plot the time taken (in micro-secs) to process
one post by the multi-threaded version and a sequential ver-
Japan Earthquake
Google Wave
User
World
Geo
Network
0.6
0.5
0.4
0.3
0.2
0.1
User
World
Geo
Network
0.55
0.5
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.1
0.05
s
r
o
t
c
a
F
e
c
n
e
u
l
f
n
I
s
r
o
t
c
a
F
e
c
n
e
u
l
f
n
I
Jun15Jun30Jul15Jul30Aug15Aug30Sep15Sep30Oct15Oct30Nov15Nov30Dec15
Jun15Jun30Jul15Jul30Aug15Aug30Sep15Sep30Oct15Oct30Nov15Nov30Dec15
Time
Time
Tiger Woods
s
r
o
t
c
a
F
e
c
n
e
u
l
f
n
I
User
World
Geo
Network
Jun15Jun30Jul15Jul30Aug15Aug30Sep15Sep30Oct15Oct30Nov15Nov30Dec15
Time
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.1
0.05
Figure 3: Character trends of 3 topics
.
s
c
e
s
i
o
r
c
m
n
i
t
s
o
p
e
n
o
r
o
f
n
e
k
a
t
e
m
T
i
5000
4500
4000
3500
3000
2500
2000
1500
1000
500
0
Multi-threaded
Sequential
100
500
2K
10K 100K 500K 1M 50M 100M 200M 300M 380M
Number of posts seen
Figure 4: Scalability of inference algorithms
sion, after having processed N posts. This time increases as
the number of living topics increases with N . The two plots
clearly demonstrate that superior scalability of our multi-
threaded inference algorithm.
Finally, in Table 5, we analyze the contributions of the dif-
ferent aspects to DMRelCRP's final performance. We can
see that the model improves (both in terms of perplexity
and prediction accuracy) through the addition of more rela-
tionships and the interplay between them, which is the main
strength of the model.
6. CONCLUSIONS
In this paper, we have made a first attempt at studying
the important problem of analyzing user influences in gen-
eration of social media data. We have proposed a new non-
parametric model called Dynamic Multi-Relational CRP that
incorporates the aggregated influence of multiple relation-
ships into the data generation process as well as dynamic
evolution of model parameters to capture the essence of so-
cial network data. Our multi-threaded online inference al-
gorithm allowed us to analyze a collection of 360 million
tweets. Through extensive evaluations, we demonstrated
that the topic trends discovered by our model are superior
to those from state-of-the-art baselines. More importantly,
Table 5: Importance of Model Factors. Ru corre-
sponds to user preferences, Rw, Rn, Rg to world-wide,
friend-network and geographic factors, resp.
we found insightful patterns of influence on social network
users, beyond the capability of existing models.
7. REFERENCES
[1] A. Ahmed, Y. Low, M. Aly, and V. Josifovski. Scalable
distributed inference of dynamic user interests for behavioral
targeting. In SIGKDD, 2011.
[2] A. Ahmed and E. Xing. Dynamic non-parametric mixture
models and the recurrent chinese restaurant process: with
applications to evolutionary clustering. In SDM, 2008.
[3] A. Ahmed and E. Xing. Timeline: A dynamic hierarchical
dirichlet process model for recovering birth/death and
evolution of topics in text stream. In UAI, 2010.
[4] C. Antoniak. Mixtures of Dirichlet Processes with applications
to Bayesian nonparametric problems. Ann. Statist.,
2(6):1152–1174, 1974.
[5] A. Asuncion, P. Smyth, and M. Welling. Asynchronous
distributed learning of topic models. In NIPS, 2008.
[6] A. Banerjee and S. Basu. Topic models over text streams: a
study of batch and online unsupervised learning. In SDM, 2007.
[7] D. Blei and P. Frazier. Distance dependent chinese restaurant
processes. In ICML, 2010.
[8] D. Blei, A. Ng, and M. Jordan. Latent dirichlet allocation.
JMLR, 3, 2003.
[9] K. Canini, L. Shi, and T. Griffiths. Online inference of topics
with latent dirichlet allocation. In International Conference on
Artificial Intelligence and Statistics, 2009.
[10] L. Hong and B. Davidson. Empirical study of topic modeling in
twitter. In KDD Workshop on Social Media Analytics, 2010.
[11] K. Ishiguro, T. Iwata, N. Ueda, and J. Tenenbaum. Dynamic
infinite relational model for time-varying relational data
analysis. In NIPS, 2010.
[12] J.Chen, R.Nairn, L.Nelson, M.Bernstein, and E.Chi. Short and
tweet: experiments on recommending content from information
streams. In International Conference on Human Factors in
Computing Systems, 2010.
[13] C. Kemp, J. Tenenbaum, T. Griffiths, T. Yamada, and
N. Ueda. Learning systems of concepts with an infinite
relational model. In AAAI, 2006.
[14] H. Lakkaraju, A. Rai, and S. Merugu. Smart news feeds using
joint latent factor models. In World Wide Web, 2011.
[15] O. Phelan, K.McCarthy, and B.Smyth. Using twitter to
recommend real-time topical news. In ACM Conference on
Recommender Systems, 2010.
[16] J. Pitman. Combinatorial stochastic processes. Lecture Notes
for St. Flour Summer School, 2002.
[17] D. Ramage, S. Dumais, and D. Liebling. Characterizing
microblogs with topic models. In International AAAI
Conference on Weblogs and Social Media, 2010.
[18] A. Smola and S. Narayanamurthy. An architecture for parallel
topic models. In VLDB, 2010.
[19] E. Sudderth, A. Torralba, W. Freeman, and A. Willsky.
Tdescribing visual scenes using transformed dirichlet processes.
In NIPS, 2005.
[20] Y. Teh, M. Jordan, M. Beal, and D. Blei. Hierarchical dirichlet
processes. JASA, 2006.
[21] Z. Wen and C. Lin. On the quality of inferring interests from
social neighbors. In SIGKDD, pages 373–382, 2010.
[22] E. Xing, M. Jordan, and R. Sharan. Bayesian haplotype
inference via the dirichlet process. Journal of Computational
Biology, 14(3), 2007.
[23] J. Yang and J. Leskovec. Patterns of temporal variation in
online social media. In WSDM, 2011.
Perplexity
Commenting Pred
Facebook
Model
DMRelCRP(all)
MRelCRP(all)
MRelCRP(Ru, Rn, Rw )
MRelCRP(Ru, Rn)
MRelCRP(Ru, Rw)
RelCRP(Ru)
RelCRP(Rw)
RelCRP(Rn)
RelCRP(Rg)
Twitter
1188.29
1345.76
1602.86
1878.29
1802.31
1946.48
2008.59
1958.64
2212.83
Facebook Twitter
1562.34
1762.01
1890.72
2245.63
2100.01
2189.56
2400.45
2248.90
2890.02
0.683
0.602
0.653
0.567
0.512
0.461
0.289
0.478
0.329
0.648
0.538
0.602
0.556
0.54
0.508
0.187
0.423
0.201
|
1510.04411 | 2 | 1510 | 2015-11-15T06:47:17 | Reimagining Internet Geographies: A User-Centric Ethnological Mapping of the World Wide Web | [
"cs.SI"
] | We propose a new user-centric imagery of the WWW that foregrounds local usage and its shaping forces, in contrast to existing imageries that prioritize Internet infrastructure. We construct ethnological maps of WWW usage through a network analysis of shared global traffic between 1000 most popular websites at three time points and develop granular measures for exploring global participation in online communication. Our results reveal the significant growth and thickening of online regional cultures associated with the global South. We draw attention to how local cultural identity, affirmative state intervention and economic contexts shape regional cultures on the global WWW. | cs.SI | cs | User-Centric Ethnological Mapping of the WWW
1
Reimagining Internet Geographies:
A User-Centric Ethnological Mapping of the World Wide Web
Angela Xiao Wu & Harsh Taneja1
Suggested Citation:
Wu, A. X. & Taneja, H. (Forthcoming.) Reimagining Internet Geographies: A User-Centric
Ethnological Mapping of the World Wide Web. Journal of Computer-Mediated
Communication.
Abstract
We propose a new user-centric imagery of the WWW that foregrounds local usage and its
shaping forces, in contrast to existing imageries that prioritize Internet infrastructure. We
construct ethnological maps of WWW usage through a network analysis of shared global
traffic between 1000 most popular websites at three time points and develop granular
measures for exploring global participation in online communication. Our results reveal the
significant growth and thickening of online regional cultures associated with the global South.
We draw attention to how local cultural identity, affirmative state intervention and economic
contexts shape regional cultures on the global WWW.
Keywords
Cross-cultural Comparison; Internet Studies; Media Choice; Network Analysis; Regional
Cultures; Web Use.
1 Both authors contributed equally to this work. James Webster and Wendy Griswold
provided generous feedback on earlier drafts and Jan Servaes pointed to relevant literature.
Acknowledgments are also due to Sushant Tripathy for his programming support and Manu
Bhandari for proofreading the draft at a short notice. This project was made possible by the
research grants from the Internet Policy Observatory at the University of Pennsylvania, the
Journalism Library of the University of Missouri, and the C-Centre at the School of
Journalism and Communication at the Chinese University of Hong Kong
User-Centric Ethnological Mapping of the WWW
2
Reimagining Internet Geographies:
A User-Centric Ethnological Mapping of the World Wide Web
Our study is a conceptual and methodological endeavor to bring about newer
imageries of the World Wide Web (WWW) based on web usage. This approach signals a
shift in perspective from prioritizing Internet infrastructure1 (including technical connectivity)
to focusing on local user engagements. We empirically account for local communication
flows enabled by the WWW, making visible, on an unprecedented scale, aspects of Internet
use that remain “largely invisible” when “viewed from the perspective of network centers”
(Burrell, 2012).
To achieve this, we develop a research method that we call “user-centric ethnological
mapping of the WWW,” which empirically examines global web usage in terms of the scale,
cultural distance and thickening of local communication landscapes or “online regional
cultures.” We implement this mapping by analyzing shared audience traffic between the
world’s top 1000 sites, which generally draw over 99% of total web traffic, in 2009, 2011 and
2013. Our analyses show significant changes in global web use. Specifically, changes in the
composition of various online regional cultures as well as their size, distance and thickness
scores—measures we develop and compute in this study—demonstrate the rise of the global
South along the decentralization or de-Americanization of the WWW. Our study challenges
the predominant imaginations of the WWW and contributes to a fuller understanding of
actual user behavior online by documenting the recent development of the WWW into
distinct but interconnected regional cultures. We highlight the possible role of local cultural
identity and political economy, particularly specific types of government interventions, in this
evolution.
Reimagining the WWW: From Technical Features to User Practices
User-Centric Ethnological Mapping of the WWW
3
Searching for the images of the “Internet” on the Internet, one sees myriad portrayals,
some artistic illustrations and some based on certain empirical evidence. These maps reveal
“architectural plans, engineering blueprints, anatomical drawings, and statistical graphics;”
all attempt at providing a factual reality of the Internet (Dodge, 2008, p 352). Apart from
providing fascinating diverse images of the Internet, they provide insights into “how people
imagine the virtual territory” that aligns with certain “interests and desires” (Dodge, 2008, p.
13). More importantly, popular representations of the Internet, like representations of other
kinds of space, may function to legitimize the status quo without our being aware of it
(Graham, 2014).
Numerous studies have mapped the WWW based on hyperlinks between websites
(De Maeyer, 2013), and these consistently find that websites based in the US (and other G7
countries) receive links from websites based in the rest of the world, but few Western sites
link to sites in the non-Western world (e.g., Park, Barnett & Chung, 2011). Likewise a large
proportion of websites in most other languages link to sites in English, but few English
language websites link to other language sites (Daniel & Josh, 2011). This literature
considers a country’s position on the hyperlinks graph a proxy for its potential for
development, and predictors of their interactions with other countries (e.g, Schumate &
Dewitt, 2008; Park et al., 2011). Studies find similar results from mapping the WWW using
connections between countries based on Internet Service Providers (Ruiz & Barnett, 2014)
and webpages’ content (Chung, Barnett & Park, 2013). These maps, consistent with other
representations of the global digital divide (e.g., Graham, 2014) suggest that the Internet
replicates the modern world system, with the Western world at its “core” and the rest of the
world at its “peripheries.” Similarly, representations based on global Internet governance by
transnational civil society organizations (e.g., Reporters without Borders) typically highlight
the “balkanization” of this global medium due to nationally imposed regulations such as
User-Centric Ethnological Mapping of the WWW
4
access blockage, and developing countries that are not formal liberal democracies are
portrayed as the Internet’s “black holes.”2
All these imageries of the Internet - based either on technological infrastructure or
content—instantiate a “media-centric” view of communication. When communication is
premised on media technologies, there underlie unwarranted presumptions about usage. For
instance, a hyperlink may exist but few users may click on it (Wu & Ackland, 2014)3.
Providing more hyperlinks from Western sites to non-Western sites—making them less
peripheral in the process—does not guarantee actual information exchange between the West
and the Rest. Therefore, a core-periphery hyperlink structure does not equal to asymmetric
information flows (see Barnett & Park, 2014). In a similar vein, certain governments may
block some foreign websites, but most users may not access those sites even if they weren’t
blocked. What these media-centric maps share in common is not factoring, but taking
technical features as proxies for, actual Internet use usage. They tend to imagine the WWW
as a global medium upholding a constellation of undifferentiable masses and thus spaceless
and without geography (Graham, 2013, 2014).
Media-centric representations also allow certain ideological bias, in particular, the
championing of “Internet freedom” in US-led Western policy-making and popular media
discourses. Importantly, Internet freedom here refers to access without political interference
(Cramer, 2013; Mansell, 2014), and Internet governance debates thus center on state
censorship, especially state imposed access blockage, practices associated with countries with
political systems at odds with the US ideal of liberal democracy (McCarthy, 2011). Therefore
in the US-led popular understanding, these countries are the problematic troublemakers at the
margin, forming “black holes” that obstruct the realization of a web “without geography”
(e.g., Reporters without Borders, 2007).
Some emerging scholarship has begun to recognize the limitations of media-centric
User-Centric Ethnological Mapping of the WWW
5
imageries and discussions of the WWW. Without mapping actual user activities one cannot
envision changes in the WWW resulting from the rapid online adoption of the vast
populations’ from the “peripheral” Global South. For example, Burrell (2012) contests the
influential vision of the WWW as global system with a “universal digital language” (Castells,
1996, p. 2) and points out that the “Internet’s interoperability rests on what is more aptly
labeled a technical protocol,” which is “not the same thing as a human language” (p. 185).
During her ethnographic study of Ghanaian Internet use, Burrell (2012) realizes that “as
divergent social groups go online, they make over the cultural topography of the Internet
unevenly and heterogeneously” (p. 185). Barnett & Park (2014), finds the web to be an
aggregation of many “small world” networks based on language, geography and history a
trend which resembles how the world television landscape, once dominated by US produced
imports, now appears as a mosaic of vibrant “culturally defined markets,” rooted in regional
production centers (Straubhaar, 2007). What is perceived as politically coerced balkanization
of the Internet is in fact a fuller expression of linguistic and geographic boundaries, a
consequence of the global spread of web use (Taneja & Wu, 2014).
Further, a media-centric perspective that presumes media use upon technical access is
even more limited for the web than for traditional media. This is because, unlike in the days
of broadcast media when people were left with limited and spatially-bounded options, today
having access to the Internet means they could consume content from any corner of the
WWW, irrespective of where they reside. Hence, having mere technological access to the
“whole web” does not automatically imply that people would access everything they can;
rather, users inhabit a rather narrow slice of the WWW shaped by various social structures. It
is more inaccurate than ever to treat technologies as “proxies for the knowledge people draw
upon in order to make sense of their world” (Mansell, 2013, p. 15) and to attribute to
technical access the lack of use (e.g., of the Western web) at analytical levels such as
User-Centric Ethnological Mapping of the WWW
countries or societies.
6
To summarize, when explaining global online communication, we propose a shift in
focus from Internet infrastructure such as hyperlinks (i.e., purported proxy of global
connectivity) and state-imposed blockage (i.e., denial of access to foreign information
through firewalls) to people’s actual web use globally—especially in non-Western societies.
In particular, our empirical examination of web usage by non-Western communities avoids
ascribing an a priori preference for their connection to the “world,” which in the dominant
discourse essentially implies the Western web. To “reimage” the Internet, we introduce
methodological innovations to not only capture the online presence of various communities
worldwide but also to gauge, separately, the relative location and level of horizontal
connectivity within such communities.4
Ethnological Mapping of the WWW: Distance and Thickness of Online Regional
Cultures
As the foundation of anthropology, ethnology is concerned with the characteristics of
different cultures measured as “clusters of common concepts, emotions and practices” (de
Munck & Korotayev, 2000, p. 338) and the relationships between them. Depending on the
research questions, ethnologists study the corresponding “traits that may be distributed
among the cultures that are included in the sample” (p. 347) and seek to evaluate and explain
the “similarity or dissimilarity” between, as well as “the distinctiveness of” these cultures
(Thomas, 1989, p. 27). Although nominally ethnology became marginalized in anthropology,
ethnological thinking remains embedded in hidden assumptions of many research endeavors
that aim to generalize and compare because it characterizes how human beings understand
cultures, identities, and the world (MacRae, 2006, p. 118).
Our ethnological mapping of the WWW is based on actual web usage and it consists
of three steps. A major obstacle to ethnological analysis is finding like entities to compare
User-Centric Ethnological Mapping of the WWW
7
(MacRae, 2006), as cultural or social practices, discourses and even material objects, rarely
come ready made for large-scale systematic comparison. Hence, we first identified traffic to
the globally most used websites as a usage-based trait distributed among the plural cultures
that reside within the global WWW. Accordingly, to gauge cross-cultural similarity
(dissimilarity) we rely on shared traffic between websites measured by audience duplication,
a metric we describe in the following section.
Having identified an appropriate measure of shared web traffic, our second step
involved developing an analytic technique to determine the various online cultures as distinct
“clusters of practices.” For ethnological cross-cultural comparisons, it is important to refrain
from assigning units of culture based on a priori attributes other than the traits used to arrive
at them (Munck & Korotayev, 2000). Our units of culture are essentially social structures we
identify through a user-centric network analysis of shared traffic between websites, an
approach that we adapt from Webster and Ksiazek (2012). Taneja and Wu (2014) refer to
such structures as “culturally defined markets,” which are clusters of “culturally proximate”
websites. We avoid the term “markets” due to the associated commercial overtones and
instead interpret these clusters using the conceptual lever of “online regional cultures,” as the
concept of “region” is theoretically and empirically consistent with the ethnological method.
Conventionally, regional cultures are characterized by place-based language traditions and
other cultural commonalities arising from shared climates, natural resources, and historical
experiences (Griswold, 2008). Emerging empirical research on global online user behavior
indicates that online cultures too have their origins in specific physical places (e.g., Taneja &
Wu, 2014; Takhteyev, Gruzd & Wellman, 2012; Hecht & Gergle, 2010), which justifies our
accent on the term “regional” when identifying cultures associated with the usage of the
(potentially global) WWW.
Moreover, a region’s designated geography may not be congruent with a sovereign
User-Centric Ethnological Mapping of the WWW
8
territory but instead above, below, or intersecting it ; it has fuzzy boundaries dependent upon
the viewer’s perspective (Griswold, 2008), which inevitably implicates the ethnological
thinking of generalization and comparison (MacRae, 2006). For example, the region
associated with the music created by singers from the holy Indian city of Varanasi could be
Varanasi, the North Indian Plains, India, or even the Hindustani speaking South Asia
comprised of parts of North India, Pakistan and Afghanistan. In addition to such contextual
malleability, geographers increasingly conceptualize places "as constellations of connections
that form, reform and disperse in space and over time" (Cosgrove, 2008, p. 47). All these
characteristics lend the concept well to a network analytic approach, which simultaneously
accounts for both the inherent and the relational traits of entities (Monge & Contractor,
2003)—a perfect iteration of ethnological thinking in examining the WWW. In addition,
representing the web using network analysis avoids the construction of essentialized
ethnological maps, a common pitfall in ethnology where boundaries are drawn based on static
traits.
Having identified clusters of regional cultures, the final step is to measure their
various characteristics in relation to each other and attempt to theoretically explain their
emergence in the real-world. This step involves locating, at a specific point in time, online
regional cultures in relation to one another by measuring their relative distances and
discerning the strength or thickness of each. To begin, we map each culture’s relative location
using force-directed network visualizations; these place websites sharing more traffic closer
to each other and enable us to “see” distinct cultures identified through formal cluster
analysis.
Next, for cross-comparison, we measure how far a regional culture (cluster) stands
from the rest of the world. We term this measure “distance” (a more neutral term in place of
“isolation,” used by Taneja and Wu (2014), which conventionally bears negative
User-Centric Ethnological Mapping of the WWW
9
connotations of being backward and unsettling). Distance may result from political
interventions such as access blockage. It may also be a consequence of the local society
operating in a cultural system at a high “cultural distance” ––a concept introduced by Hoskins
and Mirus (1988) to calculate pair-wise distance between countries for studying international
trade of cultural objects and other related aspects of globalization. Cultural distance reflects
commonalities between cultures based on many dimensions such as language, religion,
political system, and ethnic/racial composition (Shenkar, 2001), making the concept highly
compatible with that of regional cultures, which are distinguished based on cultural
commonalities. For example, the specific cultural and linguistic affinities established via
former colonial ties may make the online regional culture rooted in India and Pakistan less
distant from the rest of the WWW than one that originates in Japan.
Distance or the lack of it may not necessarily mean that the local communication
landscape in point exhibits rich and meaningful connectivity within itself. Hypothetically, if
China pushes access blockage to an extreme and makes its online regional cultures as distant
as that of North Korea, China’s online regional culture, housed by the Internet infrastructure
already ridiculed as the “Chinternet,” may nonetheless exhibit rich internal vibrancy and
diversity (Taneja & Wu, 2014), whereas North Korea’s Intranet, also characterized by the
lack of international linkages, provides meager online resources for its users (Warf, 2015).
To assess this separate trait of an online regional culture, we introduce the concept of
thickness. Initially used in critical transcultural media research, the concept of “thickening”
refers to the intensification of patterned connectivities “at the level of thinking, discourse, and
practices” that distinguishes media cultures from one another (Couldry & Hepp, 2012, p. 99).
Pertinent to our approach, a media culture’s thickness is judged by people’s habitual usage of
various media offerings associated with it, in addition to their content and formats (p. 101). It
is individuals’ patterned usage in fulfilling their economic, cultural, political, and leisure
User-Centric Ethnological Mapping of the WWW
10
needs that fundamentally structures and consolidates the local communication landscape
(Couldry & Hepp, 2012). In this light, by thickness of an online regional culture, we mean the
level of concentrated reliance on the set of web content that represents this regional culture.
The growth of locally relevant cultural products and e-services, the expansion of a region’s
online population which usually accompanies a bridging of the digital divide and the
prosperity of online interaction between users associated with this regional culture, all
potentially contribute to thickening. Examining such links, our ethnology of the WWW
provides insights on the empirical consequences of various factors on patterns of web usage
globally.
Creating a Cross-cultural Dataset
Method
We analyzed shared user traffic between the world’s top 1000 web domains at three
time points (September of 2009, 2011 and 2013). We obtained web usage (traffic) data from
comScore, a panel-based service that provides metered Internet audience measurement data
once a month from 2 million users worldwide in 170 countries. We obtained from comScore
traffic data for the top 1000 web domains globally (ranked by monthly unique users), as these
domains not only attract 99% of all the web users at all times but also ensure an adequate
representation of different languages and different geographies. ComScore reports data on
websites at the level of web domains as well as for subdomains for many large websites. This
in part depends on the architecture of the website. Google, for instance, has its different geo-
linguistic variants as separate web domains (e.g., www.google.es, www.google.de, etc.) and
comScore reports them as such. On the contrary Wikipedia language versions are sub-
domains of the main domain (e.g., es.wikipedia.org). In such cases, we considered these sub-
domains as separate websites in our final sample instead of including only higher level
domains. We captured these data at three time points, September 2009 (1018 websites
User-Centric Ethnological Mapping of the WWW
11
included in the final sample), September 2011 (1022 websites included), and September 2013
(1031 websites included).
As already noted, we draw on web traffic as a shared trait of online users across
cultures and identifying shared web traffic allows cross-cultural comparisons. To facilitate
such analysis, we utilize a measure called “audience duplication,” which simply put is the
extent to which two media outlets (e.g., websites) are consumed by the same set of people in
a given time period. In a hypothetical universe of 100 people, if on a given day 20 people
accessed both CNN.com and Baidu.com, the audience duplication between these two
websites would be 20 or 20%. For all possible pairs of media outlets under consideration,
calculating duplication in this manner results in a symmetric audience duplication matrix,
which can then be partitioned to identify communities of media outlets with similar audience
duplication patterns.
Generally, any two websites have some audience duplication, which may be due to
random chance. Therefore we calculated a measure called above random duplication (also
used by Webster and Ksiazek, 2012), which is the audience duplication between two websites
after accounting for expected duplication due to chance. As an example, if in a given month
80% of all web users visit Facebook.com and 70% visited Google.com, the expected
duplication between them would be 56% (80% * 70%). The duplication of interest then is a
measure termed “above random duplication,” the residual value obtained by subtracting the
observed duplication from the expected duplication. The resulting matrix with above random
duplication as the cell value can be analyzed as a valued network (negative values are treated
as zero; in other words, ties are considered absent). These values can also be converted to
dichotomized data by regarding any positive value of above random duplication as ‘1’ (tie
present) and a zero or negative value as ‘0’ (tie absent).
For each website in our sample, we obtained its audience duplication with all other
User-Centric Ethnological Mapping of the WWW
12
websites from the same annual sample. Thus in the final dataset, we have 517,653 ((1018
*1017)/2) pairs of audience duplication in 2009, 521,731 ((1022*1021)/2) pairs in 2011, and
529,935 ((1030*1029)/2) pairs in 2013. Using the method described above we calculated the
above random duplication for each pair and then obtained two sets of matrices (graphs), one
with valued ties and the other with dichotomized ties. A coder visited each website to note all
the languages in which the website offered content.
Analysis
Force-directed Network Visualization: Ethnological Mapping of WWW usage
For ethnological mapping, we employed the Fruchterman and Reingold (1991)
visualizing algorithm, which belongs to a class of visualization techniques known in graph
theory as force-directed graphs. The basic mechanism is that there are repulsive forces
between all nodes and nodes with edges have attractive forces and hence are placed
topologically adjacent to each other. Therefore, in the final visualization, all nodes that tend
to have ties with one another are placed in close vicinity to form tightly knit clusters; such
clusters are relatively separated from other similarly formed clusters. Figure 1(a), 1(b) and
1(c) represent the visualizations of the 2009, 2011 and 2013 graphs, where the dots are the
nodes (websites) and the lines represent (dichotomized) ties between them based on audience
duplication. These “show” fair evidence that global web usage clusters itself into many
communities of websites based on similarities in audience duplication. We conducted cluster
analysis to identify these communities, which confirmed them to be expressions of online
regional cultures.
FIGURE 1 ABOUT HERE
Cluster Analysis: Identifying and Measuring Online Regional Cultures
The clustering coefficient of a graph indicates the presence of tightly knit groups of
nodes that have disproportionately high ties with each other relative to nodes in other groups.
User-Centric Ethnological Mapping of the WWW
13
Theoretically, this varies between 0 and 1 and the clustering coefficient of a random network
is equal to its density and a value higher (lower) than the density indicates more (less)
clustering than a random graph of the same size and density. Our datasets had a density of
0.43, 0.40 and 0.35 and clustering coefficients of 0.86, 0.85 and 0.86 in 2009, 2011 and 2013
respectively. Therefore, overall the network had a high tendency to cluster into subgroups,
which increased over time (the clustering coefficient remained high even as the density
reduced). Thus websites clustered into groups based on high audience duplication among
sites within the group and relatively low duplication between sites that belong to different
groups.
We divided these graphs (with valued ties) into clusters using a hierarchical clustering
approach, using Pearson correlation coefficient between any two pairs of sites as measure of
similarity. In other words, a high correlation between any two sites suggests that they tend to
share audiences with the same sets of sites. Consequently, groups of sites with high inter-
correlations tend to cluster together. Simply put, these clusters are groups of websites that
share audiences with one another to a greater extent than with websites outside their groups.
Further, we assigned each cluster with a unique color for easy identification, consistent across
all visualizations.
Following the same approach used by Taneja and Wu (2014), we estimated the
distance of each cluster from the rest of the WWW using a basic node-level network measure
termed closeness (or farness) centrality, an indicator of the average closeness (or distance) of
a node from all other nodes in the network. Each cluster in our WWW networks is basically a
group of nodes. In order to calculate the distance of each cluster, we treated the entire cluster
as one node, and computed its average shortest distance from all other nodes in the network.
We calculated this distance for each cluster we observed in 2009, 2011 and 2013. A high
distance score suggests that even users of a cluster’s most well-connected (i.e., widely used)
User-Centric Ethnological Mapping of the WWW
14
website tend to engage with fewer websites outside the said cluster compared to a similar
website in a cluster with a lower distance score.
Distance as measured here indicates little about the connectivity within a cluster, or its
thickness. For estimating the thickness of each cluster, we utilize a measure called the E-I
index, which is typically used in social network analysis to indicate relative cohesion within
social groups (Krackhardt & Stern, 1998). It is calculated as the ratio of the difference and the
sum of external and internal ties of a cluster. Thus a cluster with only one actor can only have
external ties and hence its E-I index would be ‘1,’ indicating no cohesion. On the contrary, a
cluster of nodes with all internal ties and no external ties would have an E-I score of ‘-1,’
indicating perfect cohesion. If these usage-based clusters indeed represent online regional
cultures as we expect, we believe that an E-I index can be used to observe the intensity of the
intra-community connectivity, or the “thickness” of the local regional culture. We use the
valued ties to obtain these scores to account for the volume of shared audience traffic
between sites rather than just the presence or absence of a connection.
Although E-I scores indicate relative cohesion of clusters within a given network, in
our present case, changes in relevant E-I scores provide evidence of cultural thickening over
time. This is because the graphs generated for the three different time points share substantive
similarities and, across the years, we are able to identify a homologous set of major
clusters—that is, clusters representing the same regional cultures over time. Since most
clusters in our data have all possible internal ties (due to the design of the clustering
algorithm), a reduction in the E- I index indicates relative decrease in connections between
nodes within and those outside the cluster. In terms of global web use, this suggests that from
2009 to 2013, the extent of audience duplication among sites within a regional culture
(cluster) increased relative to their duplication with sites in other cultures (clusters). This
indicates a declining tendency of the average regional sites’ user to visit websites unaffiliated
User-Centric Ethnological Mapping of the WWW
15
to the said region culture. If accompanied by an overall increase in the number of sites
affiliated to this regional culture, a reduction in E-I index indicates cultural thickening.
FIGURE 2 ABOUT HERE
In Figure 2, we report these key measures associated with each of the major clusters.
Each graph is a scatterplot with the distance score in the X-axis and the thickness (E-I index)
score in the Y-axis. The diameter of the circle corresponds to the cluster size, measured as the
number of websites in that cluster. Figure 3 shows the relative E-I scores (standardized)
across a few clusters that were comparable across the year 2009, 2011 and 2013.
FIGURE 3 ABOUT HERE
Contextualizing the Evolution of Online Regional Cultures
In this section, we interpret the evolution in global user behavior in relation to local
cultural identity, state intervention, and larger economic and social processes.
Web User Behavior and Cultural Identity
In all three years, we find that the WWW as a network of shared usage between
websites largely clusters on linguistic and geographical lines, affirming the importance of
local cultural identity stressed in previous literature. To begin, we notice different categories
of clusters dependent on the interaction between language and geography. This is consistent
in each of the three years’ traffic data we analyzed and in line with findings from other recent
studies using similar traffic data collected at a different time point (Barnett & Park, 2014,
Taneja & Wu, 2014). State imposed access blockage plays at best a limited role in the
formation of these fault lines.5 In many cases, clusters could be linked explicitly to
contiguous geographical spaces defined by nation states such as China (which sometimes
coalesce with sites on Taiwan and Hong Kong),6 Poland, Korea, Italy and Japan where the
principal language is exclusive to the geography. We also witness distinct clusters for certain
countries (such as United Kingdom and Canada) despite their languages being spoken very
User-Centric Ethnological Mapping of the WWW
16
widely in many other countries. In other cases, websites focusing on multiple countries
cluster together based on a common language, as seen for Spanish language sites from Spain,
Mexico and Argentina. Yet another category of geo-linguistic clusters we observe is
comprised of global sites (such as Facebook, Youtube and Ikea) that are present in multiple
languages and have specific variants focusing on different countries. Finally, we find some
evidence of genre based clusters, with two salient examples being porn sites and file/video
sharing platforms. Such websites rely minimally on language and hence apparently transcend
regions more easily.
Our analyses further reveal the primary role of language in the landscape of horizontal
communication online. First, the more specific a cluster’s linkage to a language, the more
distant it is from the rest of the WWW. We find that the distance increases if a language is
exclusive to geography. For instance, clusters corresponding to Japan and Korea are
consistently more distant than the ones corresponding to Spanish or English speaking sites.
The cluster which we term as “US / Global” in 2009 is the least distant from the rest of the
WWW, due to the presence of many “global” sites in this group. However, the distance of the
cluster of US-focused sites increases in 2011 and 2013 (where we accordingly term this
cluster “US / English”) as in these years, many of the “global” sites (such as Facebook and
Twitter), probably as the proportion of non-US user participation increases, separate from the
US cluster to form a cluster of their own. There is an overall increase in cluster distance in
2013, which is consistent with the finding that compared to previous years, the network is
more clustered in 2013 (the least distant cluster in 2013 has a higher distance score than that
of its equivalent in both 2009 and 2011).
Relatedly, a regional culture formed with one primary language is likely to be more
distinctive, as well as thickens faster, than one formed in a geographically contiguous region
with linguistic plurality. For instance, in our analysis, certain clusters such as that of Spanish
User-Centric Ethnological Mapping of the WWW
17
language sites and that rooted in former USSR countries have formed mainly due to shared
regional languages transcending geographic or political boundaries. We also observe the
opposite for India where linguistic plurality, despite geographic contiguity, has probably
impeded the process of thickening among an otherwise large online regional culture. That the
region has not thickened as much as others with a comparable user base may be partly
explained by the fact that, although being the primary (and common) language of most sites
in the Indian cluster, English is only spoken by upper class Indians that make up about 10%
of the total population.
Another important observation is that, although major geo-linguistic clusters are
largely consistent across years, our analyses show an overall increase in the number of
distinct regionally oriented online cultures, resulting from the relative expansion of the web
usage in the global South. This trend holds for China, India, Brazil, and former USSR
countries: the Chinese cluster, which nearly doubled in size between 2009 and 2013, showed
the most phenomenal growth. Given the similar sample size in each year (approx. top 1000
sites), the growth of certain clusters is balanced by the decline in others. The Korean cluster,
while prominent in 2009 and 2011, is missing from the 2013 visualization (it had 34 sites in
2009 to 33 in 2011 and only 4 in 2013). Germany, France and Japan are other prominent
clusters that shrank in size. In general, we notice that regions where Internet penetration has
grown significantly during the observation period witness cultural thickening online. This is a
likely outcome of local users’ increasing reliance on regional websites, which manifests as
intensification of horizontal communication within the regions, when seen in the aggregate.
Likewise, the cluster of US-based sites also thickened once they segregated from the major
“global” sites into a cluster of their own. The stable or increasing thickness scores of clusters
corresponding to regions with stagnant Internet population numbers such as Korea, Japan,
Germany and France support this interpretation, as the proportion of web users from these
User-Centric Ethnological Mapping of the WWW
countries most likely declined from 2009 to 2013 in our sample.
18
Connected to the Internet penetration rate is the social and economic status of the
regional online population and its level of regional orientations. In developing countries,
Internet use is a privilege of the elite segment marked by higher cultural capital for
navigating and making sense of cultures outside of the region. In these countries, as the
Internet penetrates down the social ladder, it accommodates more users who likely lack the
capacities of and/or interests in making use of foreign websites. Thus over time the growth of
the percentage of users from lower strata is associated with the emergence of distinct regional
orientations, which simultaneously contributes to the distance and thickening of the online
regional cultures in point. In 2013, for instance, India and Japan both had about 100 million
Internet users each. Yet, our data show Japan has a far thicker online culture than India. This
is because Indian users who constituted the top 10% of the national populace belonged to
very privileged social groups that are at ease with the established “global” and English
cyberspace. As Internet usage picks up among India’s lower social strata, newer regional
cultures based on India’s many languages may emerge over and above the currently visible
national culture relying on the English lingua franca.
Web Use Behavior and Local Political Economy
A closer look at the thickening trajectories of various online regional cultures in
relation to state policies and other economic and social contexts suggests the critical
relevance of local political economy to web use behavior. Such relevance can be understood
in terms of, on the one hand, the structural environment facilitating local consumption––that
is, to enable more members of the community to engage with cyberspace. The uneven
Internet penetration levels are themselves affected by state policy. For instance, in South
Korea government policy has been instrumental in achieving near ubiquitous broadband
access that is both fast and of low cost. In stark contrast to South Korea, Internet user base in
User-Centric Ethnological Mapping of the WWW
19
Brazil and India has taken much longer to grow. Brazil had only 24 million Internet users
(13% of its population) in 2003 (compared to Korea at more than 60% in the same year), and
it surpassed 100 million Internet users (50% of its population) only in 2013, a fact consistent
with the growth of the Brazilian cluster in 2013 seen in our data. Much of the growth in the
Brazilian Internet user base in the last 3 years seems to be from Internet use on mobile
devices. In 2004, India had less than 2% of its population online. In 2013, even though only
10% Indians are online, this corresponds to about 120 million users.7
On the other hand, the politico-economic contexts also affect the dimension of local
production, or inclusion of local communities in designing and producing content that
populates the part of WWW they inhabit. In this regard, we notice the connection between
the changes in thickness scores and the conditions of homegrown Internet industries. For
local horizontal connectivity to develop, Internet users should grow in tandem with online
content focusing on the region and web tools that enable people to discover such content.
Generally speaking, local producers are more successful in fulfilling such needs, especially
when embedded in a healthy innovation culture that is supported by friendly state policies.
Taking South Korea again as an example; its high Internet penetration is supplemented by an
innovation culture fostering startup enterprises. Launched five years before Facebook,
CYworld remained South Korea’s most popular SNS for a decade (The Economist Explains,
2014). The cultivation of China’s vivacious online regional culture can also be attributed to
its robust local Internet industry and the key presence of various government interventions.
Chinese users have witnessed the development of corporations such as Tencent technologies
which, now leading competition worldwide in innovations on the mobile web, far preceded
US-based corporations in creating innovative digital platforms for online social networking
(Elliot, 2014). Likewise, Japan, Russia and Brazil all have massive local Internet portals that
cater to regional needs.
User-Centric Ethnological Mapping of the WWW
20
The preceding discussion on the relations between the web use of local societies and
the political economies governing these societies also provides a timely critique of the
dominant “Internet freedom” rhetoric, which in effect adds to the entitlement of multinational
Internet companies that demand free operation both in the US and abroad without
government intervention (Cramer, 2013). In fact, media policy scholars suggest that US
foreign policies serve the interests of large corporations by equating the goal of “liberalizing
foreign polities with the values of human rights and democracy” to that of “opening [foreign]
markets to US capital,” (McCarthy, 2011, p. 89; also see Nordenstreng, 2011; Schiller &
Sandvig, 2011). This one-dimensional conception of Internet freedom as the absence of
political intervention explains why US policy-making and popular media discourses have
little recognition of the role of active government interventions, particularly in numerous
developing states, in providing Internet access and local content. Similarly, while obsessed
with the detail and scales of state imposed blockage (Taneja & Wu, 2014), they are
indifferent to Internet companies’ targeted blockage of users from poor countries as the latter
may adversely impact their revenues (Burrell, 2012).
In contrast to the prevalent emphasis on political constraints, our study draws
attention to the generally ignored but significant economic constraints to the global inclusion
in online communication (see also Cramer, 2013). Portraying the online activities and
cultures of developing countries in a more balanced light, it foregrounds the development and
ecology of online regional cultures based in the global South and recognizes that in many
cases it is local government interventions that eliminate economic barriers, which in effect
expand the Internet freedom of their citizenry. For instance, certain initiatives and regulations
may foster high growth in both domestic usage and homegrown Internet industries, thus
enabling more people in these countries to benefit from rich lives on the Internet and to at
once shape their own online habitat. People thus get to enjoy indigenous cultural content,
User-Centric Ethnological Mapping of the WWW
21
interact with their communities, and utilize various e-services tailored to the locality. This is
consistent with a UNESCO-directed study of multi-country data, which suggests strong
correlations between the development of local network infrastructure, the lowering of access
prices, and the growth of local content (Internet Governance Forum, 2014).
Conclusion
Our study contributes, conceptually and methodologically, to the research,
documentation and evaluation of the development of the WWW. Through a network analysis
of shared global traffic between 1000 most popular websites at three time points, we have
advanced the approach of ethnological mapping to better understand worldwide web use and
its association with local cultural identity and politico-economic contexts. With
methodological innovations tailored to data of a new nature, our approach generates a new
imagery of the WWW that foregrounds usage and its shaping forces, in contrast to the
existing imageries that are based on technical features of the Internet. It also provides
granular measures for exploring local communities’ engagements with the Internet.
Our major findings are as follows. First, the locations of online regional cultures in
relation to one another and with their underlying geo-linguistic linkages lend support to the
common perception of cultural adjacency. Second, regional orientations--that is, tendency to
use webpages in local languages--strengthen as Internet use expands beyond globalized elites.
Third, in terms of intra-community vis-à-vis inter-community connectivities, online regional
cultures associated with the global South have significantly grown and thickened.
To the best of our knowledge, our analysis is the first imaging exercise of the WWW
on a website level at a global scale that conceives and demonstrates that “the Internet is not
an abstract space or digital global village, but rather a network that enables selective
connections between people and information” (Graham, 2013, p. 180). Geographers
emphasize that, “representations of place are never neutral or objective and are always
User-Centric Ethnological Mapping of the WWW
22
created in order to serve particular purposes” (Graham, 2014, p. 103). Compared to the
prevalent media-centric Internet maps, our user-centric ethnological mapping method stands
to challenge, rather than reinforce, the status quo presumption of a WWW that is anchored by
Western knowledge, norms, and activities. It encourages the (Anglophone, especially)
general public to confront the narrowness of the online world with which it is familiar.
Further, the trend our maps capture may stimulate popular imaginations to envision a future
cyberspace of vast heterogeneity, where one needs to get out of one’s way to comprehend.
Moreover, these user-centric maps may inform policy-makers around the world in
deliberating how to better empower the global South by introducing political, economic, and
social opportunities with new technologies. By linking our empirical findings about online
regional cultures to contextual indicators, we draw attention to the role of cultural identity,
affirmative state intervention and the economic conditions of various countries in the
formation of and changes in the global web use landscape. Our ethnological maps provide
powerful visuals that support previous analyses in this realm; in recent years in international
Internet governance discussion, this corpus of evidence has been the basis for the growing
advocacy for affirmative government intervention in fostering local production of web
content (e.g., Internet Governance Forum, 2014). In this sense, our analyses not only provide
substance to this advocacy, but also serve as an initial step to move beyond concerns for
cultural, particularly linguistic, diversity in web content to also address diversity in the
dimension of web usage (see Napoli & Karppinen, 2013). Finally, our imaging exercise
gives sustenance to a conception of Internet freedom broader than what is commonly
conceived in US-led Internet governance discourse. This broader conception emphasizes the
elimination of not only political, but also economic barriers for users around the globe so that
they may shape and make use of online content they find appealing, contributing to the
horizontal connectivity of our expanding WWW.
User-Centric Ethnological Mapping of the WWW
References
23
Barnett, G., & Park, H. (2014). Examining the international Internet using multiple measures:
new methods for measuring the communication base of globalized cyberspace.
Quality & Quantity, 48(1), 563–575. doi:10.1007/s11135-012-9787-z
Burrell, J. (2012). Invisible users: Youth in the Internet cafés of urban Ghana. Cambridge,
MA: MIT Press. doi:10.7551/mitpress/9780262017367.001.0001
Castells, M. The rise of the network society. Malden, MA. Blackwell Publishers,., 1996.
Chung, C., Barnett, G., & Park, H. (2014). Inferring international dotcom Web communities
by link and content analysis. Quality & Quantity, 48(2), 1117–1133.
doi:10.1007/s11135-013-9847-z
Cramer, B. W. (2013). The two Internet Freedoms: Framing victimhood for political gain.
International Journal of Communication 7, 1074-1092.
Daniel, F., & Josh, B. (2011). Languages of the World (Wide Web). Research Blog, Google.
Retrieved from http://googleresearch.blogspot.com/2011/07/languages-of-world-
wide-web.html
Cosgrove, D. 2008. Geography and Vision. London and New York: I.B. Taurus.
De Maeyer, J. (2013). Towards a hyperlinked society: A critical review of link studies. New
Media & Society , 15 (5 ), 737–751. doi:10.1177/1461444812462851
DeNardis, L. (2012). Hidden levers Of Internet control. Information, Communication &
Society, 15(5), 720–738. doi:10.1080/1369118X.2012.659199
Dodge, M. (2008). Understanding Cyberspace Cartographies : A Critical Analysis of
Internet Infrastructure Mapping (Unpublished doctoral dissertation). UCL, London.
Elliot, D. (2014, April 17), Tencent the secretive, Chinese tech giant that can rival Facebook
and Amazon. Fast Company. Retrieved from
http://www.fastcompany.com/3029119/most-innovative-companies/tencent-the-
User-Centric Ethnological Mapping of the WWW
24
secretive-chinese-tech-giant-that-can-rival-facebook-a#!
Fruchterman, T. M. J., & Reingold, E. M. (1991). Graph drawing by force-directed placement.
Software: Practice and Experience, 21(11), 1129–1164.
doi:10.1002/spe.4380211102
Georgiou, M. (2012). Watching soap opera in the diaspora: cultural proximity or critical
proximity? Ethnic and Racial Studies, 35(5), 868–887.
doi:10.1080/01419870.2011.628040
Graham, M. (2013). Geography/internet: ethereal alternate dimensions of cyberspace or
grounded augmented realities? The Geographical Journal, 179(2), 177–182.
doi:10.1111/geoj.12009
Graham, M. (2014). Internet Geographies: Data Shadows and Digital Divisions of Labor. In
M. Graham & W. H. Dutton (Eds.), Society and the Internet (pp. 99–116). Oxford:
Oxford University Press.
Griswold, W. (2008). Regionalism and the reading class. Chicago, Ill: University of Chicago
Press. doi:10.7208/chicago/9780226309262.001.0001
Hanneman, R. A., & Riddle, M. (2005). Introduction to social network methods. Riverside,
CA: University of California, Riverside.
Hecht, B., & Gergle, D. (2010). The tower of Babel meets web 2.0. In Proceedings of the
28th international conference on Human factors in computing systems - CHI ’10 (pp.
291-300). New York, USA: ACM Press. doi:10.1145/1753326.1753370
Hoskins, C., & Mirus, R. (1988). Reasons for the US dominance of the international trade in
television programmes. Media, Culture & Society, 10(4), 499–504.
doi:10.1177/016344388010004006
Internet Governance Forum (2014). Best Practice Forum on Creating an Enabling
Environment for the Development of Local Content (Executive Summary). Retrieved
User-Centric Ethnological Mapping of the WWW
25
from http://www.intgovforum.org/cms/documents/best-practice-forums/creating-an-
enabling-environment-for-the-development-of-local-content
Inkeles, A., & Smith, D. H. (1974). Becoming modern. Cambridge, MA: Harvard University
Press. doi:10.4159/harvard.9780674499348
Krackhardt, D., & Stern, R.N. (1988). Informal Networks and Organizational Crises: An
Experimental Simulation, Social Psychology Quarterly, 123-140.
Kraidy, M. M. (2002). Hybridity in Cultural Globalization. Communication Theory, 12(3),
316–339. doi:10.1111/j.1468-2885.2002.tb00272.x
Lerner, D. (1958). The passing of traditional society: Modernizing the Middle East. Glencoe,
Il: Free Press.
MacRae, G. (2006). Ethnography, Ethnology and the Ethnography of Ethnologies. Sites: A
Journal of Social Anthropology and Cultural Studies, 3(2), 116–136.
doi:10.11157/sites-vol3iss2id19
Mansell, R. (2013) Introduction: imagining the internet: open, closed or in between. In: Perini,
Fernando and Girard, Bruce, (eds.) Enabling Openness (pp. 9-20). Ottawa IDRC,
Fundación Comunica, Ottawa, Canada,.
Mansell, R. (2014). The governance of communication networks: reconsidering the research
agenda. International Journal of Media and Cultural Politics, 10(2), 145–153.
doi:10.1386/macp.10.2.145_1
McCarthy, D. R. (2011). Open Networks and the Open Door: American Foreign Policy and
the Narration of the Internet1. Foreign Policy Analysis, 7(1), 89–111.
doi:10.1111/j.1743-8594.2010.00124.x
Menchen-Trevino, E. (2013). Collecting Vertical Trace Data: Big Possibilities and Big
Challenges for Multi-Method Research. Policy & Internet, 5(3): 328-339.
doi:10.1002/1944-2866.POI336
User-Centric Ethnological Mapping of the WWW
26
Munck, V. de, & Korotayev, A. (2000). Cultural Units in Cross-Cultural Research. Ethnology,
39(4), 335–348. doi:10.2307/3774050
Murdock, G. P. (1950). Family Stability in Non-European Cultures. The ANNALS of the
American Academy of Political and Social Science, 272(1), 195–201.
doi:10.1177/000271625027200125
Napoli, P. M., & Karppinen, K. (2013). Translating diversity to Internet governance. First
Monday, 18(12). Retrieved from
http://firstmonday.org/ojs/index.php/fm/article/view/4307/3799
Nordenstreng, K. (2011). Free flow doctrine in global media policy. In R. Mansell & M.
Raboy (Eds.), The handbook of global media and communication policy (pp. 79–94).
Malden, MA: Blackwell. doi:10.1002/9781444395433.ch5
Park, H. A. N. W. O. O., Barnett, G. A., & Chung, C. J. O. O. (2011). Structural changes in
the 2003 – 2009 global hyperlink network. Global Networks, 11(4), 522–542.
Prior, M. (2007). Post-broadcast democracy: How media choice increases inequality in
political involvement and polarizes elections. New York: Cambridge University
Press. doi:10.1017/CBO9781139878425
Reporters without Borders (2007). “List of the 13 Internet enemies.” Retrieved from
http://en.rsf.org/list-of-the-13-internet-enemies-07-11-2006,19603
Ruiz, J. B., & Barnett, G. a. (2015). Who owns the international Internet networks? The
Journal of International Communication, 21(1), 38–57.
doi:10.1080/13216597.2014.976583
Schiller, D., & Sandvig, C. (2011, March 4). Free flow of information and profit? Huffington
Post. Retrieved from http://www.huffingtonpost.com/dan-schiller/free-flow-of-
information-_b_831419.html
Shenkar, O. (2001). Cultural Distance Revisited: Towards a More Rigorous
User-Centric Ethnological Mapping of the WWW
27
Conceptualization and Measurement of Cultural Differences. Journal of
International Business Studies, 32(3), 519–535. doi:10.1057/palgrave.jibs.8490982
Shumate, M., & Dewitt, L. (2008). The north/south divide in NGO hyperlink networks.
Journal of Computer Mediated Communication, 13(2), 405-428. doi: 10.1111/j.1083-
6101.2008.00402.x
Straubhaar, J. (2007). World television: from global to local. Los Angeles: Sage.
Takhteyev, Y., Gruzd, A., & Wellman, B. (2012). Geography of Twitter networks. Social
Networks, 34(1), 73–81. doi: 10.1016/j.socnet.2011.05.006
Taneja. H & Wu, A.X. (2014). Does the Great Firewall really isolate the Chinese? Integrating
access blockage with cultural factors to explain web user behavior. The Information
Society, 30(5), 297-309. doi:10.1080/01972243.2014.944728
The Economist Explains (2014, February 10) Why South Korea is really an internet dinosaur.
Economist.com. Retrieved from http://www.economist.com/blogs/economist-
explains/2014/02/economist-explains-3
Thomas, N. (1989). The Force of Ethnology: Origins and Significance of the
Melanesia/Polynesia Division. Current Anthropology, 30(1), 27. doi:10.1086/203707
Warf, B. (2015). The Hermit Kingdom in cyberspace: unveiling the North Korean internet.
Information, Communication & Society, 18(1), 109–120.
doi:10.1080/1369118X.2014.940363
Weber, M. S., & Monge, P. (2011). The Flow of Digital News in a Network of Sources,
Authorities, and Hubs. Journal of Communication, 61(6), 1062–1081. doi:
org/10.1111/j.1460-2466.2011.01596.x
Webster, J. G., & Ksiazek, T. B. (2012). The Dynamics of Audience Fragmentation: Public
Attention in an Age of Digital Media. Journal of Communication, 62(1), 39–56.
doi:10.1111/j.1460-2466.2011.01616.x
User-Centric Ethnological Mapping of the WWW
28
Wu, L., & Ackland, R. (2014). How Web 1.0 fails: the mismatch between hyperlinks and
clickstreams. Social Network Analysis and Mining, 4(1), 1-7.
1 We use "infrastructure" to refer to a range of levers of Internet architecture such as ISPs,
routers, protocols, under-sea cables, hyperlinks etc, that enable or constrain usage. This is
consistent with the use of the term in the literature (e.g., DeNardis, 2012; Dodge, 2008)
2 Another type of popular WWW imageries is based on the coverage of usually US-based IT
giants such as Facebook and Twitter, which veils the political and economic specificities of
the particular online applications (see Menchen-Trevino, 2013).
3 Additionally, hyperlinks may contain erroneous links, irrelevant information and
inconsequential relationships (Weber & Monge, 2011)
4 Taneja and Wu (2014) direct scholarly and public attention from its conventional focus on
China’s governmental filtering mechanism to the web usage under its local influences. This
study suggests no clear role of access blockage in explaining the extent of isolation of
Chinese web browsing behavior.
5 To be clear, we do believe that the fast inclusion of users from and of websites focusing on
formerly underrepresented regions online may cause changes that conflate with the effects of
governmental blockage
6 It is hard to tell from our data whether the Chinese cluster has users only from mainland
China or from HK and Taiwan as well. However, we see a separate cluster of Taiwanese sites
including the Chinese Wikipedia in 2013.
7 All Internet penetration figures are from World Development Indicators from World Bank,
made available by Google Public Data Explorer.
Figure 3 Thickening of Online Regional Cultures over Time
Figure 1: Ethnological Mapping of Global Web Use
29
30
Figure 2 Evolution of the WWW (Distance and Thickening)
About the Authors
31
Angela Xiao Wu (PhD, Northwestern University) is an Assistant Professor in the School of
Journalism & Communication at the Chinese University of Hong Kong. She explores the
connection between emergent technologies and cultural changes using mixed methodologies.
Address: Room 206-7, Humanities Building, Chinese University of Hong Kong, Shatin, N. T.,
Hong Kong. Email: [email protected]
Harsh Taneja (PhD, Northwestern University) is an Assistant Professor in the School of
Journalism at University of Missouri. His research focuses on media use, specifically how
contextual and individual factors shape patterns of audience formation. Address: 181-C Gannett
Hall, Missouri School of Journalism, Columbia, MO, USA -65211-1200. Email:
[email protected]
|
1611.06961 | 1 | 1611 | 2016-11-21T19:20:32 | Rising Novelties on Evolving Networks: Recent Behavior Dominant and Non-Dominant Model | [
"cs.SI",
"cs.IR",
"physics.soc-ph"
] | Novelty attracts attention like popularity. Hence predicting novelty is as important as popularity. Novelty is the side effect of competition and aging in evolving systems. Recent behavior or recent link gain in networks plays an important role in emergence or trend. We exploited this wisdom and came up with two models considering different scenarios and systems. Where recent behavior dominates over total behavior (total link gain) in the first one, and recent behavior is as important as total behavior for future link gain in second one. It suppose that random walker walks on a network and can jump to any node, the probablity of jumping or making connection to other node is based on which node is recently more active or receiving more links. In our assumption random walker can also jump to node which is already popular but recently not popular. We are able to predict rising novelties or popular nodes which is generally suppressed under preferential attachment effect. To show performance of our model we have conducted experiments on four real data sets namely, MovieLens, Netflix, Facebook and Arxiv High Energy Physics paper citation. For testing our model we used four information retrieval indices namely Precision, Novelty, Area Under Receiving Operating Characteristic(AUC) and Kendal's rank correlation coefficient. We have used four benchmark models for validating our proposed models. Although our model doesn't perform better in all the cases but, it has theoretical significance in working better for recent behavior dominant systems. | cs.SI | cs |
Rising Novelties on Evolving Networks: Recent Behavior Dominant and
Non-Dominant Model
Khushnood Abbasa,b,∗
aBig Data Research Center, University of Electronic Science and Technology of China, Chengdu 611731, PR China
bBig Data mining and application center, Chongqing Institute of green and Intelligent Technology of China, Chinese Academy of
Sciences, Chongqing, 401120, P.R. China.
Abstract
Novelty attracts attention like popularity. Hence predicting novelty is as important as popularity. Novelty is the
side effect of competition and aging in evolving systems. Recent behavior or recent link gain in networks plays an
important role in emergence or trend. We exploited this wisdom and came up with two models considering different
scenarios and systems. Where recent behavior dominates over total behavior (total link gain) in the first one, and
recent behavior is as important as total behavior for future link gain in second one. It suppose that random walker
walks on a network and can jump to any node, the probablity of jumping or making connection to other node is
based on which node is recently more active or receiving more links. In our assumption random walker can also
jump to node which is already popular but recently not popular. We are able to predict rising novelties or popular
nodes which is generally suppressed under preferential attachment effect. To show performance of our model
we have conducted experiments on four real data sets namely, MovieLens, Netflix, Facebook and Arxiv High
Energy Physics paper citation. For testing our model we used four information retrieval indices namely Precision,
Novelty, Area Under Receiving Operating Characteristic(AUC) and Kendal's rank correlation coefficient. We
have used four benchmark models for validating our proposed models. Although our model doesn't perform
better in all the cases but, it has theoretical significance in working better for recent behavior dominant systems.
Introduction
Every time we use the Internet (particularly social media platforms, search engines, email servers) we leave
our traces behind which generates a huge volume of data (Hommes 2002), (Bouchaud, Matacz, and Potters
2001), (Haldane and May 2011). This huge data carrying a lot of opportunity for understanding the individual
as well as collective behaviours. Collective behaviours are more important in many domain such as finance,
∗Corresponding Author
Email address: [email protected] (Khushnood Abbas)
Preprint submitted to Elsevier
June 14, 2021
viral marketing, epidemic disease prevention and so on, by targeting or controlling individuals or communities
when predicting their behaviour and / or events and trends in societies. For example from Google trend some
researchers infer the real world phenomena such as geographical location of disease spread (Ginsberg et al. 2008),
stock market prediction (Preis, Moat, and Stanley 2013), which product will be in demand or who is going to win
this election.Likewise, social media platforms such as Twitter has been used to track human mobility, improve
the response to disasters, etc. Therefore we can say this big data is carrying ample amount of opportunities for
scientists and researchers from all disciplines to solve this complex world problem (Axtell 2001), (King 2011),
(Vespignani 2009), (Perc 2012). Most of the big data of the interactions of people in the Internet can be modeled
The following two main different types of networks can be shaped from such data: a) monopartite, in which the
nodes have similar types (i.e., only people or items) and links reflect a relationship among them; and b) bipartite,
in which the nodes can be from different types (i.e., people and items) and links show a relationship between
different types of nodes. By generally simply the latter type can be transformed to two different monopartite
networks. Nevertheless, one of the main attributes in such network is the link formation among the nodes over
time which can help to manage the dynamics of the network and make appropriate decision (Abbasi 2016).
Although the quality item or fit node always show some common characteristics i.e they compete to get attention.
It may be possible in presence of popular nodes its strength forgotten. Researchers have also found that in
network such as paper citation it may not get attention for long time (Ke et al. 2015), some gain popularity
many times (Cheng et al. 2016). In all the cases we think as also been proven that recent activity of the node is
one of the important feature of node for future activity (Gleeson et al. 2014), (ZENG et al. 2013). Popularity
or future link gain prediction is a complex task depending on different factors like quality or nodes fitness and
so on. Content popularity may fluctuate with time (Eisler, Bartos, and Kertész 2008), increase over time or be
limited within communities. Most recently researchers have found that the popularity of online contents like
news, blog posts, videos, mobile app download (Gleeson et al. 2014) in online discussion forums and product
reviews exhibits temporal dynamics.
Emergence or first time occurence is novelty for those who didn't face it before, which can be innovation also.
Innovation is special case of novelty in a sense it is entertained by collective attention, while novelty may not.
The emergence, novelty , trend or future occurrence prediction models can be found since quite long time ago
such as (Zanette and Montemurro 2005), (Hoppe 1984), (Simon 1955), (Tria et al. 2014). Emergence prediction
theory applies in many areas of life such as economics (Simon 1955), biology (E. and Yule 1925), physics (Redner
1998) etc. (Simon 1955) has given stochastic model which fits to skewed or power law distribution or fit to
rich-gets-richer phenomenon. It is obvious that popularity of any item on social media doesn't last forever. In
addition decay rate may vary from item to item. Every type of node have its own decay rate like (Parolo et al.
2
2015) have found research article citation rate decays after some time. Cumulative advantage is a well known
phenomenon seen almost in every evolving networks, which states that popularity increases cumulatively; the rate
of new link (Either item receives rating in case of Movielens, or a friend like or comments in case of Facebook wall
post activity) formation for any node is proportional to the observed number of links which node has received in
past. Authors in (D. Wang, Song, and Barabasi 2013) for quantifying long term prediction considered fitness of
paper for future citation gain of the paper. The nature of paper citation distribution is also found fat tailed or
skewed which tells only few papers carrying most of the citation while most of the papers no citation or very very
low (Redner 1998).
We have solved the novelty problem using networks because of its wide application (Garlaschelli, Caldarelli, and
Pietronero 2003), (Buldyrev et al. 2010). Almost everything shows aging effect, from biological organism to
inanimate twitter "meme". Trend is side effect of aging; some perform better and loose influence within few
hours and some perform for years. Therefore aging is one of the important factor that we should taken into
consideration while solving emergence phenomena. Novelty is in one sense unexpected event or occurrence in
future temporal domain, therefore recent behavior is an important feature for predicting rising novelties on
evolving networks. Emergence can also be considered as after product of competition and aging. Ranking index
on the basis of action of interest is one of the best way to understand emergence and competition such as in our
case action of interest is in link formation of the node. Therefore considering all above facts we have solved the
problem of emergence or rising novelty considering; aging and recent behavior (recent link gain) as well as total
behavior (total link gain), and tested performance of our model on ranking index based metrics.
The rest of the paper is organized as follows. In Section 2 we have introduced the benchmark models and also
proposed our model. In section 3 we have given details about data sets and indexes that we have used for testing
our model. In section 4 we have given the results. In Section 5 we have concluded the paper.
Materials and Methods
Before introducing our two proposed models for link prediction . first we briefly describe four existing prediction
models (i.e., Node In-degree; PageRank(PR); Popularity Based Predictor(PBP); and Temporal Based Predic-
tor(TBP)) which will be used to benchmark the models and compare their performance using the evaluation
metrics which will be discussed in the last part of this Section.
PageRank
PageRank given by (Brin and Page 1998) was developed to rank webpages on internet for Google search engine
optimization purpose. It can be applied in other networked architecture also where structural property of the node
3
plays an important role such as information diffusion, scientific paper/author ranking etc. PageRank algorithm
can be given as follows:- If node ni have link to node nj there will be a directed link between them (ni− > nj). If
node (i.e webpage) nj has Si set of link to other nodes then page will distribute its importance in lj(the number
of nodes in set Si). Generally, the transition matrix of the network or graph A can be given as follows-
1/lj if nj ∈ si
0 Otherwise
Aij =
Since there can be nodes that do not have link to other nodes although they are being pointed by other nodes,
also known as dangling nodes , so new transformed matrix (S) can be given as-
S = A + Ncd
Where Ncd matrix have all the elements zero except for dangling nodes' column which are 1/N where N is the
number of rows or nodes in the matrix. Easy to find that those columns are normalized that sums to one for
making column stochastic matrix. Now the PageRank of dangling nodes will not be zero. Since random surfer
will follow the link from one page to another, suppose that random surfer follows the PageRank (follows S) with
probability (α) then there is (1 − α) probability that he will choose a random page. So now PageRank matrix
also known as Google matrix M can be given as-
M = αS + (1 − α)
n
In
Where In is matrix of size n ∗ n, it's every element as one . PageRank vector P R can be calculated using power
method as P Rk = M.P R
(k−1) it will definitely converge to a static vector which is PageRank.
Popularity-based predictor(PBP)
(ZENG et al. 2013) came up with Popularity Based Predictor(PBP). It exploits the preferential attachment
phenomenon, which states that popularity increases cumulatively; the rate of new link (either item receives rating
in case of Movielens, or a friend like or comments in case of Facebook wall post activity) formation for any node
is proportional to the observed number of links which node has received in past. If an item is popular at time t,
then it will probably be popular due to the condition that current degree of an item ko(t) is a good predictor of
its future popularity. (ZENG et al. 2013) proposes to calculate the prediction score of an item at time t can be
given as follows-
4
so(t, Tp) = k
o
(t) − λko(t−TP)
(1)
Where ko(t) is the rating/links received up to time t. λ ∈ [0, 1] , note that λ = 0 gives the total popularity and
for λ = 1 it gives recent popularity. Through out the manuscript by popularity we mean number of ratings or
links received by item or node.
Temporal Base Predictor (TBP)
This model (Zhou, Zeng, and Wang 2015) considers decay effect only while collecting score of node for future
probability of getting links.
so(t) =X
u
Auo(t) exp(d(Tuo − t))
(2)
where so(t) is prediction score for node o at time t, Auo(t) is the user object adjacency matrix, and Tuo is the
time when object or node received link and d is the decay rate.
Proposed model 1: Recent Behaviour Dominant Model(RBDM)
In many systems such as human, herding or recent behavior followers are very common. Although it is well
known that people go for popular items or follow rich-gets-richer behavior, but to understand emergence, recent
behavior is one of the important factor. People follow the strength of the node also, with recent behaviours. We
also know "congestion feeds itself" phenomena, meaning having more recent attractions(e.g recent new links)
may lead to gaining more recent attractions. To quantify all these phenomena we came up with a model that
gives weight to recency of link formation. If there are few attentions to node (e.g links) then will give weight to
total popularity gain. Since we are modeling a system in which humans are core of its action for making link
either user item bipartite network, Facebook friend ship network or paper citation network. And if people follow
recent behavior in making links then recent degree gain must be a good predictor for future degree gain. In the
same way if they follow total degree or popularity of the node then total degree would be a good predictor. But
in reality people follow both therefore, we supppose people follow recent behavior with probability α, and with
1 − α they follow total degree or popularity of the items.
Po(t, TP ) = (αo
P
∆ko(t, TP )
∆ko(t, TP ) + (1 − αo) ko(t)P
ko(t))
u
u
5
(3)
Where ∆ko(t, TP ) = ko(t) − ko(t − Tp),ko(t) reflect the link gain upto time t. αo is dominance factor. It depends
on system to system ho much recent behavior dominated system is, weak or strong. Such as for "bursty" behavior
strong dominance should work. In our case αo is from Cumulative Distribution of ∆ko(t,TP )
. It means αo is
∆ko(t,TP )
biased towards recent behaviours, the more recent behaviour, the higher αo will be. IF the recent behaviour
probability ( ∆ko(t,TP )
), is low then the model score will depends on total link gain. Which is why we call this
∆ko(t,TP )
P
P
u
model "Recent Behavior Dominant Model(RBDM)".
u
Proposed model 2: Recent Behaviour Non-Dominant Model(RBNDM) for Emergence
In this model we think recent behavior is effect of long term past behavior. If a node is getting more link recently
it is because it has already gained link in past. In other words people follow recent behaviours but also at the
same time they concern about past links. In that system we need to give weightage to both behaviours. So to
model this we think if a node is active in recent time and also it was popular then its probability of gaining link
in future is high.
Po(t, TP ) = ((1 − αo) ∆ko(t, TP )
∆ko(t, TP ) + αo
P
u
ko(t)P
ko(t))
u
(4)
Since we are considering evolving systems, we should consider the time as an important factor. Therefore to
calculate total score of node, i.e ko(t) , we used aging effect similar to TBP model described above. αo is from
cumulative distribution of ∆ko(t,TP )
∆ko(t,TP )
P
.
u
Data and Metrics
To test the performance and robustness of our model we have considered different data sets and evaluation
metrics.
Evalutation metrics
including preci-
Four evaluation metrics are adopted to measure the accuracy of the proposed model
sion(Pn),novelty(Qn) and Area Under Recieving Operating Characteristic(AU C) and rank correlation Kendall's
Tau(τ).
6
• Precision is defined as the fraction of objects that are predicted also lie in the top N object of true ranking
(Herlocker et al. 2004).
pn = Dn
n
Where Dn is the number of common objects between predicted and real ranking. n is the size of list to be
ranked. its value ranges in [0,1], higher value of (Pn) is better.
• Novelty(Qn) is a metric to measure the ability of a predictor to rank the items in top n position that was
not in top n position in past (ZENG et al. 2013). These are the rising novelties in the system. If we denote
the predicted object as (Ppo) and potential true object as Pro, then the novelty is given by-
Qn = Ppo/Pro
• AUC measures the relative position of the predicted item and true ranked items. Suppose predicted item
list is (Lpn) and real item list is (Lrn). if sop ∈ Lpn and srp ∈ Lrn is score of object in predicted then AUC
is given by-
where,
P
op∈Lpn
AU C =
I(spn, srn) =
P
I(spn, srn)
rp∈Lrn
LpnLrn
0 ⇐ spn < srn
0.5 ⇐ spn = srn
1 ⇐ spn > srn
• Kendal's Tau(τ) measures the correlation between predicted and actual ratings. It varies between −1 and
+1. τ = 1 when predicted and actual are identical,τ = 0 when both ranking is independent and τ = −1
shows they perfectly disagree. It can be given as-
where C is the number of concordant pairs and D is the number of discordant pairs.
τ = C − D
C + D
7
Data
To test the predictors accuracy we have used different data sets including MovieLens, Netflix, Facebook wall post
and Arxiv paper citation. MovieLens and Netflix data sets contains movie ratings, Facebook data set contains
users' wall post relationships and arxiv citation data set contains paper citation information from arxiv database
of High Energy Physics field (Gehrke, Ginsparg, and Kleinberg 2003). Movielens, Netflix and Facebook data is
same as reported in paper (Zhou, Zeng, and Wang 2015). For Arxiv high energy physics citation data contains
papers that were uploaded by scientists. It contains 34, 546 papers from January 1993 to April 2003. There is an
edge if paper i has cited paper j. We have converted the time into number of months. We have considered the
paper j has received link from paper i at the time paper i was submitted to arxiv server. For the three data sets
Facebook, Movielens and Netflix the time is considered in days while for arxiv citation data set the time is in
months since citation process is slower than the rest of the cases. The data description are as follows-
• Netflix data contains 4960 users,16599 movies and 1249058 links, data was collected during(1st Jan 2000
-- 31st Dec 2005).
• MovieLens data set contains 7533 movies, 864581 links and 5000 users and data was collected during(1st
Jan 2002 -- 1st Jan 2005).
• Facebook data contains 40981 set of users and their 38143 wall post activity and 855542 links, during
period of (14 Sep 2004 -- 22nd Jan 2009). If user has posted on a wall there will be a link between the user
and the wall, self influenced is removed by removing the link between user and its own wall post.
• Arxiv-HePh data set contains 30500 number of papers and 347185 edges from January 1993 to April 2003.
8
Figure 1: The above figure shows temporal occurrence of event or link formation per unit of time, i.e
for Movielens, Netflix, Facebook it is in days and for Citation dataset it is in Months.
9
MovieLensTimeNo of Edges020040060080010000200004000060000NetflixTimeNo of Edges0500100015002000050000150000FacebookTimeNo of Edges050010001500050000100000150000CitationTimeNo of Edges0204060801001200100003000050000Analysis and Results
The link prediction models often require to consider the creation (and decay) of the links in a network over
time. In other words, observing the link formation behaviour during a given time (e.g., up to the models will
predict (and rank) nodes' link gain during a period of time window in future (>t). In order to compare different
prediction models, first we have calculated the values for the evaluation metrics (Pn, Qn, AUC, tua), as shown in
Figure 3, considering top 50, 100 and 200 items for all the four datasets.
Results on synthetic data
To prove our models' theoratical relevance in [Figure 2] we have created data for recent degree gain and total
degree gain. To achieve this we have sampled data from population of size n*n, where n is total system size. We
have randomly sampled with replacement, recent degree gain and total degree gain from population of 1000000.
In first column we have plotted the distribution of recent degree gain and in second column, distribution of α in
our model. In third column we have plotted the correlation rank τ with recent degree gain and total degree gain
and with our models. It can be seen the rank correlation for recent degree gain and Recent Behaviour Dominant
Model(Recent:RBDM) is 1. It proves our hypothesis "Recent Behaviour Dominance" effect. In the same way we
have plotted the rank correlation with recent degree gain and RBNDM. We have repated the procedure with
total degree gain also.
Figure 2: We have created random data for recent degree gain and total degree gain and then
calculated our models correlation for varying system size. We have tested upto 1000 size. First figure
from left is probablity distribution of recent degreegain, the middle figure is distribution of α in our
model and the right most is rank correlation τ. The x axis is the size of the system. Y-axis is the
correlation value which can be between -1 to 1. Recent:RBDM means correlation between recent
10
00.00020.00040.00060.00080.0010.00120.00140.00160.00180.002173145217289361433505577649721793865937RecentDegreeGain00.10.20.30.40.50.60.70.80.91168135202269336403470537604671738805872939α -1.5-1-0.500.511.5160119178237296355414473532591650709768827886945Rank Correlation tau Recent:RBDMRecent:RBNDMTotal:RBDMTotal:RBNDMdegree gain and our probposed model RBDM. In same order Total:RBNDM is the rank correlation
between our proposed model RBNDM and total degree gain, and so on.
Results on Real Data
To evaluate the performance of our models we have selected 10 random t for each data sets. Selection of t is
considered in such a way that predictor have enough history information so we left one-third of the data from
start and one-third from last. From middle one-third part we have randomly selected time and then calculated
score. Since predictors are based on nodes' history, we have selected only those node that have received at least
one link before time t. Therefore the new nodes after randomely selected time t will be discarded in our analysis.
Accuracy comparison
For comparing our proposed predictors with benchmark predictors we have considered past time window (TP )
and future time window (TF ) as 30 days and for arxiv citation data set the time is 40 months for past and future
time window both. For comparison we have selected the top n ranked items from predicted list and compare them
against the real items for both the predictors. For pageRank teleportation parameter we have considered 0.90.
While comparing our predictor we have considered the past and future time windows as 30 days in case of
Movielense, Netflix and Facebook respectively. Paper citation case is different, its evolution takes time so instead
of day we have considered no of months. Thus in this case past and future time windows are 40 months. We did
this to make sure we have enough random months so that we can take average of 10 without any bias. Because
after cleaning the data all we have 121 months start from 0 month. 40 months is very short period for paper
citation, generally decay effect cant be seen in this short period of time.
11
12
AUC50AUC100AUC200Pn50Pn100Pn200Qn50Qn100Qn200tauRBDM0.9890.9880.9850.5520.6290.7010.4520.4430.480.564RBNDM0.9880.9890.9860.520.6550.7080.4220.460.4870.553PageRank0.9570.9620.9580.4740.5890.6490.1430.1780.1920.56PBP0.990.9910.9890.5820.6810.7260.3540.3720.4190.57In-degree0.9370.9480.9560.4460.5770.6480000.574TBP0.9910.9910.9870.5660.6640.7090.4350.4480.4650.57600.10.20.30.40.50.60.70.80.91Movielens AUC50AUC100AUC200Pn50Pn100Pn200Qn50Qn100Qn200tauRBDM0.9730.9680.9570.5380.5840.6350.5080.5170.5320.316RBNDM0.9610.960.9470.5220.5630.6270.4540.4810.4940.324PageRank0.9430.9450.9370.3220.4650.5460.1350.2150.2530.316PBP0.9890.9890.9880.5320.570.6220.4350.4560.4490.214In-degree0.9630.9690.9720.2180.3370.4840000.234TBP0.9680.9630.9510.560.5880.6360.4670.5120.520.33200.10.20.30.40.50.60.70.80.91Netflix AUC50AUC100AUC200Pn50Pn100Pn200Qn50Qn100Qn200tauRBDM0.920.8960.8680.3060.3570.3840.2530.2730.2560.304RBNDM0.940.930.9170.2980.350.4070.240.2790.280.359PageRank0.770.7640.7620.0980.1360.2070.0580.0880.1170.197PBP0.9910.9890.9870.3740.4060.4270.260.2610.2340.137In-degree0.9860.9840.9810.2220.2670.3270000.108TBP0.8870.8640.840.320.3340.3690.2770.2490.2690.27600.10.20.30.40.50.60.70.80.91Facebook AUC50AUC100AUC200Pn50Pn100Pn200Qn50Qn100Qn200tauRBDM0.8990.8850.8630.2860.3520.3960.2050.2010.2240.306RBNDM0.9980.9970.9930.630.6530.6620.1540.0890.0640.473PageRank0.9940.9890.9780.4620.4680.4940.2160.180.2190.384PBP0.9990.9980.9960.620.6570.6690.0630.0460.0420.602In-degree0.9990.9980.9960.610.6670.680000.619TBP0.9980.9960.9920.6280.6580.660.1590.0860.0580.47800.10.20.30.40.50.60.70.80.91Citation Figure 3: The performance comparison between proposed methods and benchmark methods for
MovieLens, Netflix, Facebook and citation data set for top 50,100 and 200 items. The metrics used
are; AUC, Pn , Qn and tau, higher the better all the four metrics gives result between 0 and 1 except
tau which gives between -1 to 1.
We have compared our results with the benchmark methods considering top 50,100 and 200 items in list. For
comparing we have considered past item window (TP ) as 30 days and we have tested the predictor for the same
future time length TF = 30 days. For arxiv citation network we have considered TP , TF = 40 months. [Figure
3] shows the comparative performance of proposed method over benchmark method. This result is the best
value achieved by predictors when TF and TP are same as 30 days. In case of citation data set the TF and
TP are 40 months. The parameter value in case of TBP and in our case is as follows: Movielens,Netflix and
γ = 0.06 for Facebook and Citation it is 0.03. In case of PBP λ = 0.98. The pageRank parameter is 0.9 for all
the datasets except Facebook in this case 0.6 gives good precision. From the [Figure 3] have better performance
with benchmark models. Our proposed model not outperforms in all the cases but there atleast one case in which
it always out performs with respect to benchmark models.
Perfomance for fixed past (TP ) and varying future (T_F) time lenght
In the next phase of our analysis, for further comparison of the performance of different predicting models, we
also investigate the effects of the length of past and future time windows, on the performance of models measured
through Pn, Qn, AUC, and tau. .
13
0.90.910.920.930.940.950.960.970.980.9911112131415161718191101111121131141151161171181191RBDMRBNMDIndegree0.30.350.40.450.50.550.60.650.70.751112131415161718191101111121131141151161171181191(PN) RBDMRBNMDIndegreePBPTBPPR0.010.110.210.310.410.511112131415161718191101111121131141151161171181191RBMDRBNMDIndegreePBPTBPPR0.30.350.40.450.50.550.60.650.70.751112131415161718191101111121131141151161171181191RBDMRBDNMIndegreePBPTBPPR0.80.820.840.860.880.90.920.940.960.9811112131415161718191101111121131141151161171181191RBDMRBNMDIn-degreePBPTBPPR00.10.20.30.40.50.60.711223344556677889100111122133144155166177188199RBDMRBNMDIn-degreePBPTBPPR00.10.20.30.40.50.61112131415161718191101111121131141151161171181191RBDMRBNMDIn-degreePBPTBPPR00.050.10.150.20.250.30.350.40.450.51112131415161718191101111121131141151161171181191RBDMRBNDMIndegreeFigure 4: Performance of the predictor for diferent values on future time window TF . The varticle
columns are from right to left for AUC, Pn , novelty (Qn) and rank correlation (tau). This result is
for top 100 items perfromance except rank correlation tau which works on the whole data. Y-axis is
for metrics, AUC, Pn , Qn and tau results, higher the better.
In [Figure 4] we have shown the performance of our predictor against the benchmark predictors for different
values of future time window.For TBP and PBP the parameter values are same as the TBP author has reported
in their paper. Here we have considered past time window as fixed. We have calculated accuracy on the basis of
varying future time window. In case of Movielens long term precision prediction is not good while Qn prediction
is good. We can find our proposed model's performance is good. From precision analysis we can find our proposed
models performance doesn't get affected by future time window TF for all the datasets. Rank correlation τ also
gets better as future time window increases for all the data sets. Novelty Qn affected by future time window only
in case of Facebook. Our proposed model may not out perform all the predictors in all the situation but it has
theoretical significance.
The effects of Tp and Tf on the proposed models (RBDM and RBNDM) performance
In the [Figure 5] we have shown the effect of recent behavior dominance and recent behavior non dominance in
making prediction. To see the performance we have selected top 100 items. ML-DOM implies, result for top 100
items considering AUC index for Movielense (ML) Data set and considering RBDM (DM-Dominant Model) and
so on.
14
0.70.750.80.850.90.9511112131415161718191101111121131141151161171181191RBDMRBNMDIn-degreePBPTBPPR00.050.10.150.20.250.30.350.40.450.51112131415161718191101111121131141151161171181191Facebook RBDMRBNMDIn-degreePBPTBPPR00.050.10.150.20.250.30.351112131415161718191101111121131141151161171181191RBDMRBNMDIn-degreePBPTBPPR00.050.10.150.20.250.30.350.40.450.51112131415161718191101111121131141151161171181191RBDMRBNDMIndegreePBPTBPPR0.740.790.840.890.940.9913579111315171921232527293133353739RBDMRBNMDIn-degreePBPTBPPR00.10.20.30.40.50.60.70.813579111315171921232527293133353739RBDMRBNMDIn-degreePBPTBPPR00.050.10.150.20.2513579111315171921232527293133353739RBDMRBNMDIn-degreePBPTBPPR00.10.20.30.40.50.60.70.813579111315171921232527293133353739RBDMRBNDMIndegreePBPTBPPRFigure 5: Performance of RBDM Vs RBNDM, considering past time window (TP ) and future
time window (TF ) same upto 200 days. In case of Citation the number time is upto 40 months.
Abbreviations: ML- Movielens, NF-Netflix, FB-Facebook and CIT- Citation dataset, DOM is for
RBDM model and NON-DOM is for RBNDM. The y-axis shows the metrics value, higher the better
all the three metrics; Precision (Pn), Novelty(Qn) and AUC gives result between 0 and 1, rank
correlation tau (τ) can give values between -1 to 1. The x-axis shows the time duration for past and
future time window.
In AU C analysis we have found that in case of Movielens short term and long term prediction has no effect. Its
performance doesn't get affected by shorter and longer time window much. Specially in case of Movielens. In
case of Netflix both the predictors has almost similar performance but after 100 days a slight deterioration in
performance found. Similar effect have found for Facebook also. In case of Citation data set the time window is
in terms of months, so up to 40 months its performance increases. In case of Movielens precision (Pn) analysis
the predictor have similar performance and its accuracy are also not getting affected. Past and future time
window have negligible effect. In Qn or novelty prediction analysis we have found that Netflix data has better
performance over others, while both the predictor has similar performance. The novelty prediction much affected
by past and future time window as compare to AUC and Precision. Only for predicting citation data the both
predictors performance varies much in which predictor RBDM has better performance. In case of rank correlation
both predictor have similar performance, only in case of citation RBNDM performs better.
15
0.60.650.70.750.80.850.90.95117131925313743495561677379859197103109115121127133139145151157163169175181187193199 ML_DOM NF_DOM FB_DOM CIT_DOM ML_NON_DOM NF_NON_DOM FB_NON_DOM CIT_NON_DOM00.10.20.30.40.50.60.70.817131925313743495561677379859197103109115121127133139145151157163169175181187193199 ML_DOM NF_DOM FB_DOM CIT_DOM ML_NON_DOM NF_NON_DOM FB_NON_DOM CIT_NON_DOM00.10.20.30.40.50.617131925313743495561677379859197103109115121127133139145151157163169175181187193199 ML_DOM NF_DOM FB_DOM CIT_DOM ML_NON_DOM NF_NON_DOM FB_NON_DOM CIT_NON_DOM-0.050.050.150.250.350.450.550.650.7517131925313743495561677379859197103109115121127133139145151157163169175181187193199Tau-RBDM Vs RBNDM ML_DOMNF_DOMFB_DOMCIT_DOMML_NON_DOMNF_NON_DOMFB_NON_DOMCIT_NON_DOMConclusions
In this manuscript we came up with two models to make prediction of node on online social media or evolving
networks specially considering its temporal behavior. The first model (Recent Behavior Dominant Model(RBDM))
we have considered that people go for popular as well as follow recent behaviours but recent behavior dominates
especially in case when node has recieved more links in recent past. It suppose that random walker walks on
a network and can jump to any node, the probablity of jumping to other nodes is based on which node is
recently more active or receiving more link. The more recently node has received link the more it will dominate
over total degree for future link gain. The second model (Recent Behavior Non-Dominant Model(RBNDM))
in which we think the node will gain more links if it is recently active and also have gained link in past. We
have compared our results with state of the art models i.e popularity based predictor, pageRank , In-degree and
TBP. To test the robustness of our model we have tested our models on different data sets which has different
temporal distribution. we have found our proposed model performs better. Our models not always out performs
the benchmarks models but in different cases on different data sets such as RBNDM doesn't perform better than
RBDM in other case but in case of citation data set it performs better in precision, novelty and rank correlation.
Although with TBP some times it lacks. The merits of our model is it helps identifying novel entries without
any significant cost of predicting already popular items. In this paper we have considered the recent behavior as
the basis of identifying rising novelties with other combinations such as aging, dominant recent behavior as well
as non dominant recent behavior. In all of these with respect to our data sets prediction accuracy is good. We
have considered only temporal effects of the node's attracting new link. We have found it one of the important
feature for making prediction and considering other complex feature might increase accuracy but it increases
computational complexity. So we can say our model computational resource efficient also. In our current work we
have not considered any threshold when recent behavior will start dominating over total behavior in future work
one can consider the threshold.
Acknowledgement
This work was supported by the National Natural Science Foundation of China (Grant Nos. 61370150 and
61433014).
References
Abbasi, Alireza. 2016. "A Longitudinal Analysis of Link Formation on Collaboration Networks." Journal of
Informetrics. http://www.sciencedirect.com/science/article/pii/S1751157716300815. http://dx.doi.org/10.1016/j.
16
joi.2016.05.001.
Axtell, R. L. 2001. "Zipf Distribution of U.S. Firm Sizes." Science 293 (5536). American Association for the
Advancement of Science (AAAS): 1818 -- 20. doi:10.1126/science.1062081.
Bouchaud, Jean-Philippe, Andrew Matacz, and Marc Potters. 2001. "Leverage Effect in Financial Mar-
kets: The Retarded Volatility Model." Phys. Rev. Lett.
87 (22). American Physical Society (APS).
doi:10.1103/physrevlett.87.228701.
Brin, Sergey, and Lawrence Page. 1998. "The Anatomy of a Large-Scale Hypertextual Web Search Engine."
Computer Networks and ISDN Systems 30 (1-7). Elsevier BV: 107 -- 17. doi:10.1016/s0169-7552(98)00110-x.
Buldyrev, Sergey V., Roni Parshani, Gerald Paul, H. Eugene Stanley, and Shlomo Havlin. 2010. "Catas-
trophic Cascade of Failures in Interdependent Networks." Nature 464 (7291). Springer Nature: 1025 -- 28.
doi:10.1038/nature08932.
Cheng, Justin, Lada A. Adamic, Jon M. Kleinberg, and Jure Leskovec. 2016. "Do Cascades Recur?" In
Proceedings of the 25th International Conference on World Wide Web, WWW 2016, Montreal, Canada, April 11 -
15, 2016, edited by Jacqueline Bourdeau, Jim Hendler, Roger Nkambou, Ian Horrocks, and Ben Y. Zhao, 671 -- 81.
ACM. doi:10.1145/2872427.2882993.
E., F. Y., and G. Udny Yule. 1925. "A Mathematical Theory of Evolution Based on the Conclusions of Dr. J. c.
Willis, F.R.S." Journal of the Royal Statistical Society 88 (3). JSTOR: 433. doi:10.2307/2341419.
Eisler, Zoltán, Imre Bartos, and János Kertész. 2008. "Fluctuation Scaling in Complex Systems: Taylors Law
and Beyond1." Advances in Physics 57 (1). Informa UK Limited: 89 -- 142. doi:10.1080/00018730801893043.
Garlaschelli, Diego, Guido Caldarelli, and Luciano Pietronero. 2003. "Universal Scaling Relations in Food Webs."
Nature 423 (6936). Springer Nature: 165 -- 68. doi:10.1038/nature01604.
Gehrke, Johannes, Paul Ginsparg, and Jon Kleinberg. 2003. "Overview of the 2003 KDD Cup." SIGKDD Explor.
Newsl. 5 (2). Association for Computing Machinery (ACM): 149. doi:10.1145/980972.980992.
Ginsberg, Jeremy, Matthew H. Mohebbi, Rajan S. Patel, Lynnette Brammer, Mark S. Smolinski, and Larry
Brilliant. 2008. "Detecting Influenza Epidemics Using Search Engine Query Data." Nature 457 (7232). Springer
Nature: 1012 -- 14. doi:10.1038/nature07634.
Gleeson, James P, Davide Cellai, Jukka-Pekka Onnela, Mason A Porter, and Felix Reed-Tsochas. 2014. "A
Simple Generative Model of Collective Online Behavior." Proceedings of the National Academy of Sciences 111
(29). National Acad Sciences: 10411 -- 15. doi:10.1073/pnas.1313895111.
17
Haldane, Andrew G., and Robert M. May. 2011. "Systemic Risk in Banking Ecosystems." Nature 469 (7330).
Springer Nature: 351 -- 55. doi:10.1038/nature09659.
Herlocker, Jonathan L., Joseph A. Konstan, Loren G. Terveen, and John T. Riedl. 2004. "Evaluating Collaborative
Filtering Recommender Systems." ACM Transactions on Information Systems 22 (1). Association for Computing
Machinery (ACM): 5 -- 53. doi:10.1145/963770.963772.
Hommes, C. H. 2002. "Modeling the Stylized Facts in Finance Through Simple Nonlinear Adaptive Systems."
Proceedings of the National Academy of Sciences 99 (Supplement 3). Proceedings of the National Academy of
Sciences: 7221 -- 28. doi:10.1073/pnas.082080399.
Hoppe, Fred M. 1984. "Polya-Like Urns and the Ewens Sampling Formula." Journal of Mathematical Biology 20
(1). Springer Nature: 91 -- 94. doi:10.1007/bf00275863.
Ke, Qing, Emilio Ferrara, Filippo Radicchi, and Alessandro Flammini. 2015. "Defining and Identifying Sleeping
Beauties in Science." Proceedings of the National Academy of Sciences 112 (24). Proceedings of the National
Academy of Sciences: 7426 -- 31. doi:10.1073/pnas.1424329112.
King, G. 2011. "Ensuring the Data-Rich Future of the Social Sciences." Science 331 (6018). American Association
for the Advancement of Science (AAAS): 719 -- 21. doi:10.1126/science.1197872.
Parolo, Pietro Della Briotta, Raj Kumar Pan, Rumi Ghosh, Bernardo A. Huberman, Kimmo Kaski, and
Santo Fortunato. 2015. "Attention Decay in Science." Journal of Informetrics 9 (4). Elsevier BV: 734 -- 45.
doi:10.1016/j.joi.2015.07.006.
Perc, M. 2012. "Evolution of the Most Common English Words and Phrases over the Centuries." Journal of The
Royal Society Interface 9 (77). The Royal Society: 3323 -- 28. doi:10.1098/rsif.2012.0491.
Preis, Tobias, Helen Susannah Moat, and H. Eugene Stanley. 2013. "Quantifying Trading Behavior in Financial
Markets Using Google Trends." Sci. Rep. 3 (April). Nature Publishing Group. doi:10.1038/srep01684.
Redner, S. 1998. "How Popular Is Your Paper? An Empirical Study of the Citation Distribution." The European
Physical Journal B 4 (2). Springer Nature: 131 -- 34. doi:10.1007/s100510050359.
Simon, Herbert A. 1955. "On a Class of Skew Distribution Functions." Biometrika 42 (3/4). JSTOR: 425.
doi:10.2307/2333389.
Tria, F., V. Loreto, V. D. P. Servedio, and S. H. Strogatz. 2014. "The Dynamics of Correlated Novelties." Sci.
Rep. 4 (July). Nature Publishing Group. doi:10.1038/srep05890.
Vespignani, A. 2009. "Predicting the Behavior of Techno-Social Systems." Science 325 (5939). American
Association for the Advancement of Science (AAAS): 425 -- 28. doi:10.1126/science.1171990.
18
Wang, D., C. Song, and A.-L. Barabasi. 2013. "Quantifying Long-Term Scientific Impact." Science 342 (6154).
American Association for the Advancement of Science (AAAS): 127 -- 32. doi:10.1126/science.1237825.
Zanette, Damián, and Marcelo Montemurro. 2005. "Dynamics of Text Generation with Realistic Zipfs Distribution."
Journal of Quantitative Linguistics 12 (1). Informa UK Limited: 29 -- 40. doi:10.1080/09296170500055293.
ZENG, AN, STANISLAO GUALDI, MATÚŠ MEDO, and YI-CHENG ZHANG. 2013. "Trend Prediction in
Temporal Bipartite Networks: The Case of Movielens, Netflix, and Digg." Advances in Complex Systems 16
(04n05). World Scientific Pub Co Pte Lt: 1350024. doi:10.1142/s0219525913500240.
Zhou, Yanbo, An Zeng, and Wei-Hong Wang. 2015. "Temporal Effects in Trend Prediction: Identifying the Most
Popular Nodes in the Future." Edited by Xia Li. PLOS ONE 10 (3). Public Library of Science (PLoS): e0120735.
doi:10.1371/journal.pone.0120735.
19
|
1909.05838 | 1 | 1909 | 2019-09-12T17:44:15 | Multilingual Multimodal Digital Deception Detection and Disinformation Spread across Social Platforms | [
"cs.SI"
] | Our main contribution in this work is novel results of multilingual models that go beyond typical applications of rumor or misinformation detection in English social news content to identify fine-grained classes of digital deception across multiple languages (e.g. Russian, Spanish, etc.). In addition, we present models for multimodal deception detection from images and text and discuss the limitations of image only and text only models. Finally, we elaborate on the ongoing work on measuring deceptive content (in particular disinformation) spread across social platforms. | cs.SI | cs | Multilingual Multimodal Digital Deception Detection and Spread
across Social Platforms
Maria Glenski, Ellyn Ayton, Josh Mendoza, and Svitlana Volkova
Data Sciences and Analytics Group
Pacific Northwest National Laboratory
{maria.glenski, ellyn.ayton, joshua.mendoza, svitlana.volkova}@pnnl.gov
Richland, Washington 99352
9
1
0
2
p
e
S
2
1
]
I
S
.
s
c
[
1
v
8
3
8
5
0
.
9
0
9
1
:
v
i
X
r
a
Motivation
There is a deluge of information flooding feeds, timelines,
and forums online but even in the wake of this, users are in-
creasingly relying on these platforms for news and informa-
tion to base not only their opinions but actions. An August
2018 survey from the Pew Research Center found that 68%
of Americans report that they get at least some of their news
from social media (Matsa and Shearer 2018) while another
found that the rate of Americans who often get their news
online in some way increased from 38% in 2016 to 43%
in 2017 (Bialik and Matsa 2017). Alongside the increased
access to information and on-demand news about local and
global events alike, there has been a deluge of misleading or
deceptive misinformation. The spread of this "digital disin-
formation" within and across networks is of great concern.
The impact of digital disinformation has been seen in sev-
eral areas from natural disasters and other crisis events (Star-
bird et al. 2014; Starbird 2017; Takahashi, Tandoc, and
Carmichael 2015) to politics (Hadgu, Garimella, and We-
ber 2013), health-related conspiracies (Seymour et al. 2015;
Jolley and Douglas 2014), and more. At the level of individ-
ual experiences, recent Pew Research Center studies have
found that the average user is highly concerned about mis-
information in their general use: 31% see inaccuracy as the
top concern when consuming news from social media, 64%
of adults believe fake news stories caused a great deal of
confusion (Mitchell, Holcomb, and Barthel 2016), and 57%
of social media users who consume news from one or more
of those platforms expect the news they see to be "largely
inaccurate" (Matsa and Shearer 2018).
Recent Work
Many studies focused on digital deception, in particular de-
ception in open-source data including social media, have fo-
cused on rumor and misinformation detection with a pri-
mary focus on the network's role in information diffu-
sion models (Qazvinian et al. 2011; Kwon et al. 2013;
Wu, Yang, and Zhu 2015; Kwon, Cha, and Jung 2017).
Other studies compare and contrast the behavior of tradi-
tional and alternative media (Starbird 2017), classify media
Copyright c(cid:13) 2019, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
sources into sub-categories of misinformation (Wang 2017;
P´erez-Rosas and Mihalcea 2015; Volkova et al. 2017; Baly
et al. 2018), or attempt to detect rumor-spreading users (Rath
et al. 2017).
Our main contribution in this work is novel results of
multilingual models that go beyond typical applications of
rumor or misinformation detection in English social news
content to identify fine-grained classes of digital deception
across multiple languages (e.g., Russian, Spanish, etc.). In
addition, we present models for multimodal deception de-
tection from images and text and discuss the limitations of
image only and text only models. Finally, we elaborate on
the ongoing work on measuring deceptive content (in partic-
ular disinformation) spread across social platforms.
Identifying linguistic markers of digital deception and
their contribution to detection models in English First,
we examined linguistic cues of digital deception across a
spectrum (disinformation, propaganda, conspiracy, hoaxes,
and satire) to develop predictive models with which we clas-
sified 130 thousand news posts on Twitter as suspicious
or verified, and predicted four sub-classes of suspicious
news satire, hoaxes, clickbait and propaganda (Volkova et
al. 2017). Similar to Vosoughi, Roy, and Aral 2018 and Grin-
berg et al. 2019, we relied on source-based annotations
rather than content-level annotations to capture the intent be-
hind spreading deceptive content.
Through this study, we identified several key differences
between news tweets of different sub-classes when spread
online. For example, we saw that credible news tweets
(i.e., those that did not spread digital deception) contain sig-
nificantly less bias markers, hedges and subjective terms and
less harm/care, loyalty/betrayal and authority moral cues
compared to news tweets spreading varied types of digital
deception.
The best performing models built to detect these fine-
grained classes achieved accuracy of 0.95 on the binary pre-
dictive task and F1 of 0.91 on the multi-class. This work
was built upon in a subsequent studies (Rashkin et al. 2017;
Volkova and Jang 2018) that examined linguistic and lexi-
cal features of various types of deceptive news articles and
disinformation statements to show that these features con-
Figure 1: Key findings from the analysis of multimodal deception detection model behavior from (Volkova et al. 2019).
tribute to the understanding of the differences between re-
liable news sources and those that spread disinformation
which can also be leveraged for effective detection models.
Understanding patterns of engagement and information
spread from deceptive news sources
In a large-scale
study of news in social media, we analyzed 11 million
posts and investigated the propagation behavior of users that
directly interact with news accounts identified as spread-
ing credible information versus digital deception (Glenski,
Weninger, and Volkova 2018c). Unlike previous work which
primarily looks at specific rumors or events, we focused on
news sources in an effort to bridge the gap in the understand-
ing of how users react to news sources of varying credibil-
ity and how their various initial responses contribute the the
spread of digital deception.
Our analysis identified several key differences in prop-
agation behavior from credible versus suspicious news
sources such as high inequity in the diffusion rate based
on the source of deception, with a small group of highly
active users responsible for the majority of disinforma-
tion spread overall and within various demographics. Our
demographics-based analysis found that users with lower
annual income and education share more from disinforma-
tion sources compared to their counterparts. In a subsequent
study, we further identified significant differences in the pat-
terns of engagements from automated "bot" accounts ver-
sus humans (Glenski, Weninger, and Volkova 2018a) and
how user-reactions to deceptive and credible news sources
remain consistent as well as differ across multiple plat-
forms (Glenski, Weninger, and Volkova 2018b).
Explaining multimodal digital deception detection An-
other recent area of interest has been the incorporation
of image-based features to more accurately identify multi-
modal digital deception.
In this recent study (Volkova et al. 2019), we presented
multi-modal deceptive news classification models and an in-
depth quantitative and qualitative analysis of their behavior
when classifying various classes of digital deception that in-
corporates imagery alongside text. Key findings of the anal-
ysis of model behavior are highlighted in Figure 1. When
we compared the performance of models that rely on text
or image features alone along with models trained on text
and images jointly, we found that the latter models outper-
form the individually trained model with F1 scores as high
as 0.74 for binary classification of deceptive (propaganda
or disinformation) versus credible. Our quantitative analysis
reveals that when considering only one aspect of the content,
the text only models outperform those that just leverage im-
age features (by 3-13% absolute in F-measures). Finally, we
also presented a novel interactive tool ErrFILTER1 that al-
lows users to explain model prediction by characterizing text
and image traits of suspicious news content and analyzing
patterns of errors made by the various models, which can in
turn be used to inform the design of future digital deception
detection models.
Multilingual Deception Detection
The main contribution of this extended abstract focuses on
the results of our predictive models that identify fine-grained
classifications of digital deception and related deceptive
content from multilingual social media postings. Similarly
to the recent work described above that focused on multi-
platform and multi-modal deception detection, we focus on
multi-dimensional computational approaches to identifying
multilingual digital disinformation and misinformation be-
ing spread in social media.
1ErrFilter is available at https://github.com/pnnl/errfilter
Figure 2: Distribution of languages represented in the large multilingual dataset of 7M Twitter posts from 2016.
Detection Task In this work, we concentrate on deception
detection in multilingual social media postings structured as
two multi-class classification tasks :
1. 4-way Classification
Given a social media posting, classify the text as Propa-
ganda, Conspiracy, Hoax, or Clickbait.
2. 5-way Classification
Given a social media posting, classify the text as Disin-
formation, Propaganda, Conspiracy, Hoax, or Clickbait.
Multilingual Twitter Data The dataset used in this work
comprises 7M posts in a variety of languages from English
to Russian, German, and Spanish. We present the distribu-
tion of languages represented in this dataset in Figure 2.
Here, we see that the majority (47%) of the data collected
has text written in Russian, followed by English posts (36%)
with the remainder composed of Spanish, German, French,
Arabic, Ukranian, Portugeese, Italian, and other languages.
Multilingual Deception Detection Building off of previ-
ous, related tasks (Volkova et al. 2017), we use a similar neu-
ral architecture for this task. This architecture, composed of
a network and/or linguistic cues sub-network (left) and a text
representation (as word or characters) sub-network (right).
As typical with other multi-classification tasks, we re-
port the macro F1 scores for each of our models on the
4-way and 5-way classification tasks. We highlight one of
our key findings in Figure 3 which illustrates the model per-
formance in terms of macro F1 scores on the multilingual
dataset. Unlike for English (explored in (Volkova et al. 2017;
Rashkin et al. 2017)), text representations in characters in
combination with DeepWalk representation network fea-
tures achieve the best performance of 0.76 for both the 4-
way and 5-way classification tasks.
Ongoing Work: Measuring Cross-Platform
Spread of Disinformation
Intuitively, the next steps need to focus on measuring cross-
platform spread of disinformation. Social media platforms
on which digital disinformation is released and promoted do
not exist in a vacuum, and, thus, the connections between
Figure 3: Macro F1 scores for 4-way and 5-way classifica-
tion tasks in a multilingual setting.
platforms and communities have a potentially significant im-
pact on the spread and virality of digital disinformation. Al-
though we have previously examined the concurrent spread
of information from news sources on multiple platforms,
our continued efforts in this area focus on incorporating the
cross-platform links between users who actively spread or
engage with disinformation and the cross-platform URLs as-
sociated with disinformation narratives.
Under DARPA SocialSim program2, we developed a uni-
fied framework for measuring information spread and evolu-
tion within and across social platforms, that was presented at
the ICWSM 2019 tutorial3.Our framework will allow us to
measure disinformation spread within and across social plat-
forms e.g., Twitter, Youtube and Telegram focusing on spe-
cific social phenomena -- information cascades, recurrence,
persistent groups and coordinated effort. More specifically,
we will focus on several user cases of known disinforma-
2https://www.darpa.mil/program/computational-simulation-of-
online-social-behavior
3https://sites.google.com/alumni.nd.edu/icwsm19t3/
tion: the White Helmets4, Syrian airstrikes5 and NATO ex-
ercises6. Additionally, we will be measuring disinformation
spread and the effect of censorship during internet outages
during crisis events in Venezuela7 and Sri Lanka8.
Biographical Notes
Maria Glenski received the Ph.D. degree from the Univer-
sity of Notre Dame, Notre Dame, IN, USA, in 2019. She
is currently a Data Scientist in the Data Sciences and An-
alytics group, National Security Directorate, Pacific North-
west National Laboratory. Her research in social media anal-
ysis, rating systems, and social news consumption has been
published in the ACM Conference on Hypertext and Social
Media, ACM Transactions on Intelligent Systems and Tech-
nology, and the ACM Conference on Computer-Supported
Cooperative Work and Social Computing.
Ellyn Ayton Ellyn Ayton is a Data Scientist at Pacific North-
west National Lab. Her work focuses on machine learning
and natural language processing, with applications to de-
ceptive news detection and social media analytics. Ellyn re-
ceived her MS in Computer Science from Western Washing-
ton University in 2018.
Josh Mendoza Joshua Mendoza is currently a Data Scien-
tist in the Data Sciences and Analytics group, National Secu-
rity Directorate, Pacific Northwest National Laboratory. His
work focuses on deep learning and engineering, with appli-
cations in natural language processing and computer vision.
Joshua received his bachelors degree with honors in 2015
from the University of Washington.
Svitlana Volkova received the Ph.D. degree from Johns
Hopkins University, Baltimore, MD, USA, in 2015. She is
currently a senior scientist at the Data Sciences and Ana-
lytics group, National Security Directorate, Pacific North-
west National Laboratory. Her research focuses on advanc-
ing machine learning, deep learning and natural language
processing techniques to build novel predictive and forecast-
ing social media analytics. Her models advance understand-
ing, analysis, and effective reasoning about extreme volumes
of dynamic, multilingual, and diverse real-world social me-
dia data. She was awarded the Google Anita Borg Memorial
Scholarship in 2010 and the Fulbright Scholarship in 2008.
Dr. Volkova is a Vice Chair of the ACM Future of Comput-
ing Academy.
References
Baly, R.; Karadzhov, G.; Alexandrov, D.; Glass, J.; and
Nakov, P. 2018. Predicting factuality of reporting and bias
of news media sources. In Proceedings of EMNLP, 3528 --
3539.
Bialik, K., and Matsa, K. E. 2017. Key trends in social and
digital news media. Pew Research Center.
Glenski, M.; Weninger, T.; and Volkova, S. 2018a. How
humans versus bots react to deceptive and trusted news
sources: A case study of active users. In 2018 IEEE/ACM
International Conference on Advances in Social Networks
Analysis and Mining (ASONAM), 654 -- 661. IEEE.
Glenski, M.; Weninger, T.; and Volkova, S. 2018b.
Iden-
tifying and understanding user reactions to deceptive and
trusted social news sources. In Proceedings of the 56th An-
nual Meeting of the Association for Computational Linguis-
tics (Volume 2: Short Papers), 176 -- 181.
Glenski, M.; Weninger, T.; and Volkova, S. 2018c. Propa-
gation from deceptive news sources who shares, how much,
how evenly, and how quickly? IEEE Transactions on Com-
putational Social Systems 5(4):1071 -- 1082.
Grinberg, N.; Joseph, K.; Friedland, L.; Swire-Thompson,
B.; and Lazer, D. 2019. Fake news on twitter during the
2016 us presidential election. Science 363(6425):374 -- 378.
Hadgu, A. T.; Garimella, K.; and Weber, I. 2013. Politi-
cal hashtag hijacking in the us. In Proceedings of the 22nd
International Conference on World Wide Web, 55 -- 56. ACM.
Jolley, D., and Douglas, K. M. 2014. The effects of anti-
vaccine conspiracy theories on vaccination intentions. PloS
one 9(2):e89177.
Kwon, S.; Cha, M.; Jung, K.; Chen, W.; and Wang, Y. 2013.
Prominent features of rumor propagation in online social
media. In Proceedings of the 13th International Conference
on Data Mining (ICDM), 1103 -- 1108. IEEE.
Kwon, S.; Cha, M.; and Jung, K. 2017. Rumor detection
over varying time windows. PloS One 12(1):e0168344.
Matsa, K. E., and Shearer, E. 2018. News use across social
media platforms 2018. Pew Research Center.
Mitchell, A.; Holcomb, J.; and Barthel, M. 2016. Many
americans believe fake news is sowing confusion. Pew Re-
search Center.
P´erez-Rosas, V., and Mihalcea, R.
in open domain deception detection.
EMNLP, 1120 -- 1125.
Qazvinian, V.; Rosengren, E.; Radev, D. R.; and Mei, Q.
2011. Rumor has it: Identifying misinformation in mi-
In Proceedings of the Conference on Empirical
croblogs.
Methods in Natural Language Processing (EMNLP), 1589 --
1599. Association for Computational Linguistics.
Rashkin, H.; Choi, E.; Jang, J. Y.; Volkova, S.; and Choi,
Y. 2017. Truth of varying shades: Analyzing language in
In Proceedings of
fake news and political fact-checking.
the 2017 Conference on Empirical Methods in Natural Lan-
guage Processing, 2921 -- 2927.
2015. Experiments
In Proceedings of
4https://www.washingtonpost.com/world/
russian-disinformation-campaign-targets-syrias-beleaguered-rescue-workers/
2018/12/18/113b03c4-02a9-11e9-8186-4ec26a485713 story.html
5https://www.foxnews.com/world/
russian-trolls-ramp-up-disinformation-campaign-after-syria-airstrikes-pentagon
6https://dod.defense.gov/News/Article/Article/1649146/
nato-moves-to-combat-russian-hybrid-warfare/
7https://www.npr.org/2019/01/26/688868687/
amid-chaos-venezuelans-struggle-to-find-the-truth-online
8https://www.washingtonpost.com/technology/2019/04/22/
sri-lankas-social-media-shutdown-illustrates-global-discontent-with-silicon-valley/
?utm term=.6166a484a0c7
Rath, B.; Gao, W.; Ma, J.; and Srivastava, J. 2017. From
retweet to believability: Utilizing trust to identify rumor
spreaders on twitter. Proceedings of the IEEE/ACM Interna-
tional Conference on Advances in Social Networks Analysis
and Mining (ASONAM).
Seymour, B.; Getman, R.; Saraf, A.; Zhang, L. H.; and
Kalenderian, E. 2015. When advocacy obscures accuracy
online: digital pandemics of public health misinformation
through an antifluoride case study. American journal of pub-
lic health 105(3):517 -- 523.
Starbird, K.; Maddock, J.; Orand, M.; Achterman, P.; and
Mason, R. M. 2014. Rumors, false flags, and digital vig-
ilantes: Misinformation on twitter after the 2013 boston
marathon bombing. iConference 2014 Proceedings.
Starbird, K. 2017. Examining the alternative media ecosys-
tem through the production of alternative narratives of mass
In Proceedings of the 11th
shooting events on twitter.
International AAAI Conference on Web and Social Media
(ICWSM). AAAI.
Takahashi, B.; Tandoc, E. C.; and Carmichael, C. 2015.
Communicating on twitter during a disaster: An analysis of
tweets during typhoon haiyan in the philippines. Computers
in Human Behavior 50:392 -- 398.
Volkova, S., and Jang, J. Y. 2018. Misleading or falsifica-
tion: Inferring deceptive strategies and types in online news
and social media. In Proceddings of the Web, 575 -- 583.
Volkova, S.; Shaffer, K.; Jang, J. Y.; and Hodas, N. 2017.
Separating facts from fiction: Linguistic models to classify
In Proceed-
suspicious and trusted news posts on twitter.
ings of the 55th Annual Meeting of the Association for Com-
putational Linguistics (Volume 2: Short Papers), volume 2,
647 -- 653.
Volkova, S.; Ayton, E.; Arendt, D.; Huang, Z.; and Hutchin-
son, B. 2019. Explaining multimodal deceptive news pre-
In Proceedings of the 2019 International
diction models.
Conference on Web and Social Media.
Vosoughi, S.; Roy, D.; and Aral, S. 2018. The spread of true
and false news online. Science 359(6380):1146 -- 1151.
Wang, W. Y. 2017. "Liar, liar pants on fire": A new bench-
In Proceedings of
mark dataset for fake news detection.
ACL, 422 -- 426.
Wu, K.; Yang, S.; and Zhu, K. Q. 2015. False rumors detec-
tion on sina weibo by propagation structures. In Proceedings
of the 31st International Conference on Data Engineering
(ICDE), 651 -- 662. IEEE.
|
1811.05015 | 1 | 1811 | 2018-11-12T21:56:07 | A Team-Formation Algorithm for Faultline Minimization | [
"cs.SI"
] | In recent years, the proliferation of online resumes and the need to evaluate large populations of candidates for on-site and virtual teams have led to a growing interest in automated team-formation. Given a large pool of candidates, the general problem requires the selection of a team of experts to complete a given task. Surprisingly, while ongoing research has studied numerous variations with different constraints, it has overlooked a factor with a well-documented impact on team cohesion and performance: team faultlines. Addressing this gap is challenging, as the available measures for faultlines in existing teams cannot be efficiently applied to faultline optimization. In this work, we meet this challenge with a new measure that can be efficiently used for both faultline measurement and minimization. We then use the measure to solve the problem of automatically partitioning a large population into low-faultline teams. By introducing faultlines to the team-formation literature, our work creates exciting opportunities for algorithmic work on faultline optimization, as well as on work that combines and studies the connection of faultlines with other influential team characteristics. | cs.SI | cs |
A Team-Formation Algorithm
for Faultline Minimization
Sanaz Bahargama, Behzad Golshana, Theodoros Lappasb, Evimaria Terzia
aBoston University
bStevens Institute of Technology
Abstract
In recent years, the proliferation of online resumes and the need to evaluate large
populations of candidates for on-site and virtual teams have led to a growing
interest in automated team-formation. Given a large pool of candidates, the
general problem requires the selection of a team of experts to complete a given
task. Surprisingly, while ongoing research has studied numerous variations with
different constraints, it has overlooked a factor with a well-documented impact
on team cohesion and performance: team faultlines. Addressing this gap is
challenging, as the available measures for faultlines in existing teams cannot be
efficiently applied to faultline optimization. In this work, we meet this challenge
with a new measure that can be efficiently used for both faultline measurement
and minimization. We then use the measure to solve the problem of automat-
ically partitioning a large population into low-faultline teams. By introducing
faultlines to the team-formation literature, our work creates exciting opportu-
nities for algorithmic work on faultline optimization, as well as on work that
combines and studies the connection of faultlines with other influential team
characteristics.
Keywords: Teams, Team Faultlines, Team Formation
Email addresses: [email protected] (Sanaz Bahargam), [email protected] (Behzad
Golshan), [email protected] (Theodoros Lappas), [email protected] (Evimaria Terzi)
Preprint submitted to Expert Systems With Applications
November 14, 2018
1. Introduction
The problem of organizing the individuals in a given population into teams
emerges in multiple domains. In a business setting, the workforce of a firm is
organized in groups, with each group dedicated to a different project (Mohrman
et al., 1995). In an educational context, it is common for the instructor to parti-
tion the students in her class into small teams, with team members collaborating
to complete different types of assignments (Agrawal et al., 2014a, Webb, 1982,
Bahargam et al., 2017, Agrawal et al., 2014b). In a government setting, elected
officials are organized in committees that design and implement policies for a
wide spectrum of critical issues (Fenno, 1973).
In recent years, the proliferation of online resumes and the need to evaluate
large populations of candidates for on-site and virtual teams have led to a grow-
ing interest in automated team-formation (Lappas et al., 2009, Anagnostopoulos
et al., 2012a, Golshan et al., 2014, Anagnostopoulos et al., 2012b, Kargar and
An, 2011, An et al., 2013, Dorn and Dustdar, 2010, Gajewar and Sarma, 2012, Li
and Shan, 2010, Sozio and Gionis, 2010, Agrawal et al., 2014a, Bahargam et al.,
2015). Given a large pool of candidates, the general problem requires the selec-
tion of a team of experts to complete a given task. The ongoing literature has
studied numerous problem variations with different constraints and optimiza-
tion criteria. Examples include the coverage of all the skills required to achieve
a set of goals (Lappas et al., 2009, Li and Shan, 2010, Gajewar and Sarma,
2012), smooth communication among the members of the team (Rangapuram
et al., 2013, Anagnostopoulos et al., 2012a, Lappas et al., 2009, Kargar et al.,
2012), the minimization of the cost of recruiting promising candidates (Golshan
et al., 2014, Kargar et al., 2012), scheduling constraints (Durfee et al., 2014),
the balancing of the workload assigned to each member (Anagnostopoulos et al.,
2012b), and the need for effective leadership (Kargar and An, 2011).
Surprisingly, while ongoing research on team formation has studied nu-
merous variations with different constraints, it has overlooked a factor with
a well-documented impact on a team cohesion and performance: team fault-
2
lines. The faultline concept was introduced in the seminal work by Lau and
Murnighan (Lau and Murnighan, 1998). Faultlines manifest as hypothetical di-
viding lines that split a group into relatively homogeneous subgroups based on
multiple attributes (Lau and Murnighan, 1998, Meyer and Glenz, 2013). The
consideration of multiple attributes is critical, as it distinguishes relevant work
from the study on single-attribute faultlines, referred to as a "separation" (Har-
rison and Klein, 2007). The team-formation framework that we describe in this
work focused on the general multi-attribute paradigm. Faultline-caused sub-
groups are in risk of colliding, leading to costly conflicts, poor communication,
and disintegration (Bezrukova et al., 2009, Choi and Sy, 2010, Gratton et al.,
2011, Jehn and Bezrukova, 2010, Li and Hambrick, 2005, Molleman, 2005, Polzer
et al., 2006, Shaw, 2004, Thatcher et al., 2003).
Bridging the faultline literature with automated team-formation is challeng-
ing, as the available measures for faultlines in existing teams cannot be efficiently
used for faultline optimization. For instance, many faultline measures utilize
clustering algorithms to identify the large homogenous groups that create fault-
lines within a team (Meyer et al., 2014, Jehn and Bezrukova, 2010, Meyer and
Glenz, 2013, Barkema and Shvyrkov, 2007, Lawrence and Zyphur, 2011). While
such measures have emerged as the state-of-the-art, their clustering step requires
a pre-existing team. Therefore, in a team-formation setting, a clustering-based
measure would need to naively consider all (or an exponential number) of pos-
sible teams in order to find a faultline-minimizing solution. This brute-force
approach is not applicable to even moderately-sized populations. Similarly, we
cannot use any of the existing measures based on expensive (and often expo-
nential) computations to identify the subgroups within a team (Thatcher et al.,
2003, Zanutto et al., 2011, Bezrukova et al., 2009, Trezzini, 2008, Shaw, 2004,
Van Knippenberg et al., 2011).
In this work, we describe the fundamental efficiency principles that a faultline
measure needs to follow in order to be applicable to the automated formation of
faultline-minimizing teams. We then introduce Conflict Triangles (CT): a new
measure that follows these principles. The CT measure is consistent with the
3
principles of faultline theory (Lau and Murnighan, 1998) and is founded on the
extensive work on the balance of social structures (Cartwright and Harary, 1956,
Easley and Kleinberg, 2010, Heider, 1958, Morrissette and Jahnke, 1967). We
then use this measure as the objective function for the problem of partitioning
a given population into teams, such that the average faultline score per team
is minimized. We refer to this as the Faultline-Partitioning problem and
formally define it in Section 4. Our work thus makes the following contributions:
1. We initiate research on the unexplored overlap between the decades of
work on team faultlines and the rapidly emerging field of automated team
formation.
2. We describe the fundamental efficiency principles that a faultline measure
has to satisfy to be applicable to faultline-aware team-formation.
3. We present a new measure that follows these principles can thus be used
for both faultline measurement and minimization. Our evaluation demon-
strates the measure's effectiveness in both tasks.
4. We formally define the Faultline-Partitioning problem, analyze its
complexity, and present an efficient algorithmic framework for its solution.
By introducing faultlines to automated team-formation, our work creates
exciting opportunities for algorithmic work on faultline optimization, as well
as on work that combines and studies the connection of faultlines with other
influential team characteristics.
In Section 8, we discuss the implications of
our work for practitioners in both organizational and educational settings and
discuss potential directions for future work.
2. Background and Motivation
To the best of our knowledge, our work is the first to incorporate faultlines
in an algorithmic framework for automated team-formation. However, our work
is related to three types of research: (i) algorithmic frameworks for optimizing
various factors that affect the performance of a team. (ii) management, psy-
chology and sociology studies on faultlines and their effects on team outcomes,
4
and (iii) efforts measure faultlines in existing teams. Next, we discuss each of
these categories in more detail.
2.1. Algorithmic work on team formation
Our previous work (Lappas et al., 2009) studied the problem of automated
team-formation in the context of social networks. Given a pool of experts and
a set of skills that needed to be covered, the goal there is to select a team of
experts that can collectively cover all the required skills, while ensuring efficient
intra-team communication. Over the last years, this work has been extended
to identify a single team or a collection of teams that optimize different fac-
tors that influence a team's performance. For example, a significant body of
work has focused on incorporating different definitions of the communication
cost among experts (Anagnostopoulos et al., 2012a, An et al., 2013, Dorn and
Dustdar, 2010, Gajewar and Sarma, 2012, Kargar and An, 2011, Li and Shan,
2010, Sozio and Gionis, 2010, Galbrun et al., 2017). Other work has also fo-
cused on optimizing the cost of recruiting promising candidates (Golshan et al.,
2014, An et al., 2013), minimizing the workload assigned to each individual
team member (Anagnostopoulos et al., 2012b, 2010), satisfying scheduling con-
straints (Durfee et al., 2014), identifying effective leaders (Kargar and An, 2011),
and optimizing the individual's benefit from team participation (Agrawal et al.,
2014a, Bahargam et al., 2015). Although all these efforts focus on optimizing
various teams aspects, the work that we describe in this paper is the first to
address faultline optimization. As we describe in our work, minimizing faultline
potential raises new algorithmic challenges that cannot be addressed by extant
algorithmic solutions.
2.2. Studies on the effects of team faultlines
For decades, researchers from various disciplines have studied the creation,
operation, and performance of teams in different settings. Faultline theory was
introduced by Lau and Murnighan (Lau and Murnighan, 1998). It has since
5
been the focus of numerous follow-up works. A number of papers have stud-
ied how the existence of faultlines within a team can lead to conflict (Li and
Hambrick, 2005, Choi and Sy, 2010, Thatcher et al., 2003) and affect function-
ality (Molleman, 2005, Polzer et al., 2006) and performance (Bezrukova et al.,
2009, Thatcher et al., 2003). Motivated by the observation that the existence of
faultlines does not guarantee the formation of colliding subgroups, researchers
have also studied the factors that can lead to faultline activation (Pearsall et al.,
2008, Jehn and Bezrukova, 2010). Further, Gratton et al. (Gratton et al., 2011)
explored strategies that a leader or manager can follow to effectively handle or
avoid the emergence of faultlines within a team.
2.3. Operationalizing Faultline Strength
Previous work has suggested various methods for evaluating faultlines in
teams. Even though the original faultline paper by (Lau and Murnighan, 1998)
serves as the foundation of the long line of relevant literature and introduces
principles that we also adopt in our work, it does not define a faultline measure.
Instead, the authors lay out fundamental principles that a measure needs to
follow in order to accurately evaluate the faultline strength in a given team.
While these principles are appropriate for faultline measurement, they are not
sufficient to ensure that a qualifying measure will also have the computational
efficiency required to serve as the objective function of a scalable algorithm that
has to process large populations of candidates to create teams with minimal
faultlines. Computational efficiency is critical in this setting, as each of the
hundreds or thousands of individuals in the given population can be represented
by a point in a multidimensional space of attributes (e.g. demographics, resume
information). Any team-formation algorithm would then have to efficiently
navigate this space and quickly evaluate the faultline strength of many different
combinations in order to identify faultline-minimizing teams. Therefore, in order
to be efficiently applicable to faultline minimization, a faultline measure should
follow the following two efficiency principles:
6
• Linear Computation: The measure should be easy to compute for a
given team in polynomial time.
• Constant Updates: The measure should be easy to update in constant
time if one person joins or leaves the team.
In Section 3, we introduce Conflict Triangles (CT): a new measure that pro-
vides these two characteristics. The CT measure is consistent with the principles
of faultline theory (Lau and Murnighan, 1998) and is founded on the extensive
work on the balance of social structures (Cartwright and Harary, 1956, Easley
and Kleinberg, 2010, Heider, 1958, Morrissette and Jahnke, 1967). Next, we
review the extensive literature on faultline measurement and discuss the short-
comings of extant measures in the context of the two efficiency principles that
are necessary for automated team-formation.
2.3.1. State of the Art in Faultline measurement
A long line of literature has focused on identifying and measuring the strength
of faultlines in existing teams.
In recent years, clustering-based algorithms
have emerged as the state of the art for this purpose (Meyer et al., 2014, Jehn
and Bezrukova, 2010, Meyer and Glenz, 2013, Barkema and Shvyrkov, 2007,
Lawrence and Zyphur, 2011). This line of work is exemplified by the 3-step Av-
erage Silhouette Width (ASW) approach proposed by (Meyer and Glenz, 2013).
Given a team of individuals, the first step includes applying an agglomerative-
clustering algorithm for pre-clustering the team's members. Agglomerative clus-
tering begins by assigning each member to its own cluster. The two most similar
clusters are then iteratively joined until all points belong to the same cluster.
The authors of the original paper experiment with the two most popular merg-
ing criteria: Ward's algorithm and Average Linkage (AL). Thus, for a team
with n members, the joint set of results from the two alternatives yields a total
of 2 × n possible configurations (2 for each possible number of clusters).
The second step focuses on computing the ASW of each possible configura-
tion (Rousseeuw, 1987). The silhouette s(i) of an individual i quantifies how
7
well a team member i fits into its cluster in comparison to all other clusters and
is formally defined as:
s(i) =
bi − αi
max(αi, bi)
,
where ai is the average distance of i to all other point in its cluster and bi is the
lowest average distance of i to all points in any other cluster of which i is not
a member. The silhouette ranges from −1 to +1, where a high value indicates
that the object is well matched to its own cluster and poorly matched to others.
The ASW is the average silhouette of all the team's members.
The third step employs a post-processing method to maximize the ASW
of each configuration, by temporarily moving individuals across subgroups and
recomputing the ASW after each move. The move that leads to the highest in-
crease is made permanent. The process continues until no further improvement
is possible. Finally, the maximum ASW score over all configurations is reported
as the strength of the team's faultline structure.
Using ASW in automated team-formation: Previous work has repeatedly
verified the advantage of the ASW measure over alternative approaches (Meyer
et al., 2014, Meyer and Glenz, 2013). However, the measure cannot be efficiently
used as the objective function for team-formation algorithms, as it is designed to
evaluate faultline strength in existing teams and assumes that the composition
of a team is part of the input. As stated earlier in this section, an appropriate
measure for faultline minimization should be easy to compute in linear time
and easy to update in constant time. However, Given a team of n individuals,
the complexity of the agglomerative-clustering step alone is O(n2logn) (Rokach
and Maimon, 2005). There is then no guarantee on the number of reassignments
that it will take for the ASW score to converge. In addition, the score cannot be
updated in constant time. Instead, the deletion or addition of a member would
require the new team to be re-evaluated from scratch, in order to compute the
optimal ASW score.
In theory, a practitioner could consider all possible teams, evaluate their re-
spective faultline strengths, and choose the optimum. In practice, however, this
8
brute-force approach is not scalable and can only be applied to populations of
trivial size. It can certainly not be applied to populations of hundreds or thou-
sands of individuals, which are common in the team-formation literature (Lap-
pas et al., 2009, Anagnostopoulos et al., 2012a, 2010). The team-partitioning
task that we address in this work is considerably more computationally challeng-
ing than single-team formation. In order to use the ASW measure for this task,
a practitioner would have to consider all possible partitionings of a population
into fixed-size, non-overlapping teams. This is a computationally intractable
process that would have to consider O(N !) alternatives. Similar to the ASW
measure, other clustering-based approaches are also excluded from automated
team-formation due to computational efficiency (Barkema and Shvyrkov, 2007,
Lawrence and Zyphur, 2011).
2.3.2. Other Faultline Measures
Similar to clustering-based approaches, most existing faultline measures are
not applicable to team-formation tasks due to computational efficiency. For
instance, the cost to compute the Index of Polarized Multi-Dimensional Di-
versity proposed by (Trezzini, 2008) grows exponentially with the number of
attributes. The SGA measure by (Carton and Cummings, 2013) depends on
the exhaustive evaluation of every possible partition of a given group with two
or more subgroups. Similarly, the FLS measure by (Shaw, 2004) depends on the
computation and averaging of all possible internal alignments and cross-product
alignments of every feature with respect to the subgroups of every other fea-
ture. Given that each of these constructs has to be updated every time a person
is added to or removed from a team, the FLS formula cannot be updated in
constant time. The measure proposed by (Van Knippenberg et al., 2011) uses
regression analysis to measure the variance of each attribute that is explained
by all other attributes. Despite its advantages in a measurement setting, run-
ning multiple regressions for every candidate team is not a realistic option in a
team-formation setting.
9
(Thatcher et al., 2003) propose a formula for computing the portion of the
total variance explained by a given segmentation of a team into subgroups. Their
final faultline measure F aug is then defined as the score of the segmentation
that maximizes the formula. However, the measure can only be applied for
segmentations of two subgroups due to (i) the exhaustive nature of the search
for the best split that makes the cost prohibitive in a team-formation setting,
and (ii) the fact that, if we allow the number of subgroups to vary arbitrarily,
the solution that maximizes the formula is to trivially assign each individual to
its own subgroup. Hence, an algorithm that uses this measure to create low-
faultline teams would never choose to create highly diverse teams, despite the
fact that high diversity is associated with low faultlines (Lau and Murnighan,
1998). These limitations are inherited by follow up efforts that extend this
measure (Zanutto et al., 2011, Bezrukova et al., 2009). The measure by (Li and
Hambrick, 2005) assumes a specific attribute of interest and is not suitable for
evaluating team faultlines across attributes. This is also the reason that the
measure has been excluded by comparative studies of faultline measures (Meyer
and Glenz, 2013).
Another relevant construct is the Subgroup Strength measure proposed by (Gib-
son and Vermeulen, 2003). While this measure is not designed for faultline
measurement, it is relevant due to its focus on subgroups.
Its creators posit
that strong subgroups exist if there is high variability in the extent to which
attributes overlap in the dyads within a team. Their measure is thus based
on computing the pairwise similarities between the team's members across all
attributes. The team's subgroup strength is then computed as the standard
deviation over all possible member pairs. Even though this measure is not
specifically designed for faultline measurement, it is easy to compute and to
update, as required by the team-formation paradigm. Hence, we include this
measure in our experimental evaluation in Section 5.
10
(a)
(b)
(c)
Figure 1: Triangles associated with the country of origin, gender, and educational background.
3. Operationalizing a Team's Faultline Potential
We consider a pool W of n individual workers. Each worker i ∈ W is
associated with an m-dimensional feature vector wi, such that wi(f ) returns
the value of feature f for worker i. For each feature f , we create a complete
signed graph Gf that includes one node for each worker in W . The sign of
the edge between two nodes (workers) (i, i(cid:48)) is positive if they have the same
value for feature f (i.e. wi(f ) = wi(cid:48)(f ) ) and negative otherwise. Consider the
following example:
Example 1. We are given a pool of 3 workers, where each worker is described
by 3 features: country of origin, gender, and undergraduate major. Our data
thus consists of the following feature vectors:
w1 = [India, Male, Computer Science]
w2 = [India, Male, Business]
w3 = [China, Male, Chemistry]
Fig 1 shows the graphs for the three features.
A long line of relevant literature has established the use of triangles to model
social structures (Cartwright and Harary, 1956, Easley and Kleinberg, 2010,
Heider, 1958, Morrissette and Jahnke, 1967). In our own setting, the triangle
11
represents the fundamental building block of our faultline measure, as any struc-
ture that includes more members (e.g. a rectangle) can be trivially modeled via
(or broken down to) triangles. The figure reveals the existence of 3 possible
types of triangles among the members of the team, according to the signs on
their edges: (+, +, +), (−,−,−), and (−,−, +). By definition, (+, +,−) trian-
gles cannot exist as they would imply that 2 individuals have the same value as
the third one but not the same as each other. We observe that faultlines can
only appear in the presence of (+,−,−) triangles that consist of one positive
and two negative edges, such as the one for the country of origin feature shown
in Fig 1(a). Given that faultlines can only emerge in the presence of (+,−,−)
triangles, we refer to these as Conflict Triangles.
A conflict triangle captures the intuition that two people from the same
country are more likely to interact with each other than to the third person,
thus enabling the creation of a potential faultline. On the other hand, A faultline
could never occur for the gender feature (Fig 1(b)), as all three authors have the
same value (Male). Similarly, since all three authors have a different value for
the undergraduate major feature (Fig 1(c)), there is no faultline potential. This
is consistent with faultline theory, which states that faultlines cannot emerge in
the presence of perfect homogeneity or perfect diversity (Lau and Murnighan,
1998, Gratton et al., 2011).
(a) High faultline po-
tential
(b) No faultline poten-
tial
(c) No faultline poten-
tial
Figure 2: Examples of teams with high and low faultline potential.
The ability of triadic relationships to capture the perfect homogeneity/diversity
principles that are mandated by faultline theory maintaints its usefulenes in a
12
MMMMFFFFteam-formation setting. Consider the example in Figure 2a. The team in the
figure represents the worst-case scenario in terms of faultline potential for the
gender feature: a 50-50 split between two large homogeneous groups of males
(M) and females (F). Figure 2b shows an example of a team with no faultline
potential for gender, as it consists exclusively of female members. Even though
increased homogeneity is indeed one of the ways to reduce faultline potential, it
is wrong to equate diversity with the emergence of faultlines. We demonstrate
this in Figure 2c. All the members of the teams in this figure have different
values with respect to the feature country of origin. We observe that, as in
cases of perfect homogeneity, faultlines cannot exist in the presence of perfect
diversity. This observation reveals that the task of measuring a team's faultlines
goes beyond simply measuring its diversity with respect to different features.
Similarly, a team formation algorithm has to carefully balance the two states of
homogeneity and diversity within a team in order to achieve a low potential for
faultlines.
3.1. Feature Alignment:
The next essential step toward the design of a triangle-based faultline mea-
sure is the consideration of the alignment of conflict triangles across multiple
features (Meyer and Glenz, 2013). Consider three individuals (i, j, k) defined
within a space of features FT . Given a feature f ∈ FT , let τ =< (i, j), k >
be a conflict triangle such that wi(f ) = wj(f ) and wi(f ), wj(f ) (cid:54)= wk(f ). Let
iscon(τ, f ) be a function that returns 1 if τ is a conflict triangle for f and 0
otherwise.
If the same conflict triangle emerges for a second feature f(cid:48), we say that τ
is aligned across the two features f and f(cid:48) (i.e. iscon(τ, f ) = iscon(τ, f(cid:48)) = 1).
Let p(τ, T ) return the percentage of all available features of team T for which
τ is aligned (i.e. for which τ appears as a conflict triangle). Formally:
p(τ, T ) =
{f ∈ FT : iscon(τ, f ) = 1}
FT
13
We say that a triangle τ from team T is fully aligned if it is aligned across
all team features (i.e. p(τ, T ) = 1). Then, we define the faultline potential of a
given team T as follows:
(cid:88)
τ∈DT
CT (T ) =
p(τ, T )
(1)
where DT is the set of all distinct conflict triangles < (i, j), k > that appear
across any of the features in T . Our measure has a probabilistic interpretation,
as it encodes the expected number of successes (conflict triangles) that we would
get after DT Bernoulli trials, where each trial corresponds to a different τ ∈ DT
and has a success probability equal to p(τ, T ). The trial for conflict triangle τ
involves sampling )(uniformly at random) a feature f from FT and is successful
if τ is a conflict triangle for f . Hence, a perfectly aligned triangle would succeed
for any sampled feature and would increment the team's score by 1. Similarly,
the trial for a triangle τ that is aligned over half of the team's features would
have a 50% of success and would increment the team's score by 0.5.
The penalty that Eq. (1) assigns to each conflict triangle in the team is
directly proportional to the triangle's alignment across the team's features.
Under this definition, the minimum faultline potential is assigned to per-
fectly homogeneous or perfectly diverse teams, as they both include zero con-
flict triangles. On the other hand, in accordance with faultline theory (Lau and
Murnighan, 1998), the maximum faultline potential is assigned to teams that
can be split into two perfectly homogeneous subgroups of equal size.
Learning the appropriate penalization scheme from real data: The
definition given in Equation 1 intuitively applies, for each conflict triangle, a
penalty that is directly proportional to the triangle's alignment across the team's
features. We thus expect it to be a reasonable modeling choice for many do-
mains. However, in practice, this penalization scheme may not be appropriate
for a specific domain or application. Therefore, we extend our framework via
by describing a methodology that allows practitioners to learn the appropriate
penalization on function for their domain, based on information from existing
14
teams in the same domain. We present the details of our technique for learning
the penalization parameters in Section 6.
3.2. Efficiently computing a team's faultline potential
The computation requires us to count the total number of conflict triangles
across all features. Thus, for T ⊆ W , CT (T ) can be computed in polynomial
time. For this, one has to consider all triangles appearing in the feature graphs
and count how many of those are conflict triangles. The running time of the
naive computation is O(mT3) where T is the size of the team and m is the
number of features. Next, we present a method for significantly speeding up
this computation.
Given a set of workers T ⊆ W , and a feature f that takes values v1, . . . , vL,
we summarize the values of f observed among the workers in T via the aggregate
feature vector r(T, f ) such that r(T, f )[vj] gives the number of workers in T
that have a value equal to vj. We observe that these aggregate vectors can be
computed in O(mT) time by simply counting all feature values of all workers.
Once the aggregate feature values have been computed, the faultline potential
for each feature f that takes values v1, . . . , vL can be written as follows:
(T − r(T, f )[vj])
(2)
N(cid:88)
(cid:18)r(T, f )[vj]
(cid:19)
CT (T, f ) =
j=1
2
We observe that, for any feature f with L different possible values, the
faultline potential with respect to f can be computed in O(L) time using the
above equation. Thus, the overall faultline potential CT (T ) can be computed in
O(mL). Given that both the number of features m and the number of possible
values for each feature L are usually small constants, this computational cost is
negligible compared to the time required to create the aggregate feature values.
The use of the aggregate feature vectors also allows us to update the score in
constant time, as required by the second efficiency principle of faultline-aware
team-formation. Specifically, if an individual i joins or leaves the team, we only
need to update (in O(m)) the number of conflict triangles that are due to the
15
aggregate counts that change due to the addition or removal of i.
4. The Faultline-Partitioning Problem
In this section, we formally define the Faultline-Partitioning problem,
i.e., the problem of partitioning a set of workers W into (cid:96) teams of equal size
such that the total faultline potential score across teams is minimized. We show
that this problem is not only NP-hard to solve, but also NP-hard to approximate
within any bounded approximation factor, unless P = NP. Then, in Section 4.1,
we present an efficient heuristic algorithm for its solution.
First, we extend the notion of faultline potential to a collection of teams. For
any partitioning T = {T1, T2,··· , T(cid:96)} of workers into (cid:96) teams, we use CT (T)
to denote the total faultline potential of all teams in T. Formally:
(cid:96)(cid:88)
CT (T) =
CT (Ti).
(3)
i=1
We can thus define the Faultline-Partitioning problem as follows:
Problem 1 (Faultline-Partitioning). Given a pool of workers W (with
W = (cid:96) × k), find a partitioning T = {T1, T2,··· , T(cid:96)} of the workers W into (cid:96)
teams of size k such that CT (T) is minimized.
Next, we proceed to analyze the hardness of the Faultline-Partitioning
problem. Our results apply for the more general problem of partitioning a
population into teams with specific but possibly different sizes.
Theorem 1. The Faultline-Partitioning problem is NP-hard to solve.
Theorem 1 implies that the Faultline-Partitioning problem cannot be
optimally solved in polynomial time unless N P = P . Next, we provide a formal
proof of this theorem.
Proof. We present a polynomial-time reduction from the NP-Complete k-Clique
Partitioning problem to our Faultline-Partitioning problem (Gary and
16
Johnson, 1979, Rosgen and Stewart, 2007). The k-Clique Partitioning is a
decision problem which asks the following question: Given a graph H = (V, X),
is it possible to partition the nodes of the graph into disjoint cliques of size k?
Given a graph H = (V, X) (with V nodes and X edges), we first create the
complement of H denoted by H(cid:48) = (V, X(cid:48)). Clearly, any clique of size k in the
original graph H corresponds to a set of k nodes with no edges among them in
H(cid:48).
For our reduction, every node i ∈ V will correspond to a worker for our
problem. Also, we will interpret each edge in H(cid:48) as an agreement ("+") and
each missing edge as a disagreement ("-"). Then, for every edge (i, i(cid:48)) in H(cid:48),
we create a feature f(i,i(cid:48)) and then construct the corresponding feature graph
Gf(i,i(cid:48) ) that contains one positive edge connecting nodes i and i(cid:48), while all other
edges, connecting all pairs of nodes, are negative. Fig 3 shows how an example
graph H with three edges is transformed into three feature graphs.
(cid:98)H (in gray) and its
Figure 3:
Faultline-Partitioning problem
Graph
feature graphs
for
the
corresponding
Now consider the optimal solution to this instance of the Faultline-Partitioning
problem. Since the size of each team is fixed (k), it is easy to see that each edge
of H(cid:48) that falls within one team creates (k − 2) conflict triangles. This implies
that the optimal solution is the one that minimizes the total number of edges
that fall within the partitions. More specifically, the optimal solution has a
faultline potential equal to zero if and only if there exists a partitioning of the
17
21432143-----+2143-+----2143+-----nodes in H(cid:48) with no edge inside the partitions which further corresponds to a
partitioning of the nodes in H into cliques.
Corollary 1. The Faultline-Partitioning problem is NP-hard to approxi-
mate within any factor.
Proof. We will prove the hardness of approximation of Faultline-Partitioning
by contradiction. Assume that there exists an α-approximation algorithm for
(cid:96) } is the
the Faultline-Partitioning problem. Then if T∗ = {T ∗
partitioning with lowest faultline potential and TA = {T A
(cid:96) } is the
solution output by this approximation algorithm, it will hold that CT (TA) ≤
αCT (T∗). If such an approximation algorithm exists, then this algorithm can
be used to decide the instances of the k-Clique Partitioning problem, for
2 ,··· , T ∗
2 ,··· , T A
1 , T ∗
1 , T A
which the optimal solution has a faultline potential equal to 0. However, this
contradicts the proof of Theorem 1, which indicates that these problems are
also NP-hard. Thus, such an approximation algorithm does not exist.
4.1. The FaultlineSplitter algorithm
In this section, we present an algorithm for the Faultline-Partitioning
problem. We refer to the algorithm as FaultlineSplitter and provide the
pseudocode in Algorithm 1. The Python implementation of the algorithm is
available online 1.
The algorithm starts with a random partitioning of the input population
into (cid:96) equal-size groups and then reassigns individuals to teams in an iterative
fashion until the faultline potential of the obtained partitions does not improve
across iterations.
In each iteration, the algorithm starts with a partitioning of the set W
into (cid:96) groups and forms a new assignment with (ideally) a lower faultline
potential score. This is done by executing two functions: AssignCosts and
ReassignTeams. The AssignCosts function returns a cost associated with the
1https://github.com/sanazb/Faultline
18
Algorithm 1 The FaultlineSplitter algorithm.
Input: Set of workers W with m features and the number of desired parti-
tions (cid:96).
Output: Partitioning T = {T1, T2, . . . , T(cid:96)}
1: Randomly partition W into T = {T1, . . . , T(cid:96)}
2: while CT (T) has not converged do
3:
4:
5: return T
c = AssignCosts (W, T)
T = ReassignTeams(T, c)
assignment of every individual to every team; i.e., c(i, Tj) is the cost of assigning
individual i into team Tj. These costs are used by ReassignTeams to produce
a new assignment of individuals to teams -- always guaranteeing that the teams
are of equal size. Next, we describe the details of these the two main routines
of FaultlineSplitter.
The AssignCosts routine: This routine, assigns to every worker i and team
Tj cost c(i, Tj), which is the cost of assigning worker i to team Tj. In order
to compute these costs, AssignCosts considers the current teams in T as a
baseline to evaluate if the assignment of worker i to team Tj can lead to fewer
conflict triangles. Thus, an intuitive definition of cost is the number of conflict
triangles that i incurs when he joins Tj. This is equal to CT (Tj ∪ {i}) if i (cid:54)∈ Tj
and CT (Tj) if i ∈ Tj.
We observe that, if worker i already belongs to team Tj, the reassignment
is not going to change the size of the resulting team. However, if i (cid:54)∈ Tj the
assigning i to Tj creates a team of size (k + 1). This is problematic, since the
number of conflict triangles in teams of size k is not comparable to that in teams
of size (k + 1). This can be resolved by introducing a normalization factor which
measures the maximum possible number of conflict triangles in a team of a fixed
size. Formally, for a team of size k, we use ∆k to denote the maximum possible
number of conflict triangles that can emerge in the team across all features.
19
Now, we compute the cost function as follows:
CT (Tj ∪ {i})/∆k
CT (Tj)/∆k+1
c(i, Tj) =
if i (cid:54)∈ Tj
if i ∈ Tj
(4)
Running time: Note that computing all three cost functions can be done in
O(mW) using the aggregate feature vectors as discussed in Section 3.2.
The ReassignTeams routine: ReassignTeams takes as input a current a cost of
assigning each one of the n individuals into each one of the (cid:96) teams and outputs
a new partition of the individuals into (cid:96) equal-size groups. The algorithm, views
this partitioning problem as a minimum weight b-matching problem (Burkard
et al., 2012) in a bipartite graph, where the nodes on the one side correspond
to n individuals and the nodes on the other side correspond to (cid:96) teams.
In
this graph, there is an edge between every individual i and team Tj. The
weight/cost of this edge is, for example, c(i, Tj) -- computed as described above.
Finding a good partition then translates into picking a subset of the edges of
the bipartite graph, such that the selected edges have a minimum weight sum,
every individual in the subgraph defined by the selected edges has degree 1,
and each team has degree k. This would mean that every worker is assigned to
exactly one cluster and every cluster has exactly k members. This is a classical
b-matching problem that can be solved in polynomial time using the Hungarian
algorithm (Burkard et al., 2012, Kuhn, 1955).
Variable-size partitioning: It is important to point out that our algorithm
can be easily modified to partition a population into teams of fixed but possibly
different sizes. The ReassignTeams routine in our algorithm computes a new
assignment of individuals to teams by solving a minimum weight b-matching
problem in a bipartite graph where nodes on the right represent individuals and
nodes on the left represent the available spots/positions in each team. This
setup gives us the flexibility to choose the number of available spots in each
team. In fact, this is how the algorithm enforces equal-size teams in our current
implementation.
20
Computational speedups: Computing the new partition using the Hungar-
ian algorithm, requires O(n3) time. This is a computationally expensive op-
eration, especially since this step needs to be completed in each iteration of
FaultlineSplitter. In order to avoid this computational cost, we solve the
bipartite b-matching problem approximately using a greedy heuristic that works
as follows: in each iteration the edge (i, Tj) with the lowest cost c(i, Tj) is se-
lected, and worker i is assigned to the j-th team Tj; this assignment only takes
place if: 1) worker i is not assigned to any team in an earlier iteration, and
2) the j-th team has less than k workers so far (i.e., if it has not reached the
desired team size). This is repeated until all the workers are assigned to a team.
To find the minimum cost edge in each iteration we need to sort all edges
with respect to their costs and then traverse them in this order. Since there are
O(n(cid:96)) edges, the running time of this greedy alternative is O(n(cid:96) log(n(cid:96))) per
iteration.
5. Experiments
In this section, we describe the experiments that we performed to evaluate
our methodology.
5.1. Datasets
Adult: The Adult dataset is a census dataset from UCI's machine learning reposi-
tory. It contains information on 32, 561 individuals; the features in the data are
age, work class, education, marital status, occupation, relationship, race, sex,
capital-gain, capital-loss, hours-per-week, and native country 2. We convert
non-categorical features to categorical features as follows: for age and hours-
per-week we bin their values into buckets of size 10. Also, we convert both
capital-gain and capital-loss into binary features depending whether their value
is equal to zero or not.
2https://archive.ics.uci.edu/ml/datasets/Adult
21
Census: The Census dataset is extracted from the US government's "Current
Population Survey" 3. We focused on the most recent collected data from the
year 2014. Our dataset contains census information on 200, 469 individuals.
The dataset includes the following features: marital status, gender, education,
race, country, citizen, and army.
DBLP: The DBLP dataset is created by using the latest snapshot of the DBLP
website and filtering only authors that published papers on tier-1 and tier-2
computer science (NLP, IR, DM, DB, AI, Theory, Networks) conferences and
journals 4. Although the only known attribute in the raw dataset is the country
of origin, we extracted the following features for each of the 57, 972 authors,
based on their publications: number of years active, primary area of focus (based
on number of publications),average number of publications in ten years, and total
number of publications. We also computed a quality feature for each author, by
giving her 2 points for each paper published in a top-tier conference and 1 point
for all other papers. We bin both the total number of publications and the
average number of publications into buckets of size 10, and bin the quality score
into buckets of size 5.
BIA660: This dataset is collected from entry surveys taken by all students who
take the Analytics course offered by one of the authors of this paper. The data
was collected during 6 different semesters and includes data from 502 graduate
students. It consists of 85 teams, with an average of 5.9 students per team. For
each student, the dataset includes the major of the degree they were pursuing
at the time of the data collection, the major of their bachelor's degree, gender,
country, and a self-assessment of her level with respect to machine learning,
analytics, programming, and experience with team projects. The assessments
are given on a scale from 0 (no experience) to 3 (very experienced). For each
team, we also have its performance (on a scale of 0 to 100) on a collaborative,
3http://thedataweb.rm.census.gov/ftp/cps_ftp.html
4http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html
22
semester-long project that accounts for 70% of the entire grade, as well as the
average satisfaction level (on a scale of 0 to 7) of the team's members with the
way the team operated. For each team we computed tension (bad triangles) for
each team across all features.
Synthetic-1: In order to control the number of conflict triangles in our data, we
have developed a method to create synthetic datasets given a target percentage
of conflict triangles. First, we assume that our pool of workers W is going to
consist of a single feature which can only take 3 different values X, Y , and Z.
Let's define x, y, z to be the number of data points with these values respectively.
Now, it is clear that N (W ) = x × y × z. On the other hand, given that total
number of workers is n we have x + y + z = n. Note that if the value of x is
given, we can use these equations to compute the value of y and z as well. To
create our datasets, we try different values of x and then we solve for variables
y and z. Then, we randomly partition workers into three groups of size x, y,
and z and assign the value X, Y , and Z to them respectively.
Synthetic-2: In order to compare different faultline measures -- ASW, Subgroup
Strength (SS), and our CT measure -- we generate a dataset as follows. We con-
sider three features: Race (Asian, White, Black, Native American), Country
(USA, China, England, France), and Education (High-school, Undergraduate,
Graduate). Then, given a team size T S and a number of subgroups SN , we gen-
erate 100 teams that include T S individuals divided into SN completely homo-
geneous subgroups. Within each subgroup, all individuals have the same value
for each feature F . This value V is selected with a probability that is inversely
proportional to the number of subgroups in the team that has already been as-
signed V for this feature. This process allows us to create perfectly homogenous
groups that are highly dissimilar from each other. We repeat the process for
T S ∈ {4, 8, 16, 32, 64}. Given a value for T S, we start with SN = 1 (a perfectly
homogeneous team) and double the value until SN = T S (one individual per
subgroup). For instance, for T S = 16, we consider SN ∈ {1, 2, 4, 8, 16}. This
process generates a total of 3100 teams. Controlling the number of perfectly
23
Table 1: Statistics for the real datasets.
Dataset
Size
Features % of conflict triangles
DBLP
Adult
Census
DBLP-Aug
BIA660
Synthetic-1
57,972
32,561
200,469
155
502
400
6
12
7
9
8
8
35%
41%
44%
47%
62%
8%
homogenous subgroups allows us to control diversity and simulate multiple sce-
narios of conflict between different types of subgroups within the team.
Discussion: Table 1 shows some basic statistics for our datasets. As mentioned
earlier, the Synthetic-1 dataset allows us to tune the percentage of different types
of triangles. The synthetic instance reported in Table 1 corresponds to a dataset
of size 400 with 8 features where we set the percentage of negative and positive
triangles to 8% and 25% respectively. Fig 4 illustrates the Cramer's V values
for all pairs of features in all datasets. Cramer's V value is a standard measure
the correlation between two categorical variables (Cram´er, 2016). It has a value
of 1 when two variables are perfectly correlated and 0 if there is absolutely no
correlation. The figure illustrates that Adult and Census are similar in terms of
feature correlation. Specifically, we observe a small correlation for the majority
of the features and only a couple of them with high correlations. On the other
hand, DBLP exhibits significantly higher correlation patterns.
5.2. Evaluation on the Faultline-Partitioning problem
In this section, we evaluate the performance of our algorithms for the
Faultline-Partitioning problem.
Baselines: We compare our FaultlineSplitter algorithm with two baselines:
Greedy and Clustering. The Greedy algorithm takes an iterative approach
that creates a single team in each iteration and thus it requires (cid:96) iterations to
create all (cid:96) teams. Each team is constructed as follows. First, the algorithm
selects two random workers. It then continues by greedily adding the worker that
24
(a) DBLP
(b) Adult
(c) Census
(d) Synthetic-1
(e) BIA660
(f) DBLP-Aug
Figure 4: The Cramer's V values for all pairs of features for all datasets.
minimizes the faultline score of the team. Once the size of team reaches k, the
algorithm removes the selected members from the pool of experts and moves on
to build the next team. Finally, Clustering is a clustering algorithm that tries
to create equal-size partitions such that the number of positive (negative) edges
within the teams is maximized (minimized) (Malinen and Franti, 2014).
Evaluation metric: for every algorithm, we measure its performance via the
faultline potential of the set of teams that it creates, as per Equation 3. Be-
cause some of our comparisons require plotting results obtained from datasets of
different sizes in the same figure, we apply the following dataset-specific normal-
ization. For a dataset of size n, we divide the faultline potential of a partitioning
obtained for this dataset with the the total number of triangles that can be en-
countered in datasets of this size, i.e., (cid:0)n
(cid:1). Thus, the y-axis of all our plots is
3
in [0, 1].
5.2.1. Varying the population size
For each dataset, we randomly select, with replacement, 100 sets of n in-
dividuals, for n ∈ {100, 200, 400, 800, 1600}. We then use the algorithms to
25
0.000.250.500.751.00Cramer's V0.000.250.500.751.00Cramer's V0.000.250.500.751.00Cramer's V0.000.250.500.751.00Cramer's V0.000.250.500.751.00Cramer's V0.000.250.500.751.00Cramer's VFigure 5: Faultline results for different population sizes (parameter n)
partition each set into teams of size 5. For each algorithm, we report the aver-
age faultline potential achieved over all sets for every value of n, along with the
corresponding 90% confidence intervals. The results for all three datasets are
shown in Figure 5. We also report the computational time (in seconds) of each
algorithm for each value of n in Figure 6.
The first observation is that all the algorithms perform better as the size
of the population increases, with the achieved normalized faultline potential
values ultimately converging to a low value around 0.1, for all datasets. An
examination of the data reveals that we can confidently attribute this trend
to the fact that increasing the size of the population leads to the introduction
of identical or highly similar individuals (i.e. in terms of their feature values).
This makes it easier to form low-faultline teams. This is not a surprising finding
in real datasets, which tend to include large clusters of similar points, rather
than points that are uniformly distributed within the multi-dimensional space
defined by their features.
We observe that The FaultlineSplitter algorithm consistently achieves
the best results across datasets, while the the Greedy algorithm outperforms
Clustering in two of the three datasets DBLP and Adult. This reveals a weak-
ness of Clustering: its inability to consistently deliver low-faultline solutions
as the population becomes larger. On the other hand, the FaultlineSplitter
algorithm does not exhibit this weakness, emerging as both the most stable
26
adultcensusdblp0500100015000500100015000500100015000.20.30.050.100.150.200.250.200.240.280.32Population SizeNorm. Faultline PotentialAlgorithmGreedyFaultline−SplitterClusteringFigure 6: Running times for different population sizes (parameter n)
and effective approach. Finally, as in the previous experiment, the algorithms
exhibit a negligible variation over the different samples that we considered for
each value of the parameter.
With respect to computational time, Figure 6 verifies that FaultlineSplitter
can scale to large population sizes. Using the Census dataset, we observe that,
even for the largest population of 1600 individuals, the algorithm computed the
solution in less 2 minutes.
In fact, its speed was nearly identical to that of
the greedy heuristic. Finally, while the Clustering algorithm emerges as the
fastest option, this comes at the cost of inferior solutions (i.e. teams with higher
faultline potential), as we demonstrated in Figure 5.
5.2.2. Varying the team size
For this experiment, we set the size of the population of individuals to
W = 800. For each real dataset, we randomly select 100 populations, of
800 individuals each, with replacement. We then use the algorithms to parti-
tion each population into teams of size k, for k ∈ {3, 4, 5,··· , 20}. For each
algorithm, we report the average normalized faultline potential achieved over
all population for every value of k, along with the corresponding 90% confidence
intervals. The results for Adult, Census and DBLP datasets are shown in Fig 7.
We observe that the FaultlineSplitter algorithm had the overall best per-
formance across datasets. We observe that its advantage wanes as the value of
k increases. This can be explained by the fact that asking for larger teams
27
050100150050010001500Population SizeTime (s)AlgorithmGreedyFaultline−SplitterClusteringFigure 7: Faultline results for different team sizes (parameter k)
makes the problem harder, as it requires the inclusion of additional individuals
and thus makes it harder to avoid the introduction of conflict triangles into
the team. This explanation is also consistent with the fact that the perfor-
mance of the two algorithms tends to decrease as k becomes larger. A second
observation is that the Greedy algorithm is consistently outperformed by both
FaultlineSplitter and Clustering. This demonstrates the difficulty of the
Faultline-Partitioning problem and the need for sophisticated partitioning
algorithms that go beyond greedy heuristics. Finally, as shown in the figure,
we observe that the standard deviations for all algorithms were consistently
negligible, bolstering our confidence in the reported findings.
5.2.3. Varying the number of conflict triangles
The purpose of this experiment is to evaluate the algorithm on populations
with different potential for faultlines. While random samples obtained from our
real-world datasets differ trivially in terms of the percentage of conflict trian-
gles, we can engineer synthetic data to obtain datasets with different number of
conflict triangles. To conduct this experiment, we use the Synthetic-1 dataset
described in Section 5.1. We consider populations of 400 individuals and set
the team size equal to 5. The results are shown in Fig 8. The plot verifies
that finding low-faultline teams becomes harder as the population's inherent
potential for such faultlines increases. However, the FaultlineSplitter algo-
rithm consistently outperforms the other methods. In fact, the gap between the
28
adultcensusdblp4681012141618204681012141618204681012141618200.160.200.240.060.090.120.150.1500.1750.2000.2250.250Team SizeNorm. Faultline PotentialAlgorithmGreedyFaultline−SplitterClusteringFigure 8: Performance of all algorithms for synthetic datasets with different number of bad
triangles (400 workers, teams of size 5 and 10 features)
two algorithms increases as the number of conflict triangles in the population
increases. This demonstrates the superiority of the FaultlineSplitter algo-
rithm over the other approaches in terms of searching the increasingly smaller
space of low-faultline solutions.
5.3. Faultline Measurement in existing teams
In this section, we compare three alternative options for faultline measure-
ment in existing teams: the proposed CT measure, the ASW by (Meyer and
Glenz, 2013), and the Subgroup Strength (SS) measure by (Gibson and Ver-
meulen, 2003). We select the ASW due to its status as the state-of-the-art,
even though, as we discussed in detail in Section 2, it is not appropriate for
the Faultline-Partitioning problem that is the main focus of our work. We
select the SS measure because it combines the simplicity and computational
efficiency required for the Faultline-Partitioning problem with competitive
results in previous benchmarks (Meyer and Glenz, 2013).
5.3.1. A Comparison on Synthetic Teams
For this study, we use the Synthetic-2 dataset which, as we describe in Sec-
tion 5.1, includes teams of various sizes and subgroup composition. First, we
group the teams according to size. We then use each of the three faultline
measure to evaluate the teams in each group. Finally, we compute the Pearson
29
0.250.300.350.4042004400460048005000520054005600Conflict TrianglesNorm. Faultline PotentialAlgorithmGreedyFaultline−SplitterClusteringCorrelation Coefficient (PCC) between every pair of measures. We present the
results in Figure 9a. Then, in Figure 9b we report the average computational
time needed to compute the score of each team for each of the three measures.
(a) Pairwise Correlation of Faultline Mea-
sures
(b) Mean Computational Time
Figure 9: A comparison of the ASW, Conflict Triangles (CT), and Subgroup Strength (SS)
faultline measures on the Synthetic-2 dataset.
The first observation from Figure 9a is that all three measures report sim-
ilar scores across team sizes, with the pairwise PCC over 0.65. Hence, while
the three measures follow different measurement paradigms, their results tend
to be consistent. However, the bars also reveal that the correlation between SS
and CT measures was the highest among all possible measure-pairs.
In fact,
the observed PCC value for this pair was consistently around 0.9, revealing
near-perfect correlation. This is intuitive if we consider the nature of the two
measures: the conflict triangles counted by the CT measure include, by defini-
tion, a pair of team members that are also identified as "overlapping" by the
SS measure. A key difference between the two measures is that CT does not
consider all-positive triangles (i.e. a triplet of team members with the same
value for a feature, see Fig. 1b), while SS would consider all 3 dyads in such a
triangle as overlaps. However, the results reveal that this difference does not sig-
nificantly differentiate the results of the two measures, possibly due to the fact
that SS does not follow the CT's counting paradigm and, instead, aggregates
overlap sums via the standard deviation.
With respect to computational time, Figure 9b verifies the theoretical anal-
30
48163264Team Size0.00.20.40.60.81.0CorrelationCT Vs. ASWCT Vs. SSASW Vs. SS48163264Team Size105104103102101100101Time per Team in Seconds (log scale)CTSSASWysis that we presented in Section 2. The y-axis represents the average time (in
seconds) required to compute the score for a team, in log scale. As we discussed
in detail in Section 4, any algorithm for the Faultline-Partitioning problem
has to quickly consider a large number of candidate teams in order to efficiently
locate (or approximate) the best possible partitioning. We observe that ASW is
orders of magnitude slower than the other two measures, with the gap growing
rapidly with the size of the teams. In addition, while the SS and CT measures
can be easily updated in constant time as the algorithm makes small changes to
the team's roster, this is not the case for ASW. In short, while ASW may indeed
be a competitive option for faultline measurement, our analysis and experiments
verify that it is not a good candidate for faultline-optimization problems, such
as the one that we study in this work. Out of two fastest measures, CT displays
a clear advantage over SS. We observe that it is several times faster and, as in
the case of ASW, the gap grows rapidly with the size of the population. The
results verify the effectiveness of our methodology for computing CT, which we
discuss in detail in Section 3.2. They also demonstrate that, while two measures
might satisfy the efficiency principles that are necessary for efficient faultline-
minimization in teams, one of the two can still have a significant computational
advantage that makes it more appropriate for large populations.
5.3.2. A Comparison on Real Teams
For this study we use the BIA660 dataset, which includes two outcomes: (i)
the team's performance (represented by its grade) and (ii) the average satis-
faction of the team's members with their overall collaborative experience. In
Figures 10a and 10b we visualize the performance of each team against its cor-
responding CT, SS, and ASW scores. We observe that performance has a strong
negative association with the CT and SS scores, as demonstrated by the slope
of the line. In contrast, the corresponding line for the ASW measure is nearly
parallel to the x-axis, suggesting a lack of correlation. This finding is verified
by the Pearson Correlation Coefficient (PCC) values for the CT, SS, and ASW
measures, which were −0.21, −0.23 and −0.04, respectively. Note that a nega-
31
tive correlation is intuitive, as it means that lower faultlines are associated with
higher performance.
In Figures 10c and 10d we visualize the satisfaction of each team against
its corresponding CT, SS, and ASW scores. The results are consistent with the
performance analysis: satisfaction exhibits a strong negative association the CT
measure, while its association with ASW is very weak. In fact, the correlation of
satisfaction with CT and SS appears to be even stronger than that of the team's
performance. Again, these findings are verified by the PCC values for the CT,
SS, and ASW measures, which were −0.26, −0.34 and 0.02, respectively.
(a) Performance Vs CT
(b) Performance Vs ASW
(c) Performance Vs SS
(d) Satisfaction Vs CT
(e) Satisfaction Vs ASW
(f) Satisfaction Vs SS
Figure 10: The association of the CT, SS, and ASW measures with team performance and
satisfaction.
The results verify that the teams' overall faultline-strength, as measured by
the CT measure, has a strong negative association with meaningful outcomes.
Next, we demonstrate how a practitioner can examine feature-specific faultlines
to identify specific features that are associated with each outcome.
32
6070809050100150Faultline ScoreGrade607080900.10.20.30.4ASW ScoreGrade607080900.40.81.21.6Subgroup StrengthGrade456750100150Faultline ScoreSatisfaction45670.10.20.30.4ASW ScoreSatisfaction45670.40.81.21.6Subgroup StrengthSatisfactionEach of the two outcomes (performance and satisfaction) serves as the de-
pendent variable in a separate regression that also includes the team's faultline
potential with respect to different features, according to the CT measure. We
also consider multiple control variables that could account for part of the vari-
ance in the dependent variable. We present the results of both regressions in
Table 2.
The table reveals strong negative correlations of the faultline scores for the
features country, BS major, and current degree with performance. This implies
that the existence of potentially conflicting groups in these features can be detri-
mental to the team's grade. We observe similar trends for the country and cur-
rent degree features in the context of team satisfaction. Such findings can inform
the instructor about the existence of potentially problematic dimensions and
guide his efforts to strategically design the teams. In practice, this type of re-
gression can be used before solving an instance of the Faultline-Partitioning
problem, in order to identify the dimensions that need to be considered during
the optimization. This is a critical step, as trying to solve for all possible di-
mensions is likely to limit the solution space and eliminate high-quality teams
due to the existence of faultlines in trivial (non-influential) dimensions.
6. Generalizing the penalization scheme of aligned conflict triangles
As mentioned earlier our definition of faultline potential (summarized in
Equation 1) applies, for each conflict triangle, a penalty that is directly propor-
tional to the triangle's alignment across the features. Our experimental results
presented in Section 5.3.2 demonstrate that this penalization scheme yields a
metric that is a strong predictor of a team's success. However, one might argue
that in a specific domain or application, different degrees of alignment should
be penalized using a different scheme.
In this section, we extend our frame-
work by (1) demonstrating how different penalization scheme of aligned con-
flict triangles can be implemented, (2) describing a methodology that allows
practitioners to learn the appropriate penalization scheme for their domain
33
Table 2: Regression Results
Dependent variable:
Grade
(1)
−10.887∗∗∗
(−3.793)
−12.821∗∗
(−2.580)
Satisf action
(2)
−1.195∗∗∗
(−4.937)
−0.676
(−1.612)
Degree
BS Major
Gender
Country
ML Exp
Analytics Exp
Programming Exp
Team Exp
Average ML Exp
Average Analytics Exp
Average Prog Exp
Average Team Exp
Constant
0.106
(0.028)
−8.010∗∗∗
(−3.001)
−5.428
(−0.841)
5.233
(1.082)
−4.464
(−0.926)
1.344
(0.323)
0.219
(0.185)
−0.241
(−0.205)
−1.820∗
(−1.758)
0.898
(0.772)
97.821
(10.586)
86
0.313
0.200
8.126
2.766∗∗∗
0.147
(0.457)
−1.121∗∗∗
(−4.977)
−1.029∗
(−1.889)
−0.063
(−0.155)
0.336
(0.827)
−0.188
(−0.535)
−0.105
(−1.052)
−0.143
(−1.438)
0.014
(0.155)
0.040
(0.405)
7.308∗∗∗
(9.374)
86
0.467
0.379
0.686
5.327∗∗∗
34
Observations
R2
Adjusted R2
Residual Std. Error (df = 73)
F Statistic (df = 12; 73)
Note:
Significance levels:
The dependent variable are grade and
satisfaction.
t-statistics are shown in parentheses.
∗p<0.1; ∗∗p<0.05; ∗∗∗p<0.01
based on information from existing teams in the same domain, (3) studying
the Faultline-Partitioning problem under a given penalization scheme.
6.1. Faultine potential with a generalized penalization scheme
Given a team T with a set of features FT , we define the faultline potential
of a team given a penalization scheme g(.) as:
FT (cid:88)
P CT (T, g) =
g(x) × aligned(x, T ),
(5)
x=1
where aligned(i, T ) returns the number of conflict triangles that are aligned
across exactly x features in FT . The above formulation allows us to flexibly
penalize the existence of aligned conflict triangles by selecting the appropriate
g(x) penalty for each value of x. Naturally, it makes sense to define g(x) as
an ascending function to reflect the fact that higher alignment should translate
to a higher faultline potential. Note that if define g(x) = x, then the obtained
faultine potential is equivalent to our original definition of CT (t) presented in
Equation 1 (module some constant).
6.2. Learning the penalization scheme
The task of learning the appropriate penalty parameters can be modeled as
a supervised learning task. Each team serves as a data point in the training set.
More specifically, the predictive variables are the aligned(x, T ) values for in-
creasing values of x. The dependent variable should reflect the degree to which
a team's performance is influenced by faultlines. We compute the dependent
variables using the following technique. Given a set of teams along with any
success metric that encodes their outcome in a particular domain (e.g. perfor-
mance, satisfaction, cohesion), we obtain the dependent variables by negating
the success scores and normalizing them to have a mean equal to 0 and a stan-
dard deviation equal to 1. The goal is then to learn the penalty-parameters g(x)
that best fit the data. To achieve this, we train a linear regression to obtain
the best g(x) values. It is important to mention that fitting the linear regres-
sion may lead to negative g(x) values. This does not create any issues, but if
35
practitioners desire to obtain faultline potential values that are always positive,
they can simply add a constant to all g(x) values. This is a safe operation as it
simply adds a constant value to all fautline potential values and does not affect
the difference between teams' faultline potentials. In fact, in our experiments
we always add a constant value to all g(x) parameters to ensure that g(0) is
equal to 0. This makes the penalization scheme more interpretable as we expect
the penalty of conflict-free triangles to be 0.
If the practitioner has no access to numeric outcomes variables, we can still
learn g(x) as follows. The learning task can be modeled as a classification
task with a binary variable that is equal 1 for all actual teams in the data.
The training data is then complemented by randomly-populated "noise" groups
that do not represent actual teams. The binary dependent variable for these
fake teams is 0. In this case, the goal is to find the penalty-parameters that
best differentiate between actual and noise teams. This technique builds upon
the fact that in most cases, individuals (and managers) tend to form teams that
have a lot degree of conflict and faultline potential.
To demonstrate the effectiveness of our proposed learning procedure, we use
the BIA660 dataset as it consists of a set of teams along with two outcome
scores, namely "grade" and "satisfaction". Table 3 summarizes the g(x) values
we obtained using the techniques described above. The first two rows correspond
to the g(x) values obtained from the grade and satisfaction metrics. The third
row corresponds to g(x) values calculated from our binary classification task
(without using any outcome scores). The fourth rows corresponds to g(x) values
obtained on a version of BIA660 dataset in which outcome score of each team is
randomly sampled from the set {0, 1}. This row helps verify that the results of
the other rows is significant and not due to chance.
Note that the first three rows in Table 3 share a similar trend (and for
the most part) the numbers are ascending representing that the higher degrees
of alignment should be penalized more. On the other hand, we can see that
the values in the last row are significantly different and do not exhibit any
meaningful pattern. We can observe that the g(x) values reported in the first 3
36
Table 3: Obtained penalization schemes using the BIA660 dataset
g(1)
g(2)
g(3)
g(4)
g(5)
g(6)
g(7)
g(8)
Grade
0.091
Satisfaction
0.088
Real Vs. Fake 0.068
Random
-0.063
0.064
0.07
0.099
0.021
0.053
0.028
0.079
0.428
0.112
0.141
0.061
-0.041
0.165
0.079
0.115
-0.153
0.233
0.253
0.184
0.053
0.171
0.208
0.223
0.142
0.111
0.133
0.171
0.098
Frequencies
0.2% 1.5% 6.8% 12.9% 17.0% 11.6% 4.5% 0.7%
rows, while following the expected trend, sometimes fluctuate. For example, the
values of g(8) are smaller than g(7). This can be explained using the last row
of the table which summarizes the frequencies of each degree of the alignment
in the entire dataset. For instance, we can see that in the entire dataset, there
are only 0.7% of triangles that can form 8 aligned conflicts. This means, that in
our learning task this value is in almost all cases set to 0 for both successful and
unsuccessful teams. Thus, the parameters learned using the linear regression
are more subject to noise. In fact, if we focus only on degrees of alignments
that have at least 5% presence in the data, we can see that the g(x) values are
more robust and conform to our expected behaviour.
6.3. Team-formation under the generalized penalization scheme
As we discussed in Section 2.3, solving the Faultline-Partitioning prob-
lem for a large group of individuals requires an operationalized notion of faultline
that can be (1) computed in linear time and (2) updated in constant time when
a member joins or leaves the team. Unfortunately, these two criteria may not
hold for a given penalization scheme. In fact given a team T , computing the
P CT (T, g) requires a running time of O(mT3). This is because our speed-up
technique described in Section 3.2 can not be applied to any penalization scheme.
This makes the Faultline-Partitioning problem even more challenging to
solve as it becomes computationally expensive. The FaultlineSplitter algo-
rithm can still be used to solve the Faultline-Partitioning problem given
any penalization scheme, but the solution does not scale up to large popula-
tion of individuals. Given that, we present some theoretical and experimental
37
evidence to demonstrate that solving the Faultline-Partitioning problem
with our original penalization scheme produces teams that are of high-quality
under different penalization schemes as well. Of course, directly solving the
Faultline-Partitioning problem with a given penalization scheme can pro-
duce better results, but in most cases the slight improvement can not justify
the huge required computational cost.
Let us use CT (T ) and P CT (T, g) to refer to the definition of faultline poten-
tial (according to Equation 1) and the faultline potential given a penalization
scheme (according to Equation 5) respectively. Now, it is easy to show that
CT (T ) ∗ max(g(x)) ∗ m ≥ P CT (T, g).
The above equation simply states that in the worst-case scenario all m features
of conflicting individuals form a conflicting triangle. This is an strict upper
bound for P CT (T, g). Although this may not be a tight bound, it suggest
that optimizing CT (T ) directly might be an efficient strategy for solving the
Faultline-Partitioning problem under any penalization scheme.
The following experiment further demonstrates that optimizing the original
faultline potential (presented in Equation 1 is quite aligned with optimizing
faultline potential under a given penalization scheme. In this experiment, we
have solved the Faultline-Partitioning problem on the BIA660 dataset us-
ing the penalization scheme from the first row of Table 3. More precisely, we
ran the FaultlineSplitter algorithm to create 50 teams of equal size.
In
each iteration of the algorithm, we recorded the faultline potential according
to Equation 1. Figure 11 illustrates how the value of CT (T ) and P CT (T, g)
compare as the optimization proceeds. We can see that the P CT (T, g) has
an almost linear relationship with our original definition of faultline potential.
This implies that by solving the Faultline-Partitioning problem using our
original penalization scheme, we can benefit from the speed-up techniques we
introduced in Section 3.2 without sacrificing the quality of the obtained teams
even if a different penalization scheme is desired.
38
Figure 11: Comparing the faultline potential using different penalization schemes
7. Handling numeric attributes
One of the limitations of CT is that it is primarily designed for nominal
attributes. Thus, numerical attributes need to be discretized into bins prior
to computing the faultline score. The ability to handle multimodal data is
a well-known challenge in faultline measurement. For instance, the popular
ASW approach has to pre-process the data by using dummy variables to encode
categorical variables as numeric. Next, we present two techniques to extend our
basic CT model to deal with numerical attributes.
The first technique is based on binning, but aims to creates bins of variable
length that can accurately capture the distribution of the underlying data. More
precisely, a pre-processing module based on Kernel Density Estimation (KDE)
could automate the discretization process and deliver dynamic segmentations
that accurately capture the distribution of numeric variables (Rudemo, 1982).
The resulting bins would then represent the natural groups of numeric values
that are present in the given dataset.
An alternative technique that departs from the standard binning paradigm
would be to use a threshold γ to define agreement and disagreement between
team members. Specifically, given a numeric feature f , we say two individuals i
and i(cid:48) are in agreement iff wi(f )− wi(cid:48)(f ) ≤ γ. Otherwise, the two individuals
are considered to be in a disagreement. As before, a triangle is identified as
a conflict triangle with respect to feature f if two of each members agree on
39
406080100506070mean(CT(T))mean(PCT(T,g))feature f and disagree with the third individual in the triangle. The problem
then translates into the task of selecting an appropriate value for γ. Domain
knowledge is a key factor in this effort, as each feature is likely to have its
own threshold. For instance, while a difference of 2 years for the age feature is
generally considered small, a difference of 2 stars in the context of the popular 5-
star rating scale is far more significant. An intuitive way to set feature-specific
thresholds would be to assume that two members agree on feature f if the
difference of their corresponding values is within 1 standard deviation of the
same feature (as computed across the entire population that we want to partition
into teams). A second way to tune the feature-specific thresholds is to use a
validation set that includes the scores of teams for meaningful team outcomes,
such as performance or satisfaction. We used such a dataset in Section 5.3.2.
We can then choose the threshold values that maximize the correlation between
the resulting faultline and outcomes scores.
While the above methods allow us to flexibly model (dis)agreements and
address numeric attributes during the computation of conflict triangles, they
do not directly model the degree of disagreement between two team members
in the context of a numeric feature. For instance, a conflict triangle with two
members in their 20s and one in their 30s tends to be less problematic than
a triangle with two member in their 20s and one in their 60s. To address this
issue, we can weigh (the disagreement in) a conflict triangle by directly using the
numeric values of its members. In practice, the weight of a conflict triangle with
respect to feature f would then be equal to the the average absolute difference
between the values of feature f for the two individuals in disagreement. The
CT measure would then be expressed as a weighted sum, rather than the pure
number of conflict triangles in the given team. Combining this method with
the two techniques that we discussed above (or with any techniques based on
binning or definitions of disagreement) enables us to comprehensively extend
our approach to handle numeric attributes.
40
8. Discussion
Our work focuses on the previously unexplored overlap between the decades
of work on team faultlines and the rapidly growing literature on automated
team-formation. We formally define the Faultline-Partitioning problem,
which is the first problem definition that asks for the formation of teams with
minimized faultlines from a large population of candidates. We present a de-
tailed complexity analysis and introduce a new faultline-minimization algorithm
(FaultlineSplitter) that outperforms competitive baselines in an experimen-
tal evaluation on both real and synthetic data.
One of the major challenges that we address in this work is finding a faultline
measure that can be efficiently applied to faultline optimization. As we highlight
in this paper, computational efficiency (in a practical team-formation setting)
translates into two requirements that an appropriate measure should satisfy:
(i) the ability to compute the faultline score of a team in linear time, and (ii)
the ability to update a team's score in constant time after small changes to
the team (e.g. the removal or addition of a member). The relevant literature
has described multiple operationalizations of the faultline concept. However,
as we discuss in detail in Section 2, these operationalizations do not satisfy
these requirements and are only appropriate for measuring faultline strength in
existing teams. As such, they are not scalable enough to serve as the objective
function of a combinatorial algorithm that has to process a large population
and evaluate very large numbers of candidate-teams in order to find a faultline-
minimizing solution. Therefore, we introduce a new measure that we refer to as
Conflict Triangles (CT). The CT measure is based on the extensive literature on
modeling social structures and is consistent with the fundamental principles of
faultline theory by (Lau and Murnighan, 1998). In addition, CT satisfies the two
efficiency requirements and is appropriate for faultline-optimization algorithms.
8.1. Implications
Our work is the first to incorporate the faultline concept into an algorith-
mic framework for automated team-formation. From a team-builder's perspec-
41
tive, the ability to control the faultlines of teams that are automatically sam-
pled from a large population of candidates has multiple uses. First, it allows
the team builder to proactively reduce the risk of undesirable outcomes that
have been consistently linked with faultlines, such as conflicts, polarization, and
disintegration. Second, it provides an effective way to manage the diversity
within a team. A trivial way to eliminate faultlines is to create highly ho-
mogeneous teams. However, this approach would also lead to teams that are
unable to benefit from the well-documented benefits of diversity, such as inno-
vation and increased performance (Kearney et al., 2009, Roberge and Van Dick,
2010, Van der Vegt and Janssen, 2003). In order to avoid such shortcomings,
a team-builder can utilize our algorithmic framework to strategically engineer
low-faultline teams without over-penalizing diversity. A characteristic exam-
ple is a team that is maximally diverse; a team in which no two individuals
share a common attribute. Consistent with the faultline theory by (Lau and
Murnighan, 1998), our framework would recognize this as a team with the same
faultline potential as a perfectly homogeneous team. We demonstrate this via
examples in Figures 1 and 2.
Our team-partitioning paradigm has applications in both an organizational
and educational setting. In a firm setting, the task of partitioning a workforce
into teams is common. By using the proposed FaultlineSplitter algorithm, a
manager can identify faultline-minimizing partitionings within the multidimen-
sional space defined by various employee features. A regression analysis, such
as the one we described in Section 5.3.2, can guide the manager's team-building
efforts by selecting specific features with potentially problematic faultlines. In a
classroom setting, instructors often face the task of partitioning their students
into teams for assignments and projects. As we demonstrated in our experi-
ments, faultlines in student teams can have a strong association with meaning-
ful outcomes, such as performance and member satisfaction. By releasing our
team-partitioning software, we hope that we can automate this team-formation
task and benefit both students and instructors.
42
8.2. Directions for Future Work
Future work could focus on algorithms that combine faultlines minimization
(either as an objective function or via constraints) with other factors, such
as intra-team communication, skill coverage, and recruitment cost. Such work
would add to the rapidly growing literature on automated team formation, which
we review in Section 2.1. We expect this to be a challenging task from an
optimization perspective, as additional constraints can be hard to satisfy while
trying to avoid the creation of faultlines. For instance, if the distribution of
skills is strongly correlated with the population's demographics, a homogenous
team is unlikely to exhibit a diverse skillset. Hence, the ability to leverage both
homogeneity and diversity will be an asset for such efforts.
The proposed FaultlineSplitter algorithm can be combined with any
faultline measure that follows the efficiency principles that we describe in this
work (i.e. linear computation and constant updates). Future work on such mea-
sures is essential, as existing measures are not scalable enough for optimization
purposes. We make our own contribution in this direction via The CT measure
that we propose in this work.
In conclusion, we hope that future efforts will be able to build on our work
to address challenging problems that combine efficient algorithmic constructs
for automated team-formation with the rich findings on the causes and effects
of teams faultlines.
Acknowledgement
This research was supported in part by NSF grants IIS-1813406 and CAREER-
1253393.
References
R. Agrawal, B. Golshan, and E. Terzi. Grouping students in educational
settings.
In Proceedings of the 20th ACM SIGKDD International Confer-
ence on Knowledge Discovery and Data Mining, KDD '14, pages 1017 -- 1026.
43
ACM, 2014a. ISBN 978-1-4503-2956-9. doi: 10.1145/2623330.2623748. URL
http://doi.acm.org/10.1145/2623330.2623748.
R. Agrawal, B. Golshan, and E. Terzi. Forming beneficial teams of students
in massive online classes.
In Proceedings of the First ACM Conference on
Learning @ Scale Conference, L@S '14, pages 155 -- 156, 2014b. ISBN 978-1-
4503-2669-8. doi: 10.1145/2556325.2567856. URL http://doi.acm.org/10.
1145/2556325.2567856.
A. An, M. Kargar, and M. ZiHayat. Finding affordable and collaborative teams
from a network of experts. In Proceedings of the 2013 SIAM International
Conference on Data Mining, pages 587 -- 595, 2013.
A. Anagnostopoulos, L. Becchetti, C. Castillo, A. Gionis, and S. Leonardi.
Power in unity: Forming teams in large-scale community systems. In Pro-
ceedings of the 19th ACM International Conference on Information and
Knowledge Management, CIKM '10, pages 599 -- 608, New York, NY, USA,
2010. ACM. ISBN 978-1-4503-0099-5. doi: 10.1145/1871437.1871515. URL
http://doi.acm.org/10.1145/1871437.1871515.
A. Anagnostopoulos, L. Becchetti, C. Castillo, A. Gionis, and S. Leonardi. On-
line team formation in social networks. In Proceedings of the 21st International
Conference on World Wide Web, WWW '12, pages 839 -- 848, New York, NY,
USA, 2012a. ACM. ISBN 978-1-4503-1229-5. doi: 10.1145/2187836.2187950.
URL http://doi.acm.org/10.1145/2187836.2187950.
A. Anagnostopoulos, L. Becchetti, C. Castillo, A. Gionis, and S. Leonardi. On-
line team formation in social networks. In Proceedings of the 21st International
Conference on World Wide Web, WWW '12, pages 839 -- 848, New York, NY,
USA, 2012b. ACM. ISBN 978-1-4503-1229-5. doi: 10.1145/2187836.2187950.
URL http://doi.acm.org/10.1145/2187836.2187950.
S. Bahargam, D. Erdos, A. Bestavros, and E. Terzi. Personalized education;
solving a group formation and scheduling problem for educational content. In
International Educational Data Mining Society. ERIC, 2015.
44
S. Bahargam, D. Erdos, A. Bestavros, and E. Terzi. Team formation for
scheduling educational material in massive online classes. arXiv preprint
arXiv:1703.08762, 2017.
H. G. Barkema and O. Shvyrkov. Does top management team diversity promote
or hamper foreign expansion? Strategic Management Journal, 28(7):663 -- 680,
2007. doi: 10.1002/smj.604. URL https://onlinelibrary.wiley.com/doi/
abs/10.1002/smj.604.
K. Bezrukova, K. A. Jehn, E. L. Zanutto, and S. M. Thatcher. Do workgroup
faultlines help or hurt? a moderated model of faultlines, team identifica-
tion, and group performance. Organization Science, 20(1):35 -- 50, 2009. doi:
10.1287/orsc.1080.0379. URL https://pubsonline.informs.org/doi/abs/
10.1287/orsc.1080.0379.
R. Burkard, M. Dell'Amico, and S. Martello. Assignment Problems. Society for
Industrial and Applied Mathematics, 2012.
A. M. Carton and J. N. Cummings. The impact of subgroup type and subgroup
configurational properties on work team performance. Journal of Applied
Psychology, 98(5):732, 2013. doi: 10.1037/a0033593. URL https://doi.
org/10.1037/a0033593.
D. Cartwright and F. Harary. Structural balance: a generalization of heider's
theory. Psychological review, 63(5):277, 1956. doi: 10.1037/h0046049. URL
https://doi.org/0.1037/h0046049.
J. N. Choi and T. Sy. Group-level organizational citizenship behavior: Effects
of demographic faultlines and conflict in small work groups. Journal of Or-
ganizational behavior, 31(7):1032 -- 1054, 2010. doi: 10.1002/job.661. URL
https://onlinelibrary.wiley.com/doi/abs/10.1002/job.661.
H. Cram´er. Mathematical Methods of Statistics (PMS-9), volume 9. Princeton
university press, 2016.
45
C. Dorn and S. Dustdar. Composing near-optimal expert teams: A trade-
off between skills and connectivity.
In Proceedings of the 2010 Interna-
tional Conference on On the Move to Meaningful Internet Systems - Volume
Part I, OTM'10, pages 472 -- 489. Springer-Verlag, 2010. ISBN 3-642-16933-3,
978-3-642-16933-5. URL http://dl.acm.org/citation.cfm?id=1947725.
1947768.
E. H. Durfee, J. C. Boerkoel, Jr., and J. Sleight. Using hybrid scheduling for
the semi-autonomous formation of expert teams. Future Generation Computer
Systems, 31:200 -- 212, Feb. 2014. ISSN 0167-739X. doi: 10.1016/j.future.2013.
04.008. URL http://dx.doi.org/10.1016/j.future.2013.04.008.
D. Easley and J. Kleinberg. Networks, Crowds, and Markets Reasoning About
a Highly Connected World, volume 1. Cambridge University Press, 2010.
R. F. Fenno. Congressmen in committees. Little, Brown, 1973.
A. Gajewar and A. D. Sarma. Multi-skill collaborative teams based on densest
subgraphs.
In Proceedings of the 2012 SIAM International Conference on
Data Mining, pages 165 -- 176, 2012.
E. Galbrun, B. Golshan, A. Gionis, and E. Terzi. Finding low-tension commu-
nities. In Proceedings of the 2017 SIAM International Conference on Data
Mining, pages 336 -- 344. SIAM, 2017. doi: 10.1137/1.9781611974973.38. URL
https://epubs.siam.org/doi/abs/10.1137/1.9781611974973.38.
M. R. Gary and D. S. Johnson. Computers and Intractability: A Guide to the
Theory of NP-completeness. WH Freeman and Company, New York, 1979.
C. Gibson and F. Vermeulen. A healthy divide: Subgroups as a stimulus for
team learning behavior. Administrative Science Quarterly, 48(2):202 -- 239,
2003. doi: 10.2307/3556657. URL http://www.jstor.org/stable/3556657.
B. Golshan, T. Lappas, and E. Terzi. Profit-maximizing cluster hires. In Pro-
ceedings of the 20th ACM SIGKDD International Conference on Knowledge
46
Discovery and Data Mining, KDD '14, pages 1196 -- 1205, New York, NY, USA,
2014. ACM. ISBN 978-1-4503-2956-9. doi: 10.1145/2623330.2623690. URL
http://doi.acm.org/10.1145/2623330.2623690.
L. Gratton, A. Voigt, and T. Erickson. Bridging faultlines in diverse teams.
IEEE Engineering Management Review, 39(1):80 -- 90, 2011. ISSN 0360-8581.
doi: 10.1109/EMR.2011.5729976.
D. A. Harrison and K. J. Klein. What's the difference? diversity constructs
as separation, variety, or disparity in organizations. Academy of management
review, 32(4):1199 -- 1228, 2007. doi: 10.5465/amr.2007.26586096. URL https:
//doi.org/10.5465/amr.2007.26586096.
F. Heider. The Psychology of Interpersonal Relations. John Wiley & Sons,
1958. ISBN 9780898592825. URL https://books.google.com/books?id=
Zh6TDmayL0AC.
K. A. Jehn and K. Bezrukova. The faultline activation process and the ef-
fects of activated faultlines on coalition formation, conflict, and group out-
comes. Organizational Behavior and Human Decision Processes, 112(1):
24 -- 42, 2010.
ISSN 0749-5978.
doi: https://doi.org/10.1016/j.obhdp.
2009.11.008.
URL http://www.sciencedirect.com/science/article/
pii/S0749597809001095.
M. Kargar and A. An. Discovering top-k teams of experts with/without a leader
in social networks.
In Proceedings of the 20th ACM International Confer-
ence on Information and Knowledge Management, CIKM '11, pages 985 -- 994.
ACM, 2011. ISBN 978-1-4503-0717-8. doi: 10.1145/2063576.2063718. URL
http://doi.acm.org/10.1145/2063576.2063718.
M. Kargar, A. An, and M. Zihayat. Efficient bi-objective team formation in
social networks. Machine Learning and Knowledge Discovery in Databases,
pages 483 -- 498, 2012. doi: 10.1007/978-3-642-33486-3 31. URL http://dx.
doi.org/10.1007/978-3-642-33486-3_31.
47
E. Kearney, D. Gebert, and S. C. Voelpel. When and how diversity benefits
teams: The importance of team members' need for cognition. Academy of
Management Journal, 52(3):581 -- 598, 2009. doi: 10.5465/amj.2009.41331431.
URL https://doi.org/10.5465/amj.2009.41331431.
H. W. Kuhn. The hungarian method for the assignment problem. Naval Re-
search Logistics Quarterly, 2:83 -- 97, 1955. doi: 10.1002/nav.3800020109. URL
https://doi.org/10.1002/nav.3800020109.
T. Lappas, K. Liu, and E. Terzi. Finding a team of experts in social networks. In
Proceedings of the 15th ACM SIGKDD International Conference on Knowl-
edge Discovery and Data Mining, KDD '09, pages 467 -- 476, New York, NY,
USA, 2009. ACM. ISBN 978-1-60558-495-9. doi: 10.1145/1557019.1557074.
URL http://doi.acm.org/10.1145/1557019.1557074.
D. C. Lau and J. K. Murnighan. Demographic diversity and faultlines: The
compositional dynamics of organizational groups. Academy of Management
Review, 23(2):325 -- 340, 1998. doi: 10.5465/amr.1998.533229. URL https:
//doi.org/10.5465/amr.1998.533229.
B. S. Lawrence and M. J. Zyphur.
Identifying organizational faultlines with
latent class cluster analysis. Organizational Research Methods, 14(1):32 -- 57,
2011. doi: 10.1177/1094428110376838. URL https://doi.org/10.1177/
1094428110376838.
C. Li and M. Shan. Team formation for generalized tasks in expertise social net-
works. In 2010 IEEE Second International Conference on Social Computing,
pages 9 -- 16, 2010. doi: 10.1109/SocialCom.2010.12.
J. Li and D. C. Hambrick. Factional groups: A new vantage on demographic
faultlines, conflict, and disintegration in work teams. Academy of Manage-
ment Journal, 48(5):794 -- 813, 2005. doi: 10.5465/amj.2005.18803923. URL
https://doi.org/10.5465/amj.2005.18803923.
48
M. I. Malinen and P. Franti. Balanced k-means for clustering. In Structural, Syn-
tactic, and Statistical Pattern Recognition - Joint IAPR International Work-
shop, S+SSPR, pages 32 -- 41. Springer Berlin Heidelberg, 2014.
B. Meyer and A. Glenz. Team faultline measures: A computational comparison
and a new approach to multiple subgroups. Organizational Research Methods,
16(3):393 -- 424, 2013. doi: 10.1177/1094428113484970. URL https://doi.
org/10.1177/1094428113484970.
B. Meyer, A. Glenz, M. Antino, R. Rico, and V. Gonz´alez-Rom´a. Faultlines and
subgroups: A meta-review and measurement guide. Small Group Research,
45(6):633 -- 670, 2014. doi: 10.1177/1046496414552195. URL https://doi.
org/10.1177/1046496414552195.
S. A. Mohrman, S. G. Cohen, and A. M. Morhman Jr. Designing team-based
organizations: New forms for knowledge work. Jossey Bass Business and
Management Series. Jossey-Bass, 1995. ISBN 9780787900809. URL https:
//books.google.com/books?id=pEe5AAAAIAAJ.
E. Molleman. Diversity in demographic characteristics, abilities and personality
traits: Do faultlines affect team functioning? Group decision and Negotiation,
14(3):173 -- 193, 2005. doi: 10.1007/s10726-005-6490-7. URL https://doi.
org/10.1007/s10726-005-6490-7.
J. O. Morrissette and J. C. Jahnke. No relations and relations of strength
zero in the theory of structural balance. Human Relations, 20(2):189 -- 195,
1967. doi: 10.1177/001872676702000207. URL https://doi.org/10.1177/
001872676702000207.
M. J. Pearsall, A. P. Ellis, and J. M. Evans. Unlocking the effects of gender
faultlines on team creativity:
Is activation the key?
Journal of Applied
Psychology, 93(1):225, 2008. doi: 10.1037/0021-9010.93.1.225. URL https:
//doi.org/10.1037/0021-9010.93.1.225.
49
J. T. Polzer, C. B. Crisp, S. L. Jarvenpaa, and J. W. Kim. Extending the
faultline model to geographically dispersed teams: How colocated subgroups
can impair group functioning. Academy of Management Journal, 49(4):679 --
692, 2006. doi: 10.2307/20159792. URL https://www.jstor.org/stable/
20159792.
S. S. Rangapuram, T. Buhler, and M. Hein. Towards realistic team formation
in social networks based on densest subgraphs. In Proceedings of the 22Nd
International Conference on World Wide Web, WWW '13, pages 1077 -- 1088,
New York, NY, USA, 2013. ACM. ISBN 978-1-4503-2035-1. doi: 10.1145/
2488388.2488482. URL http://doi.acm.org/10.1145/2488388.2488482.
M.-´E. Roberge and R. Van Dick. Recognizing the benefits of diversity: When
and how does diversity increase group performance?
Human Resource
Management Review, 20(4):295 -- 308, 2010.
ISSN 1053-4822. doi: https:
//doi.org/10.1016/j.hrmr.2009.09.002. URL http://www.sciencedirect.
com/science/article/pii/S1053482209000795.
L. Rokach and O. Maimon. Clustering methods. In Data mining and knowledge
discovery handbook, pages 321 -- 352. Springer, 2005.
B. Rosgen and L. Stewart. Complexity results on graphs with few cliques.
Discrete Mathematics and Theoretical Computer Science, 9(1):127 -- 135, 2007.
URL http://www.dmtcs.org/volumes/abstracts/dm090108.abs.html.
P. J. Rousseeuw. Silhouettes: A graphical aid to the interpretation and val-
idation of cluster analysis. Journal of Computational and Applied Mathe-
matics, 20:53 -- 65, 1987.
ISSN 0377-0427. doi: https://doi.org/10.1016/
0377-0427(87)90125-7. URL http://www.sciencedirect.com/science/
article/pii/0377042787901257.
M. Rudemo. Empirical choice of histograms and kernel density estimators. Scan-
dinavian Journal of Statistics, 9(2):65 -- 78, 1982. URL http://www.jstor.
org/stable/4615859.
50
J. B. Shaw. The development and analysis of a measure of group fault-
lines. Organizational Research Methods, 7(1):66 -- 100, 2004. doi: 10.1177/
1094428103259562. URL https://doi.org/10.1177/1094428103259562.
M. Sozio and A. Gionis. The community-search problem and how to plan a suc-
cessful cocktail party. In Proceedings of the 16th ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining, KDD '10, pages 939 --
948, New York, NY, USA, 2010. ACM. ISBN 978-1-4503-0055-1. doi: 10.1145/
1835804.1835923. URL http://doi.acm.org/10.1145/1835804.1835923.
S. M. Thatcher, K. A. Jehn, and E. Zanutto. Cracks in diversity research: The
effects of diversity faultlines on conflict and performance. Group Decision
and Negotiation, 12(3):217 -- 241, 2003. doi: 10.1023/A:1023325406946. URL
https://doi.org/10.1023/A:1023325406946.
B. Trezzini. Probing the group faultline concept: An evaluation of measures
of patterned multi-dimensional group diversity. Quality & Quantity, 42(3):
339 -- 368, 2008. doi: 10.1007/s11135-006-9049-z. URL https://doi.org/10.
1007/s11135-006-9049-z.
G. S. Van der Vegt and O. Janssen. Joint impact of interdependence and
group diversity on innovation. Journal of management, 29(5):729 -- 751, 2003.
doi: 10.1016/S0149-2063\ 03\ 00033-3. URL https://doi.org/10.1016/
S0149-2063_03_00033-3.
D. Van Knippenberg, J. F. Dawson, M. A. West, and A. C. Homan. Diversity
faultlines, shared objectives, and top management team performance. human
relations, 64(3):307 -- 336, 2011. doi: 10.1177/0018726710378384. URL https:
//doi.org/10.1177/0018726710378384.
N. M. Webb. Student interaction and learning in small groups. Review of
Educational Research, 52(3):421 -- 445, 1982. doi: 10.2307/1170424. URL
https://www.jstor.org/stable/1170424.
51
E. L. Zanutto, K. Bezrukova, and K. A. Jehn. Revisiting faultline concep-
tualization: Measuring faultline strength and distance. Quality & Quan-
tity, 45(3):701 -- 714, 2011. doi: 10.1007/s11135-009-9299-7. URL https:
//doi.org/10.1007/s11135-009-9299-7.
52
|
1304.4324 | 1 | 1304 | 2013-04-16T03:47:29 | Popularity Prediction in Microblogging Network: A Case Study on Sina Weibo | [
"cs.SI",
"physics.soc-ph"
] | Predicting the popularity of content is important for both the host and users of social media sites. The challenge of this problem comes from the inequality of the popularity of con- tent. Existing methods for popularity prediction are mainly based on the quality of content, the interface of social media site to highlight contents, and the collective behavior of user- s. However, little attention is paid to the structural charac- teristics of the networks spanned by early adopters, i.e., the users who view or forward the content in the early stage of content dissemination. In this paper, taking the Sina Weibo as a case, we empirically study whether structural character- istics can provide clues for the popularity of short messages. We find that the popularity of content is well reflected by the structural diversity of the early adopters. Experimental results demonstrate that the prediction accuracy is signif- icantly improved by incorporating the factor of structural diversity into existing methods. | cs.SI | cs | Popularity Prediction in Microblogging Network: A Case
Study on Sina Weibo
Peng Bao, Hua-Wei Shen, Junming Huang, Xue-Qi Cheng
Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China
[email protected], [email protected], [email protected],
[email protected]
3
1
0
2
r
p
A
6
1
]
I
S
.
s
c
[
1
v
4
2
3
4
.
4
0
3
1
:
v
i
X
r
a
ABSTRACT
Predicting the popularity of content is important for both
the host and users of social media sites. The challenge
of this problem comes from the inequality of the popular-
ity of content. Existing methods for popularity prediction
are mainly based on the quality of content, the interface of
social media site to highlight contents, and the collective
behavior of users. However, little attention is paid to the
structural characteristics of the networks spanned by early
adopters, i.e., the users who view or forward the content in
the early stage of content dissemination. In this paper, tak-
ing the Sina Weibo as a case, we empirically study whether
structural characteristics can provide clues for the popular-
ity of short messages. We find that the popularity of con-
tent is well reflected by the structural diversity of the early
adopters. Experimental results demonstrate that the pre-
diction accuracy is significantly improved by incorporating
the factor of structural diversity into existing methods.
Categories and Subject Descriptors
J.4 [SOCIAL AND BEHAVIORAL SCIENCES]: So-
ciology; H.4 [INFORMATION SYSTEMS APPLICA-
TIONS]: Miscellaneous
General Terms
Measurement, Experimentation
Keywords
popularity prediction; information diffusion; structural di-
versity; microblogging; social network
1.
INTRODUCTION
Popularity prediction on social networks can help users
sift through the vast stream of online contents and enable
advertisers to maximize revenue through differential pricing
for access to content or advertisement placement. Popular-
ity prediction is challenging since numerous factors can af-
fect the popularity of online content. Moreover, popularity
is very asymmetric and broadly-distributed. Several pio-
neering work devoted to the characteristics and mechanisms
of information diffusion [1, 2, 3]. Several efforts have been
made to study the popularity prediction on social networks.
Copyright is held by the author/owner(s).
WWW 2013 Companion, May 13–17, 2013, Rio de Janeiro, Brazil.
ACM 978-1-4503-2038-2/13/05.
Szabo et al. [4] found that the final popularity is reflected
by the popularity in early period by investigating Digg and
Youtube. A direct extrapolation method is then employed
to predict the long-term popularity. Lerman et al. [5] mod-
eled users’ vote process on Digg by considering both the
interestingness and the visibility of online content. Hong et
al.[6] formulated the popularity prediction as a classification
problem.
However, existing methods pay little attention to the struc-
tural characteristic of the propagation path of online con-
tent. In this paper, we consider the popularity prediction
problem by studying the relationship between the popular-
ity of online content and the structural characteristics of the
underlying propagation network. The study is conducted on
the Sina Weibo, the biggest microblogging network in China.
Experimental results demonstrate that our method signifi-
cantly outperforms the state-of-the-art method which ne-
glects the structural characteristics of social networks. This
indicates that the structural diversity would give us some in-
sights to understand the mechanism of information diffusion
and to predict the long-term popularity of a tweet.
2. PROBLEM STATEMENT
In this paper, the popularity prediction aims to predict the
popularity p(tr ) of a tweet at a reference time tr , given the
forward information of this tweet before an indicating time
ti . The indicating time ti is the time at which we observe
the information of a tweet and the reference time tr is the
time at which we predict the popularity of the tweet. The
popularity p(t) is measured by the number of times that a
tweet is re-tweeted at time t.
3. FINDINGS AND METHODS
We first study the structural characteristics of the forward
path of tweets. Encouraged by the work in [7], we investigate
whether the final popularity of a tweet is well indicated by
the structural characteristics of the network consisting of
users that re-tweet the tweet at an earlier time. Specifically,
we analyze the structural characteristics of a tweet with the
following two measurements on its re-tweet path at 1 hour
after it is posted. The first measurement is link density.
Among all users that have forwarded the tweet k at time ti ,
link density is the ratio of the number of followship links to
the number of all possible links. The other measurement is
the diffusion depth, which is the longest length of the path
from the submitter to any user that has retweeted the tweet
k at time ti .
s
r
u
o
h
8
4
r
e
t
f
a
y
t
i
r
a
l
u
p
o
p
g
o
L
3
10
2
10
1
10
−4
10
−2
10
Log link density after 1 hour
0
10
s
r
u
o
h
8
4
r
e
t
f
a
y
t
i
r
a
l
u
p
o
p
g
o
l
e
g
a
r
e
v
A
3
10
2
10
1
10
2
4
8
6
Diffusion depth after 1 hour
10
Figure 1: Structural characteristics
We report the final popularity of a tweet with respect
to the link density and the diffusion depth. As shown in
Figure 1, there exists a strong negative linear correlation
between the final popularity and the link density, and there
exists a strong positive near-linear correlation between the
final popularity and the diffusion depth. This finding tells us
that a diverse group of earlier users, reflected with low link
density and large diffusion depth, leads to a wide spreading
of a tweet. Therefore, the structural characteristics of diffu-
sion paths of a tweet at an earlier time can help predict its
final popularity.
Based on the above findings, we propose two improved
approaches to predict the final popularity using earlier pop-
ularity and structural characteristics. We estimate the loga-
rithmic final popularity with a combination of the logarith-
mic early popularity and the logarithmic link density,
ln pk (tr ) = α1 ln pk (ti ) + α2 ln ρk (ti ) + α3 ,
(1)
where ρk (ti ) is the link density at or before time ti , and α1 ,
α2 and α3 are global coefficients that will be learned from
the data. Similarly, we define a diffusion depth version to
estimate the logarithmic final popularity of a tweet as
ln pk (tr ) = β1 ln pk (ti ) + β2dk (ti ) + β3 ,
(2)
where dk (ti ) is the diffusion depth of the tweet k at or before
time ti , and β1 , β2 and β3 are also global coefficients.
To demonstrate the effectiveness of our proposed approaches,
we compare them with a baseline approach which estimates
the final popularity with the early popularity alone [4]. The
baseline predicts the final popularity using
ln pk (tr ) = γ1 ln pk (ti ) + γ2 ,
(3)
where γ1 and γ2 are also global coefficients that will be
learned from the data.
4. EXPERIMENTS
We use Sina Weibo dataset published by WISE 2012 Chal-
lenge1 . We select the tweets posted during July 1-31, 2011
and all the re-tweet paths occurred during July 1-August
31, 2011. The data set consists of 16.6 million tweets. This
data set also contains a snapshot of the social network of
Sina Weibo. The social network contains 58.6 millions of
registered users and 265.5 millions of following relations.
We take 75% of all the tweets in the dataset as the training
set and the rest 25% as the testing set. The predictions
are evaluated with RMSE (root mean squared error) and
MAE (mean absolute error). As reported in Table 1, the
approach incorporating the link density significantly reduces
the prediction error compared with the baseline, and the
approach incorporating the diffusion depth performs even
1 http://www.wise2012.cs.ucy.ac.cy/challenge.html
Table 1: Prediction error of three approaches.
Primitive type
RMSE MAE
0.57
0.77
Baseline
0.45
0.63
with link density
with diffusion depth
0.61
0.43
better. Here, the values of α2 and β2 in previous formulas
that we learned from the data is 0.04 and 0.07 separately.
The results empirically demonstrate that early structural
characteristics affect the final popularity. Low link density
and long diffusion path implies that a tweet is more probably
spread to different parts of the network, which helps the
tweet become known by a greater population.
5. CONCLUSIONS
In this paper, we have studied how to predict the popular-
ity of short message in Sina Weibo. We find that structural
characteristics provide strong evidence for the final popular-
ity. A low link density and a deep diffusion usually lead to
wide spreading, capturing the intuition that a diverse group
of individuals spread a message to wider audience than a
dense group. Based on such a finding, we propose two ap-
proaches by incorporating the early popularity with the link
density and the diffusion depth of early adopters. Exper-
iments demonstrate that the proposed approaches signifi-
cantly reduce the error of popularity prediction. Our find-
ing provides a new perspective to understand the popularity
prediction problem and is helpful to build accurate predic-
tion models in the future.
6. ACKNOWLEDGEMENTS
This work is funded by the National Natural Scientific
Foundation of China under grant Nos. 61232010, 61202215
and National Basic Research Program of China (the 973
program) under grant No. 2013CB329602. This work is
partly funded by the Beijing Natural Scientific Foundation of
China under grant No. 4122077. This work is also supported
by Key Lab of Information Network Security, Ministry of
Public Security.
7. REFERENCES
[1] A.-L. Barab´asi. The origin of bursts and heavy tails in
human dynamics. Nature, 435(7039):207–211, 2005.
[2] F. Wu, B. Huberman. Novelty and collective attention.
Proc. Natl. Acad. Sci., 104(45):17599-17601, 2007.
[3] J. Yang, J. Leskovec. Patterns of temporal variation in
online media. In Proc. of WSDM’11, pages 177–186,
Feb. 2011, Hong Kong.
[4] G. Szabo, B. A. Huberman. Predicting the popularity
of online content. Commun. ACM, 53(8):80–88, 2010.
[5] K. Lerman, T. Hogg. Using a model of social dynamics
to predict popularity of news. In Proc. of WWW ’10,
pages 621–630, Apr. 2010, Raleigh, USA.
[6] L. Hong, O. Dan, B. D. Davison. Predicting popular
messages in twitter. In Proc. of WWW’11, pages 57–58,
Mar. 2011, Byderabad, India.
[7] J. Ugander, L. Backstrom, C. Marlow, J. Kleinberg.
Structural diversity in social contagion. Proc. Natl
Acad. Sci., 109(14):5962–5966, 2012.
|
1505.06791 | 1 | 1505 | 2015-05-26T02:18:07 | Tracking Employment Shocks Using Mobile Phone Data | [
"cs.SI",
"physics.soc-ph"
] | Can data from mobile phones be used to observe economic shocks and their consequences at multiple scales? Here we present novel methods to detect mass layoffs, identify individuals affected by them, and predict changes in aggregate unemployment rates using call detail records (CDRs) from mobile phones. Using the closure of a large manufacturing plant as a case study, we first describe a structural break model to correctly detect the date of a mass layoff and estimate its size. We then use a Bayesian classification model to identify affected individuals by observing changes in calling behavior following the plant's closure. For these affected individuals, we observe significant declines in social behavior and mobility following job loss. Using the features identified at the micro level, we show that the same changes in these calling behaviors, aggregated at the regional level, can improve forecasts of macro unemployment rates. These methods and results highlight promise of new data resources to measure micro economic behavior and improve estimates of critical economic indicators. | cs.SI | cs | Tracking Employment Shocks Using Mobile Phone Data
Jameson L. Toole∗
Engineering Systems Division, MIT, Cambridge, MA, 02144
School of Information Science, University of Pittsburgh, Pittsburgh, PA 15260
Yu-Ru Lin
Erich Muehlegger
Department of Economics, UC Davis, Davis, CA 95616
Harvard Kennedy School, Harvard University, Cambridge, MA, 02144
Daniel Shoag
Department of Civil and Environmental Engineering, MIT, Cambridge, MA, 02144
Marta C. Gonz´alez
David Lazer
Lazer Laboratory, Department of Political Science
and College of Computer and Information Science,
Northeastern University, Boston, MA 02115, USA and
Harvard Kennedy School, Harvard University, Cambridge, MA, 02144
5
1
0
2
y
a
M
6
2
]
I
S
.
s
c
[
1
v
1
9
7
6
0
.
5
0
5
1
:
v
i
X
r
a
1
Abstract
Can data from mobile phones be used to observe economic shocks and their consequences at
multiple scales? Here we present novel methods to detect mass layoffs, identify individuals affected
by them, and predict changes in aggregate unemployment rates using call detail records (CDRs)
from mobile phones. Using the closure of a large manufacturing plant as a case study, we first
describe a structural break model to correctly detect the date of a mass layoff and estimate its size.
We then use a Bayesian classification model to identify affected individuals by observing changes in
calling behavior following the plant’s closure. For these affected individuals, we observe significant
declines in social behavior and mobility following job loss. Using the features identified at the micro
level, we show that the same changes in these calling behaviors, aggregated at the regional level, can
improve forecasts of macro unemployment rates. These methods and results highlight promise of
new data resources to measure micro economic behavior and improve estimates of critical economic
indicators.
Keywords: unemployment — computational social science — social networks — mobility — complex systems
2
Economic statistics are critical for decision-making by both government and private in-
stitutions. Despite their great importance, current measurements draw on limited sources
of information, losing precision with potentially dire consequences. The beginning of the
Great Recession offers a powerful case study: the initial BEA estimate of the contraction
of GDP in the fourth quarter of 2008 was an annual rate 3.8%. The American Recov-
ery and Reinvestment Act (stimulus) was passed based on this understanding in February
2009. Less than two weeks after the plan was passed, that 3.8% figure was revised to 6.2%,
and subsequent revisions peg the number at a jaw dropping 8.9% – more severe than the
worst quarter during the Great Depression. The government statistics were wrong and may
have hampered an effective intervention. As participation rates in unemployment surveys
drop, serious questions have been raised as to the declining accuracy and increased bias in
unemployment numbers [1].
In this paper we offer a methodology to infer changes in the macro economy in near
real time, at arbitrarily fine spatial granularity, using data already passively collected from
mobile phones. We demonstrate the reliability of these techniques by studying data from
two European countries.
In the first, we show it is possible to observe mass layoffs and
identify the users affected by them in mobile phone records. We then track the mobility
and social interactions of these affected workers and observe that job loss has a systematic
dampening effect on their social and mobility behavior. Having observed an effect in the
micro data, we apply our findings to the macro scale by creating corresponding features
to predict unemployment rates at the province scale.
In the second country, where the
macro-level data is available, we show that changes in mobility and social behavior predict
unemployment rates ahead of official reports and more accurately than traditional forecasts.
These results demonstrate the promise of using new data to bridge the gap between micro
and macro economic behaviors and track important economic indicators. Figure 1 shows a
schematic of our methodology.
3
FIG. 1. A schematic view of the relationship between job loss and call dynamics. We use the calling
behavior of individuals to infer job loss and measure its effects. We then measure these variables and
include them in predictions of unemployment at the macro scale, significantly improving forecasts.
MEASURING THE ECONOMY
Contemporary macroeconomic statistics are based on a paradigm of data collection and
analysis begun in the 1930s [2, 3]. Most economic statistics are constructed from either
survey data or administrative records. For example, the US unemployment rate is calculated
based on the monthly Current Population Survey of roughly 60,000 households, and the
Bureau of Labor Statistics manually collects 80,000 prices a month to calculate inflation.
Both administrative databases and surveys can be slow to collect, costly to administer, and
fail to capture significant segments of the economy. These surveys can quickly face sample
size limitations at fine geographies and require strong assumptions about the consistency of
responses over time. Statistics inferred from survey methods have considerable uncertainty
and are routinely revised in months following their release as other data is slowly collected
[1, 4–6]. Moreover, changes in survey methodology can result in adjustments of reported
rates of up to 1-2 percentage points [7].
The current survey-based paradigm also makes it challenging to study the effect of eco-
nomic shocks on networks or behavior without reliable self-reports. This has hampered
4
Detect Call SignalsInfer Job LossMacroMicroPredict Unemploymentscientific research. For example, many studies have documented the severe negative con-
sequences of job loss in the form of difficulties in retirement [8], persistently lower wages
following re-employment including even negative effects on children’s outcomes [9, 10], in-
creased risk of death and illness [11, 12], higher likelihood of divorce [13], and, unsurprisingly,
negative impacts and on happiness and emotional well-being [14]. Due to the cost of ob-
taining the necessary data, however, social scientists have been unable to directly observe
the large negative impact of a layoff on the frequency and stability of an individual’s social
interactions or mobility.
PREDICTING THE PRESENT
These shortcomings raise the question as to whether existing methods could be supple-
mented by large-scale behavioral trace data. There have been substantial efforts to discern
important population events from such data, captured by the pithy phrase of, “predict-
ing the present” [15–18]. Prior work has linked news stories with stock prices [19–21] and
used web search or social media data to forecast labor markets [22–26], consumer behav-
ior [27, 28], automobile demand, vacation destinations [15, 29]. Research on social media,
search, and surfing behavior have been shown to signal emerging public health problems
[30–37]; although for a cautionary tale see [38]. And recent efforts have even been made to-
wards leveraging Twitter to detect and track earthquakes in real-time detection faster than
seismographic sensors [39–41]. While there are nuances to the analytic approaches taken,
the dominant approach has been to extract features from some large scale observational
data and to evaluate the predictive (correlation) value of those features with some set of
measured aggregate outcomes (such as disease prevalence). Here we offer a twist on this
methodology through identification of features from observational data and to cross validate
across individual and aggregate levels.
All of the applications of predicting the future are predicated in part on the presence of
distinct signatures associated with the systemic event under examination. The key analytic
challenge is to identify signals that (1) are observable or distinctive enough to rise above
the background din, (2) are unique or generate few false positives, (3) contain information
beyond well-understood patterns such as calendar-based fluctuations, and (4) are robust to
manipulation. Mobile phone data, our focus here, are particularly promising for early detec-
5
tion of systemic events as they combine spatial and temporal comprehensiveness, naturally
incorporate mobility and social network information, and are too costly to intentionally
manipulate.
Data from mobile phones has already proven extremely beneficial to understanding the
everyday dynamics of social networks [42–48] and mobility patterns of millions [49–56]. With
a fundamental understanding of regular behavior, it becomes possible to explore deviations
caused by collective events such as emergencies [57], natural disasters [58, 59], and cultural
occasions [60, 61]. Less has been done to link these data to economic behavior.
In this
paper we offer a methodology to robustly infer changes to measure employment shocks at
extremely high spatial and temporal resolutions and improve critical economic indicators.
DATA
We focus our analysis at three levels: the individual, the community, and the provincial
levels. We begin with unemployment at the community (town) level, where we examine the
behavioral traces of a large-scale layoff event. At the community and individual levels, we
analyze call record data from a service provider with an approximately 15% market share in
an undisclosed European country. The community-level data set spans a 15 month period
between 2006 and 2007, with the exception of a 6 week gap due to data extraction failures.
At the province level, we examine call detail records from a service provider from another
European country, with an approximately 20% market share and data running for 36 months
from 2006 to 2009. Records in each data set include an anonymous id for caller and callee,
the location of the tower through which the call was made, and the time the call occurred.
In both cases we examine the universe of call records made over the provider’s network (see
SI for more details).
OBSERVING UNEMPLOYMENT AT THE COMMUNITY LEVEL
We study the closure of an auto-parts manufacturing plant (the plant) that occurred in
December, 2006. As a result of the plant closure, roughly 1,100 workers lost their jobs in
a small community (the town) of 15,000. Our approach builds on recent papers [52–54, 57]
that use call record data to measure social and mobility patterns.
6
There are three mobile phone towers within close proximity of the town and the plant.
The first is directly within the town, the second is roughly 3km from the first and is geo-
graphically closest to the manufacturing plant, while the third is roughly 6.5km from the
first two on a nearby hilltop. In total, these three towers serve an area of roughly 220km2
of which only 6km2 is densely populated. There are no other towns in the region covered by
these towers. Because the exact tower through which a call is routed may depend on factors
beyond simple geographic proximity (e.g. obstructions due to buildings), we consider any
call made from these three towers as having originated from the town or plant.
We model the pre-closure daily population of the town as made up of a fraction of
individuals γ who will no longer make calls near the plant following its closure and the
complimentary set of individuals who will remain (1− γ). As a result of the layoff, the total
number of calls made near the plant will drop by an amount corresponding to the daily calls
of workers who are now absent. This amounts to a structural break model that we can use to
estimate the prior probability that a user observed near the plant was laid off, the expected
drop in calls that would identify them as an affected worker, and the time of the closure (see
SI for full description of this model). We suspect that some workers laid off from the plant
are residents of the town and thus they will still appear to make regular phone calls from
the three towers and will not be counted as affected. Even with this limitation, we find a
large change in behavior.
To verify the date of the plant closing, we sum the number of daily calls from 1955 regular
users (i.e. those who make at least one call from the town each month prior to the layoff)
connecting through towers geographically proximate to the affected plant. The estimator
selects a break date, tlayof f , and pre- and post- break daily volume predictions to minimize
the squared deviation of the model from the data. The estimated values are overlaid on
daily call volume and the actual closure date in the Figure 2A. As is evident in the figure,
the timing of the plant closure (as reported in newspapers and court filings) can be recovered
statistically using this procedure - the optimized predictions display a sharp and significant
reduction at this date. As a separate check to ensure this method is correctly identifying
the break date, we estimate the same model for calls from each individual user i and find
a distribution of these dates ti
layof f is peaked around the actual layoff date (see Figure 1 in
SI).
7
FIG. 2. Identifying the layoff date. A) Total aggregate call volume (black line) from users who make
regular calls from towers near the plant is plotted against our model (blue). The model predicts a
sudden drop in aggregate call volume and correctly identifies the date of the plant closure as the
one reported in newspapers and court records. B) Each of the top 300 users likely to have been laid
off is represented by a row where we fill in a day as colored if a call was made near the plant on that
day. White space marks the absence of calls. Rows are sorted by the assigned probability of that
user being laid off according to our Bayesian model. Users with high probabilities cease making
calls near the plant directly following the layoff. C) We see a sharp, sustained drop in the fraction
of calls made near the plant by users assigned to the top decile in probability of being unemployed
(red) while no affect is seen for the control group users believed to be unaffected (blue). Moreover,
we see that laid off individuals have an additional drop off for a two week period roughly 125 days
prior the plant closure. This time period was confirmed to be a coordinated vacation for workers
providing further evidence we are correctly identifying laid off workers.
OBSERVING UNEMPLOYMENT AT THE INDIVIDUAL LEVEL
To identify users directly affected by the layoff, we calculate Bayesian probability weights
based on changes in mobile phone activity. For each user, we calculate the conditional
probability that a user is a non-resident worker laid off as part of the plant closure based
on their observed pattern of calls. To do this, we compute the difference in the fraction of
days on which a user made a call near the plant in 50 days prior to the week of the layoff.
We denote this difference as ∆q = qpre − qpost. We consider each user’s observed difference a
single realization of a random variable, ∆q. Under the hypothesis that there is no change in
(cid:113) qpre(1−qpre)
50
+ qpost(1−qpost)
50
). Under the
behavior, the random variable ∆q is distributed N (0,
(cid:113) qpre(1−qpre)
50
alternative hypothesis the individual’s behavior changes pre- and post-layoff, the random
variable ∆q is distributed N (d,
+ qpost(1−qpost)
50
), where d is the mean reduction
in calls from the plant for non-resident plant workers laid off when the plant was closed. We
assign user i the following probability of having been laid off given his or her calling pattern:
8
-60-40-200204060Day750800850900950Callsdatamodel-200-1000100200Day0.00.10.20.30.40.50.6Fraction of Calls Near PlantClosing DateVacationControlUnemployed-60-40-200204060Day750800850900950Callsdatamodel-200-1000100200Day0.00.10.20.30.40.50.6Fraction of Calls Near PlantClosing DateVacationControlUnemployedAweekendsClosing DateBCCall nearplantNo Call Users ranked by P(laidoff)P (laidof f )i =
γP (∆q∆q = d)
γP (∆q∆q = d) + (1 − γ)P (∆q∆q = 0)
(1)
Calculating the probabilities requires two parameters, γ, our prior that an individual is
a non-resident worker at the affected plant and d, the threshold we use for the alternative
hypothesis. The values of γ = 5.8% and d = 0.29 are determined based on values fit from
the model in the previous section.
Validating the Layoff
On an individual level, Figure 2B shows days on which each user makes a call near the
plant ranked from highest to lowest probability weight (only the top 300 users are shown,
see Figure 2 in SI for more users). Users highly suspected of being laid off demonstrate a
sharp decline in the number of days they make calls near the plant following the reported
closure date. While we do not have ground-truth evidence that any of these mobile phone
users was laid off, we find more support for our hypothesis by examining a two week period
roughly 125 days prior to the plant closure. Figure 2C shows a sharp drop in the fraction
of calls coming from this plant for users identified as laid off post closure. This period
corresponds to a confirmed coordinated holiday for plant workers and statistical analysis
confirms a highly significant break for individuals classified as plant workers in the layoff for
this period. Given that we did not use call data from this period in our estimation of the
Bayesian model, this provides strong evidence that we are correctly identifying the portion
of users who were laid off by this closure.
In aggregate, we assign 143 users probability
weights between 50% and 100%. This represents 13% of the pre-closure plant workforce and
compares closely with the roughly 15% national market share of the service provider.
ASSESSING THE EFFECT OF UNEMPLOYMENT AT THE INDIVIDUAL LEVEL
We now turn to analyzing behavioral changes associated with job loss at the individual
level. We first consider six quantities related to the monthly social behavior: A) total calls,
B) number of incoming calls, C) number of outgoing calls, D) calls made to individuals
physically located in the town of the plant (as a proxy for contacts made at work), E)
number of unique contacts, and F) the fraction of contacts called in the previous month
9
FIG. 3.
Changes in social networks and mobility following layoffs. We quantify the effect of
mass layoffs relative to two control groups: users making regular calls from the town who were not
identified as laid off and a random sample of users from the rest of the country. We report monthly
point estimates for six social and three mobility behaviors: A) Total calls, B) number of incoming
calls, C) number of outgoing calls, D) Fraction of calls to individuals in the town at the time of the
call, E) number of unique contacts, and the fraction of individuals called in the previous month
who were not called in the current month (churn), G) Number of unique towers visited, H) radius
of gyration, I) average distance from most visited tower. Pooling months pre- and post-layoff yield
statistically significant changes in monthly social network and mobility metrics following a mass
layoff. J) Reports regression coefficient for each of our 9 dependent variables along with the 66%
and 95% confidence intervals.
that were not called in the current month, referred to as churn. In addition to measuring
social behavior, we also quantify changes in three metrics related to mobility: G) number
of unique locations visited, H) radius of gyration, and I) average distance from most visited
tower (see SI for detailed definitions of these variables). To guard against outliers such as
long trips for vacation or difficulty identifying important locations due to noise, we only
consider months for users where more than 5 calls were made and locations where a user
recorded more than three calls.
We measure changes in these quantities using all calls made by each user (not just those
near the plant) relative to months prior to the plant closure, weighting measurements by
10
-0.3-0.2-0.10.00.10.2CallsIncomingOutgoing-0.3-0.2-0.10.00.10.2To TownContactsChurn-50050100150200Day-0.3-0.2-0.10.00.10.2Towers-50050100150200Day-50050100150200DayRandomTownClosing DateClosing DateClosing DateMonthly changes in behavior following a mass layoffAGFEDCBIH-0.8-0.6-0.4-0.20.00.2Percent ChangeLog(Inc)Log(Out)Log(Calls)Log(Towers)-0.10-0.050.000.050.10Percentage PointsTo TownChurn-3.0-2.5-2.0-1.5-1.0-0.50.0Number of ContactsContactsSummary: Effects of mass layoffs on social behavior and mobilityMobilitySocialRandomTownDependent variableJthe probability an individual is laid off and relative to two reference groups:
individuals
who make regular calls from the town but were not believed to be laid off (mathematically
we weight this group using the inverse weights from our bayesian classifier) and a random
sample of 10,000 mobile phone users throughout the country (all users in this sample are
weighted equally).
Figure 3A-I shows monthly point estimates of the average difference between relevant
characteristics of users believed to be laid off compared to control groups. This figure shows
an abrupt change in variables in the month directly following the plant closure. Despite
this abrupt change, data at the individual level are sufficiently noisy that the monthly
point estimates are not significantly different from 0 in every month. However, when data
from months pre- and post-layoff are pooled, these differences are robust and statistically
significant. The right panel of Figure 3 and Table I in the SI show the results of OLS
regressions comparing the pre-closure and post-closure periods for laid-off users relative to
the two reference groups (see SI for detailed model specification as well as confidence intervals
for percent changes pre- and post-layoff for each variable). The abrupt and sustained change
in monthly behavior of individuals with a high probability of being laid off is compelling
evidence in support of using mobile phones to detect mass layoffs with mobile phones.
We find that the total number of calls made by laid off individuals drops 51% and 41%
following the layoff when compared to non-laid off residents and random users, respectively.
Moreover, this drop is asymmetric. The number of outgoing calls decreases by 54% percent
compared to a 41% drop in incoming calls (using non-laid off residents as a baseline). Sim-
ilarly, the number of unique contacts called in months following the closure is significantly
lower for users likely to have been laid off. The fraction of calls made by a user to some-
one physically located in the town drops 4.7 percentage points for laid off users compared
to residents of the town who were not laid off. Finally, we find that the month-to-month
churn of a laid off person’s social network increases roughly 3.6 percentage points relative to
control groups. These results suggest that a user’s social interactions see significant decline
and that their networks become less stable following job loss. This loss of social connections
may amplify the negative consequences associated with job loss observed in other studies.
For our mobility metrics, find that the number of unique towers visited by laid-off individ-
uals decreases 17% and 20% relative to the random sample and town sample, respectively.
Radius of gyration falls by 20% and 22% while the average distance a user is found from
11
the most visited tower also decrease decreases by 26% relative to reference groups. These
changes reflect a general decline in the mobility of individuals following job loss, another
potential factor in long term consequences.
OBSERVING UNEMPLOYMENT AT THE PROVINCE LEVEL
The relationship between mass layoff events and these features of CDRs suggests a poten-
tial for predicting important, large-scale unemployment trends based on the population’s call
information. Provided the effects of general layoffs and unemployment are similar enough
to those due to mass layoffs, it may be possible to use observed behavioral changes as
additional predictors of general levels of unemployment. To perform this analysis, we use
another CDR data set covering approximately 10 million subscribers in a different European
country, which has been studied in prior work [44, 45, 52–54, 57]. This country experienced
enormous macroeconomic disruptions, the magnitude of which varied regionally during the
period in which the data are available. We supplement the CDR data set with quarterly,
province-level unemployment rates from the EU Labor Force Survey, a large sample survey
providing data on regional economic conditions within the EU (see SI for additional details).
We compute seven aggregated measures identified in the previous section: call volume,
incoming calls, outgoing calls, number of contacts, churn, number of towers, and radius of
gyration. Distance from home was omitted due to strong correlation with radius of gyration
while calls to the town was omitted because it is not applicable in a different country. For
reasons of computational cost, we first take a random sample of 3000 mobile phone users
for each province. The sample size was determined to ensure the estimation feature values
are stable (see SI Figure 6 for details). We then compute the seven features aggregated
per month for each individual user. The k-th feature value of user i at month t is denoted
as yi,t,k and we compute month over month changes in this quantity as y(cid:48)
normalized feature value for a province s, is computed by averaging all users in selected
i,t,k = yi,t,k
yi,t−1,k
. A
province ¯ys,t,k =(cid:80)
i∈s y(cid:48)
i,t,k. In addition, we use percentiles of the bootstrap distribution to
compute the 95% confidence interval for the estimated feature value.
After aggregating these metrics to the province level, we assess their power to improve
predictions of unemployment rates. Note that we do not attempt to identify mass layoffs
in this country.
Instead, we look for behavioral changes that may have been caused by
12
layoffs and see if these changes are predictive of general unemployment statistics. First, we
correlate each aggregate measure with regional unemployment separately, finding significant
correlations in the same direction as was found for individuals (see Table II in the SI). We
also find the strong correlations between calling behavior variables, suggesting that principal
component analysis (PCA) can reasonably be used to construct independent variables that
capture changes in calling behavior while guarding against co-linearity. The first principal
component, with an eigenvalue of 4.10, captures 59% of the variance in our data and is
the only eigenvalue that satisfies the Kaiser criterion. The loadings in this component are
strongest for social variables. Additional details on the results of PCA can be found in the SI
Tables III and IV. Finally, we compute the scores for the first component for each observation
and build a series of models that predict quarterly unemployment rates in provinces with
and without the inclusion of this representative mobile phone variable.
First, we predict the present by estimating a regression of a given quarter’s unemployment
on calling behavior in that quarter (e.g. using phone data from Q1 to predict unemployment
in Q1). As phone data is available the day a quarter ends, this method can produce predic-
tions weeks before survey results are tabulate and released. Next, we predict the future in
a more traditional sense by estimating a regression on a quarter’s surveyed unemployment
rate using mobile phone data from last quarter as a leading indicator (e.g. phone metrics
from Q1 to predict unemployment rates in Q2). This method can produce more predictions
months before surveys are even conducted. See Figure 3 in the SI for a detailed timeline
of data collection, release, and prediction periods. We have eight quarters of unemploy-
ment data for 52 provinces. We make and test our predictions by training our models on
half of the provinces and cross-validate by testing on the other half. The groups are then
switched to generate out of sample predictions for all provinces. Prediction results for an
AR1 model that includes a CDR variable are plotted against actual unemployment rates
in Figure 4. We find strong correlation coefficients between predictions of predictions of
present unemployment rates (ρ = 0.95) as well as unemployment rates one quarter in the
future (ρ = 0.85).
As advocated in [38] it is important to benchmark these type of prediction algorithms
against standard forecasts that use existing data. Previous work has shown that the perfor-
mance of most unemployment forecasts is poor and that simple linear models routinely out-
perform complicated non-linear approaches [62–65] and the dynamic stochastic general equi-
13
librium (DSGE) models aimed at simulating complex macro economic interactions [66, 67].
With this in mind, we compare predictions made with and without mobile phone covariates
using three different model specifications: AR1, AR1 with a quadratic term (AR1 Quad),
AR1 with a lagged national GDP covariate (AR1 GDP). In each of these model specifica-
tions, the coefficient related to the principal component CDR score is highly significant and
negative as expected given that the loadings weigh heavily on social variables that declined
after a mass layoff (see tables V and VI in the SI regression results). Moreover, adding
metrics derived from mobile phone data significantly improves forecast accuracy for each
model and reduces the root mean squared error of unemployment rate predictions by be-
tween 5% and 20% (see inserts in Figure 4). As additional checks that we are capturing true
improvements, we use mobile phone data from only the first half of each quarter (before
surveys are even conducted) and still achieve a 3%-10% improvement in forecasts. These
results hold even when variants are run to include quarterly and province level fixed effects
(see tables VII and VIII in the SI).
In summary, we have shown that features associated with job loss at the individual level
are similarly correlated with province level changes in unemployment rates in a separate
country. Moreover, we have demonstrated the ability of massive, passively collected data
to identify salient features of economic shocks that can be scaled up to measure macro
economic changes. These methods allow us to predict “present” unemployment rates two
to eight weeks prior to the release of traditional estimates and predict “future” rates up to
four months ahead of official reports more accurately than using historical data alone.
DISCUSSION
We have presented algorithms capable of identifying employment shocks at the individual,
community, and societal scales from mobile phone data. These findings have great practi-
cal importance, potentially facilitating the identification of macro-economic statistics with
much finer spatial granularity and faster than traditional methods of tracking the economy.
We can not only improve estimates of the current state of the economy and provide predic-
tions faster than traditional methods, but also predict future states and correct for current
uncertainties. Moreover, with the quantity and richness of these data increasing daily, these
results represent conservative estimates of its potential for predicting economic indicators.
14
FIG. 4. Predicting unemployment rates using mobile phone data. We demonstrate that aggregating
measurements of mobile phone behaviors associated with unemployment at the individual level
also predicts unemployment rates at the province level. To make our forecasts, we train various
models on data from half of the provinces and use these coefficients to predict the other half.
Panel A compares predictions of present unemployment rates to observed rates and Panel B shows
predictions of unemployment one quarter ahead using an AR1 model that includes co-variates of
behaviors measured using mobile phones. Both predictions correlate strongly with actual values
while changes in rates are more difficult to predict. The insets show the percent improvement
to the RMSE of predictions when mobile phone co-variates are added to various baseline model
specifications. In general, the inclusion of mobile phone data reduces forecast errors by 5% to 20%.
The ability to get this information weeks to months faster than traditional methods is ex-
tremely valuable to policy and decision makers in public and private institutions. Further, it
is likely that CDR data are more robust to external manipulation and less subject to service
15
ABprovider algorithmic changes than most social media [38]. But, just as important, the micro
nature of these data allow for the development of new empirical approaches to study the
effect of economic shocks on interrelated individuals.
While this study highlights the potential of new data sources to improve forecasts of
critical economic indicators, we do not view these methods as a substitute for survey based
approaches. Though data quantity is increased by orders of magnitude with the collection
of passively generated data from digital devices, the price of this scale is control. The
researcher no longer has the ability to precisely define which variables are collected, how
they are defined, when data collection occurs making it much harder to insure data quality
and integrity. In many cases, data is not collected by the researcher at all and is instead
first pre-processed by the collector, introducing additional uncertainties and opportunities
for contamination. Moreover, data collection itself is now conditioned on who has specific
devices and services, introducing potential biases due to economic access or sorting. If policy
decisions are based solely on data derived from smartphones, the segment of the population
that cannot afford these devices may be underserved.
Surveys, on the other hand, provide the researcher far more control to target specific
groups, ask precise questions, and collect rich covariates. Though the expense of creating,
administering, and participating in surveys makes it difficult to collect data of the size and
frequency of newer data sources, they can provide far more context about participants.
This work demonstrates the benefits of both data gathering methods and shows that hybrid
models offer a way to leverage the advantages of each. Traditional survey based forecasts
are improved here, not replaced, by mobile phone data. Moving forward we hope to see
more such hybrid approaches. Projects such as the Future Mobility Survey[68] and the MIT
Reality Mining project [24] bridge this gap by administering surveys via mobile devices,
allowing for the collection of process generated data as well as survey based data. These
projects open the possibility to directly measure the correlation between data gathered by
each approach.
The macro-economy is the complex concatenation of interdependent decisions of millions
of individuals [69]. To have a measure of the activity of almost every individual in the
economy, of their movements and their connections should transform our understanding of
the modern economy. Moreover, the ubiquity of such data allows us to test our theories at
scales large and small and all over the world with little added cost. We also note poten-
16
tial privacy and ethical issues regarding the inference of employment/unemployment at the
individual level, with potentially dire consequences for individuals’ access, for example, to
financial markets. With the behavior of billions being volunteered, captured, and stored at
increasingly high resolutions, these data present an opportunity to shed light on some of the
biggest problems facing researchers and policy makers alike, but also represent an ethical
conundrum typical of the “big data” age.
ACKNOWLEDGMENTS
Jameson L. Toole received funding from the National Science Foundation Graduate Re-
search Fellowship Program (NSF GRFP).
AUTHOR CONTRIBUTIONS
Jameson L. Toole designed and performed data analysis and wrote the paper. Yu-Ru
Lin designed and performed data analysis and wrote the paper. Daniel Shoag designed and
performed data analysis and wrote the paper. Erich Muehlegger designed and performed
data analysis and wrote the paper. Marta C. Gonzalez provided data and edited the paper.
David Lazer designed analysis, provided data, and wrote the paper.
∗ [email protected]
[1] Krueger, A., Mas, A. & Niu, X. The evolution of rotation group bias: Will the real unem-
ployment rate please stand up? Tech. Rep., National Bureau of Economic Research (2014).
[2] Marcuss, D. & Kane, R. E. Us national income and product statistics born of the great
depression and world war ii. Tech. Rep., Bureau of Economic Analysis (2007).
[3] Card, D. Origins of the Unemployment Rate: The Lasting Legacy of Measurement without
Theory. American Economic Review 101, 552–557 (2011).
[4] Hausman, J. & Leibtag, E. CPI Bias from Supercenters: Does the BLS Know that Wal-Mart
Exists? Tech. Rep., National Bureau of Economic Research (2004).
[5] Jones, S. R. G. & Riddell, W. C. The Measurement of Unemployment: An Empirical Ap-
proach. Econometrica 67, 147–162 (1999).
17
[6] Burda, M. C., Hamermesh, D. S. & Stewart, J. Cyclical Variation in Labor Hours and
Productivity Using the ATUS. Tech. Rep., National Bureau of Economic Research (2012).
[7] Tiller, R. & Welch, M. Predicting the National unemployment rate that the ”old” CPS
would have produced. In Proceedings of the Section on Survey Research Methods, American
Statistical Association (1994).
[8] Chan, S. & Stevens, A. H. Employment and retirement following a late-career job loss.
American Economic Review 211–216 (1999).
[9] Ruhm, C. J. Are workers permanently scarred by job displacements? The American Economic
Review 319–324 (1991).
[10] Oreopoulos, P., Page, M. & Stevens, A. H. The intergenerational effects of worker displace-
ment. Journal of Labor Economics 26, 0–455 (2008).
[11] Sullivan, D. & Von Wachter, T. Job displacement and mortality: An analysis using adminis-
trative data. The Quarterly Journal of Economics 124, 1265–1306 (2009).
[12] Classen, T. J. & Dunn, R. A. The effect of job loss and unemployment duration on suicide
risk in the United States: a new look using mass-layoffs and unemployment duration. Health
economics 21, 338–350 (2012).
[13] Charles, K. K. & Stephens Jr, M. Job displacement, disability, and divorce. Tech. Rep.,
National bureau of economic research (2001).
[14] Krueger, A. B., Mueller, A., Davis, S. J. & Sahin, A. Job search, emotional well-being, and job
finding in a period of mass unemployment: Evidence from high frequency longitudinal data
[with comments and discussion]. Brookings Papers on Economic Activity pp. 1–81 (2011).
[15] Choi, H. & Varian, H. Predicting initial claims for unemployment benefits. Google Inc (2009).
[16] Vespignani, A. Predicting the behavior of techno-social systems. Science 325, 425–8 (2009).
[17] Lazer, D. et al. Computational Social Science. Science 323, 721–723 (2009).
[18] Henderson, J. V., Storeygard, A. & Weil, D. N. Measuring Economic Growth from Outerspace.
The American Economic Review 102, 994–1028 (2012).
[19] Hayo, B. & Kutan, A. M. The impact of news, oil prices, and global market developments on
Russian financial markets1. Economics of Transition 13, 373–393 (2005).
[20] Lavrenko, V. et al. Mining of concurrent text and time series. In KDD-2000 Workshop on
Text Mining, 37–44 (Citeseer, 2000).
18
[21] Schumaker, R. P. & Chen, H. Textual analysis of stock market prediction using breaking
financial news: The AZFin text system. ACM Transactions on Information Systems (TOIS)
27, 12 (2009).
[22] Ettredge, M., Gerdes, J. & Karuga, G. Using web-based search data to predict macroeconomic
statistics. Communications of the ACM 48, 87–92 (2005).
[23] Askitas, N. & Zimmermann, K. F. Google econometrics and unemployment forecasting (2009).
[24] Eagle, N. & Pentland, A. Reality mining: Sensing complex social systems. Personal and
Ubiquitous Computing 10, 255–268 (2006).
[25] Suhoy, T. Query indices and a 2008 downturn: Israeli data (Research Department, Bank of
Israel, 2009).
[26] Antenucci, D., Cafarella, M., Levenstein, M., R´e, C. & Shapiro, M. D. Using Social Media to
Measure Labor Market Flows. Tech. Rep., National Bureau of Economic Research (2014).
[27] Goel, S., Hofman, J. M., Lahaie, S., Pennock, D. M. & Watts, D. J. Predicting consumer
behavior with Web search. Proceedings of the National Academy of Sciences 107, 17486–17490
(2010).
[28] Gelman, M., Kariv, S., Shapiro, M. D., Silverman, D. & Tadelis, S. Harnessing naturally
occurring data to measure the response of spending to income. Science 345, 212–215 (2014).
[29] Choi, H. & Varian, H. Predicting the Present with Google Trends. Economic Record 88, 2–9
(2012).
[30] Ginsberg, J. et al. Detecting influenza epidemics using search engine query data. Nature 457,
1012–1014 (2008).
[31] Aramaki, E., Maskawa, S. & Morita, M. Twitter catches the flu: detecting influenza epidemics
using Twitter. In Proceedings of the Conference on Empirical Methods in Natural Language
Processing, 1568–1576 (Association for Computational Linguistics, 2011).
[32] Chew, C. & Eysenbach, G. Pandemics in the age of Twitter: content analysis of Tweets
during the 2009 H1N1 outbreak. PloS one 5, e14118 (2010).
[33] Culotta, A. Towards detecting influenza epidemics by analyzing Twitter messages. In Pro-
ceedings of the first workshop on social media analytics, 115–122 (ACM, 2010).
[34] Gomide, J. et al. Dengue surveillance based on a computational model of spatio-temporal
locality of Twitter. In Proceedings of the 3rd International Web Science Conference, 3 (ACM,
2011).
19
[35] de Quincey, E. & Kostkova, P. Early warning and outbreak detection using social networking
websites: The potential of twitter. In Electronic healthcare, 21–24 (Springer, 2010).
[36] Zamite, J. a., Silva, F. A. B., Couto, F. & Silva, M. J. MEDCollector: Multisource epidemic
data collector. In Transactions on large-scale data-and knowledge-centered systems IV, 40–72
(Springer, 2011).
[37] Signorini, A., Segre, A. M. & Polgreen, P. M. The use of Twitter to track levels of disease
activity and public concern in the US during the influenza A H1N1 pandemic. PloS one 6,
e19467 (2011).
[38] Lazer, D., Kennedy, R., King, G. & Vespignani, A. Big data. The parable of Google Flu:
traps in big data analysis. Science (New York, N.Y.) 343, 1203–5 (2014).
[39] Sakaki, T., Okazaki, M. & Matsuo, Y. Earthquake shakes twitter users: real-time event
detection by social sensors. In Proceedings of the 19th international conference on World wide
web, 851–860 (ACM, 2010).
[40] Guy, M., Earle, P., Ostrum, C., Gruchalla, K. & Horvath, S.
Integration and dissemina-
tion of citizen reported and seismically derived earthquake information via social network
technologies. In Advances in intelligent data analysis IX, 42–53 (Springer, 2010).
[41] Earle, P., Bowden, D. & Guy, M. Twitter earthquake detection: earthquake monitoring in a
social world. Annals of Geophysics 54, 708–715 (2012).
[42] Barab´asi, A.-L. The origin of bursts and heavy tails in human dynamics. Nature 435, 207–211
(2005).
[43] Rybski, D., Buldyrev, S. V., Havlin, S., Liljeros, F. & Makse, H. A. Scaling laws of hu-
man interaction activity. Proceedings of the National Academy of Sciences 106, 12640–12645
(2009).
[44] Onnela, J.-P., Arbesman, S., Gonz´alez, M. C., Barab´asi, A.-L. & Christakis, N. A. Geographic
Constraints on Social Network Groups. PLoS ONE 6, 7 (2011).
[45] Onnela, J.-P. et al. Structure and tie strengths in mobile communication networks. Proceedings
of the National Academy of Sciences of the United States of America 104, 7332–7336 (2007).
[46] Cho, E., Myers, S. A. & Leskovec, J. Friendship and mobility. In Proceedings of the 17th
ACM SIGKDD international conference on Knowledge discovery and data mining KDD 11,
KDD ’11, 1082 (ACM Press, 2011).
20
[47] Goncalves, B. & Ramasco, J. J. Human dynamics revealed through Web analytics. Physical
Review E 78, 7 (2008).
[48] Bond, R. M. et al. A 61-million-person experiment in social influence and political mobiliza-
tion. Nature 489, 295–298 (2012).
[49] Balcan, D. et al. Multiscale mobility networks and the spatial spreading of infectious diseases.
Proceedings of the National Academy of Sciences of the United States of America 106, 21484–9
(2009).
[50] Han, X.-P., Hao, Q., Wang, B.-H. & Zhou, T. Origin of the scaling law in human mobility:
Hierarchy of traffic systems. Physical Review E 83, 2–6 (2011).
[51] Brockmann, D., Hufnagel, L. & Geisel, T. The scaling laws of human travel. Nature 439,
462–5 (2006).
[52] Gonz´alez, M. C., Hidalgo, C. A. & Barab´asi, A.-L. Understanding individual human mobility
patterns. Nature 453, 779–782 (2008).
[53] Song, C., Qu, Z., Blumm, N. & Barab´asi, A.-L. Limits of predictability in human mobility.
Science 327, 1018–1021 (2010).
[54] Song, C., Koren, T., Wang, P. & Barab´asi, A.-L. Modelling the scaling properties of human
mobility. Nature Physics 6, 818–823 (2010).
[55] Deville, P. et al. Dynamic population mapping using mobile phone data. Proceedings of the
National Academy of Sciences 1408439111– (2014).
[56] Yan, Xiao-Yong, Zhao, Chen, Fan, Ying, Di, Zengru, & Wang, Wen-Xu Universal predictabil-
ity of mobility patterns in cities Journal of the Royal Society Interface 11, (2014).
[57] Bagrow, J. P., Wang, D. & Barab´asi, A.-L. Collective Response of Human Populations to
Large-Scale Emergencies. PLoS ONE 6, 8 (2011).
[58] Blumenstock, J. E., Fafchamps, M. & Eagle, N. Risk and Reciprocity Over the Mobile Phone
Network: Evidence from Rwanda. SSRN Electronic Journal (2011).
[59] Lu, X., Bengtsson, L. & Holme, P. Predictability of population displacement after the 2010
Haiti earthquake. Proceedings of the National Academy of Sciences of the United States of
America 109, 11576–81 (2012).
[60] Calabrese, F., Colonna, M., Lovisolo, P., Parata, D. & Ratti, C. Real-Time Urban Monitoring
Using Cell Phones: A Case Study in Rome 12, 141–151 (2011).
[61] Calabrese, F. & Ratti, C. Real Time Rome. NETCOM 20, 247–258 (2006).
21
[62] Montgomery, A. L., Zarnowitz, V., Tsay, R. S. & Tiao, G. C. Forecasting the us unemployment
rate. Journal of the American Statistical Association 93, 478–493 (1998).
[63] Milas, C. & Rothman, P. Out-of-sample forecasting of unemployment rates with pooled
STVECM forecasts. International Journal of Forecasting 24, 101–121 (2008).
[64] Schuh, S. An evaluation of recent macroeconomic forecast errors. New England Economic
Review 35–56 (2001).
[65] Stock, J. H. & Watson, M. W. A Comparison of Linear and Nonlinear Univariate Models for
Forecasting Macroeconomic Time Series. Tech. Rep., National Bureau of Economic Research
(1998).
[66] Rossi, B. Do DSGE Models Forecast More Accurately Out-of-Sample than VAR Models?
Advances in Econometrics 32, 27–79 (2013).
[67] Edge, R. M., Gurkaynak, R. S., REIS, R. & SIMS, C. A. How useful are estimated dsge model
forecasts for central bankers?[with comments and discussion]. Brookings Papers on Economic
Activity 209–259 (2010).
[68] Cottrill, C. D., Pereira, F. C., Zhao, F., Dias, I. F., Lim, H. B., Ben-Akiva, M. E., & Zegras,
P. C. Future mobility survey. Transportation Research Record: Journal of the Transportation
Research Board 2354, 59-67 (2013).
[69] Krugman, P. R. The Self Organizing Economy (Blackwell Publishers, 1996).
SUPPLEMENTARY INFORMATION
Materials and Methods
CDR Data set 1 (D1): We analyze call detail records (CDRs) from two industrialized
European countries. In the first country, we obtain data on 1.95 million users from a
service provider with roughly 15% market share. The data run for 15 months across
the years 2006 and 2007, with the exception of a gap between August and September
2006. Each call record includes a de-identified caller and recipient IDs, the locations of
the caller’s and recipient’s cell towers and the length of the call. Caller or recipients on
other network carriers are assigned random IDs. There are approximately 1.95 million
individuals identified in the data, 453 million calls, and 16 million hours of call time.
The median user makes or receives 90 calls per months.
22
CDR Data set 2 (D2): The second data set contains 10 million users (roughly 20% mar-
ket share) within a single country over three years of activity. Like D1, each billing
record for voice and text services, contains the unique identifiers of the caller placing
the call and the callee receiving the call, an identifier for the cellular antenna (tower)
that handled the call, and the date and time when the call was placed. Coupled with
a data set describing the locations (latitude and longitude) of cellular towers, we have
the approximate location of the caller when placing the call. For this work we do not
distinguish between voice calls and text messages, and refer to either communication
type as a “call.” However, we also possess identification numbers for phones that are
outside the service provider but that make or receive calls to users within the company.
While we do not possess any other information about these lines, nor anything about
their users or calls that are made to other numbers outside the service provider, we do
have records pertaining to all calls placed to or from those ID numbers involving sub-
scribers covered by our data set. Thus egocentric networks between users within the
company and their immediate neighbors only are complete. This information was used
to generate egocentric communication networks and to compute the features described
in the main text. From this data set, we generate a random sample population of k
users for each of the provinces, and track each user’s call history during our 27-month
tracking period (from December 2006 to March 2009). We discuss how the sample
size is chosen in a following subsection. Finally, we note that due to an error in data
extraction from the provider, we are missing data for Q4 in 2007.
The use of CDR data to study mobility and social behaviors on a massive scale is becoming
increasingly common. In addition to its large scale, its format is generally consistent between
countries and mobile operators. In the context of this study, each mobile phone data set
contains five columns: 1) an anonymized, unique identifier for the caller, 2) the ID of the
tower through which the caller;s call was routed, 3) an anonymized, unique identifier of the
receiver of the call, 4) the ID of the tower through which the receiver’s call was routed,
and 5) the timestamp down to the second which the call was initiated. In order to obtain
the location of both caller and receiver, data is restricted to only calls between members of
the same mobile operator. The tower IDs reflect the tower used upon starting the call and
we have no information on changes in location that may be made during the call. We also
23
obtain a list of latitudes and longitudes marking the coordinates of each tower. Although
calls are generally believed to be routed through the tower that is geographically closest to
the phone, this may not be the case if the signal is obscured by buildings or topology. For
this reason, we consider a cluster of towers near the geographic area in question instead of
a single tower.
To ensure privacy of mobile phone subscribers, all identifiers were anonymized before we
received the data and no billing or demographic information was provided on individuals or
in aggregate.
Filtering CDR Data
We limit our sample to mobile phone users who either make or receive at least ten calls
connecting through one of the three cell towers closest to the manufacturing plant of interest.
In addition, we require that users make at least one call in each month spanned by a given
data set to ensure users are still active.
Manufacturing plant closure
We gather information on a large manufacturing plant closing that affected a small com-
munity within the service provider’s territory from news articles and administrative sources
collected by the country’s labor statistics bureau. The plant closure occurred in Decem-
ber 2006 and involved 1,100 employees at an auto-parts manufacturing plant in a town of
roughly 15,000 people.
Town Level Structural Break Model
We model the pre-closure daily population of the town as consisting of three segments:
a fraction of non-resident plant workers γ, a fraction of resident workers µ, and a fraction
of non-workers normalized to (1 − γ − µ). We postulate that each individual i has a flow
probability of making or receiving a call at every moment pi. Workers spend a fraction ψ
of their day at their jobs and thus make, in expectation, piψ call on a given day during
work hours. When losing their job in the town, both resident and non-resident workers are
24
re-matched in national, not local, labor market.
Given this model, the expected daily number of cell phone subscribers making or receiving
calls from the three towers serving the plant and town:
γψ ¯p + (1 − γ)¯p
for t < tlayof f
µ(1 − ψ)¯p + (1 − γ − µ)¯p for t ≥ tlayof f
vol =
This model predicts a discrete break in daily volume from the towers proximate to the
plant of (γ + µ)ψ ¯p at the date tlayof f . For workers, the predicted percentage change in call
volume from these towers is (γ+µ)ψ ¯p
(µ¯p+γψ ¯p. Non-workers experience no change.
25
Individual Structural Break Model
We fit a model similar to the community structural break model to data for each individual
user, i, based on the probability they made a call from the town on each day. For each
individual, we use the non-linear estimator to select a break date ti
and post- break daily probabilities pi,t<ti
layof f
and pi,t>ti
layof f
layof f , and constant pre-
to minimize the squared deviation
from each individuals’ data. Figure 5 plots the distribution of break-dates for individuals. As
expected, there is a statistically significant spike in the number of individuals experiencing
a break in the probability of making a call from the town at the time of the closure and
significantly fewer breaks on other, placebo dates. These two methods provide independent,
yet complementary ways of detecting mass layoffs in mobile phone data.
FIG. 5. We plot the distribution of break dates for the structural break model estimated for
individuals. We find a strong, statistically significant peak centered on the reported closure date
(red) with far fewer breaks on other, placebo dates. This is consistent with both our community
wide model as well as the Bayesian model presented above.
26
-60-40-200204060Day0.000.010.020.030.040.050.060.07Density of UsersClosing DateEstimated Individual Layoff DatesBayesian Estimation
On an individual level, Figure 6A shows days on which each user makes a call near
the plant ranked from highest to lowest probability weight. Figure 6B provides greater
detail for users probability weights between 50% and 100%. Users highly suspected of being
laid off demonstrate a sharp decline in the number of days they make calls near the plant
following the reported closure date. Figure 6C graphs the inverse cumulative distribution of
probability weights. While we do not have ground-truth evidence that any of these mobile
phone users was laid off, we find more support for our hypothesis by examining a two week
period roughly 125 days prior to the plant closure.
Figures 6A and 6B illustrate that the call patterns of users assigned the highest probabil-
ities change significantly after the plant closure. These users make calls from the town on a
consistent basis before the layoff, but make significantly fewer calls from the town afterwards.
In contrast, the call patterns of users assigned the lowest weights do not change following
the plant closure. In aggregate, we assign 143 users probability weights between 50% and
100%. This represents 13% of the pre-closure plant workforce this fraction compares closely
with the roughly 15% national market share of the service provider.
The European Labor Force Survey
Each quarter, many European countries are required to conduct labor force surveys to
measure important economic indicators like the unemployment rates studied here. In person
or telephone interviews concerning employment status are conducted on a sample size of less
than 0.5% of the population. Moreover, participants are only asked to provide responses
about their employment status during a 1 week period in the quarter.
These “microdata” surveys are then aggregated at the province and national levels. Con-
firmed labor force reports and statistics for a particular quarter are released roughly 14 weeks
after the quarter has ended. For example, Q1 of 2012 begins January 1st, 2012 and ends
March 31st, 2012. The survey data is analyzed and unemployment numbers are released
between two and three weeks following the end of the quarter. These numbers, however, are
unconfirmed and subject to revisions which can occur at any time in the following quarters.
27
FIG. 6. Identifying affected individuals. A) Each user is represented by a row where we fill in a
day as colored if a call was made near the plant on that day. White space marks the absence of
calls. Rows are sorted by the assigned probability of that user being laid off. B) A closer view of
the users identified as mostly to have been laid off reveals a sharp cut off in days on which calls
were made from the plant. C) An inverse cumulative distribution of assigned probability weights.
The insert shows an enlarged view at the probability distribution for the 150 individuals deemed
most likely to have been laid off.
The Effect of Job Loss on Call Volumes
We measure the effect of job loss on six properties of an individual’s social behavior and
three mobility metrics.
CDR Metrics
Calls:: The total number of calls made and received by a user in a given month.
28
FIG. 7. A timeline showing the various data collection and reporting periods. Traditional survey
method perform surveys over the course of a single week per quarter, asking participants about their
employment status during a single reference week. Unofficial survey results, subject to revision
are then released a few weeks following the end of the quarter. Mobile phone data, however, is
continually collected throughout the quarter and is available for analysis at any time during the
period. Analysis of a given quarter can be performed and made available immediately following
the end of the month.
Incoming:: The number of calls received by a user in a given month.
Outgoing:: The number of calls made by a user in a given month
Contacts:: The number of unique individuals contacted by a user each month. Includes
calls made and received.
To Town:: The fraction of a user’s calls made each month to another user who is physically
located in the town of the plant closure at the time the call was made.
Churn:: The fraction of a user’s contacts called in the previous month that was not called
in the current month. Let Ct be the set of users called in month t. Churn is then
calculated as: churnt = 1 − Ct−1−Ct
Ct−1
.
Towers:: The number of unique towers visited by a user each month.
(cid:80)n
Radius of Gyration, Rg:: The average displacement of a user from his or her center of
j=1 (cid:126)rj − (cid:126)rcm2, where n is the number of calls made by a user in
the month and rcm is the center of mass calculated by averaging the positions of all
mass: Rg =
(cid:113) 1
n
a users calls that month. To guard against outliers such as long trips for vacation or
difficulty identifying important locations due to noise, we only consider months for
29
users where more than 5 calls were made and locations that where a user recorded
more than three calls.
(cid:80)n
Average Distance from Top Tower, R1:: The average displacement of a user from their
j=1 (cid:126)rj − (cid:126)r12, where n is the number of calls made
by a user in the month and r1 is the coordinates of the location most visited by the
most called location: R1 =
(cid:113) 1
n
user. To guard against outliers such as long trips for vacation or difficulty identifying
important locations due to noise, we only consider months for users where more than
5 calls were made and locations that where a user recorded more than three calls.
Measuring Changes
For each user i, we compute these metrics monthly. Because individuals may have differ-
ent baseline behaviors, we normalize a user’s time series to the month immediately before
the layoff denoted t∗. To assess differences in behavior as a result of the mass layoff, we
construct three groups: (1) A group of laid off users from the town where the probability of
being laid off is that calculated in the previous section, (2) a town control group consisting
of the same users as group 1, but with inverse weights, and (3) a group of users selected at
random from the country population. Each user in the final group is weighted equally.
For each month, we compute the weighted average of all metrics then plot the difference
between the laid off group and both control groups in Figure 3 in the main text.
(cid:88)
yt =
i
wi
yi,t
yi,t∗
∆yt = ¯yt − ¯yt,control
(2)
(3)
We estimate changes in monthly behavior using OLS regressions. We specify two models
that provide similar results. For a metric :
yi = αi + β1Ai + β2Ui + β3AiUi
(4)
where Ai is a dummy variable indicating if the observation was made in a month before
or after the plant closure and Ui is a dummy variable that is 1 if the user was assigned a
30
greater than 50% probability of having been laid off and 0 otherwise. An alternate model
substitutes the probability of layoff itself, for the unemployed dummy:
yi = αi + β1Ai + β2wi + β3Aiwi
(5)
In many cases, we are more interested in relative changes in behavior rather than absolute
levels. For this, we specify a log-level model of the form:
log(yi) = αi + φ1Ai + φ2wi + φ3Aiwi
(6)
Now the coefficient φ3 can be interpreted as the percentage change in feature yi,n experienced
by a laid off individual in months following the plant closure. Changes to mobility metrics
as well as changes to total, incoming, and outgoing calls were estimated using the log-level
model. Churn and To Town metrics are percentages already and are thus estimated using
a level-level model. The changes in the number of contacts each also estimated using a
level-level model.
Models are estimated using data from users believed to be unemployed and data from
the two control groups. Results are shown in Table ??. Comparisons to each group produce
consistent results.
In addition relative changes, we also measure percent changes in each variable pre- and
post-layoff. Figure 8 shows the percent change in each variable for an average month before
and after the plant closing. We report changes for three groups, those we believe were
unaffected by the layoff, but live in the tower, those we believe are unaffected, but live
elsewhere in the country, and those with a probability p > 0.5 of being laid off. The laid off
group shows significant changes in all metrics, while the town and country control groups
show few.
Predicting Province Level Unemployment
To evaluate the predictive power of micro-level behavioral changes, we use data from a
different undisclosed industrialized European country. As discussed in the main text, we
use call detail records spanning nearly 3 years and the entire user base of a major mobile
phone provider in the country. For each of the roughly 50 provinces within this country,
31
FIG. 8. For each sample of mobile phone users (those we believe to be unaffected by the layoff
living in the town and the country as well as those with a probability p > 0.5 of being laid off), we
plot the percent change in each variable before and after the layoff.
we assemble quarterly unemployment rates during the period covered by the CDR data.
At the national level, we collect a time series of GDP. We select a sample of users in each
province and measure the average relative value of 7 of the variables identified to change
following a layoff. To-town and distance from home variables are omitted as the former is
only measured when we know the location of the layoff and the latter is strongly correlated
with Rg.
First, we correlate each aggregate calling variable with unemployment at the regional
level. To control for differences in base levels of unemployment across the country, we first de-
mean unemployment and each aggregate variable. Table ?? shows that each calling behavior
is significantly correlated with unemployment and that these correlations are consistent
with the directions found in the individual section of the paper. Moreover, we discover
strong correlation between each of the calling behavior variables, suggesting that principal
component analysis is appropriate.
32
CallsIncomingOutgoingTo TownContactsChurnTowersRgR10.30.20.10.00.1Percent Change After Closureunaffected-townunaffected-countrylaid-offPrincipal Component analysis
As shown in the individual section of the paper, changes in these variables following a mass
layoff are correlated. This correlation is seen in province level changes as well (Table ??).
Given this correlation, we use principal component analysis (PCA) extract an independent
mobile phone variable and guard against co-linearity when including all phone variables as
regressors. The results from PCA and the loadings in each component can be found in Table
?? and Table ??, respectively. We find only the first principal component passes the Kaiser
test with an eigenvalue significantly greater than 1, but that this component captures 59%
of the variance in the calling data. The loadings in this component fall strongly on the social
variables behavior. We then compute the scores for this component for each observation in
the data and use these scores as regressors. The prominent elements of the first principal
component are primarily related to the social behavior of callers.
Model Specification
We make predictions of present and future unemployment rates using three different
models specifications of unemployment where each specification is run in two variants, one
with the principal component score as an additional independent variable denoted as CDRt
and the other without. The twelve models are described as follows:
1. AR(1)
Ut = α1Ut−1
Ut = β1Ut−1 + γCDRt
Ut+1 = α1Ut−1
Ut+1 = β1Ut−1 + γCDRt
33
(7)
(8)
(9)
(10)
2. AR(1) + Quad
3. AR(1) + GDP
Ut = α1Ut−1 + α2U 2
t−1
Ut = β1Ut−1 + β2U 2
t−1 + γCDRt
Ut+1 = α1Ut−1 + α2U 2
t−1
Ut+1 = β1Ut−1 + β2U 2
t−1 + γCDRt
Ut = α1Ut−1 + α2gdpt−1
Ut = β1Ut−1 + β2gdpt−1 + γCDRt
Ut+1 = α1Ut−1 + α2gdpt−1
Ut+1 = β1Ut−1 + β2gdpt−1 + γCDRt
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
To evaluate the ability of these models to predict unemployment, we use a cross-validation
framework. Data from half of the provinces are used to train the model and these coefficients
are used to predict unemployment rates given data for the other half of the provinces. We
perform the same procedure switching the training and testing set and combine the out of
sample predictions for each case. We evaluate the overall utility of these models by plotting
predictions versus observations, finding strong correlation (see the main text). To evaluate
the additional benefit gained from the inclusion of phone data, we compute the percentage
difference between the same model specification with and without the mobile phone data,
∆RM SE% = 1 − RM SEw/CDR/RM SEw/out .In each case, we find that the addition of
mobile phone data reduces the RMSE by 5% to 20%.
Predictions using weekly CDR Data
Until now, we have used data from the entire quarter to predict the results from the
unemployment survey conducted in the same quarter. While these predictions would be
available at the very end of the quarter, weeks before the survey data is released, we also
make predictions using CDR data from half of each quarter to provide an additional 1.5
34
months lead time that may increase the utility of these predictions. We estimate the same
models as described in the previous section and find similar results. Even without full access
to a quarter’s CDR data, we can improve predictions of that quarter’s unemployment survey
before the quarter is over by 3%-6%.
The Effect of Sample Size on Feature Estimation
It is important to consider the extent to which the sampling size is sufficient and does not
affect much the feature estimation. We study the reliability of sample size (k) in terms of
relative standard deviation (RSD). For each given sample size k, we sample T times (without
replacement) from the population. The RSD with respect to sample size k for a particular
feature, is given by RSD(k) = sk
fk
where sk is the standard deviation of the feature estimates
from the T samples, and fk is the mean of the feature estimates from the T samples. We use
T = 10 to study the feature reliability. In Figure ??, we plot the different features’ %RSD
by averaging the RSD values of all provinces. The plots show that the values of %RSD over
sample size k = 100, 200, ..., 2000 decrease rapidly. When sample size k = 2000, the %RSD
for all features, except for radius of gyration (Rg), is lower than 1%. The estimates of Rg
exhibit the highest variation; however, we can still obtain reliable estimates with thousands
of sampled individuals (RSD(k) = 0.026 for Rg, with k = 2000). For the results in the
manuscript, a value of k=3000 was chosen with the confidence that sample size effects are
small.
Mass Layoffs and General Unemployment
While mass layoffs provide a convenient and interesting natural experiment to deploy our
methods, they are only one of many employment shocks that economy absorbs each month.
We have measured changes in call behaviors due to mass layoffs, but these changes may
be unhelpful if they do not result from other forms of unemployment like isolated layoffs
of individual works. Though it is beyond the scope of this work to directly determine if
individuals affected by mass layoffs experience the same behavioral changes as those experi-
encing unemployment due to other reasons, strong correlations have been observed between
the number of mass layoffs observed in a given time period and general unemployment rates
35
- http://www.bls.gov/news.release/pdf/mmls.pdf.
36
|
1706.09494 | 2 | 1706 | 2017-07-08T13:28:55 | Misinformation spreading on Facebook | [
"cs.SI"
] | Social media are pervaded by unsubstantiated or untruthful rumors, that contribute to the alarming phenomenon of misinformation. The widespread presence of a heterogeneous mass of information sources may affect the mechanisms behind the formation of public opinion. Such a scenario is a florid environment for digital wildfires when combined with functional illiteracy, information overload, and confirmation bias. In this essay, we focus on a collection of works aiming at providing quantitative evidence about the cognitive determinants behind misinformation and rumor spreading. We account for users' behavior with respect to two distinct narratives: a) conspiracy and b) scientific information sources. In particular, we analyze Facebook data on a time span of five years in both the Italian and the US context, and measure users' response to i) information consistent with one's narrative, ii) troll contents, and iii) dissenting information e.g., debunking attempts. Our findings suggest that users tend to a) join polarized communities sharing a common narrative (echo chambers), b) acquire information confirming their beliefs (confirmation bias) even if containing false claims, and c) ignore dissenting information. | cs.SI | cs |
Misinformation spreading on Facebook
Fabiana Zollo and Walter Quattrociocchi
Abstract Social media are pervaded by unsubstantiated or untruthful rumors, that
contribute to the alarming phenomenon of misinformation. The widespread pres-
ence of a heterogeneous mass of information sources may affect the mechanisms
behind the formation of public opinion. Such a scenario is a florid environment for
digital wildfires when combined with functional illiteracy, information overload,
and confirmation bias. In this essay, we focus on a collection of works aiming at
providing quantitative evidence about the cognitive determinants behind misinfor-
mation and rumor spreading. We account for users' behavior with respect to two
distinct narratives: a) conspiracy and b) scientific information sources. In particular,
we analyze Facebook data on a time span of five years in both the Italian and the US
context, and measure users' response to i) information consistent with one's narra-
tive, ii) troll contents, and iii) dissenting information e.g., debunking attempts. Our
findings suggest that users tend to a) join polarized communities sharing a common
narrative (echo chambers), b) acquire information confirming their beliefs (confir-
mation bias) even if containing false claims, and c) ignore dissenting information.
1 Introduction
The rapid advance of the Internet and web technologies facilitated global commu-
nications all over the world, allowing news and information to spread rapidly and
intensively. These changes led up to the formation of a new scenario, where people
actively participate in both contents' production and diffusion, without the medi-
Fabiana Zollo
Ca' Foscari University of Venice, Via Torino, 155 - 30172, Venice, Italy
e-mail: [email protected]
Walter Quattrociocchi
IMT School for Advanced Studies, Piazza San Francesco, 19 - 55100 Lucca, Italy
e-mail: [email protected]
1
2
Fabiana Zollo and Walter Quattrociocchi
ation of journalists or experts in the field. The emergence of such a wide, hetero-
geneous (and disintermediated) mass of information sources may affect contents'
quality and the mechanisms behind the formation of public opinion [32, 29, 49]. In-
deed, despite the enthusiastic rhetoric about collective intelligence [35], unsubstan-
tiated or untruthful rumors reverberate on social media, contributing to the alarming
phenomenon of misinformation. Since 2013, the World Economic Forum (WEF)
has been placing the global danger of massive digital misinformation at the core of
other technological and geopolitical risks, ranging from terrorism, to cyber attacks,
up to the failure of global governance [26]. People are misinformed when they hold
beliefs neglecting factual evidence, and misinformation may influence public opin-
ion negatively. Empirical investigations have showed that, in general, people tend
to resist facts, holding inaccurate factual beliefs confidently [31]. Moreover, correc-
tions frequently fail to reduce misperceptions [39] and often act as a backfire effect.
Thus, beyond its undoubted benefits, a hyperconnected world may allow the viral
spread of misleading information, which may have serious real-word consequences.
In that direction, examples are numerous. Inadequate health policies in South Africa
led to more than 300,000 unnecessary AIDS deaths [37], however the events were
exacerbated by AIDS denialists, who state that HIV is inoffensive and that antiretro-
viral drugs cause, rather than treat, AIDS. Similar considerations may be extended
to the Ebola outbreak in west Africa: after the death of two people having drunk
salt water, the World Health Organisation (WHO) had to restate that all rumours
about hypothetical cures or practices were false and that their use could be danger-
ous [14]. Or again, the American case of Jade Helm 15, a military training exercise
which took place in multiple US states, but turned out to be perceived as a conspir-
acy plot aiming at imposing martial law, to the extent that Texas Gov. Greg Abbott
ordered the State Guard to monitor the operations.
Certainly, such a scenario represents a florid environment for digital wildfires, es-
pecially when combined with functional illiteracy, information overload, and confir-
mation bias – i.e., the tendency to seek, select, and interpret information coherently
with one's system of beliefs [38]. On the Internet people can access always more
extreme versions of their own opinions. In this way, the benefits coming from the
exposure to different points of views can be dramatically reduced [34]. Individuals,
and the groups that they form, may move to a more extreme point in the same di-
rection indicated by their own preexisting beliefs; indeed, when people discuss with
many like-minded others, their views become more extreme [46]. First evidences of
social contagion and misperception induced by social groups emerged in the famous
experiment conducted by Solomon Asch in 1955 [7]. The task of the participants
was very simple: they had to match a certain line placed on a white card with the
corresponding one (i.e., having the same length) among three other lines placed on
another white card. The subject was one of the eight people taking part to the test,
but was unaware that the others were there as part of the research. The experiment
consisted of three different rounds. In the first two rounds everyone provided the
right (and quite obvious) answer. In the third round some group members matched
the reference line to the shorter or longer one on the second card, introducing the
so-called unexpected disturbance [28]. Normally subjects erred less than 1% of the
Misinformation spreading on Facebook
3
time; but in the third case they erred 36.8% of the time [4]. Another relevant study
was conducted by James Stoner, who identified the so-called risky shift [45]. In the
experiment people were first asked to study twelve different problems and provide
their solution; after that, they had to take a final decision together, as a group. Out
of thirteen groups, twelve repeatedly showed a pattern towards greater risk-taking.
Misinformation, as well of rumor spreading, deals with these and several other
aspects of social dynamics. However, adoption and contagion are often illustrated
under the oversimplified metaphor of the virus: ideas spread by "contact" and peo-
ple "infected" become active spreaders in the contagion process. We believe that
such a metaphor is misleading, unless we consider that the receptor of such a virus
is complex and articulated. Indeed, the adoption of ideas and behaviors deals with
a multitude of cognitive dimensions, such as intentionality, trust, social norms, and
confirmation bias. Hence, simplistic models adapted from mathematical epidemi-
ology are not enough to understand social contagion. It is crucial to focus on such
relevant research questions by using methods and applying tools that go beyond
the pure, descriptive statistics of big data. In our view, such a challenge can be ad-
dressed by implementing a cross-methodological, interdisciplinary approach which
takes advantage of both the question-framing capabilities of social sciences and the
experimental and quantitative tools of hard sciences.
2 Outline
The chapter is structured as follows. In section 3 we provide the background of our
research work, as well as tools and methodology adopted; in section 4 we describe
the datasets; in section 5 we discuss the dynamics behind information consumption
and the existence of echo chambers on both the Italian and the US Facebook; in sec-
tion 6 we show how confirmation bias dominates information spreading; in section
7 we focus on users' interaction with paradoxical and satyrical information (trolls),
while in section 8 we analyze users' response to debunking attempts. In section 9 we
target the emotional dynamics inside and across echo chambers. Finally, we draw
our conclusions in section 10.
3 Background and Research Methodology
In 2009 a paper on Science [33] proclaims the birth of the Computational Social
Science (CSS), an emerging research field aiming at studying massive social phe-
nomena quantitatively, by means of a multidisciplinary approach based on Com-
puter Science, Statistics, and Social Sciences. Since CSS benefits from the large
availability of data from online social networks, it is attracting researchers in ever-
increasing numbers as it allows for the study of mass social dynamics at an un-
precedented level of resolution. Recent studies have pointed out several important
4
Fabiana Zollo and Walter Quattrociocchi
results ranging from social contagion [48, 36, 6] up to information diffusion [2, 8],
passing through the virality of false claims [15, 21]. A wide literature branch is also
devoted to understanding the spread of rumors and behaviors by focusing on struc-
tural properties of social networks to determine the way in which news spread in
social networks, what makes messages go viral, and what are the characteristics of
users who help spread such information [15, 21, 13, 48]. Several works investigated
how social media can shape and influence the public sphere [1, 9, 17, 18], and ef-
forts to contrast misinformation spreading range from algorithmic-based solutions
up to tailored communication strategies [5, 16, 25, 42, 43, 44].
Along this path, important issues have been raised around the emergence of the
echo chambers, enclosed systems where users are exposed only to information co-
herent with their own system of beliefs [47]. Many argue that such a phenomenon is
directly related to the algorithms used to rank contents [40]. Speaking of this, Face-
book research scientists quantified exactly how much individuals can be exposed to
ideologically diverse news and information on social media [9], finding that individ-
ual's choice about contents has an effect stronger than that of Facebook's News Feed
algorithm in limiting the exposure to cross-cutting content. Undoubtedly, selective
exposure to specific contents facilitates the aggregation of users in echo chambers,
wherein external and contradicting versions are ignored [30]. Moreover, the lack of
experts mediating the production and diffusion of content may encourage specula-
tions, rumors, and mistrust, especially on complex issues. Pages about conspiracy
theories, chem-trails, reptilians, or the link between vaccines and autism, proliferate
on social networks, promoting alternative narratives often in contrast to mainstream
content. Thus, misinformation online is pervasive and difficult to correct. To face the
issue, several algorithmic-driven solutions have been proposed both by Google and
Facebook [20, 23], that joined other major corporations to provide solutions to the
problem and try to guide users through the digital information ecosystem [27]. Si-
multaneously, it has also been observed the rapid spread of blogs and pages devoted
to debunk false claims, namely debunkers.
Moreover, the diffusion of unreliable content may lead to confuse unverified sto-
ries with their satirical counterparts. Indeed, it has been noticed the proliferation of
satirical, wacky imitations of conspiracy theses. In this regard, there is a large com-
munity of people, known as trolls, behind the creation of Facebook pages aimed
at diffusing caricatural and paradoxical contents mimicking conspiracy news. Their
activities range from controversial comments and satirical posts, to the fabrication
of purely fictitious statements, heavily unrealistic and sarcastic. According to Poe's
law [3], without a blatant display of humor, it is impossible to create a parody of ex-
tremism or fundamentalism that someone won't mistake for the real thing. Hence,
trolls are often accepted as realistic sources of information and, sometimes, their
memes become viral and are used as evidence in online debates from real political
activists. As an example, we report one of the most popular memes in Italy:
Italian Senate voted and accepted (257 in favor, 165 abstained) a law proposed by Senator
Cirenga aimed at providing politicians with a 134 Billion fund to help them find a job in
case of defeat in the next political competition.
Misinformation spreading on Facebook
5
It would be easy to verify that the text contains at least three false statements: i)
Senator Cirenga does not exist and has never been elected in the Italian Parliament,
ii) the total number of votes is higher than the maximum possible number of voters,
and iii) the amount of the fund corresponds to more than 10% of Italian GDP. Indeed,
the bill is false and such a meme was created by a troll page. Nonetheless, on the
wave of public discontent against Italian policy-makers, it quickly became viral,
obtaining about 35K shares in less than one month. Nowadays, it is still one of the
most popular arguments used by protesters manifesting all over Italian cities.
Such a scenario makes crucial the quantitative understanding of the social deter-
minants related to content selection, news consumption, and beliefs formation and
revision. In this essay, we focus on a collection of works [10, 11, 12, 19, 50, 51] aim-
ing at characterizing the role of confirmation bias in viral processes online. We want
to investigate the cognitive determinants behind misinformation and rumor spread-
ing by accounting for users' behavior on different and specific narratives. In particu-
lar, we define the domain of our analysis by identifying two well-distinct narratives:
a)conspiracy and b) scientific information sources. Notice that we do not focus on
the quality or the truth value of information, but rather on its verifiability. While pro-
ducers of scientific information as well as data, methods, and outcomes are readily
identifiable and available, the origins of conspiracy theories are often unknown and
their content is strongly disengaged from mainstream society and sharply divergent
from recommended practices.
Thus, we first analyze users' interaction with Facebook pages belonging to such
distinct narratives on a time span of five years (2010-2014), in both the Italian and
the US context. Then, we measure users' response to i) information consistent with
one's narrative, ii) troll contents, and iii) dissenting information e.g., debunking
attempts.
4 Datasets
We identify two main categories of pages: conspiracy news – i.e. pages promot-
ing contents neglected by mainstream media – and science news. The first category
includes all pages diffusing conspiracy information (i.e., pages that disseminate con-
troversial information, most often lacking supporting evidence and sometimes con-
tradictory of the official news). Pages like I don't trust the government, Awakening
America, or Awakened Citizen promote heterogeneous contents ranging from aliens,
chem-trails, geocentrism, up to the causal relation between vaccinations and homo-
sexuality. The second category is that of scientific dissemination and includes insti-
tutions, organizations, scientific press having the main mission to diffuse scientific
knowledge. For example, pages like Science, Science Daily, and Nature are active
in diffusing posts about the most recent scientific advances. Finally, we identify two
additional categories of pages:
1. Troll: sarcastic, paradoxical messages mocking conspiracy thinking (for the
Italian dataset);
6
Fabiana Zollo and Walter Quattrociocchi
2. Debunking: information aiming at correcting false conspiracy theories and un-
truthful rumors circulating online (for the US dataset).
To produce our datasets, we built a large atlas of Facebook public pages with the
assistance of several groups (Skepti Forum, Skeptical spectacles, Butac, Protesi di
Complotto), which helped in labelling and sorting both conspiracy and scientific
sources. To validate the list, all pages have then been manually checked by looking
at their self-description and the type of promoted content. The exact breakdowns of
the Italian and US Facebook datasets are reported in Table 1 and Table 2, respec-
tively. The entire data collection process is performed exclusively by means of the
Facebook Graph API [24], which is publicly available and can be used through one's
personal Facebook user account. We used only public available data (users with pri-
vacy restrictions are not included in our dataset). Data was downloaded from public
Facebook pages that are public entities. Users' content contributing to such entities
is also public unless users' privacy settings specify otherwise and in that case it
is not available to us. When allowed by users' privacy specifications, we accessed
public personal information. However, in our study we used fully anonymized and
aggregated data. We abided by the terms, conditions, and privacy policies of Face-
book.
Table 1 Breakdown of the Italian Facebook dataset.
Pages
Posts
Likes
Comments
Likers
Commenters
Science
34
62,705
2,505,399
180,918
332,357
53,438
Conspiracy
39
208,591
6,659,382
836,591
864,047
226,534
Troll
2
4,709
40,341
58,686
15,209
43,102
Table 2 Breakdown of the US Facebook dataset.
Pages
Posts
Likes
Comments
Likers
Commenters
Science
83
262,815
453,966,494
22,093,692
39,854,663
7,223,473
Conspiracy
330
369,420
145,388,117
8,304,644
19,386,131
3,166,726
Debunking
66
47,780
3,986,922
429,204
702,122
118,996
Misinformation spreading on Facebook
5 Echo Chambers
5.1 Attention Patterns
7
We start our discussion by analyzing how information gets consumed by users in
both the Italian [10, 11, 12] and the US Facebook [50]. As a first step, we focus on
users' actions allowed by Facebook's interaction paradigm i.e., likes, comments, and
shares. Each action has a particular meaning [22]: while a like represents a positive
feedback to the post, a share expresses the desire to increase the visibility of a given
information; finally, a comment is the way in which the debate takes form around the
topic of the post. Also, we consider the lifetime of a post (respectively, a user) i.e.,
the temporal distance between the first and last comment to the post (respectively,
of the user). We also define the persistence of a post (respectively, a user) as the
Kaplan-Meier estimates of survival functions by accounting for the lifetime of the
post (respectively, the user).
Fig. 1 shows the empirical Complementary Cumulative Distribution Functions
(CCDFs) of users' activity on posts grouped by category on the Italian Facebook.
We may notice that distributions of likes, comments, and shares are all heavy-tailed.
To further investigate users' consumption patterns, in Fig. 2 we also plot the CCDF
of the posts' lifetime, observing that distinct kinds of contents show a comparable
lifetime.
Fig. 1 ITALIAN FACEBOOK. Empirical complementary cumulative distribution functions
(CCDFs) of users' activity (likes, comments and shares) on posts grouped by category. Distri-
butions denote heavy-tailed consumption patterns.
8
Fabiana Zollo and Walter Quattrociocchi
Fig. 2 ITALIAN FACEBOOK.
Empirical CCDF, grouped by
category, of the posts' lifetime
i.e., the temporal distance
(in hours) between the first
and last comment. Lifetime is
similar for both categories.
As for the US Facebook, the distribution of the number of likes, comments, and
shares on posts belonging to both scientific and conspiracy news is shown in the
left panel of Fig. 3. As seen from the plots, all distributions are heavy-tailed – i.e,
they are best fitted by power laws and possess similar scaling parameters. In the
right panel of Fig. 3, we plot the Kaplan-Meier estimates of survival functions of
posts grouped by category. To further characterize differences between the survival
functions, we perform the Peto & Peto [41] test to detect whether there is a statis-
tically significant difference between the two survival functions. Since we obtain a
p-value of 0.944, we can state that there are not significant statistical differences be-
tween posts' survival functions on both science and conspiracy news. Thus, posts'
persistence in the two categories is similar also in the US case.
Summarizing, our findings show that distinct kinds of information (science, con-
spiracy) are consumed in a comparable way. However, when considering the corre-
lation between couples of actions, we find that users of conspiracy pages are more
prone to both share and like a post, denoting a higher level of commitment [10].
Conspiracy users are more willing to contribute to a wide diffusion of their topics
of interest, according to their belief that such information is intentionally neglected
by mainstream media.
5.2 Polarization
We now want to understand if users' engagement with a specific kind of content can
become a good proxy to detect groups of users sharing the same system of beliefs
i.e., echo chambers. Assume that a user u has performed x and y likes (comments)
on scientific and conspiracy posts, respectively, and let ρ(u) = (y−x)/(y+x). Thus,
Misinformation spreading on Facebook
9
Fig. 3 US FACEBOOK Left: Complementary cumulative distribution functions (CCDFs) of the
number of likes, comments, and shares received by posts belonging to conspiracy (top) and sci-
entific (bottom) news. Right: Kaplan-Meier estimates of survival functions of posts belonging to
conspiracy and scientific news. Error bars are on the order of the size of the symbols.
we say that user u is polarized towards science if ρ(u) ≤ −0.95, while she is towards
conspiracy if ρ(u) ≥ 0.95 user u is polarized towards conspiracy.
In Fig. 4 we show the Probability Density Function (PDF) of users' polarization
on the Italian Facebook. We observe a sharply peaked bimodal distribution where
the vast majority of users is polarized either towards science (ρ(u) ∼ 1) or conspir-
acy (ρ(u) ∼ −1). Hence, most of likers can be divided into two groups of users,
those polarized towards science and those polarized towards conspiracy news.
Let us consider now the fraction of friends y of a user u sharing the same po-
larization of u. We define the engagement θ (u) of a user u as her liking activity
normalized with respect to the total number of likes in our dataset. We find that the
more a user is active on her narrative, the more she is surrounded by friends sharing
the same attitude. Such a pattern is shown in the right panels of Fig.4. Hence, so-
cial interactions of Facebook users are driven by homophily: users not only tend to
be very polarized, but they also tend to be linked to users with similar preferences.
Indeed, in both right panels of Figure 4 we can observe that for polarized users the
fraction of friends with the same polarization is very high ((cid:38) 0.75) and grows with
the engagement.
Similar patterns can be observed on the US Facebook. In Fig 5 we show that
the PDF for the polarization of all users is sharply bimodal here as well, with most
having (ρ(u) ∼ −1) or (ρ(u) ∼ 1). Thus, most users may be divided into two main
groups, those polarized towards science and those polarized towards conspiracy.
The same pattern holds if we look at polarization based on comments rather than on
likes.
In summary, our results confirm the existence of echo chambers on both the Ital-
ian and the US Facebook. Indeed, contents related to distinct narratives aggregate
10
Fabiana Zollo and Walter Quattrociocchi
Fig. 4 ITALIAN FACEBOOK Left: Probability density function (PDF) of users' polarization. Notice
the strong bimodality of the distribution, with two sharp peaks localized at −1 (cid:46) ρ(u) (cid:46) −0.95
(conspiracy users) and at 0.95 (cid:46) ρ(u) (cid:46) 1 (science users). Right: Fraction of polarized neighbors
as a function of the engagement θ for both science (left) and conspiracy (right) users.
Fig. 5 US FACEBOOK Probability Density Functions (PDFs) of the polarization of all users com-
puted both on likes (left) and comments (right).
users into distinct, polarized communities, where users interact with like-minded
people sharing their own system of beliefs.
6 Information Spreading and Cascades
In this section we show how confirmation bias dominates viral processes of infor-
mation diffusion and that the size of the (mis)information cascades may be approxi-
mated by the size of the echo chamber [19]. We begin our analysis by characterizing
Misinformation spreading on Facebook
11
the statistical signature of cascades according to the narrative (science or conspir-
acy). Fig. 6 shows the PDF of the cascade lifetime for both science and conspiracy.
We compute the lifetime as the time (in hours) elapsed between the first and the
last share of the post. In both categories we find a first peak at approximately 1–
2 hours and a second peak at approximately 20 hours, denoting that the temporal
sharing patterns are similar, independently of the narrative. We also find that a sig-
nificant percentage of the information spreads rapidly (24.42% of the science news
and 20.76% of the conspiracy rumors diffuse in less than two hours, and 39.45%
of science news and 40.78% of conspiracy theories in less than five hours). Only
26.82% of the diffusion of science news and 17.79% of conspiracy lasts more than
one day.
Fig. 6 ITALIAN FACEBOOK
Probability Density Function
(PDF) of lifetime computed
on science news and con-
spiracy theories, where the
lifetime is here computed
as the temporal distance (in
hours) between the first and
last share of a post. Both
categories show a similar be-
havior, with a peak in the first
two hours and another around
20 hours.
In Fig. 7 we show the lifetime as a function of the cascade's size, i.e. the num-
ber of users sharing the post. For science news we observe a peak in the lifetime
corresponding to a cascade's size value of ≈ 200; moreover, the variability of the
lifetime grows with the cascades' sizes, and higher cascade's size values correspond
to high lifetime variability. For conspiracy-related contents, lifetime variability in-
creases with cascade's size, and for highest values we observe a variability of the
lifetime 50% around the average values. Such results suggest that news assimilation
differs according to the categories. Science information is usually assimilated (i.e.,
it reaches a higher level of diffusion) quickly. A longer lifetime does not necessar-
ily correspond to a higher level of interest, but possibly to a prolonged discussion
within a specialised group of experts. Conversely, conspiracy rumors are assimilated
more slowly and show a positive relation between lifetime and size; long-lived posts
tend to be discussed by larger communities.
0.0000.0250.0500.07501020304050Lifetime(hours)PDFScienceConspiracy12
Fabiana Zollo and Walter Quattrociocchi
Fig. 7 ITALIAN FACEBOOK Lifetime as a function of the cascade's size for conspiracy news (left)
and science news (right). We observe a contents-driven differentiation in the sharing patterns. For
conspiracy the lifetime grows with the size, while for science news there is a peak in the lifetime
around a value of the size equal to 200, and a higher variability in the lifetime for larger cascades.
Finally, Fig. 8 shows that the majority of links between consecutively sharing
users is homogeneous, i.e. both users share the same polarization and, hence, belong
to the same echo chamber. In particular, the average edge homogeneity value of all
the observed sharing cascades is always greater than or equal to zero, suggesting
that information spreading occurs mainly inside homogeneous clusters in which all
users share the same polarization. Thus, contents tend to circulate only inside the
echo chambers.
Summarizing, we found that cascades' dynamics differ, although consumption
patterns on science and conspiracy pages are similar. Indeed, selective exposure
is the primary driver of contents' diffusion and generates the formation of echo
chambers, each with its own cascades' dynamics.
7 Response to Paradoxical Information
We have showed that users tend to aggregate around preferred contents shaping
well-separated and polarized communities. Our hypothesis is that users' exposure
to unsubstantiated claims may affect their selection criteria and increase their atti-
tude to interact with false information. Thus, in this section we want to test how
polarized users interact with information that is deliberately false i.e., troll posts,
which are paradoxical imitations of conspiracy contents [10]. Such posts diffuse
clearly dubious claims, such as the undisclosed news that infinite energy has been
020040060005001000150020002500Conspiracy Cascade SizeLifetime (hours)02004000250500750Science Cascade SizeLifetime (hours)Misinformation spreading on Facebook
13
Fig. 8 ITALIAN FACEBOOK
Mean edge homogeneity for
science (solid orange) and
conspiracy (dashed blue)
news. The mean value of edge
homogeneity on the whole
sharing cascades is always
greater or equal to zero.
finally discovered, or that a new lamp made of actinides (e.g. plutonium and ura-
nium) will finally solve the lack of energy with less impact on the environment, or
that chemical analysis reveal that chem-trails contain sildenafil citratum (sold as the
brand name Viagra).
Fig. 9 shows how polarized users of both categories interact with troll posts in
terms of comments and likes on the Italian Facebook. Our findings show that users
usually exposed to conspiracy claims are more likely to jump the credulity barrier:
indeed, conspiracy users are more active in both liking and commenting troll posts.
Thus, even when information is deliberately false and framed with a satirical pur-
pose, its conformity with the conspiracy narrative transforms it into credible content
for members of the conspiracy echo chamber. Evidently, confirmation bias plays a
crucial role in content selection.
Fig. 9 ITALIAN FACEBOOK
Percentage of comments and
likes on troll posts from users
polarized towards science
(light blue) and conspiracy
(orange).
012340.11.0Mean Edge HomogeneityPDFScienceConspiracy14
8 Response to Dissenting Information
Fabiana Zollo and Walter Quattrociocchi
Debunking pages on Facebook strive to contrast misinformation spreading by pro-
viding fact-checked information to specific topics. However, if confirmation bias
plays a pivotal role in selection criteria, then debunking is likely to sound to con-
spiracy users such as information dissenting from their preferred narrative. In this
section, our aim is to study and analyze users' behavior w.r.t. debunking contents on
the US Facebook [50].
As a first step, we show how debunking posts get liked and commented according
to users' polarization. Fig. 10 shows how users' activity is distributed on debunking
posts: left (respectively, right) panel shows the proportions of likes (respectively,
comments) left by users polarized towards science, users polarized towards conspir-
acy, and not polarized users. We notice that the majority of both likes and comments
is left by users polarized towards science (respectively, 66,95% and 52,12%), while
only a small minority is made by users polarized towards conspiracy (respectively,
6,54% and 3,88%). Indeed, the first interesting result is that the biggest consumer of
debunking information is the scientific echo chamber. Out of 9,790,906 polarized
conspiracy users, just 117,736 interacted with debunking posts – i.e., commented a
debunking post at least once.
Fig. 10 US FACEBOOK Pro-
portions of likes (left) and
comments (right) left by users
polarized towards science,
users polarized towards con-
spiracy, and not polarized
users.
Hence, debunking posts remain mainly confined within the scientific echo cham-
ber and only few users usually exposed to unsubstantiated claims actively interact
with the corrections. Dissenting information is mainly ignored. However, in our sce-
nario few users belonging to the conspiracy echo chamber do interact with debunk-
ing information. We now wonder about the effect of such an interaction. Therefore,
we perform a comparative analysis between users' behavior before and after they
first comment on a debunking post. Fig. 11 shows the liking and commenting rates
– i.e, the average number of likes (or comments) on conspiracy posts per day – be-
fore and after the first interaction with debunking. We can observe that users' liking
and commenting rates increase after the interaction, Thus, their activity in the con-
spiracy echo chamber is reinforced. In practice, debunking attempts are acting as a
backfire effect.
Misinformation spreading on Facebook
15
Fig. 11 US FACEBOOK Rate
– i.e., average number, over
time, of likes (left) and com-
ments (right)) on conspiracy
posts of users who interacted
with debunking posts.
9 Emotional Dynamics
In this section, we aim at analyzing the emotional dynamics inside and across echo
chambers. In particular, we apply sentiment analysis techniques to the comments
of our Facebook Italian dataset, and study the aggregated sentiment with respect to
scientific and conspiracy-like information [51]. The sentiment analysis is based on a
supervised machine learning approach, where we first annotate a substantial sample
of comments, and then build a Support Vector Machine (SVM) classification model.
The model is then applied to associate each comment with one sentiment value:
negative, neutral, or positive. The sentiment is intended to express the emotional
attitude of Facebook users when posting comments.
To further investigate the dynamics behind users' polarization, we now study
how the sentiment changes w.r.t. users' engagement in their own echo chamber. In
the left panel of Fig. 12, we show the PDF of the mean sentiment of polarized users
with at least two comments. We may observe an overall negativity, more evident on
the conspiracy side. When looking at the sentiment as a function of the number of
comments of the user, we find that the more active a polarized user is, the more she
tends towards negative values, both on science and conspiracy posts. Such results are
shown in the right panel of Fig. 12, where the sentiment has been regressed w.r.t. the
logarithm of the number of comments. Interestingly, the sentiment of science users
decreases faster than that of conspiracy users.
We now want to investigate the emotional dynamics when such polarized (and
negative-minded) users meet together. To this aim, we pick all the posts represent-
ing the arena where the debate between science and conspiracy users takes place. In
particular, we select all the posts commented at least once by both a user polarized
on science and a user polarized on conspiracy. We find 7,751 such posts (out of
315,567), reinforcing the fact that the two communities are strictly separated and
do not often interact with one another. Then, we analyze how the sentiment changes
when the number of comments of the post increases i.e., when the discussion be-
16
Fabiana Zollo and Walter Quattrociocchi
Fig. 12 ITALIAN FACEBOOK Left: Probability Density Function (PDF) of the mean sentiment of
polarized users having commented at least twice, where −1 corresponds to negative sentiment,
0 to neutral and 1 to positive. Right:Average sentiment of polarized users as a function of their
number of comments. Negative (respectively, neutral, positive) sentiment is denoted by red (re-
spectively, yellow, blue) color. The sentiment has been regressed w.r.t. the logarithm of the number
of comments.
comes longer. Fig. 13 shows the aggregated sentiment of such posts as a function
of their number of comments. Clearly, as the number of comments increases – i.e.,
the discussion becomes longer – the sentiment is always more negative. Therefore,
we may conclude that the length of the discussion does affect the negativity of the
sentiment.
Fig. 13 US FACEBOOK Ag-
gregated sentiment of posts
as a function of their number
of comments. Negative (re-
spectively, neutral, positive)
sentiment is denoted by red
(respectively, yellow, blue)
color.
Misinformation spreading on Facebook
10 Conclusions
17
We investigated how information related to two very distinct narratives – i.e., scien-
tific and conspiracy news – gets consumed and shapes communities on Facebook.
For both the Italian and the US scenario, we showed the emergence of two well-
separated and polarized groups – i.e., echo chambers – where users interact with
like-minded people sharing the same system of beliefs. We found that users are ex-
tremely focused and self-contained on their specific narrative. Such a highly polar-
ized structure facilitates the reinforcement and contents' selection by confirmation
bias. Moreover, we observed that social interactions of Facebook users are driven
by homophily: users not only tend to be very polarized, but they also tend to be
linked to users with similar preferences. According to our results, confirmation bias
dominates viral processes of information diffusion. Also, we found that the size of
misinformation cascades may be approximated by the same size of the echo cham-
ber.
Furthermore, by measuring the response to the injection of false information
(parodistic imitations of alternative stories), we observed that users prominently
interacting with alternative information sources – i.e. more exposed to unsubstan-
tiated claims – are more prone to interact with intentional and parodistic false
claims. Thus, our findings suggest that conspiracy users are more likely to jump
the credulity barrier: even when information is deliberately false and framed with
a satirical purpose, its conformity with the conspiracy narrative transforms it into
credible content for members of the conspiracy echo chamber.
Then, we investigated users' response to dissenting information. By analyzing
the effectiveness of debunking on conspiracy users on the US Facebook, we found
that scientific echo chamber is the biggest consumer of debunking posts. Indeed,
only few users usually active in the conspiracy echo chamber interact with debunk-
ing information and, in the latter case, their activity in the conspiracy echo chamber
increases after the interaction, rather than decreasing. Thus, debunking attempts are
acting as a backfire effect.
Finally, we focused on the emotional dynamics inside and between the two echo
chambers, finding that the sentiment of users on science and conspiracy pages tends
to be negative, and is more and more negative when the discussion becomes longer
or users' activity on the social network increase. In particular, the discussion degen-
erates when the two polarized communities interact with one another.
Our findings provide insights about the determinants of polarization and the evo-
lution of core narratives on online debating, suggesting that fact-checking is not
working as expected. As long as there are no immediate solutions to functional
illiteracy, information overload and confirmation bias will continue dominating so-
cial dynamics online. In such a context, misinformation risk and its consequences
will remain significant. To contrast misinformation spreading, we need to smooth
polarization. To this aim, understanding how core narratives behind different echo
chambers evolve is crucial and could allow to design more efficient communica-
tion strategies that account for users' cognitive determinants behind these kind of
mechanisms.
18
References
Fabiana Zollo and Walter Quattrociocchi
1. Adamic, L.A., Glance, N.: The political blogosphere and the 2004 us election: divided they
blog. In: Proceedings of the 3rd international workshop on Link discovery, pp. 36–43. ACM
(2005)
2. Adar, E., Zhang, L., Adamic, L.A., Lukose, R.M.: Implicit structure and the dynamics of
blogspace. In: Workshop on the weblogging ecosystem, vol. 13, pp. 16,989–16,995 (2004)
3. Aikin, S.F.: Poe's law, group polarization, and argumentative failure in religious and political
discourse. Social Semiotics 23(3), 301–317 (2013)
4. Akerlof, G.A., Yellen, J.L., Katz, M.L.: An analysis of out-of-wedlock childbearing in the
united states. The Quarterly Journal of Economics pp. 277–317 (1996)
5. AlMansour, A.A., Brankovic, L., Iliopoulos, C.S.: A model for recalibrating credibility in dif-
ferent contexts and languages-a twitter case study. International Journal of Digital Information
and Wireless Communications (IJDIWC) 4(1), 53–62 (2014)
6. Aral, S., Muchnik, L., Sundararajan, A.: Distinguishing influence-based contagion from
homophily-driven diffusion in dynamic networks. Proceedings of the National Academy of
Sciences 106(51), 21,544–21,549 (2009)
7. Asch, S.E.: Opinions and social pressure. Readings about the social animal 193, 17–26 (1955)
8. Bakshy, E., Hofman, J.M., Mason, W.A., Watts, D.J.: Everyone's an influencer: quantifying
In: Proceedings of the fourth ACM international conference on Web
influence on Twitter.
search and data mining, pp. 65–74. ACM (2011)
9. Bakshy, E., Messing, S., Adamic, L.A.: Exposure to ideologically diverse news and opinion
on facebook. Science 348(6239), 1130–1132 (2015)
10. Bessi, A., Coletto, M., Davidescu, G.A., Scala, A., Caldarelli, G., Quattrociocchi, W.: Science
vs conspiracy: Collective narratives in the age of misinformation. PloS one 10(2), e0118,093
(2015)
11. Bessi, A., Petroni, F., Del Vicario, M., Zollo, F., Anagnostopoulos, A., Scala, A., Caldarelli,
G., Quattrociocchi, W.: Viral misinformation: The role of homophily and polarization.
In:
Proceedings of the 24th International Conference on World Wide Web, pp. 355–356. ACM
(2015)
12. Bessi, A., Petroni, F., Del Vicario, M., Zollo, F., Anagnostopoulos, A., Scala, A., Caldarelli,
G., Quattrociocchi, W.: Homophily and polarization in the age of misinformation. The Euro-
pean Physical Journal Special Topics 225(10), 2047–2059 (2016)
13. Centola, D.: The spread of behavior in an online social network experiment.
Science
329(5996), 1194–1197 (2010)
14. Centre, W.H.O.M.: Ebola: Experimental
Situation
Assessment (2014). URL http://www.who.int/mediacentre/news/ebola/
15-august-2014/en/
therapies and rumoured remedies.
15. Cheng, J., Adamic, L., Dow, P.A., Kleinberg, J.M., Leskovec, J.: Can cascades be predicted?
In: Proceedings of the 23rd international conference on World Wide Web, pp. 925–936. Inter-
national World Wide Web Conferences Steering Committee (2014)
16. Ciampaglia, G.L., Shiralkar, P., Rocha, L.M., Bollen, J., Menczer, F., Flammini, A.: Compu-
tational fact checking from knowledge networks. PloS one 10(6) (2015)
17. Conover, M., Ratkiewicz, J., Francisco, M.R., Gonc¸alves, B., Menczer, F., Flammini, A.: Po-
litical polarization on twitter. ICWSM 133, 89–96 (2011)
18. Conover, M.D., Goncalves, B., Ratkiewicz, J., Flammini, A., Menczer, F.: Predicting the po-
litical alignment of twitter users. In: 2011 IEEE Third International Conference on Privacy,
Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing,
pp. 192–199 (2011). DOI 10.1109/PASSAT/SocialCom.2011.34
19. Del Vicario, M., Bessi, A., Zollo, F., Petroni, F., Scala, A., Caldarelli, G., Stanley, H.E., Quat-
trociocchi, W.: The spreading of misinformation online. Proceedings of the National Academy
of Sciences 113(3), 554–559 (2016)
20. Dong, X.L., Gabrilovich, E., Murphy, K., Dang, V., Horn, W., Lugaresi, C., Sun, S., Zhang,
W.: Knowledge-based trust: Estimating the trustworthiness of web sources. Proceedings of
the VLDB Endowment 8(9), 938–949 (2015)
27. Jenni Sargent, M.d.: First draft coalition.
Website (2017).
URL https://
28. Kahan, D.M.: Social influence, social meaning, and deterrence. Virginia Law Review pp.
World Economic Forum (2013)
firstdraftnews.com
349–395 (1997)
Misinformation spreading on Facebook
19
21. Dow, P.A., Adamic, L.A., Friggeri, A.: The anatomy of large Facebook cascades. In: ICWSM
(2013)
22. Ellison, N.B., Steinfield, C., Lampe, C.: The benefits of facebook friends: social capital and
college students' use of online social network sites. Journal of Computer-Mediated Commu-
nication 12(4), 1143–1168 (2007)
O.,
23. Erich,
(2015).
news-feed-fyi-showing-fewer-hoaxes/
Udi, W.:
News
URL
feed
hoaxes
http://newsroom.fb.com/news/2015/01/
Showing
fewer
fyi:
24. Facebook: Using the graph api. Website (2017). URL https://developers.
facebook.com/docs/graph-api/using-graph-api/. Last checked: 24.02.2017
25. Gupta, A., Kumaraguru, P., Castillo, C., Meier, P.: Tweetcred: Real-time credibility assessment
of content on twitter. In: Social Informatics, pp. 228–243. Springer (2014)
26. Howell, W.L.: Digital wildfires in a hyperconnected world. Tech. Rep. Global Risks 2013,
29. Katz, E., Lazarsfeld, P.F.: Personal Influence, The part played by people in the flow of mass
communications. Transaction Publishers (1970)
30. Knobloch-Westerwick, S.: Selective exposure and reinforcement of attitudes and partisanship
before a presidential election. Journal of Communication 62(4), 628–642 (2012)
31. Kuklinski, J.H., Quirk, P.J., Jerit, J., Schwieder, D., Rich, R.F.: Misinformation and the cur-
rency of democratic citizenship. Journal of Politics 62(3), 790–816 (2000)
32. Lazarsfeld, P.F., Berelson, B., Gaudet, H.: The peoples choice: how the voter makes up his
mind in a presidential campaign. New York Columbia University Press (1968)
33. Lazer, D., Pentland, A.S., Adamic, L., Aral, S., Barabasi, A.L., Brewer, D., Christakis, N.,
Contractor, N., Fowler, J., Gutmann, M., et al.: Life in the network: the coming age of com-
putational social science. Science (New York, NY) 323(5915), 721 (2009)
34. Lessig, L.: Code: And other laws of cyberspace. ReadHowYouWant. com (2009)
35. Levy, P.: Collective Intelligence: Mankind's Emerging World in Cyberspace. Perseus Publish-
ing (1999)
36. McPherson, M., Smith-Lovin, L., Cook, J.M.: Birds of a feather: Homophily in social net-
works. Annual review of sociology pp. 415–444 (2001)
37. Moore, J.P.: The dangers of denying HIV. Nature 459(7244), 168–168 (2009)
38. Nickerson, R.S.: Confirmation bias: A ubiquitous phenomenon in many guises. Review of
39. Nyhan, B., Reifler, J.: When corrections fail: The persistence of political misperceptions. Po-
general psychology 2(2), 175 (1998)
litical Behavior 32(2), 303–330 (2010)
40. Pariser, E.: The filter bubble: What the Internet is hiding from you. Penguin UK (2011)
41. Peto, R., Peto, J.: Asymptotically efficient rank invariant test procedures. J. Royal Statistical
Society Ser. A 135, 185–207 (1972)
42. Qazvinian, V., Rosengren, E., Radev, D.R., Mei, Q.: Rumor has it: Identifying misinformation
in microblogs. In: Proceedings of the Conference on Empirical Methods in Natural Language
Processing, pp. 1589–1599. Association for Computational Linguistics (2011)
43. Ratkiewicz, J., Conover, M., Meiss, M., Gonc¸alves, B., Flammini, A., Menczer, F.: Detecting
and tracking political abuse in social media. In: ICWSM (2011)
44. Resnick, P., Carton, S., Park, S., Shen, Y., Zeffer, N.: Rumorlens: A system for analyzing
In: Proc. Computational Journalism
the impact of rumors and corrections in social media.
Conference (2014)
45. Stoner, J.A.: Risky and cautious shifts in group decisions: The influence of widely held values.
Journal of Experimental Social Psychology 4(4), 442–459 (1968)
46. Sunstein, C.R.: The law of group polarization. Journal of political philosophy 10(2), 175–195
(2002)
20
Fabiana Zollo and Walter Quattrociocchi
47. Sunstein, C.R.: Republic. com 2.0. Princeton University Press (2009)
48. Ugander, J., Backstrom, L., Marlow, C., Kleinberg, J.: Structural diversity in social contagion.
Proceedings of the National Academy of Sciences 109(16), 5962–5966 (2012)
49. Watts, D.J., Dodds, P.S.: Influentials, networks, and public opinion formation.
Journal of
consumer research 34(4), 441–458 (2007)
50. Zollo, F., Bessi, A., Del Vicario, M., Scala, A., Caldarelli, G., Shekhtman, L., Havlin, S.,
Quattrociocchi, W.: Debunking in a world of tribes. arXiv preprint arXiv:1510.04267 (2015)
51. Zollo, F., Novak, P.K., Del Vicario, M., Bessi, A., Mozetic, I., Scala, A., Caldarelli, G., Quat-
trociocchi, W.: Emotional dynamics in the age of misinformation. PloS one 10(9), e0138,740
(2015)
Acknowledgements This work is based on co-authored material. We thank Aris Anagnostopou-
los, Alessandro Bessi, Guido Caldarelli, Michela Del Vicario, Shlomo Havlin, Igor Mozetic, Petra
Kralj Novak, Fabio Petroni, Antonio Scala, Louis Shekhtman, H. Eugene Stanley, and Brian Uzzi.
|
1302.6256 | 2 | 1302 | 2013-12-26T02:00:15 | Parallel Maximum Clique Algorithms with Applications to Network Analysis and Storage | [
"cs.SI",
"cs.DC",
"cs.DM",
"cs.DS",
"physics.soc-ph"
] | We propose a fast, parallel maximum clique algorithm for large sparse graphs that is designed to exploit characteristics of social and information networks. The method exhibits a roughly linear runtime scaling over real-world networks ranging from 1000 to 100 million nodes. In a test on a social network with 1.8 billion edges, the algorithm finds the largest clique in about 20 minutes. Our method employs a branch and bound strategy with novel and aggressive pruning techniques. For instance, we use the core number of a vertex in combination with a good heuristic clique finder to efficiently remove the vast majority of the search space. In addition, we parallelize the exploration of the search tree. During the search, processes immediately communicate changes to upper and lower bounds on the size of maximum clique, which occasionally results in a super-linear speedup because vertices with large search spaces can be pruned by other processes. We apply the algorithm to two problems: to compute temporal strong components and to compress graphs. | cs.SI | cs | Parallel Maximum Clique Algorithms with Applications to
Network Analysis and Storage
Ryan A. Rossi, David F. Gleich,
Assefaw H. Gebremedhin
Purdue University
Computer Science
{rrossi,dgleich,agebreme}@purdue.edu
Md. Mostofa Ali Patwary
Northwestern University
Electrical Engineering and
Computer Science
[email protected]
3
1
0
2
c
e
D
6
2
]
I
S
.
s
c
[
2
v
6
5
2
6
.
2
0
3
1
:
v
i
X
r
a
ABSTRACT
We propose a fast, parallel maximum clique algorithm for
large sparse graphs that is designed to exploit characteristics
of social and information networks. The method exhibits a
roughly linear runtime scaling over real-world networks rang-
ing from 1000 to 100 million nodes. In a test on a social net-
work with 1.8 billion edges, the algorithm finds the largest
clique in about 20 minutes. Our method employs a branch
and bound strategy with novel and aggressive pruning tech-
niques. For instance, we use the core number of a vertex in
combination with a good heuristic clique finder to efficiently
remove the vast majority of the search space. In addition,
we parallelize the exploration of the search tree. During the
search, processes immediately communicate changes to up-
per and lower bounds on the size of maximum clique, which
occasionally results in a super-linear speedup because ver-
tices with large search spaces can be pruned by other pro-
cesses. We apply the algorithm to two problems: to compute
temporal strong components and to compress graphs.
Categories and Subject Descriptors
G.2.2 [Graph theory]: Graph algorithms; H.2.8 [Database
Applications]: Data Mining
General Terms
Algorithms, Experimentation
Keywords
parallel maximum clique algorithms, network analysis, tem-
poral strong components, graph compression
1.
INTRODUCTION
The maximum clique problem seeks to find a clique (com-
plete subgraph) of the largest possible size in a given graph.
The problem is NP-hard, even to solve in an approximate
sense [28]. As a result one is inclined to believe that ex-
act algorithms for finding maximum cliques will be too slow
to be practical for large network analysis applications. Yet,
many real-world problems have features that do not elicit
worst-case behaviors from well-designed algorithms.
In this manuscript, we propose a fast, state-of-the-art par-
allel exact maximum clique finder. And enabled by its effi-
ciency, we use the clique finder (i) to investigate cliques in
large social and information networks, (ii) to study largest
temporal strong components in dynamic networks, and (iii)
to compress graphs.
We demonstrate that finding the largest clique in big so-
cial and information networks is fast (Table 1). By way of
example, we can find the maximum clique in social networks
with nearly two billion edges in about 20 minutes with a 16-
processor shared memory system. Empirically, our method
is observed to have a roughly linear runtime (Figure 1) for
these networks, which is remarkable in light of the fact that
the problem is NP-hard. As a point of comparison, our
new solver significantly outperforms a recent fast maximum
clique finder we developed [39] as well as an off-the-shelf
clique enumerator (Section 5). Consequently, we expect our
new algorithm to be useful for tasks such as analyzing large
networks, evaluation of graph generators, community detec-
tion, and anomaly detection, where maximum cliques are
needed.
In its basic form, our algorithm is a branch and bound
method with novel and aggressive pruning strategies. Sev-
eral key components stand out as features contributing to
its efficiency and distinguishing it from existing algorithms.
First, the algorithm begins by finding a large clique us-
ing a near linear-time heuristic; the obtained solution is
checked for optimality before the algorithm proceeds any
further, and the algorithm is terminated if the solution is
found to be optimal. Second, we use this heuristic clique,
in combination with (tight) upper bounds on the largest
clique, to aggressively prune the graph. The upper bounds
are computed at the level of the input graph or individual
neighborhoods. Third, we use implicit graph edits and peri-
odic full graph updates in order to keep our implementation
efficient. Fourth, we parallelize the search procedure. The
parallel search is designed such that processes (workers) im-
mediately communicate changes to upper and lower bounds
on the size of maximum clique. As a result, vertices with
especially large search spaces can be pruned by other pro-
cesses, which occasionally results in a super-linear speedup.
Finally, our framework is tunable in the sense that the graph
representation, data structures, and the implementations of
the algorithm can be adapted based on the properties of
the input graph. The algorithm is discussed in detail in
Section 4, its performance is evaluated in Section 5, and the
bounds it makes use of in its pruning strategies are reviewed
in Section 3.
One motivation for this work came from a connection be-
tween the largest temporal strong component of a dynamic
network and maximum cliques in an associated graph. In
a network when each edge represents a contact – a phone
1
call, an email, or physical proximity – between two entities
at a specific point in time, one gets an evolving network
structure [22] where a temporal path represents a sequence
of contacts that obeys time. A temporal strong component
is a set of vertices where all pairwise temporal paths exist,
just like a strong component is a set of vertices where all
pairwise paths exist.
Surprisingly, checking if an evolving network has a tem-
poral strong component of size k is NP-complete [34, 3].
For some intuition, consider the following “wrong” reduc-
tion from the perspective of establishing NP-hardness. A
temporal strong component of size k corresponds to a clique
of size k in a temporal reachability graph where each edge
represents a temporal path between vertices. Finding the
maximum clique, then, reveals the largest temporal strong
component. At a first glance, this is no help as even approx-
imating the largest clique in a graph is hard [28]. With a
fast, well-designed algorithm, however, the connection can
be exploited. We apply our maximum clique finder for this
analysis and discuss properties of temporal components we
find in Twitter and phone call networks in Section 6.1.
Cliques are the most dense local structure possible in a
network. Previous studies found cliques useful to compress a
networks [10]. We tackle an easier problem and use cliques to
compute a compression friendly ordering that makes many
edges in the graph local. We find in Section 6.2 that this
ordering generates results that are nearly as good as existing
heuristics designed specifically for that problem.
We make all our implementations and further experiments
available in an online appendix:
http://www.ryanrossi.com/pmc
2. CLIQUES IN SOCIAL AND INFORMA-
TION NETWORKS
We proceed by first demonstrating how fast the algorithm
finds cliques on various social and information networks and
discussing observations we make about the cliques obtained.
We experiment with 32 networks categorized in 8 broad
classes.
In the online appendix – see the link above – we
present a more extensive collection of around 74 social and
information networks, 16 temporal reachability networks,
and 63 dense graphs from DIMACS challenge. Table 1 de-
scribes the properties of the 32 networks considered here.
It also shows the size of the largest clique in each network
and states the time taken to find each clique. We plot the
runtime pictorially in Figure 1, which demonstrates linear
scaling between 1000 vertices and 100M vertices. We now
briefly explain the data and what each clique signifies.
For all of the following networks, we discard edge weights,
self-loops, and only consider the largest strongly connected
component. In contrast to the temporal components we de-
scribe later, in this section we mean the standard strong com-
ponents. If the graph is directed, we remove non-reciprocated
edges. This strategy will identify fully-directed cliques.
1. Biological networks. We study a network where the
nodes are proteins and the edges represent protein-protein
interactions (dmela [44]) and another where nodes are sub-
strates and edges are metabolic reactions (celegans). Cliques
in these networks signify biologically relevant modules.
2. Collaboration networks. These are networks in
which nodes represent individuals and edges represent scien-
tific collaborations or movie production collaborations (math-
Table 1: For each of the social and information net-
works studied we find the largest clique in less than
21 minutes. The column K + 1 is a core number
based upper-bound, ω denotes the size of the clique
obtained by the initial heuristic step, and ω denotes
the actual maximum clique.
graph
V
E
K+1
ω
1.
2.
3.
4.
5.
6.
7.
8.
celegans
dmela
453
7.4k
2.0k
26k
11
12
mathsciet
dblp
hollywood
333k
317k
1.1M 56M 2209
821k
1.0M 114
25
wiki-talk
92k
361k
59
retweet
1.1M 2.3M 19
whois
rl-caida
as-skitter
arabic-2005
wikipedia2
it-2004
uk-2005
7.5k
191k
1.7M 11M 112
57k
608k
89
33
1.7M 102
164k
1.9M 4.5M 67
509k
130k
7.2M 432
12M 500
cmu
mit
stanford
berkeley
uillinois
penn
texas
fb-a
fb-b
uci-uni
70
250k
6.6k
73
251k
6.4k
92
568k
12k
852k
65
23k
1.3M 86
31k
1.4M 63
42k
36k
1.6M 82
3.1M 24M 75
2.9M 21M 64
59M 92M 17
slashdot
gowalla
youtube
flickr
livejournal
orkut
twitter
friendster
359k
950k
54
70k
197k
52
1.1M 3.0M 52
514k
3.2M 310
4.0M 28M 214
3.0M 106M 231
21M 265M 1696
66M 1.8B
304
9
7
25
114
2209
14
13
55
17
66
102
31
432
500
45
32
51
42
56
43
49
23
23
6
25
29
16
45
214
44
174
129
ω
9
7
25
114
2209
15
13
58
17
67
102
31
432
500
45
33
51
42
57
44
51
25
24
6
26
29
17
58
214
47
323
129
Time
(s.)
<.01
0.06
0.08
0.05
1.69
0.09
0.58
0.09
0.13
1.2
0.03
1.16
0.12
0.06
0.09
0.1
0.09
0.16
0.18
0.24
0.33
6.3
5.52
33.86
0.06
0.2
0.84
5.2
2.98
48.49
598
1205
scinet, dblp, hollywood [4]). Large cliques in these networks
are expected because they are formed when collaborations
involve many participants.
3. Interaction networks. Here, nodes represent individ-
uals and edges represent interaction in the form of message
posts (wiki-talk [31]).
4. Retweet networks. Here, nodes are Twitter users
and two users are connected by an edge if they have retweeted
each other. We collected this network ourselves. Cliques are
groups of users that have all mutually retweeted each other
and may represent an interest cartel or anomaly.
5. Technological networks. The nodes in these net-
works are routers (as-skitter, rl-caida, whois), and edges are
observed communications between the entities.
6. Web link networks. Here, nodes are web-pages
and edges are hyperlinks between pages (wikipedia, arabic-
2005, it-2004, uk-2005 [4]). The largest clique represents the
largest set of pages where full pairwise navigation is possible.
7. Facebook networks. The nodes are people and edges
represent “Facebook friendships” (CMU, MIT, Stanford, Berke-
ley, UIllinois, Penn, Texas [48], fb-a, fb-b [50], uci-uni [23]).
8. Social networks. Nodes are again people and edges
represent social relationships in terms of friendship or fol-
lower (orkut, LiveJournal, flickr [24], gowalla, slashdot, youtube[32],
twitter [30], friendster [Internet Archive]).
2
e
e
m
m
i
i
t
t
n
n
u
u
R
R
g
g
o
o
l
l
2
2
1
1
0
0
−1
−1
−2
−2
−3
−3
3
3
4
4
5
5
6
6
7
7
log V + E
log V + E
8
8
9
9
Figure 1: The empirical runtime of our clique finder
in social and information networks scales almost lin-
early with the network dimension.
We summarize below our findings about cliques in these
networks and the performance of our algorithm:
• We observe that the initial heuristic step of the algorithm
finds the largest clique in most cases: 17 of the 32 in-
stances considered here, and 52 of the 74 networks consid-
ered in the online appendix; see Figure 2 for a summary.
This property helps our exact maximum clique algorithm
terminate quickly.
• We studied the relationship between the largest k-core (a
notion discussed in Section 3) and the largest clique. Fig-
ure 2 shows a summary of the results we obtained on all
74 networks. In the collaboration and most web-link net-
works, we find that the largest k-core is a maximum clique
for every graph. The social networks, in comparison, have
a much larger difference between the two, which suggests
a fundamental difference in the types of networks formed
via collaboration relationships versus social relationships.
• We observe that technological networks have surprisingly
large cliques. Given that a clique represents an overly re-
dundant set of edges, this would suggest that these max-
imum cliques represent over-built technology, or critical
groups of nodes.
• We observe that for the twitter network, the nodes in
the largest clique are a strange set of spam accounts and
legitimate accounts with thousands of followers and fol-
lowing thousands. We believe that most members of this
clique likely reciprocate all follower relationships.
3. BOUNDS ON MAXIMUM CLIQUE SIZE
As a prelude to our algorithm, we review a few easy to
derive upper bounds on the size of the largest clique ω(G)
in a graph G. These bounds will allow us to terminate our
algorithm once we have found something that hits the upper-
bound or stop a local search early because there is no larger
clique present.
A simple upper bound on the size of the largest clique
is the maximum degree ∆(G) in the graph. Usually this is
too simple to be useful. A stronger bound can be obtained
using k-cores. A k-core in a graph G is a vertex induced
subgraph where all vertices have degree at least k [43]. The
core number of a vertex v is the largest k such that v is in
a k-core. We denote it by K(v). Suppose that G contains a
clique of size k, then each vertex in the clique has degree k−1
3
1
0.8
0.6
0.4
0.2
0
1
0.8
0.6
0.4
0.2
0
ω
/
ω
)
1
+
K
(
/
ω
1 2
3 4 5
6
7
8
1 2
3 4 5
6
7
8
1. bio
2. collab
3. inter
4. retweet
5. tech
6. web
7. facebook
8. social
1. bio
2. collab
3. inter
4. retweet
5. tech
6. web
7. facebook
8. social
Figure 2: These two figures summarize the results
on all 74 networks studied in the online appendix.
The top figure shows that our heuristic (ω) finds the
largest clique (ω) in biological, collaboration, and
web networks in all but one case. The bottom figure
identifies networks where the largest core number
(K) tightly bounds the largest clique (ω).
and the entire graph must have a k − 1-core. Consequently,
if K(G) is the largest core number of any vertex in G, then
K(G) + 1 is an upper bound on the clique size. In contrast
to cliques, the core numbers of all vertices in a graph can be
computed with a linear time algorithm [2].
The value K(G) is also known as the degeneracy of the
graph. The quantity K(G) + 1 is an upper-bound on the
number of colors used by a greedy coloring algorithm that
processes vertices in order of decreasing core numbers – also
known as degeneracy order [21]. Note that the number of
colors used by any greedy coloring of G is also an upper-
bound on the size of the largest clique because a clique of
size k requires k colors. Let L(G) be the number of colors
used by a greedy coloring algorithm that uses the degener-
acy order. Then L(G) ≤ K(G) + 1 and we get a potentially
tighter bound on the size of the largest clique. The bound
L(G) can be computed in linear time with some care on the
implementation of the greedy coloring scheme. We summa-
rize the bounds we have at this point:
Fact 3.1. ω(G) ≤ L(G) ≤ K(G) + 1 ≤ ∆(G) + 1.
We can further improve the bounds in Fact 3.1 by using one
additional fact about a maximum clique in a graph. Any
neighborhood graph of a vertex within the largest clique
has a clique of the same size within the neighborhood graph
as well. The way our algorithm proceeds is by iteratively re-
moving vertices from the graph that cannot be in the largest
clique. Let NR(v), the reduced neighborhood graph of v, be
the vertex-induced subgraph of G corresponding to v and all
neighbors of v that have not been removed from the graph
yet. All the bounds in Fact 3.1 apply to finding the largest
clique in each of these neighborhood subgraphs. We can
therefore state:
Fact 3.2.
ω(G) ≤ max
v
L(NR(v))
≤ max
v
≤ max
v
K(NR(v)) + 1
∆(NR(v)) + 1.
(1)
(2)
(3)
Computing the tighter bounds in Fact 3.2 requires slightly
more than linear work. For each vertex, we must form the
neighborhood graph. If we look at the union of all of these
neighborhood graphs, there is a vertex in some neighbor-
hood graph for each edge in G. Thus, there are a total of
O(E) vertices in all neighborhoods. By the same argument,
there are O(E + T ) edges where T is the total number
of triangles in the graph. Consequently, we can make the
following statement.
Fact 3.3. The total work involved in computing the bounds
in Fact 3.2 is bounded by O(E + T ).
4. MAXIMUM CLIQUE ALGORITHMS
Given an undirected graph G = (V, E), let Cv denote a
clique of the largest size containing the vertex v. A maxi-
mum clique in G can be found by computing Cv for every
vertex v in V and then picking the largest among these. This
clearly is wasteful. Most branch and bound type algorithms
for maximum clique speed up the process by keeping around
the size of the largest clique computed at any point in the
course of the algorithm (maxSoFar) and avoiding computa-
tion of every Cu, u ∈ V , that would eventually be smaller
than maxSoFar, a process generically referred to as prun-
ing [38, 36, 46, 39, 51]. They differ chiefly in the way the
pruning is done. The algorithm we developed in a recent
work [39] uses a hierarchical pruning strategy that relies pri-
marily on comparisons of degrees of vertices in the original
input graph with maxSoFar, effectively using the weakest
bound in Fact 3.2. In comparison, our new method uses the
tightest bound in Fact 3.2. Furthermore, it is parallelized,
and it contains a variety of new algorithmic and performance
optimization ingredients that result in significantly superior
performance.
For reference throughout the discussion in this section, we
outline our algorithm in the psuedocodes in Algorithm 1 and
Algorithm 2 and provide an illustrative example in Figure 3.
In the overall procedure, we identify the following steps as
the most important:
– finding a good initial clique via our heuristic,
– using the smallest to largest ordering in the main loop; this
helps ensure that neighborhoods of high degree vertices
are as small as possible,
– using efficient data structures for all the operations and
graph updates, and
– aggressively using k-core bounds and coloring bounds to
remove vertices early.
4.1 Our fast heuristic clique finder
Our exact maximum clique finder begins by calling a fast
heuristic clique finder (see the main procedure MaxClique
in Algorithm 2). The goal of this initial heuristic step is
to find a large clique in the graph quickly. The heuristic
is similar to the maximum-degree based heuristic described
4
Algorithm 1 Our greedy heuristic to find a large clique.
This is used as the first step in the exact algorithm, outlined
in Algorithm 2. The input array K holds core numbers of
vertices.
Set H = {}, Set max = 0
for each v ∈ V in decreasing core number order do
if v’s core number is ≥ max then
Let S be the neighs. of v with core numbers ≥ max
Set C = {}
for each vertex u ∈ S by decreasing core num. do
1 procedure HeuristicClique(G = (V, E) , K)
2
3
4
5
6
7
8
9
10
11
Add u to C
if C > max then
if C ∪ {u} is a clique then
Set H = C, Set max = H
12
return H, a large clique in G
in [39], which, in exploring for a maximum clique in which
a vertex v participates, simply picks a vertex of the highest
degree in the neighborhood of v. Our heuristic search differs
as we use the core numbers of each vertex to guide the search
instead. The inspiration for this change is the relationship
between core numbers, the degeneracy order, and a simple
2-approximation algorithm for the densest subgraph.
The heuristic, outlined in Algorithm 1, builds a clique
by searching around each vertex in the graph and greedily
adding vertices from the neighborhood as long as they form
a clique. The order of vertices is the degeneracy order (the
input parameter K contains the needed core numbers of the
vertices). Because the core numbers are also a lower-bound
on the size of the largest clique a vertex participates in, we
can efficiently prune the greedy exploration.
As mentioned in the previous section, this heuristic step in
itself finds the largest clique in the graph in over half of the
social networks we consider. It can therefore be used as a
stand-alone procedure. All steps in Algorithm 1, except for
the statements in Lines 7–9, can be performed using work
proportional to the degree of a vertex. Those statements in
turn require work proportional to the size of the subgraph in-
duced by the neighborhood of a vertex. The overall runtime
is therefore O(E · ∆(G)).
4.2 Initial pruning
After our exact algorithm finds a heuristic clique H in the
input graph G using the core numbers of the vertices, it puts
those numbers to another strategic use. Suppose we find a
clique in G of size ω = H. Then we can eliminate all ver-
tices with core numbers strictly less than ω from our search
(Line 4 in MaxClique). This pruning operation works be-
cause a clique of size ω + 1 or larger must have vertices
with core numbers at least ω. In a few cases, we observed
this step suffices to certify that H is the maximum clique
as we remove all of the graph. This happens, for instance,
with the LiveJournal network. Moreover, this pruning pro-
cedure reduces memory requirements significantly for most
networks.
In our implementation, for this initial pruning, vertices
are explicitly removed from the graph. However, vertices re-
moved in future pruning steps are simply marked as deleted
in an index array. Future graph operations, such as neigh-
borhood queries, check this array before returning their con-
tents. This helps us achieve efficient implementation.
4.3 Searching
Algorithm 2 Our exact maximum clique algorithm. See Sec-
tion 4.5 for details about how to parallelize it.
1 procedure MaxClique(G = (V, E))
2
Set K = CoreNumbers(G)
array
⊲ K is a vertex-indexed
3
4
5
6
7
8
9
10
Set H = HeuristicClique(G, K)
Remove (explicitly) vertices with K(v) < H
while G > 0 do
Let u be the vertex with smallest reduced degree
InitialBranch(u)
Remove u from G
Periodically, explicitly remove vertices from G
⊲ the routine grows H
Return H, the largest clique in G
1
2
3
4
11 procedure InitialBranch(u)
12
13
14
15
16
17
18
Set P = NR(u)
if P ≤ H then return
Set KN = CoreNumbers(P)
Set K(P ) = maxv∈P KN (v)
if K(P ) + 1 < H then return
Remove any vertex with KN (v) < H from P
Set L = Color(P , KN ) in degen. order
colors
19
20
if L ≤ H then return
Branch({}, P )
10
11
16
17
18
9
15
19
23
20
12
13
14
21
22
5
6
7
8
24
25
26
⊲ L is nr of
Figure 3: An example that illustrates the workings
of Algorithm 2. See discussion at the end of Sec-
tion 4.3.
while P > 0 and P + C > H do
Select a vertex u from P and remove u from P
Set C ′ = C ∪ {u}
Set P ′ = P ∩ {NR(u)}
if
P ′ > 0 then
Set L = Color(P ′) in natural (any) order
if
21 procedure Branch(C, P )
22
23
24
25
26
27
28
29
30
31
32
C ′ + L > H then
Branch(C ′, P ′)
else if C ′ > H then
⊲ C ′ is maximal
⊲ new max clique
Set H = C ′
Remove any v with K(v) < H from G ⊲ implicitly
After we reduce the size of the graph via the initial prun-
ing, we then run a search strategy over all the remaining
vertex neighborhoods in the graph (the while-loop in Max-
Clique). The algorithm we run is similar to a standard
branch and bound scheme for maximal clique enumeration [9].
However, we unroll the first two levels of branching and ap-
ply our clique bounds in order to find only the largest clique.
At this point, we wish to introduce a bit of terminology.
Recall (from Section 3) that NR(v) is the reduced neighbor-
hood graph of v and let dR(v) denote the reduced degree of
v. These sets do not contain any vertices that have been
removed from the graph due to changes in the lower-bound
on the clique size due to k-cores and any vertices whose local
searches have terminated. At the risk of being overly formal,
let ω be the current best lower-bound on the clique size, and
let X be a set of vertices removed via searching. Then:
NR(v) = G({v} ∪ {u : (u, v) ∈ E, K(u) ≥ ω, u 6∈ X}).
We explore the remaining vertices in order of the small-
est to largest reduced degree. For each vertex, we explore
its neighborhood using the function InitialBranch. When
InitialBranch returns, we have found the largest clique in-
volving that vertex, and so we can remove it from the graph.
5
Again, this is done by marking it as removed in an array.
We did, however, find it advantageous to periodically recre-
ate the graph data structure in light of all the edits and
recompute k-cores. This reduces the cost of the intersection
operations. In addition, we believe that this step aggregates
memory access to a more compact region thereby improving
caching on the processor. We do this every four seconds of
wall clock time.
The first step of InitialBranch is a set of tests to check
if any of the bounds from Lemma 3.2 rule out finding a
bigger clique in the neighborhood of u. The first test (Line
13) essentially corresponds to the weakest bound, Equation
(3), in Lemma 3.2. To check against the bound given by
Equation (2), we compute the core numbers for each vertex
in the neighborhood subgraph. If the largest core number in
the neighborhood graph is no better than the current lower
bound, we immediately return and add the vertex to the list
of searched vertices. If it isn’t, then we compute a greedy
coloring of the subgraph using the degeneracy order. Using
the coloring bound from Lemma 3.2 (Equation (1)), we can
immediately return if there is no large clique present. If none
of these checks pass, then we enter into a recursive search
procedure that examines all subsets of the neighborhood in
a search for cliques via the Branch function.
The Branch function maintains a subgraph P and a clique
C. The invariant shared by these sets is that we can add
any vertex from P to C and get a clique one vertex larger.
We pick a vertex and do this. To be precise, we pick the
vertex with the largest color (note that colors are positive
integer numbers). We then check if the clique C ′ is maximal
by testing if there is any set P ′ that exists that satisfies the
invariant. If it is a maximal clique, then we check against
our current best clique H, and update it if we found a larger
If it is not, then we test if it is possible that C ′
clique.
and P ′ have a big clique. The biggest clique possible is
C ′+ω(P ′) ≤ C ′+L(P ′), and so using the function Color,
we compute a new greedy coloring to get the upper bound
L(P ′). Unlike the greedy coloring in InitialBranch, here
we do not use the degeneracy ordering as it was not worth
the extra work in our investigations. If C ′ and P ′ pass these
tests, we recurse on C ′ and P ′.
The example in Figure 3 illustrates several of the points we
have been discussing thus far. The core number of this graph
is 4, which yields the upper bound of 5 on the maximum
clique size. The clique detected by our heuristic is {1, 8, 23};
the graph has two maximum cliques: {19, 20, 21, 22} and
{23, 24, 25, 26}. Our algorithm removes vertices 10, 11, 12, 13
and 16, 17, 18 in the initial pruning. Subsequently, our method
will explore vertex 9 and remove it based on the maximum
neighborhood core of 3. It explores vertex 15 next and re-
moves it due to the neighborhood core bound. It then re-
moves vertex 14 due to an insufficient degree. Subsequently,
it finds the clique around vertex 19, then prunes all vertices
except 1 through 8 due to core number bounds. Finally,
it eliminates vertex 1 due to the neighborhood core bound;
all other vertices are then iteratively removed via degree
bounds.
4.4 Performance Optimization
In the interest of space and to keep the presentation sim-
ple, we have left out several details on performance enhance-
ment that we have in our implementation. (We make the
code available online for interested readers). To give a small
example, we use an adjacency matrix structure for small
graphs in order to facilitate O(1) edge checks. We use a
fast O(d) neighborhood set intersection procedure, and have
many other optimizations throughout the code.
4.5 Parallelization
We have parallelized the search procedure. Our own im-
plementation uses shared memory, but we describe the par-
allelization such that it could be used with a distributed
memory architecture as well.
The parallel constructs we use are a worker task-queue
and a global broadcast channel. In fact, the basic algorithm
remains the same. We compute the majority of the prepro-
cessing work in serial with the exception of a parallel search
for the clique in the initial heuristic step. Here, we assume
that each worker has a copy of the graph and distribute ver-
tices to workers to find the largest heuristic clique in the
neighborhood. In serial, we reduce the graph in light of the
soc−orkut (290)
soc−flickr (22)
socfb−Texas (2.3)
8
8
7
7
6
6
5
5
4
4
3
3
2
2
1
1
p
p
u
u
d
d
e
e
e
e
p
p
S
S
0
0
0 1
0 1
4
4
8
8
Processors
Processors
12
12
16
16
Figure 4: Speedup of our parallel maximum clique
algorithm on social and information networks. Sin-
gle processor runtimes in seconds are shown in
parentheses.
6
brock400−4 (331)
san200−0−9−2 (1)
san400−0−7−1 (0.2)
brock800−4 (3604)
brock400−3 (619)
p−hat1500−1 (4)
san1000 (1)
20
20
15
15
10
10
5
5
p
p
u
u
d
d
e
e
e
e
p
p
S
S
0
0
0 1
0 1
4
4
8
8
Processors
Processors
12
12
16
16
Figure 5: Speedup of our parallel maximum clique
algorithm on DIMACS graphs. Single processor run-
times in seconds are shown in parentheses.
bounds, and then re-distribute a copy of the graph to all
workers. At this point, we view the main while loop as a
task generator and farm the current vertex out to a worker
to find the largest clique in that neighborhood. Workers co-
operate by communicating improved bounds between each
other whenever they find a clique and whenever they remove
a vertex from the graph using the shared broadcast channel.
When a worker receives an updated bound, we have found
that it is often possible for that worker to terminate its own
search at once. Unlike previous algorithms, the speedup
from our parallel maximum clique algorithms can be super
linear since we are less dependent on the precise order of
vertices explored. In our own shared memory implementa-
tion, we avoid some of the communications by using global
arrays and locked updates.
5. PERFORMANCE RESULTS
As we illustrated in Table 1 and Figure 1, the runtime
of our clique finder on social and information networks is
fast, and it exhibits roughly linear scaling as we increase
the problem size. We used a two processor, Intel E5-2760
system with 16 cores and 256 GB of memory for those tests
and the remaining tests. None of the experiments came close
to using all the memory. In this section we will be concerned
with three questions:
a) How scalable is our parallel algorithm?
b) How does our method compare to other clique finders on
social and information networks?
c) Is the tighter upper bound that results from using neigh-
borhood cores worth the additional expense?
In what follows, we will refer to our own algorithm outlined
in Algorithm 1 and 2 as “pmc” (for parallel maximum clique).
For performance analysis purposes we will consider several
versions of pmc.
For the results reported in this section, we will use prob-
lems from the 20 year old DIMACS clique challenge [49] to
study the performance of our clique finder on an established
benchmark of difficult problems. Even the best state of the
art algorithms cannot solve all of these problems.
In the
interest of space, we do not present individual data on them.
These graphs are all small: 45—1500 vertices. However,
they contain an enormous number of edges and triangles
compared with social networks. The number of triangles
)
)
τ
τ
≤
≤
r
r
(
(
P
P
1
1
0.8
0.8
0.6
0.6
0.4
0.4
0.2
0.2
0
0
0
0
pmc
pmc (no neigh cores)
pmc (native ordering)
FMC
MaxCliqueDyn
BK
10
10
15
15
5
5
τ
τ
Figure 6: Comparison of a serial version of pmc and
its variants against three existing maximum clique
algorithms on 30 difficult social and information net-
works.
ranges between 34,000 and 520 million. Of the 57 graphs
our method was able to solve, we divide them into an easy
set of 26 graphs, where our algorithm terminates in less than
a second and a hard set of 32 graphs which take between one
second and an hour.
Parallel Speedup.
In Figure 4 we show the speedup
obtained as we add processes to our pmc method for three
social networks.
In Figure 5 we show speedup results of
pmc for seven of the DIMACS graphs. The runtime for
both includes all the serialized preprocessing work, such
as computing the core numbers initially. The figures illus-
trate two different behaviors. For social networks, we only
get mild speedups on 16-cores for the largest problem (soc-
orkut). For the DIMACS graphs, we observe roughly linear
and, sometimes, super-linear performance as we increase the
number of processes. The superlinear performance is due to
quicker returns from unfruitful branches as a result of the
parallel exploration. These results indicate that our paral-
lelization scales well and helps reduce the runtime for diffi-
cult problems.
Performance Profile Plots. To address the two remain-
ing questions b) and c), we use performance profile plots to
compare algorithms [15]. Performance profile plots compare
the performance of multiple algorithms on a range of prob-
lems. They are similar to ROC curves in that the best results
are curves that lie towards the upper left. Suppose we have
N problems in total and that an algorithm solves M of them
within 4 times the speed of the best solver for each problem.
Then we would have a point (τ, p) = (log2 4, M/N ). Note
that the horizontal axes reflects a speed difference factor of
2τ . The fraction of problems that an algorithm cannot solve
is given by the right-most point on the curve. In Figure 6,
for instance, the method labeled BK only solves around 80%
of the problems in the test set.
Figure 6, social and information networks. We con-
sider several variants of pmc in order to understand the
effects of the various components on the method’s perfor-
mance. The variants considered are: a serial version with
neighborhood cores exploited (pmc), the same version but
without exploiting neighborhood cores (pmc no neigh cores),
1
1
0.8
0.8
0.6
0.6
0.4
0.4
0.2
0.2
)
)
τ
τ
≤
≤
r
r
(
(
P
P
0
0
0
0
1
1
pmc
pmc (no neigh cores)
2
2
τ
τ
3
3
4
4
(a) DIMACS-Hard (Serial)
1
1
0.8
0.8
0.6
0.6
0.4
0.4
0.2
0.2
)
)
τ
τ
≤
≤
r
r
(
(
P
P
0
0
0
0
0.5
0.5
1
1
pmc
pmc (no neigh cores)
1.5
1.5
τ
τ
2
2
2.5
2.5
(b) DIMACS-Hard (16 Threads)
Figure 7: Performance profiles comparing the per-
formance of two versions of pmc (with and without
neighborhood cores) on DIMACS graphs. The top
figure shows comparison of serial versions of the two
variants, the bottom figure shows similar compari-
son of the parallel versions.
and a version that uses only the k-core pruning steps and
searches vertices in their native order, the order in which
they were read from disk, rather than degeneracy order
(pmc-native).
We compare these three variants of pmc with three state
of the art maximum clique finders. These include the re-
cent method FMC (for fast maximum clique) from [39], the
method MaxCliqueDyn [29] which dynamically adapts a greedy
color sort, and a recent implementation of the Bron-Kerbosch
(BK) algorithm in the igraph package [14].
From the performance profile plots, for these types of net-
works, we find little difference between using the neighbor-
hood cores and not using them, and somewhat more pro-
nounced difference between using degeneracy ordering ver-
sus native ordering. Further, we find a big difference be-
tween our most optimized method (pmc) and the alterna-
tive algorithms. Compared to the BK algorithm, we are
over 1000 times faster for some problems, and we solve all
of the instances. Compared to the FMC algorithm, we are
about 50 times faster. This illustrates that our algorithm
uses properties of the social and information networks to
hone in on the largest clique quickly.
Figures 7(a) and 7(b), DIMACS networks. These
plots show results on the 32 hard instances of DIMACS prob-
lems in the serial case (a) and in the parallel case (b). It
can be seen that, in the serial case, the neighborhood cores
greatly help reduce the work in the majority of cases.
In
a few cases, they resulted in a large increase in work (the
7
Table 2: For each temporal network, we list the num-
ber of temporal edges, the number of vertices and
edges in the reachability graph, the size ω of the
temporal strong component and the runtime of our
algorithm.
graph
ET
VR
ER
ω
Time (s.)
infect-dublin
infect-hyper
415k
20k
fb-messages
reality
retweet
twitter-cop
61k
52k
61k
45k
11k
113
1.9k
6.8k
18k
8.6k
176k
6.2k
84
106
532k
4.7M 1236
707
66k
474k
166
581
<.01
<.01
0.05
0.19
0.02
0.22
point furthest to the right in the serial figure). All of the
work involved in computing these cores is parallelized, and
we observe that, in parallel, using them is never any worse
than about 20.5 ≈ 144% the speed of the fastest method.
In summary, we observe that a) our parallelization strat-
egy is effective, b) our algorithm outperforms existing algo-
rithms dramatically, and c) neighborhood core bounds help
with challenging problems. We recommend using neighbor-
hood cores as they help the algorithm terminate faster with
challenging problems and almost never take more than twice
the time.
6. MAXIMUM CLIQUE APPLICATIONS
Although finding the maximum clique is generally NP-
hard, our procedure is effective on many real-world networks
and produces nearly linear runtimes. In this section, we con-
sider how well our method works as a subroutine for two
applied problem: finding the largest temporal strong com-
ponent and finding a compress-friendly order of a network.
6.1 Temporal strong components
Temporal strong components were recently proposed by
Bhadra et al. and Nicosia et al. to extend the idea of a strong
component in a network to a temporal graph [3, 34]. Let V
be a set of vertices, and ET ⊆ V × V × R+ be the set of tem-
poral edges between vertices in V . Each edge (u, v, t) has a
unique time t ∈ R+. For such a temporal network, a path
represents a sequence of edges that must be traversed in in-
creasing order of edge times. That is, if each edge represents
a contact between two entities, then a path is a feasible route
for information. Temporal paths are inherently asymmetric
because of the directionality of time. Two vertices (u, w) are
strongly connected if there exists a temporal path P from
u to w and from w to u. A temporal strongly connected
component (tSCC) is defined as a maximal set of vertices
C ⊆ V such that any pair of vertices in C are strongly con-
nected. Note that this is exactly the same definition as a
strong component where we replaced the notion of a path
with a temporal path.
As previously mentioned, checking if a graph has a k-node
temporal SCC is NP-complete [3, 34]. Nonetheless, we can
compute the largest such strong component using a maxi-
mum clique algorithm. Let us briefly explain how. The first
step is to transform the temporal graph into what is called
a strong-reachability graph. For each pair of vertices in V ,
we place an edge in the strong reachability graph if there is
a temporal path between them. This is easy to do by using
(a) Reachability (retweet)
(b) Temporal SCC (retweet)
Figure 8: In order to compute the largest tempo-
ral strong component, we first compute the strong
reachability network (a). These networks are rather
dense and often reveal clear community structure.
Here we see clear communities for the political left
and right. We find that the largest temporal strong
component in the retweet network (b) consists of 166
twitter users classified as politically “right” accord-
ing to the original data with only a single exception.
a method by [37]. With this reachability graph, the second
step of the computation is to remove any non-reciprocated
edges and then find a maximum clique. That maximum
clique is the largest set of nodes where all pairwise tempo-
ral paths exist, and hence, is the largest temporal strong
component [34].
Data. We study three types of temporal networks.
In
each, the nodes represent people. Contact networks: The
edges are face-to-face contacts (infect-dublin, infect-hyper[25]).
See ref. [45] for more details about these data. Interaction
networks: In fb-messages, the edges represent private mes-
sages [35] and in the reality network, the edges represent
calls [18]. We also investigate a cellular telephone call net-
work where the edges are calls (reality [18]). Retweet net-
works: Here, the edges are retweets. We analyzed a net-
work of political retweets centered around the November
2010 election in the US (retweet [13]). A similar dataset
is a retweet and mentions network from the UN conference
held in Copenhagen. The data was collected over a two week
period (twitter-copen [1]).
Results and analysis. Figure 8 shows the reachability
and largest temporal strong component from a retweet net-
work about politics. It took the maximum clique finder less
than a second to identify this clique. We summarize the re-
maining experiments on the temporal strong components in
Table 2. For all of these networks, we were able to identify
the largest temporal strong component in less than a second
after we computed the reachability network. There are two
reasons for this performance. First, in all of the networks ex-
cept for the interaction networks, the largest clique is the set
of vertices with highest core numbers. Second, our heuristic
computes the largest clique in all of these networks, and we
are quickly able to reduce the remaining search space when
it isn’t the largest k-core as well.
We observe several interesting properties in these tempo-
ral strong components. In the two contact networks (infect-
hyper and infect-dublin), both of the largest strong compo-
nents had about 100 vertices, despite the drastically different
8
sizes of the initial dataset. We suspect this is a consequence
of the data collection methodology since the infect-dublin
data were collected over months whereas the infect-hyper
data were collected over days. In the interaction networks,
the components contain a significant fraction of the total
vertices, roughly 20-30%. In the retweet networks, the com-
ponents are a much smaller fraction of the vertices. Given
the strong communication pattern between the groups, the
components are good candidates for centers communities in
the networks.
Together, these results show that temporal strong compo-
nents are a strict requirement on a group of nodes in a net-
work. For instance, there is a considerable difference in the
size of temporal strong components between networks with
asymmetry in the relations (retweets) compared with net-
works with symmetric relationships (fb-forum, fb-messages,
and reality). This finding may be important for those inter-
ested in designing seeded viral campaigns on these networks.
6.2 Ordering for network compression
In this application, we consider using the maximum cliques
of a network to produce an ordering of the vertices that
should be useful for reducing the storage space of the net-
work structure. Compression has two important benefits,
first, it reduces the amount of IO traffic involved in using
the graph; second, good compression schemes may reduce
the amount of work involved in running an algorithm on the
graph [27, 26]. State-of-the-art network compression tech-
niques heavily exploit locality of links within the adjacency
list representation of a graph to reduce the number of bits
required to store each edge [6, 7, 5]. Cliques are the densest
local feature of a graph and in this application, we order
the vertices of a network such that every vertex is in a large
clique. This ensures that there are many local edges within
the graph. We then evaluate how well the bvgraph [6, 7]
compression method reduces the graph size using this order-
ing.
The specific ordering we use is the result of the follow-
ing process. Given a graph G, we find a maximum clique
C in G, remove C from G, and repeat the process until all
vertices are removed. To improve the runtime, we ran our
heuristic method to find large cliques. We then order the
vertices according to the cliques, C1, C2, . . ., CK, where K
denotes the number of iterations needed. Internally within
each Ci we order the vertices by their degrees. We then
permute the graph to use this ordering and use the bvgraph
compression scheme with all default settings to compress
the networks. Table 3 shows the results we get on two Face-
book networks. We compare the compression obtained by
reporting the size of each graph in bytes after compressing.
We evaluate three orderings of the vertices: the native or-
der, the Layered Label Propagation (LLP) order proposed
to help improve compression with the bvgraph algorithm [5],
and our clique-based order computed using PMC. We find
that our ordering results in better compression than using
the native ordering of the data and it is comparable to the
LLP order although slightly worse. Previous research found
that identifying and compressing large bicliques with a lin-
ear number of edges helped to improve upon methods that
use the adjacency list [10]. Given the success of this sim-
ple ordering, we plan to evaluate these more complicated
schemes next.
Table 3: Size in bytes required to store two Face-
book graphs using the bvgraph compression scheme
in three different orders.
Graph
Vertices
Edges
Native
LLP
PMC
fb-Penn
fb-Texas
42k
36k
1.4M
1.6M
4237507
4605427
2740801
3232909
3104286
3508224
7. RELATED WORK
A related problem to maximum clique finding is maximal
clique enumeration:
identifying all the maximal cliques in
G. This problem tends to get more attention in data mining
literature [52, 12]. For instance maximal cliques in social net-
works are distributed according to a power-law [16]. There
is a considerable body of recent work on this problem [47,
20, 19, 42, 11]. In particular, Du et al. [17] take advantage
of the properties of social and information networks in order
to enumerate all maximal cliques faster. In comparison, we
wish to highlight how fast we can solve the maximum clique
problem for these networks and temporal strong components
by appropriately applying pruning steps and bounds.
Pardalos and Xue [38] provide a good review of exact algo-
rithms for maximum clique that existed prior to 1994. No-
table methods proposed later include: among others, the
works of Bomze et al. [8], Ostergard [36], Tomita et al. [46],
and San Segundo et al. [41]. In a very recent work, Prosser [40]
provides a computational study comparing various exact al-
gorithms for maximum clique. The vast majority of existing
work focuses on sequential maximum clique finders. Recent
parallel algorithms include a multithreaded algorithm [33],
albeit without using core numbers to accelerate pruning, and
a MapReduce-based method [51].
8. CONCLUSIONS
We propose a new fast algorithm that finds the maximum
clique on billion-edge social networks in minutes. It exhibits
linear runtime scaling over graphs from 1000 vertices to
100 million vertices and has good parallelization potential.
We applied the algorithm to compute the largest temporal
strong components of a dynamic network, which involves
finding the largest clique in a static reachability graph, and
to obtain an ordering friendly for graph compression. Our
hope is that maximum clique will now become a standard
network analysis measure. Towards that end, we make our
software package available for others to use:
http://www.ryanrossi.com/pmc
9. REFERENCES
[1] N. Ahmed, F. Berchmans, J. Neville, and R. Kompella.
Time-based sampling of social network activity graphs.
In SIGKDD MLG, pages 1–9, 2010.
[2] V. Batagelj and M. Zaversnik. An o (m) algorithm for
cores decomposition of networks. arXiv preprint
cs/0310049, 2003.
[3] S. Bhadra and A. Ferreira. Complexity of connected
components in evolving graphs and the computation of
multicast trees in dynamic networks. ADHOC-NOW,
pages 259–270, 2003.
[4] P. Boldi, B. Codenotti, M. Santini, and S. Vigna.
UbiCrawler: A scalable fully distributed web crawler.
Software: Practice & Experience, 34(8):711–726, 2004.
9
[5] P. Boldi, M. Rosa, M. Santini, and S. Vigna. Layered
and mining. In ICDM, pages 300–309. IEEE, 2011.
label propagation: A multiresolution coordinate-free
ordering for compressing social networks. In WWW,
pages 587–596. ACM, 2011.
[6] P. Boldi and S. Vigna. The Webgraph Framework I:
Compression techniques. In Proceedings of the 13th
international conference on the World Wide Web,
pages 595–602, New York, NY, USA, 2004. ACM Press.
[7] P. Boldi and S. Vigna. Codes for the world wide web.
Internet Mathematics, 2(4):407–429, 2005.
[8] I. Bomze, M. Budinich, P. Pardalos, M. Pelillo, et al.
The maximum clique problem. Handbook of
combinatorial optimization, 4(1):1–74, 1999.
[9] C. Bron and J. Kerbosch. Algorithm 457: finding all
cliques of an undirected graph. Comm. ACM,
16(9):575–577, 1973.
[10] G. Buehrer and K. Chellapilla. A scalable pattern
mining approach to web graph compression with
communities. In Proceedings of the international
conference on Web search and web data mining
(WSDM2008), pages 95–106, New York, NY, USA,
2008. ACM.
[11] J. Cheng, Y. Ke, A. W.-C. Fu, J. X. Yu, and L. Zhu.
Finding maximal cliques in massive networks. ACM
Transactions on Database Systems, 36(4), 2011.
[12] J. Cheng, L. Zhu, Y. Ke, and S. Chu. Fast algorithms
for maximal clique enumeration with limited memory.
In SIGKDD, pages 1240–1248, 2012.
[13] M. Conover, J. Ratkiewicz, M. Francisco, B. Gon¸calves,
A. Flammini, and F. Menczer. Political polarization on
twitter. In ICWSM, 2011.
[14] G. Csardi and T. Nepusz. The igraph software package
for complex network research. InterJournal, Complex
Systems:1695, 2006.
[15] E. D. Dolan and J. J. Mor´e. Benchmarking
optimization software with performance profiles.
Mathematical Programming, 91(2):201–213, 2002.
[16] N. Du, C. Faloutsos, B. Wang, and L. Akoglu. Large
human communication networks: patterns and a
utility-driven generator. In SIGKDD, pages 269–278,
2009.
[17] N. Du, B. Wu, L. Xu, B. Wang, and P. Xin. Parallel
algorithm for enumerating maximal cliques in complex
network. In Mining Complex Data, volume 165, pages
207–221. Springer, 2009.
[18] N. Eagle and A. Pentland. Reality mining: sensing
complex social systems. Personal and Ubiquitous
Computing, 10(4):255–268, 2006.
[19] D. Eppstein, M. Loffler, and D. Strash. Listing all
maximal cliques in sparse graphs in near-optimal time.
Algorithms and Computation, pages 403–414, 2010.
[20] D. Eppstein and D. Strash. Listing all maximal cliques
in large sparse real-world graphs. Experimental
Algorithms, pages 364–375, 2011.
[21] P. Erdos and A. Hajnal. On chromatic number of
graphs and set-systems. Acta Mathematica Academiae
Scientiarum Hungarica, 17:61–99, 1966.
[22] A. Ferreira. On models and algorithms for dynamic
communication networks: The case for evolving graphs.
In ALGOTEL, 2002.
[23] M. Gjoka, M. Kurant, C. Butts, and A. Markopoulou.
Walking in facebook: A case study of unbiased sampling
of osns. In INFOCOM, pages 1 –9, 2010.
[24] D. F. Gleich. Graph of flickr photo-sharing social
network. In DOI: 10.4231/ D39P2W550, 2012.
[25] L. Isella, J. Stehl´e, A. Barrat, C. Cattuto, J. Pinton,
and W. Van den Broeck. What’s in a crowd? analysis of
face-to-face behavioral networks. Journal of theoretical
biology, 271(1):166–180, 2011.
[26] U. Kang and C. Faloutsos. Beyond’caveman
communities’: Hubs and spokes for graph compression
[27] C. Karande, K. Chellapilla, and R. Andersen. Speeding
up algorithms on compressed web graphs. In WSDM
’09: Proceedings of the Second ACM International
Conference on Web Search and Data Mining, pages
272–281, New York, NY, USA, 2009. ACM.
[28] S. Khot. Improved inapproximability results for
maxclique, chromatic number and approximate graph
coloring. In FOCS, pages 600–, 2001.
[29] J. Konc and D. Janezic. An improved branch and
bound algorithm for the maximum clique problem.
proteins, 4:5, 2007.
[30] H. Kwak, C. Lee, H. Park, and S. Moon. What is
Twitter, a social network or a news media? In WWW,
pages 591–600, 2010.
[31] J. Leskovec, D. Huttenlocher, and J. Kleinberg.
Predicting positive and negative links in online social
networks. In WWW, pages 641–650, 2010.
[32] J. Leskovec, K. Lang, A. Dasgupta, and M. Mahoney.
Community structure in large networks: Natural cluster
sizes and the absence of large well-defined clusters.
Internet Mathematics, 6(1):29–123, 2009.
[33] C. McCreesh and P. Prosser. Multi-threading a
state-of-the-art maximum clique algorithm. Algorithms,
6(4):618–635, 2013.
[34] V. Nicosia, J. Tang, M. Musolesi, G. Russo, C. Mascolo,
and V. Latora. Components in time-varying graphs.
Chaos, 22(2):023101, 2012.
[35] T. Opsahl and P. Panzarasa. Clustering in weighted
networks. Social networks, 31(2):155–163, 2009.
[36] P. R. J. Ostergard. A fast algorithm for the maximum
clique problem. Disc. Appl. Math., 120:197–207, 2002.
[37] R. K. Pan and J. Saramaki. Path lengths, correlations,
and centrality in temporal networks. arXiv, page
1101.5913v2, 2011.
[38] P. M. Pardalos and J. Xue. The maximum clique
problem. J. of Global Opt., 4(3):301–328, 1994.
[39] B. Pattabiraman, M. M. A. Patwary, A. H.
Gebremedhin, W. keng Liao, and A. Choudhary. Fast
algorithms for the maximum clique problem on massive
sparse graphs. In WAW13: 10th Workshop on
Algorithms and Models for the Web Graph, 2013.
[40] P. Prosser. Exact algorithms for maximum clique: A
computational study. arXiv:1207.4616v1, 2012.
[41] P. San Segundo, D. Rodr´ıguez-Losada, and A. Jim´enez.
An exact bit-parallel algorithm for the maximum clique
problem. Comput. Oper. Res., 38:571–581, 2011.
[42] M. Schmidt, N. Samatova, K. Thomas, and B. Park. A
scalable, parallel algorithm for maximal clique
enumeration. Journal of Parallel and Distributed
Computing, 69(4):417–428, 2009.
[43] S. Seidman. Network structure and minimum degree.
Social networks, 5(3):269–287, 1983.
[44] R. Singh, J. Xu, and B. Berger. Global alignment of
multiple protein interaction networks with application
to functional orthology detection. PNAS,
105(35):12763–12768, 2008.
[45] SocioPatterns. Infectious contact networks.
http://www.sociopatterns.org/datasets/. Accessed
09/12/12.
[46] E. Tomita and T. Kameda. An efficient
branch-and-bound algorithm for finding a maximum
clique with computational experiments. J. of Global
Optimization, 37(1):95–111, 2007.
[47] E. Tomita, A. Tanaka, and H. Takahashi. The
worst-case time complexity for generating all maximal
cliques and computational experiments. Theoretical
Computer Science, 363(1):28–42, 2006.
[48] A. Traud, P. Mucha, and M. Porter. Social structure of
facebook networks. Physica A: Statistical Mechanics
and its Applications, 2011.
10
[49] M. A. Trick and D. S. Johnson, editors. Cliques,
Coloring, and Satisfiability: Second DIMACS
Implementation Challenge. AMS, 1996.
[50] C. Wilson, B. Boe, A. Sala, K. P. Puttaswamy, and
B. Y. Zhao. User interactions in social networks and
their implications. In EuroSys, pages 205–218, 2009.
[51] J. Xiang, C. Guo, and A. Aboulnaga. Scalable
maximum clique computation using mapreduce. In
Conference on Data Engineering (ICDE), pages 74–85.
IEEE, 2013.
[52] Y. Xie and P. S. Yu. Max-clique: A top-down
graph-based approach to frequent pattern mining. In
ICDM, pages 1139–1144, 2010.
11
|
1808.09600 | 1 | 1808 | 2018-08-29T01:33:21 | The Remarkable Benefit of User-Level Aggregation for Lexical-based Population-Level Predictions | [
"cs.SI",
"cs.CY"
] | Nowcasting based on social media text promises to provide unobtrusive and near real-time predictions of community-level outcomes. These outcomes are typically regarding people, but the data is often aggregated without regard to users in the Twitter populations of each community. This paper describes a simple yet effective method for building community-level models using Twitter language aggregated by user. Results on four different U.S. county-level tasks, spanning demographic, health, and psychological outcomes show large and consistent improvements in prediction accuracies (e.g. from Pearson r=.73 to .82 for median income prediction or r=.37 to .47 for life satisfaction prediction) over the standard approach of aggregating all tweets. We make our aggregated and anonymized community-level data, derived from 37 billion tweets -- over 1 billion of which were mapped to counties, available for research. | cs.SI | cs |
The Remarkable Benefit of User-Level Aggregation for Lexical-based
Population-Level Predictions
Salvatore Giorgi1 Daniel Preot¸iuc-Pietro2 Anneke Buffone1
Daniel Rieman1 Lyle H. Ungar2 and H. Andrew Schwartz3
1Department of Psychology, University of Pennsylvania
2Computer and Information Science, University of Pennsylvania
3Computer Science, Stony Brook University
[email protected]
Abstract
Nowcasting based on social media text
promises to provide unobtrusive and near
real-time predictions of community-level out-
comes.
These outcomes are typically re-
garding people, but the data is often aggre-
gated without regard to users in the Twitter
populations of each community. This paper
describes a simple yet effective method for
building community-level models using Twit-
ter language aggregated by user. Results on
four different U.S. county-level tasks, span-
ning demographic, health, and psychological
outcomes show large and consistent improve-
ments in prediction accuracies (e.g. from Pear-
son r = .73 to .82 for median income pre-
diction or r = .37 to .47 for life satisfac-
tion prediction) over the standard approach of
aggregating all tweets. We make our aggre-
gated and anonymized community-level data,
derived from 37 billion tweets -- over 1 billion
of which were mapped to counties, available
for research.
1 Introduction
health
Social media is an increasingly popular resource
for
large-scale population assessment which
promises a cheap and non-intrusive complement
to standard surveys with finer spatio-temporal
scales (Coppersmith et al., 2015; Mowery et al.,
2016; Wang et al., 2017).
Twitter has been
things -- to measure
used -- among other
2011;
community
Mowery et al., 2016; Eichstaedt et al., 2015),
well-being (Schwartz et al., 2013), and public
(O'Connor et al., 2010;
opinion on politics
Miranda Filho et al., 2015). By having access
to measurements
from multiple locations or
communities, models trained on text data from
social media can be used both to predict future
measurements and to provide community esti-
mates where these are lacking or are not robust.
(Paul and Dredze,
Such research is made possible by the massive
amount of easily accessible user-generated data
from public social media.
However, there has been little research on the
way in which such data should be aggregated
in order to compute community-level lexical fea-
ture estimates. Typically, data are aggregated in
a "bag of words" style, disregarding tweets and
authors (Culotta, 2014a; Schwartz et al., 2013;
Eichstaedt et al., 2015; Curtis et al., 2018). We
find, however, that giving equal weight to each
user, rather than to each word or tweet, yields
much more accurate community-level predictions.
In this paper, we conduct a series of experi-
ments testing various simple yet intuitive aggre-
gation methods. We show that choice of aggrega-
tion methods can result in substantial (one might
even say "remarkable") boosts in accuracy when
predicting U.S. county level outcomes (e.g. user-
to-county aggregation yields a 7% to 27% increase
in Pearson correlation). Contributions include (a)
validation of aggregation approaches across four
outcomes related to health, psychology, and demo-
graphics, (b) validation that aggregation has some
effect on smaller sample of Twitter data, (c) show
the effect of power tweeters (or "super users") and
(d) release of resource-intensive community ag-
gregated lexical data.
Related work. This is the first work we know
of to explore simple aggregation techniques for
population-level prediction tasks from language.
Previous work has explored more sophisticated
adjustments, such as addressing demographic-self
selection bias in Twitter community predictions
by re-weighting messages, finding small improve-
ments (a 4.5% reduction in symmetric mean ab-
solute percentage error) (Culotta, 2014b).
In a
political voting intention prediction application,
(Lampos et al., 2013) modeled users and words
jointly by learning separate regression weights
for the two dimensions based on the intuition
that each user contributes differently towards the
outcome. However,
their model was specifi-
cally adapted to problems that use time-series
outcomes, rather than community-level aggrega-
tion. Distributions of lexical features are con-
sidered at multiple levels of analysis (message,
user and community) in (Almodaresi et al., 2017)
though each level considers one type of aggre-
gation. Similar aggregation methods have been
used in the context of topic modeling (Latent
Dirichlet Allocation (Blei et al., 2003) and Au-
thor Topic Model (Rosen-Zvi et al., 2004)) by
considering user, hashtag and conversation level
aggregations (Alvarez-Melis and Saveski, 2016;
Hong and Davison, 2010) but, again, community
level aggregation and prediction tasks were not
considered.
2 Data
Research was reviewed by an academic institu-
tional review board and deemed exempt.
2.1 Twitter Data Collection
Twitter Sample A random 10% sample of the
entire Twitter stream ('GardenHose') was col-
lected between July 2009 and April 2014, which
was then supplemented with a random 1% sam-
ple from May 2014 to February 2015. The total
sample contains approximately 37.6 billion tweets
(Preotiuc-Pietro et al., 2012).
County Mapping In order to map each tweet to
a location within a county in the United States, we
use both self-reported location information in user
profiles and latitude/longitude coordinates associ-
ated with a tweet. If latitude/longitude coordinates
are present then we trivially map the tweet to a
county. The self-reported location information is a
free text field and we use a cascading set of rules to
map this field to a county. The rules are designed
to avoid false positives (incorrect mappings) at the
expense of fewer mappings. The full details of this
process can be found in (Schwartz et al., 2013).
Note that the latitude/longitude coordinates are a
tweet attribute whereas the self-reported location
is a user attribute yet both are used to map tweets
to counties. Users are assigned a county by con-
sidering their earliest county mapped tweet.
In total, we are able to map 1.78 billion
of the 37.6 billion tweets to a US county us-
Full
Sample
10% 37.6B
1%
-
Number of Tweets
County
Mapped
1.78B
English∗
1.64B
199M
-
Number
User
of
Level∗∗
Users
1.53B
5.25M
131M 1.57M
Table 1: Number of tweets in each section of the
resource, including the total number of users. (*)
The number of tweets used in the "all" experi-
ments; (**) the number of tweets in the remaining
experiments.
ing the above-mentioned method. The county
mapped data set was then filtered to contain
only English tweets using the popular langid.py
method (Lui and Baldwin, 2012), further reduc-
ing our tweet set to 1.64 billion tweets. For ex-
periments with user-level data aggregation, we re-
moved users who made relatively few (less than
30) posts in our data set.
Publicly Available Stream The standard pub-
licly available Twitter stream outputs approxi-
mately 1% of the public Tweet volume. Since a
10% sample is not available to most researchers,
we replicated a 1% sample by taking a random
10% of our county mapped, English filtered 10%
sample. The same process of county mapping, lan-
guage filtering and user selection was applied to
this data resulting in 131 million county mapped
English tweets from 1.57 millions users. Table 1
presents the data set statistics.
The County Tweet Lexical Bank The County
Tweet Lexical Bank is a U.S. County level data
set comprised of two feature sets1 :
• an aggregated "bag-of-words" count vector
across all the county's messages in order to pre-
serve anonymity. The unigrams represent the
most frequent words in the data set;2 ;
• a
"bag-of-topics"
each
county, with 2000 social media-derived topics
described in (Schwartz et al., 2013).
representation for
Both feature sets will be releases across the 2009-
2015 time span as well as individual years. Yearly
updates will be included as they become available.
As we are only releasing aggregated word-level
features, as opposed to raw Tweets, this data re-
lease is within Twitter's Terms of Service.
1Available at https://github.com/wwbp
2While 25,000 features were used in the predictive tasks
we removed some features (@-mentions, URLs, etc.) from
the data release to preserve anonymity.
Income
Educat.
Life Satis.
Heart Dis.
N
1750
1750
1952
2041
Mean
4.66
21.57
3.39
186.66
Std Dev Min
4.33
5.70
3.26
54.82
0.11
9.46
0.03
45.59
Max
5.07
70.30
3.51
412.32
Skew
0.47
1.20
0.02
0.66
Table 2: Descriptives of U.S. County data used in
the four prediction tasks.
2.2 Outcomes
The following U.S. county demographic, psycho-
logical and health variables were used in our pre-
diction tasks. Table 2 gives statistics for each
county variable.
census
Income and Education The
data
for county median household income (log-
transformed to reduce skewness; N =1,750) and
percentage of people with a Bachelor's degree
(N =1,750) were obtained from the 2010 U.S.
Census Bureau's American Community Survey
(ACS).
Life Satisfaction To assess subjective well-
being we used the average response to the ques-
tion "In general, how satisfied are you with in
your life?" (1 = very dissatisfied and 5 = very sat-
isfied) (Lawless and Lucas, 2011). Estimates are
averaged across 2009 and 2010 (N =1,952).
Mortality Rates From the Centers of Dis-
ease Control and Prevention (CDC) we collected
age-adjusted mortality rates for heart disease
(N =2,041). Rates are averaged across 2010-2015.
3 Methods
3.1 Aggregation
Our aim is to use the user-level information based
on the assumption that aggregating data first at
the user-level would remove biases introduced by
non-standard users of the platform. To this end,
we explore three types of aggregation: (1) tweet
to county, (2) county "bag of words" and (3) user
to county.
Tweet to County Here we compute
feati,j =
1
Nj
X
k
1i(unigramk),
(1)
unigram was mentioned divided by Nj the total
number of tweets from county j.
County Next, we use a method which was
generally used in past research, which aggre-
gates all messages to a community disregard-
ing any meta-data,
including tweet or user in-
formation. Previous state-of-the-art results us-
ing this method include life satisfaction r = .31
(Schwartz et al., 2013), atheroclerotic heart dis-
ease r = .42 (Eichstaedt et al., 2015) and education
r = 0.15 (Culotta, 2014b). We therefore consider
each county a "bag of words" using (1) with Nj
equal to the number of unigrams from county j.
User to County The third method treats the unit
of analysis (U.S. county) as a community of users.
Therefore, feature weights are extracted at the user
level, normalized and then averaged to communi-
ties:
feati,j =
1
Nj
X
k∈Uj
rk(unigrami),
(2)
where Uj is the set of users in county j, Nj is
the total number of Twitter users in county j and
rk(x) is the relative frequency of feature x for user
k with i ∈ {all unigrams} and j ∈ {all counties}.
Features
We use as features a list of 2,000 social media-
derived topics generated from Latent Dirichlet
Allocation (Blei et al., 2003) using the complete
MyPersonality Facebook data set consisting of
approximately 15 million posts (Schwartz et al.,
2013). The topic loadings are computed from the
most frequent 25,000 unigrams in our data set. We
also use a subset of these unigrams as additional
features in our models (25,000 reduced to 10,000).
Experimental setup
For each of the four county level Census and
health variables we built three models using 10-
fold cross validation with the following features:
(1) unigrams, (2) topics and (3) unigrams + top-
ics. For consistency across tasks we only consid-
ered counties with 100 or more 30+ tweet users
(N =2,041).
where 1i denotes the indicator
function for
unigrami. Here the ith feature for the jth unit of
analysis (a U.S. county) is equal to the relative fre-
quency of the unigram: the number of times each
We used a feature selection pipeline which first
removed all low variance features and then fea-
tures that were not correlated with our census and
health data. Principal component analysis was
Income Educat.
Life
Satis.
Heart
Disease
Tweet to County
County
User to County
.68
.73
.82
.80
.80
.88
.26
.37
.47
.70
.70
.75
(a) Unigrams + Topics, Pearson r
Income Educat.
Life
Satis.
Heart
Disease
Tweet to County
County
User to County
.67
.72
.79
.79
.78
.87
.22
.37
.44
.65
.64
.73
(b) Unigrams, Pearson r
Income Educat.
Life
Satis.
Heart
Disease
Tweet to County
County
User to County
.65
.68
.81
.77
.80
.87
.31
.34
.47
.71
.71
.76
(c) Topics, Pearson r
Table 3: Prediction results (Pearson r) for direct
aggregation comparison on the 10% sample.
then applied to the reduced feature set for fur-
ther dimensionality reduction. This preprocess-
ing was used to avoid overfitting, since our model
included more independent variables (2000 topic
frequencies and/or 10k unigrams) than observa-
tions (at most 2,041 counties). For the prediction
task we used linear regression with ℓ2 regulariza-
tion (Ridge regression) (Eichstaedt et al., 2015).
The regression regularization parameter α was set
to 1000 using grid search.
Because our initial dataset consisted of 37.6
billion tweets, using distributed IO was crucial
for data aggregation and feature extraction. We
used a Hadoop-style cluster consisting of 64 disks
and 64 CPU cores across 8 physical machines.
Over this cluster, we used Hadoop MapReduce for
the county mapping step (taking approximately 1
week of wall clock runtime) and Spark for the fea-
ture aggregations (taking approximately 1 day of
wall clock runtime). The entire pipeline of county
mapping, English language filtering, feature ex-
traction and prediction used the DLATK Python
package (Schwartz et al., 2017)3.
Experiments
Using the above setup we perform 3 experiments
in order to explore the effects of data aggregation.
We 1) directly compare aggregation methods us-
3Available at https://github.com/dlatk
User to County
Nuser−tweets
Tweet to County (all)
County (all)
Nall−tweets
Income Educat.
.82
.88
Life
Satis.
.47
Heart
Disease
.75
1.350B 1.350B 1.356B 1.360B
.72
.73
.81
.82
.36
.31
.71
.72
1.621B 1.621B 1.628B 1.634B
Table 4: Prediction results (Pearson r, using uni-
grams + topics) using full 10% data vs. users with
30+ tweets. The number of tweets used in each
task is listed to highlight the fact that the "User to
County" tasks use less tweets than the "all" tasks.
ing our 10% data; 2) compare aggregation meth-
ods using a 1% sample and, finally, 3) explore the
effect of choosing an upper bound on the number
of posts per Twitter users, looking at users with
less than 50, 500, 1000 posts. This allows us to
exclude frequent posters who are potentially orga-
nizations or bots.
4 Results and Discussion
Direct aggregation comparison. The results of
our predictive experiments on the 10% data can
be found in Table 3. Across all four tasks we see
that the "User to County" approach outperforms
the other aggregation methods, giving a higher
Pearson r and obtaining state-of-the-art results for
community-level predictions.
We see the largest gains for the "User to
County" aggregation for the income outcome,
with a 13 point increase in Pearson r for topics
alone and a 9 point increase for unigrams + topics.
In Table 4 we remove the 30+ tweet requirement
from the "Tweet to County" and "County" meth-
ods and compare against the "User to County"
method (with the 30+ tweet requirement). Again
we see the "User to County" method outperforms
all others in spite of the fact that the "User to
County" approach uses less data than both "all"
approaches, which contains
108 million more
tweets.
1% data.
In Table 5 we repeat the above ex-
periment on a 1% Twitter sample. Here we see
that the "User to County" method outperforms
both the "Tweet to County" and "County" meth-
ods (with all three tasks using the same number of
tweets). When we compare the "User to County"
and "County (all)" methods we see the "User to
county" outperforming on two out of four tasks
(Income and Life Satisfaction). Again, we note
Income
Educat.
Life
Satis.
Heart
Disease
.71
.70
.76
.62
.60
.70
.77
.76
.79
.71
.67
.74
.35
.32
.39
.32
.28
.28
.64
.62
.66
.63
.62
.66
127M 130M 127M 130M 127M 130M 127M 131M
.75
.67
.83
.77
.37
.34
.68
.66
191M 195M 191M 195M 191M 197M 191M 198M
2041∗
949
1750∗
1952∗
960
949
1750∗
954
Tweet to County
County
User to County
Nuser−tweets
County (all)
Nall−tweets
Ncounties
Table 5: 1% sample prediction results (Pearson r) using topics + unigrams. ∗ same counties as the 10%
prediction task.
Max
Tweets
50
500
1000
No Max
50
500
1000
No Max
y
t
n
u
o
C
)
l
l
a
(
o
t
r
e
s
U
y
t
n
u
o
C
Income Educat.
Life
Satis.
Heart
Disease
.73
.81
.81
.73
.68
.80
.81
.81
.84
.87
.87
.82
.80
.87
.87
.87
.34
.44
.41
.31
.34
.47
.47
.48
.68
.75
.75
.72
.64
.76
.76
.76
Num. Users
Removed
4,665,114
611,661
217,517
-
4,665,114
611,661
217,517
-
beneficial if they are just treated such that they
can't dominate a community. This highlights the
benefit of our simple method: we do not need to
consider optimizations which may not generalize
across data, such as upper-bound thresholds on
the number of tweets per user. Further, the user-
to-county aggregation seems to provide at least a
small benefit beyond removal of super users.
Table 6: Prediction results (Pearson r) using topics
+ unigrams. Users with more than "Max Tweets"
number of tweets are removed from the sample.
5 Conclusion
that the "User to County" is using less data than
the "County (all)". While, across the board, the
performance increase is not as substantial as in the
10% results, we see comparable performance be-
tween "User to County" and "County (all)" meth-
ods despite the difference in the number of tweets.
Super users. One theory why we see such large
gains depending on aggregation technique is that
aggregating through users negates the effects of
super users -- those who post an extraordinary
amount (such as organizations or bots). We im-
plemented a maximum tweet requirement in or-
der to remove these users and see if that accounts
for the difference. Here we use both the "User to
County" and "County (all)" samples and report re-
sults in Table 6. These results demonstrate that
by keeping only users with less than 500 tweets
we get results close to our "User to County (No
Max)" method using the user-naive "County (all)"
scheme. This shows that relatively few users (in
this case 611k) can significantly decrease perfor-
mance, though still leaves a small gain from the
user to county approach. As seen in the lower half
of the table, this thresholding does not increase
performance when using the "User to County"
method, which suggests such users can still be
This study explored the benefit of aggregation
techniques for streaming user-generated data from
individual messages to community level data, the
typical setting for nowcasting. We showed that
by simply aggregating to users first and then tak-
ing the mean within a county, we can obtain
large gains (remarkably, up to a 13 point increase
in Pearson correlation) over typical aggregation
methods common in past work. In order to foster
nowcasting research utilizing this more ideal ag-
gregation, we will release the County Tweet Lex-
ical Bank -- a large aggregated and anonymized
county-level data set, and computed on more than
1.6 billion tweets posted over 5 years.
Future work in this area can look at adjust-
ing models to account for other meta-data such
as temporal variation and diversity and to ad-
just for selection biases present
in social me-
dia, where the user base on social media is not
representative of the population of the commu-
nity (Greenwood et al., 2016).
Acknowledgments
This work was supported by a grant from the Tem-
pleton Religion Trust (ID #TRT0048). The fun-
ders had no role in study design, data collection
and analysis, decision to publish, or preparation of
the manuscript.
References
Fatemeh Almodaresi, Lyle H. Ungar, Vivek Kulkarni,
Mohsen Zakeri, Salvatore Giorgi, and H. Andrew
Schwartz. 2017. On the Distribution of Lexical Fea-
tures in Social Media. In Annual Meeting of the As-
sociation for Computational Linguistics, ACL.
David Alvarez-Melis and Martin Saveski. 2016. Topic
modeling in twitter: Aggregating tweets by conver-
sations. ICWSM, 2016:519 -- 522.
David M Blei, Andrew Y Ng, and Michael I Jordan.
2003. Latent dirichlet allocation. Journal of ma-
chine Learning research, 3(Jan):993 -- 1022.
Glen Coppersmith, Mark Dredze, Craig Harman, and
Kristy Hollingshead. 2015. From adhd to sad: An-
alyzing the language of mental health on twitter
through self-reported diagnoses.
Aron Culotta. 2014a. Estimating county health statis-
tics with twitter.
In Proceedings of the 32nd an-
nual ACM conference on Human factors in comput-
ing systems, pages 1335 -- 1344. ACM.
Aron Culotta. 2014b. Reducing Sampling Bias in So-
In
cial Media Data for County Health Inference.
Joint Statistical Meetings Proceedings.
Brenda Curtis, Salvatore Giorgi, Anneke E. K. Buf-
fone, Lyle H. Ungar, Robert D. Ashford, Jessie
Hemmons, Dan Summers, Casey Hamilton, and
H. Andrew Schwartz. 2018. Can twitter be used to
predict county excessive alcohol consumption rates?
PLOS ONE, 13(4):1 -- 16.
Johannes C Eichstaedt, H Andrew Schwartz, Mar-
garet L Kern, Gregory Park, Darwin R Labarthe,
Raina M Merchant, Sneha Jha, Megha Agrawal,
Lukasz A Dziurzynski, Maarten Sap, Christopher
Weeg, Emily E Larson, Lyle H Ungar, and Mar-
tin EP Seligman. 2015. Psychological language on
Twitter predicts county-level heart disease mortality.
Psychological Science, 26:159 -- 169.
Shannon Greenwood, Andrew Perrin, and Maeve Dug-
gan. 2016. Social Media Update. Pew Research
Center.
Liangjie Hong and Brian D Davison. 2010. Empirical
study of topic modeling in twitter. In Proceedings of
the first workshop on social media analytics, pages
80 -- 88. ACM.
Vasileios Lampos, Danie Preot¸iuc-Pietro, and Trevor
Cohn. 2013. A User-Centric Model of Voting In-
tention from Social Media.
In Proceedings of the
51st Annual Meeting of the Association for Compu-
tational Linguistics, ACL.
Nicole M Lawless and Richard E Lucas. 2011. Predic-
tors of regional well-being: A county level analysis.
Social Indicators Research, 101(3):341 -- 357.
Marco Lui and Timothy Baldwin. 2012. langid. py: An
In Pro-
off-the-shelf language identification tool.
ceedings of the ACL 2012 system demonstrations,
pages 25 -- 30. Association for Computational Lin-
guistics.
Renato Miranda Filho,
Jussara M Almeida, and
Gisele L Pappa. 2015. Twitter population sample
bias and its impact on predictive outcomes: a case
study on elections. In Advances in Social Networks
Analysis and Mining (ASONAM), 2015 IEEE/ACM
International Conference on, pages 1254 -- 1261.
IEEE.
Danielle Mowery, Albert Park, Mike Conway, and
Craig Bryan. 2016. Towards automatically classify-
ing depressive symptoms from twitter data for pop-
ulation health.
Brendan O'Connor, Ramnath Balasubramanyan,
Bryan R Routledge, and Noah A Smith. 2010. From
tweets to polls: Linking text sentiment to public
opinion time series. ICWSM, 11(122-129):1 -- 2.
Michael J. Paul and Mark Dredze. 2011. You are
what you tweet: Analyzing twitter for public health.
In International Conference on Weblogs and Social
Media (ICWSM), pages 265 -- 272.
Daniel Preotiuc-Pietro, Sina Samangooei, Trevor
Cohn, Nicholas Gibbins, and Mahesan Niranjan.
2012. Trendminer: An architecture for real time
analysis of social media text. In In Proceedings of
the 6th International AAAI Conference on Weblogs
and Social Media, Workshop on Real-Time Analysis
and Mining of Social Streams, ICWSM.
Michal Rosen-Zvi, Thomas Griffiths, Mark Steyvers,
and Padhraic Smyth. 2004. The author-topic model
for authors and documents.
In Proceedings of the
20th conference on Uncertainty in artificial intelli-
gence, pages 487 -- 494. AUAI Press.
H Andrew Schwartz, Johannes C Eichstaedt, Mar-
garet L Kern, Lukasz Dziurzynski, Richard E Lu-
cas, Megha Agrawal, Gregory J Park, Shrinidhi K
Lakshmikanth, Sneha Jha, Martin E P Seligman,
and Lyle H Ungar. 2013. Characterizing geographic
variation in well-being using tweets.
In Proceed-
ings of the 7th International AAAI Conference on
Weblogs and Social Media, ICWSM.
H Andrew Schwartz, Salvatore Giorgi, Maarten Sap,
Patrick Crutchley, Lyle Ungar, and Johannes Eich-
staedt. 2017. Dlatk: Differential language analysis
toolkit. In Proceedings of the 2017 Conference on
Empirical Methods in Natural Language Process-
ing: System Demonstrations, pages 55 -- 60.
Tao Wang, Markus Brede, Antonella Ianni, and Em-
manouil Mentzakis. 2017. Detecting and character-
izing eating-disorder communities on social media.
In Proceedings of the Tenth ACM International Con-
ference on Web Search and Data Mining, pages 91 --
100. ACM.
|
1112.2460 | 1 | 1112 | 2011-12-12T07:22:48 | Social Capital and Individual Performance: A Study of Academic Collaboration | [
"cs.SI",
"cs.IR",
"physics.soc-ph"
] | Studies on social networks highlight the importance of network structure or structural properties of a given network and its impact on performance outcome. One of the important properties of this network structure is referred as "social capital" which is the "network of contacts" and the associated values attached to these networks of contacts. In this study, our aim is to provide empirical evidence of the influence of social capital and performance within the context of academic collaboration. We suggest that the collaborative process involves social capital embedded within relationships and network structures among direct co-authors. Thus, we examine whether scholars' social capital is associated with their citation-based performance, using co-authorship and citation data. In order to test and validate our proposed hypotheses, we extract publication records from Scopus having "information science" in their title or keywords or abstracts during 2001 and 2010. To overcome the limitations of traditional social network metrics for measuring the influence of scholars' social capital within their co-authorship network, we extend the traditional social network metrics by proposing a new measure (Power-Diversity Index). We then use Spearman's correlation rank test to examine the association between scholars' social capital measures and their citation-based performance. Results suggest that research performance of authors is positively correlated with their social capital measures. This study highlights that the Power-diversity Index, which is introduced as a new hybrid centrality measure, serves as an indicator of power and influence of an individual's ability to control communication and information. | cs.SI | cs | (Submitted to JASIST)
Social Capital and Individual Performance: A Study of Academic
Collaboration
Abstract
Studies on social networks highlight the importance of network structure or structural properties of a given network and it s
impact on performance outcome. The empirical validation of the association between network structures and performance has
been well documented in a number of recent studies. One of the important properties of this network structure is referred as
“social capital” which is the “network of contacts” and the associated values attached to these networks of contacts. There are
very few systematic empirical studies suggesting a role of co-authors, as social capital in their scientific collaboration
network and their effect on performance. In this study, our aim is to provide empirical evidence of the influence of social
capital and performance within the context of academic collaboration. We suggest that the collaborative process involves
social capital embedded within relationships and network structures among direct co-authors. Thus, we examine whether
scholars’ social capital is associated with their citation-based performance, using co-authorship and citation data. In order to
test and validate our proposed hypotheses, we extract publication records from Scopus having “information science” in their
title or keywords or abstracts during 2001 and 2010. To overcome the limitations of traditional social network metrics for
measuring the influence of scholars’ social capital within their co-authorship network, we extend the traditional social
network metrics by proposing a new measure (Power-Diversity Index). We then use Spearman’s correlation rank test to
examine the association between scholars’ social capital measures and their citation-based performance. Results suggest that
research performance of authors is positively correlated with their social capital measures. This study highlights the
importance of scholars’ social capital characteristics on their performance suggesting stronger links to more power ful
contacts will lead to better performance and , therefore, their respective professional social network shows indicative
outcomes to evaluate and predict the performance of scholars. It further highlights that the Power-diversity Index, which is
introduced as a new hybrid centrality measure, serves as an indicator of power and influence of an individual’s ability to
control communication and information.
Keywords
Social capital, social network analysis, co-authorship analysis, individual performance power-diversity.
1. Introduction
Prominent sociologists such as Burt (1992), Coleman (1988) and Granovetter (1973) claim that
personal attributes are not only the effective factor leading to the success of actors‟ performance, but the
extent of social capital accumulated in their respective networks is more significant (Oh, Choi, & Kim,
2006). Social capital produces benefits or outcomes for individual and collective actors , which is
generated through structural sources (Burt, 1992). The core idea of social capital is that a person‟s (or a
group of people‟s) associates (e.g., family members, friends, colleagues) form an important asset that
can be used to gain optimal performance (Woolcock & Narayan, 2000).
The concept of social capital provides a useful and comprehensive conceptual perspective (Sawyer,
Crowston, & Wigand, 1999; Tsai & Ghoshal, 1998) for understanding social capital and value creation
1
within a networking context. Accordingly, social capital means “the set of social resources embedded in
relationships” (Tsai & Ghoshal, 1998, p. 464). Social capital has three components: structural, relational,
and cognitive (Tsai & Ghoshal, 1998; Wellman, 1988). The structural dimension involves social
interaction that the actor uses to gain access, information, or resources. The relational dimension
encompasses aspects that arise from the interactions (including trust and loyalty). The cognitive
dimension includes attributes such as shared norms, codes of action, and convergence of views. Our
research suggests that conceptualizing social capital in terms of network structures, such as articulated
by the strength of weak ties theory (Granovetter, 1973, 1983), provides valuable insight into scholars‟
co-authorship activities.
In most large organizations, performance of individuals and teams are measured through a set of
metrics that pertain to task and contextual performance. Similarly in academia, scholars and scientists
are evaluated based on their academic performance (e.g., research productivity, teaching evaluations,
governance capabilities, achieved grants). Such evaluation of scholars is not only needed for faculty
recruitment and promotion schemes, but also for governmental funding allocation and for achieving a
high reputation within the research community. The reputation of research organizations indirectly
affects society‟s welfare, since high reputation attracts foreign purchases, foreign investments, and
highly qualified students from around the world (Abbasi, Altmann, & Hwang, 2010).
The implication of such evaluation and ranking provides the basis for governmental funding thus
encouraging high research standards and goals. Therefore, on a global level, with respect to
governmental funding (i.e., the allocation of funding for a specific project to a scientific research group)
and university strategy, it is important to identify key scholars, collaboration areas and research
strengths within universities with the aim of maximizing research output, cost optimization, and
resource utilization.
Since individuals have limited capacity to acquire and use knowledge, their interactions with others
are necessary for knowledge creation (Demsetz, 1991), which usually appears in the form of publishing
papers. Therefore, many scientific outputs are the result of collaborative work and most research
projects are too large for an individual researcher to perform alone. This, in turn, leads to large scale
scientific collaboration. However, having scholars with different skills, expertise and knowledge, as
human capital, in group work is needed (McFadyen, Semadeni, & Cannella, 2009). Diversity of actors
involved in group work facilitates the integration of expertise, contributes to successful projects‟
implementation and accelerates cycle time for new product development (Cummings, 2004; Eisenhardt
& Tabrizi, 1995; Griffin & Hauser, 1992; Pinto, Pinto, & Prescott, 1993), but having a basic shared
understanding of each other‟s knowledge and expertise is necessary to have a shared understanding
about the whole project or research.
The co-authorship network is a form of collaboration network among scholars that represents their
scientific interactions and collective action to conduct research and produce the results as a form of a
publication. Therefore, social norms and trust build among scholars, through their collaborations over
time, are a form of social capital for academia. In other words, when researchers collaborate on projects,
they do share substantial amounts of knowledge. This flow of knowledge, during research collaboration,
2
becomes a stock of knowledge, which mutually benefits the researchers not only in their respective
future projects (Dierickx & Cool, 1989), but also in the current research by gaining new knowledge and
reputation. Therefore, social capital resulting in collaboration networks can be used to explain the
concept of knowledge capital (Oh et al., 2006).
In order to quantify and highlight the importance of academic collaboration activities, studies exist
that measure these not only using bibliometric indicators such as Rc-Index (Abbasi et al., 2010), but also
social network measures (Abbasi & Altmann, 2011; Abbasi, Altmann, & Hossain, 2011; Takeda, Truex
III, & Cuellar, 2010; Yan & Ding, 2009; Zhuge & Zhang, 2010). These studies have shown the
applicability of social network measures (e.g., centrality measures) for co-authorship networks to
indicate how centrality measures (as a proxy for scholars‟ collaboration activity) are useful to reflect
scholars‟ performance based on their position and influence within their collaboration network. Here,
also in another attempt to assert the importance of co-authors‟ role and position in their collaboration
network, we evaluate a co-authorship network and propose measures for scholars‟ social capital. We
highlight the proposed measure which better reflects scholars‟ social capital having higher correlation
with their citation-based performance (i.e., citation count and h-index).
The motivating questions for our study are: (i) How do we measure the concept of social capital of
scholars? (ii) Do scholars‟ social capital metrics associate with their performance? For our analysis at an
exploratory level, we use co-authorship and citation data obtained from the Scopus bibliometric database
looking for publication records having “information science” in their title or keywords or abstracts
during the time period of 2001 and 2010. This enables us to shape a co-authorship network of active
scholars in the field of “information science”.
In the following sections, we review the existing literature on social capital and network theories
leading to measures proposed for social capital and co-authorship and performance. In Section 3, we
explain our data collection method followed by our methodology and proposed measures to quantify
scholars‟ social capital. Then, the result of testing associations between scholars‟ social capital measures
and their performance is shown in the following section. We conclude the paper by discussing our
findings and research limitations in Section 5.
2. Social Capital and Network Theories
The concept of social capital has become increasingly popular in a wide range of social science
disciplines (e.g., political science, economics, and organizational science). Social capital has been used
as an important factor to explain actors‟ success in a number of areas (e.g., educational performance,
career success, product innovation, inter-firm learning, and real-estate sales) by social scientists. Hanifan
(1916) work on evaluating effect of community participation in enhancing school performance can be
considered as the first study on social capital. But Bourdieu‟s (1986; 1992) and Coleman‟s (1987, 1988,
1990) works on education and Putnam‟s (1993, 1995, 2001) works on civic engagement and institutional
performance are the main studies inspiring most of the current researches in social capital (Woolcock &
Narayan, 2000).
3
Bourdieu (1986) identified several forms of capital: Economic capital; cultural capital: which could
be embodied (in persons), objectified (e.g., in art), institutionalized (e.g., university degrees); Social
capital: resources grounded in durable exchange-based networks of persons; Symbolic capital:
manifestation of each of the other forms of capital when they are naturalized on their own terms.
Bourdieu and Wacquant (1992) defined social capital in detail as “the sum of the resources, actual or
virtual, that received by an individual (or a group) due to having a lasting network of more or less
institutionalized relationships of mutual acquaintance and recognition” (p. 119).
Coleman (1988), a sociologist interested in the role of social capital in human capital creation and
educational outcome (Narayan & Cassidy, 2001), defines social capital as a function of social structure
producing advantage: “It is not a single entity but a variety of different entities, with two elements in
common: they all consist of some aspect of social structures, and they facilitate certain actions of actors-
whether persons or corporate actors-within the structure.” (p. 598). Putnam (1993) also defined social
capital as “those features of social organization, such as trust, norms and networks that can improve the
efficiency of society by facilitating coordinated actions” (p. 167) or as “features of social life - networks,
norms and trust - that enable participants to act together more effectively to pursue shared objectives”
(Putnam, 1995) (pp. 664-665).
Coleman‟s (1988) definition regards social capital as one of the potential resources, which an actor
can use besides other resources such as human or cultural capital (their own skills and expertise),
physical capital (tools) and economic capital (money) (Gauntlett, 2011). He also highlighted the
importance of social capital effecting the creation of human capital. But social capital differs
fundamentally from other types of capital as it resides not in the objects themselves (e.g., people) but in
their relations with other objects. For instance, human capital represents individual attributes and
characteristics (e.g., attractiveness, intelligence, and skills). These assets are possessed by individuals
but social capital is embedded in the relationships among individuals (Shen, 2010).
Emphasizing social capital‟s function in different contexts, Portes (1998) defines social capital as
“the ability of actors to secure benefits by virtue of memberships in social networks or other social
structures” (p. 3). Furthermore, Adler and Kwon (2002) defined social capital as “the resources available
to actors as a function of their location in the structure of their social relations” (p. 18). They focus on
social capital as a resource that exists essentially (permanently) in the social network binding a central
actor to other actors.
In another approach, Lin (1982) in the author‟s social resource theory claimed power, status and
wealth as determinants of valued resources in most societies. Accessing and using social resources can
lead to better socioeconomic status and are determined by structural positions and use of ties. In
addition, some researchers defined social capital considering capital (attributes) individuals posses in a
network. For instance, Boxman et al. (1991) defined social capital as “the number of people who can be
expected to provide support and the resources those people have at their disposal” (p. 52) and Burt
(1992) defined as this concept as “friends, colleagues, and more general contacts through whom you
receive opportunities to use your financial and human capital” (p. 9) and also “the advantage created by
a person‟s location in a structure of relationships” (Burt, 2005) (p. 5). Therefore, from this point of view,
4
social capital can be evaluated by the amount or variety of such characteristics of other actors to whom
an actor has ties directly or indirectly (Lin, 1999). The core idea is that the actions of individuals (and
groups) can be greatly facilitated by their direct and indirect links to other actors in their respective
social networks (Adler & Kwon, 2002).
In the above definitions, the focus is on the sources (e.g., networks, norms and trust) rather than the
consequences of social capital. They considered different dimensions for social capital, namely bonding
and bridging (Woolcock & Narayan, 2000) taking into account valued social resources. On the bonding
views of social capital, the focus here is on collective actors‟ internal characteristics and ties structure
(Adler & Kwon, 2002). Therefore, the bonding view of social capital undergirds reciprocity and
solidarity, builds trust within the group and provides substantive and emotional support (Shen, 2010).
Bonding social capital is viewed as a property of a network (group of individuals), which is not the
focus of our study.
2.1. Individual’s Social Capital-Related Theories of Network
2.1.1. Tie Strength Theories
Granovetter (1973)‟s theory of the „strength of weak ties‟ argues that an individual obtains new and
novel information from weak ties rather than from strong ties within the individual‟s group structure.
Examining people looking for a job, Granovetter (1973) illustrated that there were two kinds of social
relationships: weak ties and strong ties. Contrary to popular belief, he found that the most successful job
seekers were not those with the strongest ties. On the contrary, because weak ties with acquaintances
provide a broader set of information and opportunities, they are more helpful during people‟s job search
than strong ties with family and friends.
The strength of a link between actors (interpersonal tie) in a network could be indicated and
measured by the amount of time the link has been established, the degree of emotional intensity, the
degree of intimacy, and reciprocal services (Granovetter, 1973). The interaction among the individual
creates opportunity for knowledge sharing and information exchange and is considered crucial in the
building trust among individuals.
On the other hand, Krackhardt (1992) showed that strong ties are important in the generation of trust.
He introduced the theory of „strength of strong ties‟ in contrast to Granovetter‟s (1973) theory. Levin
and Cross (2004) found that strong ties, more so than weak ties, lead to the receipt of useful knowledge
for improving performance in knowledge-intensive work areas. However, controlled for the dimension
of trust, the structural benefit of weak ties emerged in their research model. It suggests that the weak ties
provide access to non-redundant information. Weak ties facilitate faster project completion times, if the
project is simple. It enables faster search for useful knowledge among other organizational subunits.
Strong ties foster complex knowledge transfer, if knowledge is highly complex (Hansen, 1999; Reagans
& Zuckerman, 2001).
5
2.1.2. Structural Hole Theory
Burt (1992) argues that the structural configuration of an individual‟s social network, which provides
optimized “bridging” or “brokerage” position is what dictates structural advantages such as information
novelty and control. The basis for this argument leverages on the fact that maximizing the number of ties
(ego-network size), regardless of being weak or strong, in an individual‟s network does not necessarily
provide benefits. Furthermore, as an individual‟s personal network grows over time, the extent of
information coming from closely knit clusters tends to become redundant.
This is consistent with Freeman‟s (1979) approach to betweenness which is build around the concept
of „local dependency‟. Therefore, it could be seen that Burt‟s (1992) notion of structural holes built
further upon the assumption of betweenness centrality that advocated the idea of a brokerage position as
providing information and control benefits. In fact, he shifted focus from the network structure to
network position (Chung & Hossain, 2009).
Burt (1992) claimed that increasing the number of direct contacts (ego-network size) without
considering the diversity reached by the contacts makes the network inefficient in many ways.
Therefore, the number of non-redundant contacts is important to the extent that redundant contacts
would lead to the same people and, hence, provide the same information and control benefits. He
defined ego-network effectiveness as the number of clusters which the ego is connected to and can
obtain novel information and benefits (Burt, 1992).
A structural hole (hole in the network structure) is defined as lack of tie between any pair of actors in
the network. Network brokerage refers to the social structure where an actor builds connections across
structural holes (Burt, 2005) linking otherwise disconnected actors. Brokerage brings novel information
and opportunities, but the connections are too weak to provide emotional and substantive support. For
instance, in economic networks, producers that broker more structural holes were found to make better
profits from negotiating more favorable transactions with suppliers and customers (Burt, 1992). Within
organizations, individuals‟ mobility is enhanced by having an informational network rich in structural
holes (Podolny & Baron, 1997).
Thus, Burt (1992) capitalizes on his theory of structural holes by focusing on the importance of
structural position (e.g., brokerage) rather than structural properties (e.g., ego‟s network size). Therefore,
on this view of social capital as bridging, social capital can help explain the differential success of actors
(e.g., individuals and firms). Therefore, bridging social capital leads to a broad worldview, diversity in
opinions and resources, and information diffusion (Shen, 2010). Bridging view of social capital focuses
on a property of individuals (ego-network and not whole-network).
These views highlight the social network engagement as a prerequisite for social capital. Walker et al.
(1997) highlighted that “a social network structure is a vehicle for inducing cooperation through the
development of social capital” (p. 110). Therefore, in brief, social capital could be regarded as the value
of social networks, bonding similar people and bridging between diverse people, with norms of
reciprocity (Uslaner, 2001).
6
2.2. Measuring Individuals’ Social Capital
Measuring social capital is required in order to use it as a development tool. Although multi -
dimensionality (i.e., different levels and units of study) and dynamicity of social capital over time (due
to change of the social interaction over time) makes obtaining a single, true measure almost impossible
(Woolcock & Narayan, 2000) but several researchers proposed different metrics to measure social
capital.
Bourdieu‟s (1986) tool to quantify social capital is network size: “The volume of the social capital
possessed by a given agent thus depends on the size of the network of connections he/she can effectively
mobilize and on the volume of the capital (economic, cultural or symbolic) possessed in his/her own
right by each of those to whom he/she is connected” (p. 249). We should consider that while greater
network size is good but the quality of the individuals is crucial for social capital.
As explained earlier, it could infer that social capital is rooted in social networks and social relations
and must be measured relative to them (Lin, 1999). Therefore, network science and social network
analysis metrics could be used for measuring social capital. In this regard, several researchers asserted
the location of actors in a network: ties strength (Granovetter, 1973; Portes, 1998), structural hole and
constraints (Burt, 1992), as the key element of identifying social capital.
As social network‟s engagement is the principal for social capital, we also use social network
analysis metrics (that support the dimensions discussed in the literature) to measure social capital of
scholars in their co-authorship network. We summarize the main indicators followed by their focus as
discussed in the literature in Table 1.
Table 1. Social Capital Dimensions and Relevant Proposed Metrics as Assets in Network
Indicators
Ego network size
Focus
Authors
Diversity of contacts
(Bourdieu, 1986) & (Boxman et al., 1991)
Ego Average Ties Strength
Ties Strength
(Granovetter, 1973) & (Krackchardt, 1992)
Ego Betweenness Centrality
Structural Position
Ego Effectiveness
Brokerage & diversity
(Burt, 1992)
(Burt, 1992)
Contact Status (Power)
Embeddedness resources
(Lin, 1982) & (Burt, 2005)
To measure social capital, we use indicators covering the focus of related studies. Diversity of
contacts (ego‟s network size) (Bourdieu, 1986), representing the available resources for an individual,
has been considered in the literature as one of important factors on information diffusion and novelty.
Another important factor emphasized in the literature is ties strength (Granovetter, 1973; Krackhardt,
1992). In addition, we use ego-betweenness centrality (Freeman, 1979) and effectiveness (Burt, 1992) in
order to measure the structural position and brokerage characteristics of an individual in the network,
respectively.
In order to provide synthesis of two different approaches of social capital, diversity and power (as
determinants of valued resources) (Lin, 1982), we define social capital as the frequency and diversity of
7
contacts (directly connected actors) to the powerful (high performance) contacts. Therefore, having the
power (value) of actors in a social network, we measure social capital for an individual. We propose a
new measure, Power-Diversity Index, to take into consideration the value of direct contacts in addition
to their (quantity). Furthermore, proposing another measure, Power-Tie-Diversity Index, we added tie
strength factor also to the previous measure (Power-Diversity Index). These measures are explained in
detail in Section 3.2. These new proposed measures (i.e., Power-Diversity, Power-Tie-Diversity) reflect
the thinking that connecting to more powerful individuals will give individuals more power.
Accordingly then, this reflects individuals‟ power and influence on transmitting and controlling
information as well as the popularity of an individual based on popularity of its direct contacts.
3. Data, Method and Measures
3.1. Data
Scopus is one of the main sources presenting bibliometric data. To construct our database, we extract
publications using the phrase “information science” in their titles or keywords or abstracts and restricting
the search to publications in English published between 2001 and 2010. Indeed, the publications
extracted cannot be considered as representing the world production in the “information science” field
but it illustrates a good portion of publications in this field that do not have limitation to a specific sub-
field, conference, journal, institutes and country.
After extracting the publications‟ meta-data from Scopus and importing the information (i.e., title,
publication date, author names, affiliations, publisher, number of citations, etc.), we used an application
program, for extracting relationships (e.g., co-authorships) between and among researchers, and stored
the data in tables in a local relational database. Four different types of information were extracted from
each publication meta-data: Publications information (i.e., title, publication date, journal name, etc.);
authors‟ names; affiliations of authors (including country, institute and department name, etc.); and
keywords.
Exploring our original extracted data we found affiliation information inconsistent, where there were
several fields missing for some of publications and also different written names for the country of origin
and institutions. So, in our second step we undertook manual checks (using Google) to fill the missing
fields using other existing fields (e.g., we used institute names to find country). Also manually we merged
the universities and departments which had different names (e.g., misspellings or using abbreviations) in
our original extracted. Finally, after the cleansing of the publication data, the resulting database contained
4,579 publications published in 1,392 journals and conference proceedings (Indexed by Scopus)
reflecting the contributions of 10,255 authors from 99 countries.
3.2. Methodology
Social network analysis (SNA) is the mapping and measuring of relationships and flows between
nodes of a social network. SNA provides both a visual and a mathematical analysis of human-influenced
8
relationships. The social environment can be expressed as patterns or regularities in relationships among
interacting units (Wasserman & Faust, 1994). Each social network can be represented as a graph made
of nodes (e.g., individuals, organizations, information) tied by one or more specific types of relations,
such as financial exchange, friends, trade, and Web links. A link between any two nodes exists, if a
relationship between those nodes exists. For instance, if the nodes represent people, a link means that
those two people know each other in some way.
Measures of SNA, such as centrality, have the potential to unfold existing informal network patterns
and behavior that are not noticed before (Brandes & Fleischer, 2005). A method used to understand
networks and their participants is to evaluate the location of actors in the network. Measuring the
network location is about determining the centrality of an actor. These measures help determine the
importance of a node in the network. To quantify the importance of an actor in a social network, various
centrality measures have been proposed over the years (Scott, 1991; Wigand, 1988).
Using each publication and its authors, we construct the co-authorship network of scholars. Nodes of
the network represent scholars and a link between two nodes represents a publication co-authorship
relationship between or among those scholars. We used UCINET (Borgatti et al. 2002), a social network
analysis tool for visualizing the network and statistical functions, for calculating the measures descried
below.
3.3. Measures
3.3.1. Measuring Scholars Performance
To assess the performance of scholars, many studies suggest quantifying scholars‟ publication
activities as a useful measure for the performance of scholars. But there are also many researchers
pointing to the limits and bias of such quantification focusing on publication, mainly on the most visible
articles from international databases. Further research shows the number of citations a publication
receives qualifies the quantity of publications (Lehmann, Jackson, & Lautrup, 2006). Cronin (1996;
2002) also has been emphasized in the accumulation of citation counts, a form of symbolic capital, as an
important aspect of academic life. Progressively, new citation-based metrics are being proposed,
following Hirsch‟s (2005) h-index as the core metric for measuring the combination of quantity and
quality of researchers and academic communities. Although there is considerable debate on the
reliability of the h-index (e.g., Haque & Ginsparg, 2009), the h-index is still widely used world-wide
among academicians. While the reliability of the measure is not the subject of this paper per se, it does
provide at least an empirical and very widely used metric so as to gauge a researcher‟s prolificacy. Thus,
we will consider the h-index as a citation-based surrogate measure and as a proxy for the performance of
scholars.
3.3.2. Measuring Scholars’ Social Capital
In Table 1 and the following paragraphs, we demonstrate the proper indicators recommended in the
literature to measure social capital. We explain each indicator definition and their respective equations
more precisely in this section. To answer precisely our first research question: “how do we measure the
9
social capital of scholars?” we propose following metrics to measure individuals‟ social capital.
Although some of them have been used previously but we propose two new measures (Power-Diversity
Index and Power-Tie-Diversity Index) which combines two and three different properties of individuals
in their social network in order to quantify their social capital.
Individual Network Size (Degree Centrality)
In order to measure diversity of contacts representing the available resources for an individual, as one of
important factors of information diffusion and novelty, we will use individual degree centrality which is
the number of direct contacts it has. In a co-authorship network, network size of an author is the number
of her co-authors.
Individual Ties Strength (Average Tie Strength & Weighted Degree Centrality)
To evaluate an individual‟s ties strength, we use the sum of ties strength and also average ties
strength as proxy for social capital in order to represent the average strength of each tie of the actor.
Sum of ties strength of an author is the total number of collaborations she has (including redundant
collaborations with any co-author). Average ties strength is simply the average of the weights of her
collaborations. That means dividing the sum of ties strength (i.e., the number of collaborations) by the
network size of the author (i.e., the number of different co-authors).
Individual Effectiveness
In order to optimize an individual‟s network by capitalizing on structural holes, Burt (1992) claims that
increasing the number of direct contacts (network size) without considering the diversity reached by the
contacts makes the network inefficient in many ways. Therefore, the number of non redundant contacts
is important to the extent that redundant contacts would lead to the same people and hence provide the
same information benefits. The term effectiveness is used to denote the average number of people
reached per primary contact and to denote effectiveness in networks. Burt (1992) uses „effective size‟ as
a term to denote the same.
In conclusion, effectiveness of an individual is defined as the number of non-redundant (not connected)
contacts. Precisely, this is the number of contacts that an individual has, minus the average number of
ties that each contact has to other contacts of individuals. In a co-authorship network, effectiveness of an
author is the number of her co-authors which are not co-author with each other.
Ego-Betweenness Centrality
Considering bridging dimension, we use actors‟ ego-betweenness centrality to measure social capital.
Betweenness centrality is an indicator of an individual‟s potential control of communication within the
network and highlights bridging (brokerage) behavior of an actor (Freeman, 1979). Ego-betweenness
centrality is defined as the sum of an individual‟s proportion of times this individual lies on the shortest
10
path between each part of alters (direct contacts to ego) (Hanneman & Riddle, 2005). For alters
connected to each other, the contribution to the ego-betweenness of that pair is 0, and for contacts
connected to each other only through ego (individual), the contribution is 1, for alters connected through
ego and one or more other alters, the contribution is 1/k, where k is the number of nodes which connects
that pair of alters.
Individual Power-Diversity Index
In order to synthesize the two different approaches of social capital, diversity and power, we define
the individual Power-Diversity Index to measure social capital based on both the frequency of
connections and also considering the power of contacts (directly connected individuals). Having the
power (value) of individuals in a social network, we could simply calculate an individual‟s sum or
average of the power of direct contacts to synthesize quantity (frequency of contacts) and quality (their
value) of embedded resources (contacts) of an individual as a proxy for his/her social capital. But in
order to have a more advanced and accurate metric (rather than merely the sum or average), we will use
the h-index (Hirsch, 2005) base formula to quantify the quality of contacts of an individual by counting
top h powerful (valued) contacts whose power value is at least h.
In a co-authorship network, we consider the h-index of authors as their power (value) indicator.
Therefore, the Power-Diversity Index of an individual is the largest number such that her top h co-
authors have each at least an h-index of h. For instance, looking at Table 2 the author has 7 co-authors
who have h-indices of 6, 5, 5, 3, 3, 2 and 1, her Power-Diversity Index is 3 as three of her co-authors
have an h-index of higher than 3 and one cannot find 4 co-authors who have an h-index of higher than 4.
Individual Power-Tie-Diversity Index
In another effort, we take into consideration also individuals‟ tie strengths as another important
property of individuals‟ social capital discussed in the literature. This measure can be applied in
weighted networks. It is similar to individual Power-Diversity Index but taking the weight (strength) of
ties into account. To define this new measure for an individual (in a weighted network), first we define
co-authors‟ power-strength which is the h-index of each co-author multiplied by the strength of the tie
between that co-author and the author. So, individual Power-Tie-Diversity Index is the largest number
such that her top h co-authors have each at least the power-strength of h.
Table 2. An Individual’s co-authors and their h-index and frequency of collaborations
Co-authors
h-index
Freq. of
Collaborations
power-strength
1
2
3
4
5
CA1
CA2
CA3
CA4
CA5
6
5
5
3
3
4
3
2
3
1
24
15
10
9
3
11
6
7
CA6
CA7
1
1
2
2
2
2
In a co-authorship weighted network to calculate the individual Power-Tie-Diversity Index first we
need to calculate the power-strength (co-ps) of each of her co-authors as her h-index times the number
of collaborations (tie strength) they have had. Then, Power-Tie-Diversity of an individual is the largest
number such that her top h co-authors have each at least co-ps of h. For instance, Table 2 shows the co-
authors‟ power-strength of an author which are 24, 15, 10, 9, 3, 2, and 2 in descending order. Thus, the
author‟s Power-Tie-Diversity Index is 4 as for 4 of her co-authors‟ power-strengths (co-ps) are higher
than 4.
4. Analysis and Results
4.1. Dataset statistics
Table 3 shows the top 20 active journals which have more publications in “information science”
(having “information science” in the title or keywords or abstracts). Table 4 indicates the top 20 journals
based on the citations count each journal receives.
Table 3. Top 20 active journals in the field of “information science”
Journal Name
Pub.
Cit.
Journal Name
Pub.
Information Sciences
1
JASIST
2
Journal of Information Science
3
J. of Automation and IS
4
Journal of Documentation
5
J. of Chemical Info. and Modeling
6
Education for Information
7
Library and IS Research
8
9
International J. of Medical Info.
10 WSEAS Transactions on IS & App.
229
223
98
66
60
54
51
50
40
37
2818
3297
1195
8
387
627
125
289
248
22
11 Aslib Proceedings: New Info. Perspect.
Physical Review A
12
13
Library Trends
Bioinformatics
14
Information Research
15
16
Library Review
17
Journal of Theoretical Biology
18 New Library World
International Info. and Library Review
19
20
Physical Review Letters
33
32
32
29
29
29
28
27
27
26
Cit.
43
638
64
1193
168
27
617
48
39
1595
Table 4. Top 20 cited journals in the field of “information science”
Journal Name
Cit.
Pub.
Journal Name
Cit.
Pub.
Nature
1
JASIST
2
Information Sciences
3
Science
4
Physical Review Letters
5
Journal of Information Science
6
Bioinformatics
7
8
Information Systems Research
9 MIS Quarterly
3577
3297
2818
1934
1595
1195
1193
850
784
18
223
229
22
26
98
29
7
12
11
PNAS
12 Nucleic Acids Research
Physical Review A
13
14
J. of Chemical Info. and Modeling
15
Journal of Theoretical Biology
16 Nature Biotechnology
17 Genome Research
18
SIGMOD Record
19 Nature Physics
734
661
638
627
617
538
527
476
441
24
17
32
54
28
4
2
12
13
12
10
Reviews of Modern Physics
749
2
20
JAMIA
393
22
4.2. Scholars Performance and Social Capital Measures
Based on the available publication meta-data of scholars, we retrieve every pair of authors who are
listed as authors of a publication. We merge redundant co-authorships by increasing more weight (tie
strength) to their link (tie) for each relation. Therefore, we form the co-authorship network of scholars
and a weighted network. This relational data (i.e., who is connected to whom with which frequency) is
the basis for social network analysis. We imported these data to UCINET (Borgatti, Everett, & Freeman,
2002) to calculate the social network measures. In addition we calculated the citation-based performance
measures (i.e., h-index) for all scholars. To illustrate, the results for the top 10 productive scholars are
shown in Table 5.
Table 5. Top 10 high performance scholars and their social capital measures
Name
h-index 1 Cit. Cnt.
Network Size
(Degree)
Weighted
Degree
Effective-
ness
Avg. Ties
Strength
Ego-
Betweeness
Pow-
Div
Pow-
Tie-Div
1 M. Thelwall
2
3
4
5
6
7
8
9
H.J. Kimble
Y. Wang
E.R. Dougherty
B. Cronin
C. Oppenheim
L.I. Meho
H.D. White
J.C. Principe
10 Y.B. Jun
9
8
8
7
6
6
5
5
5
5
460
1125
328
606
164
153
282
169
120
89
17
28
30
16
4
20
6
2
13
6
26
40
35
21
6
26
8
2
14
6
16.45
23.68
19.56
13.88
4.33
19.19
5.67
1.00
10.79
5.33
1.53
1.43
1.17
1.31
1.50
1.30
1.33
1.00
1.08
1.00
245
557.3
376
186
12
352
24
0
114
26
4
4
3
4
2
4
1
1
1
1
2
3
2
2
1
2
1
1
1
1
To answer our second research question: “Do scholars‟ social capital metrics associate with their
performance?” we calculated all measures shown in Table 5 for all scholars. Then, we applied the
Spearman correlation rank test between the social capital measures and scholars‟ performance (i.e.,
citations count and h-index). As Table 6 shows the results of the correlation test, there are high
significant correlation coefficients between social capital measures and scholar‟s citation-based
performance. Results suggest that individuals‟ Power-Diversity Index has the highest coefficient with
their performance either considering citation count or h-index. This highlights the importance of the
power and role of co-authors to generate social capital for an author in her co-authorship network which
may also lead to enhance her performance.
Table 6. Spearman correlation rank test between scholars‟ centrality measures and their performance
Scholars’ Social Capital Measures (N=10,254)
Scholars’ Performance Measure
13
Individual Network Size (Degree Cent.)
Weighted Degree Centrality (Sum of Ties Strength)
Average Ties Strength
Individual Effectiveness
Ego Betweenness Centrality
Individual Power-Diversity Index
Individual Power-Tie-Diversity Index
*. Correlation is significant at the .01 level (2-tailed).
Citation Count
h-index
.219 *
.226 *
.135 *
.192 *
.172 *
.656 *
.103 *
.159 *
.177 *
.268 *
.292 *
.309 *
.853 *
.206 *
It is noteworthy to point out that the Power-Diversity Index coefficient value is three times higher
than the second highest measure (i.e., ego-betweenness for the h-index and weighted degree centrality
for citation count). Interestingly the coefficient for Power-Tie-Diversity Index is much lower than the
Power-Diversity Index. This indicates that repeated collaborations with the same co-authors (even if
they are prominent) does not create good social capital for them rather than having collaborations with
more powerful (prominent) co-authors.
The Ego-betweenness centrality coefficient is higher than ties strength and diversity measures. This
shows bridging characteristics of scholars in their co-authorship network seems more important than the
diversity of their co-authors and their ties‟ strength in regard to their performance.
5. Conclusion and Discussion
In this study, we highlighted the importance of the co-authorship network as a tool for evaluating
scholars‟ performance which is necessary in academia. We use social capital theory to explain how
scholar‟s co-authorship network affects each individual scholar‟s performance. Although there are
several definitions for social capital, most definitions‟ emphases are on the social relations that have
productive benefits. Social capital is rooted in social networks and social relations and must be measured
relative to them (Lin, 1999). Reviewing the literature we highlight scholars‟ structural position (e.g.,
network size, degree, betweenness) in their co-authorship network and also scholars‟ contacts
characteristics (power and performance) as proper indicators of their respective social capital.
Reviewing the literature on social scientists‟ and particularly network scientists‟ studies on social
capital, we highlight different approaches and dimensions for social capital and focus on the approaches
which evaluate individuals‟ property in the network. Although multi-dimensionality and dynamicity of
social capital makes having a single, true measure almost impossible (Woolcock & Narayan, 2000) but
as measuring social capital is required in order to use it as a development tool, several researchers
proposed different metrics.
Several measures (i.e., individual network size, ties strength, ego-betweenness centrality, Power-
Diversity Index and Power-Tie-Diversity Index) using network analysis metrics. This assists us in
quantifying the social capital resulting from the co-authorship through the social network, which is
considered important for research management, academic institute as well as government policy makers
14
over recent years. While several measures have been used by other researchers earlier, the last two
measures (i.e., Power-Diversity Index and Power-Tie-Diversity Index) are new which combine two and
three properties of authors in their co-authorship network, respectively, to quantify the extent of social
capital they gain.
We test the correlation of the proposed measures of authors‟ with their research performance and all
show a positive significant association. The results highlighted the importance of scholars‟ social
capitals characteristics on their performance. Significant association between scholars‟ Power-Diversity
Index and performance follows that connecting to more powerful contacts will lead to have better
performance which is due to contacts‟ relative power and influence on transmitting and controlling
information as well as the popularity of an individual based on popularity of its direct contacts . Power-
Diversity Index indicates the individuals diversely connected to prominent contacts. These kinds of
actors have special strategically positions that can control the flow of information in the network.
Our research conceptualizes social capital in terms of network structures, such as articulated by the
strength of weak ties theory (Granovetter, 1973, 1982) and provides valuable insight into co-authors‟
activities. The strength of weak ties theory suggests that the social network of any network member is
the co-author‟s primary resource. Moreover, this network can be viewed as being comprised of
participants who vary by the relative strength of their relationship with one another. Strongly tied-
together members in a network tend to be more similar to each other than different, more likely to be
available for each other, share more common interests, and interact more frequently. Conversely, weakly
tied members in a social network tend to communicate less frequently, are more different than similar,
and provide both newer information into the network and more access to other social networks (Sawyer,
Crowston and Wigand, 1999). When applied to the co-author network, this suggests that co-authors with
large social networks populated with more weak ties will have more social capital. The more resource-
rich co-authors will get influential linkages and connections (via acquaintances) and be able to point to
more influential co-authors who might be able to provide value-adding services.
In brief, our findings show that Power-Diversity is a useful surrogate of the importance of a scholar
in her co-authorship network by considering the diversity of contacts (number of co-authors) and also
their value and power (performance). Power-Diversity, which can be considered as a new hybrid
centrality measure, identifies individuals having direct connections to diverse powerful individuals. So,
this measure is an indicator of the power and influence of an individual‟s ability to control
communication and information.
Using publication data and extracting co-authorship relations, we have presented an overview of
collaboration efforts and collaborative networks in the “information science” research area. The
collaboration networks of scientists in “information science” have been analyzed by using author
affiliations from publications having „information science‟ in their „title‟ or ‟keywords‟ or „abstract‟
since 2001 to 2010 as extracted from Scopus. The publication dataset we have extracted does not
support to represent the complete world production of research on “information science” (due to the
possibility of significant biases: ignoring the relevant publications which are not using the exact phrase
15
„information science„; publications in other languages). Hence, the database does not pretend to
represent the complete field.
Applying this new measure for other social networks to test its association with individuals‟
performance could be a useful extension of standard centrality measures and a suitable proxy for the
performance of the individuals in a network. In order to accomplish this, validation of this new measure
is needed by testing it in other social networks.
Footnotes:
1 The h-indices of scholars are not their full h-index. It is calculated based on their ten years of publications extracted from
Scopus for our query between 2001 and 2010. This is the reason of difference with the h-indices of scholars reported in
(Cronin & Meho, 2006).
REFERENCES
Abbasi, A., & Altmann, J. (2011). On the Correlation between Research Performance and Social Network Analysis
Measures Applied to Research Collaboration Networks. Paper presented at the Hawaii International Conference on
System Sciences, Proceedings of the 44th Annual., Waikoloa, HI.
Abbasi, A., Altmann, J., & Hossain, L. (2011). Identifying the Effects of Co -Authorship Networks on the Performance of
Scholars: A Correlation and Regression Analysis of Performance Measures and Social Network Analysis Measures.
Journal of Informetrics, 5(4), 594-607.
Abbasi, A., Altmann, J., & Hwang, J. (2010). Evaluating scholars based on their academic collaboration activities: two
indices, the RC-Index and the CC-Index, for quantifying collaboration activities of researchers and scientific
communities. Scientometrics, 83(1), 1-13.
Adler, P. S., & Kwon, S. W. (2002). Social capital: Prospects for a new concept. Academy of Management Review, 27(1), 17-
40.
Borgatti, S., Everett, M., & Freeman, L. (2002). Ucinet for windows: Software for social network analysis (version 6).
Harvard, MA: Analytic Technologies.
Bourdieu, P. (1986). The forms of capital. Readings in economic sociology, 280-291.
Bourdieu, P., & Wacquant, L. J. D. (1992). An invitation to reflexive sociology: University of Chicago Press.
Boxman, E. A. W., De Graaf, P. M., & Flap, H. D. (1991). The impact of social and human capital on the income attainment
of Dutch managers. Social networks, 13(1), 51-73.
Brandes, U., & Fleischer, D. (2005). Centrality measures based on current flow.
Burt, R. S. (1992). Structural holes: The social structure of competition : Belknap Pr.
Burt, R. S. (2005). Brokerage and closure: An introduction to social capital : Oxford University Press, USA.
Chung, K. S. K., & Hossain, L. (2009). Measuring performance of knowledge -intensive workgroups through social networks.
Project Management Journal, Jun2009, 40(2).
Coleman, J. S. (1987). Norms as social capital. Economic imperialism, 133-155.
Coleman, J. S. (1988). Social capital in the creation of human capital. American journal of sociology, 94(1), 95-120.
Coleman, J. S. (1990). Foundations of social theory: Belknap Press.
Cronin, B. (1996). Rates of return to citation. Journal of documentation, 52(2), 188-197.
Cronin, B., & Meho, L. (2006). Using the h‐Index to rank influential information scientistss. Journal of the American Society
for Information Science and Technology, 57(9), 1275-1278.
Cronin, B., & Shaw, D. (2002). Banking (on) different forms of symbolic capital. Journal of the American Society for
Information Science and Technology, 53(14), 1267-1270.
Cummings, J. N. (2004). Work groups, structural diversity, and knowledge sharing in a global organization. Management
science, 50(3), 352-364.
Demsetz, H. (1991). The Theory of the firm revisited. In O. E. Williamson, S. G. Winter & R. H. Coase (Eds.), The Nature of
the Firm: Origins, Evolution, and Development. (pp. 159–179). New York: Oxford University Press.
Dierickx, I., & Cool, K. (1989). Asset stock accumulation and sustainability of competitive advantage. Management Science,
35(12), 1504-1511.
Eisenhardt, K., & Tabrizi, B. N. (1995). Accelerating Adaptive Processes: Product Innovation in the Global Computer
Industry. Administrative Science Quarterly, 40(1).
16
Freeman, L. C. (1979). Centrality in social networks conceptual clarification. Social Networks, 1(3), 215-239.
Gauntlett, D. (2011). Three approaches to social capital. In Making is connecting: Polity.
Granovetter, M. (1973). The strength of weak ties. American journal of sociology, 78(6), 1360.
Granovetter, M. (1983). The strength of weak ties: A network theory revisited. Sociological theory, 1(1), 201-233.
Griffin, A., & Hauser, J. R. (1992). Patterns of communication among marketing, engineering and manufacturing-a
comparison between two new product teams. Management Science, 38(3), 360-373.
Hanifan, L. J. (1916). The rural school community center. Annals of the American Academy of Political and Social Science,
67, 130-138.
Hanneman, R. A., & Riddle, M. (2005). Introduction to social network methods.
Hansen, M. T. (1999). The search-transfer problem: The role of weak ties in sharing knowledge across organization subunits.
Administrative science quarterly, 44(1), 82-85.
Haque, A., & Ginsparg, P. (2009) . Positional effects on citation and readership in arXiv. Journal of the American Society for
Information Science and Technology, 60(11), 2203-2218.
Hirsch, J. (2005). An Index to quantify an individual's scientific research output. Proceedings of the National Academy of
Sciences, 102(46), 16569.
Krackhardt, D. (1992). The strength of strong ties: The importance of philos in organizations. Networks and organizations:
Structure, form, and action, 216-239.
Lehmann, S., Jackson, A., & Lautrup, B. (2006). Measures for measures. Nature, 444(7122), 1003-1004.
Levin, D. Z., & Cross, R. (2004). The strength of weak ties you can trust: The mediating role of trust in effective knowledge
transfer. Management science, 1477-1490.
Lin, N. (1982). Social Resources and Instrumental Action. In P. V. Marsden & N. Lin (Eds.), Social Sructure and Network
Analysis (pp. 131-145). Beverlyy Hills, CA: Sage.
Lin, N. (1999). Building a network theory of social capital. Connections, 22(1), 28-51.
McFadyen, M., Semadeni, M., & Cannella, A. A. (2009). Value of strong ties to disconnected others: Examining knowledge
creation in biomedicine. Organization Science, 20(3), 552-564.
Narayan, D., & Cassidy, M. F. (2001). A dimensional approach to measuring social capital: development and validat ion of a
social capital inventory. Current Sociology, 49(2), 59.
Oh, W., Choi, J. N., & Kim, K. (2006). Coauthorship dynamics and knowledge capital: The patterns of cross -disciplinary
collaboration in information systems research. Journal of Management Information Systems, 22(3), 266-292.
Pinto, M. B., Pinto, J. K., & Prescott, J. E. (1993). Antecedents and consequences of project team cross -functional
cooperation. Management Science, 39(10), 1281-1297.
Podolny, J. M., & Baron, J. N. (1997). Resources and r elationships: Social networks and mobility in the workplace. American
sociological review, 62(5), 673-693.
Portes, A. (1998). Social capital: Its origins and applications in modern sociology. Annual review of sociology, 24, 1-24.
Putnam, R. D. (1993). Making Democracy Work: Civic Traditions in Modern Italy . Princeton, NY: Princeton University
Press.
Putnam, R. D. (1995). Tuning in, tuning out: The strange disappearance of social capital in America. PS: Political science
and politics, 28(4), 664-683.
Putnam, R. D. (2001). Bowling alone: The collapse and revival of American community . New York: Simon & Schuster.
Reagans, R., & Zuckerman, E. (2001). Networks, diversity, and productivity: The social capital of corporate R&D teams.
Organization Science, 502-517.
Sawyer, S., Crowston, K., & Wigand, R. T. (1999). ICT in the real estate industry: Agents and social capital, Americas
Conference on Information Systems (AMCIS) 1999 Proceedings. : AIS Electronic Library.
Scott, J. (1991). Social network analysis: a handbook.: Sage.
Shen, C. (2010). The patterns, effects and evolution of player social networks in online gaming communities. University of
Southern California.
Takeda, H., Truex III, D., & Cuellar, M. (2010). Evaluating Scholarly Influence Through Social Network Analysis: the Next
Step in Evaluating Scholarly Influence. AMCIS 2010 Proceedings, 573.
Tsai, W., & Ghoshal, S. (1998). Social capital and value creation: The role of intrafirm networks. Academy of Management
Journal, 41(4), 464-476.
Uslaner, E. M. (2001). Volunteering and social capital: how trust and religion shape civic participation in the United States.
In E. M. Uslaner (Ed.), Social Capital and Participation in Everyday Life . London: Routledge.
Walker, G., Kogut, B., & Shan, W. (1997). Social capital , structural holes and the formation of an industry network.
Organization Science, 109-125.
Wasserman, S., & Faust, K. (1994). Social network analysis: Methods and applications: Cambridge Univ Press.
17
Wellman, B. (1988). Structural analysis: From method and metaphor to theory and substance. In B. Wellman & S. D.
Berkowitz (Eds.), Social structures: A network approach (pp. 19-61). Cambridge: Cambridge University Press.
Wigand, R. T. (1988). Communication network analysis: A history and o verview. In Gerald Goldhaber and George Barnett
(eds.), Handbook of Organizational Communication. Norwood, NJ: Ablex, pp. 319-358.
Woolcock, M., & Narayan, D. (2000). Social capital: Implications for development theory, research, and policy. The world
bank research observer, 15(2), 225.
Yan, E., & Ding, Y. (2009). Applying centrality measures to impact analysis: A coauthorship network analysis. Journal of
the American Society for Information Science and Technology, 60(10), 2107-2118.
Zhuge, H., & Zhang, J. (2010). Topological centrality and its e -science applications. Journal of the American Society for
Information Science and Technology, 61(9), 1824–1841.
18
|
1805.04022 | 1 | 1805 | 2018-05-10T15:25:46 | Query for Architecture, Click through Military: Comparing the Roles of Search and Navigation on Wikipedia | [
"cs.SI",
"cs.DL"
] | As one of the richest sources of encyclopedic information on the Web, Wikipedia generates an enormous amount of traffic. In this paper, we study large-scale article access data of the English Wikipedia in order to compare articles with respect to the two main paradigms of information seeking, i.e., search by formulating a query, and navigation by following hyperlinks. To this end, we propose and employ two main metrics, namely (i) searchshare -- the relative amount of views an article received by search --, and (ii) resistance -- the ability of an article to relay traffic to other Wikipedia articles -- to characterize articles. We demonstrate how articles in distinct topical categories differ substantially in terms of these properties. For example, architecture-related articles are often accessed through search and are simultaneously a "dead end" for traffic, whereas historical articles about military events are mainly navigated. We further link traffic differences to varying network, content, and editing activity features. Lastly, we measure the impact of the article properties by modeling access behavior on articles with a gradient boosting approach. The results of this paper constitute a step towards understanding human information seeking behavior on the Web. | cs.SI | cs |
Query for Architecture, Click through Military:
Comparing the Roles of Search and Navigation on Wikipedia
Dimitar Dimitrov
GESIS -- Leibniz Institute for the Social Sciences
& University of Koblenz-Landau
[email protected]
Fabian Flöck
GESIS -- Leibniz Institute for the Social Sciences
[email protected]
Florian Lemmerich
RWTH Aachen University &
GESIS -- Leibniz Institute for the Social Sciences
[email protected]
Markus Strohmaier
RWTH Aachen University &
GESIS -- Leibniz Institute for the Social Sciences
[email protected]
ABSTRACT
As one of the richest sources of encyclopedic information on the
Web, Wikipedia generates an enormous amount of traffic. In this
paper, we study large-scale article access data of the English Wi-
kipedia in order to compare articles with respect to the two main
paradigms of information seeking, i.e., search by formulating a
query, and navigation by following hyperlinks. To this end, we
propose and employ two main metrics, namely (i) searchshare --
the relative amount of views an article received by search -- , and
(ii) resistance -- the ability of an article to relay traffic to other
Wikipedia articles -- to characterize articles. We demonstrate how
articles in distinct topical categories differ substantially in terms of
these properties. For example, architecture-related articles are often
accessed through search and are simultaneously a "dead end" for
traffic, whereas historical articles about military events are mainly
navigated. We further link traffic differences to varying network,
content, and editing activity features. Lastly, we measure the impact
of the article properties by modeling access behavior on articles
with a gradient boosting approach. The results of this paper con-
stitute a step towards understanding human information seeking
behavior on the Web.
CCS CONCEPTS
• Information systems → Web log analysis; Traffic analysis;
KEYWORDS
Search Behavior; Navigation Behavior; Log Analysis; Wikipedia
ACM Reference Format:
Dimitar Dimitrov, Florian Lemmerich, Fabian Flöck, and Markus Strohmaier.
2018. Query for Architecture, Click through Military: Comparing the Roles
of Search and Navigation on Wikipedia. In WebSci '18: 10th ACM Conference
on Web Science, May 27 -- 30, 2018, Amsterdam, Netherlands. ACM, New York,
NY, USA, 10 pages. https://doi.org/10.1145/3201064.3201092
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permitted. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior specific permission and/or a
fee. Request permissions from [email protected].
WebSci '18, May 27 -- 30, 2018, Amsterdam, Netherlands
© 2018 Association for Computing Machinery.
ACM ISBN 978-1-4503-5563-6/18/05...$15.00
https://doi.org/10.1145/3201064.3201092
1
1 INTRODUCTION
Before the age of the World Wide Web [1], information was pre-
dominantly consumed in a linear way, e.g., starting at the first
page of a book and following the laid out narrative until the end.
With the introduction of hypertext [22] in digital environments, the
way people consume information changed dramatically [4, 18 -- 20].
While on early websites, users still predominantly visited a main
page through a fixed address and were sometimes even bounded
by a more directory-like navigation structure, the rise of search en-
gines and tighter interlinking of websites have corroded the linear
consumption paradigm even further. Today, users access a single
website through a multitude of webpages as entry points and can
usually choose from numerous paths through the available linked
content at any time. In such a setting, understanding at which (kind
of) pages users typically begin and end their journey on a given
website, vs. which pages relay traffic internally from and to these
points, provides several useful insights. On one hand, it has high
practical importance since it provides the first and last contact
opportunity; pages could be shaped to leverage their function as
an entry point (e.g., by prioritizing improvements of navigational
guidance for these pages to retain visitors), or as an exit point (e.g.,
by surveying visitors for their user experience before leaving, or
by providing increased incentives to continue navigation). On the
other hand, knowledge about entry, relay and exit points is also
closely tied to the relation of the major information seeking strate-
gies, i.e., search and navigation: the first page visited in a session
on a website is frequently reached via search engine results, after a
query formulation, while navigation has been often used when the
exact information need cannot be easily expressed in words [9, 10].
Understanding under which circumstances search or navigation
dominate the users' information seeking behavior can help in devel-
oping an agenda for improving the web content in order to optimize
visitor rates and retention.
Scope and research questions. Information consumption on the
Web has been of special interest to researchers since the Web's
earliest days [13, 14]. While both search [21, 32, 34] and naviga-
tion [7, 11, 15 -- 17] have been investigated thoroughly in related
work, they were mostly looked at separately. Consequently, so
far little is known about which parts and content types of a spe-
cific website (inter)act in which structural roles, begetting different
information access patterns.
WebSci '18, May 27 -- 30, 2018, Amsterdam, Netherlands
D. Dimitrov et al.
In this work, we analyze how these patterns manifest on the
online encyclopedia Wikipedia. With more than 5 million articles,
Wikipedia is one of the primary information sources for many
Web users and through its openly available pageview data provides
an essential use case for studying information seeking behavior,
as made apparent by numerous studies [6, 16, 24]. Yet, there is
a lack of understanding how search and navigation as the two
major information access forms in combination shape the traffic
of large-scale hypertext environments, such as the world's largest
online encyclopedia. To this end, we are interested in answering
the following research questions: (i) How do search and navigation
interplay to shape the article traffic on Wikipedia? Given an article,
we want to know how its acting as a search entry point is related to
(not) relaying navigation traffic into Wikipedia, and vice versa. This
also addresses the issue of how search and navigation contribute to
the article's popularity. Beyond these characteristics of the system
in general, we also examine which specific properties of articles
influence their roles in the search-vs-navigation ecosystem. We
hence ask: (ii) Which article features (i.e., topic, network, content
and edit features) are indicative for specific information access
behavior?
Materials, approach and methods. Building our analysis on
large-scale, openly available log data for the English edition of
Wikipedia, we propose two metrics capturing individual traffic be-
havior on articles, i.e., (i) searchshare -- the amount of views an
article received by search -- , and (ii) resistance -- the ability of an
article to channel traffic into and through Wikipedia (cf. Section 2).
We use searchshare and resistance to first explore the relation
between search and navigation and their effect on the popularity of
articles independent of their content (cf. Section 3). Depending on
these two measures, we assign articles to four groups describing the
role they assume for attracting and retaining visitors. Subsequently,
we characterize the influence of several article attributes, including
the general topical domain, edit activity and content structure on
the preferred information access form (cf. Section 4). Finally, we fit
a gradient boosting model to determine the impact of these article
features on the preferred user access behavior (cf. Section 5).
Contributions and findings. Our contributions are the following:
(i) Regarding the general (collective) access behavior on Wikipedia,
we provide empirical evidence that for the most viewed articles
search dominates navigation in the number of articles accessed and
received views. For the tail of the view distributions, navigation
appears to become more and more important. (ii) We link article
properties, i.e., position in the Wikipedia network, number of article
revisions, and topic to preferred access behavior, i.e., search or
navigation. Finally, (iii) we quantify the strength of the relationship
between article properties and preferred access behavior.
Our analysis suggests that (i) while search and navigation are
used to access and explore different articles, both types of infor-
mation access are crucial for Wikipedia, and (ii) that exit points of
navigation sessions are located at the periphery of the link network,
whereas entry points are located at the core. (iii) Edit activity is
strongly related with the ability of an article to relay traffic, and
thus with the preferred access behavior.
Our results may have a variety of applications, e.g., improving
and maintaining the visual appearance and hyperlink structure of
2
articles, identifying articles exhibiting changes in access behavior
patterns due to vandalism or other online misbehavior. We consider
our analysis as an initial step to better understand how search and
navigation interplay to shape the user access behavior on platforms
like Wikipedia and on websites in general.
2 TRANSITION DATA AND DEFINITIONS
Below, we give an overview of the used dataset capturing the traffic
on Wikipedia articles and define searchshare and resistance as our
main metrics for describing the individual article traffic behavior.
2.1 Transition Data
For studying the access behavior on Wikipedia articles, we use the
clickstream dataset published by the Wikimedia Foundation [38].
The used dataset contains the transition counts between webpages
and Wikipedia articles in form of (referrer, resource) pairs extracted
from the server logs for August, 2016, and is limited to pairs that
occur at least 10 times. The referrer pages are either external (e.g.,
search engines, social media), internal (other Wikipedia pages), or
missing (e.g., if the article is accessed directly using the browser
address bar). The navigation targets are purely internal pages.1
Since we are interested in contrasting Wikipedia article access
from search engines and navigation (see also our discussion in
Section 7), we focus our analyses only on those articles in the
clickstream dataset that have received views through search or
internal navigation, setting aside remaining view sources (mostly
"no referrer"). Accordingly, we define total views of an article as the
sum of all page accesses by either search or navigation.
The resulting dataset consists of 2,830,709 articles accessed through
search 2,805,238,298 times and 14,405,839 transitions originating
from 1,370,456 articles and accounting for 1,251,341,103 views of
2,149,104 target articles. In total, the dataset consists of 3,104,702 ar-
ticles viewed 4,056,579,401 times, with a ratio of 69% stemming from
search and 31% from internal navigation -- in line with previous
reports on the clickstream data [7, 15].
2.2 Definitions
To achieve a fundamental understanding of the parts that search
and navigation each play for the distribution of views in Wikipedia,
we take a look at the functional roles articles can assume for the
overall traffic flow in respect to their searchshare and resistance.
Searchshare. A high searchshare value indicates that search is the
predominant paradigm of accessing an article, and thus that the
article acts as an entry point for a site visit. In contrast, articles with
a low value receive most of their views from users visiting them by
means of navigation. The searchshare metric is defined as
inse(a)
searchshare(a) =
inse(a) + innav(a)
(1)
where inse(a) is the number of pageviews an article a received
directly from search engine referrers, and innav(a) is the number
of views from navigation as recorded in the Wikipedia clickstream.
Resistance. A low resistance value signals that an article forwards
most of its received traffic to other articles within Wikipedia, hence
1Leaving a Wikipedia page is treated as the end of the visit in the logs, whether by
clicking on an external link or closing the page.
Query for Architecture, Click through Military:
Comparing the Roles of Search and Navigation on Wikipedia
WebSci '18, May 27 -- 30, 2018, Amsterdam, Netherlands
(a) Search and navigation vs. total
(b) Search vs. navigation
Figure 1: Ranking overlap. Four rankings are shown, accord-
ing to the total number of pageviews (total), the number of
pageviews coming from search (inse) as well as in- (innav )
and out-navigation (outnav ). The y-axis indicates overlaps
between pairs of rankings, considering the top-k articles
of each ranking as marked on the x-axis (log-scaled, top
articles on the left). As a result, the overall ranking of to-
tal pageviews shows a very high overlap with the incoming
search ranking. The top pages by search and navigation dif-
fer substantially. Notably, being a distribution point of traf-
fic (high outnav , cf. (b)) is correlated most to receiving search,
but only for top outnav articles, with lower ranks being sup-
plied with traffic predominantly through innav .
does not block the flow of incoming traffic onward. A high value in
turn indicates that an article acts as an exit point. Thus, it rarely re-
lays users to other Wikipedia articles. These articles are traffic sinks
in the Wikipedia information network. We define the resistance
metric as
resistance(a) = 1 −
outnav(a)
inse(a) + innav(a)
(2)
where outnav(a) is the number of pageviews that had article a as
a referrer. Additionally, we restrict the values to be in the interval
[0,1]. This is necessary since a small number of articles generates
more out-going traffic than they receive pageviews, e.g., due to a
user opening several links in a new tab each.
3 GENERAL ACCESS BEHAVIOR
In this section, we investigate how exogenous and endogenous
traffic contribute to article popularity on Wikipedia, and we study
the distribution of traffic features. We provide a first overview of
the general access behavior on Wikipedia regarding search and
navigation, aided by a division of articles into four groups with
respect to searchshare and resistance; in Section 4, we will subse-
quently take a deeper look at dissimilarities between different types
of articles.
Search and navigation in relation to total views. As can be
expected from related research on Wikipedia and similar online
platforms, the distribution of pageviews over articles is long-tailed
with a heavy skew towards the head (80% views generated by the
top-visited 5.2% of all articles). To better investigate the relationship
between search and (incoming and outgoing) navigation on the ar-
ticles popularity, we calculate the cumulative overlap (intersection)
(a) Number of articles
(b) Total views
Figure 2: Articles and article views by access behavior. For
a given searchshare (y-axis) and resistance (x-axis), the fig-
ure shows (a) the number of articles and (b) the sum of their
views in each heatmap square bin. Warm colors denote high
values, using a logarithmic scale. We observe that search
dominates navigation in terms of number of accessed arti-
cles (note the single top data bin in (a)) and that a substantial
amount of articles exhibits high resistance values. When fo-
cusing on views, we see a more spread-out pattern, evidenc-
ing that a relatively small amount of articles attracts a sub-
stantial amount of search views and channels them onward
to other articles (upper left side of (b)), corresponding to the
search-relay group (cf. Table 1).
of the descendingly ranked articles at each rank k, divided by k;
this is an adaptation of the Rank Biased Overlap2 measure.
Figure 1(a) shows that the top k articles ordered by search traffic
(top-k-search) are highly overlapping with the top articles by total
views (top-k-total) at any k, underscoring the general importance
of search as a driver of incoming views. In-navigation, in contrast,
is not a deciding factor to belong to the top most visited pages,
but sees an extreme increase in the influence on overall views for
articles up to top-k-total around 8000, at which point the increase
continues, but levels off. Apparently, while search is the overall
main driver for traffic, in-navigation rapidly becomes a more cen-
tral source of traffic beyond the extremely popular articles. Turning
to navigation passed on from articles to other articles, we can glean
from Figure 1(a) that (i) while the very top of viewed articles con-
tribute little in relation to their accumulated views to the internal
traffic flow of Wikipedia (low overlap for outnav&total), we (ii) see
a rapid and constant drop in the amount of traffic "dying" at a given
page with increasing top-k-total.
Further, while it is not surprising that the outgoing traffic accu-
mulates generally in line with the overall received views, up until
around top-k-total 1,500,000 it is generated at a rate surpassing the
relative increase of total views, with the highest ranks of top-k-total
contributing comparably little to it, just as to in-navigation. These
observations are in line with Figure 1(b), where we see that a higher
rank in receiving navigation - rather than from search - is more
strongly correlated with distributing views to other articles for the
2Rank Biased Overlap [35] is a common metric for similarity between rankings using
cumulative set overlap in cases where the two lists do not necessarily share the same
elements (as is the case here). Top-weighting as can be specified for RBO is neither
suited nor necessary for the distinction of different k that we aim for here.
3
1011021031041050.20.40.60.8inse&totalinnav&totaloutnav&total1011021031041050.20.30.40.50.60.7inse&innavinse&outnavinnav&outnav0.00.20.40.60.81.0Resistance0.00.20.40.60.81.0SearchshareWikipedia1021031041050.00.20.40.60.81.0Resistance0.00.20.40.60.81.0SearchshareWikipedia106107WebSci '18, May 27 -- 30, 2018, Amsterdam, Netherlands
D. Dimitrov et al.
(a) Searchshare
(b) Resistance
(c) Searchshare-weighted
(d) Resistance-weighted
Figure 3: Traffic feature distributions. Figures (a) and (b) show an unweighted histogram of searchshare and resistance, while
(c) and (d) respectively weight articles by their pageview counts. Most articles have a very high value for searchshare and
resistance. However, extreme values close to 1.0 in (a), (b) stem mostly from rarely visited pages.
largest portion of pages, after top-k-total 3000; up until that point,
the largest share of channeled traffic stems from search views. As
bottom line, we see a pattern that points to a small number of pages
at the extreme top of the pageview counts that are mostly searched,
but in relation to their popularity rather isolated in terms of nav-
igation; with in- and out-navigation similarly gaining notably in
correlation with overall views for lower top-k-total ranks.
Traffic feature distributions. Figure 3 depicts the system-wide
distribution of searchshare and resistance. Pages are generally much
more searched than navigated to (searchshare median = 0.74, mean
= 0.66) as seen in Figure 3(a). It is also apparent from Figure 3(b)
that most articles do not tend to forward much of their received
traffic internally, with the median for resistance for all articles lying
at 1.0 and the mean at 0.88. This general tendency prevails when
these scores are weighted by their received views (Figures 3(c)
and 3(d)), but a notably less skewed distribution emerges, implying
that -- even when accounting for regression-to-the-mean effects --
a majority of views is acquired via search and that a majority of
views hits rather high-resistance targets.
Relation between searchshare and resistance. We observe a
light positive correlation (pearson = 0.26, spearman = 0.33) indicat-
ing that the more likely an article is used to start a session, the more
likely it is also to be the last article accessed in a session. Figure 2
depicts this association for all articles in our dataset.
To explore this relation further, we assign each article to one of
four groups, determined by the mean of both searchshare and resis-
tance as the thresholds.3 We label each group according to its traffic
behavior, i.e., (i) search-relay articles that are often searched while
simultaneously contributing to further navigation (above-mean
searchshare, below-mean resistance); (ii) search-exit articles with
above-average searchshare that are often accessed from search but
do not lead to users navigating further (above-mean searchshare,
3A delimitation by median yields groups with the sole resistance value 1.0 and was
therefore not used. Cut-offs at 0.5 would have created extremely unbalanced groups.
Table 1: Article group sizes and views. For each group, the ta-
ble shows the percentage of articles and their received views.
The majority of the articles are less visited and act as exit
points of user session, whereas only popular articles are able
to further relay traffic.
search-exit
search-relay nav.-relay nav.-exit
articles
views
43%
17%
9%
37%
21%
39%
27%
7%
total
100%
100%
above-mean resistance); (iii) navigation-exit articles that receive
their traffic mostly from navigation but cannot channel traffic to
other pages (below-mean searchshare, above-mean resistance); (iv)
navigation-relay articles that are mainly accessed from within Wiki-
pedia and able to pass traffic on internally (below-mean searchshare,
below-mean resistance). Table 1 reports the share of articles and
views pertaining to each group. We observe that a small group of
highly visited articles is able to inject considerable amounts of traf-
fic (search-relay) into Wikipedia while about a fifth of the articles'
role is mainly to channel traffic internally (nav.-relay). On the other
hand, exit points receive less views while covering a much bigger
portion of Wikipedia articles. Overall, these observations are in
line with Figure 3.
Summary. Our analysis shows that search dominates navigation
with respect to the number of articles accessed and visit frequency.
However, the less viewed an article is, the more significant naviga-
tion becomes as an information access form. Further, only popular
articles are able to relay traffic while the majority of the articles
acts as exit points for user search and navigation sessions.
4 CHARACTERIZING ACCESS BEHAVIOR
In the previous section, we analyzed the general Wikipedia infor-
mation access behavior, setting aside individual page attributes.
However, Wikipedia articles have different properties that may
influence the way they are retrieved (cf. Section 4.1). To this end,
we analyze the general Wikipedia access behavior dependent on
the article network (cf. Section 4.2), and content and edit properties
(cf. Section 4.3). Subsequently, we highlight differences between
general access behavior on Wikipedia and on Wikipedia topics
dominated by search and navigation, respectively (cf. Section 4.4).
4.1 Wikipedia Article Data and Features
To study the influence of the content on the preferred access be-
havior, we focus on a snapshot of all Wikipedia articles contained
in the main namespace of the English language version from Au-
gust, 20164. We obtained the articles using the Wikipedia API5. The
collected article data represent the HTML version of each article
on which the transitions data used to study the Wikipedia traffic
has been generated (cf. Section 2.1). By parsing and rendering the
HTML version of the articles, we are able to extract article features
4https://archive.org/details/enwiki-20160801
5https://www.mediawiki.org/wiki/API:Main_page
4
0.00.20.40.60.81.002000004000006000008000001000000Frequency0.00.20.40.60.81.00500000100000015000002000000Frequency0.00.20.40.60.81.00.00.20.40.60.8Frequency1e90.00.20.40.60.81.00.00.20.40.60.8Frequency1e9Query for Architecture, Click through Military:
Comparing the Roles of Search and Navigation on Wikipedia
WebSci '18, May 27 -- 30, 2018, Amsterdam, Netherlands
searchshare and resistance (article group nav.-relay) have higher
median values across all network features, i.e., they are located
more in the center of the network and consistently have more
incoming and outgoing links. Although search-relay articles are not
as well connected as nav.-relay, their relatively central position in
the network and high number of outgoing connections is important
in order to inject traffic into Wikipedia. By contrast, articles that are
often used as exit points (search-exit and nav.-exit) are located more
in the periphery of the network (low k-core value), are less often
linked to, and contain less out-links themselves, which eventually
results in higher resistance values, signifying the termination of
user sessions.
For further analysis, we sort the articles according to their k-core
value and discretize them into 25 equally-sized bins. For each bin,
we compute the quartiles for searchshare and resistance, as seen
in Figure 4. Looking at the median (center red line), we find that
for articles with increasing k-core values the searchshare indeed
decreases (cf. Figure 4(a)). However, this effect stops at around 50%
of the dataset, i.e., for half of the articles, which are located in
high k-core network layers, the searchshare is mostly independent
from the exact centrality. Regarding the resistance, there exists a
substantial amount of nodes with a resistance of 1.0 for all k-core
values, cf. the green line indicating the upper quartile. However,
for the more central nodes, an increased number of pages have a
significantly lower resistance (cf. Figure 4(b)).
4.3 Content and Edit Features
Next, we characterize the article groups in terms of the article con-
tent and edit history which account for the content presentation
and content production process. Table 3 reports the median values
of these features in the four article groups. We can observe that the
content features (number of tables, number of sections, size of the
article) are modestly increased for relay articles, i.e., articles that
contain more content tend to be less often exit points of navigation
sessions. By contrast, the revision history plays a more important
role: we can see that articles in the search-relay group have (as a
median) more than twice the number of editors and revisions com-
pared to exit articles, and tend also to be somewhat older. Articles
in the group nav.-relay show similar, but slightly lower values with
the same tendency. The median feature values for both "exit" article
Table 2: Network features. For each network feature, the ta-
ble shows the median feature values of the articles in the re-
spective group. The article network properties influence the
preferred access behavior. Nav.-relay articles act as intersec-
tions for the traffic as they occupy central network positions
and provide lots of in- and outgoing links. Search-relay ar-
ticles are similarly well-connected, which is important for
injecting traffic into Wikipedia. Exit points (search-exit and
nav.-exit articles) lack connectivity and are unable to chan-
nel external and internal traffic, respectively.
M
search-exit
search-relay nav.-relay nav.-exit overall
in-degree
out-degree
degree
k-core
14
33
51
44
38
56
105
76
54
71
131
95
18
35
57
49
22
41
69
57
(a) k-core vs. searchshare
(b) k-core vs. resistance
Figure 4: Network position. The figure shows the first (blue),
second (red), and third (green) quartile of searchshare (a)
and resistance (b) as function of the article position in the
network indicated by its k-core. K-core values are divided
into 25 bins. The access behavior on articles is influenced
by their position in the network. The more central an arti-
cle, the lower its searchshare and resistance -- i.e., the more
traffic it relays through the network.
capturing aspects related to the content of the articles. The dataset
contains roughly 5 million articles connected by 391 million links.
For these Wikipedia articles, we determine a wide variety of fea-
tures describing their characteristics. We categorize these features
into three different groups, i.e., (i) network properties, (ii) content
and edit properties and (iii) article topics. The network features
consist of in-, out- and total degree of the article in the Wikipedia
link network as well as the k-core value for this network as a typi-
cal centrality measure. Regarding the content and edit properties,
we calculated for each article the number of sections, the number
of figures and the number of lists contained in the article. These
features capture visual appearance of the article, whereas the num-
ber of revisions and editors represent content production process.
We also consider the article age measured in years to account for
differences between mature and young articles. To account for the
amount of information provided in an article, we calculate its size
in kilobytes. The features capturing the content production pro-
cess are extracted from the TokTrack dataset [8] and consider the
period between article creation and the end of August 2016. As
the Wikipedia article categories are often too specific6, we fit a
Latent Dirichlet Allocation (LDA) [2] model on article texts using
Gensim [27] bag of words article vectors with removed stop words.
To allow for manual interpretation of the topics, we fit a model for
20 topics. Subsequently, we asked five independent researchers to
provide topic labels based on the top words and Wikipedia articles
for each topic and summarized their labels. Section 4.4 describes
the extracted topics. The following analyses are based on a random
sample of 50000 articles.
4.2 Network Features
To understand the role of the network features, we compute the
median of the features for each of the four article groups search-exit,
search-relay, nav.-relay, and nav.-exit (cf. Section 3). The results are
shown in Table 2. We can observe that articles with below-average
6I.e., very specific categories of articles are not linked to the relevant super-category;
in other cases, two conflicting categories are linked or fitting categories are missing
completely.
5
051015200.00.20.40.60.81.0searchshareWikipedia051015200.00.20.40.60.81.0resistanceWikipediaWebSci '18, May 27 -- 30, 2018, Amsterdam, Netherlands
D. Dimitrov et al.
(a) revisions vs. searchshare
(b) revisions vs. resistance
Figure 5: Edit activity. The figure shows the first (blue), sec-
ond (red), and third (green) quartile of searchshare (a) and
resistance (b) as function of the article editors' activity in-
dicated by the number of revisions. Revisions values are di-
vided into 25 bins. Except for the most edited articles, high
edit activity has a negative effect on the resistance, which on
the other hand has a positive effect on navigation indicated
by the lower searchshare.
groups are very similar and show slightly lower editor and revision
numbers. Overall, content and edit features provide strong indica-
tors for articles relaying traffic (as opposed to being exit points), but
only weak indicators for being accessed by search or by navigation.
We will have a more detailed look at an exemplary edit feature,
i.e., the number of revisions. Analogously to above (network fea-
tures), we assign the articles to one of 25 bins according to their
revision count, compute the distribution of searchshare and resis-
tance for each bin, and plot the quartiles. The results are shown
in Figure 5. We can see that the median searchshare continuously
decreases with increasing number of revisions. The effect is in par-
ticular significant for very low number of revisions (cf. Figure 5(a)).
Additionally, the spread of the distribution -- measured by the in-
terquartile range (IQR) -- also substantially decreases the more
revisions an article has. This can likely be explained by regression to
the mean since articles with less revisions receive overall less views,
making more extreme searchshare values more likely. With regard
to the resistance, we can observe that specifically high number of
revisions correlate with a lower resistance scores (cf. Figure 5(b)).
The number of editors, and the age of an article is highly correlated
with the number of revisions and reveal a very similar behavior
with respect to searchshare and resistance.
Table 3: Content and edit features. For each content and edit
feature, the table shows the median feature values of the ar-
ticles in the respective group. The content production pro-
cess influences the access behavior as search- and nav.-exit
points have low edit activity, and offer less content. On the
other hand, relay articles are more frequently edited, and
congruently, are generally more extensive.
M
search-exit
search-relay nav.-relay nav.-exit overall
editors
revisions
sections
tables
age
size
21
38
6
3
9
41
52
97
7
3
11
50
46
86
7
4
10
54
21
37
4
3
8
41
25
46
6
4
9
44
6
(a) searchshare
(b) resistance
Figure 6: Access behavior for all topics. Topics are ordered
from highest (left) to lowest (right) for searchshare (a) and
resistance (b). Values over (blue) and below (red) the re-
spective mean value are colored respectively. There are pro-
nounced differences in the dominant access behavior on dif-
ferent Wikipedia topics.
4.4 Topic Features
Search-related popularity, navigability as well as other character-
istics related to traffic might be highly dependent on the topical
domain of an article. We hence investigate the access behavior
across Wikipedia's numerous article themes, represented by the 20
topics we have extracted. Table 4 provides descriptive statistics of
these topics. With 32% "TV and Movies" is the topic with the most
views while consisting of a mere 7.5% of all articles on Wikipedia.
"Technology, Stubs" and "Architecture" show an opposing dynamic,
Table 4: Topic statistics. The table shows the percentage of
articles and views for each topic. Additionally, it reports the
median age in years, number of editors and revisions, and
the size of the articles in kB. Not surprisingly, popular arti-
cles are generally longer in terms of text, edited more and
by higher number of editors, and relatively old.
Technology, Stubs
Architecture
TV&Movies
Fine Arts&Culture
topic
Sports
Politics
Biology
Music
Research&Education
Media/Economics
Military
Industry&Chemistry
North America
Space&Racing
Europe
Asia
Latin America&Iberia
UK&Commonwealth
Eastern Europe&Russia
Awards&Celebrities
%
articles
19.3
12.4
12.0
8.1
7.5
7.2
7.0
6.9
4.8
3.3
3.1
3.0
1.2
1.2
0.9
0.7
0.5
0.5
0.4
0.0
%
views
7
5
8
8
32
6
6
9
2
4
4
6
0
2
0.0
0.0
0.0
0.0
0.0
0.0
M
age
7
8
7
8
8
8
7
8
7
8
8
9
9
8
7
5
7
7
7
6
M
editors
M
revisions
20
31
37
47
96
49
29
64
40
54
47
66
23
52
19
8
20
19
15
22
36
61
86
103
197
100
57
136
87
115
105
126
39
114
36
14
33
40
24
42
M
size
38
56
68
60
55
49
46
53
47
49
65
55
52
73
52
60
58
43
49
41
051015200.00.20.40.60.81.0searchshareWikipedia051015200.00.20.40.60.81.0resistanceWikipediaNorth AmericaResearch & EducationAsiaArchitectureMedia/EconomicsIndustry & ChemistryFine Arts & CultureLatin America & IberiaTechnology, StubsEuropeBiologySportsPoliticsTV & MoviesAwards & CelebritiesMusicSpace & RacingEastern Europe & RussiaMilitaryUK & Commonwealth0.460.560.660.76North AmericaAsiaResearch & EducationArchitectureEuropeMedia/EconomicsBiologyEastern Europe & RussiaIndustry & ChemistryFine Arts & CultureSportsLatin America & IberiaPoliticsSpace & RacingTechnology, StubsMusicTV & MoviesMilitaryAwards & CelebritiesUK & Commonwealth0.730.780.830.880.93Query for Architecture, Click through Military:
Comparing the Roles of Search and Navigation on Wikipedia
WebSci '18, May 27 -- 30, 2018, Amsterdam, Netherlands
Figure 7: Relative difference of individual topics to the overall view distribution of searchshare vs. resistance (cf. Figure 2(b)).
White denotes no relative difference, blue denotes underrepresentation (down to 0), while red denotes overrepresentation
(max. over all topics at 2). The figure highlights the differences between search-heavy and navigation-heavy topics compared
to the all-articles baseline. "Architecture", exhibiting above-mean searchshare and resistance (cf. Figure 6) stands represen-
tative for six similarly distributed topics and mainly attracts search hits that it cannot pass on. "Military" shows an almost
inverted pattern, mostly receiving as well as producing internal navigation. The bi-focal distribution of "Sports" can be found
in "Politics" and "Fine Arts & Culture" as well, while patterns for "Music" and "TV & Movies" are more unique.
(a) k-core vs. searchshare
(b) k-core vs. resistance
(c) revisions vs. searchshare
(d) revisions vs. resistance
(e) k-core vs. searchshare
(f) k-core vs. resistance
(g) revisions vs. searchshare
(h) revisions vs. resistance
Figure 8: Relation of traffic features with network and content features. For a topic dominated by search ("Architecture") and
one dominated by navigation ("Military"), the figure shows the first (blue), second (red), and third (green) quartile of the article
searchshare and resistance as function of its position in the network indicated by its k-core and editors' activity indicated by
the number of revisions. Articles are divided into 25 bins by k-core and revision values. Apart from base-level differences of
searchshare and resistance, the topics exhibit comparable trends, with the exception of searchshare not being influenced as
much by network position or edit activity features for "Military" articles.
providing a large amount of articles, but relatively few views.7
Overall, the amounts of articles and view counts are not strongly
correlated. Consistent with previous research, we also observe that
the popular articles are in general longer, relative old, and revised
more often by more editors [32].
A look at the distribution of searchshare and resistance in the
overview provided by Figure 6 reveals the different access behav-
iors for Wikipedia topics. To examine these pronounced differences
further, we set out to highlight the dissimilarities of the overall
searchshare vs. resistance distribution for total views -- as shown
7 "Technology, Stubs" is a compound of general Wikipedia:Stub articles and often short
technology articles that were not sufficiently distinguishable by LDA. We exclude it
from discussion here due to its ambivalent nature.
7
in Figure 2(b) -- with the same distribution for the individual topics.
To do so, we create heatmaps pinpointing the relative differences
of each topic to the baseline of the overall distribution. This is
achieved by performing a bin-wise division of a topic's normal-
ized view count for a given searchshare-resistance bin with the
respective normalized bin for the general Wikipedia traffic behavior.
The resulting heatmaps are shown in Figure 7 for selected topics.
They draw a clear picture of the over- and under-representation
of certain article types (in terms of views) in each topic against
the whole-system baseline. "Architecture" in Figure 7 stands as
one representative for a group of topics ("Biology", "Industry &
Chemistry", Research & Education, "Space & Racing") that all ex-
hibit a very similar distribution with their article views occurring
0.00.20.40.60.81.0Resistance0.00.20.40.60.81.0SearchshareArchitecture0.00.20.40.60.81.0Resistance0.00.20.40.60.81.0SearchshareMilitary0.00.20.40.60.81.0Resistance0.00.20.40.60.81.0SearchshareSports0.00.20.40.60.81.0Resistance0.00.20.40.60.81.0SearchshareMusic0.00.20.40.60.81.0Resistance0.00.20.40.60.81.0SearchshareTV & Moviesunderrepr.no diff.overrepr.051015200.00.20.40.60.81.0searchshareArchitecture051015200.00.20.40.60.81.0resistanceArchitecture051015200.00.20.40.60.81.0searchshareArchitecture051015200.00.20.40.60.81.0resistanceArchitecture051015200.00.20.40.60.81.0searchshareMilitary051015200.00.20.40.60.81.0resistanceMilitary051015200.00.20.40.60.81.0searchshareMilitary051015200.00.20.40.60.81.0resistanceMilitaryWebSci '18, May 27 -- 30, 2018, Amsterdam, Netherlands
D. Dimitrov et al.
at high searchshare and high resistance, i.e., these topics are mostly
searched and not used for further navigation. In stark contrast,
views for "Military" topics occur to the largest part in comparably
low-resistance articles, that are mostly navigated to (views for "UK
& Commonwealth" are distributed almost analogously). "Sports"
reveals a similar inclination for nav-relay types of articles attracting
views, yet sports articles also frequently get accessed by search
and abandoned immediately (closely related patterns: "Fine Arts
& Culture" and "Politics"). Lastly, "Music" and "TV & Movies" ex-
hibit remarkably idiosyncratic distribution patterns, not mirrored
by another topic. "Music" attracts many views in a search-relay
fashion, but on the other hand also explicitly acts as a "dead end"
for internal navigation.
As "maximally different" topics in respect to these traffic pat-
terns and with overall high view counts, we select "Architecture"
for search-heavy topics, and "Military" for navigation-heavy topics
to conduct a deeper analysis regarding article network, content and
edit properties. While "Architecture" includes articles covering pop-
ular buildings, landmarks and municipalities, "Military" consists of
articles covering significant historic events often associated with
violence such as wars and notable battles, along with many articles
dedicated to military units, personnel and equipment (cf. [28]). For
the general access behavior concerning the network, content and
edit features, we again assign the articles to one of 25 bins accord-
ing to their k-core and revision counts, compute the distribution of
searchshare and resistance for each bin, and plot the quartiles (cf.
Figure 8). For "Architecture", searchshare (a) initially decreases for
increasing k-core but sees an uptick for very central nodes, and a
very similar behavior can be observed for resistance (b). "Military"
is characterized by generally lower levels of both metrics, yet shares
the trend of decreasing resistance with increasing k-core (e), mean-
ing that for both topics, the more central articles in the network are
able to channel visitors into Wikipedia, with the top-most central
nodes excluded from this trend. Being edited more implies decreas-
ing resistance for both topics ((d), (h)), although this trend reveals
itself only for much higher revision counts for "Architecture", most
likely to its generally higher resistance. Edit counts have no clearly
distinguishable influence on "Military" articles' searchshare, for
"Architecture" it, however, implies lower searchshare.
Summary. The results presented in this section suggest that the
content heavily influences the access behavior on Wikipedia. Par-
ticularly, topical domains are accessed differently, i.e., users prefer
to access articles about architecture and landmarks mainly through
search, whereas more historical articles about military actions are
navigated. Moreover, mature articles with high revision numbers
and article located in the core of the network are more likely to
channel traffic through Wikipedia, whereas articles located at the
network periphery act as exit points.
5 MODELING ACCESS BEHAVIOR
Our previous analysis characterized the user access behavior on
Wikipedia articles with respect to their traffic from search and
navigation dependent on the article features. However, this analysis
does not reveal the impact of the feature groups on the access
behavior. To this end, we set out to model the access behavior on
articles in order to measure the influence of each feature group. The
(a) searchshare
(b) resistance
Figure 9: Results. The figure shows the model performance
(ROC AUC) for (a) searchshare and (b) resistance. Predict-
ing searchshare is more challenging than predicting resis-
tance. The article topic determines the preferred access be-
havior (search or navigation). However, position in the net-
work, content maturity and presentation of the article are
indicative for the resistance, and thus if an article will be an
entry-exit point or a relay point for the traffic.
higher the predicative performance of a feature group, the higher
the influence of the group is on the role articles play with respect to
the traffic (entry-exit and relay articles), and thus on the preferred
information access form (search and navigation).
Modeling searchshare. We ask, given a Wikipedia article, if it is
possible to classify it as dominated by search, i.e., searchshare >
0.66 or dominated by navigation, i.e., searchshare ≤ 0.66. The
threshold used for the separation is the searchshare mean (cf. Sec-
tion 3). In our experiments, we consider four different sets of article
features: (i) network features, i.e., in-, out-degree, k-core, (ii) content
& edit features, i.e., number of revisions and editors, article size,
number of tables, pictures, lists, and (iii) topic. For predicting the
preferred access form, we fit a model using gradient boosting and
evaluate the model's performance with ROC AUC. The model is
trained using 10-fold cross validation at a balanced dataset. On this
dataset random guessing results in 50% accuracy, which is also used
as baseline. Figure 9(a) shows the individual performance for each
feature group, as well as the performance for the combination of
all features. We observe that modeling searchshare is difficult even
with all features (AUC = 0.70). As expected, the network features are
the least indicative (AUC = 0.58). Further, the topic feature predicts
searchshare best (AUC = 0.64), which suggests strong user prefer-
ences for specific information access form, i.e., search or navigation
for different topics.
Modeling resistance. To model the resistance of Wikipedia arti-
cles, i.e., they ability to relay traffic, we treat an article as a relay
point if resistance ≤ 0.88 and an exit point if resistance > 0.88.
Again, the separation of the articles is based on the resistance mean
(cf. Section 3). We consider the same feature groups as for mod-
eling searchshare and use random guessing as our baseline. For
classifying the articles, we again utilize 10-fold cross validation to
train a gradient boosting model on a balanced dataset. The perfor-
mance is measured in terms of ROC AUC. Figure 9(b) shows the
individual classification performance for that task for each feature
group. The content and edit features are the most important (AUC
= 0.76). This makes the case for an influence of the way content is
8
baselinenetworkcontent & edittopicall0.00.20.40.60.81.0AUC0.50.580.610.640.7baselinenetworkcontent & edittopicall0.00.20.40.60.81.0AUC0.50.680.760.640.8Query for Architecture, Click through Military:
Comparing the Roles of Search and Navigation on Wikipedia
WebSci '18, May 27 -- 30, 2018, Amsterdam, Netherlands
presented to the user on lowering or increasing the resistance of a
page. Unlike for searchshare, the network features are indicative
for the resistance of an article (AUC = 0.68). This suggests that
the network position of an article influences the extent to which
it channels traffic. The topic plays only a small role, which again
highlights the importance of the quality of the content presentation
and production process.
Summary. In general, modeling article resistance is easier than
modeling searchshare as suggested by the higher ROC AUC values.
Modeling searchshare is challenging due to the influence of external
events (e.g., the transition data exhibits high view numbers on
articles about the Summer Olympics 2016), and the content diversity.
However, investing in diverse content from different topics seems
to be the best way for Wikipedia to attract people as the article's
topic is the most indicative feature regarding searchshare. On the
other hand, the content presentation, and the article's position in
the network are decisive for its ability to relay traffic.
6 RELATED WORK
Since the inception of the Web, researchers have been studying the
user content consumption behavior. Initially, content has been ac-
cessed by traversing hyperlinks on the Web [14]. This navigational
user behavior on the Web and on Wikipedia is often modeled using
well-established methods such as Markov chains [3, 23, 25, 29, 30]
and decentralized search models [5, 12]. Numerous navigational hy-
potheses on Wikipedia have also been presented based on, e.g., click
traces stemming from navigational games and on click data from
server logs. For example, West and Leskovec observed a trade-off
between similarity and popularity to the target article in the user
sessions of Wikispeedia [37]. Lamprecht et al. studied the general
navigability of several Wikipedia language editions and showed
how the Wikipedia article structure influences the user click be-
havior [15, 16]. Dimitrov et al. conducted a large-scale study on the
navigational behavior on Wikipedia. They found that users tend
to select links located in the beginning of Wikipedia articles and
links leading to articles located in the network periphery [6, 7].
By constructing a navigational phase space from transition data,
Gilderslave and Yasseri studied internal navigation on Wikipedia
and identified articles with extreme, atypical, and mimetic behav-
ior [11]. Web content can be also discovered by formulating and
executing a search query. Kumar and Tomkins performed an initial
characterization of the user search behavior [13], while Weber and
Jaimes studied the search engine usage with respect to the users
demographics, topics, and session length [36]. Earlier Wikipedia
reading behavior studies focused on explaining bursts, dynamics of
topic popularity and search query analysis to Wikipedia [17, 26, 32 --
34]. A more recent study by Singer et al. investigated the Wikipedia
readers motivations [31]. By complementing a reader survey with
server log data, they discovered specific behavior patterns for dif-
ferent motivations, i.e., bored readers tend to produce long article
sequences spanning different topics. McMahon et al. focused on
the interdependence between search engines, i.e., Google and Wiki-
pedia [21]. They showed that Google is responsible for generating
high traffic to Wikipedia articles, although, in some cases traffic is
reduced due to the direct inclusion of Wikipedia content in search
results. Compared to our work, McMahon et al. concentrate on the
9
peer production site and not on the content consumption. While
there is a long line of research with respect to search and -- more
so -- navigation, they have rarely been studied together which is
the focus of this work.
7 DISCUSSION
As a general observation, our results shed light on the different roles
of articles with respect to traffic entering and leaving Wikipedia.
On one hand, an overwhelming amount of pages attracts mostly
direct search traffic and only little internal navigation, thanks to
Wikipedia's strong symbiotic relationship with web search engines.
Yet, notably, most of that traffic goes to articles that act mainly as
exit points, i.e., users to not continue visiting Wikipedia directly
afterwards. This is congruent with, but not necessarily because
of, a pure "look up" nature of search. Only a very small share of
searched articles is responsible for relaying disproportionally large
amounts of traffic into the rest of Wikipedia. We see that these arti-
cles are well-connected, more edited and more extensive than their
exit counterparts, although we cannot yet conclude whether this
is because of a "worn path" paradigm, wherein links and content
are built because of the natural thematic positioning and suitabil-
ity of an article to act as an entry point and as a bridge to more
content, or because the a-priori structure of these article facilitates
the observed navigational patterns. A longitudinal study, which we
plan for future work, could obtain more detailed insights on this
co-evolution of structural features and navigation. Furthermore,
our data shows that articles, which are able to forward traffic, sit
mostly at the very (k-)core of the link network. However, this is
not necessarily the case for being a receiver of navigation traffic,
with searchshare values stabilizing already at lower k-cores -- and
with inlinks not being more highly correlated with k-core than
outlinks. This hints to the fact that -- to some extent -- users enter
Wikipedia by search on more central articles, and then navigate
outwards from more to less central nodes. This is consistent with
previous findings studying navigation on Wikipedia [7].
Regarding articles with different topical alignments, we see cer-
tain evidence that the thematic domain of a user's information
pursuit seems connected with the "mode" of how this informa-
tion is attained. While the highly aggregate data used in this work
does not allow for direct inferences as to the type of information
retrieval in the continuum between a targeted and well-defined
lookup and a completely serendipitous discovery process, we can
nonetheless discern distinct patterns between article topics. Al-
though "Architecutre" articles are not more devoid of in- or out-
navigation opportunities than "Military" ones, they show far higher
amounts of search views and exit points, while the latter one is
navigated at a constantly high level, regardless of their connected-
ness. A possible explanation of the navigation-heavy behavior on
"Military" articles is that people like follow paths through events in
order to understand historical developments.
For our analysis, we utilize publicly available clickstream data
about Wikipedia. However, due to privacy restrictions, the data con-
tains only (referrer, resource) pairs that occurred at least ten times
during the data collection period. This could lead to a skewed view
on the access behavior when contrasting search and navigation. For
example, if an article is navigated in total much more than ten times
WebSci '18, May 27 -- 30, 2018, Amsterdam, Netherlands
D. Dimitrov et al.
over different links, but each individual link is transitioned less than
ten times, all of these transitions will not be included in the data.
In this case, the searchshare for this article might get substantially
overestimated. Since this might occur specifically for articles with
overall few page views, it may be a potential explanation for some
findings, e.g., that article in the periphery of the link network show
a stronger prevalence of search.
8 CONCLUSION AND FUTURE WORK
In this work, we studied the prevalence of user access prefer-
ences across articles on Wikipedia. For that purpose, we introduced
searchshare and resistance as two key features to characterize article
traffic. While we can identify search as the more dominant access
paradigm compared to navigation on Wikipedia overall, we observe
heterogeneous behavior at different types of articles. That is, de-
pending on the article topic and other article properties, the share of
navigation and search strongly varies, as well the amount of traffic
an article relays to other Wikipedia pages. For example, articles on
topics such as "Military" exhibit above average access by navigation,
while topics such as "Architecture" show a strong prevalence of
search. Furthermore, edit activity on a an article and its position in
the network is strongly correlated with its ability to relay traffic on
Wikipedia. Thus, we find overall that both, search and navigation
play a crucial role for information seeking on Wikipedia.
In the future, we plan to extend our studies over time intervals
and to other language editions in order to further explore cultural
differences in the identified access patterns.
REFERENCES
[1] Tim Berners-Lee, Mark Fischetti, and Michael L Foreword By-Dertouzos. 2000.
Weaving the Web: The original design and ultimate destiny of the World Wide Web
by its inventor. HarperInformation.
[2] David M Blei, Andrew Y Ng, and Michael I Jordan. 2003. Latent Dirichlet Alloca-
tion. Journal of Machine Learning Research 3, Jan (2003), 993 -- 1022.
[3] Flavio Chierichetti, Ravi Kumar, Prabhakar Raghavan, and Tamas Sarlos. 2012.
Are web users really markovian?. In Proceedings of the 21st international conference
on World Wide Web. ACM, 609 -- 618.
[4] Julie Coiro and Elizabeth Dobler. 2007. Exploring the online reading compre-
hension strategies used by sixth-grade skilled readers to search for and locate
information on the Internet. Reading research quarterly 42, 2 (2007), 214 -- 257.
[5] Dimitar Dimitrov, Philipp Singer, Denis Helic, and Markus Strohmaier. 2015. The
Role of Structural Information for Designing Navigational User Interfaces. In
Conference on Hypertext and Social Media.
[6] Dimitar Dimitrov, Philipp Singer, Florian Lemmerich, and Markus Strohmaier.
2016. Visual Positions of Links and Clicks on Wikipedia. In Int. Conference
Companion on World Wide Web.
[7] Dimitar Dimitrov, Philipp Singer, Florian Lemmerich, and Markus Strohmaier.
2017. What Makes a Link Successful on Wikipedia?. In Proceedings of the 26th
International Conference on World Wide Web. International World Wide Web
Conferences Steering Committee, 917 -- 926.
[8] Fabian FlÃűck, Kenan Erdogan, and Maribel Acosta. 2017. TokTrack: A Complete
Token Provenance and Change Tracking Dataset for the English Wikipedia.
https://aaai.org/ocs/index.php/ICWSM/ICWSM17/paper/view/15689
[9] George W Furnas. 1997. Effective view navigation. In Proceedings of the ACM
SIGCHI Conference on Human factors in computing systems. ACM, 367 -- 374.
[10] George W. Furnas, Thomas K. Landauer, Louis M. Gomez, and Susan T. Dumais.
1987. The vocabulary problem in human-system communication. Commun. ACM
30, 11 (1987), 964 -- 971.
[11] Patrick Gilderslave and Taha Yasseri. 2017. Inspiration, Captivation, and Misdi-
rection: Emergent Properties in Networks of Online Navigation. arXiv:1710.03326
(2017).
[12] Denis Helic, Markus Strohmaier, Michael Granitzer, and Reinhold Scherer. 2013.
Models of human navigation in information networks based on decentralized
search. In Conference on Hypertext and Social Media.
10
[13] R Kumar and A Tomkins. 2009. A Characterization of Online Search Behaviour.
Data Engineering Bullettin 32, 2 (2009), 2009.
[14] Ravi Kumar and Andrew Tomkins. 2010. A characterization of online browsing
behavior. In Proceedings of the 19th international conference on World wide web.
ACM, 561 -- 570.
[15] Daniel Lamprecht, Dimitar Dimitrov, Denis Helic, and Markus Strohmaier. 2016.
Evaluating and improving navigability of Wikipedia: A comparative study of
eight language editions. In Proceedings of the 12th International Symposium on
Open Collaboration. ACM, 17.
[16] Daniel Lamprecht, Kristina Lerman, Denis Helic, and Markus Strohmaier. 2017.
How the structure of wikipedia articles influences user navigation. New Review
of Hypermedia and Multimedia 23, 1 (2017), 29 -- 50.
[17] Janette Lehmann, Claudia Müller-Birn, David Laniado, Mounia Lalmas, and
Andreas Kaltenbrunner. 2014. Reader preferences and behavior on wikipedia. In
Conference on Hypertext and Social Media.
[18] Donald J Leu, Jill Castek, D Hartman, Julie Coiro, L Henry, J Kulikowich, and
Stacy Lyver. 2005. Evaluating the development of scientific knowledge and new
forms of reading comprehension during online learning. Final report presented
to the North Central Regional Educational Laboratory/Learning Point Associates.
Retrieved May 15 (2005), 2006.
[19] Donald J Leu, Heidi Everett-Cacopardo, Lisa Zawilinski, Greg McVerry, and
W Ian O'Byrne. 2012. New Literacies of online reading comprehension. The
Encyclopedia of Applied Linguistics (2012).
[20] Anne Mangen. 2008. Hypertext fiction reading: haptics and immersion. Journal
of research in reading 31, 4 (2008), 404 -- 419.
[21] Connor McMahon, Isaac Johnson, and Brent Hecht. 2017. The Substantial Inter-
dependence of Wikipedia and Google: A Case Study on the Relationship Between
Peer Production Communities and Information Technologies. (2017).
[22] Theodor H Nelson. 1965. Complex information processing: a file structure for
the complex, the changing and the indeterminate. In Proceedings of the 1965 20th
national conference. ACM, 84 -- 100.
[23] Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. 1999. The
PageRank citation ranking: bringing order to the web. Stanford InfoLab.
[24] Ashwin Paranjape, Robert West, Leila Zia, and Jure Leskovec. 2016. Improving
Website Hyperlink Structure Using Server Logs. In Int. Conference on Web Search
and Data Mining.
[25] Peter LT Pirolli and James E Pitkow. 1999. Distributions of Surfers' Paths through
the World Wide Web: Empirical Characterizations. World Wide Web 2, 1-2 (1999),
29 -- 45.
[26] Jacob Ratkiewicz, Santo Fortunato, Alessandro Flammini, Filippo Menczer, and
Alessandro Vespignani. 2010. Characterizing and modeling the dynamics of
online popularity. Physical review letters 105, 15 (2010), 158701.
[27] Radim Řehůřek and Petr Sojka. 2010. Software Framework for Topic Modelling
with Large Corpora. In Proceedings of the LREC 2010 Workshop on New Challenges
for NLP Frameworks. ELRA, 45 -- 50.
[28] Anna Samoilenko, Florian Lemmerich, Katrin Weller, Maria Zens, and Markus
Strohmaier. 2017. Analysing Timelines of National Histories across Wikipedia
Editions: A Comparative Computational Approach. In Proceedings of the Eleventh
International AAAI Conference on Web an Social Media (ICWSM 2017). 210 -- 219.
[29] Philipp Singer, Denis Helic, Andreas Hotho, and Markus Strohmaier. 2015. Hyp-
trails: A bayesian approach for comparing hypotheses about human trails on the
web. In Int. Conference on World Wide Web.
[30] Philipp Singer, Denis Helic, Behnam Taraghi, and Markus Strohmaier. 2014.
Detecting memory and structure in human navigation patterns using markov
chain models of varying order. PloS One 9, 7 (2014), e102070.
[31] Philipp Singer, Florian Lemmerich, Robert West, Leila Zia, Ellery Wulczyn,
Markus Strohmaier, and Jure Leskovec. 2017. Why We Read Wikipedia. In
Proceedings of the 26th International Conference on World Wide Web. International
World Wide Web Conferences Steering Committee, 1591 -- 1600.
[32] Anselm Spoerri. 2007. What is popular on Wikipedia and why? First Monday 12,
4 (2007).
[33] Marijn ten Thij, Yana Volkovich, David Laniado, and Andreas Kaltenbrunner. 2012.
Modeling and predicting page-view dynamics on Wikipedia. CoRR abs/1212.5943
(2012).
[34] Vivienne Waller. 2011. The search queries that took Australian Internet users to
Wikipedia. Information Research 16, 2 (2011).
[35] William Webber, Alistair Moffat, and Justin Zobel. 2010. A similarity measure
for indefinite rankings. ACM Transactions on Information Systems (TOIS) 28, 4
(2010), 20.
[36] Ingmar Weber and Alejandro Jaimes. 2011. Who uses web search for what: and
how. In International Conference on Web Search and Data Mining.
[37] Robert West and Jure Leskovec. 2012. Human wayfinding in information net-
works. In Int. Conference on World Wide Web.
[38] Ellery Wulczyn and Dario Taraborelli. 2016. Wikipedia Clickstream. figshare.
doi:10.6084/m9.figshare.1305770. Accessed: 2017-5-3.
|
1703.09774 | 1 | 1703 | 2017-03-06T15:44:13 | Measuring the happiness of large-scale written expression: Songs, Blogs, and Presidents | [
"cs.SI",
"physics.soc-ph"
] | The importance of quantifying the nature and intensity of emotional states at the level of populations is evident: we would like to know how, when, and why individuals feel as they do if we wish, for example, to better construct public policy, build more successful organizations, and, from a scientific perspective, more fully understand economic and social phenomena. Here, by incorporating direct human assessment of words, we quantify happiness levels on a continuous scale for a diverse set of large-scale texts: song titles and lyrics, weblogs, and State of the Union addresses. Our method is transparent, improvable, capable of rapidly processing Web-scale texts, and moves beyond approaches based on coarse categorization. Among a number of observations, we find that the happiness of song lyrics trends downward from the 1960's to the mid 1990's while remaining stable within genres, and that the happiness of blogs has steadily increased from 2005 to 2009, exhibiting a striking rise and fall with blogger age and distance from the equator. | cs.SI | cs |
Measuring the happiness of large-scale written expression: Songs, Blogs, and
Presidents.
Peter Sheridan Dodds1, ∗ and Christopher M. Danforth1, †
1Vermont Complex Systems Center, Computational Story Lab,
the Vermont Advanced Computing Core, Department of Mathematics & Statistics,
The University of Vermont, Burlington, VT 05401.
(Dated: March 30, 2017)
The importance of quantifying the nature and intensity of emotional states at the level of pop-
ulations is evident: we would like to know how, when, and why individuals feel as they do if we
wish, for example, to better construct public policy, build more successful organizations, and, from
a scientific perspective, more fully understand economic and social phenomena. Here, by incorpo-
rating direct human assessment of words, we quantify happiness levels on a continuous scale for a
diverse set of large-scale texts: song titles and lyrics, weblogs, and State of the Union addresses.
Our method is transparent, improvable, capable of rapidly processing Web-scale texts, and moves
beyond approaches based on coarse categorization. Among a number of observations, we find that
the happiness of song lyrics trends downward from the 1960's to the mid 1990's while remaining
stable within genres, and that the happiness of blogs has steadily increased from 2005 to 2009,
exhibiting a striking rise and fall with blogger age and distance from the Earth's equator.
Journal reference: Journal of Happiness Studies, 11(4), 441–456, 2010; doi:10.1007/s10902-009-
9150-9; first published online July 20, 2009; open access.
I.
INTRODUCTION
The desire for well-being and the avoidance of suffer-
ing arguably underlies all behavior [1–4]. Indeed, across
a wide range of cultures, people regularly rank happiness
as what they want most in life [1, 3, 5] and numerous
countries have attempted to introduce indices of well-
being, such as Bhutan's National Happiness Index. Such
a focus is not new: Plato held that achieving eudaimonia
(flourishing) was an individual's true goal [6], Bentham's
hedonistic calculus and John Stuart Mill's refinements [7]
sought to codify collective happiness maximization as the
determinant of all moral action, and in the United States
Declaration of Independence, Jefferson famously assert-
ed the three unalienable rights of 'life, liberty, and the
pursuit of happiness.'
In recognizing the importance of quantifying well-
being, we have seen substantial interest and progress in
measuring how individuals feel in a wide range of con-
texts, particularly in the fields of psychology [2, 8–10]
and behavioral economics [1, 11]. Most methods, such
as experience sampling [12] and day reconstruction [11],
are based on self-reported assessments of happiness levels
and are consequently invasive to some degree; dependent
on memory and self-perception, which degrades reliabili-
ty [13]; likely to induce misreporting [14]; and limited to
small sample sizes due to costs.
Complementing these techniques, we would ideally also
have some form of transparent, non-reactive, population-
level hedonometer [15] which would remotely sense and
∗ [email protected]
† [email protected]
Typeset by REVTEX
levels, either post hoc or in real
quantify emotional
time [16]. Our method for achieving this goal based on
large-scale texts is to use human evaluations of the emo-
tional content of individual words within a given text
to generate an overall score for that text. Our method
could be seen as a form of data mining [17, 18], but since
it involves human assessment and not just statistical or
machine learning techniques, could be more appropriate-
ly classed as 'sociotechnical data mining.' In what fol-
lows, we explain the evaluations we use, how we combine
these evaluations in analysing written expression, and
address various issues concerning our measure.
For human evaluations of the 'happiness' level of indi-
vidual words, we draw directly on the Affective Norms
for English Words (ANEW) study [19]. For this study,
participants graded their reactions to a set of 1034
words with respect to three standard semantic differ-
entials [8] of good-bad (psychological valence), active-
passive (arousal), and strong-weak (dominance) on a 1–9
point scale with half integer increments. The specific
words tested had been previously identified as bearing
meaningful emotional content [20, 21]. Here, we focus
specifically on ratings of psychological valence. (We note
that other scales are possible, for example ones that do
not presume a single dimension of good-bad, but rather
independent scales for good and bad [22].)
Of great utility to our present work was the study's
explanation of the psychological valence scale to partici-
pants as a 'happy-unhappy scale.' Participants were fur-
ther told that "At one extreme of this scale, you are
happy, pleased, satisfied, contented, hopeful.
. . . The
other end of the scale is when you feel completely
unhappy, annoyed, unsatisfied, melancholic, despaired,
or bored" [19]. We can thus reasonably take the average
psychological valence scores for the ANEW study words
2
FIG. 1. Psychological valence (happiness) distribution for words in the Affective Norms for English Words (ANEW) study [19]
along with representative words. Word valence was scored by study participants on a scale ranging from 1 (lowest valence) to
9 (highest valence) with resolution 0.5.
as measures of average happiness experienced by a read-
er. For consistency with the literature, we will use the
term valence for the remainder of the paper.
The measured average valence of the ANEW study
words is well distributed across the entire 1–9 scale, as
shown by the bar graph in Fig. 1. This suggests we may
be able to fashion a measurement instrument based on
the ANEW words that has sufficient sensitivity to be of
use in evaluating and discriminating texts. Fig. 1 also
provides some example words employed in the ANEW
study along with their average valence scores.
To estimate the overall valence score for a text, which
we denote by vtext, we (a) determine the frequency fi that
the ith word from the ANEW study word list appears
in the text; and (b) compute a weighted average of the
valence of the ANEW study words as
where vi is the ANEW study's recorded average valence
for word i. As a simple example, take the pangram "The
quick brown fox jumps over the lazy dog." The three
underlined words appear in the ANEW study word list
with average valences 6.64, 4.38, and 7.57, respectively.
We would therefore assign an overall valence score for
3 × (1× 6.64 + 1× 4.38 + 1×
the sentence of vtext = 1
7.57) (cid:39) 6.20. We hasten to add that our method is only
reasonable for large-scale texts where we can demonstrate
robustness, and we discuss this in detail below. In Fig. 2,
we also outline our measurement schematically, using the
example of Michael Jackson's lyrics. To give a sense of
range, for the texts we analyse here, we find that average
valence typically falls between 4.5 and 7.5 (our results for
lyrics below will give concrete examples for these limiting
values).
Our general focus is thus on quantifying how writings
are received rather than on what an author may have
vtext = (cid:80)n
(cid:80)n
i=1 vifi
i=1 fi
(1)
intended to convey emotionally. Nevertheless, as we dis-
cuss below, we attempt to understand the latter with our
investigations of blogs.
In using the ANEW data set, we also take the view-
point that direct human assessment remains, in many
complex contexts, superior to articial intelligence meth-
ods. Describing the content of an image, for example,
remains an extremely difficult computational problem,
yet is trivial for people [23].
Since our method does not account for the meaning of
words in combination, it is suitable only for large-scale
texts. We argue that the results from even sophisti-
cated natural language parsing algorithms [24] cannot
be entirely trusted for small-scale texts, as individual
expression is simply too variable [25] and must there-
fore be viewed over long time scales (or equivalently via
large-scale texts). Problematically, the desired scalability
is a barrier for such parsing algorithms which run slow-
ly and still suffer from considerable inaccuracy. With
our method based on the ANEW data set, we are able
to collect and rapidly analyze very large corpuses, giv-
ing strength to any statistical assessment. Indeed, with
advances in cloud computing, we see no practical limit in
the size of meaningful corpuses we can analyse.
A key aspect of our method is that it allows us to quan-
tify happiness on a continuum. By comparison, previous
analyses have focused on differences in frequency of words
belonging to coarse, broad categories [26], such as 'nega-
tive emotion', 'no emotion', and 'positive emotion'. For
example, using a category-based approach and covering
a smaller scale in time and population size than we do
here, studies of blogs over a single day have found that
content and style vary with age and gender, suggesting
automated identification of author demographics is fea-
sible [27]. However, comparisons between data sets using
broad categorical variables are not robust, even if the
categories can be ordered. Consider two texts that have
123456789050100150200funeral (1.39) / rape (1.25) / suicide (1.25)disgusted (2.45) / hostage (2.20) / trauma (2.10)fault (3.43) / lawsuit (3.37) / corrupt (3.32)neurotic (4.45) / vanity (4.30) / derelict (4.28)street (5.22) / paper (5.20) / engine (5.20)optimism (6.95) / church (6.28) / pancakes (6.08)luxury (7.88) / trophy (7.78) / glory (7.55)triumphant (8.82) / paradise (8.72) / love (8.72)valence vnormalized frequency fANEW3
FIG. 2. A schematic example of our method for measuring the average psychological valence of a text, in this case the lyrics
of Michael Jackson's Billie Jean. Average valences for the song Billie Jean, the album Thriller, and all of Jackson's lyrics are
given at right.
the same balance of positive and negative emotion words.
Without a value of valence for individual words, we are
unable to distinguish further between these texts, which
may easily be distinct in emotional content. By using
the ANEW data set, we are able to numerically quantify
emotional content in a principled way that can be refined
with future studies of human responses to words.
II. DESCRIPTION OF LARGE-SCALE TEXTS
STUDIED
We use our method to study four main corpuses: song
lyrics, song titles, blog sentences written in the first per-
son and containing the word 'feel', and State of the Union
addresses. Before exploring valence patterns in depth for
these data sets, we first provide some summary statistics
relevant to our particular interests, and we also detail our
sources.
Table I records the total number of words and ANEW
words in each data set, along with the number of individ-
ual authors. The relative proportions of ANEW words
within the four corpuses range from 3.5% (State of the
Union) to 9.2% (song titles). These percentages are not
insubstantial due to Zipf's law [28] and the high preva-
lence of articles, prepositions, etc., in language. Approx-
imately 175 words account for half of all words in the
British National Corpus, for example, with the five dis-
tinctly neutral words 'the', 'of', 'and', 'a', and 'in' com-
prising over 15%.
Table II shows the five most frequent ANEW words
for each data set, presenting a kind of essence for each
corpus. The top five words in song lyrics and titles (which
we obtained from different databases, see below) are very
similar in prevalence, with 'love' unsurprisingly being the
dominant word. Blogs evince a more social aspect with
'people' and 'life' in the top five, while the nature of State
of the Union addresses is reflected in the disproportionate
appearance of 'world' and 'war.'
Fig. 3 shows the normalized abundances of ANEW
study words appearing in our various corpuses, as a func-
tion of their average valence. We include the example
of Michael Jackson's lyrics for reference. The insets for
each plot show the same distributions but now normal-
ized by the underlying frequency distribution of ANEW
words (Fig. 1). These insets reveal that song lyrics are
weighted towards high valence words, and the mode bin
is 8–9. Blogs, by contrast, have more low valence words
resulting in a bimodal distribution, though the mode bin
is again 8–9. State of the Union addresses favor high
valence words in the 7–8 bin and show less negativity
than blogs.
We obtained our four data sets as follows. We down-
loaded lyrics to 232, 574 songs composed by 20,025 artists
between 1960 and 2007 from the website hotlyrics.net
and tagged them with their release year and genre
using the Compact Disc Data Base available online at
freedb.org. We separately obtained from freedb.org
a larger database of song titles and genre classifica-
tions.
Starting August, 2005, first person sentences
ANEWwords11.perfume14.liek=1.love2.mother3.baby4.beauty5.truth6.people7.strong8.young9.girl10.movie12.queen13.name8.728.398.227.827.807.337.116.896.876.866.766.445.552.791131112411111fromamoviescene.'causetheliebecomesthetruth.AndbecarefulofwhatyoudoShe'sjustagirlwhoclaimsBillieJeanisnotmylover,thatIamtheone.MichaelJackson'sBillieJeanvMichaelJacksonvThriller=7.1=6.4=6.3=vtextXkfkvBillieJeanXkvkfkfk"Shewasmorelikeabeautyqueen2Andmotheralwaystoldme,becarefulwhoyoulove.vkLyricsfor4
Counts
Song lyrics
Song titles
Blogs
ANEW words 3,477,575 (5.9%) 5,612,708 (9.2%) 8,581,226 (5.5%) 61,926 (3.5%)
All words
Individuals
58,610,849
∼ 20,000
60,867,223
∼ 632,000
155,667,394
∼ 2,335,000
SOTU∗
1,796,763
43
∗ SOTU = State of the Union addresses
TABLE I. Total number of words in each corpus along with the number and percentage of words found in the ANEW database.
Individuals refers to the number of distinct artists, blogs, and presidents.
Rank Song lyrics
Song titles
Blogs
SOTU∗
1
2
3
4
5
love (7.39%)
love (7.37%)
good (4.89%)
time (4.18%) time (4.19%) time (4.72%)
baby (2.75%) baby (2.75%) people (3.94%) present (3.45%)
love (3.31%)
life (2.59%)
heart (2.14%) heart (2.15%) life (3.13%)
people (5.49%)
time (4.09%)
world (3.10%)
war (2.98%)
life (2.60%)
TABLE II. Top five most frequently occurring ANEW words in each corpus with frequency expressed as a percentage of all
ANEW words.
FIG. 3. Normalized frequency distribution of the ANEW study words binned by valence for the main corpuses (excluding
song titles) we study here, along with the more specific example of Michael Jackson's lyrics. Insets show ratios of normalized
frequencies for corpuses to that of the ANEW study word set.
12345678900.10.20.30.4Song lyrics:1234567890123456 vf / fANEW12345678900.10.20.30.4Michael Jackson's lyrics:1234567890123456 vf / fANEW12345678900.10.20.30.4valence vnormalized frequency fBlogs:1234567890123456 vf / fANEW12345678900.10.20.30.4State of the Union addresses:1234567890123456 vf / fANEW5
III. RESULTS
We analyse song lyrics first, in part to demonstrate
the robustness of our approach.
In Fig. 4A, we show
how the average valence of lyrics declines from the years
1961 to 2007. The decline is strongest up until around
1985 and appears to level off after 1995. Since our esti-
mate is based on a partial sample of all words, we need
a way of checking its stability. In Fig. 4B, we repeat our
analysis using 100 random subsets of the ANEW word
list with 750 words, removing the overall average valence
from each time series to facilitate comparison of the rela-
tive change of valence. The downward trend remains for
each measurement while the overall average valence shifts
(as shown by the inset). For example, as we have noted,
love is the most frequent word in song lyrics, and with its
high valence, its inclusion or exclusion from the measure-
ment has the most significant impact on the overall aver-
age valence. Thus, we are confident that our estimates
of relative as opposed to absolute valence are reasonable.
We more finely examine the reason for this decline
in valence in Fig. 5 where we compare individual word
prevalence changes in lyrics before and after 1980 using
what we term a 'Valence Shift Word Graph.' For these
graphs, we rank words by their descending absolute con-
tribution to the change in average valence between the
two eras, δ. Word i's contribution depends on its change
in relative frequency, and its valence relative to the pre-
1980 era average.
In general, in comparing some text
b with respect to a given text a, we define the valence
difference as
δ(b, a) = vb − va
(2)
and the percentage contribution to this difference by
word i as
∆i(b, a) = 100 × (pi,b − pi,a)(vi − va)
δ(b, a)
(3)
where pi,a and pi,b are the fractional abundances of word
i in texts a and b. As required, summing ∆i(b, a) over
all i gives +100% or -100% depending on whether δ(b, a)
is positive or negative.
Four basic possibilities arise for each word's contribu-
tion, as indicated by the key in Fig. 5. A word may have
higher or lower valence than the average of text a, and
it may also increase or decrease in relative abundance.
Further, the contribution of word i to ∆i(b, a) will be 0 if
either the relative prevalences are the same, or the aver-
age valence of word i matches the average of text a. Note
that ∆i(b, a) is not symmetric in b and a and is meant
only to be used to describe one text (b) with respect to
another (a).
Ranking words according to the above definition of ∆i
gives us Fig. 5. We see that the decrease in average
valence for lyrics after 1980 is due to a loss of positive
words such as 'love', 'baby', and 'home' (italicized and in
red) and a gain in negative words such as 'hate', 'pain',
FIG. 4.
A. Valence time series for song lyrics, showing
a clear downward trend over the 47 year period starting in
1961. Valence is measured by averaging over the valences of
individual words from the ANEW study [19] found in songs
released in each year. B. Box and whisker plot of relative
valence time series for song lyrics for 1000 random sets of 750
ANEW words. The overall mean valence vavg is removed from
each time series for comparison; the inset histogram shows
the distribution of overall means. Excluding the most fre-
quent words such as 'love' (see Table II) shifts the time series
vertically but the downward trend remains apparent in all cas-
es. Boxes indicate first and third quartiles and the median;
whiskers indicate extent of data or 1.5×interquartile range;
and outliers are marked by a gray ×.
using the word feel (or a conjugated form) were extract-
ed from blogs and made available through the website
wefeelfine.org, via a public API [29]. Demographic
data was furnished by the site when available. These
sentences appeared in over 2.3 million unique blogs dur-
ing a 44 month span starting in August 2005. In total,
we retrieved 9,563,128 sentences which appeared during
the period August 26, 2005 to March 31, 2009, inclu-
sive. For each day, we removed repeat sentences of six
words or more to eliminate substantive copied materi-
al. We obtained State of the Union messages from the
American Presidency Project at presidency.ucsb.edu.
Finally, we accessed the British National Corpus at
www.natcorp.ox.ac.uk.
196019701980199020005.966.16.26.36.46.56.66.76.8yearvalence (v)A.1960196519701975198019851990199520002005−0.4−0.200.20.40.60.8rel. val. (v − vavg)yearB.5.866.26.46.60100200vavgcount6
FIG. 5. Valence Shift Word Graph: Words ranked by their absolute contributions to the drop in average valence of song lyrics
from January 1, 1980 onwards relative to song lyrics from before January 1, 1980. The contribution of word i is defined in
Eq. (3) and explained in the surrounding text.
and 'death' (normal font and in blue). These drops are
countered by the trends of less 'lonely' and 'sad', and
more 'life' and 'god'. The former dominates the latter
and the average valence decreases from approximately
6.4 to 6.1. Even though the contribution of 'love' is
clearly the largest, the overall drop is due to changes
in many word frequencies. And while we are unable to
assess words for which we do not have valence, we can
make qualitative observations. For example, the word
'not', a generally negative word, accounts for 0.22% of
all words prior to 1980 and 0.28% of all words after 1980,
in keeping with the overall drop in valence.
To help further unravel this decline in song lyric
valence, we show the valence time series for some impor-
tant music genres in Fig. 6. For this plot, we move to
examining song titles for which we have a more complete
data set involving genres. We observe that the valence of
individual genres is relatively stable over time, with only
rock showing a minor decrease. The ordering of genres by
measured average valence is sensible: gospel and soul are
at the top while several subgenres of rock including metal
and punk, and related variants which emerged through
the 1970's exhibit much lower valences. Rap and hip-hop,
two other notable genres that appear halfway through the
time series, are lower in valence than the main genres of
rock and pop, but not to the same degree as metal and
punk. Thus, the decline in overall valence does not occur
within particular genres, but rather in the evolutionary
appearance of new genres that accessed more negative
emotional niches. Finally, we show the top ten and bot-
tom ten artists ranked according to valence in Tab. III,
given a certain minimum sampling of each artist's lyrics.
While of considerable intrinsic interest, song lyrics of
popular music provide us with a limited reflection of soci-
ety's emotional state, and we move now to exploring
more directly the valence of human expression. The pro-
liferation of personal online writing such as blogs gives
us the opportunity to measure emotional levels in real
time. As of June 23, 2008, the blog tracking website
technorati.org reported it was following 112.8 million
blogs. Blogger demographics are broad with an even split
between genders and high racial diversity with some skew
−20−1001025242322212019181716151413121110987654321love ↓lonely ↓hate ↑pain ↑baby ↓death ↑dead ↑home ↓sick ↑fear ↑hit ↑hell ↑fall ↑sin ↑lost ↑sad ↓burn ↑lie ↑scared ↑afraid ↑music ↓life ↑god ↑trouble ↓loneliness ↓Per word valence shift ∆iWord number iPer word drop in valence of lyrics from 1980−2007 relative to valence of lyrics from 1960−1979:lonely ↓sad ↓trouble ↓loneliness ↓devil ↓Decreases in relativelylow valence wordscontribute to increasein average valencelife ↑god ↑truth ↑party ↑sex ↑Increases in relativelyhigh valence wordscontribute to increasein average valencehate ↑pain ↑death ↑dead ↑sick ↑Increases in relativelylow valence wordscontribute to dropin average valencelove ↓baby ↓home ↓music ↓good ↓Decreases in relativelyhigh valence wordscontribute to dropin average valenceKey:Rank
1
2
3
4
5
6
7
8
9
10
Top Artists
All 4 One
Luther Vandross
S Club 7
K Ci & JoJo
Perry Como
Diana Ross & the Supremes
Buddy Holly
Faith Evans
The Beach Boys
Jon B
Valence
7.15
7.12
7.05
7.04
7.04
7.03
7.02
7.01
7.01
6.98
Bottom Artists
Slayer
Misfits
Staind
Slipknot
Darkthrone
Death
Black Label Society
Pig
Voivod
Fear Factory
7
Valence
4.80
4.88
4.93
4.98
4.98
5.02
5.05
5.08
5.14
5.15
TABLE III. Average valence scores for the top and bottom 10 artists for which we have the lyrics to at least 50 songs and at
least 1000 ANEW words.
FIG. 6. Valence time series for song titles broken down by representative genres. For each genre, we have omitted years in
which less than 1000 ANEW words appear.
towards the young and educated [30].
We have examined nearly 10 million blog sentences
retrieved via the website wefeelfine.org, as we have
described in detail above. In focusing on this subset of
sentences, we are attempting to use our valence mea-
sures not only to estimate perceived valence but also the
revealed emotional states of blog authors. We are thus
able to present results from what might be considered a
very basic remote-sensing hedonometer.
In Fig. 7, we plot average monthly valence as a func-
tion of time for blogs. We first see that over the time
period examined, our subset of blog sentences gradually
increase in valence, rising from an average of around 5.75
to over 6.0. Within individual years, there is generally
an increase in valence over the last part of the year. In
2008, after a midyear dip, perhaps due to the economic
recession, valence notably peaks in the last part of the
year and appears to correlate with the US presidential
election.
We highlight a number of specific dates which most
sharply depart from their month's average: Christmas
Day; Valentine's Day; September 11, 2006, the fifth
anniversary of the World Trade Center and Pentagon
attacks in the United States; the US Presidential Elec-
tion, November 4, 2008; the US Presidential Inaugura-
tion, January 20, 2009; and the day of Michael Jackson's
19651970197519801985199019952000200520104.555.566.57yearvalence (v) Gospel/Soul (6.91)Pop (6.69)Reggae (6.40)Rock (6.27)Rap/Hip−Hop (6.01)Punk (5.61)Metal/Industrial (5.10)8
FIG. 7. Time series of average monthly valence for blog sentences starting with "I feel..." show a gradual upward trend
over 3 years and 8 months. Notable individual days that differ strongly in valence from that of the surrounding month are
indicated, including Christmas Day (trees), Valentine's Day (hearts), 9/11 or 9/10 (squares), the US Presidential election and
inauguration (circle and square), and Michael Jackson's death (star). The gray bar at the top of the graph indicates the days
for which we have data with white gaps corresponding to missing data (we have no estimate of valence for Christmas Day,
2006, hence its absence).
death, June 25, 2009 (June 26 and 27 were also equally
low).
In Fig. 8, we show three Valence Shift Word Graphs
corresponding to September 11, 2006; Valentine's Day,
2008; and US Presidential Election Day, November 4,
2008. The first panel in Fig. 8 shows that the negative
words most strongly driving down the average valence of
the fifth anniversary of the 9/11 attacks are 'lost', 'anger',
'hate', and 'tragedy' ('terrorist' ranks 10th in valence
shift). The impact of these words is augmented by a
decrease in frequency of 'love' and 'happy', overwhelm-
ing the appearance of more 'people' and less 'stupid'
and 'alone.'
In other years, September 10 rather than
September 11 appears to be more clearly negative in tone,
perhaps indicating an anticipatory aspect.
Christmas Day and Valentine's Day are largely
explained by the increase in frequency of the words
Christmas and Valentine, both part of the ANEW word
list. But other words contribute strongly. For Christ-
mas Day, there is more 'family' and less 'pain', with an
increase in 'guilty' going against the trend. As shown
for Valentine's day in 2008 in the second panel of Fig. 8,
'love' and 'people' are more prevalent, 'hate' and 'pain'
less so, countervailed by more 'sad,' 'lonely,' and 'bored.'
The strongest word driving the spike in valence for
the 2008 US Election, the happiest individual day in the
entire data set, is 'proud' (third panel of Fig. 8). Valence
increases also due to a mixture of more positive words
such as 'hope' and 'win' as well as a decrease in the
appearances of 'pain,' 'sad,' and 'guilty.'
For some blogs, we also have self-reported demograph-
ic and contextual information allowing us to make some
deeper observations. Fig. 9A shows that the average
valence of blog sentences follows a pronounced single
maximum, convex curve as a function of age. Thirteen
and fourteen year-olds produce the lowest average valence
sentences (5.58 and 5.55 respectively). As age increas-
es, valence rises until leveling off near 6.0 for ages 45–
60, and then begins to trend downwards. Fig. 10 com-
pares 14 year-olds to those of age 45–60, and we see the
former disproportionately using low valence words 'sick',
'hate', 'stupid', 'sad', 'depressed', 'bored', 'lonely', 'mad',
and 'fat.' The increase is most marked throughout the
teenage years with 20 year-olds (5.83) closer in average
valence to 45–60 year-olds than to 14 year-olds. At the
other end of the age spectrum, individuals in the 75 to
84 age range produce sentences with valence similar to
those of 17 year olds.
Our age dependent estimates of valence comport with
and extend previous observations of blogs that suggested
A S O N D J F M A M J J A S O N D J F M A M J J A S O N D J F M A M J J A S O N D J F M A M J5.75.85.966.16.26.36.49/119/109/109/10US Election 11/4US Inauguration 1/20MichaelJackson♥♥♥♥ 2005 2006 2007 2008 2009valence (v)9
FIG. 8. Valence Shift Word Graphs for three example dates which are markedly different from the general valence trend shown
in Fig. 7. The content of each date's blogs is compared with that of the surrounding month. See Fig. 5 for an explanation of
these graphs.
FIG. 9. A: Average valence as a function of blogger's self-reported age. We use the age a blogger will turn in the year
of his or her post and an approximately logarithmically growing bin size such that all data points are based on at least 3000
ANEW words. Bin boundaries are indicated by the dashed vertical lines. B: Average valence as a function of blogger's absolute
latitude. Bins are indicated by vertical gray lines. The first two bins have 8,390 and 26,071 ANEW words and the remainder
all have approximately 105 or more. C: Valence averaged over days of the week for blogs showing a subtle seven-day cycle
peaking on Sunday with a trough in the middle of the week. Each day's average is based on at least 106 ANEW words.
−30−20−10010203025242322212019181716151413121110987654321lost ↑people ↑happy ↓love ↓anger ↑alone ↓stupid ↓tragedy ↑loved ↑terrorist ↑hate ↑safe ↑war ↑stress ↑grief ↑good ↓free ↓hell ↑home ↓god ↓angry ↑pretty ↓lonely ↓lucky ↑useless ↓Per word valence shift ∆iWord number iSep 11, 2006 vs. Sep, 2006−30−20−10010203025242322212019181716151413121110987654321love ↑people ↑hate ↓pain ↓sad ↑valentine ↑happy ↑guilty ↓hell ↓hurt ↓lost ↓waste ↑bored ↑hug ↑terrible ↓birthday ↑lonely ↑sick ↓kiss ↑useless ↓part ↓nervous ↓ugly ↑cut ↓desire ↑Per word valence shift ∆iFeb 14, 2008 vs. Feb, 2008−30−20−10010203025242322212019181716151413121110987654321proud ↑love ↓pain ↓sad ↓guilty ↓hope ↑alone ↓win ↑part ↑hopeful ↑joy ↑sick ↓people ↑depressed ↓hate ↓war ↑history ↑hurt ↓happy ↑free ↓home ↓victory ↑pride ↑afraid ↓life ↓Per word valence shift ∆iNov 04, 2008 vs. Nov, 20080102030405060705.75.755.85.85latitude degreesB.13203040506070805.55.65.75.85.966.1blogger agevalence (v)A.WTFSSMTW5.835.845.85day of weekC.10
FIG. 10. Valence Shift Word Graph comparing bloggers who
list themselves as turning 14 in year of post to those turning
45 to 60. The average valences are 5.55 and 5.98 respectively.
an increase in valence over the age range 10–30 [27]. Our
results are however at odds with those of studies based
on self-reports which largely find little or no change in
valence over life times [31, 32]. These latter results have
been considered surprising as a rise and fall in valence-
precisely what we find here-would be expected due to
changes in income (rising) and health (eventually declin-
ing) [31]. Our results do not preclude that self-perception
of happiness may indeed be stable, but since our results
are based on measured behavior, they strongly suggest
individuals do present differently throughout their lifes-
pan. And while we have no data regarding income,
because income typically rises with age, our results are
sympathetic to recent work that finds happiness increases
with income [33], going against the well known Easterlin
Paradox, popularized as the notion that 'money does not
buy happiness' [34].
Fig. 9B shows that the average valence of blog sen-
tences gently rolls over as a function of absolute latitude
(i.e, combining both the Northern and Southern Hemi-
spheres). Average valence ranges from 5.71 (for 0 to 11.5
degrees) up to 5.83 (for 29.5 to 44.5 degrees) and then
back to 5.78 (for 52.5 to 69.5 degrees). Seasonal Affec-
tive Disorder [35] may be the factor behind the small
drop for higher latitudes, though a different mechanism
would need to be invoked to account for lower valence
near the equator. One possible explanation could be that
the relatively higher population of the mid-latitudes leads
to stronger social structures [1]. We find some support
for the social argument for individuals near the equa-
tor (absolute latitude ≤ 11.5), who we observe more fre-
quently use the words 'sad', 'bored', 'lonely', 'stupid' and
'guilty' and avoid using 'good' and 'people.' On the oth-
er hand, the valence drop at higher latitudes (between
52.5 and 69.5 degrees absolute latitude) is reflected in
the frequency changes of a mixture of social, psycholog-
ical, and some conditions-related words:
'sick', 'guilty',
'cold', 'depressed', and 'headache' all increase, 'love' and
'life' decrease, offset by less 'hurt' and 'pain' and more
'bed' and 'sleep.'
At a much more subtle level, a weekly cycle in valence
is visible in blog sentences (Fig. 9C). A relatively sharp
peak in valence occurs on Sunday, after which valence
steadily drops daily to its lowest point on Wednesday
before climbing back up. Monday, contrary to common-
ly held perceptions but consistent with previous stud-
ies [36], exhibits the highest average valence after Sunday,
perhaps indicating a lag effect.
We also observe some variation among countries. Of
the four countries with at least 1% representation, the
United States has the highest average valence (5.83) fol-
lowed by Canada (5.78), the United Kingdom (5.77), and
Australia (5.74).
In terms of gender, males exhibit essentially the same
average valence as females (5.89 versus 5.91). Females
however show a larger variance than males (4.75 versus
4.44) in agreement with past research [4]. We further find
females disproportionately use the the most impactful
high and low valence words separating the two genders:
'love', 'baby', 'loved' and 'happy' on the positive end, and
'hurt', 'hate', 'sad', and 'alone' on the negative end. In
fact, of the top 15 words contributing to δ(female, male),
the only one used more frequently by males is 'good.'
We turn to our last data set, State of the Union
(SOTU) addresses for the United States. These address-
es, which include both speeches and written reports,
grant us a starting point for assessing the emotional tem-
perature of the United States over its 220 year history,
as may or may not have been intended by the authors.
−30−20−10010203025242322212019181716151413121110987654321sick ↑hate ↑stupid ↑sad ↑happy ↑love ↑depressed ↑bored ↑lonely ↑alone ↑god ↓mad ↑fat ↑hurt ↑life ↓upset ↑fun ↑loved ↑people ↑scared ↑dead ↑terrible ↑confused ↑friend ↑family ↓Per word valence shift ∆iWord number iBloggers age 14 vs. age 45−6011
FIG. 11. Average valence of State of the Union addresses, binned by President and plotted against the average of the years
the President was in office.
Fig. 11 shows a valence time series for SOTU address-
es binned by President.
In comparison to our lyrics
and blog data sets, SOTU addresses comprise far few-
er words and the observations we make are consequent-
ly tempered. Nevertheless, we do find some resonance
between the valence level of SOTU addresses and major
historical events.
The presidents with the highest average valence scores
are Kennedy (6.41), Eisenhower (6.38), and Reagan
(6.38), all of whose speeches are tightly clustered around
their means. Eisenhower and Kennedy reach a high
point after a period of relatively low valence starting
with the First World War through and beyond which
Wilson's speeches steeply drop from an initial 6.58 in
1913 to 5.88 in 1920. The mean valence of Coolidge's
addresses provide the single exception during this time.
Coolidge's successor Hoover's low average is largely due
to his speech in 1930, the first one given after the stock
market crash of October 29, 1929-Black Tuesday-
which marked the beginning of the Great Depression; his
speeches are burdened with 'depression', 'debt', 'crisis',
and 'failure.' While Franklin Roosevelt's overall aver-
age valence is low, the first eight of his four term stay
in office range from 6.06 to 6.34. His last four speeches,
coming during the Second World War (1942–1945), are
sharply lower in valence, ranging from 5.48 to 5.60; 'war'
naturally dominates these later speeches and along with
'fight' and 'destroy', overwhelm the positives of 'peace'
and 'victory.'
The large-scale pattern of the 19th Century shows two
periods of relatively high valence, 1820–1840 and 1880–
1890. The years before and during the American Civil
War form a local minimum in valence corresponding to
Buchanan and Lincoln.
The recent era shows a drop from Eisenhower and
Kennedy's level to that of Johnson (6.08), the latter's
first SOTU speech coming just seven weeks after the
assassination of Kennedy, and the remainder through
the heightening Vietnam War. Valence rises through the
1970's to reach the high of Reagan in the 1980's, from
which it has since declined.
IV. CONCLUDING REMARKS
Undoubtedly, the online recording of social interactions
and personal experiences will continue to grow, provid-
ing ever richer data sets and the consequent opportunity
and need for a wide range of scientific investigations. A
natural extension of our work here would be to examine
the dynamics of emotions in online interactive contexts,
particularly in the realm of contagion [37, 38]. If emo-
tional contagion is observable, we would then be in a
position to characterize its nature on the spectrum from
analogous to an infectious disease [39] to the more com-
plex threshold-based contagion [40, 41]. Our technique
could also be useful in testing predictive theories of social
interactions such as Heise's affect control theory [42] and
Burke's identity control theory [43].
While we have been able to make and support a range
of observations with our method for measuring the emo-
tional content of large-scale texts, our approach can be
improved in a number of ways. A first step would be
to perform experiments and surveys to gather emotion-
al content estimates for a more extensive set of indi-
vidual words. The instrumental lens can also be made
more sophisticated by coupling word assessments with
detailed demographics of participants. Other approach-
es not necessarily based on semantic differentials in the
manner of the ANEW study could also be naturally
explored. Game-based experiments could also be used
to assess the emotional content of common word groups
and phrases [23], allowing us to better characterize the
micro-macro connection between the atoms of words and
sentences, and differences in interpretations among vari-
ous age groups and cultures.
1790181018301850187018901910193019501970199020105.55.65.75.85.966.16.26.36.46.5George WashingtonJohn AdamsThomas JeffersonJames MadisonJames MonroeJohn Quincy AdamsAndrew JacksonMartin van BurenJohn TylerJames K. PolkZacharyTaylorMillard FillmoreFranklin PierceJames BuchananAbraham LincolnAndrew JohnsonUlysses S. GrantRutherford B. HayesChester A. ArthurBenjaminHarrisonGrover ClevelandWilliam McKinleyTheodore RooseveltWilliam Howard TaftWoodrow WilsonWarren G. HardingCalvin CoolidgeHerbert HooverFranklin D. RooseveltHarry S. TrumanDwight D. EisenhowerJohn F. KennedyLyndon B. JohnsonRichard NixonGerald R. FordJimmy CarterRonald ReaganGeorge BushWilliam J. ClintonGeorge W. Bushyearvalence (v)12
ACKNOWLEDGMENTS
The authors are grateful to Jonathan Harris and Sep
Kamvar, the creators of wefeelfine.org; for helpful dis-
cussions with John Tucker, Lilian Lee, Andrew G. Reece,
Josh Bongard, Mary Lou Zeeman, and Elizabeth Pinel;
and for the suggestions of three anonymous reviewers.
[1] R. Layard, Happiness (The Penguin Press, London,
[22] E. Diener and R. A. Emmons, Journal of Personality and
2005).
[2] D. Gilbert, Stumbling on Happiness (Knopf, New York,
2006).
[3] M. Argyle, The Psychology of Happiness, Second ed., psy-
chology (Routledge, New York, 2001).
[4] C. R. Snyder and S. J. Lopez, Positive Psychology, 2nd
ed., psychology (Oxford University Press, New York, NY,
2009).
[5] S. Lyubomirsky, The How of Happiness (The Penguin
Press, New York, 2007).
Social Psychology 47, 1105 (1984).
[23] L. von Ahn, IEEE Computer Magazine , 96 (2006).
[24] E. Riloff and J. Wiebe, Conference on Empirical Meth-
ods in Natural Language Processing (EMNLP-03), ACL
SIGDAT , 105 (2003).
[25] L. Lee, in Computer Science: Reflections on the Field,
Reflections from the Field, edited by C. on the Funda-
mentals of Computer Science: Challenges, C. S. Oppor-
tunities, and N. R. C. Telecommunications Board (The
National Academies Press, 2004) pp. 111–118.
[6] W. T. Jones, The Classical Mind, philosophy (Harcourt,
[26] M. A. Cohn, M. R. Mehl, and J. W. Pennebaker, Psy-
Brace, Jovanovich, New York, 1970).
chological Science 15, 687 (2004).
[7] B. Russell, A History of Western Philosophy (Allen &
Unwin, London, 1961).
[8] C. Osgood, G. Suci,
and P. Tannenbaum, The Mea-
surement of Meaning (University of Illinois, Urbana, IL,
1957).
[9] M. Csikszentmihalyi, R. Larson, and S. Prescott, Journal
of Youth and Adolescence 6, 281 (1977).
[10] M. Csikszentmihalyi, Flow, psychology (Harper & Row,
New York, 1990).
[11] D. Kahneman, A. B. Krueger, D. A. Schkade, N. Schwarz,
and A. A. Stone, Science 306, 1776 (2004).
[12] T. Conner Christensen, L. Feldman Barrett, E. Bliss-
Moreau, K. Lebo, and C. Kaschub, Journal of Happiness
Studies 4, 53 (2003).
[13] P. D. Killworth and H. R. Bernard, Human Organization
35, 269 (1976).
[14] C. Martinelli and S. W. Parker, Journal of the European
Economic Association 7, 886 (2009).
[15] F. Y. Edgeworth, Mathematical Physics: An Essay
into the Application of Mathematics to Moral Sciences
(Kegan Paul, London, UK, 1881).
[16] G. Mishne and M. de Rijke, AAAI 2006 Spring Sym-
posium on Computational Approaches to Analysing
Weblogs (2005).
[17] I. H. Witten and E. Frank, Data Mining: Practical
Machine Learning Tools and Techniques, 2nd ed., com-
puting (Morgan Kaufmann, San Francisco, CA, 2005).
[18] P.-N. Tan, M. Steinbach, and V. Kumar, Introduction to
Data Mining, computing (Addison Wesley, Boston, MA,
2005).
[19] M. M. Bradley and P. J. Lang, Affective norms for
English words (ANEW): Stimuli, instruction manual and
affective ratings, Technical report C-1 (University of
Florida, Gainesville, FL, 1999).
[20] A. Mehrabian and J. A. Russell, An approach to environ-
mental psychology (MIT Press, Cambirdge, MA, 1974).
and M. R. Banaji,
Behavior Research Methods, Instruments & Computers
18, 299 (1986).
[21] F. S. Bellezza, A. G. Greenwald,
[27] J. Schler, M. Koppel, S. Argamon, and J. Pennebak-
er, in Computational Approaches to Analyzing Weblogs:
Papers from the 2006 AAAI Spring Symposium (AAAI
Press, Menlo Park, CA, 2006) pp. 199–205.
[28] G. K. Zipf, Human Behaviour and the Principle of
Least-Effort, patterns (Addison-Wesley, Cambridge, MA,
1949).
[29] J. Harris and S. Kamvar, We Feel Fine: An Almanac of
Human Emotion, psychology (Scribner, New York, NY,
2009).
[30] A. Lenhart and S. Fox, Bloggers: A portrait of the Inter-
net's new storytellers, Tech. Rep. (Pew Internet & Amer-
ican Life Project, 2006) accessed August 1, 2011.
[31] R. A. Easterlin, The Economic Journal 111, 465 (2001).
[32] R. A. Easterlin, Proc. Natl. Acad. Sci. 100, 11176 (2003).
[33] B. Stevenson and J. Wolfers, "Economic growth and sub-
jective well-being: Reasssessing the Easterlin Paradox,"
(2008), brookings Papers on Economic Activity.
[34] R. Easterlin, in Nations and Households in Economic
Growth: Essays in Honour of Moses Abramowitz, edit-
ed by P. A. David and M. W. Reder (Academic Press,
New York and London, 1974) pp. 89–125.
[35] N. E. Rosenthal, D. A. Sack, J. C. Gillin, A. J. Lewy,
F. K. Goodwin, Y. Davenport, P. S. Mueller, D. A. New-
some,
and T. A. Wehr, Arch Gen Psychiatry 41, 72
(1984).
[36] A. A. Stone, S. Hedges, J. M. Neale, and M. S. Satin,
Journal of Personality and Social Psychology 49, 129
(1984).
[37] E. Hatfield, J. T. Cacioppo, and R. L. Rapson, Emotion-
al Contagion, sociology, Studies in Emotion and Social
Interaction (Cambridge University Press, Cambridge,
UK, 1993).
[38] J. H. Fowler and N. A. Christakis, BMJ 337, article
#2338 (2008).
[39] J. D. Murray, Mathematical Biology, Third ed., contagion
(Springer, New York, 2002).
[40] M. Granovetter, Am. J. Sociol. 83, 1420 (1978).
[41] P. S. Dodds and D. J. Watts, Phys. Rev. Lett. 92, 218701
(2004).
[42] D. R. Heise, Understanding Events: Affect and the Con-
struction of Social Action, psychology (Cambridge Uni-
versity Press, New York, 1979).
[43] J. E. Stets and T. M. Tsushima, Social Psychology Quar-
terly 64, 283 (2001).
13
|
1308.3388 | 1 | 1308 | 2013-08-15T13:32:38 | Models of on-line social networks | [
"cs.SI",
"physics.soc-ph"
] | We present a deterministic model for on-line social networks (OSNs) based on transitivity and local knowledge in social interactions. In the Iterated Local Transitivity (ILT) model, at each time-step and for every existing node $x$, a new node appears which joins to the closed neighbour set of $x.$ The ILT model provably satisfies a number of both local and global properties that were observed in OSNs and other real-world complex networks, such as a densification power law, decreasing average distance, and higher clustering than in random graphs with the same average degree. Experimental studies of social networks demonstrate poor expansion properties as a consequence of the existence of communities with low number of inter-community edges. Bounds on the spectral gap for both the adjacency and normalized Laplacian matrices are proved for graphs arising from the ILT model, indicating such bad expansion properties. The cop and domination number are shown to remain the same as the graph from the initial time-step $G_0$, and the automorphism group of $G_0$ is a subgroup of the automorphism group of graphs generated at all later time-steps. A randomized version of the ILT model is presented, which exhibits a tuneable densification power law exponent, and maintains several properties of the deterministic model. | cs.SI | cs |
MODELS OF ON-LINE SOCIAL NETWORKS
ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT,
AND CHANGPING WANG
Abstract. We present a deterministic model for on-line social networks (OSNs)
based on transitivity and local knowledge in social interactions. In the Iterated Local
Transitivity (ILT) model, at each time-step and for every existing node x, a new node
appears which joins to the closed neighbour set of x. The ILT model provably satisfies
a number of both local and global properties that were observed in OSNs and other
real-world complex networks, such as a densification power law, decreasing average
distance, and higher clustering than in random graphs with the same average degree.
Experimental studies of social networks demonstrate poor expansion properties as
a consequence of the existence of communities with low number of inter-community
edges. Bounds on the spectral gap for both the adjacency and normalized Laplacian
matrices are proved for graphs arising from the ILT model, indicating such bad expan-
sion properties. The cop and domination number are shown to remain the same as the
graph from the initial time-step G0, and the automorphism group of G0 is a subgroup
of the automorphism group of graphs generated at all later time-steps. A randomized
version of the ILT model is presented, which exhibits a tuneable densification power
law exponent, and maintains several properties of the deterministic model.
1. Introduction
On-line social networks (OSNs) such as Facebook, MySpace, Twitter, and Flickr
have become increasingly popular in recent years.
In OSNs, nodes represent people
on-line, and edges correspond to a friendship relation between them. In these complex
real-world networks with sometimes millions of nodes and edges, new nodes and edges
dynamically appear over time. Parallel with their popularity among the general pub-
lic is an increasing interest in the mathematical and general scientific community on
the properties of on-line social networks, in both gathering data and statistics about
the networks, and finding models simulating their evolution. Data about social inter-
actions in on-line networks is more readily accessible and measurable than in off-line
social networks, which suggests a need for rigorous models capturing their evolutionary
properties.
The small world property of social networks, introduced by Watts and Strogatz [37],
is a central notion in the study of complex networks, and has roots in the work of
Milgram [31] on short paths of friends connecting strangers. The small world property
1991 Mathematics Subject Classification. 05C75, 68R10, 91D30.
Key words and phrases. complex networks, on-line social networks, transitivity, densification power
law, average distance, clustering coefficient, spectral gap, bad expansion, normalized Laplacian.
The authors gratefully acknowledge support from NSERC and MITACS.
1
2 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG
posits low average distance (or diameter) and high clustering, and has been observed
in a wide variety of complex networks.
An increasing number of studies have focused on the small world and other complex
network properties in OSNs. Adamic et al. [1] provided an early study of an on-line
social network at Stanford University, and found that the network has the small world
property. Correlation between friendship and geographic location was found by Liben-
Nowell et al. [30] using data from LiveJournal. Kumar et al. [27] studied the evolution
of the on-line networks Flickr and Yahoo!360. They found (among other things) that
the average distance between users actually decreases over time, and that these net-
works exhibit power-law degree distributions. Golder et al. [23] analyzed the Facebook
network by studying the messaging pattern between friends with a sample of 4.2 million
users. They also found a power law degree distribution and the small world property.
Similar results were found in [2] which studied Cyworld, MySpace, and Orkut, and in
[32] which examined data collected from four on-line social networks: Flickr, YouTube,
LiveJournal, and Orkut. Power laws for both the in- and out-degree distributions, low
diameter, and high clustering coefficient were reported in the Twitter friendship graph
by Java et al. [24]. In [25], geographic growth patterns and distinct classes of users
were investigated in Twitter. For further background on complex networks and their
models, see the books [6, 9, 12, 15].
Recent work by Leskovec et al. [28] underscores the importance of two additional
properties of complex networks above and beyond more traditionally studied phenom-
ena such as the small world property. A graph G with et edges and nt nodes satisfies
a densification power law if there is a constant a ∈ (1, 2) such that et is proportional
to na
t . In particular, the average degree grows to infinity with the order of the network
(in contrast to say the preferential attachment model, which generates graphs with
constant average degree).
In [28], densification power laws were reported in several
real-world networks such as a physics citation graph and the internet graph at the level
of autonomous systems. Another striking property found in such networks (and also in
on-line social networks; see [27]) is that distances in the networks (measured by either
diameter or average distance) decreases with time. The usual models such as preferen-
tial attachment or copying models have logarithmically or sublogarithmically growing
diameters and average distances with time. Various models (such as the Forest Fire [28]
and Kronecker multiplication [29] models) were proposed simulating power law degree
distribution, densification power laws, and decreasing distances.
We present a new model, called Iterated Local Transitivity (ILT), for OSNs and other
complex networks which dynamically simulates many of their properties. The present
article is the full version of the proceedings paper [8]. Although modelling has been
done extensively for other complex networks such as the web graph (see [6]), models of
OSNs have only recently been introduced (such as those in [14, 27, 30]). The central
idea behind the ILT model is what sociologists call transitivity:
if u is a friend of v,
and v is a friend of w, then u is a friend of w (see, for example, [18, 36, 38]). In its
simplest form, transitivity gives rise to the notion of cloning, where u is joined to all
of the neighbours of v. In the ILT model, given some initial graph as a starting point,
nodes are repeatedly added over time which clone each node, so that the new nodes
MODELS OF ON-LINE SOCIAL NETWORKS
3
form an independent set. The ILT model not only incorporates transitivity, but uses
only local knowledge in its evolution, in that a new node only joins to neighbours of an
existing node. Local knowledge is an important feature of social and complex networks,
where nodes have only limited influence on the network topology. We stress that our
approach is mathematical rather than empirical; indeed, the ILT model (apart from its
potential use by computer and social scientists as a simplified model for OSNs) should
be of theoretical interest in its own right.
Variants of cloning were considered earlier in duplication models for protein-protein
interactions [4, 5, 11, 35], and in copying models for the web graph [7, 26]. There are
several differences between the duplication and copying models and the ILT model.
For one, duplication models are difficult to analyze due to their rich dependence struc-
ture. While the ILT model displays a dependency structure, determinism makes it
more amenable to analysis. The ILT model may be viewed as simplified snapshot of
the duplication model, where all nodes are cloned in a given time-step, rather than du-
plicating nodes one-by-one over time. Cloning all nodes at each time-step as in the ILT
model leads to densification and high clustering, along with bad expansion properties
(as we describe in Subsection 1.2).
We finish the introduction with some asymptotic notation. Let f and g be functions
whose domain is some fixed subset of R. We write f ∈ O(g) if
f (t)
g(t)
lim sup
t→∞
exists and is finite. We will abuse notation and write f = O(g). We write f = Ω(g) if
= 0, then f = o(g)
f (t)
g = O(f ), and f = Θ(g) if f = O(g) and f = Ω(g). If limt→∞(cid:12)(cid:12)(cid:12)
(or g = ω(f )). So if f = o(1), then f tends to 0.
g(t)(cid:12)(cid:12)(cid:12)
1.1. The ILT Model. We now give a precise formulation of the model. The ILT
model generates finite, simple, undirected graphs (Gt : t ≥ 0). Time-step t, for t ≥ 1, is
defined to be the transition between Gt−1 and Gt. (Note that a directed graph model
will be considered in the sequel. See also Section 3.) The only parameter of the model
is the initial graph G0, which is any fixed finite connected graph. Assume that for a
fixed t ≥ 0, the graph Gt has been constructed. To form Gt+1, for each node x ∈ V (Gt),
add its clone x′, such that x′ is joined to x and all of its neighbours at time t. Note
that the set of new nodes at time t + 1 form an independent set of cardinality V (Gt).
See Figure 1 for the graphs generated from the 4-cycle over the time-steps t = 1, 2, 3,
and 4.
We write degt(x) for the degree of a node at time t, nt for the order of Gt, and et for
its number of edges. It is straightforward to see that nt = 2tn0. Given a node x at time
t, let x′ be its clone. The elementary but important recurrences governing the degrees
of nodes are given as
degt+1(x) = 2 degt(x) + 1,
degt+1(x′) = degt(x) + 1.
(1.1)
(1.2)
4 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG
Figure 1. The evolution of the ILT model with G0 = C4, for t = 1, 2, 3, 4.
1.2. Main Results. We state our main results on the ILT model, with proofs deferred
to the next section. We give rigorous proofs that the ILT model generates graphs
satisfying a densification power law and in many cases decreasing average distance
(properties shared by the Forest Fire [28] and Kronecker multiplication [29] models). A
randomized version of the ILT model is introduced with tuneable densification power
law exponent. Properties of the ILT model not shown in the models of [28, 29] are
higher clustering than in random graphs with the same average degree, and smaller
spectral gaps for both their normalized Laplacian and adjacency matrices than in ran-
dom graphs. Further, the cop and domination numbers are shown to remain the same
as the graph from the initial graph G0, and the automorphism group of G0 is a subgroup
of the automorphism group of graphs generated at all later times. The ILT model does
not, however (unlike the models of [28, 29]) generate graphs with a power law degree
distribution. The number of nodes in the ILT model grows exponentially with time (as
in the Kronecker multiplication model, but unlike in the Forest Fire model).
MODELS OF ON-LINE SOCIAL NETWORKS
5
We first demonstrate that the model exhibits a densification power law. Define the
volume of Gt by
degt(x) = 2et.
Theorem 1.1. For t > 0, the average degree of Gt equals
vol(Gt) = Xx∈V (Gt)
2(cid:19)t(cid:18)vol(G0)
(cid:18)3
n0
+ 2(cid:19) − 2.
Note that Theorem 1.1 supplies a densification power law with exponent a = log 3
log 2 ≈
1.58. We think that the densification power law makes the ILT model realistic, especially
in light of real-world data mined from complex networks (see [28]).
We study the average distances and clustering coefficient of the model as time tends
to infinity. Define the Wiener index of Gt as
W (Gt) =
d(x, y).
1
2 Xx,y∈V (Gt)
The Wiener index may be used to define the average distance of Gt as
We will compute the average distance by deriving first the Wiener index. Define the
ultimate average distance of G0, as
L(Gt) =
W (Gt)
.
(cid:0)nt
2(cid:1)
UL(G0) = lim
t→∞
L(Gt)
assuming the limit exists. Note that the ultimate average distance is a new graph
parameter. We provide an exact value for L(Gt) and compute the ultimate average
distance for any initial graph G0.
Theorem 1.2.
(1) For t > 0,
W (Gt) = 4t W (G0) + (e0 + n0) 1 −(cid:18)3
4(cid:19)t!! .
(2) For t > 0,
L(Gt) =
(3) For all graphs G0,
4t(cid:16)W (G0) + (e0 + n0)(cid:16)1 −(cid:0) 3
4tn2
4(cid:1)t(cid:17)(cid:17)
0 − 2tn0
.
UL(G0) =
W (G0) + e0 + n0
n2
0
.
Further, UL(G0) ≤ L(G0) if and only if W (G0) ≥ (n0 − 1)(e0 + n0).
6 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG
Note that the average distance of Gt is bounded above by diam(G0) + 1 (in fact, by
diam(G0) in all cases except cliques). Further, the condition in (3) for UL(G0) < L(G0)
holds for large cycles and paths. Hence, for many initial graphs G0, the average distance
decreases, a property observed in OSNs and other complex networks (see [27, 28]).
Let Nt(x) be the neighbour set of x at time t, let Gt ↾ Nt(x) be the subgraph induced
by Nt(x) in Gt, and let e(x, t) be the number of edges in Gt ↾ Nt(x). For a node
x ∈ V (Gt) with degree at least 2 define
ct(x) =
.
e(x, t)
2
(cid:0)degt(x)
(cid:1)
C(Gt) = Px∈V (Gt) ct(x)
nt
.
By convention ct(x) = 0 if the degree of x is at most 1. The clustering coefficient of Gt
is
The clustering coefficient of the graph at time t generated by the ILT model is estimated
and shown to tend to 0 slower than a G(n, p) random graph with the same average
degree.
Theorem 1.3.
Ω (cid:18) 7
8(cid:19)t
t−2! = C(Gt) = O (cid:18)7
8(cid:19)t
t2! .
Observe that C(Gt) tends to 0 as t → ∞. If we let nt = n (so t ∼ log2 n), then this
gives that
C(Gt) = nlog2(7/8)+o(1).
In contrast, for a random graph G(n, p) with comparable average degree
pn = Θ((3/2)log2 n) = Θ(nlog2(3/2))
as Gt, the clustering coefficient is p = Θ(nlog2(3/4)) which tends to zero much faster than
C(Gt). (For a discussion of the clustering coefficient of G(n, p), see Chapter 2 of [6].)
Social networks often organize into separate clusters in which the intra-cluster links
are significantly higher than the number of inter-cluster links. In particular, social net-
works contain communities (characteristic of social organization), where tightly knit
groups correspond to the clusters [21]. As a result, social networks possess bad expan-
sion properties realized by small gaps between their first and second eigenvalues [17].
We find that the ILT model has bad expansion properties as indicated by the spectral
gap of both its normalized Laplacian and adjacency matrices.
For regular graphs, the eigenvalues of the adjacency matrix are related to several
important graph properties, such as in the expander mixing lemma. The normalized
Laplacian of a graph, introduced by Chung [10], relates to important graph properties
even in the case where the underlying graph is not regular (as is the case in the ILT
model). Let A denote the adjacency matrix and D denote the diagonal adjacency
matrix of a graph G. Then the normalized Laplacian of G is
L = I − D−1/2AD−1/2.
MODELS OF ON-LINE SOCIAL NETWORKS
7
Let 0 = λ0 ≤ λ1 · · · ≤ λn−1 ≤ 2 denote the eigenvalues of L. The spectral gap of the
normalized Laplacian is
λ = max{λ1 − 1,λn−1 − 1}.
, where d is the average degree.
Chung, Lu, and Vu [13] observe that, for random power law graphs with some parame-
ters (effectively in the case that dmin = c log2 n for some constant c > 0 and all integers
n > 0), that λ ≤ (1 + o(1)) 4√d
For the graphs Gt generated by the ILT model, we observe that the spectra behaves
quite differently and, in fact, the spectral gap has a constant order. The following
theorem suggests a significant spectral difference between graphs generated by the ILT
model and random graphs. Define λ(Gt) to be the spectral gap of the normalized
Laplacian of Gt.
Theorem 1.4. For t ≥ 1, λ(Gt) > 1
2 .
Theorem 1.4 represents a drastic departure from the good expansion found in random
graphs, where λ = o(1) [10, 13, 19], and from the preferential attachment model [22]. If
G0 has bad expansion properties, and has λ1 < 1/2 (and thus, λ > 1/2) then, in fact,
this trend of bad expansion continues as shown by the following theorem.
Theorem 1.5. Suppose G0 has at least two nodes, and for t > 0 let λ1(t) be the second
eigenvalue of Gt. Then we have that
λ1(t) < λ1(0).
Note that Theorem 1.5 implies that λ1(1) < λ1(0) and this implies that the sequence
{λ1(t) : t ≥ 0} is strictly decreasing. This follows since Gt is constructed from Gt−1 in
the same manner as G1 is constructed from G0. If G0 is K1, then there is no second
eigenvalue, but G1 is K2. Hence, in this case, the theorem implies that {λ1(t) : t ≥ 1}
is strictly decreasing.
Let ρ0(t) ≥ ρ1(t) ≥ . . . denote the eigenvalues of the adjacency matrix Gt. If A is
the adjacency matrix of Gt, then the adjacency matrix of Gt+1 is
M =(cid:18) A
A + I
A + I
0 (cid:19) ,
where I is the identity matrix of order nt. We note the following recurrence for the
eigenvalues of the adjacency matrix of Gt.
Theorem 1.6. If ρ is an eigenvalue of the adjacency matrix of Gt, then
are eigenvalues of the adjacency matrix of Gt+1.
ρ ±pρ2 + 4(ρ + 1)2
2
,
We leave the reader to check that the eigenvectors of Gt can be written in terms of the
eigenvectors of Gt−1. As in the Laplacian case, we show that there is a small spectral
gap of the adjacency matrix.
8 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG
Theorem 1.7. Let ρ0(t) ≥ ρ1(t) ≥ · · · ≥ ρn(t) denote the eigenvalues of the adja-
cency matrix of Gt. Then
ρ0(t)
ρ1(t)
= Θ(1).
That is, ρ1(t) ≥ cρ0(t) for some constant c > 0. Theorem 1.7 is in contrast to the fact
that in G(n, p) random graphs, ρ1 = o(ρ0) (see [10]).
In a graph G, a set S of nodes is a dominating set if every node not in S has a
neighbour in S. The domination number of G, written γ(G), is the minimum cardinality
of a dominating set in G. We use S to represent a dominating set in G, where each
node not in S is joined to some node of S. A graph parameter bounded below by the
domination number is the so-called cop (or search) number of a graph. In Cops and
Robbers, there are two players, a set of s cops (or searchers) C, where s > 0 is a fixed
integer, and the robber R. The cops begin the game by occupying a set of s nodes of a
simple, undirected, and finite graph G. While the game may be played on a disconnected
graph, without loss of generality, assume that G is connected (since the game is played
independently on each component and the number of cops required is the sum over all
components). The cops and robber move in rounds indexed by non-negative integers.
Each round consists of a cop's move followed by a robber's move. More than one cop
is allowed to occupy a node, and the players may pass; that is, remain on their current
nodes. A move in a given round for a cop or the robber consists of a pass or moving to
an adjacent node; each cop may move or pass in a round. The players know each others
current locations; that is, the game is played with perfect information. The cops win
and the game ends if at least one of the cops can eventually occupy the same node as
the robber; otherwise, R wins. As placing a cop on each node guarantees that the cops
win, we may define the cop number, written c(G), which is the minimum cardinality of
the set of cops needed to win on G. While this node pursuit game played with one cop
was introduced in [33, 34], the cop number was first introduced in [3]. For a survey of
results on Cops and Robbers, see [20].
We prove that the domination and cop numbers of Gt depend only on the initial
graph G0. Theorem 1.8 shows that even as the graph becomes large as t progresses,
the same number of nodes needed at time 0 to dominate the graph will be needed at
time t.
Theorem 1.8. For all t ≥ 0,
γ(Gt) = γ(G0),
and
c(Gt) = c(G0).
In Theorem 1.8, we prove that the cop number remains the same for Gt. This implies
that no matter how large the graph Gt becomes, the robber can be captured by the
same number of cops used at time 0. In terms of OSNs, Theorem 1.8 suggests that
users in the network can easily spread and track information (such as gossip) no matter
how large the graph becomes.
An automorphism of a graph G is an isomorphism from G to itself; the set of all
automorphisms forms a group under the operation of composition, written Aut(G).
MODELS OF ON-LINE SOCIAL NETWORKS
9
We say that an automorphism ft ∈ Aut(Gt) extends to ft+1 ∈ Aut(Gt+1) if
ft+1 ↾ V (Gt) = ft;
that is, the restriction of the map ft+1 to V (Gt) equals ft. We show that symmetries
from t = 0 are preserved at time t. This provides further evidence that the ILT model
retains a memory of the initial graph from time 0.
Theorem 1.9. For all t ≥ 0, Aut(G0) embeds in Aut(Gt).
As shown in Theorem 1.1, the ILT model has a fixed densification exponent equalling
log 3/ log 2. We consider a randomized version of the model which allows for this expo-
nent to become tuneable. To motivate the model, in OSNs some new users are friends
outside of the OSN. Such users immediately seek each other out as they join the OSN
and become friends there. The stochastic model ILT(p) is defined as follows. Define
H0 to be K1. A sequence (Ht : t ∈ N) of graphs is generated so that for all t, Ht is
an induced subgraph of Ht+1. At time t + 1, first clone all the nodes of Ht as in the
deterministic ILT model. Let n be the number new nodes are added at time t + 1.
(Note that n is a function of t and is not a new parameter.) To form Ht+1, add edges
independently between the new nodes with probability p = p(n). Hence, the new nodes
form a random graph G(n, p).
Several properties of the ILT model are inherited by the ILT(p) model. For example,
as we are adding edges to the graphs generated by the ILT model, the average distance
may only decrease, and the clustering coefficient may only increase. The following
theorem proves that ILT(p) generates graphs following a densification power law with
exponent log(3 + δ)/ log 2, where 0 ≤ δ ≤ 1. For T a positive integer representing time,
we say that an event holds asymptotically almost surely (a.a.s.) if the probability that
it holds tends to 1 as T tends to infinity.
Theorem 1.10. Let 0 ≤ δ ≤ 1, and define
p(n) = δn
log(3+δ)
log 2 /n2.
Then a.a.s.
vol(HT ) = (1 + o(1))(3 + δ)T .
(1.3)
Hence, by choosing an appropriate p, the densification power law exponent in graphs
generated by the ILT(p) model may achieve any value in the interval [log 3/ log 2, 2].
We also prove that for the normalized Laplacian, the ILT(p) model maintains a large
spectral gap.
Theorem 1.11. A.a.s.
λ(HT ) = Ω(1).
2. Proofs of Results
This section is devoted to the proofs of the theorems outlined in Section 1.
10 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG
2.1. Proof of Theorem 1.1. We now consider the number of edges and average degree
of Gt, and prove the following densification power law for the ILT model. Define the
volume of Gt by
The proof of Theorem 1.1 follows directly from the following Lemma 2.1, since the
vol(Gt) = Xx∈V (Gt)
degt(x) = 2et.
average degree of Gt is vol(Gt)/nt.
Lemma 2.1. For t > 0,
In particular,
vol(Gt) = 3tvol(G0) + 2n0(3t − 2t).
et = 3t(e0 + n0) − nt.
Proof. By (1.1) and (1.2) we have that
vol(Gt+1) = Xx∈V (Gt)
= Xx∈V (Gt)
degt+1(x) + Xx′∈V (Gt+1)\V (Gt)
(2 degt(x) + 1) + Xx∈V (Gt)
= 3vol(Gt) + nt+1.
degt+1(x′)
(degt(x) + 1)
Hence by (2.1) for t > 0,
vol(Gt) = 3vol(Gt−1) + nt
3i2t−i!
= 3tvol(G0) + n0 t−1
Xi=0
= 3tvol(G0) + 2n0(3t − 2t),
where the third equality follows by summing a geometric series.
(2.1)
(cid:3)
2.2. Proof of Theorem 1.2. When computing distances in the ILT model, the fol-
lowing lemma is helpful.
Lemma 2.2. Let x and y be nodes in Gt with t > 0. Then
dt+1(x′, y) = dt+1(x, y′) = dt+1(x, y) = dt(x, y),
and
dt+1(x′, y′) =(cid:26)
dt(x, y)
if xy /∈ E(Gt),
dt(x, y) + 1 = 2 if xy ∈ E(Gt).
Proof. We prove that dt+1(x, y) = dt(x, y). The proofs of the other equalities are
analogous and so omitted. Since in the ILT model we do not delete any edges, the
distance cannot increase after a "cloning" step occurs. Hence, dt+1(x, y) ≤ dt(x, y).
Now suppose for a contradiction that there is a path P ′ connecting x and y in Gt+1
with length k < dt(x, y). Hence, P ′ contains nodes not in Gt. Choose such a P ′ with
the least number of nodes, say s > 0, not in Gt. Let z′ be a node of P ′ not in Gt, and
let the neighbours of z′ in P ′ be u and v. Then z ∈ V (Gt) is joined to u and v. Form
MODELS OF ON-LINE SOCIAL NETWORKS
11
the path Q′ by replacing z′ by z. But then Q′ has length k and has s − 1 many nodes
not in Gt, which supplies a contradiction.
(cid:3)
We now turn to the proof of Theorem 1.2. We only prove item (1), noting that
items (2) and (3) follow from (1) by computation. We derive a recurrence for W (Gt)
as follows. To compute W (Gt+1), there are five cases to consider: distances within
Gt, and distances of the forms: dt+1(x, y′), dt+1(x′, y), dt+1(x, x′), and dt+1(x′, y′). The
first three cases contribute 3W (Gt) by Lemma 2.2. The 4th case contributes nt. The
final case contributes W (Gt) + et (the term et comes from the fact that each edge xy
contributes dt(x, y) + 1).
Thus,
Hence,
W (Gt+1) = 4W (Gt) + et + nt
= 4W (Gt) + 3t(e0 + n0).
W (Gt) = 4tW (G0) +
t−1
Xi=0
4i(cid:0)3t−1−i(cid:1) (e0 + n0)
= 4tW (G0) + 4t(e0 + n0) 1 −(cid:18) 3
4(cid:19)t! . (cid:3)
Diameters are constant in the ILT model. We record this as a strong indication of
the (ultra) small world property in the model.
Lemma 2.3. For all graphs G0 different than a clique,
diam(Gt) = diam(G0),
and diam(Gt) = diam(G0) + 1 = 2 when G0 is a clique.
Proof. This follows directly from Lemma 2.2.
(cid:3)
2.3. Proof of Theorem 1.3. We introduce the following dependency structure that
will help us classify the degrees of nodes. Given a node x ∈ V (G0) we define its
descendant tree at time t, written T (x, t), to be a rooted binary tree with root x, and
whose leaves are all of the nodes at time t. To define the (k + 1)th row of T (x, t), let
y be a node in the kth row (y corresponds to a node in Gk). Then y has exactly two
descendants on row k + 1: y itself and y′. In this way, we may identify the nodes of
Gt with a length t binary sequence corresponding to the descendants of x, using the
convention that a clone is labelled 1. We refer to such a sequence as the binary sequence
for x at time t. We need the following technical lemma.
Lemma 2.4. Let S(x, k, t) be the nodes of T (x, t) with exactly k many 0's in their
binary sequence at time t. Then for all y ∈ S(x, k, t)
2k(deg0(x) + 1) + t − k − 1 ≤ degt(y) ≤ 2k(deg0(x) + t − k + 1) − 1.
12 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG
Proof. The degree degt(y) is minimized when y is identified with the binary sequence
beginning with k many 0's: (0, . . . , 0, 1, 1, . . . , 1). In this case,
degt(y) = 2(2(. . . (2(2 deg0(x) + 1) + 1) . . . ) + 1) + 1 + (t − k)
= 2k(deg0(x) + 1) + t − k − 1.
The degree degt(y) is maximized when the sequence with the k many 0's at the end of
the sequence: (1, 1, . . . , 1, 0, . . . , 0). Then
degt(y) = 2(2(. . . (2(deg0(x) + t − k) + 1) . . . ) + 1) + 1
= 2k(deg0(x) + t − k + 1) − 1. (cid:3)
It can be shown (using Lemma 2.4) that the number of nodes of degree at least j at
time t, denoted by N(≥j), satisfies
t
X
t
Xi=log2 j(cid:18)t
i(cid:19) ≤ N(≥j) ≤
i(cid:19).
i=max{log2 j−log2 t−O(1),0}(cid:18)t
Indeed, when a vertex is identified with the binary sequence with i ≥ log2 k many 0's,
then the degree is at least k. We have (cid:0)t
i(cid:1) such sequences. On the other hand, if the
binary sequence has i ≤ log2 k − log2 t − O(1) many 0's, then the corresponding vertex
has degree smaller than k. In particular, N(≥j) = Θ(nt) for j ≤ √nt, and therefore,
the degree distribution of Gt does not follow a power law. Since (cid:0)t
j(cid:1) nodes have degree
around 2j, the degree distribution has "binomial-type" behaviour. As an example of
the degree distribution of a graph generated by the ILT model, see Figure 2.
Figure 2. A log-log plot of the degree distribution for G25 with G0 = K1.
MODELS OF ON-LINE SOCIAL NETWORKS
13
We now prove the following lemma. Recall that e(x, t) is the number of edges in
Gt ↾ Nt(x).
Lemma 2.5. For all x ∈ V (Gt) with k 0's in their binary sequence, we have that
Ω(3k) = e(x, t) = O(3kt2).
We note that the constants hidden in Ω(·) and O(·) notations (both in the statement
of the lemma and in the proof below) do not depend on k nor t.
Proof of Lemma 2.5. For x ∈ V (Gt) we have that
Xi=1
e(x, t + 1) = e(x, t) + degt(x) +
degt(x)
= 3e(x, t) + 2 degt(x).
(1 + degGt↾Nt(x)(x))
For x′, we have that
e(x′, t + 1) = e(x, t) + degt(x).
Since there are k many 0's and e(x, 2) is always positive for all initial graphs G0,
e(x, t) ≥ 3k−2e(x, 2) = Ω(3k) and the lower bound follows.
For the upper bound, a general binary sequence corresponding to x is of the form
(1, . . . , 1, 0, 1, . . . , 1, 0, 1, ..., 1, 0, 1, . . . , 1, 0, 1, . . . , 1)
with the 0's in positions ik (1 ≤ i ≤ k). Consider a path in the descendant tree from
the root of the tree to node x. By Lemma 2.4, the node on the path in the ith row
(i < ij) has (at time i) degree O(2j−1t).
Hence, the number of edges we estimate is O(t2) until the (i1 − 1)th row, increases
to 3O(t2) + O(21t) in the next row, and increases to 3O(t2) + O(21t2) in the (i2 − 1)th
row. By induction, we have that
e(x, t) = 3(. . . (3(3O(t2) + O(21t2)) + O(22t2)) . . . ) + O(2kt2)
= O(t2)3k
= O(3kt2). (cid:3)
k
3(cid:19)j
Xi=0 (cid:18)2
We now prove our result on clustering coefficients.
Proof of Theorem 1.3. For x ∈ V (Gt) with k many 0's in its binary sequence, by
Lemmas 2.4 and 2.5 we have that
and
ct(x) = Ω(cid:18) 3k
ct(x) = O(cid:18) 3kt2
(2kt)2(cid:19) = Ω (cid:18)3
4(cid:19)k
(2k)2(cid:19) = O (cid:18)3
4(cid:19)k
t−2! ,
t2! .
14 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG
Hence, since we have n0(cid:0) t
k=0 n0(cid:0)t
C(Gt) = Pt
k(cid:1) nodes with k many 0's in its binary sequence,
k(cid:1)Ω(cid:16)(cid:0) 3
! = Ω (cid:18) 7
8(cid:19)t
4(cid:1)t
= Ω t−2(cid:0)1 + 3
4(cid:1)k t−2(cid:17)
n02t
2t
t−2! .
In a similar fashion, it follows that
C(Gt) = Pt
k=0 n0(cid:0)t
k(cid:1)O(cid:16)(cid:0) 3
n02t
4(cid:1)k t2(cid:17)
= O (cid:18)7
8(cid:19)t
t2! . (cid:3)
2.4. Proofs of Theorems 1.4, 1.5, 1.6, and 1.7. We present proofs of the spectral
properties of the ILT model. For ease of notation, let λ(t) = λ(Gt).
Proof of Theorem 1.4. We use the expander mixing lemma for the normalized
Laplacian (see [10]). For sets of nodes X and Y we use the notation vol(X) for the
volume of the subgraph induced by X, and e(X, Y ) for the number of edges with one
end in each of X and Y.
Lemma 2.6. For all sets X ⊆ G,
e(X, X) −
vol(X)vol( ¯X)
(vol(X))2
vol(G)
≤ λ
.
We observe that Gt contains an independent set (that is, a set of nodes with no edges)
with volume vol(Gt−1) + nt−1. Let X denote this set, that is, the new nodes added at
time t. Then by (2.1) it follows that
vol(G) (cid:12)(cid:12)(cid:12)(cid:12)
(cid:12)(cid:12)(cid:12)(cid:12)
vol( ¯X) = vol(Gt) − vol(X) = 2vol(Gt−1) + nt−1.
Since X is independent, Lemma 2.6 implies that
λ(t) ≥
vol(X)
vol( ¯X)
=
vol(Gt−1) + nt−1
2vol(Gt−1) + nt−1
>
1
2
. (cid:3)
Proof of Theorem 1.5. Before we proceed with the proof of Theorem 1.5, we begin
by stating some notation and a lemma. For a given node u ∈ V (Gt), we let u ∈ V (G0)
denote the node in G0 that u is a descendant of. Given uv ∈ E(G0), we define
and for v ∈ E(G0), we set
Auv(t) = {xy ∈ E(Gt) : x = u, y = v},
Av(t) = {xy ∈ E(Gt) : x = y = v}.
We use the following lemma, for which the proof of items (1) and (2) follow from
Lemma 2.1. The final item contains a standard form of the Raleigh quotient charac-
terization of the second eigenvalue; see [10].
Lemma 2.7.
(1) For uv ∈ E(G0),
Auv(t) = 3t.
MODELS OF ON-LINE SOCIAL NETWORKS
15
(2) For v ∈ V (G0),
(3) Define
Then
λ1(t) =
Av(t) = 3t − 2t.
¯d = Pv∈V (Gt) f (v) degt(v)
vol(Gt)
.
(f (u) − f (v))2
Puv∈E(Gt)
f 2(v) degt(v) − ¯d2vol(Gt)
.
(2.2)
f :V (Gt)→R,
inf
f6=0
Pv
Note that in item (3), ¯d is a function of f. Now let g : V (G0) → R be the harmonic
eigenvector for λ1(0) so that
and
g(v) deg0(v) = 0,
Xv∈V (G0)
λ1(0) = Puv∈E(G0)
Pv∈V (G0)
(g(u) − g(v))2
g2(v) deg0(v)
.
Furthermore, we choose g scaled so that Pv∈V (G0) g2(v) deg0(v) = 1. This is the stan-
dard version of the Raleigh quotient for the normalized Laplacian from [10], so such a g
exists so long as G0 has at least two eigenvalues, which it does by our assumption that
G0 ≇ K1. Our strategy in proving the theorem is to show that lifting g to G1 provides
an effective bound on the second eigenvalue of G1 using the form of the Raleigh quotient
given in (2.2).
Define f : Gt → R by f (x) = g(x). Then note that
Xxy∈E(Gt)
(f (x) − f (y))2 = Xxy∈E(Gt),
x=y
(f (x) − f (y))2 + Xxy∈E(Gt)
(f (x) − f (y))2
x6=y
= Xuv∈E(G0) Xxy∈Auv
= 3t Xuv∈E(G0)
(g(u) − g(v))2
(g(u) − g(v))2.
16 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG
By Lemma 2.7 (1) and (2) it follows that
Xx∈V (Gt)
x=u
g2(u)
f 2(x)
f 2(x) degt(x) = Xx∈V (Gt) Xxy∈E(Gt)
= Xu∈V (G0) Xxy∈E(Gt),
g2(u)
1 + 2Au
= Xu∈V (G0)
Xvu∈E(G0) Xxy∈Auv
= 3t Xu∈V (G0)
g2(u) deg0(u) + 2(3t − 2t) Xu∈V (G0)
= 3t + 2(3t − 2t) Xu∈G0
g2(u).
g2(u)
By Lemma 2.1 and proceeding as above, noting that Pv∈V (G0) g(v) deg0(v) = 0, we
have that
¯d2vol(Gt) =
=
=
≤
vol(Gt)
vol(Gt)
f (x) degt(x)!2
Px∈V (Gt)
g(u)!2
2(3t − 2t) Pu∈V (G0)
3(cid:1)t(cid:17)2 Pu∈V (G0)
4 · 32t(cid:16)1 −(cid:0) 2
3t(cid:16)vol(G0) + 2n0(cid:16)1 −(cid:0) 2
3(cid:1)t(cid:17)2
4 · 3t(cid:16)1 −(cid:0) 2
Pu∈V (G0)
3(cid:1)t(cid:17)
¯D + 2(cid:16)1 −(cid:0) 2
g(u)!2
3(cid:1)t(cid:17)(cid:17)
g2(u)
,
where ¯D is the average degree of G0, and the last inequality follows from the Cauchy-
Schwarz inequality.
MODELS OF ON-LINE SOCIAL NETWORKS
17
By (2.2) we have that
λ1(t) ≤
≤
=
(f (x) − f (y))2
Pxy∈E(Gt)
f 2(x) degt(x) + ¯d2vol(Gt)
Px∈V (Gt)
3t Puv∈E(G0)
(g(u) − g(v))2
3(cid:1)t(cid:17)(cid:16)Pu∈V (G0) g2(u)(cid:17) −
3(cid:1)t(cid:17) Pu∈V (G0)
g2(u)!(cid:18)1 −
λ1(0)
3t + 2 · 3t(cid:16)1 −(cid:0) 2
1 + 2(cid:16)1 −(cid:0) 2
3)t(cid:17)
2(cid:16)1−( 2
¯D+2(cid:16)1−( 2
3 )t(cid:17)(cid:19)
4·3t(cid:16)1−( 2
3 )t(cid:17)2
g2(u)
Pu∈V (G0 )
3 )t(cid:17)
¯D+2(cid:16)1−( 2
< λ1(0),
where the strict inequality follows from the fact that ¯D ≥ 1 since G0 is connected and
G0 ≇ K1.
(cid:3)
Proof of Theorem 1.6. We denote vectors in bold. We first assume that ρ 6= −1.
Hence, ρ+, ρ− 6= 0. Let u be an eigenvector of A = A(Gt) such that Au = ρu. Let
β = (ρ+1)
, and let
ρ
Then we have that
v =(cid:18) u
βu (cid:19) .
M v = (cid:18) A
A + I
A + I
0 (cid:19)(cid:18) u
βu (cid:19)
(cid:19) .
= (cid:18) ρu + (ρ + 1)βu
(ρ + 1)u
Now βρ = ρ + 1, and so (ρ + 1)u = βρu. The condition
is equivalent to ρ solving
ρ = ρ + β(ρ + 1) = ρ +
(ρ + 1)2
ρ
x − ρ −
(ρ + 1)2
x
= 0.
Hence, M v = ρv as desired.
Now let ρ = −1. In this case, ρ− = −1. Let
v =(cid:18) u
0 (cid:19) ,
18 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG
where 0 is the appropriately sized zero vector. Thus,
A + I
M v = (cid:18) A
= (cid:18) −u
0 (cid:19) .
A + I
0 (cid:19)(cid:18) u
0 (cid:19)
Hence, M v = ρ−v as desired. In this case where ρ+ = 0 and ρ = −1, let
v =(cid:18) 0
u (cid:19) ,
and so M v = ρ+v.
(cid:3)
Proof of Theorem 1.7. Without loss of generality, we assume that G0 is not the trivial
graph K1; otherwise, G1 is K2, and we may start from there. Thus, in particular, we
can assume ρ0(0) ≥ 1.
We first observe that by Theorem 1.6
ρ0(t) ≥ 1 + √5
2 !t
ρ0(0).
By Theorem 1.6 and by taking a branch of descendants from the largest eigenvalue it
follows that
ρ1(t) ≥
2(√5 − 1)
(1 + √5)2 1 + √5
2 !t
ρ0(0).
Hence, to prove the theorem, it suffices to show that
ρ0(t) ≤ c 1 + √5
2 !t
ρ0(0).
Observe that, also by Theorem 1.6 and taking the largest branch of descendants from
the largest eigenvalues,
ρ0(t) = ρ0(0)
1 +q5 + 8
ρ0(i) + 4
ρ2
0(i)
2
t−1
Yi=0
≤ ρ0(0)
t−1
Yi=0
1 +q5 + 6
2
ρ0(i)
.
MODELS OF ON-LINE SOCIAL NETWORKS
19
Thus,
2tρ0(t)
(1 + √5)t ≤ ρ0(0)
ρ0(i)
6
t−1
t−1
t−1
≤ ρ0(0)
1 +q5 + 6
Yi=0
1 + √5
√5
Yi=0 1 +
1 + √5
≤ ρ0(0) exp 6√5
5(1 + √5)
6√5
≤ ρ0(0) exp
5ρ0(i)!
ρ0(i)−1!
Xi=0
Xi=0 (cid:18) 2
5(1 + √5)ρ0(0)
ρ0(0) ≥ ρ0(t) ≥ ρ1(t) ≥ d 1 + √5
2 !t
c 1 + √5
2 !t
In all we have proved that for constants c and d that
∞
1 + √5(cid:19)−i! = ρ0(0)c.
ρ0(t). (cid:3)
2.5. Proofs of Theorems 1.8 and 1.9. We give the proofs for the results on the cop
number, domination number, and automorphism group of the ILT model.
Proof of Theorem 1.8. We prove that for t ≥ 0, γ(Gt+1) = γ(Gt). It then follows
that γ(Gt) = γ(G0). When a dominating node x ∈ V (Gt) is cloned, its clone x′ will be
dominated by x. The clone y′ of a non-dominating node y ∈ V (Gt) will be joined to a
dominating node since y is joined to one. Hence, a dominating set in Gt is a dominating
set in Gt+1, and so γ(Gt+1) ≤ γ(Gt). If S′ is a dominating set in Gt+1, then form S by
replacing (if necessary) nodes x′ ∈ S′ by nodes x. As S dominates Gt, it follows that
γ(Gt) ≤ γ(Gt+1).
We next show that c(Gt+1) = c(Gt). Let c = c(Gt). Assume that c cops play in
Gt+1 so that whenever R is on x′ ∈ V (Gt+1) \ V (Gt), the cops C play as if he were on
x ∈ V (Gt). Either C captures R on x′, or using their winning strategy in Gt, the cops
move to x with R on x′. The cops then win in the next round. Hence,
c(Gt+1) ≤ c(Gt).
If b = c(Gt+1) < c, then we prove that c(Gt) ≤ b, which is a contradiction. Suppose
that R and C play in Gt. At the same time this game is played, let the set of b cops C′
play with their winning strategy in Gt+1, under the assumption that R remains in Gt.
Each time a cop in C′ moves to a cloned node x′, move the corresponding cop in C to
x. As x and x′ are joined and share the exact same neighbours in Gt+1, C may win in
Gt with b < c cops.
(cid:3)
Proof of Theorem 1.9. We first prove the following lemma.
Lemma 2.8. Each f0 ∈ Aut(G0), extends to ft ∈ Aut(Gt).
20 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG
Proof. Given f0 ∈ Aut(G0), we prove by induction on t ≥ 0 that f0 extends to
ft ∈ Aut(Gt). The base case is immediate. Assuming that ft is defined, let
ft+1(x) =(ft(x)
if x ∈ V (Gt),
(ft(y))′ where x = y′ .
Let x, y be distinct nodes of V (Gt). It is straightforward to see that ft+1 is a bijection.
We show that xy ∈ E(Gt+1) if and only if ft+1(x)ft+1(y) ∈ E(Gt+1). This will prove
that ft+1 ∈ Aut(Gt), as ft+1 extends ft.
The case for x, y ∈ V (Gt) is immediate as ft ∈ Aut(Gt). Next, we consider the case
for x ∈ V (Gt) and y′ ∈ V (Gt+1). Now xy′ ∈ E(Gt+1) if and only if
ft+1(x)ft+1(y′) = ft(x)(ft(y))′ ∈ E(Gt+1).
Note that x′y′ /∈ E(Gt+1) for all x′, y′ ∈ V (Gt+1)\V (Gt). But ft+1(x′)ft+1(y′) /∈ E(Gt+1)
by definition of Gt+1.
(cid:3)
We now prove that for all t ≥ 0, Aut(Gt) is isomorphic to a subgroup of Aut(Gt+1).
The proof of Theorem 1.9 then follows from this fact by induction on t. Define
by
φ : Aut(Gt) → Aut(Gt+1)
φ(f )(x) =(cid:26) f (x)
(f (y))′
if x ∈ V (Gt),
if x = y′ ∈ V (Gt+1) \ V (Gt).
Note that φ(f )(x) is injective, since f 6= g implies that φ(f ) 6= φ(g) by the definition
of φ.
We prove that for all x ∈ V (Gt+1) and f, g ∈ Aut(Gt),
φ(f g)(x) = φ(f )φ(g)(x).
If x ∈ V (Gt), then
φ(f g)(x) = f g(x) = φ(f )φ(g)(x).
If x /∈ V (Gt), then say x = y′, with y ∈ V (Gt). We then have that
φ(f g)(x) = (f g(y))′
= (φ(f )φ(g)(y))′
= φ(f )(g(y))′
= φ(f )φ(g)(x). (cid:3)
2.6. Proofs of Theorems 1.10 and 1.11. We give the proofs for the results on the
randomized ILT model, ILT(p). Without loss of generality, we assume that 0 < p < 1.
Proof of Theorem 1.10. By the definition of the ILT(p) model, we obtain the
following conditional expectation:
E(vol(Ht+1) vol(Ht)) = 3vol(Ht) + nt+1 + nt(nt − 1)p(nt).
At the beginning of the process, we cannot control the random variable vol(Ht); it
may be far from its expectation. However, if t is large enough, a number of additional
MODELS OF ON-LINE SOCIAL NETWORKS
21
edges added in a random process may be controlled, and vol(Ht) eventually approaches
its expected value. Let
t0(T ) =
4 log log T
log(3 + δ)
(2.3)
be the time from which we can control the process (note that t0(T ) tends to infinity
with T ). Now suppose that
vol(Ht0) = (3 + δ)t0(1 + A(t0)).
The function A(t0) measures how far vol(Gt0) is from its expectation; we do not give a
3+δ(cid:1)t0 apply (deterministically;
explicit formula for this, but the bounds −1 ≤ A(t0) ≤(cid:0) 4
3+δ(cid:1)t0 corresponds to a complete
note that −1 corresponds to an empty graph, while (cid:0) 4
graph). We first demonstrate that for any t (where t0(T ) ≤ t ≤ T ) with probability at
least (1 − T −2)t
vol(Ht) = (1 + o(1))(3 + δ)t 1 +(cid:18) 3
3 + δ(cid:19)t−t0
A(t0)! .
(2.4)
We prove (2.4) by induction on t. The base case, where t = t0, trivially holds. For
the inductive step, assume that (2.4) holds for t0 = t0(T ) ≤ t < T (with probability
at least (1 − T −2)t). We want to show that (2.4) holds for t + 1 (with probability at
least (1− T −2)t+1). Using (2.3) and (1.3) we have that the expected number of random
edges added at time t + 1 (that is, edges added between new nodes) is
EX = 2t(2t − 1)p(2t)
= (1 − (1/2)t)δ(3 + δ)t
≥ (1 + o(1))δ(3 + δ)t0
≥ (1 + o(1))δ log4 T.
Using the Chernoff bound
P(X − EX ≥ εEX) ≤ 2 exp(−ε2EX/3)
with ε = 1/ log T, we derive that the number of random edges is not concentrated with
probability at most
2 exp(cid:18)−
ε2EX
3 (cid:19) ≤ 2 exp(cid:18)−
δ log2 T
4 (cid:19) ≤ T −2.
vol(Ht+1) = 3vol(Ht) + 2t+1 + (1 + O(log−1 T ))δ(3 + δ)t
Thus, with probability at least (1 − T −2)t+1 we have that
= (1 + o(1))(3 + δ)t 3 + 3(cid:18) 3
3 + δ(cid:19)t−t0
= (1 + o(1))(3 + δ)t+1 1 +(cid:18) 3
3 + δ(cid:19)t+1−t0
A(t0) + δ!
A(t0)! .
22 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG
By the bounds on A(t0) it follows that
3 + δ(cid:19)T−t0
(cid:18) 3
A(t0) = exp (−Ω(T ) + O(t0))
= o(1).
Therefore, the assertion holds with probability at least
(1 + T −2)T = exp((1 + o(1))T −1)
= 1 + o(1). (cid:3)
Proof of Theorem 1.11. Let
and
X = V (HT ) \ V (HT−1)
¯X = V (HT ) \ X = V (HT−1).
By computation it follows that a.a.s.
vol(X) = (1 + o(1))(1 + δ)(3 + δ)T−1,
vol( ¯X) = (1 + o(1))2(3 + δ)T−1,
vol(HT ) = (1 + o(1))(3 + δ)(3 + δ)T−1,
and
Thus, by Lemma 2.6 we have that a.a.s.
e(X, X) = (1 + o(1))(3 + δ)T−1.
λ(T ) ≥ (1 + o(1))3 + δ − (1 + δ)2
2(1 + δ)
2 − δ − δ2
2(1 + δ)
= (1 + o(1))
= Ω(1). (cid:3)
3. Conclusion and further work
We introduced the ILT model for OSNs and other complex networks, where the
network is cloned at each time-step. We proved that the ILT model generates graphs
with a densification power law, in many cases decreasing average distance (and in all
cases, the average distance and diameter are bounded above by constants independent
of time), have higher clustering than random graphs with the same average degree, and
have smaller spectral gaps for both their normalized Laplacian and adjacency matrices
than in random graphs. The cop and domination number were shown to remain the
same as the graph from the initial time-step G0, and the automorphism group of G0
is a subgroup of the automorphism group of graphs generated at all later times. A
randomized version of the ILT model was introduced with tuneable densification power
law exponent.
As we noted after the statement of Lemma 2.4, the ILT model does not generate
graphs with a power law degree distribution, and neither does the ILT(p) model. An
interesting problem is to design and analyze a randomized version of the ILT model
MODELS OF ON-LINE SOCIAL NETWORKS
23
satisfying the properties displayed in the ILT model as well as generating power law
graphs. Such a randomized ILT model should with high probability generate power law
graphs with topological and spectral properties similar to graphs from the deterministic
ILT model.
Certain OSNs like Twitter are directed networks, where users may be either friends
with other users (represented by undirected edges), or follow them (represented by a
directed edge pointing to the follower). Hence, a more accurate model for such networks
would be directed, and we will consider a directed version of the ILT model in the sequel.
References
[1] L.A. Adamic, O. Buyukkokten, E. Adar, A social network caught in the web, First Monday 8
(2003).
[2] Y. Ahn, S. Han, H. Kwak, S. Moon, H. Jeong, Analysis of topological characteristics of huge
on-line social networking services, In: Proceedings of the 16th International Conference on World
Wide Web, 2007.
[3] M. Aigner, M. Fromme, A game of cops and robbers, Discrete Applied Mathematics 8 (1984)
1 -- 12.
[4] G. Bebek, P. Berenbrink, C. Cooper, T. Friedetzky, J. Nadeau, S.C. Sahinalp, The degree distri-
bution of the generalized duplication model, Theoretical Computer Science 369 (2006) 234-249.
[5] A. Bhan, D.J. Galas, T.G. Dewey, A duplication growth model of gene expression networks,
Bioinformatics 18 (2002) 1486-1493.
[6] A. Bonato, A Course on the Web Graph, American Mathematical Society Graduate Studies Series
in Mathematics, Providence, Rhode Island, 2008.
[7] A. Bonato, J. Janssen, Infinite limits and adjacency properties of a generalized copying model,
Internet Mathematics 4 (2009) 199-223.
[8] A. Bonato, N. Hadi, P. Horn, P. Pralat, C. Wang, Dynamic models of on-line social networks, In:
Proceedings of the 6th Workshop on Algorithms and Models for the Web Graph (WAW'09), 2009.
[9] G. Caldarelli, Scale-Free Networks, Oxford University Press, Oxford, 2007.
[10] F. Chung, Spectral Graph Theory, American Mathematical Society, Providence, Rhode Island,
1997.
[11] F. Chung, L. Lu, T. Dewey, D. Galas, Duplication models for biological networks, Journal of
Computational Biology 10 (2003) 677-687.
[12] F. Chung, L. Lu, Complex graphs and networks, American Mathematical Society, Providence,
Rhode Island, 2006.
[13] F. Chung, L. Lu, V. Vu, The spectra of random graph with given expected degrees, Internet
Mathematics 1 (2004) 257 -- 275.
[14] D. Crandall, D. Cosley, D. Huttenlocher, J. Kleinberg, S. Suri, Feedback effects between similarity
and social influence in on-line communities, In: Proceedings of the 14th ACM SIGKDD Intl. Conf.
on Knowledge Discovery and Data Mining, 2008.
[15] R. Durrett, Random Graph Dynamics, Cambridge University Press, New York, 2006.
[16] H. Ebel, J. Davidsen, S. Bornholdt, Dynamics of social networks, Complexity 8 (2003) 24-27.
[17] E. Estrada, Spectral scaling and good expansion properties in complex networks Europhys. Lett.
73 (2006) 649-655.
[18] O. Frank, Transitivity in stochastic graphs and digraphs, Journal of Mathematical Sociology 7
(1980) 199-213.
[19] Z. Furedi, J. Komlos, The eigenvalues of random symmetric matrices, Combinatorica 1 (1981)
233-241.
[20] G. Hahn, Cops, robbers and graphs, Tatra Mountain Mathematical Publications 36 (2007) 163 --
176.
24 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG
[21] M. Girvan, M.E.J. Newman. Community structure in social and biological networks, Proceedings
of the National Academy of Sciences 99 (2002) 7821-7826.
[22] C. Gkantsidis, M. Mihail, A. Saberi, Throughput and congestion in power-law graphs, In: Pro-
ceedings of the 2003 ACM SIGMETRICS International Conference on Measurement Modeling of
Computer Systems, 2003.
[23] S. Golder, D. Wilkinson, B. Huberman, Rhythms of social interaction: messaging within a massive
on-line network, In: 3rd International Conference on Communities and Technologies, 2007.
[24] A. Java, X. Song, T. Finin, B. Tseng, Why we twitter: understanding microblogging usage and
communities, In: Proceedings of the Joint 9th WEBKDD and 1st SNA-KDD Workshop 2007,
2007.
[25] B. Krishnamurthy, P. Gill, M. Arlitt, A few chirps about Twitter, In: Proceedings of The First
ACM SIGCOMM Workshop on Online Social Networks, 2008.
[26] R. Kumar, P. Raghavan, S. Rajagopalan, D. Sivakumar, A. Tomkins, E. Upfal, Stochastic models
for the web graph, In: Proceedings of the 41th IEEE Symposium on Foundations of Computer
Science, 2000.
[27] R. Kumar, J. Novak, A. Tomkins, Structure and evolution of on-line social networks, In: Pro-
ceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data
Mining, 2006.
[28] J. Leskovec, J. Kleinberg, C. Faloutsos, Graphs over time: densification Laws, shrinking diameters
and possible explanations, In: Proceedings of the 13th ACM SIGKDD International Conference
on Knowledge Discovery and Data Mining, 2005.
[29] J. Leskovec, D. Chakrabarti, J. Kleinberg, C. Faloutsos, Realistic, mathematically tractable graph
generation and evolution, using Kronecker multiplication, In: Proceedings of European Conference
on Principles and Practice of Knowledge Discovery in Databases, 2005.
[30] D. Liben-Nowell, J. Novak, R. Kumar, P. Raghavan, A. Tomkins, Geographic routing in social
networks, Proceedings of the National Academy of Sciences 102 (2005) 11623-11628.
[31] S. Milgram, The small world problem, Psychology Today 2 (1967) 60-67.
[32] A. Mislove, M. Marcon, K. Gummadi, P. Druschel, B. Bhattacharjee, Measurement and analysis
of on-line social networks, In: Proceedings of the 7th ACM SIGCOMM Conference on Internet
Measurement, 2007.
[33] R. Nowakowski, P. Winkler, Vertex-to-vertex pursuit in a graph, Discrete Mathematics 43 (1983)
235 -- 239.
[34] A. Quilliot, Jeux et pointes fixes sur les graphes, Ph.D. Dissertation, Universit´e de Paris VI, 1978.
[35] R. Pastor-Satorras, E. Smith, R.V. Sole, Evolving protein interaction networks through gene
duplication, J. Theor. Biol. 222 (2003) 199-210.
[36] J.P. Scott, Social Network Analysis: A Handbook, Sage Publications Ltd, London, 2000.
[37] D.J. Watts, S.H. Strogatz, Collective dynamics of 'small-world' networks, Nature 393 (1998)
440-442.
[38] H. White, S. Harrison, R. Breiger, Social structure from multiple networks, I: Blockmodels of
roles and positions, American Journal of Sociology 81 (1976) 730-780.
MODELS OF ON-LINE SOCIAL NETWORKS
25
Department of Mathematics, Ryerson University, Toronto, ON, Canada, M5B 2K3
E-mail address: [email protected]
Department of Mathematics, Wilfrid Laurier University, Waterloo, NS, Canada,
N2L 3C5
E-mail address: [email protected]
Department of Mathematics and Computer Science, Emory University, Atlanta, GA,
U.S.A., 30322
E-mail address: [email protected]
Department of Mathematics and Statistics, Dalhousie University, Halifax NS, Canada,
B3H 3J5
E-mail address: [email protected]
Department of Mathematics, Ryerson University, Toronto, ON, Canada, M5B 2K3
E-mail address: [email protected]
|
1508.03938 | 1 | 1508 | 2015-08-17T06:56:49 | Using Bluetooth Low Energy in smartphones to map social networks | [
"cs.SI",
"cs.CY"
] | Social networks have an important role in an individual's health, with the propagation of health-related features through a network, and correlations between network structures and symptomatology. Using Bluetooth-enabled smartphones to measure social connectivity is an alternative to traditional paper-based data collection; however studies employing this technology have been restricted to limited sets of homogenous handsets. We investigated the feasibility of using the Bluetooth Low Energy (BLE) protocol, present on users' own smartphones, to measure social connectivity. A custom application was designed for Android and iOS handsets. The app was configured to simultaneously broadcast via BLE and perform periodic discovery scans for other nearby devices. The app was installed on two Android handsets and two iOS handsets, and each combination of devices was tested in the foreground, background and locked states. Connectivity was successfully measured in all test cases, except between two iOS devices when both were in a locked state with their screens off. As smartphones are in a locked state for the majority of a day, this severely limits the ability to measure social connectivity on users' own smartphones. It is not currently feasible to use Bluetooth Low Energy to map social networks, due to the inability of iOS devices to detect another iOS device when both are in a locked state. While the technology was successfully implemented on Android devices, this represents a smaller market share of partially or fully compatible devices. | cs.SI | cs | Using
Bluetooth
Low
Energy
in
smartphones
to
map
social
networks
Samuel
Townsend
a,
Mark
E.
Larsen
a,
Tjeerd
W.
Boonstra
a
and
Helen
Christensen
a
a
Black
Dog
Institute,
University
of
New
South
Wales,
Sydney,
Australia
Email:
[email protected],
[email protected],
[email protected],
[email protected]
Abstract
Social
networks
have
an
important
role
in
an
individual’s
health,
with
the
propagation
of
health-‐
related
features
through
a
network,
and
correlations
between
network
structures
and
symptomatology.
Using
Bluetooth-‐enabled
smartphones
to
measure
social
connectivity
is
an
alternative
to
traditional
paper-‐based
data
collection;
however
studies
employing
this
technology
have
been
restricted
to
limited
sets
of
homogenous
handsets.
We
investigated
the
feasibility
of
using
the
Bluetooth
Low
Energy
(BLE)
protocol,
present
on
users’
own
smartphones,
to
measure
social
connectivity.
A
custom
application
was
designed
for
Android
and
iOS
handsets.
The
app
was
configured
to
simultaneously
broadcast
via
BLE
and
perform
periodic
discovery
scans
for
other
nearby
devices.
The
app
was
installed
on
two
Android
handsets
and
two
iOS
handsets,
and
each
combination
of
devices
was
tested
in
the
foreground,
background
and
locked
states.
Connectivity
was
successfully
measured
in
all
test
cases,
except
between
two
iOS
devices
when
both
were
in
a
locked
state
with
their
screens
off.
As
smartphones
are
in
a
locked
state
for
the
majority
of
a
day,
this
severely
limits
the
ability
to
measure
social
connectivity
on
users’
own
smartphones.
It
is
not
currently
feasible
to
use
Bluetooth
Low
Energy
to
map
social
networks,
due
to
the
inability
of
iOS
devices
to
detect
another
iOS
device
when
both
are
in
a
locked
state.
While
the
technology
was
successfully
implemented
on
Android
devices,
this
represents
a
smaller
market
share
of
partially
or
fully
compatible
devices.
Keywords
smartphone,
social
networks,
mental
health,
mobile
applications
Using
Bluetooth
Low
Energy
in
smartphones
to
map
social
networks
1
Introduction
Social
networks
have
an
important
role
in
an
individual’s
health
and
wellbeing,
and
features
such
as
obesity
(1),
smoking
status
and
happiness
(2)
have
been
shown
to
propagate
through
an
individual’s
network.
The
topology
of
social
networks
has
also
been
shown
to
relate
to
mental
health,
such
as
the
clustering
of
individuals
with
depressive
symptoms
(3)
and
differing
degrees
of
connectivity
(4).
Changes
in
social
connectivity
can
also
be
indicative
of
change
in
mental
health
state
and
significant
events,
such
as
suicidal
behaviour
(5,
6).
Traditional
techniques
for
mapping
social
network
structures
involve
using
name
generators
to
ask
people
to
self-‐report
their
degree
of
connectivity
with
a
range
of
identified
individuals.
Smartphones
with
Bluetooth
have
been
used
to
accurately
infer
friendship
networks
(7),
indicating
the
potential
for
mobile
apps
to
measure
social
networks
(8).
However,
previous
studies
using
Bluetooth
technology
in
smartphones
have
relied
on
providing
study-‐specific
handsets,
which
limits
the
scalability
of
such
data
collection
processes.
We
propose
using
users’
own
handsets
as
a
means
of
facilitating
studies
into
social
networks.
Although
Bluetooth
has
been
shown
to
be
a
suitable
technology
for
inferring
social
networks
information,
it
is
not
officially
supported
on
iOS
devices.
The
newer
Bluetooth
Low
Energy
(BLE)
protocol
is,
however,
supported
on
iOS
devices
as
well
as
newer
Android
handsets.
BLE
is
used
in
iBeacon
technology
(9)
to
detect
when
handsets
are
in
proximity
to
a
particular
device,
which
suggests
it
is
a
suitable
platform
for
detecting
other
nearby
users
as
a
basis
for
mapping
social
networks.
Here
we
investigate
the
capabilities
of
BLE
technology
implemented
in
a
custom
application
designed
for
Android
and
iOS
devices.
Implementing
this
technology
on
users’
own
handsets
will
enable
mapping
social
networks
on
much
larger
scale.
Methods
A
custom
application
was
designed
for
both
Android
and
iOS
devices
which
utilises
the
Bluetooth
Low
Energy
protocol
to
determine
the
user’s
social
network.
This
application
was
targeted
at
Android
devices
running
KitKat
(version
4.4)
and
above
(52%
of
Android
devices
as
of
June
2015
(10))
and
Apple
devices
running
iOS
7
and
above
(98%
of
iOS
devices
as
of
June
2015
(11)).
Using
Bluetooth
Low
Energy
in
smartphones
to
map
social
networks
2
The
app
was
configured
to
simultaneously
advertise
the
handset’s
presence
via
BLE,
and
to
perform
a
periodic
discovery
scan
for
other
nearby
devices.
Following
previous
work,
the
handset’s
Media
Access
Control
(MAC)
address
was
initially
used
to
uniquely
identify
each
handset
and
user.
A
MAC
address
is
a
unique
identifier
which
is
used
by
a
device’s
network
interface,
such
as
WiFi
and
Bluetooth
chips
present
in
a
smartphone,
in
order
to
communicate
and
direct
the
flow
of
data
on
a
network
segment.
These
identifiers
are
usually
written
into
the
hardware
itself
by
the
manufacturer,
and
are
generally
guaranteed
to
be
unique
between
devices.
However,
as
of
iOS
8,
these
unique
and
consistent
MAC
addresses
have
been
replaced
by
random,
constantly
changing
addresses.
This
is
a
privacy-‐maintaining
feature
(12)
to
restrict
passive
tracking
of
user
habits
and
behaviours
by
third
parties
without
consent.
This
feature
is
not
present
in
current
Android
devices,
which
provide
access
to
the
device’s
unique
MAC
address.
To
allow
social
connections
to
be
mapped
in
the
absence
of
a
consistent
MAC
address,
a
custom
BLE
service
was
implemented.
This
allowed
detection
only
by
other
handsets
that
shared
the
pre-‐defined
service
identifier.
Each
handset
generated
a
unique
identifier
which
was
advertised
as
a
characteristic
within
the
shared
service.
This
identifier
could
then
be
shared
with
other
handsets
with
the
app
installed,
allowing
all
users
to
be
correctly
identified.
To
test
the
ability
to
map
social
networks
using
BLE,
the
custom
app
was
installed
on
a
Samsung
Galaxy
S4
mini,
a
Samsung
Galaxy
S5,
iPhone
5s,
and
an
iPad
mini.
Initial
testing
involved
using
each
handset
in
three
states:
foreground
(when
the
app
is
shown
to
the
user
in
the
foreground,
and
the
screen
is
active),
background
(when
the
app
is
running
in
running
the
background,
the
home
screen
is
active,
and
the
screen
is
on),
and
locked
(when
the
app
is
running
in
the
background,
the
home
screen
is
active,
and
the
screen
is
off).
A
series
of
tests
were
performed
to
determine
if
each
of
the
devices
could
detect
each
other
in
the
three
different
app
states.
For
initial
testing,
only
two
devices
were
used
in
order
to
avoid
the
possibility
of
extra
devices
impacting
on
the
ability
to
correctly
detect
the
other
device.
This
meant
the
testing
of
three
combinations
(Android
to
Android,
Android
to
iOS,
and
iOS
to
iOS),
with
each
pair
being
tested
in
one
of
the
three
states
outlined
above.
For
the
Android
to
iOS
combination,
the
test
was
repeated
with
each
combination
of
device
to
ensure
consistent
results
were
obtained.
Using
Bluetooth
Low
Energy
in
smartphones
to
map
social
networks
3
Results
The
results
of
testing
the
devices
in
the
various
configurations
are
shown
in
Table
1.
Each
device
could
detect
each
other
in
all
configurations,
except
one:
two
iOS
devices
could
not
detect
each
other
when
they
were
both
in
the
locked
state.
This
meant
that
while
the
iOS
users
would
be
able
to
record
their
interactions
with
other
users
with
Android
devices,
they
would
not
detect
an
interaction
with
other
users
with
an
iOS
device
that
is
in
a
locked
state.
Table
1:
Results
of
tests
to
determine
if
handsets
could
detect
each
other.
Device
Android
Configuration
Android
iOS
FG
BG
L
FG
BG
L
FB
Pass
Pass
Pass
Pass
Pass
Pass
BG
Pass
Pass
Pass
Pass
Pass
Pass
L
Pass
Pass
Pass
Pass
Pass
Pass
FG
Pass
Pass
Pass
Pass
Pass
Pass
iOS
BG
Pass
Pass
Pass
Pass
Pass
Pass
L
Pass
Pass
Pass
Pass
Pass
Fail
FB
=
app
in
foreground
state,
BG
=
app
in
background
state,
L
=
app
in
locked
state.
Pass
=
handsets
detected
each
other,
Fail
=
handsets
failed
to
detect
each
other.
While
this
may
seem
to
impact
only
a
small
fraction
of
use
cases,
in
fact
this
is
the
largest
use
case.
A
recent
Nielsen
study
measured
smartphone
usage
at
an
average
of
37
hours
per
month
(13),
equating
to
a
period
of
1hr
and
15
minutes
per
day
for
which
a
user’s
phone
could
be
expected
to
be
unlocked.
Assuming
a
sleep
duration
of
eight
hours
per
day,
during
which
time
no
connectivity
would
be
detected,
this
means
an
iOS
handset
would
be
unable
to
detect
other
locked
iOS
devices
for
92%
of
the
waking
day.
Therefore
the
probability
of
any
two
iOS
devices
failing
to
detect
each
other
during
this
16-‐hour
period
is
85%.
The
ability
to
detect
devices
during
this
time
is
therefore
critical
for
the
implementation
of
this
technology.
The
reason
for
the
inability
to
detect
locked
iOS
devices
is
not
clear,
but
appears
to
be
related
to
the
operating
system
partially
removing
advertising
data
from
the
BLE
packet
when
the
device
is
in
a
locked
state.
This
is
unlikely
to
be
the
sole
reason,
however,
as
Android
devices
and
unlocked
iOS
devices
can
still
detect
a
locked
iOS
device
broadcasting
this
reduced
packet.
Using
Bluetooth
Low
Energy
in
smartphones
to
map
social
networks
4
Conclusions
Using
Bluetooth
Low
Energy
to
map
social
networks
appears
to
be
unviable
at
this
time,
due
to
inability
of
iOS
devices
to
detect
one
another
when
both
devices
are
in
a
locked
state
with
their
screens
off.
However,
iOS
devices
in
locked
state
advertised
and
scanned
periodically,
as
they
could
still
detect
and
be
detected
by
Android
devices.
While
the
app
functioned
successfully
on
Android
devices,
the
current
market
share
of
handsets
which
are
partially
compatible
(version
4.4
and
above)
has
not
reached
saturation,
with
fewer
being
fully
compatible
(version
5.0
and
above)
with
the
BLE
technology.
Future
updates
of
the
operating
system
may
resolve
the
issue
with
iOS
devices,
during
which
time
the
number
of
compatible
Android
devices
will
increase.
Acknowledgements
This
project
was
supported
by
the
NHMRC
Centre
of
Research
Excellence
in
Suicide
Prevention
APP1042580,
NHMRC
John
Cade
Fellowship
APP1056964
and
the
Young
and
Well
Cooperative
Research
Centre.
Using
Bluetooth
Low
Energy
in
smartphones
to
map
social
networks
5
Van
Orden
KA,
Witte
TK,
Cukrowicz
KC,
Braithwaite
SR,
Selby
EA,
Joiner
TE,
Jr.
The
Larsen
ME,
Cummins
N,
Boonstra
T,
O'Dea
B,
Tighe
J,
Nicholas
J,
et
al.,
editors.
The
use
of
Rosenquist
JN,
Fowler
JH,
Christakis
NA.
Social
network
determinants
of
depression.
Pachucki
MC,
Ozer
EJ,
Barrat
A,
Cattuto
C.
Mental
health
and
social
networks
in
early
Christakis
NA,
Fowler
JH.
The
spread
of
obesity
in
a
large
social
network
over
32
years.
The
Eagle
N,
Pentland
AS,
Lazer
D.
Inferring
friendship
network
structure
by
using
mobile
phone
Fowler
JH,
Christakis
NA.
Dynamic
spread
of
happiness
in
a
large
social
network:
longitudinal
References
1.
New
England
journal
of
medicine.
2007;357(4):370-‐9.
2.
analysis
over
20
years
in
the
Framingham
Heart
Study.
Bmj.
2008;337:a2338.
3.
Molecular
psychiatry.
2011;16(3):273-‐81.
4.
adolescence:
a
dynamic
study
of
objectively-‐measured
social
interaction
behaviors.
Social
science
&
medicine.
2015;125:40-‐50.
5.
interpersonal
theory
of
suicide.
Psychological
review.
2010;117(2):575-‐600.
6.
technology
in
suicide
prevention.
Conference
of
the
IEEE
Engineering
in
Medicine
and
Biology
Society;
2015.
7.
data.
Proceedings
of
the
National
Academy
of
Sciences
of
the
United
States
of
America.
2009;106(36):15274-‐8.
8.
modeling
personal
interactions.
ICMI-‐MLMI
'09
Workshop
on
Multimodal
Sensor-‐Based
Systems
and
Mobile
Phones
for
Social
Computing
2009
2009.
9.
https://support.apple.com/en-‐us/HT202880.
10.
https://developer.android.com/about/dashboards/.
11.
https://developer.apple.com/support/app-‐store/.
12.
http://www.ieee802.org/PrivRecsg/.
13.
the
globe
2015
[6
July
2015].
Available
from:
http://www.nielsen.com/us/en/insights/news/2014/how-‐smartphones-‐are-‐changing-‐consumers-‐
daily-‐routines-‐around-‐the-‐globe.html.
Apple.
iOS:
Understanding
iBeacon
[6
July
2015].
Available
from:
Google.
Android
Platform
Versions
Dashboard
[6
July
2015].
Available
from:
Apple.
App
Store
Distribution
Support
[6
July
2015].
Available
from:
Chronis
I,
Madan
A,
Pentland
A,
editors.
SocialCircuits:
the
art
of
using
mobile
phones
for
IEEE
802
EC
Privacy
Recommendation
Study
Group
[6
July
2015].
Available
from:
The
Nielsen
Company.
How
smartphones
area
changing
consumers'
daily
routines
around
Using
Bluetooth
Low
Energy
in
smartphones
to
map
social
networks
6
|
1201.1512 | 1 | 1201 | 2012-01-06T22:08:32 | Community detection and tracking on networks from a data fusion perspective | [
"cs.SI",
"math.PR",
"physics.soc-ph"
] | Community structure in networks has been investigated from many viewpoints, usually with the same end result: a community detection algorithm of some kind. Recent research offers methods for combining the results of such algorithms into timelines of community evolution. This paper investigates community detection and tracking from the data fusion perspective. We avoid the kind of hard calls made by traditional community detection algorithms in favor of retaining as much uncertainty information as possible. This results in a method for directly estimating the probabilities that pairs of nodes are in the same community. We demonstrate that this method is accurate using the LFR testbed, that it is fast on a number of standard network datasets, and that it is has a variety of uses that complement those of standard, hard-call methods. Retaining uncertainty information allows us to develop a Bayesian filter for tracking communities. We derive equations for the full filter, and marginalize it to produce a potentially practical version. Finally, we discuss closures for the marginalized filter and the work that remains to develop this into a principled, efficient method for tracking time-evolving communities on time-evolving networks. | cs.SI | cs |
Community detection and tracking on
networks from a data fusion perspective
James P. Ferry
Metron, Inc.
Reston, VA, U.S.A.
J. Oren Bumgarner
Metron, Inc.
Reston, VA, U.S.A.
Email: [email protected]
Email: [email protected]
Abstract - Community structure in networks has been investigated from many view-
points, usually with the same end result: a community detection algorithm of some
kind. Recent research offers methods for combining the results of such algorithms
into timelines of community evolution. This paper investigates community detection
and tracking from the data fusion perspective. We avoid the kind of hard calls made
by traditional community detection algorithms in favor of retaining as much uncer-
tainty information as possible. This results in a method for directly estimating the
probabilities that pairs of nodes are in the same community. We demonstrate that
this method is accurate using the LFR testbed, that it is fast on a number of standard
network datasets, and that it is has a variety of uses that complement those of stan-
dard, hard-call methods. Retaining uncertainty information allows us to develop a
Bayesian filter for tracking communities. We derive equations for the full filter, and
marginalize it to produce a potentially practical version. Finally, we discuss closures
for the marginalized filter and the work that remains to develop this into a principled,
efficient method for tracking time-evolving communities on time-evolving networks.
Keywords: Community detection, community tracking, Bayesian filter, co-membership proba-
bility, dynamic stochastic blockmodel.
1
Introduction
The science of networks has a large and multidisciplinary literature. Freeman traces the
sociological literature on networks from its pre-cursors in the 1800s and earlier, through
the sociometry of the 1930s and Milgram's "Small Worlds" experiments in the 1960s, to
its current form [29]. Sociologists and statisticians introduced the idea of defining network
metrics: simple computations that one can perform on a network, accompanied by argu-
ments that explain their significance: e.g., the clustering coefficient and various measures
of network centrality [77]. What Lewis calls the "modern period" of network science [50]
began in 1998 with the influx of physicists into the field (e.g., Barab´asi and Newman).
The physicists brought novel interests and techniques (power laws, Hamiltonians, mean field
approximation, etc.), particularly from statistical physics, along with an overarching drive
toward universality -- properties of network structure independent of the particular nature
of the nodes and links involved [55]. Mathematicians have their own traditions of graph
theory [9], and, in particular, random graph theory [37, 10] which emphasizes rigorously for-
mulated models and what properties the graphs they produce have (with high probability)
in different asymptotic regions of the models' parameter spaces. Finally, computer scientists
have developed a wide variety of efficient network algorithms [15], and continue to contribute
broadly because ultimately the processing of data into usable results is always accomplished
via an algorithm of some kind, and because solid computer science is needed for processing
megascale, real-world networks.
Each of the above communities brings important, complementary talents to network
science. The data fusion community has important perspectives to offer too, due both to the
broad range of practical issues that it addresses, and to characteristics of the mathematical
techniques it employs [2].
The defining problem of data fusion is to process data into useful knowledge. These
data may be of radically different types. One might consider a single data point to be, e.g.,
the position estimate of a target, a database record containing entries for various fields, an
RDF triple in some specified ontology, or a document such as an image, sound, or text file.
Data mining deals with similar issues, but focuses on the patterns in and transformations
of large data sets, whereas data fusion focuses on distilling effective situational awareness
about the real world. A central paradigm in data fusion is the hierarchy of fusion levels
needed to transform raw data into high-level knowledge, the most widespread paradigm
being the JDL (Joint Directors of Laboratories) hierarchy [69]. In this paradigm, level 0
comprises all the pre-processing that must occur before one can even refer to "objects." In
some cases it is clear that a data point corresponds to some single object, but it is unclear
which object: this is an entity resolution problem [6]. In other cases, a data point contains
information about multiple objects, and determining which information corresponds to which
object is a data association problem [53, 25]. Processing speech or images requires solving a
segmentation problem to map data to objects [30], and natural language processing involves
a further array of specific techniques (Named Entity Recognition, etc.). One benefit of a
data-fusion approach to network science is its careful consideration, at level 0, of how to
abstract representations from raw data.
In the network context, this applies not just to
nodes (i.e., objects), but to the links between them. Sometimes one imposes an arbitrary
threshold for link formation; sometimes multi-node relationships (i.e., hypergraph edges) are
replaced with edges between all nodes involved. Edges can have natural direction, weights, or
types (and nodes may have attributes) that are retained or ignored in a graph representation.
When data are inappropriately shoehorned into a network format, or important node or link
attributes are ignored, then the results derived from that graph representation may be much
less powerful than they could be, or even completely misleading.
Level-0 data fusion encompasses these pre-processing techniques, drawn from computer
science, data mining, and the domains specific to the data being considered. Higher-level
fusion (say, JDL levels 3 -- 5) addresses another set of issues important to a complete theory of
network science. These issues relate to human knowledge and intent. Just as level-0 fusion
has similarities with the computer-science approach to networks, higher-level fusion has
some overlap with the sociological approach. Levels 1 and 2, on the other hand, correspond
2
loosely to the more theoretical approaches of mathematics and physics. Level 1 addresses the
detection, state estimation, and tracking of individual objects [17]; whereas level 2 broadens
the scope to tracking groups of objects [22] and to the general assessment of multiple-object
situations [7]. In data fusion, however, the overriding problem is how to achieve cohesion
between the various levels [32]. Achieving such cohesion would be a valuable contribution
to network science.
This paper addresses a specific network problem from the data fusion perspective. Over
the past decade, there has been a great deal of work on the community detection problem [28]:
discerning how a graph's nodes are organized into "communities." There is no universally
accepted definition of community structure: it can correspond to some unobserved, ground-
truth organizational structure; it can refer to some attribute that nodes share that drives
them to "flock" together [52]; or communities can be defined as sets of nodes more densely
connected to each other than to the rest of the graph. Whatever the definition of commu-
nity structure, it nearly always results in communities being densely connected subsets of
nodes (the Newman -- Leicht algorithm being a notable exception [57]). In practice, studies
of community structure in graphs (e.g., [45]) define a community to be, in effect, the output
of a community detection algorithm. Weighted and/or directed edges are allowed in some
methods, but accounting for more general features on nodes and/or edges is problematic for
network research because this information tends to be domain-specific.
Community detection is nearly always formulated in terms an algorithm which ingests a
network and outputs some indication of its community structure. With a few exceptions,
community detection algorithms produce a single, hard-call result. Most often this result is a
partition of nodes into non-overlapping communities, but a few algorithms produce overlap-
ping communities (e.g., CFinder [60]), and some produce a dendrogram -- i.e., a hierarchy of
partitions [66]. The dominant framework for finding the best partition of nodes is to specify
some quality function of a partition relative to a graph and seek to maximize it. Methods
that maximize modularity [56] (explicitly or implicitly) are among the most numerous and
successful today.
From a data fusion perspective, however, it is important to assess the uncertainty associ-
ated with community detection. Quality functions such as modularity are only motivated by
intuition or physical analogy, whereas probability is the language of logical reasoning about
uncertainty [38]. The reason principled fusion of disparate data types is possible is that
one can posit an underlying model for reality, along with measurement models that specify
the statistics of how this reality is distorted in the data. One can then update one's prior
distribution on reality to a posterior via Bayesian inference [76].
There are some methods that formulate community detection as an inference problem:
a prior distribution over all possible community structures is specified, along with a likeli-
hood function for observing a graph given a community structure. Hastings, for example,
formulated the community detection problem in terms of a Potts model that defines the
Hamiltonian H for a given graph -- partition pair, and then converted this to a probability
proportional to e−βH [33]. Minimizing H therefore yields the MAP (Maximum A posteriori
Probability) partition for given structural parameters of the Potts model. Hofman and Wig-
gins extended this approach by integrating the structural parameters against a prior [34]. In
both cases, if all one does with the posterior probability distribution is locate its maximum,
then it becomes, in effect, just another quality function (albeit a principled one). On the
3
other hand, the entire posterior distribution is vast, so one cannot simply return the whole
thing. The question, then, is what such a probability distribution is good for.
Clauset et al. made greater use of the posterior distribution by devising a Monte Carlo
method for generating dendrograms, and using it to estimate the probabilities of missing
links [12]. Reichardt and Bornholdt employed a similar Monte Carlo method to estimate the
pairwise co-membership probabilities p{v,w} between nodes [61, 62], where p{v,w} is defined
to be the probability that nodes v and w are in the same community. The set of all p{v,w}
is much smaller than the full posterior distribution, and thus provides a useful, if incom-
plete, summary of the uncertainty information. It is expensive to compute exactly, however.
Therefore we will derive an accurate approximation with which to summarize uncertainty
information for community structure more efficiently than Monte Carlo methods.
A key benefit of retaining uncertainty information is that it enables principled track-
ing [70]. We may track time-varying communities in time-varying graph data by deriving an
efficient Bayesian filter for tracking time-varying communities from time-varying graph data.
The term "filter" is somewhat strange in this context: the original, signal-processing context
of filters (e.g., the Wiener filter [78]) was that of algorithms which filter out noise in order
to highlight a desired signal. The Kalman filter changed this framework to one of distinct
state and measurement spaces [40]. This was soon generalized to the concept of a Bayesian
filter [39]. To develop a Bayesian filter, one constructs (a) an evolution model over a state
space that specifies the probability distribution of the state at some future time given its
value at the current time, and (b) a measurement model that specifies the probability distri-
bution of the current measurement given the current state. Thus, despite the connotations
of the word "filter," a Bayesian filter can have quite different state and measurements spaces.
To track communities, a model for the co-evolution of graphs and community structure will
be constructed, and the measurement model will be that only the graph component of the
state is observable.
In Section 2 we derive exact inference equations for the posterior probabilities of all
possible community structures for a given graph. This result is essentially the same as can
be found elsewhere (e.g., [33, 34, 41]), but is included here in order to introduce notation and
clarify subsequent material. In Section 3 we derive an approximation of the co-membership
probabilities p{v,w} based on using only the most important information from the graph. The
p{v,w} matrix provides the uncertainty information that the usual hard-call algorithms lack.
In Section 4 we demonstrate that the p{v,w} approximation is accurate and also surprisingly
efficient: despite the fact that it provides so much information, it is significantly faster than
the current, state-of-the-art community detection algorithm (Infomap [64, 43]). We also
demonstrate the uses for this alternative or supplemental form of community detection, which
are embodied in the software IGNITE (Inter-Group Network Inference and Tracking Engine).
One benefit of maintaining uncertainty information is that it allows principled tracking. In
Section 5 we present a continuous-time Markov process model for the time-evolution of both
the community structure and the graph. We then derive an exact Bayesian filter for this
model. The state space for this model is far too large to use in practice, so in Section 6
we discuss efficient approximations for the exact filter. The community tracking material is
less developed than the corresponding detection material: there are several issues that must
be resolved to develop accurate, efficient tracking algorithms. However, we believe that the
principled uncertainty management of the data fusion approach provides a framework for
4
the development of more reliable, robust community tracking methods.
2 Community Detection: Exact Equations
Suppose that out of the space K of all possible networks on n nodes we are given some
particular network κ.
If we have some notion of a space Φ of all possible "community
structures" on these n nodes, then presumably the network κ provides some information
about which structures are plausible. One way to formalize this notion is to stipulate a
quality function Q : K × Φ → R that assigns a number to every network -- structure pair
(κ, φ). It would be natural, for example, to define quality as a sum over all node pairs {v, w}
of some metric for how well the network and community structure agree at {v, w}. That is, in
the network κ, if {v, w} is a link (or a "strong" link, or a particular kind of link, depending
on what we mean by "network"), then it should be rewarded if φ places v and w in the
same community (or "nearby" in community space, or in communities consistent with the
observed link type, depending on what we mean by "community structure"). Modularity is
a popular, successful example of a quality function [56]. Quality functions are easy to work
with and can be readily adapted to novel scenarios. However, the price of this flexibility
is that unless one is guided by some additional structure or principle, the choice of quality
function is essentially ad hoc. In addition, the output of a quality function is a number that
provides nothing beyond an ordering of the community structures in Φ. The "quality" itself
has little meaning.
One way to give quality functions additional meaning is to let them represent an energy.
In this case, the quality function may be interpreted as a Hamiltonian. The qualities assigned
to various community structures are no longer arbitrary scores in this case: meaningful
probabilities can be assigned to community structures can be computed from their energies.
The language of statistical physics reflects the dominance of that field in network science [28],
but from a fusion standpoint it is more natural to dispense with Hamiltonians and work
directly with the probabilities. A probabilistic framework requires models: these necessarily
oversimplify real-world phenomena, and one could argue that specifying a model is just
as arbitrary as specifying a quality function directly. However, the space of probabilistic
models is much more constrained than the space of quality functions, and, more importantly,
formulating the problem in terms of a formal probability structure allows for the meaningful
management of uncertainty. For this reason, modularity and other quality functions tend
to be re-cast in terms of a probability model when possible. For example, the modularity
function of Newman and Girven [56] was generalized and re-cast as the Hamiltonian of a
Potts model by Reichardt and Bornholdt [62], while Hastings demonstrated that this is
essentially equivalent to inference (i.e., the direct manipulation of probability) [33].
A probabilistic framework for this community structure problem involves random vari-
ables K for the graph and Φ for the community structure. We require models for the prior
probabilities Pr(Φ = φ) for all φ ∈ Φ and for the conditional probability Pr(K = κΦ = φ) for
all κ ∈ K and φ ∈ Φ. (We will typically use less formal notation such as Pr(φ) and Pr(κφ)
when convenient.) Bayes' theorem then provides the probability Pr(Φ = φK = κ) of the
community structure φ given the graph data κ. The models Pr(φ) and Pr(κφ) typically
have unknown input parameters (cid:126)µ, so that the probability given by Bayes' theorem could
5
be written Pr(φκ, (cid:126)µ). This must be multiplied by some prior probability Pr((cid:126)µ) over the
parameter space and integrated out to truly give Pr(φκ) [34]. A simpler, but non-rigorous,
alternative to integrating the input parameters against a prior is to estimate them from the
data. This can be accurate when they are strongly determined by the graph data: i.e., when
Pr((cid:126)µκ) is tightly peaked. The issue of integrating out input parameters will be addressed
in Section 3, but for now we will not include them in the notation.
Section 2.1 will derive Pr(κφ) using a stochastic blockmodel [20] with multiple link types
for κ. In Section 2.2, this will be simplified to the special case of a planted partition [14]
model in which links are only "on" or "off."
2.1 Stochastic blockmodel case
Let m denote the number of communities, and r be the number of edge types. The notation [p]
will denote the set of integers {1, 2, . . . , p}, and [p]0 denote the zero-indexed set {0, 1, . . . , p−
1}. We will let [n] denote the set of nodes; [m], the set of communities; and [r]0, the set of
edge types. Let S{2} denote the set of (unordered) pairs of a set S so that [n]{2} denotes the
set of node pairs. It is convenient to consider [n]{2} to be the set of edges: because there are
an arbitrary number of edge types r, one of them (type k = 0) can be considered "white" or
= n(n − 1)/2 edges, but in sparse graphs most of these are
.
"off." Thus, all graphs have N
the trivial type k = 0.
The community structure will be specified by a community assignment φ : [n] → [m],
i.e., a function that maps every node v ∈ [n] to a community φ(v) ∈ [m]. The graph will
be specified as a function κ : [n]{2} → [r]0, which maps every edge e ∈ [n]{2} to its type
κ(e) ∈ [r]0. (This unusual notation κ will be replaced with the more usual G when dealing
with the r = 2 case: i.e., when there is only edge type aside from "off.")
The stochastic blockmodel H(n, p, Q) is parametrized by the the number of nodes n, the
stochastic m-vector p, and a collection Q of stochastic r-vectors qij [41]. Here "stochastic
m-vector" simply means a vector of length m whose components are non-negative and sum to
one. The vector p comprises the prior probabilities pi of a node belonging to the community
i ∈ [m] -- the communities for each node are drawn independently. For 1 ≤ i ≤ j ≤ m, the
vector qij comprises the probabilities qij,k of an edge between nodes in communities i and j
being of type k -- the types of each edge are drawn independently once the communities of
the nodes are given. (For i > j, let qij = qji:
i.e., the edges are undirected.) The model
H(n, p, Q) defines the random variables Φ and K whose instances are denoted φ and κ,
respectively. The derivation of Pr(Φ = φK = κ) proceeds in six steps.
Step 1. The probability that a node v belongs to the community φ(v) is, by definition,
Step 2. The probability that an instance of Φ is the community assignment φ equals
Pr(Φ(v) = φ(v)) = pφ(v).
Pr(Φ = φ) =
pφ(v)
(2.1)
(2.2)
n(cid:89)
v=1
6
because the communities of each node are selected independently.
Step 3. For a fixed value φ of Φ, the probability that the edge e = {v, w} has type κ(e) is,
by definition,
Pr(K(e) = κ(e)Φ = φ) = qφ(v),φ(w),κ(e).
(2.3)
Step 4. For a fixed value of φ of Φ, the probability that an instance of K is the graph κ
equals
Pr(K = κΦ = φ) =
qφ(e1),φ(e2),κ(e),
(2.4)
because the types of each edge are selected independently given φ.
Step 5. The probability of a specific assignment φ and graph κ equals
(cid:89)
e∈[n]{2}
n(cid:89)
(cid:89)
e∈[n]{2}
Pr(Φ = φ, K = κ) =
pφ(v)
qφ(e1),φ(e2),κ(e),
(2.5)
because Pr(φ, κ) = Pr(κφ)Pr(φ).
v=1
Step 6. Finally, the posterior probability of Φ = φ for a given graph κ is
Pr(Φ = φK = κ) ∝ Pr(Φ = φ, K = κ),
(2.6)
where the constant of proportionality is 1/Pr(K = κ).
2.2 Planted partition case
In many applications one does not have any a priori knowledge about specific communities.
In such cases, the community labels [m] are arbitrary: the problem would be unchanged if
the communities were labeled according to another permutation of [m]. Thus, if one has a
prior distribution over p and Q (as in [34]), then that distribution must be invariant under
permutations of [m].
In the case of fixed input parameters p and Q, this translates to
p and Q themselves being invariant under permutations. Making this simplification, and
considering only r = 2 edge types ("off" (k = 0) and "on" (k = 1)) yields the special case
called the planted partition model [14]. In this case, symmetry implies that pi = 1/m for
all i ∈ [m], and that qij,1 = pI for i = j and qij,1 = pO for i (cid:54)= j. Here pI denotes the edge
probability between nodes in the same community, and pO, the edge probability between
nodes in different communities. Thus, the m + m(m + 1)(r − 1)/2 input parameters of
H(n, p, Q) reduce to only four to give the planted partition model H(n, m, pI, pO).
Having only two edge types suggests using the standard notation G to denote a graph,
with E(G) denoting the set of ("on") edges. The symmetry of the community labels implies
that Pr(φκ) is invariant under permutations of [m], so that is more efficient to formulate
the problem in terms of a partition π of the nodes into communities rather than φ (because
7
partitions are orbits of community assignments under permutations of [m]). We may then
replace (2.5) by
(m)π
mn peI
I (1 − pI)eI peO
O (1 − pO)eO.
Pr(π, G) =
(2.7)
Here π denotes the number of (non-empty) communities in the partition π, and (m)k denotes
the falling factorial m!/(m − k)!, which counts the number of assignments φ represented by
the equivalence class π. The number of edges between nodes in the same community is
denoted eI(G) (abbreviated to eI in (2.7)), and the number of non-edges (or "off" edges)
between nodes in the same community is denoted eI(G). The analogous quantities for
nodes in different communities are eO(G) and eO(G). The posterior probability Pr(πG) is
proportional to Pr(π, G).
3 Community Detection: Approximate Methods
Community detection methods that employ quality functions return hard calls: an optimiza-
tion routine is applied to determine the community structure that maximizes the quality
f (κ, φ) over all φ ∈ Φ for a given graph κ. There is little else one can do with a quality
function: one can return an ordered list of the k-best results, but a probability framework
is required to interpret the relative likelihoods of these.
In contrast, the formulas (2.5) and (2.7) provide the information necessary to answer
any statistical question about the community structure implied by κ. Unfortunately, an
algorithm that simply returns the full distribution is grossly impractical. The number of
partitions of n nodes is the Bell number B(n), which grows exponentially with n: e.g.,
B(60) ≈ 1060. What, then, are these probabilities good for? One answer is that the formula
for posterior probability can be used as a (more principled) quality function [33]. Another
is that Monte Carlo methods can be used to produce a random sample of solutions [61, 12].
These random samples can be used to approximate statistics of Φ. In this section we will
consider how such statistics might be computed directly.
3.1 Stochastic blockmodel
The most natural statistical question to ask is this: what is the probability that a node v is
= Pr(Φ(v) = iK = κ), where the
.
in community i? We may express this probability as pv
i
dependence on the graph κ is suppressed from the notation. For the model H(n, p, Q), we
may compute pv
i from (2.5):
pφ(v)
qφ(e1),φ(e2),κ(e).
(3.1)
(cid:88)
n(cid:89)
φ∈Φ
φ(v)=i
v=1
pv
i =
1
Pr(κ)
(cid:89)
e∈[n]{2}
Unfortunately, this exact expression does not appear to simplify in any significant way.
(Ironically, its dynamic counterpart does simplify: cf. Section 6.)
A strategy for approximating pv
i
is to use only the most relevant information in the
graph. For example, we could divide the edges into two classes: those that contain v and
those that do not. Edges in the former class have more direct relevance to the question of
8
which community v belongs to. If we let κv denote the restriction of the graph κ to edges
containing v, and Kv be the corresponding random variable, then we may approximate pv
i
by pv
i
= Pr(Φ(v) = iKv = κv). By Bayesian inversion this equals
.
i ∝ Pr(Φ(v) = i)Pr(Kv = κvΦ(v) = i)
pv
= pi
Pr(K({v, x}) = κ({v, x})Φ(v) = i) = pi
pjqij,κ({v,x}).
(3.2)
(cid:89)
m(cid:88)
x(cid:54)=v
j=1
(cid:89)
x(cid:54)=v
This equation exploits the statistical distribution of edge types that tend to emanate from
a given community: if Q is such that this information is distinctive, then (3.2) will perform
well. However, because it assesses each node in isolation, it does not exploit network structure
and will not perform well when Q fails to produce distinctive edge-type distributions.
If there were multiple, conditionally independent graph snapshots for a given ground-
in (3.2), and pj with px−
truth φ, then one could replace pi with pv−
, to get an updated
. One could initialize these values pv−
value pv+
to the prior pi and apply the update equation
for each graph snapshot κ: this would introduce communication between the results for
individual nodes and thus exploit network structure. The approach in Section 6 is a more
sophisticated version of this, which allows the temporal sequence of graphs to be correlated
and nodes to move between communities.
j
i
i
i
To derive useful probabilistic information that exploits network structure rather than
just the statistical characteristics of edge-type distributions we turn to the second-order
= Pr(Φ(v) = i, Φ(w) = jK = κ). To approximate this, we may divide
.
statistics pvw
the edges into three classes: the edge {v, w}, the edges containing either v or w (but not
ij
both), and the edges containing neither. One gets a rather trivial approximation using only
the single edge {v, w}, but using edges from the first two classes yields the approximation
= Pr(Φ(v) = i, Φ(w) = jKv = κv, Kw = κw). This quantity has a formula similar
.
pvw
ij
to (3.2):
ij ∝ Pr(Φ(v) = i, Φ(w) = j)Pr(Kv = κv, Kw = κwΦ(v) = i, Φ(w) = j)
pvw
= pipjPr(K({v, w}) = κ({v, w})Φ(v) = i, Φ(w) = j)×
Pr(K({v, x}) = κ({v, x}), K({w, x}) = κ({w, x})Φ(v) = i, Φ(w) = j)
(3.3)
= pipjqij,κ({v,w})
pkqik,κ({v,x})qjk,κ({w,x}).
(The version that uses only the single edge {v, w} as evidence is given by omitting the final
product in (3.3).) This formula provides important statistical information even when Q is
completely symmetric. Indeed, to exploit pvw
it is simpler to work with the symmetric case.
ij
3.2 Planted partition model
When p and Q are symmetric under permutations of [m], then (3.1) reduces to pv
i = 1/m
(and (3.2) to pv
i = 1/m). This is because in the symmetric case H(n, m, pI, pO) community
labels have no meaning, so first-order statistics become trivial. The simplest, non-trivial
9
(cid:89)
x(cid:54)=v,w
(cid:89)
m(cid:88)
x(cid:54)=v,w
k=1
quantities to compute are the second-order statistics pvw
In the symmetric case, they
ij .
reduce to the single probability p{v,w} that v and w are in the same community: i.e., p{v,w} .
=
Pr(Φ(v) = Φ(w)K = κ). To compute p{v,w} exactly requires a summation over all partitions.
Reichardt and Bornholdt estimated the p{v,w} matrix by a Monte Carlo sampling of the
partition space, but this is slow [62]. Instead of this, we may approximate p{v,w} directly by
simplifying (3.3). This leads to fairly simple expressions. The meaning of these expressions is
opaque, however, when derived through straightforward mathematical manipulations, which
creates problems when trying to adapt the results to engineering contexts. Therefore we
proceed along more general lines to demonstrate which aspects of the partition -- graph model
lead to which aspects of the resulting expressions.
Suppose instances of some random process P are partition -- graph pairs (π, G) on n nodes.
This process is not necessarily H(n, m, pI, pO): we will later take P to be a somewhat
more complex process in which the parameters m, pI, and pO are first drawn from some
distribution, and then an instance of H(n, m, pI, pO) is generated. Let Mvw be the indicator
random variable for the event that v and w are in the same community (i.e., Mvw = 1 when
v and w are in the same community, and 0 otherwise), and Kvw be the indicator random
variable for the existence of an edge between v and w. Now let κvw indicate the presence
or absence of the edge {v, w} in some given graph G (i.e., κvw = 1 if {v, w} is an edge of
G, and 0 otherwise). Thus, the κvw are data, rather than instances of Kvw. We define Jvw
to be the indicator random variable for Kvw agreeing with this datum κvw (i.e., Jvw = 1 if
Kvw = κvw, and 0 otherwise. We may express Jvw as
(3.4)
Now let Ξvw be the indicator random variable for P agreeing exactly with G on all edges
containing v and/or w. We may express this as
Jvw
= 1 − κvw − (−1)κvwKvw.
.
(cid:89)
x(cid:54)=v,w
Ξvw
.
= Jvw
JvxJwx.
(3.5)
The approximation to p{v,w} based on using only local graph information may then be
= Pr(Mvw = 1Ξvw = 1) = E[MvwΞvw = 1]. This can be expressed as
written p{v,w} .
p{v,w} =
Pr(Ξvw = 1Mvw = 1)Pr(Mvw = 1)
Pr(Ξvw = 1)
=
Λvw
Λvw + E[Mvw]−1 − 1
,
(3.6)
where the likelihood ratio Λvw is given by
.
=
Λvw
E[ΞvwMvw = 1]
E[ΞvwMvw = 0]
.
(3.7)
To evaluate E[ΞvwMvw] we would like to use (3.5), requiring that P have suitably fa-
vorable properties. If P = H(n, m, pI, pO), then the random variables Jvw, and each of the
JvxJwx for x (cid:54)= v, w are conditionally independent given Mvw. E.g., if Mvw = 1 (i.e., v and
w are in the same community), then Kvw = 1 with probability pI, independent of the values
of any other Kxy. However, if P is a process in which a parameter vector (cid:126)µ is first drawn
from some distribution, and then a draw is made from some process P((cid:126)µ), then assumption
10
of conditional independence is far too restrictive. In such a case the existence of many edges
elsewhere in the graph would suggest a large value of a parameter like pI, and hence a larger
value of Kvw, so this random variable would not be conditionally independent of the other
Kxy given Mvw.
This problem is easily overcome, however. We simply decompose the expected value into
the conditional expectation for a specified value of (cid:126)µ, followed by an expectation over (cid:126)µ.
E.g., we write E[ΞvwMvw] as
(3.8)
We then stipulate that Jvw and each of the JvxJwx for x (cid:54)= v, w are conditionally independent
given Mvw and (cid:126)µ. Then
E[ΞvwMvw] = E(cid:126)µ[E[ΞvwMvw, (cid:126)µ]].
E[ΞvwMvw, (cid:126)µ] = E[JvwMvw, (cid:126)µ]
E[JvxJwxMvw, (cid:126)µ].
(3.9)
(cid:89)
x(cid:54)=v,w
We may express the factors in the product in terms of a covariance:
E[JvxJwxMvw, (cid:126)µ] = E[JvxMvw, (cid:126)µ]E[JwxMvw, (cid:126)µ] + Cov(Jvx, JwxMvw, (cid:126)µ).
(3.10)
We make the further assumption that Kvx is conditionally independent of Mvw given (cid:126)µ
(which, again, holds for H(n, m, pI, pO)). Then, using (3.4) we have
E[JvxJwxMvw, (cid:126)µ] = E[Jvx(cid:126)µ]E[Jwx(cid:126)µ] + (−1)κvx+κwxCov(Kvx, KwxMvw, (cid:126)µ).
(3.11)
We introduce the following notation
= E[Mvw(cid:126)µ],
.
= E[Kvx(cid:126)µ],
.
µ
δ
ψ+ .
ψ− .
= Cov(Kvx, KwxMvw = 1, (cid:126)µ),
= Cov(Kvx, KwxMvw = 0, (cid:126)µ).
(3.12)
(3.13)
In this symmetric scenario all quantities are invariant under node permutations. Thus µ
is the probability that two randomly chosen nodes are in the same community (for fixed
parameters (cid:126)µ), and δ is the probability that two random chosen nodes have an edge between
them. We write E[JvxJwxMvw, (cid:126)µ] in terms of these quantities:
(3.14)
(3.15)
(3.16)
(3.17)
(1 − δ)2 + ψ if κvx + κwx = 0,
(cid:40)
δ(1 − δ) − ψ if κvx + κwx = 1,
δ2 + ψ
if κvx + κwx = 2,
ψ− if Mvw = 0,
ψ+ if Mvw = 1.
E[JvxJwxMvw, (cid:126)µ] =
where
.
=
ψ
We may use this to express (3.9) as
where
f (δ, ψ)
E[ΞvwMvw, (cid:126)µ] = E[JvwMvw, (cid:126)µ]f (δ, ψ),
=(cid:0)(1 − δ)2 + ψ(cid:1)n0(cid:0)δ(1 − δ) − ψ(cid:1)n1(cid:0)δ2 + ψ(cid:1)n2.
.
11
Here nj denotes the number of nodes (aside from v and w) adjacent to exactly j of {v, w},
and n0 + n1 + n2 = n − 2.
Now to compute E[ΞvwMvw] we substitute (3.16) into (3.8). To evaluate the expectation
E(cid:126)µ[·] of (3.16) requires a specific random graph model P. We will use the following P: we
will select the number of communities m in a manner to be discussed below, and select pI
and pO uniformly from 0 ≤ pO ≤ pI ≤ 1. Then we shall make a draw from H(n, m, pI, pO)
to generate a partition -- graph pair (π, G). For this model we have
and δ = µpI + (1 − µ)pO,
µ = 1/m,
(3.18)
as well as
ψ+ = (δ − pO)(pI − δ) = µ(1 − µ)(pI − pO)2 ≥ 0, and
ψ− = −(δ − pO)2
= −µ2(pI − pO)2
≤ 0.
(3.19)
(3.20)
Finally, the leading factor in (3.16) is
E[JvwMvw = 1, (cid:126)µ] = pI if κvw = 1, E[JvwMvw = 1, (cid:126)µ] = 1 − pI if κvw = 0,
(3.21)
E[JvwMvw = 0, (cid:126)µ] = pO if κvw = 1, E[JvwMvw = 0, (cid:126)µ] = 1 − pO if κvw = 0.
(3.22)
We may split the expectation E(cid:126)µ[·] into an integral over pI and pO followed by an expec-
tation with respect to m. Then (3.8) becomes
E[ΞvwMvw] = Em
2
E[JvwMvw, (cid:126)µ]f (δ, ψ) dpOdpI
.
(3.23)
(cid:20)
(cid:90) 1
(cid:90) pI
0
0
(cid:21)
We may change coordinates from (pO, pI) to (δ, ψ+) for Mvw = 1 and to (δ, ψ−) for Mvw = 0.
This introduces complications due to Jacobians and complicated regions of integration R+
and R−, but it is helpful to be in the natural coordinate system of f :
E[ΞvwMvw = 1] = Em
E[ΞvwMvw = 0] = Em
(cid:34)(cid:90)(cid:90)
(cid:20)(cid:90)(cid:90)
E[JvwMvw = 1, (cid:126)µ]
(cid:112)µ(1 − µ)ψ+
√−ψ−
E[JvwMvw = 0, (cid:126)µ]
µ
R+
R−
(cid:35)
f (δ, ψ−) dδdψ−(cid:21)
f (δ, ψ+) dδdψ+
,
.
(3.24)
(3.25)
In the Mvw = 1 case, the range 0 ≤ pO ≤ pI ≤ 1 is transformed into the following region R+:
ψ+ = 0 to δ2(1−µ)/µ for δ = 0 to µ and ψ+ = 0 to (1−δ)2µ/(1−µ) for δ = µ to 1. Similarly,
in the Mvw = 0 case it is transformed into the following region R−: ψ− = −δ2 to 0 for
δ = 0 to µ and ψ− = −(1− δ)2(µ/(1− µ))2 to 0 for δ = µ to 1. To compute (3.24) and (3.25)
numerically one would transform the expressions (3.21) and (3.22) into (δ, ψ) space, although
it seems to be more numerically stable to use the expressions (3.19) and (3.20) in (3.23).
For small n, this numerical integration is feasible. The following example employs numerical
integration for a dataset with n = 34 nodes.
Figure 1 shows which pairs of nodes are particularly likely or unlikely to be in the same
community for Zachary's karate club data [79]. This is a social network of 34 members of
a karate club at a university which split into two communities. Nodes 4 and 8 are most
12
Figure 1: p{v,w} plot for Zachary's karate club: blue: p{v,w} ≥ 60%; red: p{v,w} ≤ 1.8%
likely, with p{4,8} = 98.8%, and nodes 1 and 34 least likely to be in the same community with
p{1,34} = 0.65%. Being adjacent does not guarantee a high value of p{v,w}: the node pairs
{1, 32} and {14, 34} each have p{v,w} = 8.9%. Nor is it necessary for nodes to be adjacent to
have a high value of p{v,w}: among nodes 15, 16, 19, 21, and 23 p{v,w} = 84.5% for every pair,
and p{8,14} = 96.1%. Note that the node pairs {8, 14} and {1, 34} are each non-adjacent, and
each has four common neighbors (i.e., n2 = 4), but their values of p{v,w} differ by a factor
of 150 because of the degrees of the nodes involved. Finally, although nodes 9 and 31 are in
different ground-truth communities, p{9,31} = 92.1%.
When numerical integration is not feasible, it is difficult to obtain good asymptotic
estimates as n → ∞, so we will resort to heuristics. The function f has a global maximum
which is increasingly sharp as n → ∞. This occurs at
.
=
δp
n1 + 2n2
2(n − 2)
, ψp
.
=
4n0n2 − n2
4(n − 2)2 .
1
(3.26)
If ψp ≥ 0, then this peak lies within R+ when ψp/(ψp+(1−δp)2) ≤ µ ≤ δ2
p). Assuming
the expectation Em[·] has significant weight in this range, one can replace f with a delta
function at (δp, ψp) to estimate E[ΞvwMvw = 1] (i.e., parameter estimation is an appropriate
approximation to the full, Bayesian integration). To estimate E[ΞvwMvw = 0] in this case,
one could make the same argument, but with the maximum of f (δ, ψ−) constrained to
ψ− ≤ 0. Conveniently, this constrained maximum occurs at (δp, 0). The analogous argument
works when ψp ≤ 0. Therefore, if the integrals in (3.24) and (3.25) contained nothing but
Ignoring the
f (δ, ψ) we could approximate them by f (δp, ψp) or f (δp, 0) as appropriate.
expectation over m as well, we could substitute these expressions into (3.7) to obtain the
p/(ψp+δ2
following approximation(cid:101)Λvw ≈
(cid:40)
f (δp, ψp)/f (δp, 0)
f (δp, 0)/f (δp, ψp)
if ψp ≥ 0, and
if ψp < 0.
(3.27)
13
We may decompose Λ as Λ = (cid:101)ΛΛk, where Λ1 encompasses all corrections to the crude
approximation (cid:101)Λ when there is an edge between v and w, and Λ0 when there is no edge.
For this, we need to specify the prior on m. Here, we let log m vary uniformly from log 2 to
log n. It is convenient to treat m (or, equivalently, µ) as a continuum variable here to avoid
the accidents of discreteness. With this prior, we may compute the value of E[Mvw] required
in (3.6) as
When ψp differs greatly from 0, the (cid:101)Λ factor is very large or small and dominates the
(3.28)
.
¯µ = E[Mvw] =
correction term Λk. Therefore we seek to approximate the correction factor only in the
critical case ψp = 0. Typically, real-world graphs are sparse, in which case the lack of
an edge between v and w decreases their co-membership probability only slightly, but the
presence of an edge greatly enhances it. Numerical experimentation confirms this intuition:
the correction factor Λ0 due to the absence of an edge is roughly constant, but the factor
Λ1 due to the presence of the edge {v, w} increases rapidly as δp decreases until it hits a
constant plateau (which varies with n):
Λ0 = min(0.7197, 0.46 δ−0.15
), and
Λ1 = min(0.5605 n + 1.598, δ−0.7
).
p
p
(3.29)
(3.30)
1/2 − 1/n
log(n/2)
The four-digit coefficients in these formulas are obtained from an asymptotic analysis of
exact results obtained in the n1 = n2 = 0 case. These exact results involve combinations of
generalized hypergeometric functions (i.e., pFq(a; b; z)), and are not particularly enlightening,
although they can be used to obtain accurate coefficients, such as 0.56051044368284805729
rather than 0.5605 in (3.30).
Putting the above together into (3.6), we obtain the following approximation to p{v,w}:
Λκvw(cid:101)Λ
Λκvw(cid:101)Λ + ¯µ−1 − 1
p{v,w} =
.
(3.31)
This formula could certainly be improved. It often yields results such as p{v,w} = 1 − 10−20:
this figure might be accurate given the model assumptions, but such certainty could never
be attained in the real world. To make it more accurate a more sophisticated model could be
used, or the priors on pI, pO, and m could be matched more closely to reality. Only limited
improvement is possible, however, because in reality multiple, overlapping, fuzzily-defined
community structures typically exist at various scales, and it is unclear what p{v,w} means in
such a context. Certainly the integral approximations could be performed more rigorously
and accurately. The broad outlines of the behavior of p{v,w} are captured in (cid:101)Λ, Λ0, and
Λ1, however. Finally, using only local evidence constitutes a rather radical pruning of the
information in G. However, it is because of this pruning that the approximation (3.31) can
be implemented so efficiently.
4 Community Detection: Results
Direct visualizations like Figure 1 are impractical for larger networks. It can be useful to
use the blue edges in Figure 1 (those with p{v,w} above a certain threshold) in place of a
14
Figure 2: Visualization of p{v,w} matrix for the Enron email network
graph's edges in network algorithms (such as graph layout): this is discussed in Section 4.3.
However, a more direct use of the co-membership matrix p{v,w} for network visualization is
simply to plot the matrix itself with the values of p{v,w} ∈ [0, 1] as intensities [61, 62]. An
example of this is shown in Figure 2, using the approximation (3.31), for the Enron email
communication network, which has 36,692 nodes and 367,662 edges [48]. The insets depict
the hierarchical organization of community structure in networks [12, 44]: communities with
various structures exist at all scales. Although the model H(n, m, pI, pO) does not account
for hierarchical structure, a benefit of integrating over the number of communities m (rather
than estimating it) is that this accounts for co-membership at different scales.
4.1 Accuracy
One may rightly question whether the approximation p{v,w} is accurate, given the modeling
assumptions and approximations that it is based on. To address this, we observe that the
values of p{v,w} may be used to define a certain family expected utility functions (parameter-
ized by a threshold probability θ: cf. (A.14) in Appendix A), and optimizing this expected
utility yields a traditional community detection algorithm. Because a great many community
detection algorithms have been developed, one can assess the quality of the approximation
p{v,w} ≈ p{v,w} by comparing the performance of the resulting community detection algorithm
to those in the literature.
The most comprehensive comparison to date is based on the LFR benchmark graphs
which have power-law distributions both on degree and on community size [43]. The conclu-
sion is that all algorithms prior to 2008 were eclipsed by a set of three more recent algorithms:
the Louvain algorithm [8], the Ronhovde -- Nussinov (RN) algorithm [63], and Infomap [64].
Infomap performed somewhat better than RN, and both somewhat better than Louvain, but
all three were much better than the previous generation. Figure 3 compares our algorithm
to the Infomap, RN, and Louvain algorithms, and to the other algorithms tested in [43].
(This figure is a correction of Figure 3 from [27]. Also, the Simulated Annealing method
15
(a) 1000 nodes, small communities
(b) 1000 nodes, large communities
(c) 5000 nodes, small communities
(d) 5000 nodes, large communities
Figure 3: Comparison of community detection algorithms:
(cid:78): Louvain; - - - : Other methods.
•: Uopt; (cid:7): Infomap; (cid:4) : RN;
which works so well in panel (b) is highlighted (purple with shorter dashes) in all panels for
comparison.) Our method is labeled Uopt because numerical optimization over all θ ∈ [0, 1]
has been used to set θ to the value that maximizes NMI. Both the 1000- and 5000-node cases
are shown, for small communities (10 to 50 nodes) and large ones (20 to 100). The x-axis
is the mixing parameter µ -- the fraction of a node's neighbors outside its community (not
the expected edge probability µ of (3.12)) -- and the y-axis is a particular version (cf. the
appendix of [44]) of the Normalized Mutual Information (NMI) between the computed and
the true partition. In all cases, our method Uopt exhibits the performance characteristic of
the three state-of-the-art methods cited by [43]. The Uopt method has an unfair advantage
in optimizing over all θ: in a deployable algorithm one would need a method for setting θ.
On the other hand, the purpose of Figure 3 is simply to show that the p{v,w} computation
retains enough information about community structure to reconstruct high-quality hard-call
solutions. From this perspective, it is surprising that it does so well, because Uopt is based
on (a) the simple utility function of Appendix A, (b) an approximation p{v,w} to p{v,w} based
only on limited evidence, and (c) an approximation p{v,w} to p{v,w} based on a heuristic
evalution of the required integral.
16
0.10.20.30.40.50.60.70.800.20.40.60.81ΜNMI0.10.20.30.40.50.60.70.800.20.40.60.81ΜNMI0.10.20.30.40.50.60.70.800.20.40.60.81ΜNMI0.10.20.30.40.50.60.70.800.20.40.60.81ΜNMI4.2 Efficiency
The algorithm for computing the p{v,w} begins with pre-computing the value of n2 for all
pairs of nodes for which n2 > 0, then creating a cache of p{v,w} values for triples (κvw, n1, n2).
For any node pair {v, w}, the value of p{v,w} can be computed by first looking up its value
of n2, computing n0 and n1 from n and the degrees of v and w, then looking up the p{v,w}
value for its triple (κvw, n1, n2). Occasionally the value for this triple must be computed
from (3.31) and cached, but the number of such distinct triples is relatively small in practice.
An optional additional step one can perform is to loop over all node pairs with non-zero n2 in
order to both fill in the value of p{v,w} for each triple (κvw, n1, n2), and count the number of
times each triple occurs. (Because only the {v, w} pairs with n2 > 0 are looped over, some
additional bookkeeping is needed to fill in and provide a count for the (κvw, n1, 0) triples
without actually iterating over all O(n2) node pairs.) These values and counts are useful for
the statistical analysis of the p{v,w} distribution.
We tested the algorithm on five different Facebook networks (gathered from various uni-
versities) [74], and networks generated from Slashdot [49], Amazon [47], LiveJournal [49],
and connections between .edu domains (Wb-edu) [19]. Table 1 shows various relevant net-
work statistics. The sum of the values n2 for each node pair is the number of calculations
needed to compute the n2 data structure, whereas the number of values of n2 > 0 reflects its
size. The next column is the number of distinct (κvw, n1, n2) triples -- this is the number of
distinct p{v,w} values that must be computed, and the final one is the number of communities
that a randomly chosen instance of the algorithm Infomap [64] found for the dataset. For
the last two rows the n2 data structure was too large to hold in memory, and the second
step of counting the triples was not performed, nor could Infomap be run successfully on our
desktop.
(cid:80) n2
Dataset
Nodes
Edges
#(n2 > 0)
Triples Groups
Caltech
Princeton
Georgetown
Oklahoma
UNC
Slashdot
Amazon
769
6,596
9,414
17,425
18,163
82,168
262,111
16,656
293,320
425,638
892,528
766,800
504,230
899,792
1,231,412
46,139,701
67,751,053
186,722
8,776,074
14,120
83,004
15,616,610
113,722
194,235,901
47,202,925
239,162
140,796,299
47,576,619
191,482
19
51
90
233
167
74,983,589
49,450,449
104,330
5,209
9,120,350
6,434,638
7,178
12,851
LiveJournal
4,847,571
42,851,237
7,269,503,753
4,193,393,006
Wb-edu
9,450,404
46,236,105
12,203,737,639
4,232,928,806
Table 1: Network datasets
Table 2 contains timing results based on a Dell desktop with 8GB of RAM, and eight
2.5GHz processors. The first column is the number of seconds it took the version of Infomap
described in [64] to run. This code is in C++, runs single-threaded, includes a small amount
of overhead for reading the network, and uses the Infomap default setting of picking the best
result from ten individual Infomap trial partitions. The next four columns compare methods
17
of using our Java code to compute n2. The first two are single-threaded, and the other two
use all eight cores. The columns labeled n2 → ∅ are the timing for the computation only:
results are nulled out immediately after computing them. These columns are included for
two reasons. First, they show that the computation itself displays good parallelization: the
speedup is generally higher than 6.5 for eight processors. Second, the computation itself
for the two larger datasets is quite fast (just under three minutes on eight cores), but the
algorithm is currently designed only to maintain all results in RAM, and these datasets are
too large for this. The last two columns are the timing results for explicitly filling in the
p{v,w} information ahead of time and providing the counts required for statistical analysis.
As Infomap is one of the fastest community detection algorithms available, these results
are quite impressive. Comparing the first two columns of timing data, we find the speed-up
ranges up to 107 and 862 times as fast as Infomap for the two largest networks on which we
ran Infomap, respectively. The relative performance falls off rapidly for denser networks, but
even in these cases or method performed roughly 10 times as fast as Infomap (i.e., as fast
as an individual Infomap run). Computing the counts for p{v,w} statistics increases the run
time, but only by a constant factor (of 2 to 3). It must be emphasized that the timing results
are for producing a very different kind of output than Infomap does. However, the usual
method for estimating p{v,w} [62] is many times slower than producing partitions, rather
than many times faster.
Infomap
10 trials
1.0
45.4
77.5
310.8
446.6
1553.4
2075.8
n2
1 proc
0.11
4.5
7.2
23.5
19.2
14.5
2.4
Dataset
Caltech
Princeton
Georgetown
Oklahoma
UNC
Slashdot
Amazon
LiveJournal
Wb-edu
n2
8 proc
0.02
0.67
1.2
4.2
3.6
3.0
0.59
n2 → ∅
1 proc
0.09
3.9
6.4
19.4
16.3
12.6
2.2
1246.2
1243.0
n2 → ∅ Count Count
8 proc
8 proc
0.02
0.03
0.70
0.55
1.2
0.93
2.8
4.6
4.0
2.5
3.6
1.9
0.44
0.69
172.9
174.6
1 proc
0.09
3.9
7.0
33.7
22.9
21.8
3.2
Table 2: Timing results (in seconds)
4.3 Uses
Visualizing the p{v,w} matrix provides insight into the hierarchical community structure of a
network [62]. To do so requires an appropriate ordering on the nodes: one that places nodes
nearby when they are in the same small community, and small communities nearby when
they are in the same larger community. Therefore, it is useful to have a dendrogram of hierar-
chical community clustering. There are standard routines for producing such dendrograms,
provided one has a distance metric between points [36]. The community non-co-membership
probabilities p{v}{w} = 1 − p{v,w} may be used for this purpose. They satisfy the triangle
18
(a) Dendrogram for node ordering
(b) p{v,w} matrix
Figure 4: Visualization of community structure for Princeton Facebook network
inequality p{v}{w} ≤ p{v}{x} + p{w}{x} (although distinct nodes have distance 0 between them
if they are known to be in the same community). The approximation (3.31) does not obey
this triangle inequality, however, and [26] indicates that this can cause problems in certain
contexts. An approximation of p{v,w} which does obey it is a topic for future research. In
the meantime, we will rely on this version, which tends to obey it for most node triples.
To order the nodes of a graph we use this (approximate) distance metric p{v}{w} with a
hierarchical clustering scheme that defines cluster distance as the average distance between
nodes. The output of this is a binary tree (ties having been broken arbitrarily), so the order
of the clusters at each branch point must still be determined. This is done by starting at
the root of the tree and testing which ordering at each branch point yields a smaller average
distance to its neighboring clusters on the right and left. Figure 4 shows the resulting
dendrogram for the Princeton Facebook network (cf. Table 1), and the corresponding p{v,w}
matrix. (This method was used to generate the ordering in Figure 2 as well.)
Visualizations like Figure 4 are useful for network analysis. We have combined them other
visualizations in the code IGNITE (Inter-Group Network Inference and Tracking Engine).
Figure 5 uses IGNITE to the Georgetown Facebook network (cf. Table 1). The dendrogram
on which the ordering for the p{v,w} matrix is based is shown in the upper left panel. Two
levels in this dendrogram have been selected: the lower level is used to coarse-grain the
network by merging communities of nodes together into meta-nodes; the upper level is used
to determine which sets of meta-nodes to consider communities. The selection of these levels
is reflected in the p{v,w} matrix panel below. The meta-nodes are indicated by translucent
green squares, and communities of nodes are outlined in different colors (corresponding to
similar outlines in the dendrogram). The meta-nodes and communities are then displayed in
panels on the right: the upper panel corresponding to a coarse-grained version of the original
network; the lower, to a variant where the edges have been replaced with averaged p{v,w}
values between meta-nodes. The sizes of the meta-nodes indicates how many true nodes they
contain. In the lower right panel, blue lines indicate average p{v,w} above a certain threshold,
and red below another (much lower) threshold, as in Figure 1.
19
Figure 5: Screen shot of IGNITE network probability visualization tool for Georgetown
Facebook network
5 Community Tracking: Exact Equations
The study of dynamic networks is much less developed than its static counterpart. There is
substantial work on processes evolving on networks. For example, see [18] for a discussion of
the complex dynamical systems which arise in economics and traffic engineering, along with
mathematically rigorous results about their equilibria. Diffusion equations on networks have
particularly elegant properties. They are governed by the Laplacian matrix of a graph, the
discrete analog of continuum Laplacian operator, and are therefore an important topic in
spectral graph theory [54]. These may be generalized to reaction -- diffusion equations and used
to model the spread of disease [13], but the more common model in network epidemiology
is the SIR model [42]. Such models have been extended to model the spread of rumors [3],
obesity [11], and innovations [75].
The term "dynamic networks" implies that the networks themselves are evolving in time,
however. Stokman and Doreian edited several influential special editions of the Journal of
Mathematical Sociology on network evolution, the first of which was in 1996 and published
in book form as [21]. This work illustrated how macroscopic behavior of network evolution
arises from local governing laws. Snijders emphasizes [68] the benefits of casting the dy-
namic network problem in the continuous-time, Markov process framework first proposed by
Leenders [46]. In particular, there is a small body of literature on communities evolving in
dynamic networks. Much of this work is summarized in 3 1/2 pages of Fortunato's 100-page
review of group finding [28]. The field begins with the 2004 work of Hopcroft et al. [35],
which studied the persistence of robust communities in the NEC CiteSeer database. The
most prominent publication is the 2007 work of Palla et al. [59], which analyzed the evo-
lution of overlapping groups in cell phone and co-authorship data and presented a method
for tracking communities based on the clique percolation method used in CFinder [60]. The
20
various researchers in the community have come to agree on the key fundamental events
of community evolution: birth/death, expansion/contraction, and merging/splitting [31].
Berger-Wolf and colleagues propose an optimality criterion for assigning time-evolving com-
munity structure to a sequence of network snapshots, prove that it is NP-hard to find the
optimal structure, and develop various approximation techniques [73, 72, 71].
Most of the work on community tracking considers discrete network snapshots and at-
tempts to match up the community structure at different time steps. From the perspective
of the data fusion community, such an approach to tracking may seem ad hoc: one could
argue that (a) the "matching up" criteria are necessarily heuristic, and (b) one gets only a
single best solution with no indication of the uncertainty. In contrast, the tracking work in
data fusion is based on formal evolution and measurement models for the full probability
distribution over some state space, followed by principled approximations [39]. A sensible
response to this critique, however, is that the state space in the community tracking problem
is so much larger that data-fusion-style tracking techniques do not apply. The truth is per-
haps somewhere in between: it is, in fact, possible to derive a formal Bayesian filter for the
community tracking problem and to produce tractable approximations to it. Indeed, this is
the topic of the remainder of this paper. On the other hand, the filter derived is more a proof
of concept than an algorithm ready to supplant the more informal methods. It may be that
the formal approach we present here can be developed into a true, practical "Kalman filter
for networks." On the other hand, it may be that concerns about uncertainty management
can be addressed without appeal to a formal model. For example, Rosvall and Bergstrom
have devised a re-sampling technique to estimate the degree to which the data support the
various assignments of nodes to time-evolving communities [65]. Similarly, the work of Fenn
et al. tracks the evolution of groups by gathering evidence that each node belongs to one of
a number of known groups [23], thus providing output similar to one version of the method
outlined below.
We model community and graph evolution as a continuous-time Markov process [16],
{(Φt, Kt) : t ≥ 0}, the continuous-time analog of a Markov chain. The continuous-time
approach is more general (in that it can always be sampled at discrete times to produce
a Markov chain) and is simpler to work with due to the sparsity of the matrices involved.
We will not explicitly indicate any dependence on structural parameters (cid:126)µ, because we
will not integrate these out as was done in the static case.
In this section we will use
= {Kt(cid:48) : 0 ≤ t(cid:48) ≤ t} to denote the time-history of the network process up through time
.
K[0,t]
= {Kt(cid:48) : 0 ≤ t(cid:48) < t} for the history not including the current time t (with similar
.
t, and K[0,t)
definitions for Φ[0,t] and Φ[0,t)). The purpose of this section is to derive a Bayesian filter
Pr(ΦtK[0,t]):
i.e., assuming some initial distribution Pr(Φ0) is given, Section 5.1 derives
the expressions for evolving the distribution of the community structure to time t, given
all network evidence up through time t.
In the community detection case, the next step
was to approximate marginals of the full distribution using limited graph evidence. In the
tracking case, however, it is possible to obtain exact formulas for the marginals: this is done
in Section 5.2. These formulas, though exact, are not closed, however: the approximations
required to close them are discussed in Section 6.
21
Figure 6: An instance of H(12, 3, 0.5, 16, 4, 2, 18)
5.1 Evolution of the full distribution
A dynamic stochastic blockmodel H(n, A, B) may be defined analogously to the static version
H(n, p, Q) introduced in Section 2.1. Whereas H(n, p, Q) defines a pair of random variables
Φ and K, H(n, A, B) defines a pair of stochastic processes {Φt : t ≥ 0} and {Kt : t ≥ 0}. The
joint process {(Φt, Kt) : t ≥ 0} will be modeled as a continuous-time Markov process. The
parameter A is an m×m matrix, and B is a collection of r×r matrices Bij for 1 ≤ i ≤ j ≤ m
(and for convenience we define Bji = Bij for j > i). Just as p and the qij were required to
be stochastic vectors (i.e., vectors with non-negative entries that sum to one) in Section 2.1,
so the matrices A and Bij are required to be transition rate matrices: i.e., they must have
non-negative off-diagonal entries, and their columns must sum to zero. The entry aij of A
defines the transition rate of a node in group j switching to group i: i.e., the probability of
a node in group j being in group i after an infinitesimal time ∆t is δij + aij ∆t + O((∆t)2).
Similarly, the entry bij,kl of Bij defines the rate that an edge connecting nodes in groups i
and j transitions from edge type l to type k.
We may define a dynamic planted partition model H(n, m, a, λI, µI, λO, µO) as a special
case of H(n, A, B). As in Section 2.2, this cases is obtained by requiring that A and B be
invariant under permutations of [m] and using only r = 2 edge types ("off" (k = 0) and
"on" (k = 1)). In this case, the transition rate matrix A reduces to a single rate a at which
nodes jump between communities, while the collection B of transition rate matrices reduces
to four rate parameters: λI, the rate at which edges turn on for pairs of nodes in the same
community; µI, the rate at which edges turn off for pairs of nodes in the same community;
and λO and µO, the corresponding rates for pairs of nodes in different communities. Figure 6
depicts and instance of this model with n = 12 nodes and m = 3 communities with rate
parameters a = 0.5, λI = 16, µI = 4, λO = 2, and µO = 18 for t = 0 to 5.
If two independent random variables X and Y have respective probabilities xi and yj for
their various outcomes i and j, then the joint random variable Z = (X, Y ) has outcomes
indexed by (i, j) with probabilities z(i,j) = xiyj. The analog of this for Markov processes
is expressed by the Kronecker sum [58]. I.e., Suppose two independent Markov processes
{X(t) : t ≥ 0} and {Y (t) : t ≥ 0} have respective probabilities xi(t) and yj(t) for their
various outcomes i and j at time t, and that these probabilities are governed by x = Ax and
y = By, respectively (where x(t) collects all the xi(t), and y(t), the yj(t)). Then the joint
Markov process {Z(t) : t ≥ 0}, where Z(t) = (X(t), Y (t)), has outcomes indexed by (i, j)
with probabilities z(i,j) that are governed by z = (A ⊕ B)z (where z(t) collects all the z(i,j)).
22
The Kronecker sum A ⊕ B is defined by
(A ⊕ B)(i,j),(i(cid:48),j(cid:48))
.
= aii(cid:48)δjj(cid:48) + δii(cid:48)bjj(cid:48).
(5.1)
The interpretation of this is that in an infinitesimal time the Markov process Xt may tran-
sition from i to another state i(cid:48), or Yt may transition from j to j(cid:48), but for both to change
simultaneously is infinitely less likely than for only one to change.
The derivation of the Bayesian filter for Pr(ΦtK[0,t]) follows the same six steps as the
static derivation in Section 2.1. Indeed, the purpose of including the six-step derivation in
Section 2.1 was to make the following derivation easier to follow by analogy.
Step 1. Let pv(t) ∈ Rm denote the vector of probabilities pv
community i at time t: i.e., pv
transition rate matrix A. Therefore
i (t) that a single node v is in
.
= Pr(Φt(v) = i). These probabilities are governed by the
i (t)
dpv
dt
= Apv, which has the solution pv(t(cid:48)) = eA(t(cid:48)−t)pv(t).
(5.2)
Step 2. Let P ∈ Rmn denote the vector of probabilities Pφ(t) that the communities of all n
nodes are specified by the assignment φ at time t: i.e., Pφ(t)
.
= Pr(Φt = φ). The transition
rate matrix for this joint process on all nodes is the Kronecker sum of the (identical) transition
rate matrices for each node:
dP
dt
= AP, where A =
n(cid:77)
v=1
A.
(5.3)
The components Aφ(cid:48)φ of A may be expressed as
n(cid:88)
Aφ(cid:48)φ =
aφ(v)φ(v),
v=1
aφ(cid:48)(v∗)φ(v∗),
0,
if φ(cid:48) = φ,
if φ(cid:48)(v) = φ(v) for all v (cid:54)= v∗,
otherwise.
(5.4)
Step 3. Let qe(t) ∈ RN (where N = n(n − 1)/2) denote the vector of probabilities qe
k(t)
that a single edge e has type k at time t given the current communities of its endpoints: i.e.,
= Pr(Kt(e) = kΦt(v), Φt(w)). These probabilities are governed by the transition rate
.
qe
k(t)
matrix Bij, where i = φt(v) and j = φt(w) are the current communities of v and w:
dqe
dt
= Bφt(v)φt(w)qe.
(5.5)
The matrix Bφt(v)φt(w) is piecewise constant in time, so the solution to (5.5) is a (continuous)
piecewise exponential function.
Step 4. Let Q ∈ RrN denote the vector of probabilities Qκ(t) that the graph is κ at time t
given the current communities of all nodes: i.e., Qκ(t)
= Pr(Kt = κΦt). The transition rate
.
23
matrix for this joint process on all edges is the Kronecker sum of the transition rate matrices
for each edge:
Bφ(e1)φ(e2).
(5.6)
(cid:77)
e∈[n]{2}
The components Bφ,κ(cid:48)κ of Bφ may be expressed as
= BφtQ, where Bφ =
(cid:88)
bφ(e1)φ(e2),κ(e)κ(e),
dQ
dt
e∈[n]{2}
bφ(e∗
0,
Bφ,κ(cid:48)κ =
1)φ(e∗
2),κ(cid:48)(e∗)κ(e∗),
if κ(cid:48) = κ,
if κ(cid:48)(e) = κ(e) for all e (cid:54)= e∗,
otherwise.
(5.7)
Step 5. Let R ∈ RmnrN denote the vector of probabilities R(φ,κ) that the community
.
assignment is φ and the graph is κ at time t:
= Pr(Φt = φ, Kt = κ). The
transition rate matrix for this process is not quite a Kronecker sum due to the dependence
of Bφ on φ -- it loses the various nice properties that Kronecker sums have, but the formula
is quite similar:
i.e., R(φ,κ)(t)
dR
dt
= CR, where C(φ(cid:48),κ(cid:48))(φ,κ) = Aφ(cid:48)φδκ(cid:48)κ + δφ(cid:48)φBφ,κ(cid:48)κ.
(5.8)
A Bayesian filter has a prediction step (which applies while the graph data remains constant)
and an update step (which applies when the graph data changes). Therefore, we need to
decompose (5.8) into a component which is zero while the graph is constant and a component
which is zero when the graph changes. The required decomposition uses slightly modified
matrices A(cid:48)
κ and B(cid:48)
φ:
C(φ(cid:48),κ(cid:48))(φ,κ) = A(cid:48)
κ,φ(cid:48)φδκ(cid:48)κ + δφ(cid:48)φB(cid:48)
A(cid:48)
κ,φ(cid:48)φ = Aφ(cid:48)φ + δφ(cid:48)φBφ,κκ,
κ,φ(cid:48)φ of A(cid:48)
The components A(cid:48)
κ may be expressed as
φ,κ(cid:48)κ, where
and B(cid:48)
φ,κ(cid:48)κ = Bφ,κ(cid:48)κ − δκ(cid:48)κBφ,κκ.
(5.9)
(5.10)
(5.11)
(5.12)
A(cid:48)
κ,φ(cid:48)φ =
(cid:88)
e∈[n]{2}
n(cid:88)
aφ(v)φ(v) +
v=1
aφ(cid:48)(v∗)φ(v∗),
0,
(cid:40)
φ,κ(cid:48)κ of B(cid:48)
B(cid:48)
φ,κ(cid:48)κ =
bφ(e∗
0,
The components B(cid:48)
φ may be expressed as
1)φ(e∗
2),κ(cid:48)(e∗)κ(e∗),
if κ(cid:48)(e) = κ(e) for all e (cid:54)= e∗,
otherwise.
bφ(e1)φ(e2),κ(e)κ(e),
if φ(cid:48) = φ,
if φ(cid:48)(v) = φ(v) for all v (cid:54)= v∗,
otherwise.
Step 6. The prediction and update steps of the Bayesian filter are now determined by the
matrices A(cid:48) and B(cid:48). For the prediction step, suppose that the graph data through time t0
24
is κ[0,t0] and let κ = κt0 be a concise notation for the graph at time t0. From a previous
step of the filter (or from an initialization) we are given the distribution on the community
assignments Pr(Φt0K[0,t0] = κ[0,t0]). Starting with this distribution on φ at time t0, let
Rκ(t) ∈ Rmn (for all t ≥ t0) be a vector whose φ component is the probability that (a) the
graph remains κ during the time interval [t0, t), and (b) the community assignment is φ at
time t. The initial value of Rκ is then Rκ(t0) = Pr(Φt0K[0,t0] = κ[0,t0]). Its evolution law is
given by
dRκ
dt
= A(cid:48)
κRκ.
Note that A(cid:48)
κ is not a transition rate matrix: it allows probability to leak out of the vector
Rκ(t) so that its sum does not remain 1, but rather equals the probability Pr(K[t0,t) =
κK[0,t0] = κ[0,t0]). Normalizing Rκ(t), however, gives us the probability distribution of φ
given that the graph has remained κ during the time interval [t0, t):
Pr(cid:0)Φt = φK[0,t) = κ[0,t)
(cid:1) ∝(cid:0)Rκ(t)(cid:1)
φ.
(5.13)
(5.14)
This, then, is the prediction step of the Bayesian filter. The update step is obtained from
B(cid:48): given that the community assignment is φ, the probability of a single edge e = {v, w}
transitioning from type k = κt−(e) to type k(cid:48) = κt(e) in some infinitesimal time period ∆t is
given by (5.12) as bφ(v)φ(w),k(cid:48)k∆t. The conditional probabilities of the posterior distribution
on φ given this single edge transition are proportional to this. Therefore
Pr(cid:0)Φt = φK[0,t] = κ[0,t]
(cid:1) ∝ bφ(v)φ(w),k(cid:48)kPr(cid:0)Φt− = φK[0,t) = κ[0,t)
(cid:1).
(5.15)
This equation holds only for a single edge transitioning. When multiple edges transition at
exactly the same time, the correct update procedure would be to average, over all possible
orderings of the edge transitions, the result of applying (5.15) successively to each transition.
Figure 7 shows the exact evolution for the very simple, dynamic planted partition case
H(3, 2, 1, 3, 1, 1, 3). Here there are n = 3 nodes and m = 2 communities, so only four possible
partitions of the nodes (all in one community, or one of the three nodes by itself). Each
partition corresponds to two community assignments φ (of equal probability), and we plot
the probability Pr(Φt = φK[0,t] = κ[0,t]) for assignments from each of these four partitions.
The graph data is shown in top row of the figure: the graph is initially empty, then an edge
turns on, then another, and then an edge turns off. We observe that while the graph is some
constant κ the probabilities decay exponentially toward a steady state vector (the null vector
of A(cid:48)
κ). When the graph changes, the probability of each community assignment hypothesis
φ jumps, then begins decaying toward a new steady state. The bottom row of Figure 7 shows
the ground truth time-history φt of community assignments which were used to generate the
graph data, and the yellow highlighting in the figure indicates which community assignment
hypothesis is the true one. Further details may be found in [24].
5.2 Marginalization
Using notation similar to that in Section 3.1, let pv
i (t)
probability that node v is in community i at time t, pvw
κ[0,t]), and so on. Note that the same notation pv
= Pr(Φt(v) = iK[0,t] = κ[0,t]) be the
.
= Pr(Φt(v) = i, Φt(w) = jK[0,t] =
.
i (t) was used in Step 1 of the derivation in
ij (t)
25
Figure 7: Temporal evolution of the probabilities of all community assignments φ for
H(3, 2, 1, 3, 1, 1, 3)
i (t−)
the previous section to denote a prior probability, but henceforth it will indicate a quantity
conditioned on the graph data K[0, t]. To indicate conditioning on K[0, t) we will use the
= Pr(Φt(v) = iK[0,t) = κ[0,t)). The prediction and update equations
notation t−: e.g., pv
.
for the full probability distribution are linear (up to a constant factor), so we can sum them
over the groups of all nodes aside from v to obtain an expression for pv
i (t). When we apply
this marginalization to (5.13), we get a quantity pv
i (t) (note that this
.
use of the notation pv
= κt be a concise notation
for the graph at time t. The marginalization of (5.13) is then
i differs from that of Section 3.1). We let κ
i (t) proportional to pv
pv
i =
aiι pv
ι +
bij,κ({v,w})κ({v,w}) pvw
ij +
bjk,κ({w,x})κ({w,x}) pvwx
ijk .
(5.16)
m(cid:88)
ι=1
(cid:88)
m(cid:88)
w∈[n]
w(cid:54)=v
j=1
(cid:88)
m(cid:88)
m(cid:88)
{w,x}⊆[n]
w,x(cid:54)=v
j=1
k=1
i (t) from i = 1 to m is Pκ(t) for every v. Because pv
i (t) itself (albeit a nonlinear one) by expressing pv
i
i (t) from i = 1 to m equals 1 for every node v, so the
i (t)Sκ(t),
i (t)/Pκ(t) − pv
i (t) = pv
i (t) = pv
i (t)/Pκ(t). The sum of pv
We may convert this to an equation for pv
as pv
sum of pv
where Sκ(t)
m(cid:88)
i = − pv
pv
.
= Pκ(t)/Pκ(t), we have
m(cid:88)
(cid:88)
i Sκ+
aiιpv
ι +
bij,κ({v,w})κ({v,w})pvw
ij +
ι=1
w∈[n]
w(cid:54)=v
j=1
(cid:88)
{w,x}⊆[n]
w,x(cid:54)=v
m(cid:88)
m(cid:88)
j=1
k=1
bjk,κ({w,x})κ({w,x})pvwx
ijk .
(5.17)
Here Sκ may be expressed as
(cid:88)
m(cid:88)
m(cid:88)
i=1
j=1
bij,κ({v,w})κ({v,w})pvw
ij (t).
(5.18)
Sκ(t) =
{v,w}⊆[n]
We now marginalize the update equation (5.15) when the edge e transitions from type
i (t) that node v is in
l = κt−(e) to type l(cid:48) = κt(e). To get the updated probability pv
26
TimeProbability0.20.40.60.81.00.10.20.3Figure 8: First-order marginals for community membership
community i after the transition there are two cases: v ∈ e (say, e = {v, w}) and v /∈ e (say
e = {w, x}):
m(cid:88)
m(cid:88)
j=1
pv
i (t) =
1
Sl(cid:48)l(t−)
bij,l(cid:48)lpvw
ij (t−)
m(cid:88)
if e = {v, w},
bjk,l(cid:48)lpvwx
ijk (t−)
if e = {w, x}.
The normalization constant Sl(cid:48)l(t−) is independent of the node v:
j=1
k=1
m(cid:88)
m(cid:88)
Sl(cid:48)l(t−) =
bij,l(cid:48)lpe1e2
ij
(t−).
(5.19)
(5.20)
i=1
j=1
Whereas the Bayesian filter (5.14) and (5.15) specifies the exact evolution of probabilities
in an unmanageably large state space (mn elements), the marginalized filter (5.17) and (5.19)
involves only mn elements. It is still an exact filter -- no approximations have been made --
but it is not useful as it stands because it is not closed. The equations for the first-order
statistics pv
ijk . One could write down
equations for these, but they would involve still higher-order statistics, and so on. Instead, a
closure model is needed for the second- and third-order statistics in terms the pv
i . The topic
of closures is discussed in Section 6.
i involve second- and third-order statistics pvw
ij and pvwx
To verify (5.17) and (5.19), one can run the full filter (5.14) and (5.15) and use it to
compute the required second- and third-order statistics. The results of evolving pv
i (t) using
these oracular terms should then agree with those obtained by marginalizing the full solution
direction. Figure 8 shows the results of such a verification. A simulation of H(n, A, B) with
n = 12 nodes, m = 3 communities, and r = 4 edge types was used to generate graph data
κ[0,0.8] and ground-truth community assignment data φ[0,0.8]. The transition rate matrices A
and Bij used are given in [24]. The final frame (φ0.8, κ0.8) of this run is shown in Figure 8:
the centers of each disk correspond to the communities (green, yellow, or purple) which
27
φ0.8 assigns to each node; the colors of each edge (white, black, blue, or red) are given by
κ0.8. The same parameters A and B were then used in the Bayesian filter (5.14) and (5.15),
which required evolving a system of 312 ≈ 530, 000 quantities. The marginalized probabilities
pv
i (0.8) are depicted in the outer bands, so accuracy is indicated by the outer band largely
agreeing with the center.
In the case of the dynamic planted partition model H(n, m, a, λI, µI, λO, µO), the first-
order statistics are trivial: the prediction and update equations reduce to the observation that
the probability a node v is in some community equals 1. Instead, with some bookkeeping,
one can derive a Bayesian filter for the second-order statistics pvw
ij (t) and reduce these to
a filter for the co-membership probabilities p{v,w}(t): this is similar to what was done in
Section 3.2, although that was for an approximation based on limited graph evidence, and
this is exact. The filter for p{v,w} depends on third- and fourth-order statistics. There are
5 third-order statistics, which sum to 1, and we denote them p{v}{w}{x}, p{v}{w,x}, p{w}{v,x},
p{x}{v,w}, and p{v,w,x}. These correspond to the probabilities that v, w, and x are in different
communities, that two are in the same community with v, w, and x, respectively, being in
another, and that all three are in the same community. Similarly there are 15 fourth-order
statistics. The two that matter here are p{v,w,x,y} and p{v,w}{x,y}. The sum of these two is
the probability that v is in the same community as w and that x is in the same community
as y.
The prediction step of the Bayesian filter for p{v,w}(t) may be expressed as
− p{v,w}(cid:19)
(cid:18) 1
m
p{v,w} =
2am
m − 1
− γvwqvw
vw −
vw + γwxrwx
vw
The form of the update step for p{v,w} depends on whether the edge e that is flipping at time
t has 2, 1, or 0 nodes in common with {v, w}:
Rvw
x∈[n]
x(cid:54)=v,w
(cid:122)
(cid:125)(cid:124)
(cid:88)
(cid:0)γvxrvx
γvw
t− qvw
γwx
t− rwx
γxy
t− sxy
vw(t−)
vw (t−)
vw(t−)
(cid:123)
(cid:1)−
(cid:125)(cid:124)
(cid:123)(cid:88)
(cid:122)
Svw
γxysxy
vw .
{x,y}⊆[n]
x,y(cid:54)=v,w
(5.21)
if e = {v, w},
if e = {w, x},
if e = {x, y}.
(5.22)
p{v,w}(t) = p{v,w}(t−) +
1
δe1e2(t−)
The notation used in (5.21) and (5.22) is defined as follows. We define γvw
I,t to be the
transition rate for an edge to flip (i.e., turn on or off) between nodes v and w at time t
under the hypothesis that they are in the same community. This transition rate depends on
whether there is currently an edge between v and w. Therefore, γvw
I,t , and its counterpart
γvw
O,t for the hypothesis that v and w are in different communities, are given by
µO if {v, w} ∈ E(Gt),
λO if {v, w} ∈ E(Gt).
if {v, w} ∈ E(Gt),
if {v, w} ∈ E(Gt),
and γvw
O,t
(cid:40)
(cid:40)
(5.23)
µI
λI
γvw
I,t
.
=
.
=
The quantity γvw
between the flip rates under the two hypotheses:
t
, which plays an important role in (5.21) and (5.22), is the difference
γvw
t
.
= γvw
I,t − γvw
O,t.
28
(5.24)
Figure 9: Histograms of third- and fourth-order statistics
On the other hand, the normalization constant δvw(t) in (5.22) is the expected flip probability
given our current knowledge of the probabilities of the two hypotheses:
δvw(t)
.
= γvw
(5.25)
where p{v}{w} = 1−p{v,w} is the probability of v and w being in different communities. Finally,
the q, r, and s quantities represent modified second-, third-, and fourth-order statistics,
respectively:
I,t p{v,w}(t) + γvw
O,tp{v}{w}(t),
= p{v,w}p{v}{w},
.
= p{v,w,x} − p{v,w}p{v,x}, and
.
= p{v,w,x,y} + p{v,w}{x,y} − p{v,w}p{x,y}.
.
qvw
vw
rvx
vw
sxy
vw
(5.26)
(5.27)
(5.28)
The r and s quantities measure deviations from independence. That is, if the event Φt(v) =
Φt(w) (i.e., v and w are in the same group at time t) were independent of Φt(v) = Φt(x),
then the probability of both events occurring (i.e., Φt(v) = Φt(w) = Φt(x)) would equal
the product of their probabilities: that is, p{v,w,x} = p{v,w}p{v,x}, or rvx
vw = 0. Similarly,
if v and w being in the same community were independent of x and y being in the same
community (which seems more plausible), then we would have sxy
vw = 0. The terms Rvw
and Svw represent the accumulated effects on p{v,w} of the third- and fourth-order deviations
from independence, respectively. Understanding the role of these quantities is important for
developing an effective closure for this marginalized filter.
6 Community Tracking: Approximation
vw and sxy
To develop closures for the rvx
vw terms in (5.21) and (5.22) it helpful to know how
they behave statistically.
In this section we present a preliminary investigation of these
statistics and a possible closure for them using, as an example, the H(12, 3, 0.5, 16, 4, 2, 18)
case depicted in Figure 6. For this case we compute histograms for the Rvw and Svw terms
in (5.21). In each case, we compile separate histograms for the case of v and w being in
the same ground-truth community (case I) and in different communities (case O). The
histograms for the I and O cases of Rvw are shown in Figure 9. In the I case, we tend to
have Rvw < 0, which makes a positive contribution to p{v,w} in (5.21); whereas in the O
29
case the opposite occurs. Thus these third-order statistics make an important contribution
to the evolution of p{v,w}. On the other hand, Svw appears to be much less important. In
the I case, also shown in Figure 9, Svw is tightly and symmetrically clustered near 0. The
O case is similar. This makes sense intuitively: as mentioned at the end of Section 5.2, it
seems more plausible for v and w being in the same community to be independent of x and
y being in the same community than for v and w to be independent of v and x. Therefore,
we will make this independence assumption to obtain the fourth-order closure sxy
vw = 0. It
remains to develop a closure for rvx
vw.
The five third-order statistics must sum to one and be consistent with the second-order
statistics. This is expressed by the following four equations:
p{v}{w}{x} + p{v}{w,x} + p{w}{v,x} + p{x}{v,w} + p{v,w,x} = 1,
p{v}{w,x} + p{v,w,x} = p{w,x},
p{w}{v,x} + p{v,w,x} = p{v,x}, and
p{x}{v,w} + p{v,w,x} = p{v,w}.
(6.4)
This leaves one degree of freedom, which we choose p{v,w,x} to represent. The constraint that
the variables in (6.1) -- (6.4) are non-negative imposes the following bounds on p{v,w,x}:
(cid:0)p{w,x} + p{v,x} + p{v,w}(cid:1), and
= min(cid:0)p{w,x}, p{v,x}, p{v,w}(cid:1).
1
2
p− .
=
p+ .
(6.1)
(6.2)
(6.3)
(6.5)
(6.6)
For consistency, a closure for p{v,w,x} should satisfy p− ≤ p{v,w,x} ≤ p+. We will consider
closure models that select p{v,w,x} ∈ [p−, p+] as a function of p{w,x}, p{v,x}, and p{v,w}. Many
natural approximations (such as a symmetric version of p{v,w,x} ≈ p{v,w}p{v,x}) fail to satisfy
p− ≤ p{v,w,x} ≤ p+. The approximations p{v,w,x} ≈ p+ and p{v,w,x} ≈ p−
= max(p−, 0) have
.
poor properties. A least-squares solution is possible, but a better principle to employ is
maximum entropy [38].
0
When applying the maximum entropy principle, one needs a suitable underlying measure
space. In this discrete case, this simply means a set of atomic events which are equally likely
a priori. Such events arise naturally in this case: there are m3 of them with probabilities
equal to pvwx
ijk . In the absence of graph data, symmetry implies that their probabilities are
each m−3. Thus the entropy is defined as
In this symmetric case, the m3 values of pvwx
ijk
re-write (6.7) as
take only five distinct values, so we may
i=1
j=1
k=1
ijk log pvwx
pvwx
ijk .
(6.7)
H = − m(cid:88)
m(cid:88)
m(cid:88)
H = − p{v}{w}{x} log
− p{v}{w,x} log
− p{x}{v,w} log
− p{v,w,x} log
p{v}{w}{x}
(m)3
p{x}{v,w}
(m)2
p{v,w,x}
,
m
30
p{v}{w,x}
(m)2
− p{w}{v,x} log
p{w}{v,x}
(m)2
+
(6.8)
Figure 10: Third-order statistics: exact vs. closure
= m!/(m − r)! denotes the falling factorial. We may use (6.1) -- (6.4) to express
.
where (m)r
the other variables in terms of p{v,w,x}, then take the derivative of H with respect to p{v,w,x}.
This reduces to
(cid:0)p{w,x} − p{v,w,x}(cid:1)(cid:0)p{v,x} − p{v,w,x}(cid:1)(cid:0)p{v,w} − p{v,w,x}(cid:1)
(cid:33)
p{v,w,x}(cid:0)p{v,w,x} − p−(cid:1)2
(cid:32)
dH
dp{v,w,x} = log
(m − 2)2
4(m − 1)
.
(6.9)
0 < p+, the function in (6.9) is strictly decreasing from ∞ to −∞ on [p−
Provided p−
0 , p+], so
it has a unique zero within this interval, and this zero is where H attains its maximal value
on [p−
0 , p+]. Finding this zero involves solving a cubic equation, which yields the maximum
entropy closure for rvx
vw.
Figure 10 indicates how well this closure performed in the H(12, 3, 0.5, 16, 4, 2, 18) exam-
ple. The histograms show good agreement: each has values that are predominantly positive,
with a peak in the same place, and distributions of similar shapes, although the closure
distribution is a little more spread out. This suggests that using this closure for rvx
vw along
with the fourth-order closure sxy
vw is a promising idea. Unfortunately, this closure has nothing
built into it that ensures p{v,w} stays in the range [0, 1], and, indeed numerical simulations
that use it quickly produce probabilities outside this range.
To see why it fails, consider the consistency requirement p− ≤ p+ mentioned above. This
may be re-written
(cid:12)(cid:12)p{v}{x} − p{w}{x}(cid:12)(cid:12) ≤ p{v}{w} ≤ p{v}{x} + p{w}{x},
(6.10)
i.e., the probabilities p{v}{w} satisfy the triangle inequality. In particular, if p{v,w} = 1, then
p{v,x} = p{w,x} for all nodes x (cid:54)= v, w. This makes sense: if v and w are definitely in the same
community C, then both p{v,x} and p{w,x} mean "the probability that x ∈ C," so it would
be illogical for these values to differ. Furthermore, in the special case a = 0, if p{v,w} = 1 at
some time, then it will remain 1, which implies p{v,x} = p{w,x}. The direct verification of this
fact using (5.21) leads to an expression in which Svw = −Rvw (cid:54)= 0. In this case, the fourth-
order terms play a crucial role in maintaining consistency, so it is not surprising truncating
them entirely leads to inconsistencies. This is but one of the issues that must be addressed
before principled community tracking algorithms along these lines can be developed, but we
31
believe there is much promise in this approach of Bayesian filtering using formal evolution
and measurement models
7 Conclusion
Network science has benefited from the perspectives and expertise of a variety of scientific
communities. The data fusion approach has much to offer as well. It provides an integrated
framework for synthesizing high-level situational awareness from messy, real-world data. It
also develops tracking algorithms based on formal evolution models that maintain represen-
tations of the uncertainty of the ground-truth state. We have applied this perspective to the
community detection problem in network science. We began with a derivation of the poste-
rior probability distribution of community structure given some graph data: this is similar
to the approach of [33, 34]. However, rather than seeking the community structure that
maximizes this posterior probability, we developed approximations to the marginals of these
distributions. In particular, we consider the pairwise co-membership probability p{v,w}: the
probability that nodes v and w are in the same community. We develop an estimate of p{v,w}
based on using limited information from the graph G and approximating an integral over
the model's structural parameters. The resulting method is very fast, and, when exploited
to produce a single community detection result (via the utility formulation in Appendix A)
yields state-of-the-art accuracy. Various uses for these p{v,w} quantities are combined in the
network analysis and visualization product IGNITE.
We extended our community detection approach to tracking the evolution of time-varying
communities in time-varying graph data. We proposed dynamic analogs of the stochastic
blockmodel and planted partition models used in static community detection: these models
are continuous-time Markov processes for the joint evolution of the communities and the
graph. We derived a Bayesian filter for the current probability distribution over all com-
munity structures given the previous history of the graph data. This filter decomposes into
prediction steps (during periods of constant graph data) and update steps (at times when the
graph changes). The filter is over too large a state space to use directly, so we marginalized
it to get state spaces of a reasonable size. These marginalized equations require closures for
their higher-order terms, and we discussed one possible closure based on maximum entropy.
The community detection work could be extended to more realistic graph models, such
as the degree-corrected blockmodel of [41], and the integral approximation developed in Sec-
tion 3.2 could certainly be improved. There is much more work to do in the community
tracking case, however.
In the spectrum of methods that handle dynamic network data,
the models presented are intermediate between those that use the data only to discern a
static community structure (e.g., [67]) and those mentioned in Section 5 that allow not just
individual node movements, but the birth, death, splitting, and merging of communities.
Extending this methodology to account for these phenomena would be important for appli-
cations. Whatever model is used, some method for parameter selection must be developed.
Integrating over the parameter space may be too complicated in the community tracking
case, but one may be able to extend the Bayesian filter by making the input parameters
themselves hidden variables, and use Hidden Markov Model (HMM) techniques for param-
eter learning [4]. Closures must be developed, preferably with proofs of their properties,
32
rather than just experimental justification. Finally, to be truly useful, community tracking
need to be able to incorporate ancillary, non-network information about the properties of the
nodes and edges involved. Bayesian data fusion provides an excellent framework for coping
with this kind of practical problem by identifying what expert knowledge is needed to extend
the uncertainty management in a principled manner.
Acknowledgments
Research partially supported by ONR Contract N0001409C0563. The material presented
here draws on the conference papers [24, 26, 27]. The authors thank Andrea Lancichinetti
for the LFR benchmark data shown in Figure 3.
References
[1] E. Airoldi, D. M. Blei, S. E. Fienberg, A. Goldenberg, E. P. Xing, and A. X. Zheng (eds.),
Statistical network analysis: Models, issues, and new directions, Springer, 2007.
[2] Y. Bar-Shalom, P. K. Willett, and X. Tian, Tracking and data fusion: A handbook of algo-
rithms, Yaakov Bar-Shalom, 2011.
[3] W. F. Basener, B. P. Brooks, and D. Ross, Brouwer fixed point theorem applied to rumour
transmission, Applied Mathematics Letters 19 (2006), no. 8, 841 -- 842.
[4] L. E. Baum and T. Petrie, Statistical inference for probabilistic functions of finte state Markov
chains, Annals of Mathematical Statistics 37 (1966), 1554 -- 1563.
[5] J. O. Berger, Statistical decision theory and bayesian analysis, Springer, 1993.
[6] I. Bhattacharya and L. Getoor, Entity resolution in graphs, Mining Graph Data (D. J. Cook
and L. B. Holder, eds.), John Wiley & Sons, Inc., Hoboken, NJ, 2006.
[7] E. Blasch, I. Kadar, J. Salerno, M. M. Kokar, S. Das, G. M. Powell, D. D. Corkill, and
E. H. Ruspini, Issues and challenges in situation assessment (level 2 fusion), J. Advances
Information Fusion 1 (2006), no. 2, 122 -- 139.
[8] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre, Fast unfolding of communities
in large networks, J. Stat. Mech. (2008), P10008.
[9] B. Bollob´as, Modern graph theory, Springer, New York, 1998.
[10]
, Random graphs, Cambridge University Press, New York, 2001.
[11] N. A. Christakis and J. H. Fowler, The spread of obesity in a large social network over 32
years, New England Journal of Medicine 357 (2007), 370 -- 379.
[12] A. Clauset, C. Moore, and M. E. J. Newman, Hierarchical structure and the prediction of
missing links in networks, Nature 453 (2008), 98 -- 101.
[13] V. Colizza, R. Pastor-Satorras, and A. Vespignani, Reaction -- diffusion processes and metapop-
ulation models in heterogeneous networks, Nature Physics 3 (2007), 276 -- 282.
33
[14] A. Condon and R. M. Karp, Algorithms for graph partitioning on the planted partition model,
Random Structures and Algorithms 18 (2001), no. 2, 116 -- 140.
[15] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to algorithms, third
ed., MIT Press, 2009.
[16] D. R. Cox and H. D. Miller, The theory of stochastic processes, Chapman & Hall/CRC, 1965.
[17] D. F. Crouse, P. Willett, and Y. Bar-Shalom, Generalizations of Blom and Bloem's PDF
decomposition for permutation-invariant estimation, Proceedings of the IEEE International
Conference on Acoustics, Speech, and Signal Processing, ICASSP, 2011, pp. 3840 -- 3843.
[18] P. Daniele, Dynamic networks and evolutionary variational inequalities, Edward Elgar Pub-
lishing, 2006.
[19] T. A. Davis and Y. Hu, The University of Florida sparse matrix collection.
[20] P. Doreian, V. Batagelj, and A. Ferligoj, Generalized blockmodeling, Cambridge University
Press, New York, 2005.
[21] P. Doreian and F. N. Stokman (eds.), Evolution of social networks, Routledge, 1997.
[22] M. Feldmann, D. Franken, and W. Koch, Tracking of extended objects and group targets using
random matrices, IEEE Transactions on Signal Processing 59 (2011), no. 4, 1409 -- 1420.
[23] D. J. Fenn, M. A. Porter, M. McDonald, S. Williams, N. F. Johnson, and N. S. Jones, Dynamic
communities in multichannel data: An application to the foreign exchange market during the
2007 -- 2008 credit crisis, Chaos 19 (2009), 033119.
[24] J. P. Ferry, Group tracking on dynamic networks, Proc. 12th Int. Conf. on Information Fusion,
July 2009, pp. 930 -- 937.
[25]
, Exact association probability for data with bias and features, J. Advances Information
Fusion 5 (2010), no. 1, 41 -- 67.
[26] J. P. Ferry and J. O. Bumgarner, Tracking group co-membership on networks, Proc. 13th Int.
Conf. on Information Fusion, July 2010.
[27] J. P. Ferry, J. O. Bumgarner, and S. T. Ahearn, Probabilistic community detection in networks,
Proc. 14th Int. Conf. on Information Fusion, July 2011.
[28] S. Fortunato, Community detection in graphs, Physics Reports 486 (2010), no. 3 -- 5, 75 -- 174.
[29] L. C. Freeman, The development of social network analysis: A study in the sociology of science,
Empirical Press, 2004.
[30] L. Grady, Random walks for image segmentation, IEEE transactions on pattern analysis and
machine intelligence 28 (2006), no. 11, 1768 -- 1783.
[31] D. Greene, D. Doyle, and P. Cunningham, Tracking the evolution of communities in dynamic
social networks., ASONAM'10, 2010, pp. 176 -- 183.
[32] D. L. Hall, R. Nagi, J. Llinas, J. Lavery, and A. Shirkhodaie, Multidisciplinary research in
hard and soft information fusion, Proc. 13th Int. Conf. on Information Fusion, July 2010.
34
[33] M. B. Hastings, Community detection as an inference problem, Phys. Rev. E 74 (2006), no. 3,
035102.
[34] J. M. Hofman and C. H. Wiggins, A Bayesian approach to network modularity, Phys. Rev.
Lett. 100 (2008), 258701.
[35] J. Hopcroft, O. Khan, B. Kulis, and B. Selman, Tracking evolving communities in large linked
networks, Proc. Natl. Acad. Sci. USA 101 (2004), no. suppl. 1, 5249 -- 5253.
[36] A. Jain and R. Dubes, Algorithms for clustering data, Prentice Hall, 1988.
[37] S. Janson, T. (cid:32)Luczak, and A. Ruci´nski, Random graphs, John Wiley & Sons, New York, 2000.
[38] E. T. Jaynes, Probability theory: The logic of science (vol 1), Cambridge University Press,
2003.
[39] A. H. Jazwinski, Stochastic processes and filtering, Academic Press, 1970.
[40] R. E. Kalman, A new approach to linear filtering and prediction problems, Transactions of the
ASME -- Journal of Basic Engineering, Series D 82 (1960), 35 -- 45.
[41] B. Karrer and M. E. J. Newman, Stochastic blockmodels and community structure in networks,
Phys. Rev. E 83 (2011), no. 1, 016107.
[42] W. O. Kermack and A. G. McKendrick, A contribution to the mathematical theory of epi-
demics, Proc. Roy. Soc. Lond. A 115 (1927), 700 -- 721.
[43] A. Lancichinetti and S. Fortunato, Benchmarks for testing community detection algorithms on
directed and weighted graphs with overlapping communities, Phys. Rev. E 80 (2009), no. 1,
016118.
[44] A. Lancichinetti, S. Fortunato, and J. Kert´esz, Detecting the overlapping and hierarchical
community structure in complex networks, New Journal of Physics 11 (2009), 033015.
[45] A. Lancichinetti, M. Kivela, J. Saramaki, and S. Fortunato, Characterizing the community
structure of complex networks, PLoS One 5 (2010), no. 8, e11976.
[46] R. T. A. J. Leenders, Models for network dynamics: A markovian framework, Journal of
Mathematical Sociology 20 (1995), no. 1, 1 -- 21.
[47] J. Leskovec, L. Adamic, and B. Huberman, The dynamics of viral marketing, ACM Transac-
tions on the Web 1 (2007), no. 1, 5 -- es.
[48] J. Leskovec, J. Kleinberg, and C. Faloutsos, Graphs over time: Densification laws, shrink-
ing diameters and possible explanations, KDD '05: Proc. 11th ACM SIGKDD Int. Conf. on
Knowledge Discovery and Data Mining (KDD) (New York, NY), ACM Press, 2005.
[49] J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Mahoney, Community structure in large
networks: Natural cluster sizes and the absence of large well-defined clusters, Internet Mathe-
matics 6 (2009), no. 1, 29 -- 123.
[50] T. G. Lewis, Network science: Theory and applications, Wiley, 2009.
35
[51] M. E. Liggins, D. L. Hall, and J. Llinas (eds.), Handbook of multisensor data fusion, 2nd
edition ed., CRC Press, Boca Raton, FL, 2009.
[52] M. McPherson, L. Smith-Lovin, and J. M. Cook, Birds of a feather: Homophily in social
networks, Ann. Rev. Sociology 27 (2001), 415 -- 444.
[53] S. Mori and C.-Y. Chong, Track-to-track association metric -- i.i.d.-non-Poisson cases -- , Proc.
6th Int. Conf. on Information Fusion, July 2003.
[54] B. Nadler, S. Lafon, R. R. Coifman, and I. G. Kevrekidis, Diffusion maps, spectral clustering
and eigenfunctions of Fokker -- Planck operators, Advances in Neural Information Processing
Systems 18 (2005), 955 -- 962.
[55] M. E. J. Newman, Networks: An introduction, Oxford University Press, USA, 2010.
[56] M. E. J. Newman and M. Girvan, Finding and evaluating community structure in networks,
Phys. Rev. E 69 (2004), 026113.
[57] M. E. J. Newman and E. A. Leicht, Mixture models and exploratory analysis in networks, Proc.
Natl. Acad. Sci. USA 104 (2007), 9564 -- 9569.
[58] J. M. Ortega, Matrix theory: A second course, Springer, 1987.
[59] G. Palla, A.-L. Barab´asi, and T. Vicsek, Quantifying social group evolution, Nature 446 (2007),
664 -- 667.
[60] G. Palla, I. Der´enyi, I. Farkas, and T. Vicsek, Uncovering the overlapping community structure
of complex networks in nature and society, Nature 435 (2005), 814 -- 818.
[61] J. Reichardt and S. Bornholdt, Detecting fuzzy community structures in complex networks with
a Potts model, Phys. Rev. Lett. 93 (2004), 218701.
[62]
, Statistical mechanics of community detection, Phys. Rev. E 74 (2006), 016110.
[63] P. Ronhovde and Z. Nussinov, Multiresolution community detection for megascale networks by
information-based replica correlations, Phys. Rev. E 80 (2009), no. 1, 016109.
[64] M. Rosvall and C. T. Bergstrom, Maps of random walks on complex networks reveal community
structure, Proc. Natl. Acad. Sci. USA 105 (2008), no. 4, 1118 -- 1123.
[65]
[66]
, Mapping change in large networks, PLoS One 5 (2010), no. 1, e8694.
, Multilevel compression of random walks on networks reveals hierarchical organization
in large integrated systems, PLoS One 6 (2011), no. 4, e18209, arXiv:1010.0431v1.
[67] C. R. Shalizi, M. F. Camperi, and K. L. Klinkner, Discovering functional communities in
dynamical networks, in Airoldi et al. [1], pp. 140 -- 157.
[68] T. A. B. Snijders, G. G. van de Bunt, and C. E. G. Steglich, Introduction to stochastic actor-
based models for network dynamics, Social Networks 32 (2010), no. 1, 44 -- 60.
[69] A. N. Steinberg and C. L. Bowman, Revisions to the JDL data fusion model, in Liggins et al.
[51], pp. 45 -- 68.
36
[70] L. D. Stone, C. A. Barlow, and T. L. Corwin, Bayesian multiple target tracking, Artech House,
Inc., Norwood, MA, USA, 1999.
[71] R. Sulo, T. Berger-Wolf, , and R. Grossman, Meaningful selection of temporal resolution for
dynamic networks, Proc. 8th Workshop on Mining and Learning with Graphs (Washington,
DC), ACM Press, July 2010, pp. 127 -- 136.
[72] C. Tantipathananandh and T. Berger-Wolf, Constant-factor approximation algorithms for
identifying dynamic communities, Proc. 15th ACM SIGKDD international conference on
knowledge discovery and data mining (Paris, France), ACM Press, July 2009, pp. 827 -- 836.
[73] C. Tantipathananandh, T. Berger-Wolf, and D. Kempe, A framework for community identi-
fication in dynamic social networks, Proc. 13th ACM SIGKDD international conference on
knowledge discovery and data mining (San Jose, CA), ACM Press, August 2007, pp. 717 -- 726.
[74] A. L. Traud, E. D. Kelsic, P. J. Mucha, and M. A. Porter, Comparing community structure to
characteristics in online collegiate social networks, to appear in SIAM Review (2011).
[75] T. W. Valente, Social network thresholds in the diffusion of innovations, Social Networks 18
(1996), 69 -- 89.
[76] P. K. Varshney, Distributed detection and data fusion, Springer, 1996.
[77] S. Wasserman and K. Faust, Social network analysis, Cambridge University Press, 1994.
[78] N. Wiener, Extrapolation, interpolation, and smoothing of stationary time series, Wiley, 1949.
[79] W. W. Zachary, An information flow model for conflict and fission in small groups, J. Anthro-
pological Research 33 (1977), 445 -- 473.
A Expected Utility Formulation
Figure 11 depicts the data fusion approach this paper takes toward community detection
and tracking. Part (1) represents the model of the hidden state space in which we are
interested (in this case the community assignments φ or community partitions π), including
some prior probability distribution over it, and, in the dynamic case, an evolution model.
Part (2) represents observed data, and the red arrow from (1) to (2) is the measurement
model which assigns conditional probabilities of the data given the true state. Part (3) is
Bayesian inversion, which yields the conditional probabilities of the true state given the data.
When the number of possible states is large, the combinatorial explosion of part (3) must
be dealt with in some manner. Thus, part (4) is some reduced representation of the full
in this case the pairwise co-membership probabilities p{v,w}.
posterior distribution in (3):
Finally, part (5) represents the end user of this inference process. The full posterior could,
in principle, answer every question the end user might have about the true state, given the
limitation of the data available. The reduced representation (4) should be chosen in such a
way that it may be gleaned efficiently from (3), but also meet the needs of the end user (5).
The body of this paper addresses parts (1) -- (4) for the community detection and tracking
problems. This appendix connects that analysis to part (5). Bayesian decision theory [5]
provides a way to formalize the connection. Consider the problem of how to assess the quality
37
of some proposed (or computed) partition π. The usual approach is to stipulate some quality
function of π and the graph G. Bayesian decision theory argues for assessing the quality
of π in terms of its agreement with the true partition π. Thus, with the cooperation of
the end user in (5), we should construct a utility function U (ππ) which defines the value
of being provided the answer π when the true partition is π. Because the ground truth
partition π is unknown, we cannot compute U (ππ). However, if we know the posterior
distribution Pr(πG), we can compute the expected utility E[U ](πG). In general, summing
over all possible partitions π to get this expected utility is not practical, but we shall provide
a generic example in which the summation reduces to one over all pairs of nodes, with the set
of pairwise co-membership probabilities p{v,w} providing all necessary statistical information.
In this sense, the values of p{v,w} comprise the reduced representation in part (4) of Figure 11.
Let V = [n] denote the set of n nodes, and Π(V ) denote the set of all partitions of V . For
any particular π ∈ Π(V ), let U (ππ) denote the utility of the decision that π is the correct
partition when π is in fact correct. For any graph G on V , one may define the quality of π
for G to be the expected value of its utility:
E[U ](πG) =
U (ππ)Pr(πG),
(A.1)
where Pr(πG) is the posterior probability of π given G. To simplify (A.1), assume U (ππ)
is additive: i.e., that it can be expressed as
U (ππ) =
(cid:88)
u(π[ C])
(A.2)
for some function u, where π[ C] is the partition of C induced by π (that is, the sets into
which π "chops up" C). In this case, one can compute the expected utility of each community
C ∈ π given G,
E[U ]( CG) =
u(π[ C])Pr(πG),
(A.3)
and sum them over C ∈ π afterward to get E[U ](πG). Grouping the sum in (A.3) into
classes based on the value of π[ C] yields
E[U ]( CG) =
Pr(πG).
(cid:88)
(cid:88)
(A.4)
u(ρ)
(cid:88)
π∈Π(V )
C∈π
(cid:88)
π∈Π(V )
ρ∈Π( C)
π:π[ C]=ρ
Figure 11: Five-part inference framework
38
The inner sum in (A.4) is the probability of ρ given G, denoted Pr(ρG). By grouping the sum
in (A.3) less aggressively, however, one obtains a more general result which includes (A.3)
and (A.4) as special cases. For any C + ⊇ C,
E[U ]( CG) =
u(ρ+[ C])Pr(ρ+G).
ρ+∈Π( C+)
In particular, we let C + = C ∪ {v} and define
δ( C, v) = E[U ]( C +G) − E[U ]( CG) − E[U ]({v}G)
(A.5)
(A.6)
(cid:88)
(cid:88)
(cid:16)
to be the increase in expected utility of merging the community C with the singleton com-
munity {v}. Using (A.5), δ( C, v) may be expressed as
δ( C, v) =
u(ρ+) − u(ρ+[ C]) − u({{v}})
Pr(ρ+G).
(A.7)
ρ+∈Π( C+)
This equation allows the expected utility of a community to be computed by adding one
node at a time.
A.1 A generic utility model
(cid:17)
Here we consider a simple, generic utility function in which some node v has been identified
as "bad," implying that the nodes in his ground-truth community C = π(v) are bad as well,
but that decision makers are using some other partition π, resulting in all nodes in C = π(v)
ending up "dead." Let uBD and uBA be the respective utilities of a bad node being dead
and being alive, and uGD and uGA be the corresponding utilities for good nodes. Summing
the utilities over the cases v ∈ V being identified as bad yields the utility function
(cid:88)
(cid:88)
(cid:18) (cid:88)
U (ππ) =
1
2
U∗(ππ) =(uBD − uBA − uGD + uGA)
C ∩ C2+
(uBA − uGA)
C∈π, C∈π
C2 + (uGD − uGA)
C2 + uGAn2
(A.8)
(cid:88)
C∈π
after some rearrangement. Assuming uGA ≥ uGD and uBD ≥ uBA (and equality does not
hold for both), a convenient choice of translation and scaling yields
(cid:88)
C∈π
(cid:19)
C ∩ C2 − θ
C2 − (1 − θ)n
,
(A.9)
C∈π, C∈π
C∈π
where the threshold θ = (uGA− uGD)/(uGA− uGD + uBD − uBA) ∈ [0, 1] reflects the emphasis
of killing bad nodes (small θ, yielding large communities) versus not killing good nodes (large
θ, small communities). This utility function is additive:
it may be decomposed according
to (A.2) with
(cid:19)
C2 − θ C2 − (1 − θ) C
,
(A.10)
(cid:18) (cid:88)
C∈ρ
u(ρ) =
1
2
39
for any ρ ∈ Π( C). Note that u(ρ) = 0 for singleton partitions ρ = {{v}}.
Substituting into (A.10) into (A.7) yields
(cid:88)
(cid:16)ρ+(v) − 1 − θ C(cid:17)
δ( C, v) =
ρ+∈Π( C+)
Pr(ρ+G).
(A.11)
This may be written δ( C, v) = E[ρ+(v) − 1G] − θ C. The first term here is the expected
number of nodes in C that are in the same community as v in a random partition of C +,
given the evidence G. Linearity of expectation implies
E[ρ+(v) − 1G] =
p{v,w},
(A.12)
(cid:88)
w∈ C
where p{v,w} = Pr({{v, w}}G) is the probability that v and w lie in the same community,
given G. This may be used to build up E[U ]( CG) by adding nodes v to C one at a time,
which yields the simple formula
E[U ]( CG) =
(cid:88)
(cid:0)p{v,w} − θ(cid:1).
{v,w}⊆ C
Summing this over C yields an expression for the expected utility of a partition π given the
graph G which involves only sums over pairs of nodes in the same community C ∈ π:
(cid:88)
(cid:88)
(cid:0)p{v,w} − θ(cid:1).
E[U ](πG) =
(A.13)
(A.14)
C∈π
{v,w}⊆ C
40
|
1602.01258 | 2 | 1602 | 2016-06-27T09:28:00 | A network-based rating system and its resistance to bribery | [
"cs.SI",
"cs.GT"
] | We study a rating system in which a set of individuals (e.g., the customers of a restaurant) evaluate a given service (e.g, the restaurant), with their aggregated opinion determining the probability of all individuals to use the service and thus its generated revenue. We explicitly model the influence relation by a social network, with individuals being influenced by the evaluation of their trusted peers. On top of that we allow a malicious service provider (e.g., the restaurant owner) to bribe some individuals, i.e., to invest a part of his or her expected income to modify their opinion, therefore influencing his or her final gain. We analyse the effect of bribing strategies under various constraints, and we show under what conditions the system is bribery-proof, i.e., no bribing strategy yields a strictly positive expected gain to the service provider. | cs.SI | cs |
A network-based rating system
and its resistance to bribery
Umberto Grandi1 and Paolo Turrini2
1IRIT, University of Toulouse
2Department of Computing, Imperial College London
Abstract
We study a rating system in which a set of individuals (e.g., the customers
of a restaurant) evaluate a given service (e.g, the restaurant), with their aggregated
opinion determining the probability of all individuals to use the service and thus its
generated revenue. We explicitly model the influence relation by a social network,
with individuals being influenced by the evaluation of their trusted peers. On top
of that we allow a malicious service provider (e.g., the restaurant owner) to bribe
some individuals, i.e., to invest a part of his or her expected income to modify their
opinion, therefore influencing his or her final gain. We analyse the effect of bribing
strategies under various constraints, and we show under what conditions the system
is bribery-proof, i.e., no bribing strategy yields a strictly positive expected gain to
the service provider.
1 Introduction
Imagine to be the owner of a new and still relatively unknown restaurant. The quality
of food is not spectacular and the customers you have seen so far are only limited to a
tiny number of friends of yours. Your account on Tripadvisor R(cid:13) has received no review
and your financial prospects look grim at best. There is one easy solution to your
problems: you ask your friends to write an enthusiastic review for you, in exchange for
a free meal. After this, Tripadvisor R(cid:13) lists your restaurant as excellent and the number
of customers, together with your profit, suddenly florishes.
Systems such as Tripadvisor R(cid:13), where a small proportion of customers writes re-
views and influences a large number of potential customers, are not bribery-proof: each
restaurant owner - or the owner of whichever service - is able to offer a compensation
- monetary or not - in exchange for positive evaluation, having an impact on the whole
set of potential customers. Tripadvisor R(cid:13) is based on what we call "Objective Rating",
or -aig: individual evaluations are aggregated into a single figure, which is seen
by, and thus influences, every potential customer.
What we study in this paper is a system in which each individual only receives the
evaluation given by the set of trusted peers, his or her friends, and only this aggregated
1
opinion influences his or her decision. This is what we call "Personalised Rating", or
-aig, which can be seen a generalisation of -aig in which influence has a
complex network-structure. So, while in the case of -aig the restaurant owner
knows exactly how influence flows among the customers, this might not be the case
with -aig.
Our contribution We analyse the effect of bribing strategies in the case of -aig
and -aig under various constraints, depending on the presence of customers who
do not express any opinion and the knowledge of the network by the service provider:
the exact network is known, the network is known but not the customers' exact posi-
tion, the network is completely unknown. We show under what conditions the system is
bribery-proof, i.e., there is no bribe yielding a strictly positive expected gain to the ser-
vice provider, and we provide algorithms for the computation of (all) optimal bribing
strategies when they exist.
Intuitively, being able to know and bribe influential customers is crucial for guaran-
teeing a positive expected reward of a bribing strategy. However, while with large pop-
ulations of non-voters "random" bribes can still be profitable, the effect of -aig is
largely different from that of -aig and, as we show, the expected profit in the for-
mer can be severely limited and drops below zero in all networks, under certain (mild)
conditions on the cost of bribes.
Our study can be applied to all situations in which individuals influence one another
in the opinion they give and bribery can have a disruptive role in determining collective
decisions.
Related research lines Our approach relates to several research lines in artificial
intelligence, game theory and (computational) social choice Brandt et al. [2015].
Network-based voting and mechanism design We study social networks in which
individuals' local decisions can be manipulated to modify the resulting global
properties. A similar approach is taken by Apt and Markakis [2014] and Simon and Apt
[2015], which study the changes on a social network needed to make a certain
product adopted among users. Further contributions include rational secret shar-
ing and multi-party computation Abraham et al. [2006], the strategic manipula-
tion of peer reviews Kurokawa et al. [2015], and the growing literature on voting
in social networks Conitzer [2012]; Salehi-Abari and Boutilier [2014]; Elkind
[2014]; Tsang et al. [2015]; Procaccia et al. [2015].
Lobbying and Bribery Our framework features an external agent trying to influence
individual decisions to reach his or her private objectives. Lobbying in decision-
making is an important problem in the area of social choice, from the semi-
nal contribution of Helpman and Persson [1998] to more recent studies in multi-
issue voting Christian et al. [2007]. Lobbying and bribery are also established
concepts in computational social choice, with their computational complexity
being analysed extensively Faliszewski et al. [2009]; Baumeister et al. [2011];
Bredereck et al. [2014]; ?.
Reputation-based systems We study the aggregation of possibly insincere individ-
ual evaluations by agents that can influence one another through trust relations.
In this sense ours can be seen as a study of reputation in Multi Agent Systems,
2
which has been an important concern of MAS for the past decades Conte and Paolucci
[2002]; Sabater and Sierra [2005]; Garcin et al. [2009]. In particular, our frame-
work treats reputation as a manipulable piece of information, not just a static ag-
gregate of individual opinions, coherently with the work of Conte et al. [2008]
and Pinyol and Sabater-Mir [2013].
Paper structure Section 2 presents the basic setup, introducing -aig, -aig
and bribing strategies. Section 3 focusses on -aig, studying its bribery-proofness
under various knowledge conditions. Section 4 evaluates -aig against the same
knowledge conditions. In Section 5 we compare the two systems, taking the cost of
bribery into account. We conclude by summarising the main findings and pointing at
future research directions (Section 6).
2 Basic setup
In this section we provide the basic formal definitions.
2.1 Restaurant and customers
Our framework features an object r, called restaurant, being evaluated by a finite non-
empty set of individuals C = {c1, . . . , cn}, called customers. Customers are connected
by an undirected graph E ⊆ C × C, called the customers network. Given c ∈ C we
call N (c) = {x ∈ C (c, x) ∈ E} the neighbourhood of c, always including c itself.
Customers concurrently submit an evaluation of the restaurant, drawn from a set of
values Val ⊆ [0, 1], together with a distinguished element {∗}, symbolising no opinion.
Examples of values are the set [0, 1] itself, or a discrete assignment of 1 to 5 stars, as
common in online rating systems. We make the assumption that {0, 1} ⊆ Val and that
Val is closed under the operation min{1, x + y} for all x, y ∈ Val. The vast majority of
known rating methods can be mapped onto the [0, 1] interval and analysed within our
framework.
We represent the evaluation of the customers as a function eval : C → Val ∪ {∗}
and define V ⊆ C as the subset of customers that expresses an evaluation over the
restaurant, i.e., V = {c ∈ C eval(c) 6= ∗}. We refer to this set as the set of voters and
we assume it to be always non-empty, i.e., there is at least one customer that expresses
an evaluation.
2.2 Two rating systems
In online rating systems such as Tripadvisor R(cid:13) every interested customer can see - and
is therefore influenced by - (the average of) what the other customers have written. We
call this method -aig, which stands for objective rating.
Given an evaluation function eval of a restaurant, the associated -aig is de-
fined as follows:
-aig(eval) = avg
c∈V
eval(c)
3
Where avg is the average function across real-valued eval (c), disregarding ∗. We omit
eval when clear from the context.
-aig flattens individual evaluations into a unique objective aggregate, the rat-
ing that a certain restaurant is given. What we propose is a refinement of -aig,
which takes the network of influence into account. In this system customers are only
interested in the evaluation of other customers they can trust, e.g., their friends. We
call our method -aig, which stands for personalised rating. It is defined for a
pair customer-evaluation (c, eval) as follows:
-aig(c, eval) = avg
eval(k)
k∈N (c)∩V
So the -aig(c, eval) calculates what customer c comes to think of the restaurant,
taking the average of the opinions of the customers c is connected to. Again we omit
eval whenever clear from the context.
Observe that in case a customer has no connection with a voter, then -aig
is not defined. To facilitate the analysis we make the technical assumption that each
customer is connected to at least one voter. Also observe that when E = C × C, i.e., in
case the network is complete and each individual is influenced by each other individual,
then for all c ∈ C and eval we have that -aig(c, eval) = -aig(eval).
2.3 Utilities and strategies
We interpret a customer evaluation as a measure of his or her propensity to go to the
restaurant. We therefore assume that the utility that a restaurant gets is proportional to
its rating. To simplify the analysis we assume a factor 1 proportionality.
The case of -aig. For the -aig, we assume that the initial utility u0 of
the restaurant is defined as:
u0
O = C-aig(eval).
Intuitively, the initial utility amounts to the number of customers that actually go to
the restaurant, weighted with their (average) predisposition.
At the initial stage of the game, the restaurant owner receives u0, and can then
decide to invest a part of it to influence a subset of customers and improve upon the
initial gain. We assume utility to be fully transferrable and, to facilitate the analysis,
that such transfers translate directly into changes of customers' predispositions.
Definition 1. A strategy is a function σ : C → Val such that Pc∈C σ(c) ≤ u0.
Definition 1 imposes that strategies are budget balanced, i.e., restaurants can only
pay with resources they have.
Let Σ be the set of all strategies. We denote σ0 the strategy that assigns 0 to all
customers and we call bribing strategy any strategy that is different from σ0. After the
execution of a bribing strategy, the evaluation is updated as follows:
Definition 2. The evaluation evalσ(c) after execution of σ is eval σ(c) = min{1, eval(c)+
σ(c)}, where ∗ + σ(c) = σ(c), if σ(c) 6= 0, and ∗ + σ(c) = ∗, if σ(c) = 0.
4
In this definition we are making the assumption that the effect of bribing a non-voter to
vote is equivalent to that of bribing a voter that had a 0-level review, as, intuitively, the
individual has no associated predisposition to go to the restaurant.
A strategy is called efficient if σ(c) + eval(c) ≤ 1 for all c ∈ C. Let B(σ) = {c ∈
C σ(c) 6= 0} be the set of bribed customers. Let V σ be the set of voters after the
execution of σ. Executing σ induces the following change in utility:
O = C-aig(evalσ) − X
uσ
σ(c).
c∈C
Intuitively, uσ
O is obtained by adding to the initial utility of the restaurant the rating
obtained as an effect of the money invested on each individual minus the amount of
money spent.
We define the revenue of a strategy σ as the marginal utility obtained by executing
it:
Definition 3. Let σ be a strategy. The revenue of σ is defined as rO(σ) = uσ
say that σ is profitable if rO(σ) > 0.
O − u0. We
Finally, we recall the standard notion of dominance:
Definition 4. A strategy σ is weakly dominant if uσ
dominant if uσ
O for all σ∈Σ.
O > uσ′
O ≥ uσ′
O for all σ′∈Σ. It is strictly
Hence a non-profitable strategy is never strictly dominant.
The case of -aig. The previous definitions can be adapted to the case of
-aig as follows:
P = X
u0
-aig(c, eval)
c∈C
which encodes the initial utility of each restaurant, and
P = X
uσ
-aig(c, evalσ) − X
σ(c)
c∈C
c∈C
which encodes the utility change after the execution of a σ. Finally, let the revenue
σ(c) for
of σ be rP(σ) = uσ
-aig(evalσ, c).
If clear from the context, we use -aig
P.
P − u0
In order to determine the dominant strategies, we need to establish how the cus-
tomers vote, how they are connected, and what the restaurant owner knows. In this
paper we assume that the restaurant knows eval, leaving the interesting case when eval
is unknown to future work. We focus instead on the following cases: the restaurant
knows the network, the restaurant knows the shape of the network but not the individ-
uals' position, and the network is unknown. We analyse the effect of bribing strategies
on -aig in each such case. Notice how for the case of -aig the cases col-
lapse to the first. We also look at the special situation in which every customer is a
voter.
Given a set of such assumptions, we say that -aig (or -aig) are bribery-
proof under those assumptions if σ0 is weakly dominant.
5
Discussion Our model is built upon a number of simplifying assumptions which
do not play a significant role in the results and could therefore be dispensed with: (i)
customers' ratings correspond to their propensity to go to the restaurant. (ii) the restau-
rant utility equals the sum of all such propensities (iii) bribe σ(c) affects evaluation
eval(c) linearly. All these assumptions could be generalised by multiplicative factors,
such as an average price R paid at the restaurant, and a "customer price" Dc, such that
evalσ(c) = eval(c) + σ(c)
Dc
.
3 Bribes under -aig
In this section we look at bribing strategies under -aig, first focussing on the case
where everyone expresses an opinion, then moving on to the more general case.
3.1 All vote
Let us now consider the case in which V = C. Recall that B(σ) is the set of customers
bribed by σ. We say that two strategies σ1 and σ2 are disjoint if B(σ1)∪B(σ2) = ∅. By
direct calculation it follows that the revenue of disjoint strategies exhibits the following
property:
Lemma 1. If V = C and σ1 and σ2 are two disjoint strategies, then rO(σ1 ◦ σ2) =
rO(σ1) + rO(σ2).
We now show that bribing a single individual is not profitable.
Lemma 2. Let σ be a bribing strategy, V = C and B(σ) = 1. Then, rO(σ) ≤ 0, i.e.,
σ is not profitable.
Proof sketch. Let ¯c be the only individual such that σ(¯c) 6= 0. By calculation, r(σ) =
σ − -aig −Pc σ(c) = min{1, eval(¯c) + σ(¯c)} − eval(¯c) −
O − u0
uσ
σ(¯c) ≤ 0.
O = -aig
By combining the two lemmas above we are able to show that no strategy is profitable
for bribing the -aig.
Proposition 3. If V = C, then no strategy is profitable.
Proof sketch. Any bribing strategy σ can be decomposed into n pairwise disjoint strate-
gies such that σ = σc1 ◦ · · · ◦ σcn and B(σcj ) = 1 for all 1 ≤ j ≤ n. By applying
Lemma 1 and Lemma 2 we then obtain that rO(σ) ≤ 0.
From this it follows that σ0 is weakly dominant and thus -aig bribery-proof when
all customers voted.
6
3.2 Non-voters
Let us now consider the case of V ⊂ C, i.e., when there is at least one customer who is
not a voter. In this case Lemma 1 no longer holds, as shown in the following example.
Example 1. Let C = {A, B, C}, and let eval(A) = 0.5, eval(B) = 0.5, and eval(C) =
∗. The initial resources are u0 = -aig × 3 = 1.5. Let now σ1(A) = 0.5
and σ1(B) = σ1(C) = 0, and let σ2(C) = 0.5 and σ2(A) = σ2(B) = 0. Now
= 0.¯6×3−1 = 1.
uσ1
O = 0.75×3−0.5 = 1.75 and uσ2
The example (in particular σ1) also shows that -aig in this case is not bribery-
O = 0.5×3−0.5 = 1, but uσ1 ◦σ2
O
proof.
We now turn to characterise the set of undominated bribing strategies. We begin
by showing that bribing a non-voter is always dominated. Let first σ be a strategy such
that σ(¯c) 6= 0 for some c ∈ C \ V and recall that V σ is the set of voters after execution
of σ. Let us define the c-greedy restriction of σ to be any strategy σ−¯c such that:
• V σ−¯c
= V σ \ {c}, i.e., the greedy restriction eliminates ¯c from the set of voters.
• For each c ∈ V σ \ c, max(1, eval(c) + σ(c)) = max(1, eval(c) + σ−¯c(c)), i.e.,
the greedy restriction does not waste further resources.
• If there exists c ∈ V σ \ c such that eval(c) + σ−¯c(c) < 1 then Pc∈C σ−¯c(c) =
Pc∈C σ(c), i.e., the σ−¯c redistributes σ(¯c) among the remaining voters.
We now show that each strategy bribing a non-voter is strictly dominated by any of its
greedy restrictions.
Proposition 4. Let V 6= C, and ¯c ∈ C \ V . Then each strategy σ with σ(c) 6= 0 is
strictly dominated by σ−¯c.
Proof. Let σ be a strategy with σ(c) 6= 0 for some non-voter c, and let σ−¯c be one of
its greedy restriction defined above.
C(-aig
σ−¯c
−-aig
σ)+ X
σ(c)− X
σ−¯c(c) =
c∈C
c∈C
uσ−¯c
O − uσ
O =
C(Pc∈C evalσ−¯c
V
(c)
− Pc∈C
evalσ(c)
) +
V ∪ c
σ(c) − X
c∈C
+(X
c∈C
σ−¯c(c))
Observe first that σ−¯c is a redistribution, hence Pc σ(c) − Pc σ−¯c(c) ≥ 0, i.e., the
second addendum in the above equation is positive. Consider now the case where there
exists c ∈ V σ \c such that eval(c)+σ−¯c(c) < 1. Then by the definition of σ−¯c we have
that Pc∈V σ evalσ(c) = Pc∈V σ−¯c evalσ−¯c
(c), i.e., the greedy restriction preserves the
overall evaluation. By straightforward calculation this entails that uσ−¯c
O > 0. If
σ < 1
no such c exists, and therefore -aig
or, by the efficiency requirement and the fact that σ(c) 6= 0, we have that Pc∈C σ(c) >
Pc∈C σ−¯c(c). In either cases we have that uσ−¯c
= 1 we have that either -aig
O − uσ
O − uσ
O > 0.
σ−¯c
7
Let an O-greedy strategy be any efficient strategy that redistributes all the initial re-
O among voters. Making use of the previous result, we are able to characterise
sources u0
the set of all dominant strategies for -aig.
Proposition 5. Let V 6= C. A strategy is weakly dominant for -aig if and only if
it is an O-greedy strategy.
Proof sketch. For the right-to-left direction, first observe that all O-greedy strategies
are payoff-equivalent, and that a non-efficient strategy is always dominated by its ef-
ficient counterpart. By Proposition 4 we know that strategies bribing non-voters are
dominated, and by straightforward calculations we obtain that in presence of non-voters
it is always profitable to bribe as much as possible. For the left-to-right direction, ob-
serve that a non-greedy strategy is either inefficient, or it bribes a non-voter, or does
not bribe as much as possible. In either circumstance it is strictly dominated.
While there may be cases in which the number of weakly dominant strategies under
-aig is exponential, all such strategies are revenue equivalent, and Proposition 5
gives us a polynomial algorithm to find one of them: starting from an evaluation vector
eval, distribute all available resources u0
O to the voters, without exceeding the maximal
evaluation of 1. By either exhausting the available budget or distributing it all, we are
guaranteed the maximum gain by Proposition 5.
4 Bribes under -aig
In this section we look at bribing strategies under -aig, against various knowledge
conditions on the social network. As for Section 3 we start by looking at the case where
everyone votes and later on allowing non-voters. Before doing that, we introduce a
useful graph-theoretic measure of influence.
Definition 5. The influence weight of a customer c ∈ C in a network E and and a set
of designed voters V is defined as follows:
c = X
wV
k∈N (c)
1
N (k) ∩ V
Recall that we assumed that every customer can see a voter, thus wV
for every c. If V = C, i.e., when everybody voted, we let wc = wC
obtain wc = Pk∈N (c)
is defined by a bribing strategy σ, we write wσ
c are well-defined
c . In this case, we
deg(k) , where deg(c) = N (c) is the degree of c in E. When V
.
1
c = wV σ
c
Intuitively, each individual's rating influences the rating of each of its connections,
with a factor that is inversely proportional to the number of second-level connections
that have expressed an evaluation. We formalise this statement in the following lemma:
Lemma 6. The utility obtained by playing σ with -aig is uσ
evalσ(c) − Pc∈C σ(c).
P = Pc∈V σ wσ
c ×
8
Proof. By calculation:
P + X
uσ
σ(c) = X
-aig
σ(c) = X
c∈C
c∈C
c∈C
avg
evalσ(k) =
k∈N (c)∩V σ
= X
(cid:2)
c∈C
1
N (c) ∩ V σ X
k∈N (c)∩V σ
evalσ(k)(cid:3) =
= X
(cid:2) evalσ(k) × X
k∈V σ
k′ ∈N (k)
1
N (k′) ∩ V σ(cid:3) =
= X
wσ
c × evalσ(c)
c∈V σ
4.1 All vote, known network
We begin by studying the simplest case in which the restaurant knows the evaluation
eval, the network E as well as the position of each customer on the network. The
following corollary is a straightforward consequence of Lemma 6:
Corollary 7. Let V = C and let σ1 and σ2 be two disjoint strategies, then rP(σ1 ◦
σ2) = rP(σ1) + rP(σ2).
We are now able to show a precise characterisation of the revenue obtained by any
efficient strategy σ:
Proposition 8. Let V = C, let E be a known network, and let σ be an efficient strategy.
Then rP(σ) = Pc∈C(wc − 1)σ(c).
Proof. By calculation, where Step (2) uses Lemma 6, and Step (4) uses the fact that σ
is efficient:
= [X
wc evalσ
c − X
σ(c) − X
c∈C
c∈C
c∈C
rP(σ) = uσ
P − u0
P =
wc eval(c)] =
= X
(cid:2)wc [min{1, eval(c) + σ(c)} − eval(c)](cid:3) − X
σ(c)
c∈C
c∈C
(wc − 1)σ(c).
= X
c∈C
(1)
(2)
(3)
(4)
Proposition 8 tells us that the factors wc are crucial in determining the revenue of
a given bribing strategy. Bribing a customer c is profitable whenever wc>1 (provided
its evaluation was not 1 already), while bribing a customer c with wc≤1 is at most as
profitable as doing nothing, as can be seen in the example below. Most importantly, it
shows that -aig is not bribery-proof when the restaurant knows both the network
and the customers' evaluations.
9
Example 2. Let E be a four arms stars, and let A be the individual in the centre.
Assume each individual values the restaurant 0.5. We have that wA = 2.2 and wc =
0.7 for all c different from A. Consider now two bribing strategies: σA which bribes A
with 0.5, and σB which bribes a single individual B 6= A with the same amount. What
we obtain is that rP(σA) = 0.6, while rP(σB) = −0.15.
Given a network E and an evaluation vector eval, let Algorithm 1 define the P-
greedy bribing strategy.
P
P : C → Val
Input: Evaluation function eval and network E
Output: A bribing strategy σG
Budget=u0
P (c) = 0 for all c ∈ C
σG
Compute wc for all c ∈ C
Sort c ∈ C in descending order c0, . . . , cm based on wc
for i=0,. . . ,m do
if Budget6= 0 then
if wci > 1 then
P (ci) = min{1 − eval(ci), Budget}
σG
Budget=Budget-σG
P (ci)
end
end
return σG
P
end
Algorithm 1: The P-greedy bribing strategy σG
P
As a consequence of Proposition 8 we obtain:
Corollary 9. The P-greedy bribing strategy defined in Algorithm 1 is weakly dominant.
As in the case of -aig, Corollary 9 has repercussions on the computational
complexity of bribery: it shows that computing a weakly dominant strategy can be
done in polynomial time. Notice how the most costly operation lies in the computation
of the influence weights wc, which can be performed only once, assuming the network
is static. Similar problems, such as recognising whether bribing a certain individual
is profitable, or estimating whether individuals on a network can be bribed above a
certain threshold, are also computable in polynomial time.
4.2 All vote, unknown network
We now move to study the more complex case of an unknown network. Surprisingly,
we are able to show that no bribing strategy is profitable (in expectation), and hence
-aig is bribery-proof in this case. Recall that we are still assuming that the restau-
rant knows eval and everybody voted.
We begin by assuming that the restaurant knows the structure of the network, but
not the position of each participant. Formally, the restaurant knows E, but considers
10
n! [uσ
ρ − u0
ρ as uσ
any permutation of the customers in C over E as possible. Let us thus define the
expected revenue of a strategy σ over a given network E as the average over all possible
permutations of customers: E[rP(σ)] = P 1
ρ], where we abuse notation by
P under permutation ρ over the network E. What we are able to show
writing uσ
is that all strategies are at most as profitable as σ0 in expected return:
Proposition 10. Let V = C, let the network structure of E be known but not the
relative positions of customers on E. Then E[rP(σ)] = 0 for all strategies σ.
Proof sketch. Let C = n. We show the result for any strategy σ that bribes a single
customer ¯c. The general statement follows from the linearity of E[r(σ)]. Equation (5)
uses Proposition 8 to compute the revenue for each permutation ρ of customers C on
the network:
E[σ] = X
ρ
1
n!
(uσ
ρ − u0
ρ) = X
ρ
1
n!
(wρ(¯c) − 1)σ(¯c) =
= X
c∈C
(n − 1)!
n!
(wc − 1)σ(¯c) =
(n − 1)!
n! X
c∈C
(wc − 1) = 0
(5)
(6)
The last line follows from the observation that Pc wc = C and hence Pc(wc − 1) =
0, by a consequence of Definition 5 when everybody votes.
Hence, if we assume a uniform probability over all permutations of customers on
the network, a straightforward consequence of Proposition 10 concludes that it is not
profitable (in expectation) to bribe customers.
Corollary 11. If V = C and the network is unknown, then no bribing strategy for
-aig is profitable in expected return.
4.3 Non-voters, known network
With -aig it is possible to find a network where bribing a non-voter is profitable:
Example 3. Consider 4 individuals {B, C, D, E} connected only to a non-voter in the
middle. Let eval(j) = 0.2 for all j but the center. We have u0
P = 1. Let A be the
non-voter, and let σ1(A) = 1 and 0 otherwise. The utility of σ1 is:
σ1 (j) − 1 = 1.76
σ1 (A) + 4-aig
-aig
All other strategies can be shown to be dominated by σ1. Take for instance a strategy σ2
such that σ2(B) = 0.8, σ2(C) = 0.2 and 0 otherwise. The utility of σ2 is uσ2
P = 1.25.
It is quite hard to obtain analytical results for strategies bribing non-voters, due to
the non-linearity of the -aig in this setting. We can however provide results in line
with those of the previous section if we restrict to voter-only strategies, i.e., strategies
σ such that σ(c) = 0 for all c 6∈ V . In this case, a similar proof to Proposition 8 shows
the following:
Proposition 12. Let V 6= C, E be a known network, and σ be an efficient bribing
strategy such that B(σ) ⊆ V . Then, rP(σ) = Pc∈V (wV
The difference with the case of V = C is that wV
presence of non-voters, such as in our Example 3.
c can be arbitrarily large in the
c − 1)σ(c).
11
A0.2
B0.2
C*
A0.2
B0.2
C*
B0.2
C*
A0.2
Figure 1: Customers permutations in Example 4.
4.4 Non-voters, unknown positions
Unlike the case of V = C, in this case it is possible to define bribing strategies that are
profitable (in expected return).
Example 4. Let C = {A, B, C}, and the initial evaluation eval(A) = eval(B) = 0.2
and eval(C) = ∗. Assume that the structure of the network is known, but the position
of the individuals is not. Let the three possible network positions (without counting the
symmetries) be depicted in Figure 1. Let σ(B) = 0.2 and σ(A) = σ(C) = 0. In the
first case:
1
P (σ)=-aig(A) + ... + -aig(C) − 0.2 − u0
P =
r
= 0.3 + 0.3 + 0.4 − 0.2 − 0.6 = 0.2
In the second case r2
P(σ) = 0 while in the third:
r
3
P (σ) = 0.4 + 0.3 + 0.2 − 0.2 − 0.6 = 0.1
Therefore, -aig is not bribery-proof (in expectation) in the presence of non-
voters when the network is unknown. Interesting computational problems open up in
this setting, such as identifying the networks that allow for profitable bribing strategies,
and their expected revenue.
5 Boundaries of bribery-proofness
The previous sections have shown that having a network-based rating systems, where
individuals are influenced by their peers, is not bribery-proof, even when the position
of individuals in a given network is not known. However bribing strategies have a
different effect in the overall score. While the utility of -aig is a sum of the
global average of voters' evaluation, the utility of -aigis a sum of local averages
of voters' evalution against the one of their peers.
Therefore a strategy bribing one voter affects everyone in the case of -aig,
but it can be shown to have a limited effect in the case of -aig.
Proposition 13. Let σ be an efficient strategy s.t. B(σ) = 1, and let ¯c be such that
σ(c) 6= 0. Then rP(σ) < N (¯c).
12
Proof. By calculation, we have that:
rP(σ) = X
-aig
σ(c)−σ(¯c)− X
-aig(c) =
c∈C
c∈C
X
-aig
σ(c) − σ(¯c) − X
-aig(c) ≤
c′∈N(¯c)
c′∈N(¯c)
≤ 1 × N (¯c) − σ(¯c) − X
-aig(c) < N (¯c)
c′ ∈N(¯c)
The previous result shows that increasing the number of individuals that are not
connected to an agent that is bribed, even if these are non-voters, does not increase the
revenue of the bribing strategy. This is not true when we use -aig.
Proposition 14. Let σ be an efficient strategy. The revenue rO(σ) of σ is monotonically
increasing with the number of non-voters, and is unbounded.
Proof. It follows from our definitions that:
rO(σ) = (
C
V σ
− 1)(cid:2) X
eval(c) + σ(c)(cid:3)
c∈C
The above figure is unbounded and monotonically increasing in the number of non-
voters, which can be obtained by increasing C keeping V σ fixed.
So while -aig and -aig are not bribery-proof in general, it turns out that
the impact of the two in the overall network are significantly different. In particular,
under realistic assumptions such as a very large proportion of non-voters and with par-
ticipants having a few connections, bribing under -aig is increasingly rewarding,
while under -aig this is no longer the case.
6 Conclusive remarks
We introduced -aig, a network-based rating system which generalises the com-
monly used -aig, and analysed their resistance to external bribery under various
conditions. The main take-home message of our contribution can be summarised in
one point, deriving from our main results:
-aig and -aig are not bribery-proof in general. However, if we assume
that a service provider has a cost for bribing an individual, there are situations in which
-aig is fully bribery proof, while -aig is not. For instance, if the cost of
bribing an individual c is at least N (c) then -aig is bribery-proof. As observed
previously, this is not necessarily true for -aig. In particular, if we assume the
presence of unreachable individuals the difference is more significant. As shown, for
-aig we need to bribe individuals with wc > 1. With -aig is sufficient to
find one voter who accepts a bribe.
There is a number of avenues open to future research investigation. The most im-
portant ones include the case of partially known customers' evaluation, and the study of
ratings of multiple restaurants, where the probability of a customer choosing a restau-
rant determines his or her probability not to choose the others.
13
Acknowledgments
Umberto Grandi acknowledges the support of the Labex CIMI project "Social Choice
on Networks" (ANR-11-LABX-0040-CIMI). Paolo Turrini the support of Imperial
College London for the Junior Research Fellowship Designing negotiation spaces for
collective decision-making (DoC-AI1048). This work has also been partly supported
by COST Action IC1205 on Computational Social Choice.
References
I. Abraham, D. Dolev, R. Gonen, and J. Halpern. Distributed computing meets game
theory: robust mechanisms for rational secret sharing and multiparty computation.
In Proceedings of the 25th ACM symposium on Principles of distributed computing
(PODC'06), 2006.
Krzysztof R. Apt and Evangelos Markakis. Social networks with competing products.
Fundamenta Informaticae, 129(3):225–250, 2014.
Dorothea Baumeister, G´abor Erd´elyi, and Jorg Rothe. How hard is it to bribe the
judges? A study of the complexity of bribery in judgment aggregation.
In Pro-
ceedings of the Second International Conference on Algorithmic Decision Theory
(ADT-2011), 2011.
Felix Brandt, Vincent Conitzer, Ulle Endriss, J´erome Lang, and Ariel Procaccia, edi-
tors. Handbook of Computational Social Choice. Cambridge University Press, 2015.
R. Bredereck, J. Chen, S. Hartung, S. Kratsch, R. Niedermeier, O. Such´y, and G. J.
Woeginger. A multivariate complexity analysis of lobbying in multiple referenda.
Journal of Artificial Intelligence Research, 50:409–446, 2014.
R. Christian, M. Fellows, F. Rosamond, and A. Slinko. On complexity of lobbying in
multiple referenda. Review of Economic Design, 11(3):217–224, 2007.
Vincent Conitzer. Should social network structure be taken into account in elections?
Mathematical Social Sciences, 64(1):100–102, 2012.
Rosaria Conte and Mario Paolucci. Reputation in Artificial Societies: Social Beliefs
for Social Order. Kluwer Academic Publishers, 2002.
Rosaria Conte, Mario Paolucci, and Jordi Sabater-Mir. Reputation for innovating social
networks. Advances in Complex Systems, 11(2):303–320, 2008.
Edith Elkind. Coalitional games on sparse social networks.
In 10th International
Conference on Web and Internet Economics (WINE-2014), 2014.
Piotr Faliszewski, Edith Hemaspaandra, and Lane A. Hemaspaandra. How hard is
Journal of Artificial Intelligence Research (JAIR), 35:485–
bribery in elections?
532, 2009.
14
F. Garcin, B. Faltings, and R. Jurca. Aggregating reputation feedback. In Proceedings
of the International Conference on Reputation, 2009.
Elhanan Helpman and Torsten Persson. Lobbying and legislative bargaining. Working
Paper 6589, National Bureau of Economic Research, June 1998.
David Kurokawa, Omer Lev, Jamie Morgenstern, and Ariel D. Procaccia. Impartial
peer review. In Proceedings of the Twenty-Fourth International Joint Conference on
Artificial Intelligence, (IJCAI-2015), pages 582–588, 2015.
Isaac Pinyol and Jordi Sabater-Mir. Computational trust and reputation models for open
multi-agent systems: a review. Artificial Intelligence Review, 40(1):1–25, 2013.
Ariel D. Procaccia, Nisarg Shah, and Eric Sodomka. Ranked voting on social networks.
In Proceedings of the Twenty-Fourth International Joint Conference on Artificial
Intelligence, (IJCAI-2015), 2015.
Jordi Sabater and Carles Sierra. Review on computational trust and reputation models.
Artificial Intelligence Review, 24(1):33–60, 2005.
Amirali Salehi-Abari and Craig Boutilier. Empathetic social choice on social net-
works. In Proceedings of the 13th International conference on Autonomous Agents
and Multi-Agent Systems, (AAMAS-2014), 2014.
Sunil Simon and Krzysztof R. Apt. Social network games. Journal of Logic and
Computation, 25(1):207–242, 2015.
Alan Tsang, John A. Doucette, and Hadi Hosseini. Voting with social influence: Us-
ing arguments to uncover ground truth.
In Proceedings of the 15th International
Conference on Autonomous Agents and Multiagent Systems, (AAMAS-2015), 2015.
15
|
1607.03914 | 2 | 1607 | 2016-12-30T12:45:37 | A simple multiforce layout for multiplex networks | [
"cs.SI",
"physics.soc-ph"
] | We introduce multiforce, a force-directed layout for multiplex networks, where the nodes of the network are organized into multiple layers and both in-layer and inter-layer relationships among nodes are used to compute node coordinates. The proposed approach generalizes existing work, providing a range of intermediate layouts in-between the ones produced by known methods. Our experiments on real data show that multiforce can keep nodes well aligned across different layers without significantly affecting their internal layouts when the layers have similar or compatible topologies. As a consequence, multiforce enriches the benefits of force-directed layouts by also supporting the identification of topological correspondences between layers. | cs.SI | cs |
A simple multiforce layout for multiplex networks
Zahra Fatemi, Mostafa Salehi*, and Matteo Magnani
Abstract-We introduce multiforce, a force-directed layout for multiplex networks, where the nodes of the network are organized into
multiple layers and both in-layer and inter-layer relationships among nodes are used to compute node coordinates. The proposed
approach generalizes existing work, providing a range of intermediate layouts in-between the ones produced by known methods.
Our experiments on real data show that multiforce can keep nodes well aligned across different layers without significantly affecting
their internal layouts when the layers have similar or compatible topologies. As a consequence, multiforce enriches the benefits of
force-directed layouts by also supporting the identification of topological correspondences between layers.
Index Terms-Layout, Multiplex Network, Force-directed, Visualization.
!
1 INTRODUCTION
technology networks,
N ETWORK analysis is a widely applied discipline,
due to the fact that many realities can be mod-
eled as sets of interconnected entities – for example,
social networks,
transportation
networks, utility networks and biological networks. In
the following, we use the term monoplex to indicate
a network consisting of nodes with a single type of
relationship among them. The simplicity of monoplex
network models is at the same time a strength, making
them applicable to diverse contexts, and a limit, because
it may hide many details of the modeled reality. There-
fore, multiplex networks are often used as a richer but
still simple and general model, as they allow multiple
types of relationships between nodes. For example, two
people in an online social network like Facebook can be
friends, while being colleagues in a work environment.
Many aspects of multiplex networks from spreading
processes to structural measures such as clustering co-
efficient and node centrality have been recently inves-
tigated [21], [3], [30], [2], [16], [27], [9], building on a
long-standing literature in Social Network Analysis [32],
but only a few works have specifically investigated how
to draw multiplex networks. Several layouts have been
proposed to visualize monoplex networks, arranging
nodes so that users can easily identify special network
structures like hubs or communities, and quickly locate
important nodes [31], but drawing multiplex networks
is significantly more challenging.
A multiplex network visualization should support two
main types of tasks: the analysis of the single layers,
each corresponding to a traditional monoplex network
for which existing graph layouts can be used, and the
analysis of the relationships between layers, for which
it is useful to identify where the same nodes or net-
• Zahra Fatemi and Mostafa Salehi (*corresponding author) are with Uni-
versity of Tehran.
E-mail: [email protected], mostafa [email protected]
• Matteo Magnani is with Uppsala University.
Email: [email protected]
(a) Flattened visualization
(b) Sliced visualization
Fig. 1: Two alternative ways of visualizing a multiplex
network with 180 nodes and 863 edges of 6 types
work structures are located on the different layers [9].
Representing multiple relationship types in the same
graph as in Figure 1(a) can quickly lead to a very dense
representation hiding relevant network structures [26].
Therefore, different relationship types can be organized
into different layers, with the same node replicated on
multiple layers, as in Figure 1(b). This approach has
been used in the literature to represent different types
of multiplex networks, from traffic networks [19], [7] to
biological [7] and social/historical [22], [21] networks.
In the literature, two main approaches for visualizing
layers, losing our ability to quickly locate the same node
across layers.
To enable an objective evaluation of our approach with
respect to its ability to keep nodes aligned across layers
but also preserve layer-specific structures we have de-
fined two quality metrics representing these two criteria,
called respectively external fit and internal fit. These are
naturally defined as the forces which would be active
on the nodes if we were only trying to respectively
align them across layers or draw them according to the
internal structure of the layer. We have then performed
an evaluation on several real networks showing how
existing approaches would optimize only one of these
two metrics, while our algorithm can obtain good scores
on both at the same time. In addition to this evaluation,
we have also executed our algorithm on a simple dataset
to characterize the resulting diagrams. A practically
valuable result is that a visualization of two layers (or
relationship types) whose structures are similar only at
specific locations would highlight these similarities, by
keeping only those nodes well-aligned - something that
global layer similarity measures cannot capture.
In Section 2 we quickly review existing layouts for
monoplex and multiplex networks. In Section 3 our
multiforce algorithm is introduced. Section 4 presents an
example using a small synthetic dataset, to characterize
the impact of different settings, while Section 5 proposes
an evaluation on real data.
2 RELATED WORK
In this section we describe previous works on monoplex
and multiplex network visualization.
2.1 Monoplex Network visualization
Many layouts have been designed to visualize monoplex
networks. Here we briefly review the ones that are more
relevant for our approach. For an extensive review, the
reader may consult [31].
Multi-scale layouts first create some core sub graphs,
then they add other nodes until all nodes and edges are
added [31], [17]. Random layouts [8] and circular layouts
[20] are two categories of layouts which are appropriate
for small graphs with few nodes and edges, because they
do not consider aesthetic criteria: many edge crossings
and node overlappings can appear.
Among the most used visualization methods, force-
directed algorithms consider a graph as a physical system
where forces change the position of nodes. The two best
known force-directed layouts are Fruchterman-Reingold
[11] and Kamada-Kawai [15], [14]. In the Fruchterman-
Reingold layout nodes have repulsive power and push
other nodes away, while edges attract neighbor nodes.
In this layout nodes are considered as steel rings haing
similar loads and edges are like springs attracting neigh-
bouring rings. This algorithm consists of three main
steps. First, all nodes are distributed randomly. Second,
Fig. 2: The effect of in-layer and inter-layer forces on
node positions
multiplex networks sliced into layers have been used:
keeping the same layout in all
layers, meaning that
each node keeps the same position in all layers and
all its replicas would result aligned on a straight line
if the layers are visualized one besides the other, or
visualizing each layer independently of the others. The
first approach focuses only (or mainly) on inter-layer
relationships, highlighting node correspondences across
layers, while the second focuses only on in-layer edges.
In our view these approaches are just two specific cases
of a more general method. To fill the gap between
these two extremes we propose to define a range of
intermediate layouts with a controllable balance between
in-layer and inter-layer relationships. We call our general
layout multiforce.
Multiforce is based on a force-directed algorithm
(Fruchterman-Reingold) and uses two main types of
forces: in-layer and inter-layer, that can be tuned to impact
specific layers more or less than others. In-layer forces
attract neighbors inside the same layer, making them
closer, as in traditional layouts for monoplex networks.
Inter-layer forces try to align instances of the same node
on different layers1. Figure 2 gives an intuition of how
these forces operate. In addition, we also use repulsive
forces as in the original algorithm.
A specific problem of multiplex network visualization
is that different layers can expose different structures,
for example two nodes connected on one layer may
be disconnected on another. Therefore, in general it is
impossible to produce a good layout for each layer and
keep nodes perfectly aligned across different layers at the
same time. As an example, node 2 in the lower layer of
Figure 2 would be attracted towards node 1 on the same
layer because of the edge between them, but this would
increase the distance between the position of node 2 on
the lower layer and the position of node 2 on the upper
layer. In this way we would negatively affect our visual
understanding of the relationships between the different
1. In theory inter-layer forces can also be used to visualize more
general networks, where edges can cross layers, but in this work we
focus on multiplex networks.
repulsive forces separate all nodes. The value of repul-
sive force depends on the positions of the nodes. Third,
for each edge and based on the position of nodes after
repulsion, attractive forces are calculated [11]. In the
Kamada-Kawai layout an energy function is defined for
the whole graph based on shortest paths between nodes,
and positions are iteratively updated until the graph's
energy is minimized [15].
Bannister et al. [1] proposed a force-directed layout
to change the position of nodes so that more graph-
theoretically central nodes pushed towards the centre of
the diagram. In this algorithm, an additional force called
gravity is used to change the position of more central
nodes. For each node v in a graph G the position of the
node is influenced by the following force:
I[v] =
fr(u, v) +
fa(u, v) +
fg(v)
(1)
(cid:88)
u,v∈V
(cid:88)
(u,v)∈E
(cid:88)
v∈V
where fr and fa are respectively repulsive and attractive
forces, and fg is the gravity force, measured as:
fg(v) = γtM [v](ξ − P [v])
(2)
In this equation M [v] is the mass of node v, which can be
set according to the node degree, P [v] is the position of
v, γt is the gravitational parameter and ξ = ΣvP [v]/V
is the centroid of all nodes. Notice that forces in the
equations above are vectors.
Other extensions of force-directed layouts have con-
sidered the inclusion of additional domain-specific infor-
mation in the definition of the forces. An example is [36],
where the defiinitions of attractive and repulsive forces
include terms representing trust in social networks.
Force-directed methods have two main drawbacks.
First, they are typically suitable for networks with at
most 100 nodes, because attractive forces result in hiding
some relationships among nodes and node-overlapping
increases. Second, their run time is high in comparison
with other approaches. However, they are very popular,
because they often practically succeed in separating clus-
ters and increasing graph readability. To address these
shortcomings, layout algorithms are sometimes split into
multiple phases, with an initial preprocessing of the
data to generate good starting node dispositions or to
reduce data complexity. As an example, Gajer et al.'s
method first partitions the graph into subgraphs [34].
The smallest subgraph is then processed independently
and thus more efficiently. Afterwards, a force-directed
refinement round changes the values of initial node
positions and the next smallest subgraph is added to the
previous one, with these steps being repeated untill all
nodes have been processed. [37] follows the same steps,
setting initial node positions in a different way. Similarly,
Peng et al. proposed the Social Network Analysis Layout
(SNAL) by also separating a network into subgroups,
analyzing relationships between them and positioning
nodes based on their relative centralities [35].
Another family of layouts, that can also be combined
with force-directed algorithms, are constraint-based lay-
outs [10]. These layouts force nodes to appear at specific
positions. For example, nodes are placed on a frame in
a way that they do not overlap, or are horizontally and
vertically aligned, as in the orthogonal layout [31], [10]. In
these layouts, it is more difficult to isolate special struc-
tures like communities and time complexity is noticeably
high.
One important assumption in graph drawing is that
there is a correspondence between some aesthetic fea-
tures of the diagrams and their readability. Therefore,
some visualization algorithms explicitly target these fea-
tures. One such criterion is that too many edge crossings
make a graph more difficult to interpret. The crossing
number, cr(G), of a graph G is the smallest number of
crossings appearing in any drawing of G [28]. Several
algorithms have been proposed to reduce edge crossing
in monoplex networks. For example, Shabbeer et al. [29]
developed a stress majorization algorithm. In [28] and [4]
the concept of edge crossing is elaborated and equations
for measuring the number of edge crossings in different
graphs are reviewed. Another aesthetic feature impact-
ing graph readability is node overlapping. Two popular
methods to reduce node overlapping are proposed in
[12], [18].
2.2 Multiplex Network Visualization
Different methods have been discussed for visualizing
multiplex networks. We can categorize these methods
into three main classes:
• Slicing: One way of visualizing multiplex networks
is to show each layer or relationship type as a
monoplex network and to connect these monoplex
networks using inter-layer edges [7]. The layers
can have aligned layouts or independent layouts.
Aligned layouts help users find similar nodes in
different layers by forcing the same node to have
the same coordinates on all layers, but structures ex-
isting only on one layer (for example communities)
may not be clearly visualized. Independent layouts
can show specific structures of each layer, but may
hide inter-layer patterns [26].
• Flattening: In these methods, all nodes and edges
are placed on the same plane. In a node-colored
network, nodes from different layers are shown with
different colors [16], while for multiplex networks
colors can be used to distinguish edges of different
types. Apart from suffering from the same problems
of aligned slicing, the disadvantage of this method
is that for networks with high edge density rela-
tionships among nodes can be hidden by edges
from non-relevant layers and readability quickly
decreases due to the network's clutter [26].
• Indirect: This approach tries to visualize informa-
tion derived from the network instead of directly
visualizing the original layers, which are considered
to be too complex to allow a simple visual rep-
resentation. Renoust et al. [24] proposed a system
for visual analysis of group cohesion in flattened
multiplex networks. This system, called Detangler,
creates a so-called substrate network from unique
nodes of the multiplex network and a so-called
catalyst network from edges of different types. Erten
et al. [33] proposed three modified force-directed
approaches for creating slicing, flattened and split
views of multilayer networks by considering edge
weights and node weights. The weights of nodes
and edges are based on the number of times they
appear in different layers. In this approach inter-
layer relationships between nodes are ignored and
node weights are the same for all nodes when multi-
plex networks are visualized, so this approach does
not consider the specific features of the networks
targeted in our work.
An extreme case of indirect methods, that we men-
tion for completeness, consists in not visualizing
nodes and edges at all but only indirect network
properties, such as the degree of the nodes in the
different layers or other summary measures [7], [26],
[23]. These approaches are complementary to graph
drawing, and can also be used in combination with
our proposal.
Our method belongs to the slicing class, and is different
from existing approaches because it allows a balancing
of the effects of in-layer and inter-layer relationships.
3 THE MULTIFORCE LAYOUT
Multiforce extends the Fruchterman-Reingold algorithm
[11], and as mentioned in the introduction is based
on two types of attractive forces. The nodes are posi-
tioned on a set of planes, one for each layer or type
of relationship – this setting is sometimes called 2.5-
dimensional, because it looks 3-dimensional but the z-
coordinates of the nodes are fixed and limited to the
number of planes/layers. In-layer forces, that can be
weighted differently in each layer, attract pairs of nodes
connected on the same layer. Inter-layer forces influence
the position of nodes in different layers connected by
inter-layer edges, or corresponding to the same node in
the case of multiplex networks.
The pseudo-code of multiforce is presented in Al-
gorithm 1. The algorithm takes a multiplex network
G = (N, L, V, E) as input, where N is a set of nodes,
L a set of layers, (V, E) is a graph and the elements of
V are pairs (cid:104)node, layer(cid:105). We notate v.layer the layer of
an element v ∈ V and v.node the node corresponding to
an element v ∈ V .
Lines 13-29 are the same as in the original algorithm,
and compute the displacement of each node based on its
neighbors (attractive forces) and other nodes (repulsive
forces), with the addition of weights that can be used to
specify on which layers the layout should be computed
according to the original algorithm (27-28). Lines 30-37
extend the original algorithm and compute the displace-
ment caused by the position of the node on other layers,
to control node alignment. This is also weighted, to allow
the user to turn this feature on and off for all or some
layers (34-35).
Some details of the algorithm can be changed without
affecting its underlying idea. First, we can modify lines
6-12 to assign the same initial random coordinates to
the same node across different layers, anticipating line 8
before the for loop. A weighting factor INLA[v] can also
be added at line 20, so that both attractive and repulsive
forces are reduced or reinforced together - in practice,
this does not seem to have a significant effect on the
result; all diagrams in Section 4 have been computed
without these weights. Finally, lines 41 and 42 have been
retained from the original algorithm and ensure that the
nodes do not exit the frame specified by the user, but
are not necessary if the final coordinates are re-scaled to
fit it.
3.1 Time Complexity
Separating nodes based on repulsive forces has time
complexity O(N2) for each layer. For a complete
network with N nodes and L layers, there are at
most (LN(N−1)
N)
inter-layer relationships in the whole network. So, the
time complexity of multiforce without using indexes is
O(LN2 + L2N).
) in-layer edges and (
L(L−1)
2
2
4 A SIMPLE EXAMPLE
Before providing a quantitative evaluation of our al-
gorithm, we show the resulting layouts on a simple
synthetic network and different weights, to give a vi-
sual intuition of it. As we have briefly discussed in
Section 2 there is a connection between aesthetic features
of graph diagrams and their readability [14]. Typical
metrics are the number of edge crossings, the number
of overlapping nodes, the separation of communities,
and the representation of high-degree centrality nodes
in a specific position, for example in the centre of each
layer. These features can be easily manually inspected in
the following diagrams. In addition, the simple network
used in this section allows us to check the impact of
different settings for the in-layer and inter-layer weights.
The structures of the synthetic dataset used in the
following is shown in Figure 3. This dataset contains
two layers, each with 13 nodes; the whole network has
53 in-layer edges. Some nodes that are present in one
community in one layer belong to another in the second
layer, making this small example useful to show how
these nodes are handled by varying the weights.
The results of drawing this multiplex network with
multiforce and different combinations of weights are
shown in Table 1. While this is just a first illustrative
example it highlights the main features of the proposed
method, later tested with a larger qualitative example on
real data and a quantitative evaluation.
• When a good compromise between in-layer and
inter-layer forces can be found, as in this simple
Fig. 3: The structure of the synthetic network
First Layer
Second Layer
TABLE 1: Visualizing the synthetic network using different weights
Inter-layer Force=0
Inter-layer Force=0.5
Inter-layer Force=1
In-layer
Force=0
In-layer
Force=0.5
In-layer
Force=1
example, the method is stable with respect to its
parameters. All the examples in Table 1 where both
forces are not null (that is, the four bottom-right
plots) are very similar.
• If we focus on the bottom-right plot, we can see
how despite some differences in structure most of
the nodes are aligned, with the nodes being part of
different communities in the different layers having
slightly different positions that preserve the local
structures. In other words, we can highlight the
local structures in both layers at the same time, still
keeping the ability to easily identify corresponding
nodes across layers.
• If we extend our analysis from single nodes to whole
structures, such as communities or sub-graphs, an
inspection of the inter-layer connections may reveal
which parts of the layers are similar and which parts
are significantly different. We will in fact find sim-
ilar structures well aligned across different layers,
with approximately parallel inter-layer connections
among nodes. Dissimilar parts of the network will
instead be characterized by more oblique and ca-
hotic inter-layer connections (if in-layer forces are
prevalent, preventing alignment across layers) or
meaningless/random layouts (if inter-layer forces
are prevalent, removing local structures) or com-
binations of these two cases. Notice that this is
even better than what we can do using existing
layer correlation metrics (such as degree-degree cor-
relation or the jaccard coefficient), which compare
whole layers and are thus not able to identify locally
aligned regions.
Algorithm 1 Multiforce
Require: G = (N, L, V, E): a multiplex network
Require: W : width of the frame
Require: L: length of the frame
Require: #iterations
1: fr = function(z, k){ return k2/z; }
2: fa = function(z, k){ return z2/k; }
3: area := W · L
4: k :=
(cid:113) areaN ;
5: t :=(cid:112)N;
end for
for (v ∈ V s.t. v.node = n) do
(x, y) = random coordinates;
pos[v] = (x, y)
z[v] := index(v.layer);
6: for (n ∈ N) do
7:
8:
9:
10:
11:
12: end for
13: for ( i = 1 to #iterations ) do
// calculate repulsive forces
14:
for (v ∈ V ) do
15:
disp[v] := (cid:126)0;
16:
for (u ∈ V ) do
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
end if
end for
if (u (cid:54)= v and u.layer = v.layer)
(cid:52) := pos[v] − pos[u];
disp[v] := disp[v] + ((cid:52)/ (cid:52) ) ∗ fr( (cid:52) );
then
end for
// calculate attractive forces inside each layer
for ((u, v) ∈ E) do
(cid:52) := pos[v] − pos[u];
disp[v] := disp[v]−((cid:52)/(cid:52))∗fa((cid:52), k)∗INLA[v];
disp[u] := disp[u]+((cid:52)/(cid:52))∗fa((cid:52), k)∗INLA[u];
end for
// calculate attractive forces across layers
for (n ∈ N) do
for ({u, v} with u, v ∈ V , u.node = v.node = n)
do
(cid:52) := pos[v] − pos[u];
disp[v] := disp[v] − ((cid:52)/ (cid:52) ) ∗ fa( (cid:52) , k) ∗
INTERLA[v, u];
disp[u] := disp[u] + ((cid:52)/ (cid:52) ) ∗ fa( (cid:52) , k) ∗
INTERLA[u, v];
28:
29:
30:
31:
32:
33:
34:
35:
36:
37:
38:
39:
40:
end for
end for
// assign new positions
for (v ∈ V ) do
:=
pos[v] + (disp[v]/disp[v]) ∗
pos[v]
min(disp[v], t);
pos[v].x := min(W/2, max(−W/2, pos[v].x));
pos[v].y := min(L/2, max(−L/2, pos[v].y));
41:
42:
43:
44:
45:
46: end for
end for
// reduce the temperature
t := cool(t);
5 EXPERIMENTAL EVALUATION
In this section we present a more structured evaluation
of our method, using real datasets.
Our algorithm does not replace existing slicing ap-
proaches: it unifies and complements them with new
options, given by the recognition of the existence of
in-layer and inter-layer forces and the introduction of
balancing parameters between them. In theory, all the
available options can be valuable, including those pro-
vided by existing methods: for a user it can be good
to keep all the nodes strictly aligned, while for another
it can be better to visualize the layers one by one.
Therefore, we will not try to prove the superiority of
one approach over the other, and the main value of our
proposal is to have a single flexible algorithm that can
emphasize different aspects of the data. However, we
can also unambiguously show that our algorithm can
generate valuable visualizations that cannot be obtained
using existing methods. By being less strict and, for
example, allowing some small disalignment between
nodes in different layers, still not preventing their quick
identification, we can get the best from both extremes.
More precisely, we compare different layouts against
an ideal case where each layer is drawn independently
of the others, to optimize its internal readability, and at
the same time all occurrences of the same node across
different layers are perfectly aligned. Notice that such a
visualization is impossible to obtain in general, except
when the two layers are (almost) identical. To compute
the distance between the ideal case and our tests we
can define two measures representing these two criteria:
the sum of the forces still active on the nodes inside
each layer (called internal fit) and the displacement
between nodes in different layers (caled external fit),
also computed as the sum of the inter-layer forces still
active at the end of the algorithm. Notice that an optimal
diagram as defined above would contain both internally
stable and aligned nodes, so both measures would be
0, indicating the best possible layout (assuming that a
force-based approach is used). The hypothesis we test
in the following experiments is that existing approaches
optimize only one of these two criteria, while multiforce
can obtain good scores on both at the same time when
using both in-layer and inter-layer forces. In the follow-
ing we call this setting, allowed by our method, balanced.
To give an intuition of how a balanced drawing may
look like, consider Figure 4 where we have visualized a
real 5-layer social network previously used in multiplex
visualization research [26]. To make the diagram more
readable on paper we have drawn each layer besides the
others instead of in a 2.5D space. The different layers are
drawn according to their internal organization, showing
peculiar structures: for example, the lower community
indicated in the top-left diagram (continuous line) is not
present in some of the other layers. However, we can
see how the nodes belonging to this community have
been visualized at similar locations in the other layers,
Chemical Polyadic) [6].
• A transport network with flight connections in Eu-
rope [5].
For each network, Figure 5 shows how different lay-
outs behave with respect to the two aforementioned
measures, indicated as Intra (internal fit) and Inter (exter-
nal fit) in the plots. We remind the reader that high val-
ues of the former means that some layers have not been
correctly visualized according to their internal structure
- for example, the nodes in a community may have
been spread around the frame instead of being close to
each other. A high value of the latter means that nodes
are not aligned across layers - for example, a node may
have been visualized in the top left corner in one layer
and in the top right in the other. The ideal case would be
to have 0 for both metrics. In each figure, several settings
are tested, each represented by two bars corresponding
to the two metrics. The first setting corresponds to a
balanced layout, where our algorithm is executed with
weight 1 for all inter- and in-layer forces. The second
setting corresponds to the case where all
layers are
visualized independently of the others. In the remaining
settings the layout is computed based on one of the
layers, and nodes are kept aligned on the other layers.
As expected, for each network (that is, for each plot
in Figure 5) the independent visualization (second case)
generates nodes that are not well aligned, represented by
a tall second bar, and in the following cases we can see
that computing the layout based on one layer prevents
other layers from having good internal layouts, as shown
by the tall first bars. The balanced option (first case)
presents internal layouts that are less good than the ideal
case, and node alignments that are also less good than
the best possible option, but both are close to optimal
and significantly better than the aspect not optimized
in other experiments. In practice, this corresponds to
layouts similar to the one shown in Figure 4.
6 CONCLUSION
An optimal layout for multiplex networks would be able
to reveal the structure of each layer and the relationships
between different layers at the same time. Unfortunately,
this is not possible in general, because these two aspects
may not be aligned in real data, with some layers being
very uncorrelated with the others.
To address this problem, we proposed multiforce,
a force-directed algorithm in which both in-layer and
inter-layer forces can affect the position of nodes. In-
layer forces keep together connected nodes and im-
prove the identification of communities, while inter-layer
forces help users finding the same nodes in different
layers.
In the evaluation of the method we showed that
while the algorithm supports more traditional layouts
it can also generate what we call balanced visualizations
where both internal properties and node alignments are
handled. This has been presented on a simple synthetic
Fig. 4: Alignment of network structures across layers
using a balanced visualization, with both in-layer and
inter-layer forces active
providing information about inter-layer relationships.
We can see, for example, that some of the nodes in this
community are not present in the second layer, that this
community is split into two sub-communities in the third
layer, that it is not present in the fourth layer, where the
same nodes are connected to different parts of the graph,
and that they form a similar but less dense community
in the fifth layer. Notice that in the fourth layer the nodes
are still more or less in the same position as in the first
layer, despite the fact that they do not form a community.
In this way it becomes easier to locate them – in the
real 2.5-dimensional visualization we would also have
lines connecting nodes across layers, as in the previous
section, making the task straightforward as long as the
nodes are more or less aligned. In the figure we have also
marked a second community with a fuzzy rectangle, so
that the reader may observe another example.
To quantitatively support our claim we have executed
the algorithm on eight real datasets from different do-
mains, summarized in Table 2:
• Three traditional multiplex networks from the the
Social Network Analysis literature.
• A hybrid online/offline social network with five
types of relationships among the employees of a
Computer Science Department [26].
• A dataset showing the relationship among physi-
cians in four different cities, collected to investigate
information diffusion about drugs [13].
• A criminal network [25].
• A biological network in which every layer shows
a synaptic junction (Electric, Chemical Monadic,
TABLE 2: Properties of Real-world Networks
Network
Social – Padgett
Social – Kaptail
Social – Wiring
Hybrid – AUCS
Social – Physicians
Criminal – Noordin
Biological – synapses
Transport – airlines
# Layers
2
4
6
5
3
4
3
37
# Nodes
15
39
14
61
241
74
279
417
# Edges
35
552
108
1240
1370
318
3108
3588
(a) Social – Padgett
(b) Social – Kaptail
(c) Social – Wiring
(d) Hybrid – AUCS
(e) Social – Physicians
(f) Criminal – Noordin
(g) Biological – synapses
(h) Transport – airlines
Fig. 5: Results of experiments on real data
01020304050balindl.1l.2strategyMean forcesTypeIntraInter010002000balindl.1l.2l.3l.4strategyMean forcesTypeIntraInter050010001500balindl.1l.2l.3l.4l.5l.6strategyMean forcesTypeIntraInter0200040006000balindl.1l.2l.3l.4l.5strategyMean forcesTypeIntraInter0200040006000balindl.1l.2l.3strategyMean forcesTypeIntraInter020004000balindl.1l.2l.3l.4strategyMean forcesTypeIntraInter0500100015002000balindl.1l.2l.3strategyMean forcesTypeIntraInter010002000300040005000strategyMean forcesTypeIntraInterexample, to highlight the main features of our method,
on a real dataset, to give a qualitative idea of how the
layouts produced by this approach look like, and quan-
titatively, introducing two quality metrics and showing
how a balanced approach can satisfactorily address both
at the same time on several real datasets from different
domains.
In this paper we only considered static multiplex
networks, but nodes and edges can change over time
and appropriate layouts considering dynamical features
could be valuable tools. In addition, other aesthetic
features of graph diagrams like symmetry and uniform
edge length could be investigated in the context of
multiplex networks. Finally, other types of inter-layer
links can also be considered in the future, as in more
general multilayer network models.
REFERENCES
[1] Michael J. Bannister, David Eppstein, Michael T. Goodrich, and
Lowell Trott. Force-directed graph drawing using social gravity
and scaling. In Proceedings of the 20th International Conference on
Graph Drawing, pages 414–425. Springer-Verlag, Berlin, Heidel-
berg, 2013.
Federico Battiston, Vincenzo Nicosia, and Vito Latora. Structural
measures for multiplex networks. Physical Review E, 89(3):032804,
2014.
[2]
[3] Michele Berlingerio, Michele Coscia, Fosca Giannotti, Anna Mon-
reale, and Dino Pedreschi. Multidimensional networks: founda-
tions of structural analysis. World Wide Web, 16(5-6):567–593.
[4] Christoph Buchheim, Markus Chimani, Carsten Gutwenger,
Michael Jnger, and Petra Mutzel. Crossings and Planarization. CRC
Press, 2013.
[5] Alessio Cardillo, Jes ´us G´omez-Garde nes, Massimiliano Zanin,
Miguel Romance, David Papo, Francisco del Pozo, and Stefano
Boccaletti. Emergence of network features from multiplexity.
Scientific reports, 3:1344, 2013.
[6] Beth L. Chen, David H. Hall, and Dmitri B. Chklovskii. Wiring op-
timization can relate neuronal structure and function. Proceedings
of the National Academy of Sciences of the United States of America,
103(12):4723–4728, 2006.
[7] Manlio De Domenico, Mason A. Porter, and Alex Arenas. MuxViz:
a tool for multilayer analysis and visualization of networks.
Journal of Complex Networks, pages 159–176, 2014.
Josep D´ıaz, Jordi Petit, and Maria Serna. A survey of graph layout
problems. ACM Comput. Surv., 34(3):313–356, September 2002.
[9] Mark E. Dickison, Matteo Magnani, and Luca Rossi. Multilayer
[8]
Social Networks. Cambridge University Press, 2016.
[10] Tim Dwyer, Kim Marriott, Falk Schreiber, Peter Stuckey, Michael
Woodward, and Michael Wybrow. Exploration of networks using
overview+detail with constraint-based cooperative layout. IEEE
transactions on visualization and computer graphics, 14(6):1293–300,
January 2008.
[11] Thomas M. J. Fruchterman and Edward M. Reingold. Graph
Softw. Pract. Exper.,
drawing by force-directed placement.
21(11):1129–1164, November 1991.
[12] Xiaodi Huang, Wei Lai, A.S.M. Sajeev, and Junbin Gao. A new
algorithm for removing node overlapping in graph visualization.
Information Sciences, 177(14):2821 – 2844, 2007.
[13] Herbert Menzel James Coleman, Elihu Katz. The diffusion of an
innovation among physicians. Sociometry, 20(4):253–270, 1957.
[14] Skye BenderdeMoll James Moody, Daniel McFarland. Dynamic
network visualization. American Journal of Sociology, 110(4):1206–
1241, 2005.
[15] Tomihisa Kamada and Satoru Kawai. An algorithm for drawing
Inf. Process. Lett., 31(1):7–15, April
general undirected graphs.
1989.
[16] Mikko Kivela, Alexandre Arenas, Marc Barthelemy, James P. Glee-
son, Yamir Moreno, and Mason A. Porter. Multilayer Networks.
Journal of Complex Networks, 2(3):203–271, sep 2014.
[17] Yehuda Koren, L. Carmel, and D. Harel. Ace: a fast multiscale
eigenvectors computation for drawing huge graphs. In Information
Visualization, 2002. INFOVIS 2002. IEEE Symposium on, pages 137–
144, 2002.
[18] Pushpa Kumar and Kang Zhang. Visualization of clustered
directed acyclic graphs with node interleaving. In Proceedings of
the 2009 ACM Symposium on Applied Computing, SAC '09, pages
1800–1805, New York, NY, USA, 2009. ACM.
[19] Maciej Kurant and Patrick Thiran. Layered Complex Networks.
Physical Review Letters, 96(13):138701, apr 2006.
[20] Ding Ma. Visualization of social media data: mapping changing
social netwroks . Master's thesis, the Faculty of Geo-Information
Science and Earth Observation of the University of Twent, 2012.
[21] Matteo Magnani and Luca Rossi. The ML-Model for Multi-layer
In Proceedings of the International conference on
Social Networks.
Social Network Analysis and Mining (ASONAM), pages 5–12. IEEE
Computer Society, 2011.
[22] John F Padgett and Paul D McLean. Organizational Invention
and Elite Transformation: The Birth of Partnership Systems in
Renaissance Florence. American Journal of Sociology, 111(5):pp.
1463–1568, 2006.
[23] Denis Redondo, Arnaud Sallaberry, Dino Ienco, Faraz Zaidi,
and Pascal Poncelet. Layer-Centered Approach for Multigraphs
In Proceedings of the International Conference on
Visualization.
Information Visualisation (iV), pages 50–55, 2015.
[24] Benjamin Renoust, Guy Melanon, and Tamara Munzner. Detan-
gler: Visual analytics for multiplex networks. Computer Graphics
Forum, 34(3):321–330, 2015.
[25] Nancy Roberts and Sean F. Everton. Roberts and Everton Terrorist
Data: Noordin Top Terrorist Network (Subset), 2011.
[26] Luca Rossi and Matteo Magnani. Towards effective visual ana-
lytics on multiplex and multilayer networks. Chaos, Solitons &
Fractals, 72:68 – 76, 2015.
[27] Mostafa Salehi, Rajesh Sharma, Moreno Marzolla, Matteo Mag-
nani, Payam Siyari, and Danilo Montesi. Spreading processes
in multilayer networks. Network Science and Engineering, IEEE
Transactions on, 2(2):65–83, 2015.
[28] Marcus Schaefer. The graph crossing number and its variants:
a survey. The electronic journal of combinatorics, 1000:DS21–May,
2013.
[29] A Shabbeer, C Ozcaglar, M Gonzalez, and KP Bennett. Optimal
embedding of heterogeneous graph data with edge crossing
In Presented at NIPS Workshop on Challenges of Data
constraints.
Visualization, page 1, 2010.
[30] Albert Sol´e-Ribalta, Manlio De Domenico, Sergio G´omez, and
Alex Arenas. Centrality rankings in multiplex networks.
In
Proceedings of the 2014 ACM Conference on Web Science, WebSci
'14, pages 149–155, New York, NY, USA, 2014. ACM.
[31] Tatina von Landesberger, Arjan Kuijper, Tobias Schreck,
Jorn Kohlhammer,
Jean-Daniel. Fekete, and
Dieter Fellner. Visual analysis of large graphs: State-of-the-
art and future research challenges. Computer Graphics Forum,
30(6):1719–1749, 2011.
Jarke van Wijk,
[32] Stanley Wasserman and Katherine Faust. Social Network Analysis:
Methods and Applications, volume 8 of Structural analysis in the
social sciences, 8. Cambridge University Press, 1994.
[33] Cesim Erten, Stephen G. Kobourov, Vu Le, and Armand Navabi.
Simultaneous Graph Drawing: Layout Algorithms and Visualization
Schemes, pages 437–449. Springer Berlin Heidelberg, Berlin, Hei-
delberg, 2004.
[34] Pawel Gajer, Michael T. Goodrich, and Stephen G. Kobourov.
A multi-dimensional approach to force-directed layouts of large
graphs. Computational Geometry, 29(1):3 – 18, 2004.
[35] Wu Peng, Li SiKun. Social network analysis layout algorithm
under ontology model. SOFTWARE, 6(7):3 – 18, JULY 2011.
[36] Na; Ma Yao; Lu Hongwei Gan, Zaobin; Li. [ieee 2013 10th web
information system and application conference (wisa) - yangzhou,
china (2013.11.10-2013.11.15)] 2013 10th web information system
and application conference - trust network visualization based on
force-directed layout. 2013.
[37] Michael Baur, Ulrik Brandes, Marco Gaertler, and Dorothea Wag-
ner. Drawing the AS Graph in 2.5 Dimensions, pages 43–48. Springer
Berlin Heidelberg, Berlin, Heidelberg, 2005.
|
1205.0038 | 1 | 1205 | 2012-04-30T21:40:37 | Percolation Computation in Complex Networks | [
"cs.SI",
"physics.soc-ph"
] | K-clique percolation is an overlapping community finding algorithm which extracts particular structures, comprised of overlapping cliques, from complex networks. While it is conceptually straightforward, and can be elegantly expressed using clique graphs, certain aspects of k-clique percolation are computationally challenging in practice. In this paper we investigate aspects of empirical social networks, such as the large numbers of overlapping maximal cliques contained within them, that make clique percolation, and clique graph representations, computationally expensive. We motivate a simple algorithm to conduct clique percolation, and investigate its performance compared to current best-in-class algorithms. We present improvements to this algorithm, which allow us to perform k-clique percolation on much larger empirical datasets. Our approaches perform much better than existing algorithms on networks exhibiting pervasively overlapping community structure, especially for higher values of k. However, clique percolation remains a hard computational problem; current algorithms still scale worse than some other overlapping community finding algorithms. | cs.SI | cs | Percolation Computation in Complex Networks
Fergal Reid
Clique Research Cluster
Complex Adaptive Systems Laboratory
University College Dublin
Email: [email protected]
Aaron McDaid
Clique Research Cluster
Complex Adaptive Systems Laboratory
University College Dublin
Dublin 4, Ireland
Neil Hurley
Clique Research Cluster
Complex Adaptive Systems Laboratory
University College Dublin
Dublin 4, Ireland
2
1
0
2
r
p
A
0
3
]
I
S
.
s
c
[
1
v
8
3
0
0
.
5
0
2
1
:
v
i
X
r
a
Abstract—K -clique percolation is an overlapping community
finding algorithm which extracts particular structures, comprised
of overlapping cliques, from complex networks. While it is
conceptually straightforward, and can be elegantly expressed
using clique graphs, certain aspects of k-clique percolation
are computationally challenging in practice. In this paper we
investigate aspects of empirical social networks, such as the large
numbers of overlapping maximal cliques contained within them,
that make clique percolation, and clique graph representations,
computationally expensive. We motivate a simple algorithm
to conduct clique percolation, and investigate its performance
compared to current best-in-class algorithms. We present im-
provements to this algorithm1 , which allow us to perform k-clique
percolation on much larger empirical datasets. Our approaches
perform much better than existing algorithms on networks ex-
hibiting pervasively overlapping community structure, especially
for higher values of k . However, clique percolation remains a hard
computational problem; current algorithms still scale worse than
some other overlapping community finding algorithms.
I . IN TRODUC T ION
One particular type of percolation, important in the study of
complex networks, studied by Palla et al. [1] is k-clique per-
colation, which Fortunato’s review [2] of community detection
methods describes as the most popular overlapping community
detection method. A clique is a group of nodes in a network,
such that every node is connected to each other node. Palla et
al. argue that percolated k-cliques – groups of cliques of size
k , that are connected together by cliques of size (k-1) – are
important structures in complex networks, and a good way to
find community structure. They discuss k-clique percolation
in a variety of application contexts,
including authorship
networks, word association networks, and certain biological
contexts, for example, claiming that percolated k-cliques in
protein-protein interaction networks correspond to functional
units of protein structure. Additionally, Palla, Barabasi, and
Vicsek [3] apply k-clique percolation to the study of social
dynamics, in mobile telecoms social network datasets.
More generally, the work of Evans [4] motivates ‘clique
graphs’ as interesting constructions to use when studying
structure in networks and finding communities. A ‘clique
graph’ of a specific source network is formed by representing
each clique in the source network by a node in the ‘clique
graph’. Pairs of nodes in the clique graph are then connected
by edges where the corresponding pair of cliques overlap
1 Source code available: http://sites.google.com/site/CliquePercComp
in the source network. Clique graphs have many interesting
properties, not least that k-clique percolation can be expressed
as a simple thresholding on the clique graph. Clique graph
construction and k-clique percolation are thus linked. Evans
argues that different types of partitioning and thresholding of
the clique graph are interesting to examine for the purposes
of overlapping community detection, and also to examine
structure in complex networks generally.
However, in practice these approaches to find network struc-
ture present computational challenges. In a naive algorithmic
approach to k-clique percolation, one algorithm to percolate k-
cliques – for example as described in the review of Fortunato,
citing the work of Everett and Borgatti [5] – is “In order
to find k-clique communities, one searches first for maximal
cliques. Then a clique-clique overlap matrix O is built, which
is an nc × nc matrix, nc being the number of cliques; Oij
is the number of vertices shared by cliques i and j . To find
k-cliques, one needs simply to keep the entries of O which
are larger than or equal to k − 1, set the others to zero and
find the connected components of the resulting matrix.” This
simple algorithm, which essentially finds k-clique percolations
by finding connected components in a certain construction
of the clique graph, is quadratic in the number of maximal
cliques in the graph, by virtue of the way that
it builds
the complete clique-clique overlap matrix. Furthermore, the
number of cliques, and maximal cliques,
in an empirical
network may be very large, as we will discuss.
Some work has presented faster computational methods of
obtaining percolated k-clique structures. The authors of the
original Palla et al. paper have provided a faster CFinder
[6] implementation to find percolated k-cliques. More recent
work has been done by Kumpula et al. with their ‘Sequen-
tial Clique Percolation’ algorithm (SCP) [7] which further
improves efficiency. However, these improved methods often
perform poorly on networks with the kind of pervasively
overlapping community structure we see in many real world
social networks – an area of increasing interest in the applied
study of community structure – and particularly poorly when
performing percolation with high values of k . In this work,
we consider several computational aspects of the problem of
percolating structures in large complex networks. We focus
our discussion on k-clique percolation, but the techniques we
describe could be applied to the computation of many similar
percolation problems.
We note that there are many other overlapping community
finding methods, some of which are much more scalable
than clique percolation; however in this paper we focus on
clique percolation, due to its popularity. We also hope that k-
clique percolation will serve as a case study for computational
techniques that could later be used to improve the scalability
of algorithms for other types of percolation.
A. Structure of the paper
In Section II we define clique percolation. We also discuss
clique graphs, which are a useful conceptual tool to understand
the problem and to gain insight into various algorithms. We
show how, even though cliques are indicative of community
structure, there can be many more cliques than communities.
Algorithms typically fall into one of two classes: either they
are based on finding the k-cliques or else they limit themselves
to the maximal cliques with at least k nodes in them. We
explain how these are equivalent and discuss an example of
each kind from the literature.
In Section III we discuss some challenges that face all the
examples in the literature and which are also faced by our
algorithms. The number of cliques can be very large, as can
the size of the clique graph. Also we explain why, while it
is tempting to attempt to represent a community of cliques
merely as the union of the nodes in its constituent cliques,
such a method will lead to an incorrect algorithm.
In Section IV, we define and motivate our algorithms and
evaluate the speed of them against SCP on a variety of
synthetic networks and on empirical social networks.
In Section V, we briefly mention other approaches to this
problem that we considered and other overlapping community
finding algorithms of interest.
I I . K -C L IQU E P ERCO LAT ION
We now give a description of k-clique percolation, con-
straining ourselves to computationally relevant properties.
For a detailed introduction to the method, and arguments
motivating it as a tool for overlapping community finding,
consult Palla et al. [1]. In k-clique percolation, if two cliques
of size k share k-1 nodes, we say that these two cliques
percolate into each other. The maximal sets of cliques, which
satisfy the property that every clique in the set is reachable
from every other clique in the set, through a path connecting
percolating pairs, form the communities output by k-clique
percolation. These communities are then typically output as
the sets of nodes contained within each set of cliques – and
may overlap. Typically, for a given community found by k-
clique-percolation, a particular application requires these sets
of nodes as the representation of the communities found.
However, as we will see later, in order to maintain a correct
understanding of clique percolation it is best to think about k-
clique communities as sets of overlapping cliques, rather than
the set of nodes that each set of percolated cliques contains.
A. Clique Graphs
A clique graph is formed from a source network by creating
a node in the clique graph for each clique in the source
network and joining two nodes in the clique graph if their
corresponding cliques in the source network share nodes, or
‘overlap’ – see Figure 1 for a visualisation. This is a simple
visualisation of a small clique graph extracted from a simple
network; such relationships are difficult to visualise due to
the heavily overlapping nature of cliques in networks; this is
especially true as the value of k used is increased. The edges in
a clique graph may be weighted, corresponding to the overlap
between the cliques. Thresholding such a graph – removing the
nodes corresponding to cliques of size less than some value k ,
and removing edges with weight lower than (k − 1) – yields a
graph in which the connected components are the cliques that
would have percolated into each other, in k-clique percolation.
Figures 4a, 4b, and 4c illustrate this process. As both thresh-
olding the edges of a graph and calculating the connected
components of a graph are computationally inexpensive, it is
inexpensive to calculate the k-clique percolations, given the
clique graph.
The clique graph is a useful conceptual tool to understand
the definition of k-clique percolation, and to understand the
particular algorithms that have been used to recover these
structures. Evans [4] discusses some other general advantages
of using clique graphs: “The advantage is that
there are
many well established methods for analysing the properties of
vertices of a graph and for the price of a simple transformation,
these can be applied to obtain the same information about the
cliques”, and goes on to state that “In terms of computational
efficiency, the clique graphs are generally bigger [than the
source network] but by how much depends on the detailed
structure of the graph. The speed savings of a good fast vertex
partitioning algorithm [...] may compensate for the larger size
of the clique graph.” However, while clique graphs are an
elegant construction, and a useful tool for reasoning about
clique percolation, there are computational obstacles to their
use on many empirical networks, as we shall see; in practice,
the clique graph often takes a very long time to construct.
We will also later see that, in the specific case of k-clique
percolation, it is in fact not necessary to compute the entire
clique graph in order to compute the percolated communities.
B. Cliques vs. Maximal Cliques
Throughout
this paper, we discuss k-clique percolation,
with reference to two definitions of ‘clique’: A ‘clique’ is a
fully connected sub-graph – a set of nodes all of which are
connected to each other. A ‘maximal clique’ is a clique that is
contained in no larger clique. Every maximal clique is a clique,
by definition, but the opposite does not hold. Thus there are
maximal clique of size n will always have (cid:0)n
(cid:1) cliques of
always more cliques than maximal cliques.
In fact, as has been previously [1][7] pointed out, any
k
size k , for each k < n, within it. Note, however, that these
contained cliques will not be distinct across maximal cliques.
Nonetheless, by definition, each maximal clique will have at
Fig. 1. This illustration shows a very simple network, and its clique graph. We
represent the source network with circular nodes. We represent the maximal
cliques in this network as squares, placing a square at the center of each 4-
clique. The corresponding maximal clique graph, with threshold of overlap 3,
is shown below. The connected components in this graph – there is only one
in our example – correspond to the cliques that percolate into each other –
this entire graph would be one k-clique percolation, for k = 4.
Fig. 2. A maximal 6-clique. If the dashed edges are removed, this diagram
shown now contains 4 maximal cliques. This counter-intuitive behaviour,
whereby missing edges can increase the number of maximal cliques in a
network, partly illustrates why a particular empirical network can have many
more maximal cliques than it has edges, nodes, and communities.
least one clique within it that is not contained in any other
clique, and usually many more. Thus, the number of cliques
in any non-trivial network is always greater than the number of
maximal cliques. This is an important consideration, as some
algorithms have complexity in terms of cliques, and others in
terms of maximal cliques. It is important to realise that cliques
of size k will always percolate within a larger clique of size
greater than k ; thus a maximal clique of size greater than k
contains a k-clique percolation (which may also extend outside
it). Further, any k-clique sharing k-1 nodes with this maximal
clique will be part of the same percolation. Hence, clique
percolation can be equivalently defined in these two different
ways; one definition is based on a clique graph of every clique
with exactly k nodes, while another definition is based on
a maximal-clique graph of every maximal clique of at least
k nodes. Various algorithmic implementations make use of
each of these definitions, with consequences for computational
performance.
C. More cliques than communities
The large numbers of maximal cliques found in the
‘Facebook 100’ networks [8] shown in Table II – much
greater than the number of nodes in each network – may be
surprising, given the sociological interpretation of cliques as a
community structure [9]; if a clique corresponds to the idea of
a community, we may wonder why social networks contain so
many more maximal cliques than nodes. However, in empirical
social networks, we often observe a situation where a large
maximal clique may overlap heavily with many other smaller
maximal cliques that differ from it by only a few nodes. It is
also the case, that if edges are randomly deleted from a single
maximal clique, this maximal clique will often be replaced by
many smaller maximal cliques. A visualisation of this is shown
in Figure 2, where a single maximal clique, after having 2
edges removed, turns into 4 maximal cliques. Thus, in a social
network setting, if not every friendship is present between
a strong community of individuals, many maximal cliques
may emerge within this single ‘community’ of nodes. This
goes some way to intuitively explaining the large numbers of
maximal cliques seen in datasets from on-line social networks.
D. Previous approaches
1) CFinder: The original CFinder implementation, as de-
scribed by Palla et al. in supplementary material [1], follows
the method of Everett and Borgatti, finding all maximal
cliques, by a custom method, and generating the overlap ma-
trix between these cliques. Once this overlap matrix is found,
percolations for all values of k can then easily be calculated.
However, building the full overlap matrix – equivalent
to
c ) clique-clique
the full clique graph – naively requires O(n2
comparisons, in nc the number of maximal cliques. Thus,
CFinder performs poorly on the empirical networks we study.
2) SCP: SCP [7], on the other hand, works off a custom
clique finding algorithm to find, not all the maximal cliques,
but all cliques of size k . For each clique of size k , or ‘k-clique’,
it is trivial to find the cliques of size k-1 inside it. SCP is
based on a bipartite graph with the k-cliques on one side and
the (k-1)-cliques on the other side. A (k-1)-clique is linked
to every k-clique containing it. The connected components
in this bipartite network correspond to the clique percolation
communities. The idea is that two (k-1)-cliques percolate into
each other if they are both members of the same k-clique,
and this is equivalent to the conventional definition of two
k-cliques being linked if they share k-1 nodes.
While SCP consistently outperforms CFinder [7], the im-
portant term for the performance of SCP on a network is
thus not the number of maximal cliques of size at least k ,
but the number of cliques of size k-1. As we discuss in our
experimental work, empirical social networks often contain
maximal cliques of substantial size; given that such large
maximal cliques contain very many smaller k-cliques, the fact
that SCP has complexity in terms of the number of cliques of
size k-1 often leads to poor performance in practice. We note
that, as stated by Kumpula et al., SCP is most efficient for low
sizes of k , and performs poorly as the value of k increases.
I I I . COM PU TAT IONA L CHA LL ENGE S
In this section, we look at some of the challenges that face
any k-clique percolation algorithm. We discuss our specific
solutions and algorithms in the next section.
A. Quantity of cliques
To understand why k-clique percolation is so computation-
ally expensive on certain types of online social networks,
we first quantify the numbers of maximal cliques in these
empirical networks. The various algorithms deal with the
edges in the clique graph differently, but each algorithm
requires all the (maximal) cliques be found first.
As shown in Table I, even networks that have small numbers
of nodes and edges, can have very large numbers of maximal
cliques. It is worth noting that the worst case networks, in
terms of the ratio of maximal cliques to nodes in the network,
are online social networks; such datasets, for example the
Facebook networks, feature highly overlapping community
structure and have very large numbers of maximal cliques.
Our primary interest, in this work, is in clique percolation
in the challenging domain of modern online social networks,
which exhibit pervasive overlap [10] [11]. The ‘Facebook
100’ dataset of Traud et al. [8] provides us with a range of
similar empirical networks of differing size. We focus on the
smallest 10 of these networks – shown in Table II – which
capture the general topological features, in terms of densely
overlapping community structure, but are also small enough to
benchmark existing algorithms efficiently on. There are very
large numbers of maximal cliques in these networks, many
more than the number of nodes or edges.
TABLE I
TH E VA S T NUMB ER O F MAX IMAL C L IQU E S ( S I Z E≥4 ) PRE SENT IN MANY
EM P IR ICAL N E TWORK S . O F PART ICU LAR NOTE AR E TH E FACEBOOK AND
TW I T TER DATA SE T S , W I TH MANY MOR E MAX IMAL C L IQU E S THAN NOD E S
OR EDG E S . DATA S ET S FROM SNAP [12 ] AND OTH ER SOURC E S ; S EE [11 ]
FOR D E TA I L S .
Network
Nodes
Email-Enron
Email-EuAll
Mobile1
Mobile2
Mobile3
Facebook-caltech
Facebook-princeton
Facebook-georgetown
Twitter1
Twitter2
Twitter3
Slashdot0811
Collab-AstroPhysics
Collab-CondMat
Collab-HighEnergy
Cite-HighEnergy
Amazon0302
Epinions
Web-NotreDame
Web-Stanford
Wiki-Vote
ProteinInteract-Collins
36,692
265,009
10,001
10,001
10,001
769
6,596
9,414
2,001
2,001
2,001
77,360
18,771
23,133
9,875
27,769
262,111
75,879
325,729
281,903
7,115
1,622
Edges Maximal
Cliques
205,712
93,267
1,550
3,538
951
31,745
1,286,678
1,440,853
23,570
554,489
130,399
441,941
27,997
8,824
2,636
419,942
117,054
1,596,598
130,965
774,555
436,629
4,310
367,662
420,045
48,556
91,930
88,714
16,656
293,320
425,638
47,000
71,264
48,914
516,575
396,160
186,936
237,010
421,578
1,234,877
841,372
1,497,134
2,312,497
103,689
9,070
Largest
Clique
20
16
10
10
9
20
34
33
12
27
22
26
57
26
32
23
7
23
155
61
17
33
B. Clique Graph size
From the large numbers of cliques present in these types of
pervasively overlapping network, it can be seen that naively
performing O(n2
in nc the number of
c ) intersection tests,
cliques, in order to populate a clique-clique intersection matrix
would be computationally prohibitive.
TABLE II
TH E VA S T NUMB ER O F MAX IMAL C L IQU E S ( S I ZE>=3 ) PR E SENT, EVEN IN
R ELAT IVE LY SMA LL EM P IR ICA L ON - L IN E SOC IA L N ETWORK S .
‘CGBOUND ’ I S TH E NUMB ER O F EDG E S , IN 1000 S , W E CA LCU LATED IN
EACH k = 5 MAX IMA L CL IQUE GRA PH , A FT ER S EV ERA L W E EK S
COM PU TAT ION , AND I S AN UND ER E ST IMAT E O F TH E TRU E VA LUE .
(*R EED98 I S THE EXAC T NUMBER , NOT AN UND ER E S T IMAT E . )
Network
Nodes
Caltech36
Reed98
Simmons81
Haverford76
Swarthmore42
USFCA72
Mich67
Bowdoin47
Oberlin44
Amherst41
769
962
1,518
1,446
1,659
2,682
3,748
2,252
2,920
2,235
Edges Maximal
Cliques
32,207
33,991
45,538
475,567
306,542
108,929
154,971
331,738
198,803
599,430
16,656
18,812
32,988
59,589
61,050
65,252
81,903
84,387
89,912
90,954
Largest
Clique
20
16
19
24
20
29
27
23
22
21
CGBound
(1000s)
2,475
1,774*
2,244
127
282
1,128
843
235
644
79
However, in addition, by attempting to measure the size
of the maximal clique graph, we can see that even if we
had a fast way to generate the full clique graph, it would be
extremely unwieldy to work with, because of the vast number
of edges in it.
It is computationally expensive to obtain all
the edges in the clique graph for these networks. Running
a process to calculate maximal clique graph edges on one
of the smallest Facebook networks (Caltech) for a period of
12 hours calculated in excess of 449,000 edges in the clique
graph; this was the clique graph of maximal cliques of size
greater than 7, with edges of intersection of at least 6 nodes.
Similarly, looking at maximal cliques of size greater than 5
with intersections of 4 nodes, we generated over 1,700,000
edges over a period of several days computation. We note that
the total number of edges in the clique graph, in this small
network with only 769 nodes, may even be much larger than
this. Here, we are calculating these clique graph edges by
performing set-set intersection tests, for each clique, against
the set of cliques with which it shares a node. Table II shows
an underestimate of the number of edges in each clique graph,
formed after over one week of computation. The number of
actual edges present may be vastly greater, but merely dealing
with clique graphs that are sometimes so many orders of
magnitude larger than the original source network would be
computationally prohibitive. Even if there were a way to speed
up these intersection tests, merely dealing with clique graphs
that are so many orders of magnitude larger than the original
source network fast becomes computationally prohibitive.
These figures illustrate that methods of clique percolation,
or indeed general graph analysis, which require the full clique
graph to be built, are unscalable on these networks. This
motivates methods, such as those we present, which build only
a subset of the clique graph.
C. The necessity of dealing with individual cliques
Given the vast numbers of cliques present in empirical
graphs, a second complication exists that makes clique per-
colation particularly computationally hard. As cliques are
percolating, we would ideally discard the individual cliques
that comprise a percolating structure, and instead describe
that structure as a set of nodes and edges. As there are so
many more cliques than nodes or edges, this would increase
efficiency. However, we cannot do this, because it
is not
possible to tell, given a set of nodes, and the edges between
them, whether a given clique percolates into this structure,
without knowing the (k-1)-cliques that comprise this structure.
Counter-intuitively, a percolating k-clique structure can con-
tain (k-1)-cliques that are not part of the k-cliques that yield it.
Figure 3 shows an example of this. As such, it is not possible
to test a candidate clique for percolation, against a percolating
structure, without maintaining a list of the k , or k-1, cliques
that make it up. We believe this is a core computational issue
in k-clique percolation.
Fig. 3. We cannot use an intermediate representation to store a percolating
k-clique structure, without storing the individual cliques that comprise it:
Consider the case where we store just the nodes and edges of the percolating 4-
clique structure shown in the diagram. Even if the highlighted dashed triangle
was part of another 4-clique, with an additional node, not shown, this other
4-clique would not percolate into the 4-clique-community comprising all the
shown nodes; even though all three nodes and edges in the highlighted triangle
are part of the percolated 4-clique community, the triangle is not part of any
of the constituent 4-cliques.
IV. OUR A LGOR I THM S
In this section we describe two algorithms. Our algo-
rithms initially obtain the maximal cliques in the graph, and
then attempt to minimise the number of clique overlap tests
that must be carried out
to obtain k-clique communities.
Algorithm 1 attempts to build a minimal spanning forest
over the maximal cliques, using a simple data structure to
reduce unnecessary clique intersection tests. Algorithm 2 uses
a hierarchical data structure to further reduce the number of
full intersection tests needed, further improving performance.
1) Maximal Cliques: Like CFinder we have chosen to build
our algorithms around maximal cliques with at least k nodes;
this is in contrast to SCP, which uses k-cliques. This is because
large maximal cliques are often present in empirical data; these
contain large numbers of k-cliques and thus it is often more
efficient to work with the maximal cliques. Figure 5 shows the
clique- and maximal-clique distributions on a typical Facebook
network – though there are many maximal cliques, there are
many more k-cliques than there are maximal cliques of size
greater than k , for all but the smallest values of k .
2) Clique finding: The Bron-Kerbosch clique finding algo-
rithm [13] provides us with a fast way to find all maximal
cliques in the network. While finding all cliques, or maximal
cliques, is computationally hard on an arbitrary graph, on the
networks that we examine in practice, this method finds all
clique extremely fast, such that clique-finding is a small part of
the computational time in our algorithms. Instead computation
is dominated by comparing cliques against each other.
A. Algorithmic framework
Our goal is to find which cliques are in which connected
components of the thresholded clique graph. We follow a pro-
cedure similar to the well known [14] connected components
algorithm. We process one component at a time, by taking an
arbitrary starting clique and identifying all the cliques in the
same connected component as it. This process repeats until all
cliques have been assigned to a component.
The key point is that we do not first generate the full clique
graph; instead we integrate the process of generating clique
graph edges, with that of finding connected components; and
only generate clique graph edges as we need them for the
connected components calculation. We can do this because, to
calculate the k-clique percolations, we only need the minimal
spanning forest of the clique graph (Fig 4); any other edges
in the clique graph are essentially wasted intersection tests.
the cliques are initially unvisited, and
We say that all
that they each become visited as they are assigned to their
component. As the component expands, there is a set of cliques
described as the frontier. The expansion proceeds until the
frontier is empty. At each iteration, a clique is selected from
the frontier (the ‘current frontier clique’) and its unvisited
neighbours in the clique graph are identified. A ‘neighbouring’
clique is a clique which has an intersection of at least k-1
nodes with the current frontier clique; this corresponds to an
edge in the clique graph. These neighbours are moved into the
frontier and marked as visited and our current frontier clique is
moved out of the frontier, as it has now been fully processed.
Eventually, there will be no unvisited neighbours of any of the
frontier cliques and the frontier will gradually become empty –
this completes the identification of this component. If we know
that clique A is connected to clique B in the clique graph, and
B to C, then there is no need to test if A is connected to C;
thus we can ignore cliques that have already been visited, when
searching for the neighbours of the current frontier clique.
Our two algorithms differ in how they identify the unvisited
neighbouring cliques of the current frontier node. Otherwise,
they both use the framework which has just been described.
One naive way to identify the neighbouring unvisited cliques
of the current frontier clique is to iterate through all the other
cliques, testing the size of their intersection with the current
frontier clique. If the intersection has at least k-1 nodes and
if the clique is unvisited then it is a neighbouring unvisited
clique. Our two algorithms embody different strategies to
speed up this identification.
B. Algorithm 1
1) Node-to-cliques maps: For a given current
frontier
clique, testing against every other clique is expensive. We can
vastly improve this, by realizing that two cliques can only
neighbour each other in the clique graph, if they share at least
one node (i.e. are adjacent by at least one node). We maintain
(a) The source network.
(b) Maximal cliques of size at least 4, represented by a red box at their
centroids.
(c) The corresponding clique graph of maximal cliques over-
lapping by at least 3 nodes.
(d) A minimal spanning forest of the clique graph.
Fig. 4. A clique graph visualisation, showing the construction of the clique graph from a source network; the connected components in this graph, which
correspond to clique percolations; and minimal spanning trees of these components – the minimum set of edges in the clique graph which must be found,
and which put an absolute lower bound the number of clique-clique intersection tests to be done in these methods.
a list, for each node, of all the cliques that the node is present
in. Then, for each node in the current clique, we check the list
of other cliques that node is in, to generate the set of cliques
that overlap with the current clique by at least one node.
2) Visiting the cliques: The key step in Algorithm 1 is that
as cliques are added to the current connected component, they
are deleted from the map of nodes-to-cliques. This is how
a clique is marked as ‘visited’, and not considered further.
Pseudo-code is given in Listing 1.
C. Experiments
We performed several benchmarking experiments, of a C++
version of our algorithm, against the binary implementations
of both SCP and CFinder v2.0.5. We do not show benchmark
results for CFinder, as, similar to Kumpula et al. [7] we found
that it was generally very much slower than SCP. As such, all
benchmarks will be shown against SCP.
1) GN benchmarks: After Kumpula et al. [7], we per-
formed benchmarks based on the Girvan-Newman synthetic
benchmark, creating networks of increasing size, containing
increasing numbers of communities, each of 32 nodes. We
first note that these synthetic benchmarks are poor proxies
for many real world social networks, in terms of the clique
size distributions contained within them. Figure 5 shows a
typical example of this difference in the size distributions of
cliques, and maximal cliques, in these GN networks, versus
the Facebook networks; the Facebook networks have more and
larger cliques and maximal cliques. While the main advantage
of our method over SCP is on networks with larger numbers of
cliques, which these GN networks do not contain, we present,
in Figure 6, present performance results as we increase the
number of nodes in the GN network. At k = 4 our method,
while slightly slower than SCP, is competitive, and scales
similarly. However, when we start to look at higher values
of k , we notice that the scaling behaviour of SCP degrades
considerably faster than our method.
2) CondMat benchmark: An example of using k-clique
percolation to find communities in co-authorship data in the
field of condensed matter physics, is described by Palla et al.
[1]. The SCP paper [7] extends this benchmark, comparing the
times of SCP and CFinder for finding k-clique percolations,
in the Arxiv Condensed Matter e-print archive. We produce a
similar benchmark, using the Arxiv ca-CondMat network from
the SNAP dataset collection [12]. Figure 7 shows the runtime
of SCP against that of our implementation, on this network,
for varying values of k . Note that y -axis, showing runtime, is
logarithmic. Both implementations quickly complete for low
values of k , and, as shown in [7], far outperform CFinder; but
1
3
5
7
9
11
13
15
f o r
i n c l i q u e s :
c l i q u e
i f n o t
t o c o m p o n e n t s d i c t :
c l i q u e
i n c l i q u e s
c u r r e n t c o m p o n e n t += 1
c l i q u e s
t o c o m p o n e n t s d i c t [ c l i q u e ] = c u r r e n t c o m p o n e n t
f r o n t i e r = s e t ( )
f r o n t i e r . a d d ( c l i q u e )
w h i l e l e n ( f r o n t i e r ) > 0 :
c u r r e n t c l i q u e = f r o n t i e r . p o p ( )
f o r n e i g h b o u r
i n g e t u n v i s i t e d a d j a c e n t c l i q u e s ( c u r r e n t c l i q u e , n o d e s
l e n ( c u r r e n t c l i q u e . i n t e r s e c t i o n ( n e i g h b o u r ) ) >= ( k −1 ) :
i f
c l i q u e s
t o c o m p o n e n t s d i c t [ n e i g h b o u r ] = c u r r e n t c o m p o n e n t
f r o n t i e r . a d d ( n e i g h b o u r )
f o r n o d e i n n e i g h b o u r :
n o d e s
t o c l i q u e s d i c t [ n o d e ] . r e m o v e ( n e i g h b o u r )
t o c l i q u e s d i c t ) :
Listing 1. Python-like pseudo-code description of simple algorithm for improved clique percolation.
(a) Runtimes for K=4.
(b) Runtimes for K=5.
Fig. 6. GN benchmark results, on a similar benchmarking setup to [7]. SCP runtimes are shown by red squares; runtimes of our method are shown by blue
triangles. Runtimes are observed to be similar when k = 4, with SCP marginally ahead; but for k = 5 our method appears to do much better. There are
insufficient numbers of cliques of size 6 or greater present to allow higher values of k to be examined on the GN benchmarks.
as the value of k increases, the runtime of SCP deteriorates.
As noted in the original SCP work “for networks containing
large cliques the SCP method performs best for rather small
values of k” [7]. Our method, by contrast, seems well suited
to this particular type of network, and performs quickly, even
as k is increased.
3) Empirical social network data: We now produce a set
of empirical benchmarks, not previously investigated in the k-
clique percolation literature. We analyse the performance of
SCP against our algorithm, for various values of k , on the
ten smallest of the Facebook 100 networks. This allows us
easily obtain results for higher values of k where SCP cannot
complete in reasonable lengths of time. Figure 9 shows perfor-
mance results for four values of k across these 10 Facebook
networks. These empirical networks vary in their individual
performance characteristics. In common with previous work
on k-clique percolation, it is difficult to give meaningful closed
form analysis of expected performance characteristics in terms
of more general network parameters, such as the number of
nodes, or edges; but the trend is clearly that as k increases,
the performance of our method versus SCP clearly increases,
across all networks. Even for the lowest value of k that we
examine, our method finishes within a few minutes of SCP,
while as the value of k increases, it becomes difficult to obtain
runtimes for SCP. Furthermore, in additional to increasing
runtime, the memory usage of SCP’s data structures, which
allow for fast intersection tests, grows prohibitive.
When analysing these networks, we often find that, for
low values of k , a giant connected component emerges in
the network, due to the pervasively overlapping structure of
community in these networks. Figure 8 shows, for each value
of k on the Mich67 Facebook network, the proportion of nodes
which are in the largest k-clique percolation community with
respect to the number of nodes which have been assigned to
at least one k-clique percolation community. As can be clearly
seen from this chart, smaller values of k do not usefully find
modular structure in the network. An investigation of how
meaningful these structures are as communities is, however,
beyond the scope of this computational work; but this question
cannot even be investigated without an algorithm which runs
reasonably quickly for higher values of k . This particular
chart should not be taken as characteristic of all pervasively
overlapping networks; while we do commonly find that for
low values of k , a giant percolation component is present in
the Facebook 100 datasets, the nature of how this changes as
k increases, varies from network to network.
D. Counting the failed intersection tests
This type of algorithm involves testing pairs of cliques that
share a node, to see if they intersect by at least k-1 nodes. For
0204060801001201401000s Of Nodes010203040Time (Seconds)0204060801001201401000s Of Nodes0200400600800100012001400Time (Seconds)(a) K=4 (Note smaller y-axis)
(b) K=5
(c) K=6
(d) K=7
Fig. 9. Benchmark results on the smallest 10 Facebook 100 graphs, for values of k between 4 and 7. Red columns denote SCP runtimes, blue denote
Algorithm 1. Processes were terminated if they failed to complete within 2 hours (7200 seconds). Running SCP for additional time sometimes resulted in it
using more than 50GB of RAM; the SCP binary implementation consumes a vast amount of RAM for some networks and values of k , presumably for its
disjoint-set forest fast intersection data structure. Our method never uses more than a small multiple of the amount used to store the maximal cliques; never
more than 512MB in these experiments. Experiments are run on a multiprocessor machine, in random sequence. SCP outperforms our algorithm for k = 4,
but performs substantially worse, in both time and space requirements, as values of k get larger.
speed, our goal is to minimize the number of tests required,
as this typically takes up the major portion of the runtime
of such an algorithm. Each test either succeeds, if there are
>= (k-1) nodes in the intersection, or else fails. We cannot
change the minimum number of successful intersection tests
– there will be one such test for each edge in the minimal
spanning tree, i.e. numC liques − numC ommunities. But
we can try to minimize the number of failed tests. In this
subsection, we will look at a lower bound on the number of
failed tests that must occur in Algorithm 1 described above.
In many networks, the number of these failed tests is very
large in comparison to the number of the successful tests, and
dominates the computational cost. This motivates our second
algorithm, which we describe in the next section.
Consider every pair of cliques that share at least one node.
We do not need to perform an intersection test for every such
pair – we can potentially avoid testing most pairs of cliques
which percolate into the same community. But we cannot
avoid testing the pairs of cliques which share a node, but never
percolate into the same community. For each network, and for
each value of k , we count the pairs of cliques which share at
least one node and which do not percolate, and divide this by
the necessary number of successful tests. Some of the highest
ratios are shown in Table III. Even though Algorithm 1 is
much faster than SCP for higher k , this is a computational
bottleneck. Each failed intersection test is akin to a ‘false
positive’; we tested the cliques that shared a node, in case they
shared k-1, but this turned out not to be the case. We aim to
minimize the ‘false positive’ rate – the pairs of cliques that
our heuristic ‘suspects’ might percolate together, and hence
need to be expensively tested for overlap against each other –
while of course ensuring we still pick up all the true positives
– the cliques that actually do intersect by k-1 nodes.
E. Algorithm 2
Our second algorithm uses the same framework described
in Section IV-A. The only change is that we have a faster
way, given the current frontier clique, of finding its unvisited
neighbouring cliques: a cheaper way of avoiding intersection
tests, by detecting when two cliques will percolate in way that
gives fewer ‘false positives’ than checking only whether they
share a single node.
We use a complete binary tree where there are as many leaf
nodes as there are maximal cliques. We will refer to the nodes
in this binary tree as tree-nodes, and the tree-nodes which are
at the leaves of our tree will be referred to as leaf-nodes. To
avoid confusion, we use graph-node to refer to the nodes in
our original network. Each tree-node will have a set of graph-
CaltechReedSimmonsUSFCAMichOberlinSwarthmoreBowdoinHaverfordAmherst0100200300400500600700Time (seconds)SCPAlg.1CaltechReedSimmonsUSFCAMichOberlinSwarthmoreBowdoinHaverfordAmherst0100020003000400050006000>7200 Time (seconds)SCPAlg.1CaltechReedSimmonsUSFCAMichOberlinSwarthmoreBowdoinHaverfordAmherst0100020003000400050006000>7200 Time (seconds)SCPAlg.1CaltechReedSimmonsUSFCAMichOberlinSwarthmoreBowdoinHaverfordAmherst0100020003000400050006000>7200 Time (seconds)SCPAlg.1(a) Clique size distribution for
Simmons81 Facebook network.
(b) Maximal clique size distribution
for Simmons81 Facebook network.
(c) Clique size distribution,
GN benchmark.
(d) Maximal clique size distribution,
GN benchmark.
Fig. 5. Clique and maximal clique size distributions, for benchmark and
empirical networks. The benchmark network is a GN network, of 10,000
nodes, constructed to a similar specification as in [7]. The Facebook network
is that of the Simmons81 Facebook 100 dataset, and is typical of Facebook 100
data. We note that there are typically very many more cliques than maximal
cliques; that the peak of the distributions for the empirical network is further to
the left for the maximal cliques, than for all cliques; and that more cliques of
much larger sizes are found in empirical data, than in these GN benchmarks,
despite this particular GN benchmark network’s larger size.
Fig. 7.
Results on the Arxiv CondMat network, from the SNAP dataset
collection [12]. This network was also benchmarked in the work of Kumpula
et al. [7]. This is a network which, perhaps due to the fact it is a one-
mode projection of a bipartite author network, our algorithm seems to be
particularly well on, as K grows, in contrast to SCP. The SCP implementation
was terminated, on values of K larger than 8, for exceeding available memory.
Any single process exceeding 75GB of RAM was terminated.
nodes associated with it. For the leaf-nodes, this will be the
set of graph-nodes that are in the maximal clique which we
associated with that leaf-node. For the other tree-nodes in the
binary tree, the set of graph-nodes will be the union of the
graph-nodes associated with the leaf-nodes descended from it.
This tree is built once at the start of the algorithm and does
not change. But each leaf-node has a boolean field associated
with it which records whether the associated clique has already
been percolated into a community (i.e. it has been visited).
Fig. 8. The proportion of nodes assigned to any community, that are assigned
to the largest community, for each value of k , on the Mich67 Facebook
network. Clearly, on this particular network, low values of k simply find
a core structure of the network with pervasive overlap, and do not serve to
reveal modular units; larger values of k are required for k-clique percolation
to be in any way meaningful on these networks.
These visited fields will be initialized to False at the beginning,
and will all gradually be set True as the algorithm proceeds
and visits the cliques. For the other tree-nodes, this boolean
field will be set to True when the fields of its children have
been set to True. This means that a boolean field will be True
if and only if all of its descendants have already been visited.
Given the current frontier clique, we could visit all the
leaf nodes and perform an intersection test against each. This
would be the naive algorithm again. But we can ignore cliques
that have been visited already. In particular, if a tree-node has
been marked as visited, then we can ignore all the cliques that
are descended from it. Also, given a particular tree-node we
can test the intersection between the current frontier clique
and the set of graph-nodes which are stored at this tree-node.
If this intersection is less than k-1, then we know that there
cannot be a neighbouring clique among the cliques descended
from this tree-node. These two observations allow us to skip
most of the intersection tests via the information present in
the binary tree.
The search is a recursive search which starts at the root-node
of the binary tree. Listing 2 contains pseudo-code illustrating
this algorithm. At each tree-node, we check if this tree-node
has been marked as visited, and also check the size of the
intersection. If the intersection is large enough and if the tree-
node is still unvisited, then the search will proceed recursively
into each of the two children of the tree-node. Otherwise, the
recursive function will return and that tree-node (and all its
descendants) will not be considered any further.
To save memory, we do not explicitly maintain a set of
graph-nodes at each non-leaf tree-node. Instead we use a
Bloom filter – a fast and memory-efficient structure which
probabilistically records whether a given element is a member
of a set. It sometimes produces false positives, which in our
algorithm would sometimes lead to an overestimate of the
size of the intersection between two cliques; this does not
cause a correctness problem, but does mean that sometimes
the recursive search proceeds slightly deeper than necessary.
2468101214161820Size of Clique05001000150020002500300035001000s of Cliques2468101214161820Size of Maximal Clique01234567891000s of Maximal Cliques3456Size of Clique0204060801001201401000s of Cliques3456Size of Maximal Clique05101520253035401000s of Maximal Cliques4567891011K024681012Log (Time in Seconds)456789k0.40.50.60.70.80.91.0Proportion Largest Community1 d e f g e t u n v i s i t e d a d j a c e n t c l i q u e s ( c u r r e n t c l i q u e , b i n a r y t r e e ,
b i n a r y s e a r c h i n t r e e ( c u r r e n t c l i q u e , b i n a r y t r e e . r o o t n o d e ( ) ,
f r o n t i e r ) :
f r o n t i e r )
3
5
7
9
11
13
15
d e f b i n a r y s e a r c h i n t r e e ( c u r r e n t c l i q u e ,
f r o n t i e r ) :
t r e e n o d e ,
t r e e n o d e . v i s i t e d f l a g :
i f n o t
l e n ( c u r r e n t c l i q u e . i n t e r s e c t i o n ( t r e e . m y s e t o f g r a p h n o d e s ) ) >= k −1 :
i f
# t e s t s p a s s ,
t h e
c h i l d n o d e s a r e
s t i l l
c a n d i d a t e s
t r e e n o d e . i s a l e a f n o d e ( ) :
i f
f r o n t i e r . a p p e n d ( t r e e n o d e )
t r e e n o d e . v i s i t e d f l a g = T r u e
t r e e n o d e . c h e c k i f
s i b l i n g h a s b e e n v i s i t e d a n d p r o p a g a t e ( )
e l s e :
b i n a r y s e a r c h i n t r e e ( c u r r e n t c l i q u e ,
b i n a r y s e a r c h i n t r e e ( c u r r e n t c l i q u e ,
t r e e n o d e . l e f t
c h i l d )
t r e e n o d e . r i g h t c h i l d )
e l s e :
# t h e
c h i l d r e n c a n n o t b e s u i t a b l e , d o n ’ t
s e a r c h t h e d e s c e n d a n t s
Listing 2. Python-like pseudo-code description of our more complex clique percolation.
k
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
University
Berkeley13
UC33
JMU79
JMU79
Baylor93
JMU79
JMU79
UC61
Bingham82
UC61
Rutgers89
Rutgers89
MIT8
MIT8
Howard90
Howard90
UC61
Howard90
Howard90
Howard90
Howard90
Howard90
Howard90
Howard90
Howard90
Howard90
Howard90
Howard90
Howard90
Wake73
Wake73
Tulane29
Wake73
Wake73
FSU53
FSU53
FSU53
Failed tests
10,466,831
36,722,163
87,790,729
202,207,552
7,979,454,075
2,639,954,200
4,148,901,179
5,257,215,707
3,490,950,418
6,271,564,288
2,988,388,319
2,388,357,546
3,941,888,908
3,183,156,718
3,675,540,181
3,235,463,119
15,499,684,499
2,770,597,042
2,595,044,785
2,443,483,517
2,278,591,525
2,090,574,938
1,893,432,720
1,644,566,572
1,356,613,382
957,002,789
588,629,576
312,582,980
111,014,036
558,217,752
243,637,026
15,603,680
33,370,824
6,927,976
1,081,780,785
231,651,220
73,496,336
TABLE III
U S ING TH E FACEBOOK100 N ETWORK S . FOR EACH K B ETW EEN 4 AND
20 , THE UN IV ER S I TY W I TH THE H IGHE ST RAT IO O F FA I LED INT ER S EC T ION
T E ST S TO THE NUMB ER O F SUCC E S S FU L INT ER S EC T ION T E S T S I S SHOWN .
Successful tests
1,888,501
1,396,585
1,007,912
942,903
5,667,415
852,264
817,621
948,764
511,790
849,242
386,558
339,698
322,212
285,917
148,661
138,158
582,658
125,715
121,188
117,057
112,454
107,072
101,098
92,900
82,661
67,611
53,215
42,017
33,669
136,027
99,631
8,202
54,029
38,747
4,032,339
3,728,247
3,396,986
Ratio
5.5424
26.294
87.101
214.45
1407.9
3097.5
5074.3
5541.1
6821.0
7384.8
7730.7
7030.8
12233.
11133.
24724.
23418.
26601.
22038.
21413.
20874.
20262.
19524.
18728.
17702.
16411.
14154.
11061.
7439.4
3297.2
4103.7
2445.3
1902.4
617.64
178.80
268.27
62.134
21.635
F. Evaluation of Algorithm 2
When considering a single value of k , Algorithm 2 was
always faster than Algorithm 1, except sometimes when k = 3.
In Table IV, we see the runtimes of Algorithm 2 on a number
of Facebook networks. These runtimes are the time taken to
compute the communities for all values of k . This algorithm
Time(s)
50.94
51.84
115.10
372.39
235.93
215.22
421.19
246.39
263.45
424.96
338.81
389.64
421.62
477.63
524.29
376.70
500.21
411.83
622.84
840.05
1454.71
844.91
967.06
788.16
1158.68
1289.66
1047.59
751.05
921.42
2395.45
University
Caltech36
Reed98
Simmons81
Haverford76
Swarthmore42
USFCA72
Mich67
Bowdoin47
Oberlin44
Amherst41
Wellesley22
Hamilton46
Smith60
Trinity100
Williams40
Vassar85
Middlebury45
Brandeis99
Wesleyan43
Santa74
Pepperdine86
Colgate88
UC64
Bucknell39
Rochester38
Rice31
JohnsHopkins55
Vermont70
Lehigh96
Howard90
Edges
Nodes
16,656
769
18,812
962
32,988
1,518
59,589
1,446
61,050
1,659
65,252
2,682
81,903
3,748
84,387
2,252
89,912
2,920
90,954
2,235
94,899
2,970
96,394
2,314
97,133
2,970
111,996
2,613
112,986
2,790
119,161
3,068
124,610
3,075
137,567
3,898
138,035
3,593
151,747
3,578
152,007
3,445
155,043
3,482
155,332
6,833
158,864
3,826
161,404
4,563
184,828
4,087
186,586
5,180
191,221
7,324
198,347
5,075
4,047
204,850
TABLE IV
TH E RUN T IM E S O F OUR MORE O PT IM I Z ED A LGOR I THM , TO COM PU T E AL L
VALU E S O F k , ON TH E SMA LL E S T 10 FAC EBOOK N E TWORK S , AND A
S ELEC T ION O F LARG ER ON E S . TH I S ALGOR I THM WA S O FT EN AB LE TO
COM PL ET E AL L VALU E S O F k IN L E S S T IM E THAN A LGOR I THM 1 TOOK TO
COM PL ET E k = 4 . FOR EV ERY DATA SE T TE STED , TH I S A LGOR I THM
CALCULAT E S ANY VA LU E O F k FA STER THAN A LGOR I THM 1 .
frequently computes all values of k quicker than Algorithm 1
can compute the communities for k = 4.
V. OTH ER A P PROACH E S
We now briefly mention other approaches to this problem
that we have considered, as well as other overlapping com-
munity finding algorithms of interest.
A. Hierarchical Partitioning
The work of Narasimhamurthy et al. [15] investigates
speeding up k-clique percolation by dividing the network into
partitions using a graph partitioning algorithm. CFinder is then
run on each partition, generating a set of k-clique communities
for each partition. The union of these sets of percolated
communities is reported as the set of k-clique communities. To
evaluate their approach, they compare the set of communities
found on the partitioned network against the communities
found by running CFinder on the whole unpartitioned network.
This method fails to account for the case where k-clique
communities span the border of the graph partitions. This may
not be a large problem in networks where communities – even
k-clique communities – do not overlap. However, as shown
in our previous work [11] and discussed in other work [10],
[16], it will not be possible, on many networks, to partition
the network without splitting many communities; as such,
this method is an approximation technique not suitable for
networks with pervasive community overlap, such as modern
on-line social networks. We have tried adapt this approximate
method into an exact method,
inspired by kd-Trees [17],
where cliques that overlap partitions are explicitly handled,
by pushing them up the partition hierarchy, and testing them
for percolation against the cliques at the same level, or below
them, in the partition tree; however, we find that this method
does not work as well as the related methods described in this
paper; it may be useful in other percolation contexts.
B. Stochastic Approximation
As there are many more cliques than nodes, we consid-
ered whether working with a random subset of the maximal
cliques would yield similar community structure, at lower
computational cost than working with all maximal cliques.
We investigated randomly sampling a subset of the maximal
cliques, and performing percolation with this sampled subset.
However, results were poor; the overlapping NMI [18] of the
k-clique communities found by this approach, compared with
the communities found using all cliques, decreased rapidly
when even a small percentage of cliques (< 10%) were
randomly omitted. Perhaps a more sophisticated sampling
approach will be found in future work; but simple approaches
to stochastic approximation appear unsuitable for this problem.
C. Other structure definitions
Many other definitions of community structure exist. While
it was the goal of this work to focus on improving the
performance of k-clique percolation, researchers have done
work on other definitions of structure, such as K -plexes,
K -cores, and K -trusses. A highly scalable K -truss imple-
mentation in particular has been provided [19]. Types of
percolation structure which lack the properties described in
Figure 3, so that sub-structures can easily be composed into
higher level units discarding the sub-structure, avoid some of
the computational problems of k-clique percolation. However,
these structures are fundamentally different
than k-clique
percolation, and a discussion of them should also consider
the field of community finding as a whole, which is beyond
the scope of this computational work.
D. Other overlapping community finding methods
We have focused on k-clique percolation in this work.
However, many other modern overlapping community finding
algorithms exist, many of them with good scaling properties,
such as link partitioning methods [20] [10], relatively scalable
methods which approximate statistical objectives [21] [22],
information theoretic approaches [23], methods explicitly de-
signed to be scalable, such as label propagation [24], other
clique-based methods more scalable than k-clique percolation
[25] [26] and many other methods; Xie et al. [27] provide a
comparative analysis.
We have not investigated these algorithms in this compu-
tational work, focusing instead on the properties of k-clique
percolation; but for many application domains the structures
found by these often more scalable algorithms may be more
suitable than percolated k-cliques.
E. Better, as yet unknown, k-clique percolation methods
In our work, we have focused on algorithms for k-clique
percolation that either find all the cliques, or all the maximal
cliques. We have not definitively ruled out the possibility of
creating a better k-clique percolation algorithm which does not
need to calculate this information, or which uses some other
form of intermediate structure when percolating k-cliques, that
somehow leads to more efficient clique intersection testing.
This may be a potential area of future work, especially if k-
clique percolation were to continue to be widely used, and not
be superseded by more recent overlapping community finding
algorithms.
V I . CONC LU S ION
We have examined k-clique percolation as a specific exam-
ple of a computationally challenging percolation problem. We
have shown that vast numbers of cliques exist in empirical
social networks, and that k-clique percolation is a hard prob-
lem to implement well, due to the difficulty of producing in-
termediate representations of percolating structures. From the
large number of overlapping cliques and maximal cliques that
we observe in empirical networks, and the consequent large
number of edges in the clique graphs we have constructed, we
conclude that while clique graphs are an attractive conceptual
tool, their utility is limited in applications of social network
analysis. We have developed and thoroughly benchmarked a
k-clique percolation algorithm that is conceptually simple, yet
performs better than existing methods on many real world
networks, especially when considering k-clique percolation
with higher values of k . This method is challenged by the
large numbers of cliques which share at least one node, but
do not percolate. We introduce a second method which uses
a more sophisticated data structure. With this method we can
conduct clique percolation on larger pervasively overlapping
networks than ever before. However, these methods remain
fundamentally limited by the necessity of testing cliques
[23] Y. Kim and H. Jeong, “Map equation for link communities,” Physical
Review E, vol. 84, no. 2, p. 26110, 2011.
[24] S. Gregory, “Finding overlapping communities in networks by label
propagation,” New Journal of Physics, vol. 12, p. 103018, 2010.
[25] H. Shen, X. Cheng, K. Cai, and M. Hu, “Detect overlapping and
hierarchical community structure in networks,” Physica A: Statistical
Mechanics and its Applications, vol. 388, no. 8, pp. 1706–1712, 2009.
[26] C. Lee, F. Reid, A. McDaid, and N. Hurley, “Detecting highly overlap-
ping community structure by greedy clique expansion,” KDD SNA 2010,
2010.
[27] J. Xie, S. Kelley, and B. Szymanski, “Overlapping community detection
in networks: the state of the art and comparative study,” Arxiv preprint
arXiv:1110.5813, 2011.
against other cliques with which they share some nodes, but
do not percolate. Given the number of cliques, clique perco-
lation remains computationally challenging; other overlapping
community detection methods appear more promising, from a
computational standpoint. We provide software for researchers
studying other percolation problems to leverage our results.
V I I . ACKNOW LEDG EM EN T S
This work is supported by Science Foundation Ireland under
grant 08/SRC/I1407: Clique: Graph and Network Analysis
Cluster.
R E F ER ENC E S
[1] G. Palla, I. Der ´enyi, I. Farkas, and T. Vicsek, “Uncovering the overlap-
ping community structure of complex networks in nature and society,”
Nature, vol. 435, no. 7043, pp. 814–818, 2005.
[2] S. Fortunato, “Community detection in graphs,” Physics Reports, 2009.
[3] G. Palla, A. Barabasi, and T. Vicsek, “Quantifying social group evolu-
tion,” Nature, vol. 446, no. 7136, pp. 664–667, 2007.
[4] T. Evans, “Clique graphs and overlapping communities,” Journal of
Statistical Mechanics: Theory and Experiment, vol. 2010, p. P12037,
2010.
[5] M. Everett and S. Borgatti, “Analyzing clique overlap,” Connections,
vol. 21, no. 1, pp. 49–61, 1998.
[6] B. Adamcsek, G. Palla, I. Farkas, I. Der ´enyi, and T. Vicsek, “CFinder:
locating cliques and overlapping modules in biological networks,” Bioin-
formatics, vol. 22, no. 8, p. 1021, 2006.
[7] J. Kumpula, M. Kivel a, K. Kaski, and J. Saram aki, “Sequential algorithm
for fast clique percolation,” Physical Review E, vol. 78, no. 2, p. 026109,
2008.
[8] A. Traud, E. Kelsic, P. Mucha, and M. Porter, “Community structure in
online collegiate social networks,” arXiv, vol. 809, 2008.
[9] R. Luce and A. Perry, “A method of matrix analysis of group structure,”
Psychometrika, vol. 14, no. 2, pp. 95–116, 1949.
[10] Y. Ahn, J. Bagrow, and S. Lehmann, “Link communities reveal multi-
scale complexity in networks,” Nature, vol. 466, no. 7307, pp. 761–764,
2010.
[11] F. Reid, A. McDaid, and N. Hurley, “Partitioning Breaks Communities,”
2011 Advances in Social Network Analysis and Mining, 2011.
[12] J. Leskovec, “SNAP Stanford Network Analysis Project,” http://snap.
stanford.edu, 2009.
[13] C. Bron and J. Kerbosch, “Finding all cliques of an undirected graph,”
Communications of the ACM, vol. 16, no. 9, pp. 575–577, 1973.
[14] J. Hopcroft and R. Tarjan, “Algorithm 447: efficient algorithms for graph
manipulation,” Communications of the ACM, vol. 16, no. 6, pp. 372–378,
1973.
[15] A. Narasimhamurthy, D. Greene, N. Hurley, and P. Cunningham, “Parti-
tioning large networks without breaking communities,” Knowledge and
Information Systems, pp. 1–25, 2010.
[16] J. Leskovec, K. Lang, A. Dasgupta, and M. Mahoney, “Statistical prop-
erties of community structure in large social and information networks,”
in Proceeding of the 17th international conference on World Wide Web.
ACM, 2008, pp. 695–704.
[17] J. Bentley, “Multidimensional binary search trees used for associative
searching,” Communications of the ACM, vol. 18, no. 9, pp. 509–517,
1975.
[18] A. Lancichinetti, S. Fortunato, and J. Kert ´esz, “Detecting the overlap-
ping and hierarchical community structure in complex networks,” New
Journal of Physics, vol. 11, p. 033015, 2009.
[19] J. Cohen, “Graph twiddling in a mapreduce world,” Computing in
Science & Engineering, vol. 11, no. 4, pp. 29–41, 2009.
[20] T. Evans and R. Lambiotte, “Line graphs, link partitions, and overlapping
communities,” Physical Review E, vol. 80, no. 1, p. 016105, 2009.
[21] A. McDaid and N. Hurley, “Detecting highly overlapping communities
with model-based overlapping seed expansion,” in Advances in Social
Networks Analysis and Mining (ASONAM), 2010 International Confer-
ence on.
IEEE, 2010, pp. 112–119.
[22] A. Lancichinetti, F. Radicchi, J. Ramasco, and S. Fortunato, “Finding
statistically significant communities in networks,” PloS one, vol. 6, no. 4,
p. e18961, 2011.
|
1912.05140 | 1 | 1912 | 2019-12-11T07:04:27 | Beyond Node Embedding: A Direct Unsupervised Edge Representation Framework for Homogeneous Networks | [
"cs.SI",
"cs.LG"
] | Network representation learning has traditionally been used to find lower dimensional vector representations of the nodes in a network. However, there are very important edge driven mining tasks of interest to the classical network analysis community, which have mostly been unexplored in the network embedding space. For applications such as link prediction in homogeneous networks, vector representation (i.e., embedding) of an edge is derived heuristically just by using simple aggregations of the embeddings of the end vertices of the edge. Clearly, this method of deriving edge embedding is suboptimal and there is a need for a dedicated unsupervised approach for embedding edges by leveraging edge properties of the network.
Towards this end, we propose a novel concept of converting a network to its weighted line graph which is ideally suited to find the embedding of edges of the original network. We further derive a novel algorithm to embed the line graph, by introducing the concept of collective homophily. To the best of our knowledge, this is the first direct unsupervised approach for edge embedding in homogeneous information networks, without relying on the node embeddings. We validate the edge embeddings on three downstream edge mining tasks. Our proposed optimization framework for edge embedding also generates a set of node embeddings, which are not just the aggregation of edges. Further experimental analysis shows the connection of our framework to the concept of node centrality. | cs.SI | cs | Beyond Node Embedding: A Direct Unsupervised Edge
Representation Framework for Homogeneous Networks
Sambaran Bandyopadhyay1 and Anirban Biswas2 and Narasimha Murty3 and Ramasuri Narayanam4
9
1
0
2
c
e
D
1
1
]
I
S
.
s
c
[
1
v
0
4
1
5
0
.
2
1
9
1
:
v
i
X
r
a
Abstract. Network representation learning has traditionally been
used to find lower dimensional vector representations of the nodes
in a network. However, there are very important edge driven mining
tasks of interest to the classical network analysis community, which
have mostly been unexplored in the network embedding space. For
applications such as link prediction in homogeneous networks, vec-
tor representation (i.e., embedding) of an edge is derived heuristically
just by using simple aggregations of the embeddings of the end ver-
tices of the edge. Clearly, this method of deriving edge embedding is
suboptimal and there is a need for a dedicated unsupervised approach
for embedding edges by leveraging edge properties of the network.
Towards this end, we propose a novel concept of converting a net-
work to its weighted line graph which is ideally suited to find the em-
bedding of edges of the original network. We further derive a novel
algorithm to embed the line graph, by introducing the concept of col-
lective homophily. To the best of our knowledge, this is the first direct
unsupervised approach for edge embedding in homogeneous infor-
mation networks, without relying on the node embeddings. We val-
idate the edge embeddings on three downstream edge mining tasks.
Our proposed optimization framework for edge embedding also gen-
erates a set of node embeddings, which are not just the aggregation
of edges. Further experimental analysis shows the connection of our
framework to the concept of node centrality.
Introduction
1
Network representation learning (also known as network embedding)
has gained significant interest over the last few years. Traditionally,
network embedding [22, 12, 28] maps the nodes of a homogeneous
network (where nodes denote entities of similar type) to lower di-
mensional vectors, which can be used to represent the nodes. It has
been shown that such continuous node representations outperform
conventional graph algorithms [2] on several node based downstream
mining tasks like node classification, community detection, etc.
Edges are also important components of a network. From the point
of downstream network mining analytics, there are plenty of network
applications - such as computing edge betweenness centrality [20]
and information diffusion [24] - which heavily depend on the infor-
mation flow in the network. Compared to the conventional down-
stream node embedding tasks (such as node classification), these
tasks are more complex in nature. But similar to node based ana-
lytics, there is a high chance to improve the performance of these
tasks in a continuous lower dimensional vector space. Thus, it makes
1 IBM Research & IISc, Bangalore, email: [email protected]
2 Indian Institute of Science, Bangalore, email: [email protected]
3 Indian Institute of Science, Bangalore, email: [email protected]
4 IBM Research, Bangalore, email: [email protected]
sense to address these problems in the context of network embed-
ding via direct representation of the edges of a network. As a first
step towards this direction, it is important to design dedicated edge
embedding schemes and validate the quality of those embeddings on
some basic edge-centric downstream tasks.
(a) Synthetic Graph
(b) node2vec
(c) line2vec
Figure 1: Edge Visualization: (a) We created a small synthetic net-
work with two communities. So, there are three types of edges: Green
(or red) edges with both the end points belonging to the green (or red
respectively) community; Blue edges with end points belonging to
two different communities. (b) node2vec embedding (8 dimensional)
of the edges obtained by taking average of the embeddings of the end
vertices and then used t-SNE for visualization. (c) Direct edge em-
beddings (8 dimensional) obtained by line2vec and then used t-SNE
for visualization. Clearly, line2vec is superior which visually sepa-
rates the edge communities, compared to that with the conventional
way of aggregating node embeddings to obtain edge representation.
In the literature, there are indirect ways to compute embedding
of an edge in an information network. For tasks like link predic-
tion, where a classifier needs to be trained on both positive (existing)
and negative (not existing) edge representations, a simple aggrega-
tion function [12] such as vector average or Hadamard product has
been used on the representations of the two end vertices to derive
the vector representation of the corresponding edge. Typically node
embedding algorithms use the homophily property [18] by respecting
different orders of node proximities in a network. As the inherent ob-
jective functions of these algorithms are focused on the nodes of the
network, using an aggregation function on these node embeddings
to get the edge embedding could be suboptimal. We demonstrate the
shortcoming of this approach in Figure 1, where the visualization of
the edge embeddings derived by aggregating node embeddings (tak-
ing average of the two end nodes) from node2vec [12] on a small
synthetic graph do not maintain the edge community structure of the
network. Whereas, a direct edge embedding approach line2vec, to be
proposed in this paper, completely adheres to the community struc-
ture, as edges of different types are visually segregated in the t-SNE
plot of the same shown in 1(c). So there is a need to develop algo-
rithms for directly embedding edges (i.e., not via aggregating node
embeddings) in information networks. We address this research gap
in this paper in a natural way. Following are the contributions:
• We propose a novel edge embedding framework line2vec, for ho-
mogeneous social and information networks. To the best of our
knowledge, this is the first work to propose a dedicated unsuper-
vised edge embedding scheme which avoids aggregation of the end
node embeddings.
• We exploit the concept of line graph for edge representation by
converting the given network to a weighted line graph. We fur-
ther introduce the concept of collective homophily to embed the
line graph and produce the embedding of the edges of the given
network.
• We conduct experiments on three edge-centric downstream tasks.
Though our approach is proposed for embedding edges, we further
analyze to show that, a set of robust node embeddings, which are
not just the aggregation of edges, are also generated in the process.
• We experimentally discover the non-trivial connection of the clas-
sical concept of node centrality with the optimization framework
of line2vec. The source code of line2vec is available at https:
//bit.ly/2kfiS2l to ease the reproducibility of the results.
Though edge centric network mining tasks such as edge central-
ity, network diffusion and link prediction can be benefited from edge
embeddings, applications of edge embeddings to tackle them is non-
trivial and needs a separate body of work. For example, finding cen-
tral edges in the network amounts to detecting a subset of points in
the embedding space which are diverse between each other and rep-
resent a majority of the other points. We leave them to be addressed
in some future work.
2 Related Work and Research Gaps
Node embedding in information network has received great interest
from the research community. We refer the readers to the survey arti-
cles [33] for a comprehensive survey on network embedding and cite
only some of the more prominent works in this paragraph. DeepWalk
[22] and node2vec [12] are two node embedding approaches which
employ different types of random walks to capture the local neigh-
borhood of a node and maximize the likelihood of the node context.
Struc2vec [23] is another random walk based strategy which finds
similar embeddings for nodes which are structurally similar. A deep
autoencoder based node embedding technique (SDNE) that preserves
structural proximity is proposed in [31]. Different types of node em-
bedding approaches for attributed networks are also present in the
literature [35, 3, 9]. A semi-supervised graph convolution network
based node embedding approach is proposed in [14] and further ex-
tended in GraphSAGE [13] which learns the node embeddings with
different types of neighborhood aggregation methods on attributes.
Recently, node embedding based on semi-supervised attention net-
works [28], maximizing mutual information [29], and in the presence
of outliers [4] are proposed.
Compared to the above, representing edges in information net-
works is significantly less matured. Some preliminary works ex-
ist which use random walk on edges for community detection in
networks [15] or to classify large-scale documents into large-scale
hierarchically-structured categories [11]. [1] focuses on the asym-
metric behavior of the edges in a directed graph for deriving node
embeddings, but it represents a potential edge just by a scalar which
determines its chance of existence. [25, 30] derive embeddings for
different types of edges in a heterogeneous network, but their pro-
posed method essentially uses an aggregation function inside the op-
timization framework to generate edge embeddings from the node
embeddings. For knowledge bases, embedding entities and relation
types in a low dimensional continuous vector space [5, 7, 10] have
been shown to be useful. But, several fundamental concepts of graph
embedding, such as homophily, are not directly applicable to them.
[19] proposes a dual-primal GCN based semi-supervised node em-
bedding approach which first aggregates edge features by convolu-
tion, and then learns the node embeddings by employing a graph
attention on the incident edge features of a node. To the best of
our knowledge, [36] is the only work which proposes a supervised
approach based on adversarial training and an auto-encoder, purely
for edge representation learning in homogeneous networks. But their
framework needs a large amount of labelled edges to train the GAN,
which makes it restrictive for real world applications. Hence in this
paper, we propose a task-independent unsupervised dedicated edge
embedding framework for homogeneous information networks to ad-
dress the research gaps.
3 Problem Description
An information network is typically represented by a graph G =
(V, E, W ), where V = {v1, v2,··· , vn} is the set of nodes (a.k.a.
vertices), each representing a data object. E ⊆ {(vi, vj)vi, vj ∈ V }
is the set of edges. We assume, E = m. Each edge e ∈ E is
associated with a weight wvi,vj > 0 (1 if G is unweighted), which
indicates the strength of the relation. Degree of a node v is denoted
as dv, which is the sum of weights of the incident edges. N (v) is the
set of neighbors of the node v ∈ V . For the given network G, the
edge representation learning is to learn a function f : e (cid:55)→ x ∈ RK,
i.e., it maps every edge e ∈ E to a K dimensional vector called edge
embedding, where K < m. These edge embeddings should preserve
the underlying edge semantics of the network, as described below.
Edge Importance: Not all the edges in a network are equally im-
portant. For example, in a social network, millions of fans can be
connected to a movie star. But any two fans of a movie star may not
be similar to each other. So this type of connections are weaker com-
pared to an edge which connects two friends who have much lesser
number of connections individually [16].
Edge Proximity: The edges which are close to each other in terms
of their topography or semantics should have similar embeddings.
Similar to the concepts of node proximities [31], it is easy to define
first and higher order edge proximities via incidence matrix.
4 Solution Approach: line2vec
We propose an elegant solution (referred as line2vec) to embed each
edge of the given network. First we map the network to a weighted
line graph, where each edge of the original network is transformed
into a node.Then we propose a novel approach for embedding the
nodes of the line graph, which essentially provides the edge embed-
dings of the original network. For simplicity of presentation, we as-
sume that the given network is undirected. Nevertheless, it can triv-
ially be generalized for directed graphs.
4.1 Line Graph Transformation
Given an undirected graph G = (V, E), the line graph L(G)
is the graph such that each node of L(G) is an edge in G and
two nodes of L(G) are neighbors if and only if their correspond-
ing edges in G share a common endpoint vertex [32]. Formally
L(G) = (VL, EL) where VL = {(vi, vj) : (vi, vj) ∈ E} and
EL = {(cid:0)(vi, vj), (vj, vk)(cid:1) : (vi, vj) ∈ E , (vj, vk) ∈ E}. Figure 2
shows how to convert a graph into the line graph [8]. Hence the line
graph transformation induces a bijection from the set of edges of the
given graph to the set of nodes of the line graph as l : e (cid:55)→ v where
∀e ∈ E, ∃ v ∈ VL and if two edges ei, ej ∈ E are adjacent there
will be an corresponding edge e ∈ EL in the line graph.
Figure 2: Transformation process of a graph into its line graph. (a)
Represents an information network G. (b) Each edge in the original
graph has a corresponding node in the line graph. Here the green
edges represent the nodes in line graph. (c) For each adjacent pair of
edges in G there exists an edge in L(G). The dotted lines here are
the edges in the line graph. (d) The line graph L(G) of the graph G
4.2 Weighted Line Graph Formation
We propose to construct a weighted line graph for our problem even
if the original graph is unweighted. These weights would help the
random walk in the later stage of line2vec to focus more on the rel-
evant nodes in the line graph. It is evident from Section 4.1 that a
node of degree k in the original graph G produces k(k − 1)/2 edges
in the line graph L(G). Therefore high degree nodes in the origi-
nal graph may get over-represented in the line graph. Often many
of these incident edges are not that important to the concerned node
in the given network, but they can potentially change the movement
frequency of a random walk in the line graph. We follow a simple
strategy to overcome this problem. The goal is to ensure that the line
graph not only reflects the topology of the original graph G (which is
guaranteed by Whitney graph isomorphism theorem [32] in almost
all cases) but also the dynamics of the graph is not affected by the
transformation process. The edge weights are defined to facilitate a
random walk on L(G), as described in Section 4.3.1. Intuitively if
we start a random walk from a node vij ≡ (vi, vj) ∈ L(G) and
want to traverse to vjk ≡ (vj, vk) ∈ L(G), then it is equivalent to
selecting the node vj ∈ G from (vi, vj) and move to vk ∈ G. If G
is undirected, we define the probability of choosing vj to be propor-
tional to
. Here, dvi and dvj are the degrees of the end point
nodes of the edge (vi, vj) and an edge in general is more important
to the endpoint node having lower degree than the other endpoint
with a higher degree [16]. Then selecting vk is proportional to edge
weight of ejk ≡ (vj, vk) ∈ E. Hence, for any two adjacent edges
eij ≡ (vi, vj) and ejk ≡ (vj, vk), we define the edge weight for the
edge (eij, ejk) of the line graph L(G) as follows:
dvi +dvj
dvi
w(eij ,ejk) =
di
di + dj
×
(1)
wjk(cid:80)
r∈N (vj )
wjr − wij
This completes the formation of the weighted line graph from any
given network.
4.3 Embedding the Line Graph
Here we propose a novel approach to embed the nodes of the line
graph. Line graph is a special type of graph which comes with some
nice properties. Below is one important observation that we exploit
in embedding the line graph.
Lemma 1 Each (non-isolated) node in the graph G induces a
clique in the corresponding line graph L(G).
Proof 1 Let's assume that a (non-isolated) node v in the graph G
has nv edges connected to it. So these nv edges are neighbors of
each other. Hence in the corresponding line graph L(G), each of
these edges would be mapped to a node and each of these nodes is
connected to all the other nv − 1 nodes. Thus there is a clique of size
nv induced in the line graph by node v.
This can be visualized in Fig. 2, where the node 1 in (a) with de-
gree 3 induces a clique of size 3, including the nodes (1,2), (1,3) and
(1,4) into the corresponding line graph in (d). Lemma 1 is interesting
because it tells that the nodes of the line graph exhibit some col-
lective property, rather than just pairwise property. To clarify, in the
given network, two nodes are pairwise connected by an edge, but in
the line graph, a group of nodes form a clique. Pairwise homophily
[18], which has been the backbone to many standard embedding al-
gorithms [31], is not sufficient for embedding the line graph. Hence
we propose a new concept 'collective homophily' applicable to the
line graph. We explain it below.
Figure 3: Collective Homophily ensures the embeddings of the edges
which are connected via a common node in the network, stay within
a sphere of small radius.
4.3.1 Collective Homophily and Cost Function Formulation
We emphasize that all the nodes, which are part of a clique in a line
graph, should be close to each other in the embedding space. One
way to enforce collective homophily is to introduce a sphere (of small
radius R ∈ R) in the embedding space and ensure that embedding of
the nodes (in the line graph) which are part of a clique, remain within
the sphere. Hence any two embeddings within a sphere are at a maxi-
mum of 2R distance apart from each other. The concept is explained
in Fig. 3. Smaller the radius R, embeddings of the neighbor edges
would be closer to each other and hence the better the enforcement
of collective homophily. Note that a sum of pairwise homophily loss
in the embedding space may lead to some pairs being very close to
each other and others may still be quite far. So, we formulate the
objective function to embed the (weighted) line graph as follows.
Let us introduce some notation. Bold face letters like u (or v)
denote a node in the line graph L(G), which can also be denoted
by uuv when the correspondence with the edge (u, v) ∈ E in the
original graph G is required. Normal face letters like u, v denote
nodes in the given graph. xv ∈ RK (equivalently xuv) denotes the
embedding of the node vuv in line graph (or the edge (u, v) ∈ E).
To map the nodes of the line graph to vectors, first we want to pre-
serve different orders of node proximities in the line graph. For this, a
truncated random walk based sampling strategy S is used to provide
a set of nodes NS(v) as context to a node v in the network. Here we
employ the random walk proposed by [12], which balances between
the BFS and DFS search strategy in the graph. As the generated line
graph is a weighted one, we consider the weights of the edges while
computing the node transition probabilities. Let X denote the matrix
with each row as the embedding xv of a node v of the line graph. As-
suming conditional independence of the nodes, we seek to maximize
(w.r.t. X) the log likelihood of the context of a node as:
log P (NS(v)xv) =
log P (v
(cid:48)xv)
(cid:88)
(cid:88)
v∈VL
v(cid:48)∈NS (v)
(cid:88)
v∈VL
Each of the above probabilities can be represented using standard
softmax function parameterized by the dot product of xv(cid:48) and xv. As
usual, we also approximate the computationally expensive denomi-
nator of the softmax function using some negative sampling strategy
¯N (v) for any node v. The above equation, after simple algebraic
manipulations, leads to maximizing the following:
xv(cid:48) · xv − NS(v) log
exp(x¯v · xv)
(cid:16) (cid:88)
(cid:17)
¯v∈ ¯N (v)
(2)
(cid:88)
(cid:88)
v∈VL
v(cid:48)∈NS (v)
Next, we implement the concept of collective homophily as pro-
posed above. Each node u ∈ V (in the original network) induces a
clique in the line graph (Lemma 1). An edge (u, v) ∈ E corresponds
to the node vuv ∈ VL in the line graph. So we want all the nodes
of the form vuv ∈ VL belong to a sphere centered at cu ∈ RK and
of radius Ru, where v ∈ N (u) (neighbors of u). As collective ho-
mophily suggests that embeddings of these nodes must be close to
each other, we minimize the sum of all such radii. This with Eq. 2
gives the final cost function of line2vec as follows.
(cid:17)
exp(x¯v · xv)
(cid:104)NS(v) log
(cid:88)
− (cid:88)
v∈VL
xv(cid:48) · xv
(cid:16) (cid:88)
(cid:105)
+ α
¯v∈ ¯N (v)
(cid:88)
u∈V
v(cid:48)∈NS (v)
xuv − cu2
Ru ≥ 0, ∀u ∈ V
R2
u
(3)
2 ≤ R2
u, ∀v ∈ N (u), ∀u ∈ V
min
X,R,C
such that,
2 ≤
Here, α is a positive weight factor. The constraint xuv − cu2
u ensures that nodes of the form xuv belong to the sphere of radius
R2
Ru and centered at cu. We use R and C to denote set of all such radii
and centers respectively.
4.3.2 Solving the Optimization
Equation 3 is a non-convex constrained optimization problem. We
use penalty functions [6] technique to convert this to an uncon-
strained optimization problem as follows:
(cid:17)
exp(x¯v · xv)
min
X,R,C
(cid:88)
− (cid:88)
(cid:88)
v(cid:48)∈NS (v)
(cid:16) (cid:88)
(cid:104)NS(v) log
(cid:88)
(cid:88)
u∈V
g(xuv − cu2
xv(cid:48) · xv
v∈VL
(cid:105)
+ α
R2
u
+ λ
¯v∈ ¯N (v)
u∈V
v∈N (u)
2 − R2
u) +
(cid:88)
u∈V
(4)
γug(−Ru)
Here the function g : R → R is defined as g(t) = max(t, 0). So
it imposes a penalty to the cost function in Eq. 4 when the argument
inside g is positive, i.e., when there is a violation of the constraints
in Eq. 3. We use a linear penalty g(t) as the gradient does not van-
ish even when t → 0+. To solve the unconstrained optimization in
Eq. 4, we use stochastic gradient descent, computing gradients w.r.t.
each of X, R and C. We take subgradient when t = 0 for g(t). All
the penalty parameters λ and γu's corresponding to penalty func-
tions are positive. When there is any violation of a constraint (or sum
of constraints), the corresponding penalty parameter is increased to
impose more penalty. We give more importance to the type of con-
straints Ru ≥ 0, as violation of them may change the intuition of the
solution. So we use different penalty parameters for each of them, so
imposing a different penalty to each of such constraints is possible.
One can show that under appropriate assumptions, any convergent
subsequence of solutions to the unconstrained penalized problems
must converge to a solution of the original constrained problem [6].
Very small values of the penalty parameters might lead to the vio-
lation of constraints, and very large values would make the gradient
descent algorithm oscillate. So, we start with smaller values of λ and
γu's and keep increasing them until all the constraints are satisfied
or the gradients become too large making abrupt function changes.
Note that, theoretically some of the constraints in Eq. 3 may still be
violated, but experimentally we found them satisfied up to a large
extent (Section 5). In the final solution, xv gives the vector represen-
tation of node v of the line graph, which is essentially the embedding
of the corresponding edge in the original network.
4.4 Key Observations and Analysis
Both the edge embedding properties mentioned in Section 3 are pre-
served in the construction and embedding of the weighted line graph.
Particularly, if two edges have a common incident node in the orig-
inal network, the corresponding two nodes in the transformed line
graph would be neighbors. Also two edges having similar neighbor-
hood in the original network lead to two nodes having similar neigh-
borhood in the transformed line graph. The random walk and collec-
tive homophily preserve both pairwise and collective node proxim-
ity of the line graph in the embedding space. Thus different orders
of edge proximities of the original network is captured well in the
edge embeddings. Also the construction of edge weights in line graph
(Sec. 4.2) ensures that underlying importance of edges of the original
network is preserved in the transformed line graph, and hence in the
embeddings through truncated random walk.
(cid:80)
du(du−1)
(cid:0)du
(cid:1) = (cid:80)
Time Complexity: Edge embedding is computationally difficult
than node embedding, as the number of edges in a real life net-
work is more than the number of nodes. From Lemma 1, each node
u in the original network induces a clique of size du (degree of
u in G). Hence total number of edges in the line graph is: mL =
≤ V d2, where d is the maximum de-
u∈V
gree of a node in the given network. So, the construction of line
graph would take O(V d2) time. Next, we use alias table for fast
computation of the corpus of node sequences in O(mL log(mL)) =
O(V d2 log(V d)) by the random walks, assuming the number of
random walks on the line graph, maximum length of a random walk,
context window size and the number of negative samples for each
node to be constant, as they are the hyper parameters of skip-gram
model. Then, the first term (under the sum over the nodes in VL) of
Eq. 4 can be computed in O(VL) = O(E) time. Next, the term
weighted by α can be computed in O(V ) time. Then, for the term
u∈V
2
2
weighted by λ, we need to visit each node in V and for each such
node, its neighbors in the original graph, which can be computed in
a total of O(E) time. The last term of Eq. 4 can be computed in
O(V ) time. As we use penalty methods to solve it, the runtime of
solving Eq. 4 is O(E + V ). Hence the total runtime complexity
of line2vec is O(V d2 log(V d)). So in the worst case, (for e.g., a
nearly complete graph), run time complexity is O(V 3logV ). But
for most of the real life social networks, the maximum degree can
be considered as a constant (i.e., does not grow with the number of
nodes). Hence for them, the run time complexity is O(V logV ).
5 Experimental Evaluation
We conduct detailed experiments on three downstream edge centric
network mining tasks and thoroughly analyze the proposed optimiza-
tion framework of line2vec.
5.1 Design of Baseline Algorithms
Unsupervised direct edge embedding for information network itself
is a novel problem. Existing approaches only aggregate the embed-
dings of the two end nodes to find the embedding of an edge. So as
baselines, we only consider the publicly available implementation of
a set of popular unsupervised node embedding algorithms which can
work only using the link structure of the graph: DeepWalk, node2vec,
SDNE, struc2vec and GraphSage (official unsupervised implemen-
tation for the un-attributed networks). We have considered differ-
ent types of node aggregation methods such as taking the average,
Hadamard product, vector norms of two end node embeddings [12]
to generate the edge embeddings for the baseline algorithms. It turns
out that average aggregation method performs the best among them.
So we report the performance of the baseline methods with average
node aggregation, where embedding of an edge (u, v) is computed
by taking the average of the node embeddings of u and v.
5.2 Datasets Used and Setting Hyper-parameters
We used five real world publicly available datasets for the ex-
periments. A summary of the datasets is given in Table 1. For
Zachary's karate club and Dolphin social network (http://
www-personal.umich.edu/mejn/netdata/),
there are
no ground truth community labels given for the nodes. So we use
the modularity based community detection algorithm, and label the
nodes based on the communities they belong to. For Cora, Pubmed
(https://linqs.soe.ucsc.edu/data) and MSA [26], the
ground truth node communities are available. The ground truth edge
labels are derived as follows. If an edge connects two nodes of the
same community (intra community edge), the label of that edge is
the common community label. If an edge connects nodes of different
communities (inter community edge), then that edge is not consid-
ered for calculating the accuracy of downstream tasks. Note that, all
the edges (both intra and inter community) are considered for learn-
ing the edge embeddings. We also provide the size of the generated
weighted line graphs in Table 1. Note that, line graphs are still ex-
tremely sparse in nature, which enables the application of efficient
data structures and computation on sparse graphs here.
We set the parameter α in Eq. 3 to be 0.1 in the experiments. At
that value, the two components in the cost function in Eq. 3 con-
tribute roughly the same to the total cost in the first iteration of
line2vec. The dimension (K) of the embedding space is set as 8 for
Karate club and Dolphin social network as they are small in size,
Table 1: Summary of the datasets used.
Dataset
Zachary's Karate club
Dolphin social network
Cora
Pubmed
MSA
#Nodes
34
62
2708
19717
30101
#Edges
78
159
5278
44327
204926
#Edge-Labels
#Nodes in L(G)
#Edges in L(G)
3
4
7
3
3
78
159
5278
44327
204926
528
923
52301
699385
6149555
and it is set as 128 for the other three larger datasets (for all the algo-
rithms). For the faster convergence of SGD, we set the initial learning
rate higher and decrease it over the iterations. We vary the penalty pa-
rameters in Eq. 4 over the iterations as discussed in Section 4.3.2 to
ensure that the constraints are satisfied at large.
(cid:80)
ical error (cid:80)
value very close to zero and negative error (cid:80)
5.3 Penalty Errors of line2vec Optimization
We have shown the values of two different penalty errors (or con-
straint violation error of the penalty method based optimization) over
the iterations of line2vec in Figure 5. For all the datasets, total spher-
u) converges to a small
g(−Ru) remains to
be zero. This means, almost all the constraints of line2vec formula-
tion are satisfied in the final solution.
g(xuv − cu2
2 − R2
u∈V
u∈V
v∈N (u)
5.4 Downstream Edge Mining Tasks
Edge visualization: It is important to understand if the edge embed-
dings are able to separate the communities visually. We use the em-
bedding of the edges as input in RK, and use t-SNE [17] to plot the
edge embedding in a 2 dimensional space. Fig. 4 shows the edge vi-
sualizations by line2vec, along with the baselines algorithms on Cora
datasets. Note that, line2vec is able to visually separate the commu-
nities well compared to all the other baselines. The same trend was
observed even in Fig. 1 for the small synthetic network. Line2vec, be-
ing a direct approach for edge embedding via collective homophily,
outperforms all the baselines which aggregate node embeddings to
generate the embeddings for the edges.
Edge Clustering: Like node clustering, edge clustering is also im-
portant to understand the flow of information within and between the
communities. For clustering the embeddings of the edges, we apply
KMeans++ algorithm. To evaluate the quality of clustering, we use
unsupervised clustering accuracy [34] which uses different permuta-
tions of the labels and chooses the assignment which gives best possi-
ble accuracy. Figure 6a shows that line2vec outperforms all the base-
lines for edge clustering on all the datasets. DeepWalk and node2vec
also perform well among the baselines.
Multi-class Edge Classification: We use only 10% edges with
ground truth label (as generated in Section 5.2) as the training set,
because getting labels is expensive in networks. A logistic regression
classifier is trained on the edge embeddings generated by different al-
gorithms. The performance on the test set is reported using Micro F1
score. Figure 6b shows that line2vec is better or highly competitive
with the state-of-the-art embedding algorithms. node2vec and Deep-
Walk follows line2vec closely. On the Dolphin dataset, node2vec
outperforms line2vec marginally. Performance of line2vec for edge
classification again shows the superiority of a direct edge embedding
scheme over the node aggregation approaches.
5.5 Ablation Study of line2vec
The idea of line2vec is to embed the line graph for generating the
edge embeddings of a given network. There are two main novel com-
(a) DeepWalk
(b) node2vec
(c) SDNE
(d) struc2vec
(e) GraphSAGE
(f) line2vec
Figure 4: Edge visualization on Cora dataset. Different colors represent different edge communities.
(a) Spherical Error
Figure 5: Both spherical error (cid:80)
and non-negative error (cid:80)
2 − R2
u)
g(−Ru) in the penalty function based
optimization of line2vec converge to zero very fast on all the datasets.
(b) Non-negative Error
g(xuv − cu2
(cid:80)
u∈V
v∈N (u)
u∈V
ponents in line2vec: first, the construction of weighted line graph;
and second, more importantly, proposing the concept of collective
homophily on the weighted line graph. In this subsection, we show
the incremental benefit of each component through a small experi-
ment of edge visualization on the Dolphin dataset, as shown in Fig.
7. We use node2vec (N2V) as the starting point because the skip-
gram objective component of line2vec (L2V) is similar to node2vec.
Though, visually there is not much difference between Sub-figures
7a and 7b, but there is some improvement when we apply node2vec
on the weighted line graph (without using collective homophily) in
Sub-fig. 7c. Finally, superiority of line2vec because of using collec-
tive homophily on the weighted line graph is clear from Sub-fig. 7c.
Thus, both the novel components of line2vev have their incremental
benefits for the overall algorithm.
5.6 Parameter Sensitivity of line2vec
Figure 8 shows the sensitivity of line2vec with respect to the hyper-
parameter α (in Eq. 3 of the main paper) on Karate and Dolphin
datasets. We have shown the variation of performance for node clas-
sification (both micro and macro F1 scores) and node clustering (un-
supervised accuracy). From the figure, one can observe that optimal
performance in most of the cases is obtained when the value of α is
from 0.05 to 0.1. Around these values, the loss from both the com-
ponents of line2vec in Eq. 3 are close to each other. For our other
experiments, we fix α=0.1 for all the datasets.
Interpretation of cu as Node Embedding
5.7
line2vec is dedicated for direct edge embedding in information net-
works. Lemma 1 suggests that each node in the given network G
induces a clique in the line graph L(G). Based on the concept of col-
lective homophily, corresponding to a node u in G, the clique in the
line graph is enclosed by a sphere centered at cu ∈ RK (Eq. 3). In-
tuitively, the center acts as a point which is close to the embeddings
of all the nodes in the clique induced by u (or equivalently, all the
edges incident on u in G). Hence the role of this center in the em-
bedding space is similar to the role of the node to its adjacent edges
in the graph. This motivates us to consider cu as the node embedding
of u ∈ V in G. If (u, v) ∈ E, then the edge embedding of (u, v)
should be close to both cu and cv, which in turn pulls cu and cv
close to each other. Thus, node proximities are also captured in cu.
We use clustering of the nodes (a.k.a. community detection) of the
given network to validate the quality of node embedding obtained
from the centers of the line2vec optimization. We use k-means++
clustering, as before, on the set of points cu, ∀u ∈ V and validate
the clustering quality by using unsupervised accuracy [4]. Figure 6c
shows that line2vec, though designed specifically for edge embed-
ding, performs really good for a node based mining task. Specifically,
for Karate and Dolphins networks, the gain is significantly more than
best of the baselines. This result is interesting as we aimed to find
edge embeddings, but also generate a set of efficient node embed-
dings, which are not just the aggregation of the incident edges.
5.8 Connection of Node Centrality with Ru
This subsection analyzes the interpretation of the radius Ru of the
sphere enclosing the clique induced by node u ∈ V in the embed-
ding space. When a node u has less number of incident edges, and the
neighbors are very close to each other in the embedding space (for
e.g., they are all from the same sub-community), a small radius Ru
should be enough to enclose all the edges incident on u. But when
the neighbors of the node u are diverse in nature, the corresponding
edges would also be different in terms of strength and semantics. For
example, an influential researcher may be directly connected to many
other researchers in a research network, but only few of them can be
direct collaborators. Hence, a larger sphere is needed to enclose the
clique in the line graph induced by such a node. This intuition con-
nects radius Ru of a sphere in the embedding space of line graph to
the centrality [27] of the node u in the given network. A node which
is loosely connected (i.e., less number or very similar neighbors) in
the network is less central, and a node which is strongly connected
(many or diverse set of neighbors) is considered as highly central.
As real life networks are noisy [4], first we experiment with a small
synthetic graph as shown in Figure 9 to show the connection between
Ru and the centrality of the node u ∈ V . It has three communities
and there is a central (red colored) node connecting all the commu-
nities. Each community has three sub-communities which are con-
nected via the green colored nodes. The degree of each node in this
network is kept roughly the same. We use closeness centrality [21],
which is used widely in the network analysis literature. The closeness
centrality of the nodes are plotted in Fig. 9(b). The nodes in the y-axis
are sorted based on their closeness centrality values and as expected,
the red node top the list as it is well connected to all the communi-
ties, followed by the green nodes, with yellow nodes placed at the
bottom. We run line2vec on this synthetic graph and plot the Radius
Ru for each node u in Fig. 9(c). Here also, the nodes are sorted in
(a) Edge Clustering
(b) Edge Classification
(c) Node Clustering
Figure 6: Performance Comparisons: (a) Micro F1 Score of Edge Classification. (b) Edge Clustering with KMeans++. (c) Node Clustering with
KMeans++. Here we use cu as the embedding of the node u in the given network.
(a) N2V
(b) N2V+LG (c) N2V+WLG
(d) L2V
Figure 7: Edge visualization on Dolphin Dataset by t-SNE: In the
following sub-figures, edge Embeddings are obtained (a) by using
node2vec on the input graph and then taking average of end node
embeddings for each edge, (b) by using node2vec on an unweighted
(conventional) line graph, (c) by using node2vec on our proposed
weighted line graph, (d) by line2vec. Clearly, there is an incremental
improvement of the quality because of using weighted line graph
and then collective homophily as reflected in (c) and (d) respectively.
(a) Edge Classification
(b) Edge Clustering
Figure 8: Sensitivity of line2vec with respect to the hyper-parameter
α (in Eq. 3 of the main paper) on Karate and Dolphin datasets: We
have shown the variation of performance for edge classification (Mi-
cro F1 score) and edge clustering (unsupervised accuracy).
the same order as in sub-figure 9(b). As one can see, the red node has
the highest value of the radius. As this node is connected to a diverse
set of nodes in the network, it needs a larger sphere to enclose the
induced clique in the line graph. We also observe that most of the
green nodes have higher values of Ru than that of the yellow nodes.
The correlation coefficient between the closeness centrality and the
radius Ru is 0.56. A more prominent trend can be observed for be-
tweenness centrality [27], where the correlation coefficient with the
radius Ru is 0.86.
On all the real-world datasets, we show the correlation of Ru with
the two centrality metrics for all the nodes in Table 2. High positive
correlation between them can conclude that radius Ru of a node is
roughly proportional to the centrality of the node u in the network.
However, a detailed analysis is required to see the scope of introduc-
ing a new type of node centrality based on the values of Ru.
(a)
(b)
(c)
Figure 9: Relationship between radius Ru associated with each node
and closeness centrality in a synthetic graph. (a) shows the structure
of the synthetic network. (b) shows the closeness centrality of the
nodes, where in Y axis, nodes are sorted based on their centrality
values. (c) shows the Ru for all the nodes. Nodes in Y-axis of (c) are
sorted in the same order as in (b). The colors of the lines in (b) and
(c) correspond to three different types of nodes (colored accordingly)
in (a). This figure also shows the high overlap between the top few
nodes in both the lists.
Table 2: Pearson Correlation-Coefficient(CC) values obtained be-
tween the radius(Ru) and centrality values of nodes for different net-
works. The centrality measures considered here are Betweenness and
Closeness centrality.
Dataset
Betweenness CC
Closeness CC
Karate
0.81
0.68
Dolphins
0.66
0.78
Cora
0.29
0.79
Pubmed MSA
0.35
0.72
0.26
0.59
6 Discussion and Future Work
We proposed a novel unsupervised dedicated edge embedding frame-
work for homogeneous information and social networks. We convert
the given network to a weighted line graph and introduce the con-
cept of collective homophily to embed the weighted line graph. Our
framework is quite generic. The skip-gram based component in the
objective function of line2vec can easily be replaced with any other
approach like graph convolution in weighted line graph. Beside, we
also plan to extend this methodology for heterogeneous information
networks and knowledge bases. There are several edge centric appli-
cations in networks. This work, being the first one towards a direct
edge embedding, can play a basis to solve some of them in the con-
text of network embedding and help to move network representation
learning beyond node embedding.
REFERENCES
[1] Sami Abu-El-Haija, Bryan Perozzi, and Rami Al-Rfou, 'Learning edge
representations via low-rank asymmetric projections', in Proceedings
of the 2017 ACM on Conference on Information and Knowledge Man-
agement, pp. 1787 -- 1796. ACM, (2017).
bedding learning by comprehensive transcription of heterogeneous in-
formation networks', in Proceedings of the 24th ACM SIGKDD In-
ternational Conference on Knowledge Discovery & Data Mining, pp.
2190 -- 2199. ACM, (2018).
[26] Arnab Sinha, Zhihong Shen, Yang Song, Hao Ma, Darrin Eide, Bo-
june Paul Hsu, and Kuansan Wang, 'An overview of microsoft aca-
demic service (mas) and applications', in Proceedings of the 24th in-
ternational conference on world wide web, pp. 243 -- 246. ACM, (2015).
[27] Oskar Skibski, Talal Rahwan, Tomasz P Michalak, and Makoto Yokoo,
'Attachment centrality: An axiomatic approach to connectivity in net-
works', in Proceedings of the 2016 International Conference on Au-
tonomous Agents & Multiagent Systems, pp. 168 -- 176. International
Foundation for Autonomous Agents and Multiagent Systems, (2016).
[28] Petar Velickovi´c, Guillem Cucurull, Arantxa Casanova, Adriana
Romero, Pietro Lio, and Yoshua Bengio, 'Graph attention networks',
in International Conference on Learning Representations, (2018).
[29] Petar Velickovi´c, William Fedus, William L Hamilton, Pietro Li`o,
Yoshua Bengio, and R Devon Hjelm, 'Deep graph infomax', in Inter-
national Conference on Learning Representations, (2019).
Janu Verma, Srishti Gupta, Debdoot Mukherjee, and Tanmoy
Chakraborty, 'Heterogeneous edge embedding for friend recommenda-
tion', in European Conference on Information Retrieval, pp. 172 -- 179.
Springer, (2019).
[31] Daixin Wang, Peng Cui, and Wenwu Zhu, 'Structural deep network
embedding', in Proceedings of the 22nd ACM SIGKDD international
conference on Knowledge discovery and data mining, pp. 1225 -- 1234.
ACM, (2016).
[32] H. Whitney, 'Congruent graphs and the connectivity of graphs', Amer-
[30]
ican Journal of Mathematics, 54(1), 150 -- 168, (1932).
[34]
[33] Zonghan Wu, Shirui Pan, Fengwen Chen, Guodong Long, Chengqi
Zhang, and Philip S Yu, 'A comprehensive survey on graph neural net-
works', arXiv preprint arXiv:1901.00596, (2019).
Junyuan Xie, Ross Girshick, and Ali Farhadi, 'Unsupervised deep em-
bedding for clustering analysis', in International conference on ma-
chine learning, pp. 478 -- 487, (2016).
[35] Cheng Yang, Zhiyuan Liu, Deli Zhao, Maosong Sun, and Edward Y
Chang, 'Network representation learning with rich text information.',
in IJCAI, pp. 2111 -- 2117, (2015).
[36] Yang Zhou, Sixing Wu, Chao Jiang, Zijie Zhang, Dejing Dou, Ruom-
ing Jin, and Pengwei Wang, 'Density-adaptive local edge representa-
tion learning with generative adversarial network multi-label edge clas-
sification', in 2018 IEEE International Conference on Data Mining
(ICDM), pp. 1464 -- 1469. IEEE, (2018).
[2] Lada A Adamic and Eytan Adar, 'Friends and neighbors on the web',
Social networks, 25(3), 211 -- 230, (2003).
[3] Sambaran Bandyopadhyay, Harsh Kara, Aswin Kannan,
and
M Narasimha Murty, 'Fscnmf: Fusing structure and content via
non-negative matrix factorization for embedding information net-
works', arXiv preprint arXiv:1804.05313, (2018).
[4] Sambaran Bandyopadhyay, N Lokesh, and M Narasimha Murty, 'Out-
lier aware network embedding for attributed networks', in Proceedings
of the AAAI Conference on Artificial Intelligence, volume 33, pp. 12 --
19, (2019).
[5] Antoine Bordes, Nicolas Usunier, Alberto Garcia-Duran, Jason Weston,
and Oksana Yakhnenko, 'Translating embeddings for modeling multi-
relational data', in Advances in neural information processing systems,
pp. 2787 -- 2795, (2013).
[6] Kurt Bryan and Yosi Shibberu, 'Penalty functions and constrained opti-
mization', Dept. of Mathematics, Rose-Hulman Institute of Technology.
http:// www. rosehulman. edu/ bryan/lottamath/penalty. pdf, (2005).
[7] Muhao Chen and Chris Quirk, 'Embedding edge-attributed relational
hierarchies'. SIGIR, (2019).
[8] Tim S Evans and Renaud Lambiotte, 'Line graphs of weighted net-
works for overlapping communities', The European Physical Journal
B, 77(2), 265 -- 272, (2010).
[9] Hongchang Gao and Heng Huang, 'Deep attributed network embed-
ding.', in IJCAI, volume 18, pp. 3364 -- 3370, (2018).
[10] Zheng Gao, Gang Fu, Chunping Ouyang, Satoshi Tsutsui, Xiaozhong
Liu, Jeremy Yang, Christopher Gessner, Brian Foote, David Wild, Ying
Ding, et al., 'edge2vec: Representation learning using edge semantics
for biomedical knowledge discovery', BMC bioinformatics, 20(1), 306,
(2019).
[11] Mohammad Golam Sohrab, Toru Nakata, Makoto Miwa, and Yutaka
Sasaki, 'Edge2vec: Edge representations for large-scale scalable hier-
archical learning', Computaci´on y Sistemas, 21(4), 569 -- 579, (2017).
[12] Aditya Grover and Jure Leskovec, 'node2vec: Scalable feature learn-
ing for networks', in Proceedings of the 22nd ACM SIGKDD interna-
tional conference on Knowledge discovery and data mining, pp. 855 --
864. ACM, (2016).
[13] Will Hamilton, Zhitao Ying, and Jure Leskovec, 'Inductive representa-
tion learning on large graphs', in Advances in Neural Information Pro-
cessing Systems, pp. 1025 -- 1035, (2017).
[14] Thomas N Kipf and Max Welling, 'Semi-supervised classification
with graph convolutional networks', arXiv preprint arXiv:1609.02907,
(2016).
[15] Suxue Li, Haixia Zhang, Dalei Wu, Chuanting Zhang, and Dongfeng
Yuan, 'Edge representation learning for community detection in large
scale information networks', in International Workshop on Mobility
Analytics for Spatio-temporal and Social Data, pp. 54 -- 72. Springer,
(2017).
[16] David Liben-Nowell and Jon Kleinberg, 'The link-prediction problem
for social networks', Journal of the American society for information
science and technology, 58(7), 1019 -- 1031, (2007).
[17] Laurens van der Maaten and Geoffrey Hinton, 'Visualizing data us-
ing t-sne', Journal of machine learning research, 9(Nov), 2579 -- 2605,
(2008).
[18] Miller McPherson, Lynn Smith-Lovin, and James M Cook, 'Birds of
a feather: Homophily in social networks', Annual review of sociology,
27(1), 415 -- 444, (2001).
[19] Federico Monti, Oleksandr Shchur, Aleksandar Bojchevski, Or Litany,
Stephan Gunnemann, and Michael M Bronstein, 'Dual-primal graph
convolutional networks', arXiv preprint arXiv:1806.00770, (2018).
[20] M.E.J. Newman, Networks: An Introduction, Oxford University Press,
Oxford, UK, 2010.
[21] Tore Opsahl, Filip Agneessens, and John Skvoretz, 'Node centrality
in weighted networks: Generalizing degree and shortest paths', Social
networks, 32(3), 245 -- 251, (2010).
[22] Bryan Perozzi, Rami Al-Rfou, and Steven Skiena, 'Deepwalk: Online
learning of social representations', in Proceedings of the 20th ACM
SIGKDD international conference on Knowledge discovery and data
mining, pp. 701 -- 710. ACM, (2014).
[23] Leonardo FR Ribeiro, Pedro HP Saverese, and Daniel R Figueiredo,
'struc2vec: Learning node representations from structural identity', in
Proceedings of the 23rd ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining, pp. 385 -- 394. ACM, (2017).
[24] E. Rogers, Diffusion of Innovations, Free Press, New York, USA, 1995.
[25] Yu Shi, Qi Zhu, Fang Guo, Chao Zhang, and Jiawei Han, 'Easing em-
|
1701.03051 | 1 | 1701 | 2017-01-11T16:39:04 | Efficient Twitter Sentiment Classification using Subjective Distant Supervision | [
"cs.SI",
"cs.CL",
"cs.IR"
] | As microblogging services like Twitter are becoming more and more influential in today's globalised world, its facets like sentiment analysis are being extensively studied. We are no longer constrained by our own opinion. Others opinions and sentiments play a huge role in shaping our perspective. In this paper, we build on previous works on Twitter sentiment analysis using Distant Supervision. The existing approach requires huge computation resource for analysing large number of tweets. In this paper, we propose techniques to speed up the computation process for sentiment analysis. We use tweet subjectivity to select the right training samples. We also introduce the concept of EFWS (Effective Word Score) of a tweet that is derived from polarity scores of frequently used words, which is an additional heuristic that can be used to speed up the sentiment classification with standard machine learning algorithms. We performed our experiments using 1.6 million tweets. Experimental evaluations show that our proposed technique is more efficient and has higher accuracy compared to previously proposed methods. We achieve overall accuracies of around 80% (EFWS heuristic gives an accuracy around 85%) on a training dataset of 100K tweets, which is half the size of the dataset used for the baseline model. The accuracy of our proposed model is 2-3% higher than the baseline model, and the model effectively trains at twice the speed of the baseline model. | cs.SI | cs | Efficient Twitter Sentiment Classification using Subjective Distant Supervision
Tapan Sahni∗, Chinmay Chandak∗, Naveen Reddy ∗, Manish Singh†
Indian Institute of Technology, Hyderabad
Email: {cs13b1030, cs13b1011, cs13b1010, msingh}@iith.ac.in
7
1
0
2
n
a
J
1
1
]
I
S
.
s
c
[
1
v
1
5
0
3
0
.
1
0
7
1
:
v
i
X
r
a
Abstract-As microblogging services like Twitter are becoming
more and more influential in today's globalized world, its facets
like sentiment analysis are being extensively studied. We are no
longer constrained by our own opinion. Others' opinions and
sentiments play a huge role in shaping our perspective. In this
paper, we build on previous works on Twitter sentiment analysis
using Distant Supervision. The existing approach requires huge
computation resource for analyzing large number of tweets. In
this paper, we propose techniques to speed up the computation
process for sentiment analysis. We use tweet subjectivity to select
the right training samples. We also introduce the concept of
EFWS (Effective Word Score) of a tweet that is derived from
polarity scores of frequently used words, which is an additional
heuristic that can be used to speed up the sentiment classification
with standard machine learning algorithms. We performed our
experiments using 1.6 million tweets. Experimental evaluations
show that our proposed technique is more efficient and has
higher accuracy compared to previously proposed methods. We
achieve overall accuracies of around 80% (EFWS heuristic gives
an accuracy around 85%) on a training dataset of 100K tweets,
which is half the size of the dataset used for the baseline model.
The accuracy of our proposed model is 2-3% higher than the
baseline model, and the model effectively trains at twice the speed
of the baseline model.
I. INTRODUCTION
A lot of work has been done in the field of Twitter senti-
ment analysis till date. Sentiment analysis has been handled
as a Natural Language Processing task at many levels of
granularity. Most of these techniques use Machine Learning
algorithms with features such as unigrams, n-grams, Part-Of-
Speech (POS) tags. However, the training datasets are often
very large, and hence with such a large number of features, this
process requires a lot of computation power and time. The fol-
lowing question arises: What to do if we do not have resources
that provide such a great amount of computation power? The
existing solution to this problem is to use a smaller sample
of the dataset. For sentiment analysis, if we train the model
using a smaller randomly chosen sample, then we get low
accuracy [16, 17]. In this paper, we propose a novel technique
to sample tweets for building a sentiment classification model
so that we get higher accuracy than the state-of-the-art baseline
method, namely Distant Supervision, using a smaller set of
tweets. Our model has lower computation time and higher
accuracy compared to baseline model.
Users often express sentiment using subjective expression.
Although objective expressions can also have sentiment, it is
much rare. Determining subjectivity is quite efficient compared
to determining sentiment. Subjectivity can be determined for
individual tweets. But to do sentiment classification, we need
to build a classification model with positive and negative
sentiment tweets. The time to train a sentiment classification
model increases with the increase in the number of training
tweets. In this paper, we use tweet subjectivity to select the
best training tweets. This not only lowers the computation time
but also increases the accuracy because we have training data
with less noise. Even the created features will be more relevant
to the classification task. The computation cost will reduce due
to small training data size and better set of features. Thus if
users do not have enough computational resources, they can
filter the training dataset using a high value of subjectivf ity
threshold. This ensures reliable prediction on a smaller training
dataset, and eventually requires less computational time. The
above approach, and some of the intricacies that invariably
seep in, need to be considered, and are described in the later
sections of the paper. In this paper we also integrate a lot of
meticulous preprocessing steps. This makes our model more
robust, and hence leads to higher accuracy.
Along with the machine learning algorithms being used, we
use a heuristic-based classification of tweets. This is based on
the EFWS of a tweet, which is described in later sections.
This heuristic basically takes into account the polarity scores
of frequently used words in tweets, and is able to achieve
around 85% accuracy on our dataset, hence boosting the
overall accuracy by a considerable amount.
Our training data consists of generic (not topic-specific)
Twitter messages with emoticons, which are used as noisy
labels. We show that the accuracy obtained on a training
dataset comprising 100K tweets, and a test dataset of 5000
tweets gives an accuracy of around 80% on the following
classifiers: Naive Bayes, RBF-kernel Support Vector Machine,
and Logistic Regression. Our model takes roughly half the
time to train and achieves higher accuracy (than the baseline
model) on all the classifiers. Because the amount of training
time is expected to increase exponentially as the training data
increases, we expect our model to outperform (in terms of
higher accuracy) the baseline model at a speed which is at least
twofold the speed of the baseline model on larger datasets.
II. RELATED WORK
There has been a large amount of prior research in sentiment
analysis of tweets. Read [10] shows that using emoticons
as labels for positive and sentiment is effective for reducing
dependencies in machine learning techniques. Alec Go [1]
used Naive Bayes, SVM, and MaxEnt classifiers to train their
model. This, as mentioned earlier, is our baseline model. Our
model builds on this and achieves higher accuracy on a much
smaller training dataset.
Ayushi Dalmia [6] proposed a model with a more involved pre-
processing stage, and used features like scores from Bing Lius
Opinion Lexicon, and number of positive, negative POS tags.
This model achieved considerably high accuracies considering
the fact that their features were the not the conventional bag-
of-words, or any n-grams. The thought of using the polarity
scores of frequently used tweet words (as described in our
EFWS heuristic) was inspired from this work. [14] created
prior probabilities using the datasets for the average sentiment
of tweets in different spatial, temporal and authorial contexts.
They then used a Bayesian approach to combine these priors
with standard bigram language models.
Another significant effort in sentiment analysis on Twitter
data is by Barbosa [16]. They use polarity predictions from
three websites as noisy labels to train a model and use 1000
manually labelled tweets for tuning and another 1000 for
testing. They propose the use of syntax features of tweets like
punctuation, retweet, hashtags, link, and exclamation marks in
addition with features like prior polarity of words and POS of
words.
Some works leveraged the use of existing hashtags in the
Twitter data for building the training data. (Davidov, Tsur, and
Rappoport 2010) also use hashtags for creating training data,
but they limit their experiments to sentiment/non-sentiment
classification, rather than 3-way polarity classification, as
[15] does. Our model integrates some of the preprocessing
techniques this work used. Hassan Saif [9] introduced a novel
approach of adding semantics as additional features into the
training set for sentiment analysis. This approach works well
for topic specific data. Hence, we thought of taking a different
approach for a generic tweet dataset like ours.
III. SUBJECTIVITY
Subjectivity refers to how someone's judgment is shaped by
personal opinions and feelings instead of outside influences.
An objective perspective is one that
is not influenced by
emotions, opinions, or personal feelings - it is a perspective
based in fact,
in things quantifiable and measurable. A
subjective perspective is one open to greater interpretation
based on personal feeling, emotion, aesthetics, etc.
Subjectivity classification is another topic in the domain of
text classification which is garnering more and more interest
in the field of sentiment analysis. Since a single sentence may
contain multiple opinions and subjective and factual clauses,
this problem is not as straightforward as it seems. Below are
some examples of subjective and objective sentences.
the Earth
Objective sentence with no sentiment: So,
revolves around the Sun.
Objective sentence with sentiment: The drug relieved my
pain.
Subjective sentence with no sentiment: I believe he went
home yesterday.
Subjective sentence with sentiment: I am so happy you got
the scholarship.
convey any sentiment, while most of the purely subjective
sentences have a clear inclination towards either the positive
or negative sentiment. Sentences which are not completely
subjective or objective may or may not convey a sentiment.
Libraries like TextBlob, and tools like Opinion Finder can be
used to find the extent to which a sentence can be considered
subjective.
Since tweets are usually person-specific, or subjective, we
use this intuition to reduce the size of the training set by
filtering the sentences with a subjectivity level below a certain
threshold (fairly objective tweets).
IV. IMPLEMENTATION
In this section, we explain the various preprocessing tech-
niques used for feature reduction, and also the additional step
of filtering the training dataset using the subjectivity score of
tweets. We further describe our approach of using different
machine learning classifiers and feature extractors. We also
propose an additional heuristic for sentiment classification
which can be used as a tag-along with the learning heuristics.
A. Corpus
Our training dataset1 has 1.6 million tweets, and 5000
tweets in the test dataset. Since the test dataset provided
comprised only 500 tweets, we have taken part of the training
data (exactly 5000 tweets, distinct from the training dataset)
as the test dataset. We remove emoticons from our training
and test data. The table below shows some sample tweets.
Tweet
@MrZeroo00 Yeah! tks man
oh so bored...stuck at home
pizza night and i feel too sick
Sentiment
Positive
Negative
Negative
B. Subjectivity Filtering
This is a new step we propose to achieve higher accuracy on
a smaller training dataset. We use TextBlob to classify each
tweet as subjective or objective. We then remove all tweets
which have a subjectivity level/score (score lies between 0
and 1) below a specified threshold. The remaining tweets are
used for training purposes. We observe that a considerable
number of tweets are removed as the subjectivity threshold
increases. We show the effect of doing this procedure on the
overall accuracy in the evaluation section of the paper.
C. Preprocessing
The Twitter language model has many unique properties.
We take advantage of the following properties to reduce the
feature space. Most of the preprocessing steps are common
to most of the previous works in the field. However, we have
added some more steps to this stage of our model.
Classifying a sentence as subjective or objective provides
certain conclusions. Purely objective sentences do not usually
1The URL is http://twittersentiment.appspot.com/. This page has a link to
our training data and test data. It is also a public tool that other researchers
can use to build their own data sets.
1) Basic steps: We first strip off the emoticons from the
data. Users often include twitter usernames in their tweets in
order to direct their messages. We also strip off usernames
(e.g. @Chinmay) and URLs present in tweets because they
do not help us in sentiment classification. Apart from full
stops, which are dealt in the next point, other punctuations
and special symbols are also removed. Repeated whitespaces
are replaced with a single space. We also perform stemming
to reduce the size of the feature space.
2) Full Stops: In the previous works, full stops are just
usually replaced by a space. However, we have observed
that casual
language in tweets is often seen in form of
repeated punctuations. For example, "this is so cool...wow".
We take into consideration this format, and replace two or
more occurrences of "." and "-" with a space. Also, full stops
are also quite different in usage. Sometimes, there isn't any
space in between sentences. For example, "Its raining.Feeling
awesome". We replace a single occurrence of a full stop with
a space to ensure correct feature incorporation.
3) Parsing Hashtags: In the case of hashtags, most of the
previous works just consider the case of hashtags followed by
a single word; they just remove the hashtag and add the word
to the feature vector. However, sometimes, there are multiple
words after a hashtag, and more often than not, these words
form an important, conclusive part of the Tweet. For example,
#ThisSucks, or #BestMomentEver. These hashtags need to be
dealt with in a proper fashion. We split the text after hashtags
after before each capital letter, and add these as tokens to the
feature vector. For hashtags followed by a single word, we
just replace the pattern #word with the word, as conventional
models do. The intuition behind this step is that quite often,
the sentiment of a tweet is expressed in form of a hashtag.
For example, #happy or #disappointed are frequently used
hashtags, and we dont want to lose this information during
sentiment classification.
4) Repeated letters: Tweets contain very casual language
as mentioned earlier. For example, if we search "wow" with an
arbitrary number of o's in the middle (e.g. wooow, woooow)
on Twitter, there will most likely be a non-empty result set. We
use preprocessing so that any letter occurring more than two
times in a row is replaced with two occurrences. In the samples
above, these words would be converted into the token "woow".
After all the above modifications, tweets are converted into
lowercase to avoid confusion between features having same
content, but are different in capitalization.
5) Stopwords, Acronyms and Negations: We gather a list
of 400 stopwords. These words, if present in the tweets, are
not considered in the feature vector.
We store an acronym dictionary which has over 5000,
frequently-used acronyms and their abbreviations. We replace
such acronyms in tweets with their abbreviation, since these
can be of great use while sentiment classification.
All negative words like 'cannot', 'can't', 'won't', 'don't' are
replaced by 'not', which effectively keeps the sentiment stable.
It is observed that doing this makes the training faster, since
the model has to deal with a smaller feature vector.
D. Baseline model
The baseline model for our experiments is explained in the
paper by Alec Go [1]. The model uses the Naive Bayes, SVM,
and the Maximum Entropy classifiers for their experiment.
Their feature vector is either composed of Unigrams, Bigrams,
Unigrams + Bigrams, or Unigrams + POS tags.
This work achieved the following maximum accuracies:
a) 82.2 for the Unigram feature vector, using the SVM
classifier,
b) 83.0 for the Unigram + Bigram feature vector, using the
MaxEnt classifier, and 82.7 using the Naive Bayes classifier.
c) 81.9 for the Unigram + POS feature vector, using the SVM
classifier.
These baseline accuracies were on a training dataset of 1.6
million tweets, and a test dataset of 500 tweets. We are using
the same training dataset for our experiments. We later present
the baseline accuracies on a training set of 200K tweets, and a
test dataset of 5000 tweets; we compare our model's accuracy
with these baseline accuracy values on the same test data of
5000 tweets.
E. Effective Word Score (EFWS) Heuristic
We have described our baseline model above. So the
feature vectors we collate results for, are Unigram, Unigram
+ Bigram, and Unigram + POS. We have already made two
major changes before the training starts on our dataset as
compared to our baseline model. Firstly, our training dataset
will be filtered according to the subjectivity threshold. And
secondly, our preprocessing is much more robust as compared
to their work.
Now let us look at an additional heuristic we use to obtain
labels for our test data. Along with dictionaries for stop
words and acronyms, we also maintain a dictionary of
a list of frequently used words and their polarity scores.
This dictionary has around 2500 words and their polarity
score ranging from -5 to 5. At runtime, we also use all
synonyms of a word (from WordNet) present in a tweet and
also the dictionary, and assign them the same score as the
dictionary word. There is a reasonable assumption here, that
the synonyms aren't very extremal in nature, that is, a word
with a polarity score of 2 cannot have a synonym which has
a polarity score of 5. Now, we calculate the Effective Word
Scores of a tweet.
We define the Effective Word Score of score x as
EFWS(x) = N(+x) - N(-x),
where N(x)
polarity score x.
is the number of words in the tweet with
For example,
if a tweet has one word with score 5,
three words with score 4, two with score 2, three with with
score -2, one with score -3, and finally two with score -4,
then the effective word scores are:
EFWS(5) = N(5) - N(-5) = 1 - 0 = 1
EFWS(4) = N(4) - N(-4) = 3 - 2 = 1
EFWS(3) = N(3) - N(-3) = 0 - 1 = -1
EFWS(2) = N(2) - N(-2) = 2 - 3 = -1
EFWS(1) = N(1) - N(-1) = 2 - 0 = 2
We now define the heuristic for obtaining the label of a Tweet.
if (EFWS(5) ≥ 1 or EFWS(4) ≥ 1) and (EFWS(2) ≥ 1)
then
Label = positive
end if
Similarly,
if (EFWS(5) ≤ -1 or EFWS(4) ≤ -1) and (EFWS(2) ≤ -1)
then
Label = negative
end if
The basic intuition behind such a heuristic is that we found
tweets having one strongly positive and one moderately pos-
itive word more than the number of strongly negative and
the moderately negative words respectively, usually conveyed
a positive sentiment. Similar was the case for negative sen-
timents. The tweets getting a label from this heuristic are
not sent into the training phase. After considerable amount of
experimenting, and analyzing the nature of our dataset, which
is not domain specific, we have reached the conclusion that
the heuristic mentioned above is optimal for obtaining labels.
We found that the heuristic accuracy was around 85% for
a training dataset of 100K and a test dataset of 5K, where
the total number of test tweets labelled by the heuristic were
around 500. This means that around 425 out of the 500 tweets
received a correct prediction of sentiment using this heuristic.
Thus, using this heuristic improves the overall accuracy, as
well as saves time by reducing the number of tweets to be
tested by the ML algorithms.
F. Training Model
We use the following classifiers for our model.
1) Naive Bayes: Naive Bayes is a simple model which
works well on text categorization. We use a Naive Bayes
model. Class c* is assigned to tweet d, where c* = argmax
P(cd).
PN B(cd) = P (c) ∗
m
X
i=1
P (f c)ni(d)
And PN B(cd) is calculated using Bayes Rule. In this formula,
f represents a feature and ni(d) represents the count of feature
fi found in tweet d. There are a total of m features. Parameters
P(c) and P (f c) are obtained through maximum likelihood
estimates.
2) Support Vector Machines: Support vector machines are
based on the Structural Risk Minimization principle from
computational learning theory. SVM classification algorithms
for binary classification is based on finding a separation
between hyperplanes defined by classes of data. One remark-
able property of SVMs is that their ability to learn can be
independent of the dimensionality of the feature space. SVMs
can generalize even in the presence of many features as in the
case of text data classification. We use a non-linear Support
Vector Machine with an RBF kernel.
3) Maximum Entropy Model: Maximum Entropy Model
belongs to the family of discriminative classifiers also known
as the exponential or log-linear classifiers.. In the naive Bayes
classifier, Bayes rule is used to estimate this best y indirectly
from the likelihood P (xy) (and the prior P (y)) but a discrim-
inative model takes this direct approach, computing P (yx) by
discriminating among the different possible values of the class
y rather than first computing a likelihood.
y = argmax
P (yx)
y
Logistic regression estimates P (yx) by combining the feature
set linearly (multiplying each feature by a weight and adding
them up), and then applying a function to this combination.
V. EVALUATION
In this section, we present
the collated results of our
experiments. To show that our model achieves higher accuracy
than the baseline model and on a smaller training dataset, we
first fix the test dataset. Our test dataset, as mentioned before,
consists of 5000 tweets. We conducted our experiments on
an Intel Core i5 machine (4 cores), with 8 GB RAM. The
following are the accuracies of the baseline model on a training
set of 200K tweets:
Naive Bayes
78.23%
Unigram
Unigram + Bigram 77.5%
76.7%
Unigram + POS
Logistic Regression
SVM
74.10% 79.03%
71.3% 80.2%
71.8% 79.7%
We filtered the training set with a subjectivity threshold of
0.5. By doing this, we saw that the number of tweets reduced
to approximately 0.6 million tweets from an earlier total of
1.6 million. We then trained our model described in earlier
sections on a 100K tweets randomly picked from this filtered
training dataset, and observed the following accuracies:
Naive Bayes
79.2%
Unigram
Unigram + Bigram 77.9%
77.5%
Unigram + POS
Logistic Regression
SVM
77.8% 80.5%
71.7% 81.7%
73.6% 79.9%
Note that all the accuracies in the tables above have been
recorded as the average of 3 iterations of our experiment.
We achieve higher accuracy for all feature vectors, on all
classifiers, and that too from a training dataset half the size
of the baseline one.
We now see the intricacies of the subjectivity threshold
parameter. It is clear that more and more tweets get filtered
as the subjectivity threshold parameter increases. This can
be seen in the Figure 1 shown below. We have plotted the
number of tweets that remain after filtering from two sources:
TextBlob, Opinion Finder Tool2. TextBlob has an inbuilt
function that provides us the subjectivity level of a tweet. On
the other hand, Opinion Finder only provides the information
of which parts of the text are subjective, and which are
objective. From that, we define the subjectivity level of that
text as:
Subjectivity level = P Length of subjective clauses
Total length of the text
·106
)
s
n
o
i
l
l
i
m
n
i
(
s
t
e
e
w
T
1.8
1.6
1.4
1.2
1
0.8
0.6
0.4
0.2
0
0
Textblob
Opinion Finder
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
1
Subjectivity Threshold
Figure 1: Number of tweets with subjectivity greater than the
subjectivity threshold
)
1
o
t
0
m
o
r
f
(
y
c
a
r
u
c
c
A
1
0.9
0.8
0.7
0
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
1
Subjectivity Threshold
Figure 2: Variation of accuracy (*Training data of 100K,
Test data of 5K) with subjectivity threshold. *TextBlob is
used to filter the tweets to form the training dataset.
We now focus on the issue of choosing the optimum
threshold value. As the subjectivity threshold parameter
increases, our model
trains on tweets with a higher
subjectivity level, and the overall accuracy increases. We
observed the following accuracies on subjectivity level 0.8
(Unigrams as features):
Naive Bayes: 80.32%
Non-linear SVM: 80.15 %
Logistic Regression: 81.77%
that a lot of useful
tweets
We should consider the fact
are also lost
in the process of gradually increasing the
parameter, and this could cause a problem in cases when the
test data is very large, because the model will not train on
a generic dataset. Researchers may use a higher subjectivity
threshold for their experiments if they are confident that most
of the important information would be retained. This is most
likely to happen in case of topic-specific or domain-specific
data.
Logistic Regression
Naive Bayes
SVM
35
30
25
20
15
10
baseline
subjectivity=0.5
subjectivity=0.8
Figure 3: Comparison of training times for Unigrams
Logistic Regression
Naive Bayes
SVM
30
20
10
)
s
e
t
u
n
i
m
n
i
(
e
m
i
t
g
n
i
n
i
a
r
T
)
s
e
t
u
n
i
m
n
i
(
e
m
i
t
g
n
i
n
i
a
r
T
baseline
subjectivity=0.5
subjectivity=0.8
Figure 4: Comparison of training times for Unigrams +
2This tool can be found at: http://mpqa.cs.pitt.edu/opinionfinder/
Bigrams
[8] Vishal A. Kharde, S.S. Sonawane. Sentiment Analysis of Twitter Data:
A Survey of Techniques. International Journal of Computer Applications
(0975 8887) Volume 139 No.11, April. 2016.
[9] Hassan Saif, Yulan He and Harith Alani. Sentiment Analysis of Twitter
Data: A Survey of Techniques. (EMNLP), pages 7986. 2002.
[10] J. Read. Using emoticons to reduce dependency in machine learning
techniques for sentiment classification. In Proceedings of ACL-05, 43nd
Meeting of the Association for Computational Linguistics. Association for
Computational Linguistics, 2005.
[11] Agarwal, A., Xie, B., Vovsha, I., Rambow, O., Passonneau, R. Sentiment
analysis of twitter data. In Proc. ACL 2011 Workshop on Languages in
Social Media, pp. 3038. 2011.
[12] B. Pang, L. Lee and S. Vaithyanathan. Sentiment classification using
machine learning techniques In Proceedings of the Conference on Em-
pirical Methods in Natural Language Processing (EMNLP), pages 79-86.
2002.
[13] Vidisha M. Pradhan, Jay Vala and Prem Balani. A survey on Senti-
ment Analysis Algorithms for opinion mining. International Journal of
Computer Applications, 2016.
[14] Soroush Vosoughi, Helen Zhou, and Deb Roy. Enhanced twitter sen-
timent classification using contextual information. In 6th Workshop on
Computational Approaches to Subjectivity, Sentiment and Social Media
Analysis (WASSA 2015), page 16. 2015.
[15] Efthymios Kouloumpis*, Theresa Wilson*, Johanna Moore. Twitter
Sentiment Analysis: The Good the Bad and the OMG! In Proceedings of
the Fifth International AAAI Conference on Weblogs and Social Media,
2011.
[16] Luciano Barbosa and Junlan Feng. Robust sentiment detection on twitter
the 23rd International
from biased and noisy data. Proceedings of
Conference on Computational Linguistics: Posters, pages 3644. 2010.
[17] Saif, Hassan; Fernndez, Miriam; He, Yulan and Alani, Harith. Evaluation
datasets for Twitter sentiment analysis: a survey and a new dataset, the
STS-Gold. In: 1st International Workshop on Emotion and Sentiment
in Social and Expressive Media: Approaches and Perspectives from AI
(ESSEM 2013), 3 December 2013, Turin, Italy.
We use Logistic regression for classification and unigrams
the feature vector with K-fold cross validation for
as
determining the accuracy. We choose an optimal threshold
value of 0.5 for our experiment, considering the fact that the
model should train on a more generic dataset. Figure 2 shows
the variation of accuracy with the subjectivity threshold. The
training size is fixed at 100K and the test dataset (5K tweets)
is also same for all the experiments.
We also measure the time taken to train our model,
and compare it to the baseline model. Our observation was
that our model took roughly half the amount of time in some
cases and yet obtained a higher accuracy. Figures 3 and 4
show the difference in training time of the baseline model, our
model on a 0.5 subjectivity-filtered dataset, and our model on
a 0.8 subjectivity-filtered dataset on unigrams and unigrams
+ bigrams respectively. The times recorded are on a training
dataset of 100K for our model and 200K for the baseline
model, and a test dataset of 5K was fixed in all the recordings.
The winning point, which can be seen from the plots, is that
our model is considerably faster, and even has twofold speed
in some cases. And alongside saving computation time, it
achieves higher accuracy. This can be attributed to the fact
that as the subjectivity threshold increases, only the tweets
with highly polar words are retained in the training set and
this makes the whole process faster.
VI. CONCLUSION
We show that a higher accuracy can be obtained in sentiment
classification of Twitter messages training on a smaller dataset
and with a much faster computation time, and hence the issue
of constraint on computation power is resolved to a certain
extent. This can be achieved using a subjectivity threshold
to selectively filter the training data, incorporating a more
complex preprocessing stage, and using an additional heuristic
for sentiment classification, along with the conventional ma-
chine learning techniques. As Twitter data is abundant, our
subjectivity filtering process can achieve a better generalised
model for sentiment classification.
REFERENCES
[1] Alec Go, Richa Bhayani, and Lei Huang. Twitter Sentiment Classification
using Distant Supervision. CS224N Project Report, Stanford, pages 1-12.
2009.
[2] N. Cristianini and J. Shawe-Taylor. An Introduction to Support Vector
Machines and Other Kernel-based Learning Methods. Cambridge Uni-
versity Press, March 2000.
[3] Bing Liu and Lei Zhang. A Survey of Opinion Mining and Sentiment
Analysis. In Charu C. Aggarwal and ChengXiang Zhai, editors, Mining
Text Data, pages 415463. Springer US. 2012.
[4] Bing Liu. Sentiment Analysis and Subjectivity. In Handbook of Natural
Language Processing, Second Edition. Taylor and Francis Group, Boc.
2010.
[5] Saif M. Mohammad, Svetlana Kiritchenko, and Xiaodan Zhu. NRC-
Canada: Building the State-of-the-Art in Sentiment Analysis of tweets. In
Proceedings of the 7th International Workshop on Semantic Evaluation
Exercises (SemEval-2013), Atlanta, Georgia, USA, 2013.
[6] Ayushi Dalmia, Manish Gupta*, Vasudeva Varma. Twitter Sentiment
Analysis The good, the bad and the neutral! IIIT-H at SemEval, 2015.
[7] Alexander Pak and Patrick Paroubek. Twitter as a Corpus for Sentiment
Analysis and Opinion Mining. In Proceedings of LREC, 2010.
|
1201.2277 | 1 | 1201 | 2012-01-11T10:45:39 | A Time Decoupling Approach for Studying Forum Dynamics | [
"cs.SI",
"physics.soc-ph"
] | Online forums are rich sources of information about user communication activity over time. Finding temporal patterns in online forum communication threads can advance our understanding of the dynamics of conversations. The main challenge of temporal analysis in this context is the complexity of forum data. There can be thousands of interacting users, who can be numerically described in many different ways. Moreover, user characteristics can evolve over time. We propose an approach that decouples temporal information about users into sequences of user events and inter-event times. We develop a new feature space to represent the event sequences as paths, and we model the distribution of the inter-event times. We study over 30,000 users across four Internet forums, and discover novel patterns in user communication. We find that users tend to exhibit consistency over time. Furthermore, in our feature space, we observe regions that represent unlikely user behaviors. Finally, we show how to derive a numerical representation for each forum, and we then use this representation to derive a novel clustering of multiple forums. | cs.SI | cs | World Wide Web Journal manuscript No.
(will be inserted by the editor)
A Time Decoupling Approach for Studying Forum
Dynamics
Andrey Kan · Jeffrey Chan · Conor Hayes ·
Bernie Hogan · James Bailey · Christopher
Leckie
2
1
0
2
n
a
J
1
1
]
I
S
.
s
c
[
1
v
7
7
2
2
.
1
0
2
1
:
v
i
X
r
a
the date of receipt and acceptance should be inserted later
Abstract Online forums are rich sources of information about user communication
activity over time. Finding temporal patterns in online forum communication threads
can advance our understanding of the dynamics of conversations. The main challenge
of temporal analysis in this context is the complexity of forum data. There can be
thousands of interacting users, who can be numerically described in many different
ways. Moreover, user characteristics can evolve over time. We propose an approach
that decouples temporal information about users into sequences of user events and
inter-event times. We develop a new feature space to represent the event sequences as
paths, and we model the distribution of the inter-event times. We study over 30, 000
users across four Internet forums, and discover novel patterns in user communication.
We find that users tend to exhibit consistency over time. Furthermore, in our feature
space, we observe regions that represent unlikely user behaviors. Finally, we show how
to derive a numerical representation for each forum, and we then use this representation
to derive a novel clustering of multiple forums.
Keywords internet forums · conversation dynamics · temporal evolution · reciprocity ·
visualization
A. Kan (corresponding), J. Bailey, C. Leckie
NICTA Victoria Research Laboratory, Department of Computer Science and Software Engi-
neering, The University of Melbourne, Australia
Tel.: +614 20 768 752
E-mail: [email protected]
J. Chan, C. Hayes
Digital Enterprise Research Institute, National University of Ireland, Galway, Ireland
J. Chan
Department of Computer Science and Software Engineering, The University of Melbourne,
Australia
B. Hogan
Oxford Internet Institute, University of Oxford, United Kingdom
2
1 Introduction
Andrey Kan et al.
Online forums are popular websites that allow users to communicate on diverse topics.
These forums provide an extensive archive of conversation records over time. Finding
temporal patterns in these records can advance our understanding of the dynamics of
conversations. Furthermore, forum analysis can facilitate solving practical tasks, such as
predicting the future behavior of users; identifying users whose behavior deviates from
that of the majority in a given forum; and providing an automated forum categorization
that can inform the structural design of forum websites. Accordingly, the temporal
analysis of online forum data is of interest to different groups, including sociologists,
businesses that run customer support forums, and web designers.
The above-mentioned theoretical and practical advances can be advanced by ad-
dressing the following research questions:
1. Are there any trends (e.g., consistency) in the temporal evolution of users in online
forums?
2. Is it possible to characterize the normative temporal behavior for a given forum?
3. Can we quantify and categorize forums in terms of the temporal behavior of users?
The main challenges for the analysis of temporal forum data arise from the complexity
of the data. Communication records collected from a medium-sized forum website (e.g.,
www.boards.ie or forumbgz.ru) for one year may comprise information about thousands
of users, with tens of thousands messages sent between different users. Furthermore,
there are dozens of features that can be used to describe users and forums (e.g., number
of initiated threads, number of connection ties, number of threads in a forum, percent-
age of “answer people” users [9, 19, 25, 29]). It is not obvious which features to use, and
how to define features that evolve over time (e.g., should one consider the number of
users’ posts per week or per month?)
Moreover, in order to have a computationally tractable online forum analysis, one
may need to select discrete time points for processing. However, it is not obvious which
time points to select. Finally, there is the challenge of natural language processing.
Different forums can use different languages, and, for a given language, people may
mistype words, use slang and non-dictionary words.
Researchers have tried different approaches to forum data analysis, such as focusing
on user roles, discussion diversity and growth dynamics. For example, both Viegas and
Smith [25] and Welser et al. [29] use visualization to derive structural features of the
roles of individual users, thus indicating clear differences between consistent “answer
people” and those preferring discussions. Lui and Baldwin [17], and Chan et al. [9]
extend this work by categorizing roles and exploring the composition of forums in
terms of the diversity of roles. Kumar et al. [13] and Gonzalez-Bailon et al. [10] model
growing trees of discussion threads.
These studies tend to assume that users exhibit consistent behavior over time, and
that the users can be described using features that are aggregated over the whole time
span of the available data (e.g., total number of threads initiated by a user). Studies
that look at temporal patterns over time, instead of assuming consistency, tend to be
descriptive and difficult to scale. For example, AuthorLines [25] show the activity of
individual users over time, but with AuthorLines it is hard to visualize the evolution of
the whole forum. To the best of our knowledge there has been no forum representation
that can be explicitly interpreted in terms of the temporal behavior of individual users.
A Time Decoupling Approach for Studying Forum Dynamics
3
To address these limitations, we propose a novel method for studying forum dy-
namics. By forum dynamics we mean a set of changes in the characteristics of the
users participating in the forum over time. We propose to decouple temporal informa-
tion about users into sequences of user events and inter-event times. Furthermore, we
interpret a sequence of user events as a path in a feature space; we represent a forum
with a set of paths; and we analyze forums from a geometrical perspective.
In a given forum, we study user paths both individually and as a single interdepen-
dent system. This makes our approach unique, because past work on time sequences
analysis mostly focuses on pairwise correlation between parts of sequences (e.g., [20]).
Moreover, our analysis reveals interesting findings that were not previously reported.
This includes a roughly constant ability of users to attract responses (consistency),
and existence of user states that are very unlikely to occur (“dead zones” in a feature
space). Finally, we propose a forum visualization that allows us to obtain a succinct
summary of the behavior of users in forums.
In summary, the main contributions of our paper are as follows.
– A time decoupling approach for finding temporal patterns in online forum data
(Section 4.1).
– A new feature space to represent users’ evolution (Section 4.2). A proposed visu-
alization of our feature space allows us to observe users’ characteristics that were
not apparent from previous studies (Section 4.3).
– A novel feature representation of forums (Sections 6.1). This has enabled the dis-
covery of a new clustering for one of the previously studied datasets (Section 6.2).
– Discovery of consistent engagement and dead zone patterns (Sections 5.1 and 5.2)
and the analysis of inter-event times (Section 5.3).
Prior to giving a detailed description of our methods and results, in the next two
sections we first introduce related work and then describe the datasets that we study.
2 Related Work
In this section, we start with a review of approaches to study online forum data (Table
1). We then discuss work that studies dynamic processes in related online media, such
as online social networks and weblogs.
Chan et al. [9] employ reply graphs, as well as the structure of threads, to derive
features for classifying users into different roles (e.g., “taciturn”, “elitist”). In the same
work, they study the composition of forums in terms of user roles. Lui and Baldwin [17]
classify users by utilizing content based features in addition to structural features. In
both works, an implicit assumption is that user roles do not change during the period
of observation.
Welser et al. [29] derive features for individual users by means of different visual-
ization techniques. The features are then used for automated identification of “answer
people”, a specific type of user. The automated identification is validated by manually
inspecting the contents of a selection of user posts. In their study, Welser et al. state
that “in many well-defined circumstances, it is generally safe to assume that past be-
havior will correlate with future behavior”. In our work, we present a framework for
assessing this assumption quantitatively by studying the temporal evolution of users.
Viegas and Smith [25] also analyze temporal evolution of users. They propose Au-
thorLines for plotting the number of threads started by a user, as well as the number
4
Andrey Kan et al.
Table 1 Summary of related work on forums. There have been different approaches to study
forum data. Some studies focus on individual users, while other studies look at the discussion
threads or forums.
References
Objects of
Involved features
Representing
Lui and Baldwin
[17], Welser et al.
[29]
Chan et al. [9]
Viegas and Smith
[25]
Xiong and Donath
[30]
Kumar et al. [13],
Wang et al. [27]
Morzy [19]
study
users
users,
forums
users,
forums
users,
forums
threads
micro-
communities,
forums
this work
users,
forums
structural features of reply
graph such as proportion of
low degree neighbors,
content-based features, etc.
number of posts per thread,
ratio of in degree to out
degree in reply graph, etc.
number of initiated threads,
number of threads where user
participated, etc.
number of messages, time
passed since posting, etc.
degree distributions of
discussion threads, content
based features, etc.
number of communities that
sustain longer than certain
amount of time, number of
communities per user, etc.
number of posts and number
of replies over time
user
engagement
over time
not focused on
changes over time
not focused on
changes over time
real-time changes
in statistics for a
user
as a sequence of
events (but not
quantitative)
modeling the
growths of
conversation trees
user engagement
is not represented
explicitly
as a sequence of
events
of threads where the user has participated for a particular week. It is then easy to see,
for example, how the number of these threads evolve over subsequent weeks. However,
it can be hard to compare the engagement of many (e.g., 50) users at once. Further-
more, Viegas and Smith do not quantify patterns of user evolution. There have been
other proposed forum visualizations [25, 30], however these visualizations do not define
numerical features for describing and comparing the forums automatically.
Some authors study forums at the level of discussion threads or micro-communities
[13, 19, 27]. Kumar et al. [13] present and evaluate a model of the dynamics of conver-
sations, where adjusting model parameters can lead to the production of “bushy” or
“skinny” thread trees. While this model can be adapted to infer the evolution of indi-
vidual users, this adaptation is not straightforward and is not covered in their paper.
Furthermore, this model describes conversations on the level of individual threads,
whereas forums often consist of a number of threads. Threads are modeled as trees
whereas a forum is generally a forest.
Furthermore, there has been a large body of literature that studies processes in
related media spaces such as Facebook, Twitter and weblogs. Many researchers look at
the dynamic processes in online media from an information diffusion perspective. With
this approach one models the propagation of information among users in a similar man-
ner to modeling the propagation of infection in epidemiology [1, 14]. Other approaches
to studying evolving online social media include the combined study of the diffusion
and evolution of discussion topics [15], modeling user interactions with dynamic graphs
[26], and looking at the properties of time series of social interactions [4]. Our work
A Time Decoupling Approach for Studying Forum Dynamics
5
complements these earlier studies by approaching online forums from the perspective
of individual users and the reciprocity of communication.
More generally, time series mining is an established field of data mining [28]. Keogh
et al. spell out an intuitive idea that “representation of the data is the key to efficient and
effective solutions” [11]. One of the novel contributions of our work is the representation
of the history of individual users as two decoupled series: sequence of events and event
timings.
In summary, forum data analysis is a field with growing research interest. Clearly
participating users constitute the essence of the forums, and users’ behavior eventually
determines all the numerical features of the forum data. However, there are several
remaining open issues, such as the lack of scalable methods for the representation and
analysis of the temporal evolution of individual users, and the lack of a numerical
representation for forums in terms of the evolution of users.
3 Datasets
In our study, we use data from four Internet forums: Boards.ie, SAP Community Net-
work (SCN), TiddlyWiki, and Ancestry.com. In total, we analyze records for over
30, 000 users. We observe similar patterns in all datasets, and in the main text, we
focus mainly on results for Boards.ie. We present results for the SCN, TiddlyWiki, and
Ancestry.com forums in Supplementary Information 1.
Boards.ie is a national Irish bulletin board that comprises a variety of forums on
different topics, from concert announcements, to dedicated discussions about martial
arts and politics. The records for Boards.ie were collected over a two year period (2006
and 2007).
We select nine Boards.ie forums that represent a variety of topics (Table 2). In each
forum, we select users that had registered in 2006. This selection allows us to observe
the evolution of users for at least one year. From the users registered in 2006, in each
forum, we randomly select 30% of users.
Table 2 Selected forums from Boards.ie covering a variety of topics (#posts is the total
number of posts made by all users from the sample; #replies is the total number of replies
received by all users from the sample)
Forum name #Users in
#Posts in
sample
sample
#Replies
in sample
Comments
politics
soccer
poker
martial arts
personal
accommodation
gigs
weather
development
264
73
183
156
586
236
345
56
107
3,867
4,352
10,542
5,444
6,709
1,764
2,141
300
679
3,761
4,215
9,660
4,911
6,178
1,523
1,715
259
590
topical discussion
topical discussion
topical discussion
topical discussion
discussion of personal
issues
classifieds and discussion
musical performance
announcements and
discussion
forecasts and discussion
tech. questions and
discussion
6
Andrey Kan et al.
Sampling was used in order to speed up the computations. Note that our sample
is sufficiently large (there are around 2, 000 users in the Boards.ie sample) to draw
conclusions. Furthermore, we have studied the effect of sampling on two forums from
Ancestry.com (as these forums have the largest numbers of users), and found that
taking a 30% sample of users results in observations similar to those made on the
complete set of users. Details on our study of the sampling effect are presented in
Supplementary Information 2.
Note that the method presented in this paper operates at the level of forums. The
method will be mainly affected by the sizes of individual forums rather than the size
of a complete dataset. The size of the forum can be measured, for example, using the
average number of posts per day. With respect to this measure, forums in our study
appear to be on the same scale with many other forums reported in the literature [13,
19]. This indicates that our study is applicable to a large number of typical Internet
forums.
We note that there can exist exceptionally large forums (e.g., with more than 1000
posts per day). On the other hand, we speculate that there is a certain upper limit
for the size of a forum. For example, a forum with more than 1000 posts per day may
effectively become unreadable for users, as it would be updated much faster than the
users can read. Such a forum might have a tendency to split into smaller forums or to
lose its participants, which would bring the forum back to a smaller size and a more
balanced state.
Finally, it is worth mentioning that Boards.ie was previously studied by Chan et
al. [9]. This enables us to compare our results. We introduce our methods and results
in the next sections.
4 Research Methods
We outline our research methodology in Figure 1. Our goals are (i) to discover tem-
poral patterns in user behavior, and (ii) to use the obtained information to develop a
numerical description of forums in terms of the evolution of users. In order to achieve
the first goal, we seek a convenient representation of temporal data that allows us to
observe and quantify temporal patterns.
Previous work has shown that visualization is a powerful tool in forum data analysis
[24, 25, 29]. Therefore, we develop our representation of users with a novel time decou-
pling approach, and select features in a way that allows us to visualize user evolution.
We start with a description of our time decoupling approach in the next section.
4.1 Time Decoupling Approach
Consider forum data that spans over time window [T0, T1], for example from January
2006 till December 2008. Let U be the set of all users in the forum, and let user u ∈ U
be registered in the forum at time T0(u) ≥ T0. A user feature is some quantity that
characterizes the user over time, for example the number of posts the user u has made
by the time t.
Definition 1 A user feature f(u, t) is a function U × [T0(u), T1] → R.
A Time Decoupling Approach for Studying Forum Dynamics
7
Fig. 1 Outline of our research methodology. The goal is to obtain novel knowledge about
the temporal evolution of users (on the right). In order to achieve this goal we use a time
decoupling approach and a feature construction to represent users with (i) paths in a feature
space, and (ii) timing vectors. We then study the paths and vectors separately. Visualization
of paths allows us to construct features that can describe forums.
Note that we assume that the feature values are real valued. In practice, many widely
used features (e.g., degree of a user in the reply graph, number of posts per thread)
can be mapped to real values.
At any time point t ∈ [T0(u), T1], the user can be numerically described with a set
of features F (u, t) = {f1(u, t), . . . , fn(u, t)}. We note that it is generally safe to assume
that every user feature fi ∈ F is a piecewise-constant function. This is the case with
many features used in practice, e.g., the number of user posts only changes at certain
time points, rather than continuously. Under this assumption, we can describe a user
with two finite sets defined below.
Definition 2 Given a set of piecewise-constant user features fi(u, t), i = 1, . . . , n, a
timing vector of user u is the ordered set Tevent(u) = {T0(u), t1, . . . , tL : T0(u) ≤
t1 < . . . < tL ≤ T1}, where ti is a time point at which at least one of the features fi(u, t)
changes its value. A user path of user u is the set P(u) = {F (u, t) : t ∈ Tevent(u)}.
A path length is the number L(u) = Tevent(u) − 1.
Note that the user path can be viewed as a sequence of events listed in chronological
order, where an event is a change in feature values. We suggest to separate the study
of the user paths and the timing vectors. We expect that prominent patterns in user
evolution are preserved in user paths with the order of events. On the other hand, time
stamps are more noisy, in the sense that they are likely to be influenced by various
real world factors that are either not interesting for the study, or very hard to account
for (e.g., sickness of a user, weather conditions). Therefore, combining the time stamps
with the user paths might obfuscate important patterns.
While this framework is general, in a sense that it can incorporate any number
of features, it is particularly convenient to consider a two-feature representation, as it
allows us to easily plot the user paths. We propose to represent users with two new
features: f1(u, t) is the number of posts user u has made since registration to time t
8
Andrey Kan et al.
inclusive, and f2(u, t) is the number of replies user u has received since registration to
time t inclusive.
Figure 2 shows two sample user paths and the corresponding timing vectors. Con-
sider path P(u) in the figure. At the registration time, user u has no posts and no
replies, and therefore the path starts from (0, 0). User u then posts twice, receives a
reply, and posts again, thus P(u) goes to (1, 0), (2, 0), (2, 1), and (3, 1). There is no
more recorded activity for user u, and so the path stops. We assume that at each point
in time, there can be only one post or one reply. The two possible events in this case
are incrementing the number of posts (p) and incrementing the number of replies (r).
Note that users u and v do not necessarily reply to each other. We discuss our choice
of user features in the next section.
Fig. 2 Two sample user paths and the corresponding timing vectors. Two features are used
to represent the users. The order of changes in feature values is captured by user paths. The
timing of the events is recorded in timing vectors.
4.2 User Feature Space
Recall that we aim to represent a user with an interpretable feature set that can be
visualized. There are a large variety of previously proposed features to describe users
[9, 25, 29], and there are a number of methods for automated feature selection. Broadly
relevant feature selection methods can be divided in two groups: feature transformation
(such as well known principal component analysis), and unsupervised feature selection
(see for example [7, 23]).
Unfortunately, both groups of methods were developed for a setup that differs from
the one that we observe in our dataset. Specifically, previous work considers a finite
set of objects, where each object is described by a set of numbers. Here, for a given
object, a feature is a number. In our case, we are interested in the temporal evolution
of users. We have a finite set of users, but each user is described by a set of functions
of time. We have that for a given user, a feature is a function (see Definition 1).
Furthermore, previously proposed features are defined as numbers. For example,
the number of initiated threads [9] is counted over the whole time span of the dataset
and does not vary with time. We therefore construct new time varying features, instead
of selecting from previous features.
A Time Decoupling Approach for Studying Forum Dynamics
9
As we stated in the previous section, we propose two new user features: the number
of posts a user has made since the registration to time t (inclusive), and the number of
replies the user has received since the registration to time t (inclusive). The two features
comprise our feature space. In this space, a user path is constructed as follows. The
path starts from point (0, 0). Whenever a user makes a post, the path goes one unit
to the right. Whenever a user receives a reply the path goes up one unit. We count a
self-reply only once as a post, and we assume that at one time point there can be only
one post or one reply. Note that the path always starts with a post, as there cannot
be replies when there are no posts.
We would like to clarify that a post always belongs to exactly one thread. Within
the thread, a post can be the starting post for the thread or it can be a reply to any
previous post in the same thread (those posts, can in turn be replies to earlier posts).
In some forum settings, one post can even be a reply to more than one previous post
in the thread [12]. In all these cases, the post moves its author one unit to the right.
We now discuss the advantages and limitations of the proposed feature space.
Advantages of Our Feature Space
First, our feature space can be visualized and interpreted in terms of persistence and
reciprocity of communication (Figure 3). We believe that a user path represents a solid
operationalization of generalized reciprocity at the ego level with something coming
back to ego from many different sources [22]. Ego-level generalized reciprocity has two
qualities that may be expressed as quantity and focus. Quantity, or how much feedback
does one get for a given post (on average), can be measured by the replies to posts
ratio of the user path. Focus is instead a measure of whether the community is being
reciprocal to the individual or is focused on particular posts. If the individual path has
a high level of deviation from the straight line, then we can consider the community
to be more focused on the posts than the individual. If the deviation is low, that can
indicate that the community is oriented towards the individual, that is, the community
is interacting more with the individual than with specific posts.
Second, these features are among the most straightforward measures of a user’s
activity. Furthermore, these features are independent of the language of the forum.
Third, we find that, in our datasets, the user paths in this feature space have
strong relations with some widely used structural and temporal properties of users.
A reply graph [29] is a popular structure, where vertices represent users, and directed
edges represent replies made during the time span of the dataset. We find a strong
correlation between the path lengths and the total degree of users in the reply graph.
In all of our forums we observe Spearman’s ρ > 0.9 and p < 0.001. We use Spearman’s
ρ because the distribution of path lengths is skewed.
Furthermore, let a user’s up-time be the time lapsed between the first and last
recorded posts made by a user. We find a strong correlation between the path lengths
and the up-times. In every forum we observe Spearman’s ρ > 0.7 and p < 0.001.
The observed correlations match the intuition, e.g., one can expect users with a large
number of posts to have a large number of correspondents. Bird et al. have made a
similar observation for an email dataset [5].
Finally, we note that the chosen features – numbers of posts and replies – have
meaningful counterparts in other domains. Examples include numbers of sent and re-
ceived emails, outgoing and incoming calls or text messages, or even, more generally,
numbers of stimuli and actions.
10
Andrey Kan et al.
Fig. 3 Sample user paths are shown in a 2D space that comprises two features: the number of
user posts and the number of replies received by the user. In this feature space, the path length
represents persistence and the slope represents reciprocity of communication. For example, a
path closer to the x-axis contains longer consecutive posting sequences. Such a path can be
categorized as a “monologue”. In contrast, a “dialogue” is a more balanced path where posts
tend to be followed by replies.
Limitations of Our Feature Space
We do not take into account the variation among alters who respond to ego. Indeed,
ego might get a large quantity of reciprocity from many different alters (or responders),
or ego might have one single fan that will consistently reply to ego’s posts. Once one
begins to consider the variation among alters in this structure, the outcome is more
complex. This approach has already been taken by Welser et al. [29], as they looked
at whether individuals received replies from alters of low or high degree. We do not
dismiss this approach. Rather, we are looking for an efficient metric that can summarize
many of these more complex features in simpler terms.
The defined features rely on the availability of reply relations between messages. In
some forums this information is recorded explicitly (e.g., this information was available
in our datasets). In the case when the reply relations are not available, one can use
previously proposed algorithms to reconstruct the reply relationships [2, 21].
Visualization is a powerful tool, but it tends to limit the number of dimensions that
can be shown. In this paper, we do not consider a large number of features. However,
we have demonstrated that even a small number of carefully constructed features can
provide useful insights into forum behavior. Moreover, recall that the user paths can
also be represented as sequences. Sequence pattern mining is a well developed field (see
for example [16] and the references therein). Therefore, in order to identify patterns,
one can use a sequence mining technique as an alternative to the visualization. In this
case, a larger number of features can be used. We leave this investigation for future
work.
Despite the potential limitations listed above, our feature space allows us to discover
novel patterns (e.g., consistency in user behavior) that were not apparent from the
previous user representations. Furthermore, our feature space has inspired us to develop
a new numerical description of forums. We first summarize our visualization technique,
and then present our results in subsequent sections.
A Time Decoupling Approach for Studying Forum Dynamics
11
4.3 Visualization
We propose to visualize forums with superimposed user paths (Figure 4). The paths can
cross each other and overlap, and at each point in the plot, color encodes the number
of user paths going through that point. The user paths are aligned with respect to the
beginning of the users’ activity, not in real time. For each path, segment (0, 0) – (1, 0)
corresponds to the first post made by a user since registration, but this first post is
made at different times for different users. Such an alignment allows us to compare
users as they evolve in the forum.
70
60
50
40
30
20
10
s
e
i
l
p
e
r
f
o
.
m
u
n
s
r
e
s
u
f
o
.
m
u
n
500
100
25
5
1
0
0
10
20
30
40
num. of posts
50
60
70
Fig. 4 “Personal” forum from Boards.ie is visualized with a set of superimposed user paths.
At each point, color encodes the number of user paths going through that point. Together the
user paths show the trends in conversations specific to the forum. The dashed red line is the
baseline that shows the replies to posts ratio. In this forum many paths significantly deviate
from the baseline and the mean slope of the forum (solid red line) goes below the baseline.
The overall slope of a forum reflects the reciprocity of communication in the forum.
As a reference, we also draw the baseline degree line, which represents the replies to
posts ratio in the forum. The mean length of paths represents the persistence of user
engagement in a forum, and the spread of paths in space represents the variety of users.
Superimposing paths allows us to reveal the trends in conversations common to users
in the given forum.
An advantage of our visualization technique is the scalability in terms of the number
of users that can be shown. In principle, this number is not limited. The analogy here
is plotting histograms or scatter plots that are capable of showing prominent patterns
of populations of arbitrary sizes.
At the same time, we emphasize that visualization is not essential for our numerical
analysis methods that we present in the next few sections.
12
Andrey Kan et al.
5 Patterns in Forum Data
Recall our first and second research questions stated in the introduction.
1. Are there any trends (e.g., consistency) in the temporal evolution of users?
2. Is there a normative temporal behavior for a given forum?
In this section, we address these questions by studying the user paths and timing
vectors.
5.1 Pattern 1. Consistent Behavior
We plot all forums using our visualization method. The main trend that we observe in
the plots is that user paths can be approximated with straight lines at different angles
to the x-axis. We quantify this linear dependency by computing Pearson’s correlation
coefficient r between the x and y coordinates of points for individual user paths. That
is, for each path we compute the correlation coefficient r separately. For the Boards.ie,
SCN, TiddlyWiki, and Ancestry.com 1 datasets the average r across all users in the
corresponding dataset is 0.959, 0.943, 0.937 and 0.921 respectively. The computed
correlations are statistically significant (p < 0.01). Here we only compute correlation
for users whose path contains sufficiently many points. We consider users with path
lengths of at least 10. The selection leaves us with 4070 paths across all forums.
We conclude that users tend to exhibit consistency in communication over time.
We further investigate this consistency by modeling the user paths.
Modeling User Paths
We note that the user paths can be represented with strings comprising posts (symbol
’p’) and replies (symbol ’r’). Therefore, as a null model for the user paths we use
the well-known coin toss model (also known as a Bernoulli process). In this model,
symbols ’p’ and ’r’ are generated sequentially. Our model always starts by producing
the symbol ’p’, because the real paths always start with a post. Then at each step,
the symbol ’p’ is chosen with a fixed probability Ppost that describes the ability of a
user to elicit replies. Larger values for Ppost result in a larger proportion of posts in
the path, and this corresponds to a weaker ability to elicit replies. For each user we
empirically estimate Ppost as Ppost ≈ #posts/(#posts + #replies). We evaluate this
null model by looking at the distribution of post runs in the data.
By analogy with runs in binary strings, we define a post run as follows.
Definition 3 Consider a user path P represented with a string of posts (symbol ’p’)
and replies (symbol ’r’). Let the corresponding extended path be the string P′ = rPr.
In the path P, a post run is a substring in a form rp+r taken from the corresponding
extended path P′. Here p+ denotes an arbitrary positive number of posts. A post run
length is the number of posts in the post run. Where unambiguous, we refer to the
post run length as a post run.
1 In Section 5.1, for Ancestry.com dataset all statistics were obtained from the entire set of
users, not a sample.
A Time Decoupling Approach for Studying Forum Dynamics
13
We now look at the distribution of post runs in individual user paths. We select users
with a path length of at least 20, to ensure that there are several post runs in each
path. Figure 5 shows the empirical distributions of post runs aggregated over all tested
users in different datasets. We find that post runs and their standard deviations tend
to be small compared to the lengths of paths (over 20). This can be a consequence of
consistency in user behavior. We are interested in whether the coin toss model is able
to reproduce the empirical distribution of post runs for individual users that is present
in the data.
Boards.ie
SCN
TiddlyWiki
Ancestry.com
st.dev = 2.05
median = 1
99−th perc. = 10
15000
st.dev = 0.95
median = 1
10000
99−th perc. = 5
y
c
n
e
u
q
e
r
f
5000
7000
6000
5000
4000
3000
2000
1000
7000
6000
5000
4000
3000
2000
1000
st.dev = 1.95
median = 2
99−th perc. = 10
8000
7000
6000
5000
4000
3000
2000
1000
st.dev = 2
median = 2
99−th perc. = 10
0
0
20
40
0
0
20
40
post run lengths
0
0
20
40
0
0
20
40
Fig. 5 Empirical distributions of post runs aggregated over all tested users in different
datasets. Post runs and their standard deviations tend to be short compared to the lengths of
paths (over 20). This can be a consequence of consistency in user behavior.
For each tested user, we estimate Ppost and record the path length. We then gen-
erate a path of this length using the coin toss model with the estimated parameter
Ppost. For each user, we then compare the empirical distribution of post runs and the
generated distribution using the Kolmogorov-Smirnov (KS) test at a 5% significance
level. A user passes the test if the KS test fails to reject the null hypothesis that the
distributions are different. The number of users that pass the test is shown in Table 3.
We conclude that in general, the coin toss model adequately renders the user paths.
Table 3 Results of models evaluation. “Users Tested” shows the number of users with a path
length of at least 20 for each of the datasets. Both models are capable of recovering the
distributions of post runs for the majority of users. However, in the Boards.ie dataset about
27% of users fail the test.
Dataset
Users
Tested
Boards.ie
SCN
TiddlyWiki
Ancestry.com
186
112
115
136
Users
Passed
(Coin)
135
101
97
120
Users
Passed
(Stick-
ing)
178
109
93
134
Pharsh
0.8
0.8
0.6
0.7
14
Andrey Kan et al.
At the same time, we find that in the Boards.ie dataset about 27% of users fail the
test. We hypothesize that in this dataset, users tend to be more consistent (i.e., follow
a straight line more closely, as explained below) than the random users generated by
the coin toss model.
We therefore propose another model for the generation of user paths. We call this
model the sticking model, because in this model users are stuck to a straight line by
penalizing deviations. The slope of the straight line is determined by the parameter
Ppost that is estimated for each user as Ppost ≈ #posts/(#posts + #replies). The
model is summarized in Algorithm 1. In the model, as soon as the generated path
deviates from the straight line, a harsh probability Pharsh (e.g., Pharsh = 0.8) forces
the model to generate the next symbol in a way such that the balance is restored. Note
that the sticking model can only be reduced to the coin toss model in the case when
Pharsh = 0.5, which corresponds to the coin toss model with Ppost = 0.5.
Algorithm 1 Sticking model
Input: path length L, user characteristic Ppost, dataset characteristic Pharsh;
Output: string S;
′ p′; // real paths always start with posts
1: S ⇐
2: currP rop ⇐ 1; // proportion of posts in the string
3: for each symbol currLength = 2...L
Pcurr =
Pharsh,
Ppost > currP rop
1 − Pharsh, Ppost < currP rop
0.5,
Ppost = currP rop
;
4:
5:
6:
7:
8: end
9: return S;
currSymb = random(Pcurr,′ p′,′ r′); // select ′p′ with probability Pcurr;
S ⇐ S + currSymb; // append the string
currP rop ⇐ #(posts in S)/currLength; // update the proportion
We evaluate the sticking model on each user individually, similar to our evaluation
of the coin toss model. To simplify and speed-up the calculations, we use the same
Pharsh for all users in the same dataset. For each dataset, we find the value that
maximizes the number of users that pass the test, using grid search. The results are
presented in Table 3. We find that in general the sticking model explains the empirical
data better than the coin toss model. The difference in models is especially prominent
in the Boards.ie dataset. Note that this dataset also has the strongest mean correlation
coefficient (Section 5.1), which indicates that users in this dataset have the strongest
tendency to adhere to straight lines.
From our modeling experience, we conclude that the consistency of a user can
generally be explained by an inherent user property. We expressed this property with a
constant parameter Ppost. At the same time, small deviations from the parameter are
possible, and the amount of this deviation varies in different forums. We can express
this freedom to vary by using the parameter Pharsh. For example, in Boards.ie users
exhibit a stronger consistency than one would expect for a random user modeled with
the coin toss model.
A Time Decoupling Approach for Studying Forum Dynamics
15
5.2 Pattern 2. Dead Zones
Another prominent pattern that we observe in our visualizations is that the user paths
are not equally distributed in the feature space. We formalize this pattern with the
concept of a dead zone.
Definition 4 A dead zone is the set of points (x, y) with integer coordinates, such
that the probability of observing a user in each point (x, y) is less than some threshold
value Pdz.
In order to calculate the empirical probability of user locations, we treat points from
all paths in a forum as a single set. We then use a kernel density estimation method
by Botev et al. [6]. This method performs an automated selection of kernel bandwidth.
However, with the automatically selected bandwidth, the empirical density has a grid
patterning, as all our points have integer coordinates. Therefore, we smooth the kernel
by increasing the bandwidth in both dimensions to 2. We limit the region for the
density estimation to the square that has its lower left corner at point (0, 0), and its
side equals to the largest coordinate observed among forum points along either the x
or y axis. Finally, we set the threshold Pdz to the 5-th percentile of the probabilities
of all observed user locations in the forum.
The dead zones for the politics forum from Boards.ie are shown in Figure 6. In
general, the probability of observing a user in the upper-left or lower-right corners of
the plot is low. We observe similar dead zones in all our forums.
The dead zones can be considered as a formal definition of a normative user behavior
for a given forum, and user posts found in the dead zones can indicate an ’abnormal’
user behavior (see Figure 6). For example, we would expect to find spammers in the
zone along the x-axis, and we would expect a user with highly provocative behavior
(attracting many replies) along the y-axis.
5.3 Patterns in Timing Vectors
We now study the second part of our user data model, the timing vectors. We start
with plotting events of random users along the time line (Figure 7). In the plot, the
x-axis shows the number of days lapsed since the user has made the first post. A cross
mark indicates an event (a post or a reply). Although users can have very different
time intervals (note the different scales on the x-axes), we note that in general users
exhibit bursty behavior: events tend to group together in time.
We confirm this grouping pattern by looking at the distribution of inter-event times.
We hypothesize that such a distribution is heavy tailed, with high probability values
for a small range of short times and low values for all other times, as short times
correspond to times between events in a burst, and long times correspond to times
between bursts. This supposition is confirmed when we look at empirical distributions
of the inter-event times collected for individual users in our forums. For each user (with
at least 10 events) we collect a set of inter-event times and divide the numbers by the
mean value. This results in normalization of the inter-event times across users. We
then combine the sets of the normalized inter-event times for all users in a forum and
fit a power-law curve. A representative result of such a fit is shown in Figure 8. We
observe a similar distribution in every forum that we study with the fitted characteristic
exponents of about −1.7.
16
Andrey Kan et al.
70
outliers
60
dead zone
50
40
30
20
10
0
0
dead zone
10
20
30
40
50
60
70
Fig. 6 Dead zones (shown in yellow) for the politics forum from Boards.ie. The blue dots
between the two dead zones show empirically observed user locations. Red dots show the
outlier locations that can indicate an ’abnormal’ user behavior. We observe similar dead zones
in all our forums.
0
0
0
0
0
50
100
150
200
250
300
350
400
450
5
10
15
20
25
30
35
40
45
50
100
150
200
250
2
4
6
8
10
12
0.002
0.008
days lapsed since user has made the first post
0.004
0.006
0.01
Fig. 7 Timing of events of five randomly selected users. The x-axis shows the number of days
lapsed since the corresponding user has made the first post. Note the different scales on the
x-axes.
This bursty behavior is a well-studied phenomenon in domains such as email com-
munications [3], and there have been effective models defined for this behavior [18].
The model of Malmgren et al. [18] for inter-event times complements the models that
we introduce in Section 5.1 for user paths. Together these models summarize a user’s
behavior over time.
There can be cases when studying user paths together with event timings is impor-
tant. However, we note that combining the two parts can obfuscate otherwise promi-
A Time Decoupling Approach for Studying Forum Dynamics
17
104
103
102
101
100
s
e
c
n
e
r
r
u
c
c
o
f
o
r
e
b
m
u
n
10−1
10−1
100
101
102
103
normalized inter−event times
Fig. 8 The distribution of normalized inter-event times of users in politics forum. The plot
shows about 7, 000 points in a log-log scale.
nent patterns (see Figure 9). This is consistent with our motivation for using a time
decoupling approach.
6 Describing Forums
In this section, we address our third research question: “Can we quantify and categorize
forums in terms of the temporal behavior of users?” We start with the development of
a concise numerical description of forum visualizations such as that shown in Figure
10 (see also Supplementary Information 3).
Definition 5 Let a forum archive A denote a set of user paths A = {P(u)} observed
in a forum within the time span of the dataset. A forum feature is a function defined
on the forum archives f : A∗ → R, where A∗ is the set of all possible forum archives.
6.1 Deriving Forum Features
One possible way of deriving the forum features is to fit each path independently with
a straight line and then use the mean length and slope of the paths. However, using the
mean slope is not straightforward. Paths with different lengths have different influence
on the overall shape of the forum. Further, different paths have different RMSE when
fit with a line. It is not obvious how to weight the paths appropriately. Therefore, we
take a different approach. We treat points from all paths as a single set, and define
forum features using this set.
Forum Slope and Spread
Our first feature is called the slope feature β. This feature is derived as follows. We
fit a straight line to all points in the forum, and compute the angle between the fitted
line and the x-axis. Recall that in a forum, for each user u ∈ U , the path with length
18
Andrey Kan et al.
t
s
o
p
t
s
r
i
f
e
h
t
i
e
c
n
s
s
y
a
d
700
600
500
400
300
200
100
0
0
20
40
60
num. of posts
80
100
0
20
60
40
num. of replies
100
80
Fig. 9 Plotting user paths in 3D with the numbers of posts and replies and timings of events.
The consistency in user behavior is not apparent anymore. There is a staircase pattern in the
temporal dimension, but this is a consequence of the bursty behavior that we discussed in this
section.
L is the set of points P(u) = {(0, 0), (xu1, yu1), . . . , (xuL, yuL), }. Let Q be the union
of points from all paths Q = ∪u∈U P(u). The RMSE of fitting a line to the forum is
defined as
ERR(β) =sP(x,y)∈Q(y − β · x)2
Q
.
(1)
Here β is the parameter of the line that is estimated by the fitting process. Note that
we force the fitted line to pass through the point (0, 0). This allows us to reduce the
number of fitting parameters to one (β). Also note that points from different paths
are considered as different elements, e.g., Q may contain several points (1, 1) from
different users. This introduces an implicit weighting of user paths, because paths that
have more points have more influence on the statistic. In every forum that we study,
the majority of users have short paths (one or two posts). Without the weighting these
short paths will suppress the slope in each forum, leaving almost no room for variation
across forums.
The slope feature β is then defined as β = arg minβ∈(0,∞) ERR(β). This feature
can be estimated with least squares fitting. The slope feature β is essentially a tangent
of the angle between the fitted line and the x-axis. Note that this is not the same as
taking the mean of the slopes of individual path fits.
A Time Decoupling Approach for Studying Forum Dynamics
19
martial
poker
soccer
70
60
50
40
30
20
10
0
0
70
60
50
40
30
20
10
0
0
70
60
50
40
30
20
10
0
0
20
40
60
20
40
60
20
40
60
gigs
personal
politics
70
60
50
40
30
20
10
0
0
70
60
50
40
30
20
10
0
0
70
60
50
40
30
20
10
0
0
20
40
60
20
40
60
20
40
60
accomm.
develop.
weather
70
60
50
40
30
20
10
0
0
70
60
50
40
30
20
10
0
0
70
60
50
40
30
20
10
0
0
s
e
i
l
p
e
r
f
o
.
m
u
n
20
40
60
20
40
60
20
40
num. of posts
60
s
r
e
s
u
f
o
.
m
u
n
500
100
25
5
1
Fig. 10 Visualization of forums from Boards.ie. Each line is a user path. At each point, the
color encodes the number of paths going through the point. The dashed red line is the baseline
that reflects replies to posts ratio, the solid red line shows the average slope of the forum. The
blue dot shows the average length of user paths for the forum measured along the slope line (for
the soccer and poker forums the average length is above 50). Differences in forum appearance
(different mean length or slope) indicate differences in the nature of communication in the
corresponding forums.
Our slope feature β can be interpreted in terms of the reciprocity of communication.
For example, the soccer forum has a slope that is closer to one than the slope of the
weather forum (Figure 10). This indicates that users in the soccer forum tend to be
involved in balanced conversations, and receive replies to almost all posts, whereas in
the weather forum, users tend to post more than they receive replies.
Our second feature characterizes the spread or variation in user paths. This feature
is called the spread feature and it is defined as the fitting error ERR( β) by Equation 1.
For example, the poker forum has a larger fitting error ERR( β) than the soccer forum,
and this indicates that there is greater diversity of user paths in the poker forum. This
can be visually confirmed in Figure 10.
20
Andrey Kan et al.
Slope, Baseline and Offset
The slope feature reflects the averaged reciprocity of communication in a forum, whereas
on the individual level, the slope reflects “one-to-many” reciprocity where a user con-
tributes to a public domain, but can expect some reward from the public domain.2
On the level of the forum, the slope feature can give an overall impression of the
type of communication in forums, and we plot the forum slope in our visualizations.
However, the slope can be split down further in two components. The first component
is the overall ratio of the number of replies to the number of posts in the forum during
the period of observation. We call this ratio a baseline feature β0 = #replies/#posts.
Recall that a post can also be a thread starter, in which case, it is not a reply to any
other post. Therefore, our baseline feature effectively reflects the average number of
threads per forum compared to the average thread length. The baseline feature is an
aggregated statistic over the whole period of observation, and it is not sensitive to the
shapes of the user paths as they evolve over time.
On the other hand, the slope feature itself is sensitive to the ordering of events
in paths. Therefore, our second component of the slope is the offset feature, which is
a signed difference d = β − β0. The offset feature shows the variance in conversation
structure that cannot be captured by the baseline feature.
Consider two fragments of user paths, one with five posts and five replies and
another one with five replies and five posts. The baseline for both paths is the same,
whereas the slopes and hence the offsets differ. The offset is negative for the first path
and positive for the second. This reflects the fact that the second user has always been
in a position of a “response-attractor”: at each point of his career he has more or the
same number of replies as posts, whereas the first user has never been in that position.
Number of Users and Length of Paths
Other important properties of a forum are the number of participating users N =
U (this is called the size feature) and the average length of user paths Lavg =
1
N Pu∈U L(u) (called the length feature).
N can reflect the popularity or the generality of a forum topic, and Lavg can reflect
the relative persistence of users in the forum. For example, within the same period of
observation, the martial arts forum has a much larger Lavg than the accommodation
forum, which indicates that users in the martial arts forum are more persistent (tend
to post more) whereas users in the accommodation forum tend to leave after making
a small number of posts.
We note that in Section 5.1 we studied the patterns in individual user paths and
we omitted short paths. However, in the calculation of our forum features, we used all
paths.
We summarize our forum features for nine Boards.ie forums in Table 4. We compute
the four features as we described above, with the exception of one user from the gigs
forum (see Supplementary Information 3). Note that the baseline accounts for a large
part, but not all of the variation in the forum slopes. The Pearson correlation between
the slope and baseline features is 0.67.
2 There is also a hidden reward, because even without receiving replies, reading the forum
can be a rewarding experience. However, the reading counts are usually difficult to account for
numerically. We do not have these counts for our datasets.
A Time Decoupling Approach for Studying Forum Dynamics
21
Table 4 Summary of forum features for nine forums from Boards.ie
Name
politics
soccer
poker
martial
personal
accomm.
gigs
weather
develop.
Size
881
243
610
520
1952
787
1151
186
355
Length
28.89
117.36
110.39
66.38
21.99
13.93
7.32
9.98
11.86
Slope Base Offset
+0.01
0.98
0.95
-0.01
-0.03
0.89
+0.01
0.91
-0.13
0.79
-0.05
0.81
+0.04
0.84
0.78
-0.08
-0.01
0.86
0.97
0.97
0.92
0.90
0.92
0.86
0.80
0.86
0.87
Spread
11.55
13.56
38.59
21.57
9.86
7.85
2.03
1.87
3.93
6.2 Automated Categorization of Forums
We next use our forum features as the basis for performing a hierarchical clustering of
forums. We then show how this clustering allows us (i) to validate the proposed forum
features, and (ii) to demonstrate the utility of the features.
Prior to the clustering, we normalize each feature by its variance, because otherwise
some feature values are orders of magnitude larger than others, and hence have a much
higher impact on the clustering. The slope feature was not used in the clustering,
because it is included as the baseline and offset features. The baseline and offset features
were normalized by the variance of the baseline feature, because these two features are
on the same scale with dominating baseline values. There is no need to align the features
to zero mean, because we use Euclidean distance for the similarity between points, and
hence only the difference between values matters.
We do not have a predefined number of clusters, and therefore we use hierarchical
clustering. We use agglomerative hierarchical clustering with Ward’s linkage method
and the Euclidean distance. We also tried other approaches such as single linkage or
average linkage, but observed similar groupings. We report the clustering where the
grouping is most prominent. We use Euclidean distance because it is widely used and it
is compatible with different linkage strategies. We do not use cosine similarity, since this
measure is not sensitive to the magnitude of feature vectors. We discuss our clustering
results below.
Hierarchical Clustering
The resulting hierarchical clustering is shown in Figure 11. A prominent feature of
the clustering is the presence of two distinct groups that we have labeled with the
terms monologue and dialogue. The forums in the monologue branch tend to have
slopes closer to the x-axis than the forums from the dialogue branch. That is, the
users in monologue forums tend to post more than they receive replies, whereas the
users in dialogue forums tend to have more balanced conversations in terms of the
numbers of posts and replies. This justifies the choice of labels for the two branches.
Alternatively, monologue forums can be viewed as announcement or classified forums,
whereas dialogue forums can be viewed as discussion forums.
The personal forum stands apart, mostly because it has the largest offset between
the baseline and slope. In the visualization, this fact is reflected with the presence of
user paths that deviate significantly from the baseline. Furthermore, in each branch,
22
Andrey Kan et al.
dialogue
monologue
politics
soccer
poker
martial
personal
gigs
weather
develop.
accomm.
Fig. 11 Hierarchical clustering of forums. A prominent feature of the clustering is the presence
of two distinct groups that we labeled with the terms monologue and dialogue. The users in
monologue forums tend to post more than they receive replies, whereas the users in dialogue
forums tend to have more balanced conversations in terms of the numbers of posts and replies.
the politics and gigs forum stand apart because they have the largest number of users
in the corresponding group.
The automated categorization of forums demonstrates the utility of our forum
features. The categorization can be used by forum administrators to select different
management policies for different categories of forums. Further, the categorization of
forums can inform the structural design of forum websites.
It is hard to define the ground truth clustering for forums, and researchers often
have to appeal to intuitive categorizations of forum names [9, 19]. Therefore, we validate
our clustering, and hence our forum features, indirectly. We note that the hierarchical
clustering aligns with a possible manual clustering of visualizations (Figure 10), as well
as with a possible intuitive grouping of forums (e.g., the soccer and martial arts forums
group together). Furthermore, the interpretable clustering of forums that we were able
to produce demonstrates potential value of our forum features.
Moreover, given the explanatory nature of unsupervised clustering, a misalignment
with respect to a hypothetical ground truth or with respect to the intuition is not
necessarily a negative result. We note that our clustering reveals new information. For
example, it might not be obvious beforehand that the personal forum should be put in
the monologue category, or that the accommodation and development forums comprise
the most similar pair of forums. We further highlight the novelty of our clustering by
comparing it to a result from previous work.
A Time Decoupling Approach for Studying Forum Dynamics
23
Comparison with Previous Work
As mentioned in Section 1, we depart from past work on roles by exploring the stability
of user patterns over time, rather than assuming a stable behavioral role within an
ecology of participatory roles. Moreover, we provide simplified statistics for assessing
roles compared to factor analytic approaches [9, 10] or multi-metric assessments [29].
Using this technique we also gained new insights on old data: The categorization of
Boards.ie by Chan et al. [9] produced an interesting if unexpected series of similarities
across boards. For example, ‘Politics’ and ‘Accommodation’ appeared very similar in
role composition. Given the unexpected nature of these findings, it made theorization
difficult. Also, past work on thread structure has shown that discussion structure tends
to map on to expected notions of discussion intensity [10]. To this end, the hierarchical
clustering we have shown in this paper has face validity, despite requiring no knowl-
edge of the content of the forums. This is not to undermine earlier work, but to point
towards techniques that reinforce existing expected similarities and draw upon behav-
iors that we consider to be especially salient. We assert that persistence in the board
and tendency to reciprocate are salient features. The politics forum consists of highly
persistent users and reciprocal communication, whereas and the accommodation fo-
rum exhibits less reciprocal communication and ephemeral users. Additionally, looking
at the role composition of the personal forum, one can suggest that most people are
quiet, whereas our study reveals that there are a notable minority of users who are
able to consistently generate a lot of attention, probably as a means of garnering social
support.
Rather than stating that only one of the methods is correct, we conclude that our
approach is complementary to previous work, as it provides an alternative view on
the forums. However, three of the advantages of our method are its computational
simplicity, its focus on metrics known to be of relevance to forum participants, and
its capacity to provide both micro-level statistics about users and global statistics on
interactions over time.
Alternative Clustering: Baseline Only
Recall that the baseline feature accounts for a large part of variation of the slope
feature. In this section, we study the effect of replacing the slope feature with the
baseline feature. We produce a hierarchical clustering as described above but without
the offset feature (Figure 12). We observe that, despite the baseline and slope features
being correlated, the clustering results differ.
A prominent effect from ignoring the difference between the baseline and slope fea-
tures, is that the personal and politics forums appear to be relatively similar and form
a cluster. However, as can be seen in Figure 10 (see also Section 3 in Supplementary
Information) a certain portion of paths in the personal forum asymmetrically diverges
from the baseline, whereas the paths in the politics forum tend to follow the baseline
more closely. The baseline feature alone was not able to capture this specific trend,
and we suggest using both the baseline and the offset features as they encompass more
information about the user behavior.
24
Andrey Kan et al.
soccer
poker
martial
politics
personal
gigs
accomm.
weather
develop.
1
2
3
4
5
Fig. 12 Alternative hierarchical clustering that ignores the difference between the baseline
and slope features. This clustering differs from the main clustering. For example, the alternative
clustering is less balanced.
6.3 Influential Users in the Personal Forum
We note that the personal forum has the highest offset compared to other Boards.ie
forums. Therefore we test whether this is an effect of a few particular users that have a
high influence on the slope feature or a pattern that is supported by the majority of the
users in the forum. We define the slope influence of a user as a signed difference between
the slope estimated with the user path included and the slope estimated without the
path. Interestingly, we find that there are no exceptionally influential users: 99% of the
individual slope influences fall in the interval [−0.002; 0.001].
Although visualizations of the personal forum (Figure 10 and Section 3 in Supple-
mentary Information) show that some users deviate from the slope, excluding individual
users does not have a strong effect on the estimation of the slope. We conclude that the
difference between the baseline and the slope is not a result of outliers, but the pattern
that arises from the behavior of the majority of users. This difference is captured by
our features, which provides an additional justification for our methodology.
A Time Decoupling Approach for Studying Forum Dynamics
25
7 Conclusions
Forum data provide numerous potential avenues for analysis and visualization, many
of which we have mentioned above. Our contribution to this area has been to focus on
mechanisms that past work have considered salient (reciprocity and persistence) and
that can be employed in a time decoupling approach. In our approach, we decoupled
timing information into user paths and timing vectors, and studied these parts sepa-
rately. We constructed user paths using two new features: the number of a user’s posts
and the number of replies to the user over time.
We studied the paths of over 30, 000 users from four forum websites, and found
that users tend to exhibit consistency in communication over time. We proposed to
model the user paths with coin toss and stickiness models and found that in certain
forums, users tended to be more consistent than one would expect for a random user
modeled with the coin toss model. We also found zones in the feature space where
users were unlikely to be located. Furthermore, we studied the timing vectors for these
users and observed bursty behavior, a well-known phenomenon in other domains (see
for example [3] and references therein).
We used our results to represent forums in terms of the temporal behavior of users,
and validated our forum features with a hierarchical clustering of forums. We proposed
a number of applications for our results, such as predicting whether a user is likely to
be involved in conversations in the future based on past observations, and identifying
the normative behavior for a given forum.
In addition to our main results, we wish to emphasize the flexibility and generality
of our approach, since it can be applied to other domains, such as email or phone
communications. This leads to potential future work in expanding this technique. One
expansion would be to consider different media, such as a call graph, where posts and
replies are replaced with patterns of initiation between calling partners. In this case, it
is known that initiation patterns vary by media [8], but exact values and a role analysis
is yet to be done. Another extension would consider alternate feature spaces, such as
posts that are weighted (such as Amazon’s ‘useful’ score or Reddit and more recently
YouTube’s upvotes/downvotes scores). The latter case might provide many interesting
revelations about trolling and flaming given that a user’s score may fall below zero. By
contrast, in the current case, all replies increase the value of the user’s score.
Finally, we believe our technique provides a powerful way to look not just at the
differences between users, but at the collective evolution of communities. Trending
slopes over time may provide an indicator for moderators about the success of their
community, or be employed as real-time statistics for site owners about the health of
their site and the intensity of discussion therein.
Acknowledgments
We would like to thank Václav Belák from Digital Enterprise Research Institute for
preparing the TiddlyWiki dataset, and Lee Jensen from Ancestry.com Inc. for help in
obtaining the Ancestry.com dataset.
This work is partially supported by the Science Foundation Ireland (SFI) under
CLIQUE Strategic Cluster, grant number 08/SRC/I1407. This work is partially sup-
ported by National ICT Australia (NICTA). NICTA is founded by the Australian
26
Andrey Kan et al.
Government’s Backing Australia’s Ability initiative, in part through the Australian
Research Council.
References
1. Adar, E., Adamic, L.: Tracking Information Epidemics in Blogspace.
In: The 2005
IEEE/WIC/ACM International Conference on Web Intelligence, pp. 207–214 (2005)
2. Aumayr, E., Chan, J., Hayes, C.: Reconstruction of Threaded Conversations in Online
Discussion Forums. In: The 5th International AAAI Conference on Weblogs and Social
Media (2011)
3. Barabasi, A.: The origin of bursts and heavy tails in human dynamics. Nat. 435(7039),
4. Benevenuto, F., Rodrigues, T., Cha, M., Almeida, V.: Characterizing User Behavior in
In: The 9th ACM Conference on Internet Measurement, pp.
207–211 (2005)
Online Social Networks.
49–62 (2009)
5. Bird, C., Gourley, A., Devanbu, P., Gertz, M., Swaminathan, A.: Mining email social
networks. In: The 2006 ACM International Workshop on Mining Software Repositories,
pp. 137–143 (2006)
6. Botev, Z., Grotowski, J., Kroese, D.: Kernel density estimation via diffusion. The Ann. of
Stat. 38(5), 2916–2957 (2010)
7. Boutsidis, C., Mahoney, M., Drineas, P.: Unsupervised feature selection for the k-means
clustering problem. In: Y. Bengio, D. Schuurmans, J. Lafferty, C.K.I. Williams, A. Culotta
(eds.) Advances in Neural Information Processing Systems 22, pp. 153–161 (2009)
8. Carrasco, J.A., Hogan, B., Wellman, B., Miller, E.: Agency in Social Activity Interactions:
The Role of Social Networks in Time and Space. Tijdschr. voor Econ. en Soc. Geogr. (J.
of Econ. & Soc. Geogr.) 99(5), 562–583 (2008)
9. Chan, J., Daly, E., Hayes, C.: Decomposing discussion forums and boards using user roles.
In: The 4th International AAAI Conference on Weblogs and Social Media, pp. 215–218
(2010)
10. Gonzalez-Bailon, S., Kaltenbrunner, A., Banchs, R.: The structure of political discussion
networks: a model for the analysis of online deliberation. J. of Inf. Technol. 25(2), 230–243
(2010)
11. Keogh, E., Chu, S., Hart, D., Pazzani, M.: Segmenting time series: A survey and novel
approach. In: M. Last, A. Kandel, H. Bunke (eds.) Data mining in time series databases,
pp. 1–21. World Scientific Publishing (2003)
12. Kim, S.N., Wang, L., Baldwin, T.: Tagging and linking web forum posts. In: The 14th
Conference on Computational Natural Language Learning, pp. 192–202. Springer (2010)
13. Kumar, R., Mahdian, M., McGlohon, M.: Dynamics of conversations. In: The 16th ACM
SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 553–
562. ACM (2010)
14. Liao, Y., Moshtaghi, M., Han, B., Karunasekera, S., Kotagiri, R., Baldwin, T., Harwood,
A., Pattison, P.: Mining Micro-Blogs: Opportunities and Challenges. In: A. Abraham, A.E.
Hassanien (eds.) Social Networks: Computational Aspects and Mining. Springer (2011)
15. Lin, C., Mei, Q., Jiang, Y., Han, J., Qi, S.: Inferring the Diffusion and Evolution of Topics
in Social Communities. Soc. Netw. Min. and Anal. 3 (2011)
16. Loekito, E., Bailey, J., Pei, J.: A Binary Decision Diagram Based Approach for Mining
Frequent Subsequences. Knowl. and Inf. Syst. 24(2), 235–268 (2010)
17. Lui, M., Baldwin, T.: Classifying User Forum Participants: Separating the Gurus from the
Hacks, and Other Tales of the Internet. In: The 2010 Australasian Language Technology
Workshop, vol. 49, p. 57 (2010)
18. Malmgren, R., Stouffer, D., Motter, A., Amaral, L.: A Poissonian explanation for heavy
tails in e-mail communication. Proc. Natl. Acad. Sci. U.S.A. 105(47), 18,153–18,158 (2008)
19. Morzy, M.: An Analysis of Communities in Different Types of Online Forums. In: The
2010 International Conference on Advances in Social Networks Analysis and Mining, pp.
341–345. IEEE (2010)
20. Mueen, A., Keogh, E., Zhu, Q., Cash, S., Westover, B.: Exact discovery of time series
motifs. In: 2009 SIAM International Conference on Data Mining, pp. 1–12 (2009)
21. Petrovčič, A., Vehovar, V., Žiberna, A.: Posting, quoting, and replying: a comparison of
methodological approaches to measure communication ties in web forums. Qual. & Quant.
pp. 1–26 (2011)
A Time Decoupling Approach for Studying Forum Dynamics
27
22. Plickert, G., Côté, R., Wellman, B.: It’s not who you know, it’s how you know them: Who
exchanges what with whom? Soc. Netw. 29(3), 405–429 (2007)
23. Somol, P., Novovicová, J., Pudil, P.: Efficient feature subset selection and subset size
optimization. In: A. Herout (ed.) Pattern Recognition Recent Advances. InTech (2010)
24. Turner, T., Smith, M., Fisher, D., Welser, H.: Picturing Usenet: Mapping computer-
mediated collective action. J. of Comput.-Mediat. Commun. 10(4), 7 (2005)
25. Viégas, F., Smith, M.: Newsgroup crowds and authorlines: Visualizing the activity of
individuals in conversational cyberspaces. In: The 37th Annual Hawaii International Con-
ference on System Sciences, p. 10 (2004)
26. Viswanath, B., Mislove, A., Cha, M., Gummadi, K.: On the Evolution of User Interaction
in Facebook. In: The 2nd ACM Workshop on Online Social Networks, pp. 37–42 (2009)
27. Wang, L., S.N., K., Baldwin, T.: Thread-level Analysis over Technical User Forum Data.
In: The 2010 Australasian Language Technology Workshop, vol. 49, p. 27 (2010)
28. Warren Liao, T.: Clustering of time series data – a survey. Pattern Recognit. 38(11),
1857–1874 (2005)
29. Welser, H., Gleave, E., Fisher, D., Smith, M.: Visualizing the signatures of social roles in
online discussion groups. J. of Soc. Struct. 8(2) (2007)
30. Xiong, R., Donath, J.: PeopleGarden: creating data portraits for users.
In: The 12th
Annual ACM Symposium on User Interface Software and Technology, pp. 37–44 (1999)
|
1804.05525 | 1 | 1804 | 2018-04-16T07:24:02 | An Integrated Framework for Competitive Multi-channel Marketing of Multi-featured Products | [
"cs.SI"
] | For any company, multiple channels are available for reaching a population in order to market its products. Some of the most well-known channels are (a) mass media advertisement, (b) recommendations using social advertisement, and (c) viral marketing using social networks. The company would want to maximize its reach while also accounting for simultaneous marketing of competing products, where the product marketings may not be independent. In this direction, we propose and analyze a multi-featured generalization of the classical linear threshold model. We hence develop a framework for integrating the considered marketing channels into the social network, and an approach for allocating budget among these channels. | cs.SI | cs | An Integrated Framework for Competitive
Multi-channel Marketing of Multi-featured Products
Swapnil Dhamal
INRIA Sophia Antipolis M´editerran´ee, France
Email: [email protected]
8
1
0
2
r
p
A
6
1
]
I
S
.
s
c
[
1
v
5
2
5
5
0
.
4
0
8
1
:
v
i
X
r
a
Abstract-For any company, multiple channels are available
for reaching a population in order to market its products. Some of
the most well-known channels are (a) mass media advertisement,
(b) recommendations using social advertisement, and (c) viral
marketing using social networks. The company would want
to maximize its reach while also accounting for simultaneous
marketing of competing products, where the product marketings
may not be independent. In this direction, we propose and
analyze a multi-featured generalization of the classical linear
threshold model. We hence develop a framework for integrating
the considered marketing channels into the social network, and
an approach for allocating budget among these channels.
Index Terms-Social networks, viral marketing, product fea-
tures, mass media, social advertisement, budget allocation
I. INTRODUCTION
Companies can market their respective products through
several possible channels, the most prominent being mass
media advertising (television, radio, newspapers, etc.), fixed
Internet banner ads, banner ads based on browsing history,
recommendations based on attributes (location, age group,
field of work, etc.), recommendations based on friends' pur-
chases, sponsored search ads, social media, sponsored Internet
reviews, and so on. Potential customers or nodes also get
indirectly influenced through their friends owing to word-
of-mouth marketing. In order to make optimal use of these
channels, a company would want to make the decision of how
to invest in each channel, based on the investment strategy of
competitors who also market their products simultaneously.
This paper aims to present a framework for competitive
influence maximization in the presence of several marketing
channels. We focus on modeling three channels, namely, viral
marketing, mass media advertisement, and recommendations
based on friends' purchases using social advertisement.
1) Viral Marketing: In our context, a social network can
be represented as a weighted, directed graph, consisting of
nodes which are potential customers. The model we propose
for influence diffusion in social network is a generalization of
the well-studied linear threshold (LT) model [1]. Given such
a model, a company would want to select a certain number of
seed nodes to trigger viral marketing so that maximum number
of nodes get influenced (buy the product) [2].
2) Mass media advertisement: This is one of the most
traditional way of marketing where a company advertises its
product to the masses using well-accessible media such as
television, radio, and newspaper. The timing of when to show
the ads is critical to ensure optimal visibility and throughput.
3) Social advertisement based on friends' purchases:
While making purchasing decisions, nodes rely not only on
their own preferences but also on their friends', owing to social
correlation due to homophily (bias in friendships towards
similar individuals) [3]. This, in effect, can be harnessed to
suggest products to a node based on its friends' purchasing
behaviors. If a node has high influence on its friend (which
is accounted for in diffusion models like LT), it is likely
that the two nodes are similar. However, if the influence is
low, it is not conclusive whether the nodes are dissimilar. So
in addition to the influence parameter considered in LT-like
models, marketing in practice requires another parameter that
quantifies similarity between nodes. Note that since diffusion
models do not consider this similarity, they alone cannot justify
why two nodes having negligible influence on each other,
display similar behaviors. It has also been observed in Twitter
that almost 30% of information is attributed to factors other
than network diffusion [4]. The effect of such factors could
hence be captured using the similarity parameter.
A. Related Work
The problem of influence maximization is well-studied
in literature on social network analysis. It
is known that
computing the exact value of the objective function for a given
seed set (the expected number of influenced nodes at the end
of diffusion that was triggered at that set), is #P-hard under the
LT model [5]. However, the value can be well approximated
using sufficiently large number of Monte-Carlo simulations.
Though the influence maximization problem under LT model
is NP-hard, the objective function is non-negative, monotone,
and submodular; so greedy hill-climbing algorithm provides an
approximation guarantee for its maximization [2]. There exist
generalizations of LT model, e.g., general threshold model [2],
extensions to account for time [6], and extensions to account
for competition [7], [8]. State-of-the-art heuristics such as
LDAG [5] and Simpath [9] perform close to greedy algorithm
while running several orders of magnitude faster. There also
exist algorithms that provide good performance irrespective of
the objective function being submodular [10].
The problem of competitive influence maximization wherein
multiple companies market competing products using viral
marketing has also been studied [11], [12]. Also, more realistic
models have been developed, where influences not only diffuse
simultaneously but also interact with each other [13], [14].
The impact of recommendations and word-of-mouth mar-
keting on product sales revenue is well studied in marketing
TABLE I
NOTATION
buv
N (v)
huv
χv
γp
kp
βp
t
αp
Av
Pv
B(t)
influence weight of node u on node v
set of influencing neighbors of v
similarity between nodes u and v
threshold of node v
total budget for the marketing of product p
budget for seed nodes for viral marketing of product p
mass media advertising weight of product p in time step t
social advertising weight of product p
final aggregate preference of node v
product bought by node v
set of nodes influenced by time t
literature [15], [16], [17]. Biases in product valuation and
usage decisions when agents consider a product that offers
new features of uncertain value, have been investigated [18].
It has also been discussed how marketers can apply latent
similarities of customers for segmentation and targeting [19].
II. THE PROPOSED FRAMEWORK
We propose a framework to facilitate study of different mar-
keting aspects using a single model, capturing several factors:
1) Companies market their products using multiple channels;
2) Diffusions of different products are mutually dependent;
3) Each node aggregates the mass media advertisements,
buv are such that (cid:80)
recommendations, and neighbors' purchasing decisions.
We first describe LT model, followed by our competitive
multi-feature generalization, and then integration of other
channels into this generalized model. Table I presents notation.
In LT model, every directed edge (u, v) has weight buv ≥ 0,
which is the degree of influence that node u has on node v,
and every node v has an influence threshold χv. The weights
u buv ≤ 1. Owing to thresholds being
private information to nodes, they are assumed to be chosen
uniformly at random from [0, 1]. The diffusion process starts
at time step 0 with the initially activated set of seed nodes, and
proceeds in discrete time steps. In each time step, a node gets
influenced if and only if the sum of influence degrees of the
edges incoming from its already influenced neighbors crosses
u buv ≥ χv. The process
stops when no further nodes can be influenced. Formally, let
u ∈ N (v) if and only if buv (cid:54)= 0. Let B(t) be the set of nodes
influenced by time t. Then
its influence threshold, that is, (cid:80)
v ∈ B(t)\B(t − 1) iff (cid:88)
buv < χv and (cid:88)
buv ≥ χv
(1)
u∈N (v)
u∈B(t−2)
u∈N (v)
u∈B(t−1)
A. Competitive Multi-feature Generalization of LT Model
Products these days, be they toothpastes or mobile phones,
come with several features with different emphases on dif-
ferent features. Let such an emphasis be quantified by a
real number between 0 and 1. That is, a product can be
represented by a vector of mutually independent features
p = (p1,··· , pf ), where pi ∈ [0, 1]. Let the features of each
product be suitably scaled such that p = 1. Note that such
scaling may not be feasible when there is a product p which
offers strictly better features than product q (∀i : pi > qi); so
let the products be such that one of the features corresponds to
Fig. 1. Geometric interpretation of the proposed model
'null'. So p would have a lower null component as compared
to q, thus making the scaling feasible (a higher null component
would imply that the product has a poorer feature set).
Our model for a node getting influenced is analogous to
that used in classical mechanics to study the initial motion of
a body placed on a rough horizontal surface, as a result of
several forces acting on it. In our context, a node is analogous
to the body, and its threshold is analogous to static frictional
force stopping it from moving. Such a force is equal to µsmg,
where m is mass of the body, g is acceleration due to gravity,
and µs is the coefficient of static friction between the body
and surface. For µsg = 1 unit for all nodes, the frictional force
and analogously, the threshold equals mass, which is chosen
uniformly at random from [0, 1] (as assumed in the LT model).
A node v gets influenced in time step t when the net force
on it crosses its threshold value χv; let the net force correspond
to aggregate vector (say Av). Let d(Av, p) be the angular
distance between Av and the product vector p. Since p = 1,
d(Av, p) = arccos
(cid:19)
(cid:18)Av · p
Av
A node buys a product whose angular distance from its
aggregate vector is the least (it can be easily shown that such
a product would have the least Euclidean distance as well).
If there exist multiple such products, one of them is chosen
uniformly at random.
Hence the competitive multi-feature version of (1) is
v ∈ B(t)\B(t−1) , Av =
buvPu , Pv = arg min
d(Av, p)
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)
(cid:88)
p
buvPu
u∈N (v)
u∈B(t−1)
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) ≥ χv
(cid:88)
u∈N (v)
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) < χv
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)
(cid:88)
u∈N (v)
u∈B(t−2)
iff
buvPu
and
A geometric interpretation of the proposed model is pre-
sented in Figure 1. Consider 2 competing products having 2
features, say p = (p1, p2), q = (q1, q2). In time step 0, Sp and
Sq are selected for seeding by products p and q, respectively.
In time step 1, node v aggregates the purchasing decisions of
its neighbors Sp and Sq, hence obtaining the aggregate vector
0.4p+0.2q. Say(cid:112)(0.4p1 + 0.2q1)2 + (0.4p2 + 0.2q2)2 < χv,
Av = (cid:112)(0.5p1 + 0.4q1)2 + (0.5p2 + 0.4q2)2 ≥ χv, so v
so v is not influenced yet. However, u and w purchase products
p and q respectively (since the influence weights from Sp to
u and Sq to w are 1). Hence in time step 2, node v aggregates
the purchasing decisions of u and w, hence obtaining the
aggregate vector Av = (0.4p + 0.2q) + (0.1p + 0.2q). Say
is now influenced and it purchases product p if d(Av, p) <
d(Av, q), q if d(Av, p) > d(Av, q), else it chooses randomly.
B. Properties of the Generalized LT Model
i
let
(cid:80)
The standard LT model is a special case of the proposed
model, where there is a single product with one feature, i.e.,
p = (1). As the problem of influence maximization in the
standard LT model is NP-hard, we have that the problem of
influence maximization in the proposed model is also NP-hard.
We now explain the multi-feature (vector-based) model with
an illustrative example, which will also throw light on the
properties of the objective function under the proposed model.
Recollect that the threshold for any node is chosen uniformly
at random from [0, 1]. Let Pp
v(Sp, Sq) be the probability
that node v gets influenced by product p when Sp and Sq
are selected for seeding by p and q respectively. In Figure
the two products be p = (1, 0) and q = (0, 1).
2,
Let σp(Sp, Sq) be the expected number
of nodes influenced by p when Sp and
Sq are selected for seeding by p and
q respectively. That is, σp(Sp, Sq) =
Pp
i (Sp, Sq). With diffusion starting
from Sp and Sq simultaneously, we have
Pp
a(Sp, Sq) = 0 and Pq
a(Sp, Sq) = 0.60.
Note that if a is influenced by q, then it
influences v with probability 0.70 even
before the influence of p reaches it,
starting from Sp; now even if influence
of p reaches it, it is impossible for its
aggregate preference to be closer to p than to q. So node v
can get influenced by p only if a is not influenced by q. So
v(Sp, Sq) = 0.3(1 − Pq
Pp
a(Sp, Sq)) = 0.12. So all 30 nodes
which have v as sure influencer get influenced by p with prob-
ability 0.12. Hence σp(Sp, Sq) = 1 + 2 + 0.12(1 + 30) = 6.72.
a(T p, Sq) = 0
due to an incoming edge of 0.6 from Sq (it is impossible for
√
the aggregate preference of node a to be closer to p than to q).
0.62 + 0.42 ≈ 0.72. From the argu-
However, Pq
v(T p, Sq) = 0.3(1 − Pq
ment similar as above, Pp
a(T p, Sq)) <
0.084. So the 30 nodes get influenced by p with probability
less than 0.084. Hence σp(T p, Sq) < 2 + 2 + 0.084(1 + 30) <
6.61. That is, σp(T p, Sq) < σp(Sp, Sq).
Now if the seed set for p is T p = Sp ∪ u, Pp
a(T p, Sq) =
Fig. 2. Example
Thus while the objective function in the standard LT model
follows monotone increasing property, adding a node to a set
in the generalized model could decrease its value; this proves
non-monotonicity. It can also be shown using counterexamples
that σp(·) is neither submodular nor supermodular.
Fig. 3. Integration of mass media and social advertisements into the network
Let βp
t=1 βp
product p in time step t and βp be the total
over time T , that is, βp = (cid:80)T
C. Integrating Mass Media & Social Advertising into Network
t be the investment for mass media advertising of
investment
t . For social advertising,
we consider that a company would recommend or advertise
product p to a node when any of its friends u has bought the
product. Let αp be the effort invested in social advertising. Let
huv (or hvu) be the parameter that quantifies the similarity
between nodes u and v. So αphvu could be viewed as
the influence of such a recommendation on v owing to the
purchase of product p by u. Since the total influence weight
u∈N (v) buv, the total
u∈N (v) buv.
t=1 and αp)
t=1
allotted by node v for viral marketing is(cid:80)
weight that it can allot for other channels is 1−(cid:80)
Hence the weights allotted for other channels ((βp
would be scaled accordingly to obtain the values of ( βp
and αp specific to node v. A simple scaling rule is:
t )T
t )T
βp
t
βp
t
=
αp
αp =
1 −(cid:80)
(cid:16)(cid:80)
u∈N (v) αphuv +(cid:80)T
u∈N (v) buv
(cid:80)
p
(cid:17)
t=1 βp
t
In order to integrate mass media and social advertisements
into the network, we add pseudonodes and pseudoedges cor-
responding to them, as illustrated in Figure 3. Pseudonode p
corresponds to the product company itself (the figure shows
two separate copies of pseudonode p for the two channels for
better visualization; they are the same pseudonode). Pseudon-
ode p and all seed nodes selected for viral marketing, are
influenced in time step 0.
For integrating mass media advertisement, we create a set of
pseudonodes {p(t)}T
t=1 (where p(1) corresponds to pseudonode
p), and pseudoedges {(p(t−1), p(t))}T
t=2 of weight 1. Hence
p(t) gets influenced with probability 1 in time step t − 1 (see
Figure 3). We further create pseudoedges {(p(t), v)}T
t=1 for
node v such that bp(t)v = βp
t . Since p(t) gets influenced in time
t − 1, node v receives influence of βp
t from pseudonode p(t)
in time step t; this is equivalent to mass media advertisement.
For integrating social advertisement, corresponding to edge
(u, v), we create an intermediary pseudonode w with a fixed
threshold χw > 0, and pseudoedges such that buw = ∈
(0, χw), bpw = χw − , bwv = αphuv (see Figure 3). Now if
the reference friend u is influenced by some product q, where
the angle between products p and q be θ, the intermediary
pseudonode w gets influenced if and only if (χw−)p+q ≥
χw. Since p = q = 1, this is equivalent to
(χw − )2 + 2 + 2(χw − ) cos θ ≥ χ2
w
⇐⇒ 2(χw − )(cos θ − 1) ≥ 0
⇐⇒ θ = 0 (∵ < χw)
⇐⇒ q = p (∵ p = q)
So w gets influenced if and only if u buys product p,
after which v is recommended to buy p with influence weight
αphuv. Also note the time lapse of one step between the
reference friend u buying the product and the target node v
receiving the recommendation. Hence the latency in recom-
mendation using social advertising is implicitly accounted for.
III. THE UNDERLYING PROBLEM
The fundamental problem here is to distribute the total
available budget among the three marketing channels under
study. Let kp be the number of free samples of product p that
the company would be willing to distribute. Let Sp be the
corresponding set of nodes in the social network to whom free
samples would be provided (Sp = kp). Let cp(·) be the cost
function for allotting effort of activating set Sp to trigger viral
marketing, αp for social advertising, and (βq
t=1 correspond-
ing to each step of mass media advertising. In general, cp(·)
would be a weighted sum of these parameters since the costs
for adjusting parameters corresponding to different channels
would be different. Let γp be the total budget for marketing
of product p. Let νp(·) be the expected number of nodes
(excluding pseudonodes) influenced by product p, accounting
for the marketing strategies of p and its competitors. Hence
the optimization problem for the marketing of product p is
t )T
νp(Sp, αp, (βp
t )T
Find Sp, αp, (βp
t=1 to maximize
t )T
t=1, (Sq, αq, (βq
t=1)q(cid:54)=p)
t=1) ≤ γp
such that cp(Sp, αp, (βp
t )T
t )T
(2)
t )T
t=1 βp
t=1 such that (cid:80)T
In the above optimization problem, we not only need to
determine the optimal allocation among channels (kp, βp, αp),
but the best kp nodes to trigger viral marketing Sp such that
Sp = kp, and the optimal allocation over time for mass media
advertising (βp
t = βp. The problem
hence demands a method for multi-parametric optimization.
Methods such as Fully Adaptive Cross Entropy (FACE)
provide a simple, efficient, and general approach for simultane-
ous optimization over several parameters [20]. In our context,
the FACE method involves an iterative procedure where each
iteration consists of two steps, namely, (a) generating data
samples according to a specified distribution and (b) updating
the distribution based on the sampled data to produce better
samples in the next iteration. Here, our sample is a vector
consisting of whether a node should be included in Sp, budget
allotted for each time step of mass media advertising (βp
t=1,
and budget allotted for social advertising αp; each data sample
t=1) ≤ γp. Initially,
satisfies the cost constraint cp(Sp, αp, (βp
t )T
the data samples could be generated based on a random distri-
bution. The value of the objective function νp(·) is computed
for each data sample as per the proposed model using a
sufficiently large number of Monte Carlo simulations. The
distribution is then updated by considering data samples which
provide value of the objective function better than a certain
t )T
percentile. This iterative updating continues until convergence
or for a fixed number of iterations. The obtained terminal data
sample acts as the best response allocation strategy for product
p, in response to the strategies of competitors.
A Note for Practical Implementation
In order to implement the proposed framework in practice,
a company would need to map its customers to the corre-
sponding nodes in social network. To create such a mapping,
it would be useful to get the online social networking identity
(say Facebook ID) of a customer as soon as it buys the product.
This can be done using a product registration website (say
for activating warranty) where a customer, when it buys the
product, needs to login using a popular social networking
website (such as Facebook), or needs to provide its email
address which could be used to discover its online social
networking identity. Thus the time step when the node has
bought the product, can also be obtained.
REFERENCES
[1] D. Easley and J. Kleinberg, Networks, Crowds, and Markets: Reasoning
About a Highly Connected World. Cambridge University Press, 2010.
[2] D. Kempe, J. Kleinberg, and ´E. Tardos, "Maximizing spread of influence
through a social network," in SIGKDD. ACM, 2003, pp. 137–146.
[3] F. Chua, H. Lauw, and E.-P. Lim, "Generative models for item adoptions
using social correlation," IEEE Transactions on Knowledge and Data
Engineering, vol. 25, no. 9, pp. 2036–2048, 2013.
[4] S. Myers, C. Zhu, and J. Leskovec, "Information diffusion and external
influence in networks," in SIGKDD. ACM, 2012, pp. 33–41.
[5] W. Chen, Y. Yuan, and L. Zhang, "Scalable influence maximization in
IEEE,
social networks under the linear threshold model," in ICDM.
2010, pp. 88–97.
[6] W. Chen, W. Lu, and N. Zhang, "Time-critical influence maximization in
social networks with time-delayed diffusion process." in AAAI. AAAI,
2012, pp. 592–598.
[7] A. Borodin, Y. Filmus, and J. Oren, "Threshold models for competitive
influence in social networks," in WINE. Springer, 2010, pp. 539–550.
[8] N. Pathak, A. Banerjee, and J. Srivastava, "A generalized linear threshold
model for multiple cascades," in ICDM.
IEEE, 2010, pp. 965–970.
[9] A. Goyal, W. Lu, and L. V. S. Lakshmanan, "SIMPATH: An efficient
algorithm for influence maximization under the linear threshold model,"
in ICDM.
IEEE, 2011, pp. 211–220.
[10] R. Narayanam and Y. Narahari, "A Shapley value-based approach to
discover influential nodes in social networks," IEEE Transactions on
Automation Science and Engineering, vol. 8, no. 1, pp. 130–147, 2011.
[11] S. Bharathi, D. Kempe, and M. Salek, "Competitive influence maxi-
mization in social networks," in WINE. Springer, 2007, pp. 306–311.
[12] S. Goyal and M. Kearns, "Competitive contagion in networks," in STOC.
ACM, 2012, pp. 759–774.
[13] S. Myers and J. Leskovec, "Clash of contagions: Cooperation & com-
IEEE, 2012, pp. 539–548.
[14] A.Zarezade, A.Khodadadi, M.Farajtabar, H.Rabiee, and H.Zha, "Corre-
petition in information diffusion," in ICDM.
lated cascades: Compete or cooperate." in AAAI, 2017, pp. 238–244.
[15] D. Godes, "The strategic impact of references in business markets,"
Marketing Science, vol. 31, no. 2, pp. 257–276, 2012.
[16] R. Van der Lans, G. Van Bruggen, J. Eliashberg, and B. Wierenga, "A
viral branching model for predicting the spread of electronic word of
mouth," Marketing Science, vol. 29, no. 2, pp. 348–365, 2010.
[17] S. Aral and D. Walker, "Creating social contagion through viral product
design: A randomized trial of peer influence in networks," Management
Science, vol. 57, no. 9, pp. 1623–1639, 2011.
[18] R. Meyer, S. Zhao, and J. Han, "Biases in valuation vs. usage of
innovative product features," Marketing Science, vol. 27, no. 6, pp.
1083–1096, 2008.
[19] M. Braun and A. Bonfrer, "Scalable inference of customer similarities
from interactions data using dirichlet processes," Marketing Science,
vol. 30, no. 3, pp. 513–531, 2011.
[20] P.-T. De Boer, D. P. Kroese, S. Mannor, and R. Y. Rubinstein, "A tutorial
on the cross-entropy method," Annals of operations research, vol. 134,
no. 1, pp. 19–67, 2005.
|
1910.10472 | 1 | 1910 | 2019-10-13T00:47:09 | Universal Boolean Logic in Cascading Networks | [
"cs.SI",
"physics.bio-ph",
"physics.data-an",
"physics.soc-ph"
] | Computational properties of networks that can undergo cascades are examined. It is shown that universal Boolean logic circuits can be computed by a global cascade having antagonistic interactions. Determinism and cascade frequency of this antagonistic model are explored,as well as its ability to perform classification. Universality of cascade logic may have far-reaching consequences, in that it can allow unification of the theory of computation with the theory of percolation. | cs.SI | cs | Universal Boolean Logic in Cascading Networks
Galen Wilkerson and Sotiris Moschoyiannis
University of Surrey, Guildford, Surrey, GU2 7JP, UK
[email protected], [email protected]
Abstract. Computational properties of networks that can undergo cascades are examined. It is
shown that universal Boolean logic circuits can be computed by a global cascade having antag-
nistic interactions. Determinism and cascade frequency of this antagonistic model are explored,
as well as its ability to perform classification. Universality of cascade logic may have far-
reaching consequences, in that it can allow unification of the theory of computation with the
theory of percolation.
Keywords: Functional completeness, Boolean logic, complex networks, perco-
lation, cascades, social networks, self-organized criticality, deep learning
1
Introduction
Cascades are ubiquitous phenomena, found in social decision making, information
diffusion, disease spreading, neuronal firing, and many other biological, social, chem-
ical, and physical systems [5]. A classic example is a sand-pile, gradually built up
grain by grain, until its sides reach a critical slope, undergoing a phase transition,
where it tends to experience large avalanches (cascades) [3]. Another example is a
neuron. When firing at a certain rate, the neuron may act alone, but when it fires at a
critical rate, it may trigger a large cascade, causing many other neurons to fire [4],
possibly optimizing information processing [12]. These models are also related to
percolation theory 1.
The ubiquity of cascades in many naturally-occurring systems is compelling, both
for scientific understanding and as an important mechanism to advance computing.
As Moore's law is challenged by physical limitations, alternative avenues to speed up
computing are being investigated. Organic computing has been studied due to its
great efficiency and adaptability [8]. In fact, when we look at the ability of the brain
to learn quickly and perform many highly complex functions in parallel, we see that
there is a huge efficiency gap between this and the fastest modern computer [10].
Thus, learning in naturally-occurring networks can be compared to 'deep learning'
by artificial neural networks [10], or studied as a problem of control of complex sys-
tems [9].
The McCulloch-Pitts Linear Threshold Unit and early neural networks were moti-
vated by an interest in mimicking brain function. However, it seems that in our mod-
ern era of deep-learning, the focus has been to use stochastic gradient descent and
1 Percolation is a classic model in physics and graph theory describing the sudden appearance
of a giant component as a function of connection probability in Erdos-Renyi graphs. It can also
be related to flow of liquid through a porous medium.
2
back-propagation because they are good engineering that works, but perhaps digress
from the initial inspiration of the brain [10].
Meanwhile, machine learning is pre-dated by and based upon formal theories of
computation, having a long history, starting with logic and computing with Boole and
Babbage and famously advanced with computability and circuit complexity by Tur-
ing, Shannon, and others, describing how simple systems can be combined to power-
ful effect [11].
Thus, the simplicity of the GCM, a networked form of the Linear Threshold Model
[6], and its Boolean construction (edges and node states), along with its possibility to
encode logic circuits (shown here), and its critical cascade behavior, make it a com-
pelling framework to explore the relationships between theories of computation and
theories of criticality and cascades. Both in computer science and physics it is clear
that powerful and significant large-scale behaviour can emerge from the simplest of
models.
The remainder of this paper is organized as follows: In section 2 we examine some
characteristics of the simple Global Cascade Model (GCM) [13], and show that it can
compute Boolean circuits. In section 3, we introduce a small modification to create
an Antagonistic Global Cascade Model (AGCM) having negative interactions, and in
section 4 show that it can compute functionally-complete (universal) Boolean logic
circuits. In section 5, we also show that the GCM can reach deterministic final states,
but the AGCM's final state is not always deterministic. In section 6 the AGCM and
GCM are also shown to have a complementary cascade frequency distribution. Fi-
nally, in section 7 there is a discussion of a few issues and future directions.
2
The Global Cascade Model (GCM)
First, let's briefly review the GCM (on a finite graph) [13]:
The GCM runs as follows:
Create an Erdos-Renyi random network, G(N,p), with a fixed number of
nodes N and edge probability p.
Assign a random threshold value ϕ ~ U[0,1) to each node.
All nodes are marked as unlabeled.
Randomly choose a small fraction (Ф0 << 1) of the graph's nodes to be seeds,
mark them labeled.
Run the simulation by asynchronously checking each unlabeled node, apply-
ing the threshold function
(1)
3
for node u and ν =
that are labeled N L (u)
N L(u)
deg(u)
, the fraction: number of node u's neighbors
, over its degree deg(u)
.
Stop after all unlabeled nodes have been examined without any change in la-
beling. The cascade size is the fraction of nodes (Ф) that are labeled. A
global cascade is said to occur if the cascade size exceeds a predetermined
fixed fraction of the network (e.g. Ф ≥ ½).
Figure 1: A graph focusing on node C's behavior from neighbors (inputs) A and B
under the original labeling rule (Eq. 1). Top: Truth table for OR and correspond-
ϕ ≤ ½. Bottom: Truth table for AND
ing cascade network when node C's threshold
and cascade network when C's ϕ > ½. Networks drawn as directed to show flow of
information.
Nodes in the GCM behave like logic gates. Taking a look at one unlabeled node
(node C, Fig. 1) in a graph with two neighbors, we observe that when C's threshold
ϕ ≤ ½, considering nodes A and B as inputs, and using the labeling rule (Eq. 1), node
C behaves like a logical OR. Similarly, when ϕ > ½, node C behaves like logical
AND.
Generally, for k inputs, a node behaves like multi-input OR for any ϕ ≤ 1/k, and
multi-input AND for any ϕ > (k-1)/k. For 1/k < ϕ ≤ (k-1)/k, a node behaves like a
threshold logic unit [10].
4
As we see in the truth tables (Fig. 1), this model can only carry out monotonically
increasing logical functions such as the identity, AND, or OR [10]. That is, given two
n-dimensional points x=(x1,..., xn)
, a function f is
monotonically increasing if
when the number of 1s in x is at least the
number of 1s in y.
and y=( y1,..., yn)
f ( x)≥ f ( y)
3
The Antagonistic Global Cascade Model (AGCM)
Figure 2: An example of a cascade using the antagonistic model's complement rule (Eq.2), start-
ing at seed node A (step I) and proceeding to nodes C (step II) and D (step III).
We now introduce the Antagonistic Global Cascade Model (AGCM) having antago-
nistic interactions, by making a single modification to the GCM.
We construct a new complement labeling rule by simply reversing the inequalities
of Eq. 1:
(2)
again for node u and ν the fraction of neighbors labeled, as above.
Other than this rule, the operation of the AGCM is the same as the GCM. The new
model's cascade action can be observed in Figure 2.
Figure. 3. Node C's behavior under the complement labeling rule (Eq. 2). Top: Truth table for NOR
and corresponding cascade network whenever node C's ϕ ≤ ½. Bottom: Truth table for NAND and
cascade network whenever C's ϕ > ½.
5
The new labeling rule takes the logical complement of the original Boolean cir-
cuits, computing NOR in the place of OR, and NAND in the place of AND (Fig. 3),
for identical ϕ values. The multi-way logic mentioned above is also complemented in
the same way.
NAND and NOR, are monotonically decreasing Boolean functions (Increasing
true values input decreases true values output), as can be seen in the truth tables in
Fig. 3.
4
Boolean Circuits and Functional Completeness
Figure. 4.: Trivially, we can construct NOT for
a node with a single neighbor and any ϕ >0
value. This can be appended to a NAND or NOR
circuit to give AND or OR.
After a cascade is run (in either model), when all unlabeled nodes have been exam-
ined without any change, the resulting logic circuits have no memory or time compo-
nent, so are called combinational logic circuits that compute straight-line programs
[11].
On a practical level, it is fairly straightforward to wire together Boolean networks.
Logical NOT can be trivially constructed for any ϕ > 0, (Fig. 4) to build up the equiv-
alence of Boolean circuits and Boolean algebra, including NAND and NOR, and their
complement, AND and OR, and any algebraic combination [10].
Recall that functionally complete logic circuits can be created by composition of
solely NAND or solely NOR operations, either of which form a universal basis [11].
This means that any Boolean circuit can be created using a network using this com-
plement labeling rule.
For example, in Fig. 5, we have shown how one particular random AGCM is able
to carry out the logic of a half-adder 2 if the unlabeled nodes are examined in one of
several orders, but not necessarily all possible orders (discussion below). A network
composed of nodes using the GCM labeling rule (Eq. 1) could not have performed
this calculation in a cascade.
We note now that the computational power of such networks is in their scaling of
universal Boolean logic. That is, functional completeness in a large network allows
us to build any logical operation needed, including adding, subtracting, multiplying,
dividing, and much more complex operations, including certain kinds of computer
programs and deciding classes of formal languages [11].
2 A half-adder is a Boolean circuit that adds two bits and outputs a sum and carry bit, much
like standard base 10 addition.
6
Fig. 5. A half-adder implemented by a cascade network having the complement labelingrule. Here
all nodes have been assigned ϕ values equivalent to NAND. This is a very small example of the
power of the functionally-complete Boolean logic that can becomputed by these networks.
Determinism
5
As we have seen, the GCM's labeling rule is monotonically increasing. Therefore, the
original labeling rule leads to convergence to the final state of the network as unla-
beled nodes are examined, and this final state is deterministic (unique). The proof is
as follows.
First we show that no labeling can exclude another labeling in the original GCM:
Theorem 1. Labeling a particular node in the GCM cannot exclude labeling another
node.
Proof. Suppose, at a particular time-step, that examining some node u in the network
leads to labeling u, and this labeling excludes the future labeling of some node v in the
7
network. This contradicts the labeling rule (Eq. 1), which is monotonically increasing
in its inputs. □
After a node has become labeled, it is sufficient to examine all unlabeled nodes U ≤
N only once to determine whether the cascade has completed:
Lemma 1. After a change in labeling of the GCM, it is sufficient to examine each un-
labeled node once to determine whether the cascade has completed.
Proof. Suppose that at a particular time step t, node u1 becomes labeled. Now sup-
pose that after u1 has become labeled we have to examine some unlabeled node u2
more than once to determine whether u2 has become labeled. Letting t1 be the first
time we examine u2 and t2 be the second time we examine u2, this means we have la-
beling rule
, for the same inputs. This contradicts the
labeling rule f (Eq. 1). □
f t1(u2,η,ϕ )≠ f t2(u2,η ,ϕ)
Also, a cascade cannot remain blocked if there is an unlabeled vulnerable node,
simply because this node has not been examined:
Theorem 2. A cascade cannot be blocked indefinitely due to not examining a partic-
ular unlabeled node.
Proof. Suppose node v is the only node that will allow a cascade to
continue.
At a particular time step t, the probability of not examining node v is , for U the
number of unlabeled nodes to be examined (by Lemma 1). As each unlabeled node is
examined at random,
Therefore eventually node v will be examined and the cascade will continue. □
As a result, all cascades in the original GCM must eventually converge to the same
final state:
Theorem 3: The final state of the GCM is unique.
, ϕ f) , the random graph G having N nodes, edge
Proof. Suppose that for G(N, p, s,
probability p, seed node(s) , phi values ϕ, and labeling rule f, the GCM cascade opera-
tion is run separately from start to finish two times, and converges to two different fi-
nal states.
This means that for one of the two runs, either A. labeling one node excluded label-
ing another node, or B. the cascade was blocked because a particular unlabeled node
was never examined. Case A contradicts Theorem 1, and B contradicts Theorem 2. □
8
ϕ
Fig. 6: The complement labeling rule creates order-dependence. In a small fixed network,
nodes B and C have
equivalent to NAND. I. Start with seed node A labeled. The final
state of the network depends on whether we examine II. B first or III. C first.
This leads us to an interesting characteristic that arises when we use the AGCM's
complementary labeling rule -- the final state of the cascade becomes dependent on
the order in which we examine the unlabeled nodes, and therefore unlike the GCM, is
non-deterministic (non-unique). Observe the triangular graph in Fig. 6, where nodes
B and C have ϕ threshold values equivalent to NAND. Starting with seed-node A, if
we first examine node B (top-right), we reach a final state with node B labeled and
node C unlabeled. However, B's and C's rules are identical, so we have broken sym-
metry. A similar behavior can be observed in graphs without a cycle.
6
Cascade Frequency
It appears that the modality of the AGCM's cascade frequency as a function of the av-
erage degree z is complementary to the cascade frequency of the original GCM (See
[13], Fig. 2b). An intuition is that in the AGCM network cascade, an increase in the
number of labels tends to have an antagonistic effect on the number of subsequent la-
bels. Here we have used a uniform ϕ* = 0.18 for all nodes, as in the original work
[13], for graphs having 100,000 nodes over 100 realizations, for the integer-valued
∈ [1,10], to calculate the frequency that the cascade size exceeds me-
mean degree z
dian cascade size (Fig. 7). While in the GCM, the largest cascade frequency occurred
in (2 ≤ z ≤ 6), here we see the smallest cascade frequency in that region.
Thus, it seems that following AGCM's complement rule means that cascades occur
almost exactly when they do not in the original GCM. While in the original model, a
very sparse or disconnected network can easily block or cut off a cascade, in the com-
plement label case a sparsely connected network will tend to create more labeling, as
we see by the left-hand mode, for z ≤ 2 (Fig. 7).
In the region around z = 5, we see low cascade frequency (Fig. 7). In this region,
the graph may still be tree-like [13], with low clustering coefficient
, so that seeds largely reach nodes from only one neighbor,
but since we have chosen ϕ* = 0.18, nodes are not vulnerable, since ν = 1/5 > 0.18 =
ϕ*.
9
Fig. 7. Bi-modality in the global cascade frequency using the complement labeling rule,here on
a network with 10000 nodes over 100 realizations per average degree z, and auniform ϕ∗ =
0.18.
In the original GCM model, as z increases, densely connected unlabeled nodes tend
to dilute the effects of incoming labeled nodes, which are often unable to overcome
thresholds ϕ, driving down the cascade frequency. In the right-hand side (z ≥ 8) of the
AGCM complement case (Fig. 7), unlabeled dense networks tend to be easily influ-
enced by incoming labels, increasing labeling until negative feedback (antagonism)
discourages further labeling, as seems indicated by the lower peak in the right-hand
mode.
7
Discussion
Here we address a few points that may have occurred to the reader.
One might rightly ask how networks with solely negative threshold rules could
come about, where examples of them could be found, and whether it is reasonable to
study them. Antagonistic interactions have been investigated in the area of social bal-
ance [7], consensus [1], and multi-edge graphs [14].
Above, we have discussed cascading networks as Boolean circuits. However, we
can also think of them as performing a classification as in machine- or deep-learning.
The AGCM labeling rule (as well as the original GCM rule) for node u can be written
in the form of a threshold logic unit used in neural networks [10]:
10
where x is the L1-norm (number of ones) of the Boolean input vector x and w =
[1,1,1,…,1]T.
Fig. 8: A thought experiment showing why the original monotonically
increasing GCM rule cannot distinguish between only pixel B being
black, or both pixels being black. The construction of a network (nodes
C and D) attached to A cannot detect when A is unlabeled (white).
Further on classification, at first impression it may seem that the original GCM may
compute a NOT simply by the absence of a cascade (and thereby classify 'cat' or 'not
cat', for example). However, this is not the case. For example, as in (Fig. 8) we may
construct a simple GCM taking an image as its possible seed nodes, and attempt to
detect when only the right-hand pixel (B) is black. (Here, black = 'labeled', white =
'unlabeled' as elsewhere.) However, since the GCM rule is monotonically increasing,
it is impossible to detect when the left-hand pixel (A) input is unlabeled, thereby pos-
sibly obtaining many false positive results. However, the AGCM, having NOT, can
resolve this situation.
Similarly, the classic XOR problem [10] cannot be resolved by the GCM (since the
composition of monotonically increasing functions is monotonically increasing) but
can be resolved by the AGCM, as we see in the sum column of the half-adder truth ta-
ble (Fig. 5).
Finally, we note now that the computational power of such networks is in their
scaling. That is, functional completeness in a large network allows us to build any
logical operation, including adding, subtracting, multiplying, dividing, and very com-
plex operations, including certain kinds of computer programs and classes of formal
languages [2]. If we consider a very large network (the brain has ~ 1011 neurons and ~
1014 synapses), it is hard to imagine the capabilities.
A large number of topics remain to be investigated, unfortunately relegated to 'fu-
ture work'. These are so many it is only possible to list them briefly:
Some of these topics are theoretical: Investigating the existence of a critical thresh-
old in the AGCM model, and finding a closed-form expression for it; How to train or
control the network toward criticality for certain inputs; Analysing both the GCM and
AGCM as dynamical systems, understanding their correlation length and time, stabil-
ity and fixed points, as well as convergence and accuracy evolution of the logic cir-
cuit; understanding how input size, cascade size and criticality relate to circuit size
and depth and information-theoretic measures; understanding how to extract outputs
from the network, using either cascade size or individual nodes; studying how a mix
11
of nodes having one or the other labeling rule can be functionally complete; the rela-
tionship between tree-like topology and logic that can be computed; how criticality in
these simple models relates to optimal functionality in neuronal networks of the brain
[12]; the formal language (called AC for Boolean circuits) that can be computed by
these cascades, and the probabilistic relationship to criticality; and whether these
Boolean cascades can be considered in quantum computing using qubits.
Other topics are more applied: How to build such networks in hardware; considera-
tion of real-world network topologies (rarely Erdos-Renyi); observing and measuring
such cascades 'in the wild' in social, neuronal, or other systems.
8
Conclusion
We have shown that a simple cascading network model can compute Boolean circuits,
and that a cascading network having antagonistic interactions can compute universal,
functionally-complete Boolean logic. We have also shown that, although cascades
over positive interactions can reach deterministic final states, antagonistic interactions
may not. The antagonistic model has a complementary cascade frequency distribution
to the original GCM, and may perform classification, as in machine learning.
This research lets us begin to understand relationships between theories of ubiqui-
tous cascades in nature and Boolean circuits that are fundamental to computing.
References
1. Altafini, C.: Consensus problems on networks with antagonistic interactions. IEEE
Transactions on Automatic Control 58(4), 935 -- 946 (2012)
2. Arora, S., Barak, B.: Computational complexity: a modern approach. Cambridge Uni
versity Press (2009)
3. Bak, P., Tang, C., Wiesenfeld, K.: Self-organized criticality: An explanation of the 1/f
noise. Physical review letters 59(4), 381 (1987)
5.
7.
4. Beggs, J.M., Plenz, D.: Neuronal avalanches in neocortical circuits. Journal of neuro-
science 23(35), 11167 -- 11177 (2003)
Easley, D., Kleinberg, J., et al.: Networks, crowds, and markets, vol. 8. Cambridge
university press Cambridge (2010)
6. Granovetter, M.: Threshold models of collective behavior. American journal of soci-
ology 83(6), 1420 -- 1443 (1978)
Leskovec, J., Huttenlocher, D., Kleinberg, J.: Signed networks in social media. In:
Proceedings of the SIGCHI conference on human factors in computing systems. pp.
1361 -- 1370. ACM (2010)
8. Müller-Schloer, C., Schmeck, H., Ungerer, T.: Organic computing -- A paradigm shift
for complex systems. Springer Science & Business Media (2011)
Prokopenko, M.: Guided self-organization (2009)
9.
10. Rojas, R.: Neural networks: a systematic introduction. Springer Science & Business
Media (2013)
11. Savage, J.E.: Models of computation, vol. 136. Addison-Wesley Reading, MA (1998)
12. Shew, W.L., Plenz, D.: The functional benefits of criticality in the cortex. The neuro-
scientist 19(1), 88 -- 100 (2013)
12
13. Watts, D.J.: A simple model of global cascades on random networks. Proceedings of
the National Academy of Sciences 99(9), 5766 -- 5771 (2002)
14. Zhao, K., Bianconi, G.: Percolation on interacting, antagonistic networks. Journal of
Statistical Mechanics: Theory and Experiment 2013(05), P05005 (2013)
|
1508.07313 | 3 | 1508 | 2016-02-26T20:22:49 | Consensus Convergence with Stochastic Effects | [
"cs.SI",
"nlin.AO",
"physics.soc-ph"
] | We consider a stochastic, continuous state and time opinion model where each agent's opinion locally interacts with other agents' opinions in the system, and there is also exogenous randomness. The interaction tends to create clusters of common opinion. By using linear stability analysis of the associated nonlinear Fokker-Planck equation that governs the empirical density of opinions in the limit of infinitely many agents, we can estimate the number of clusters, the time to cluster formation and the critical strength of randomness so as to have cluster formation. We also discuss the cluster dynamics after their formation, the width and the effective diffusivity of the clusters. Finally, the long term behavior of clusters is explored numerically. Extensive numerical simulations confirm our analytical findings. | cs.SI | cs | Noname manuscript No.
(will be inserted by the editor)
Consensus Convergence with Stochastic Effects
Josselin Garnier · George Papanicolaou ·
Tzu-Wei Yang
Dedication to Willi Jager's 75th Birthday
6
1
0
2
b
e
F
6
2
]
I
S
.
s
c
[
3
v
3
1
3
7
0
.
8
0
5
1
:
v
i
X
r
a
Abstract We consider a stochastic, continuous state and time opinion model
where each agent's opinion locally interacts with other agents' opinions in the
system, and there is also exogenous randomness. The interaction tends to create
clusters of common opinion. By using linear stability analysis of the associated
nonlinear Fokker-Planck equation that governs the empirical density of opinions
in the limit of infinitely many agents, we can estimate the number of clusters, the
time to cluster formation and the critical strength of randomness so as to have
cluster formation. We also discuss the cluster dynamics after their formation, the
width and the effective diffusivity of the clusters. Finally, the long term behavior
of clusters is explored numerically. Extensive numerical simulations confirm our
analytical findings.
Keywords flocking · opinion dynamics · mean field · interacting random processes
Mathematics Subject Classification (2000) 92D25, 35Q84, 60K35
1 Introduction
Opinion dynamics models have attracted a lot of attention and there are many
analytical and numerical studies that consider different models arising from many
different fields. In much of the literature, an opinion dynamics model is a system
with a large number of opinion variables, xi(t), i = 1, . . . , N , taking values in Rn.
The time evolution of the opinion variables is governed by an attractive interaction
Josselin Garnier
Laboratoire de Probabilit´es et Mod`eles Al´eatoires & Laboratoire Jacques-Louis Lions, Univer-
sit´e Paris Diderot, 75205 Paris Cedex 13, France
E-mail: [email protected]
George Papanicolaou
Department of Mathematics, Stanford University, Stanford, CA 94305, USA
E-mail: [email protected]
Tzu-Wei Yang
School of Mathematics, University of Minnesota, Minneapolis, MN 55455, USA
E-mail: [email protected]
2
Josselin Garnier et al.
between any two opinion variables, often taken to be a nonnegative function of
the Euclidean distance of the two opinion variables and may also be time depen-
dent. The most interesting feature of such a model is that opinions only interact
locally and the influence function is compactly supported, interpreted as bounded
confidence. In this case, it is of interest to know whether the system will exhibit
consensus convergence, which means that all the opinion variables converge to the
same point as time tends to infinity. Except for some specific consensus models,
a broad sufficient condition to have consensus convergence for a general class of
models is not known. However, several studies have shown that for a variety of
different types of consensus building interactions, and without external forces or
randomness, the opinions will converge to possibly several clusters. In this case,
the distance between distinct clusters should be larger than the support of the
influence region. But it is not known, in general, how to determine the number of
clusters.
A more realistic way to model opinion dynamics is to add external randomness
to the system. In this case, the model becomes a system of N stochastic processes
and usually the randomness in the model is independent from one opinion holder or
agent to another. Many deterministic techniques can also be used in the stochastic
case, but some methods, such as the use of master equations, are particularly useful
in stochastic models. When the external noise is large in the stochastic models then
the tendency to cluster is effectively eliminated as the system is dominated by the
noise. This is a phenomenon seen elsewhere in statistical physics as well. The
strength of the noise or randomness must be below a critical value in order for
cluster formation to emerge and evolve.
The literature in opinion dynamics is very extensive so we mention only a few
papers that have guided our own work. Hegselmann and Krause [13] consider a
discrete-time evolution model, in which the opinions in the next step are the aver-
age of the current opinions within a specified range of the influence region. Pineda
et al. [25] add noise to the Hegselmann-Krause model and determine the critical
strength of the noise so as to have cluster formation, using a master equation ap-
proach and linear stability analysis. The same method is also used in [23][24] on
the Deffuant-Weisbuch model [8]. In [4], the authors take the limit as the number
of opinions goes to infinity and consider the distribution of the opinions (the Eule-
rian approach), instead of tracking every single opinion in the Hegselmann-Krause
model (the Lagrangian approach), and [21] further discuss the case with external
forces. The long time behavior and a sufficient condition for consensus convergence
of the Hegselmann-Krause model are considered in [2][3][26]. The long time behav-
ior of the Hegselmann-Krause model with a general influence function is discussed
in [16][22]. The Hegselmann-Krause model involving different types of agents is
considered in [14]. Some recent development of the study of opinion dynamics are
in [19][22]. Other, related relevant works are [12][9][20][6][11][5][15][18][1].
Our contributions in this paper are the following. We consider a stochastic
opinion model where every opinion is influenced by an independent Brownian
motion. By the mean field limit theory, the empirical probability measure of the
opinions converges, as the size of the population goes to infinity, to a solution of
a nonlinear Fokker-Planck equation. Using a linear stability analysis, we estimate
the number of clusters, the time to cluster formation and the critical strength
of the Brownian motions to have cluster formation. The linear stability analysis
can be applied to both deterministic and stochastic models. We also discuss the
Consensus Convergence with Stochastic Effects
3
behavior of the system after the initial cluster formation but before further clus-
ter consolidation, where the centers of the clusters are expected to behave like
independent Brownian motions. Finally, we consider the long time behavior of
the system. Once clusters are formed, their centers behave like Brownian motions
until further merging. After consensus convergence, where there is only one clus-
ter, there is a small probability that all the opinions inside the limit cluster will
spread out and the system will become an independent agent evolution. Extensive
numerical simulations are carried out to support our analysis and remarks about
cluster formation and evolution.
The paper is organized as follows. The interacting agent model is presented
in section 2. The mean field limit is presented briefly in section 3. The linearized
stability analysis of the governing nonlinear Fokker-Planck equation is presented in
section 4 when there is no external noise. The results of numerical simulations are
also presented in this section. In section 5 we extend the analysis of the previous
section to the stochastic case when there are external noise influences. We also
present the results of numerical simulations in the stochastic case. In section 6 we
comment briefly about the long time behavior in the stochastic case when there
is clustering. We end with a brief summary and conclusions in section 7.
2 The interacting agent model
The opinion model we consider in this paper is (see [22, Eq. (1.2a)]):
N(cid:88)
j=1
dxi = − 1
N
aij(xi − xj)dt + σdW i(t),
(1)
where xi(t) is the agent i's opinion modeled as real valued process, where t is
time and i = 1, . . . , N . The coefficients aij denote the strength of the interaction
between xi and xj and they are a function of the distance between xi and xj:
aij = φ(xi − xj).
(2)
The interesting case is when the influence function φ is non-negative and com-
pactly supported. In other words, the interactions are attractive and the agent i
affects only the other agents that have similar opinions. Here we assume that φ is
compactly supported in [0, R0]
(cid:18) r
(cid:19)
φ(r) = φ0
R0
(3)
where supp(φ0) = [0, 1].
The W i(t), i = 1, . . . , N are independent standard Brownian motions that
model the uncertainties of the agents' opinions, and σ is a non-negative constant
quantifying the strength of the uncertainties. If σ = 0, then there is no randomness
in this model and (1) is a deterministic system, while if σ > 0, the system becomes
stochastic.
For the purposes of the analysis below, we consider the model (1) on the torus
[0, L] instead of the real line R. i.e. we consider the model in the bounded space
[0, L] with periodic boundary conditions. The assumption of periodic boundary
4
Josselin Garnier et al.
conditions is mostly for simplifying the analysis. Although this assumption may
not be appropriate in some applications, we found that the results obtained using
it are numerically consistent with the same model in full space or in a finite interval
with reflecting boundary conditions. The later two are in general more realistic for
many applications. We note that the same periodicity assumption for the analysis
of the opinion dynamics is also used in [23][24][25].
3 The mean field limit
At time t, we consider the empirical probability measure ρN (t, dx) of the opinions
of all the agents:
ρN (t, dx) =
1
N
δxj (t)(dx).
(4)
N(cid:88)
j=1
Here δx(dx) is the Dirac measure with the point mass at x. The empirical proba-
bility measure ρN (t, dx) is a measure valued stochastic process. We assume that as
N → ∞, ρN (0, dx) converges weakly, in probability to ρ0(dx) which is a determin-
istic measure with density ρ0(x). By using the well known mean field asymptotic
theory (see, for example, [7][10][17]), it can be shown that as N → ∞, ρN (t, dx)
converges weakly, in probability to ρ(t, dx), for 0 ≤ t ≤ T < ∞, a deterministic
probability measure. Under suitable conditions the limit measure has a density
ρ(t, x) which satisfies (in a weak sense) the nonlinear Fokker-Plank equation:
(cid:26)(cid:20)(cid:90)
(cid:21)
(cid:27)
∂ρ
∂t
(t, x) =
∂
∂x
ρ(t, x − y)yφ(y)dy
ρ(t, x)
+
σ2
2
∂2ρ
∂x2 (t, x),
(5)
with given initial density ρ0(x). In particular, if x1(0), . . . , xN (0) are sampled in-
dependently and identically according to the uniform measure over [0, L], then the
result holds true and the initial measure has constant density ρ0(x) = 1/L.
In this paper, we assume that N is large and view the mean field limit as
the defining problem. Therefore, we will analyze the overall behavior of the opin-
ion dynamics, x1(t), . . . , xN (t), by analyzing instead the nonlinear Fokker-Planck
equation (5).
4 Deterministic consensus convergence: σ = 0
We will follow a modulational instability approach to study the mean field limit
when (σ = 0), also analyzed in [22][16]. We look for conditions so as to have
consensus convergence where all the opinions converge to a cluster as t → ∞. We
also analyze the number of clusters if there is no consensus convergence and the
time to cluster formation, that is, the onset of cluster formation.
4.1 Linear stability analysis
We first linearize the Fokker-Planck equation (5) with σ = 0 by assuming that
ρ(t, x) = ρ0 + ρ1(t, x) = 1/L + ρ1(t, x). Substituting ρ(t, x) = ρ0 + ρ1(t, x) into
Consensus Convergence with Stochastic Effects
5
(cid:20)(cid:90)
(cid:90) ∂ρ1
(cid:21)
(cid:20)(cid:90)
(cid:21)
(5) and assuming that ρ1 is a small perturbation of ρ so that the O(ρ2
negligible, we find that ρ1(t, x) satisfies:
1) term is
∂ρ1
∂t
(t, x) =
∂
∂x
ρ0yφ(y)dyρ1(t, x)
+
∂
∂x
ρ1(t, x − y)yφ(y)dyρ0
(6)
= ρ0
(t, x − y)yφ(y)dy.
∂x
(cid:82) yφ(y)dy = 0.
By taking the Fourier transform in x, ρ1(t, k) = (cid:82) L
The last equality in (6) holds because φ(y) is an even function and therefore
0 ρ1(t, x)e−ikxdx, with the
discrete set of frequencies k in
we find from (6) that
∂ ρ1
∂t
(t, k) =
K = {2πn/L, n ∈ Z},
(cid:90)
(cid:20)
iρ0k
(cid:21)
ρ1(t, k),
−ikyyφ(y)dy
e
which gives the growth rates of the modes:
γk = Re
iρ0k
−ikyyφ(y)dy
e
(cid:20)
(cid:90)
(cid:21)
(cid:90)
= ρ0k
sin(ky)yφ(y)dy.
(7)
(8)
(9)
We can see that for each k, ρ1(t, k) = ρ1(0, k) exp(γkt). By replacing φ with φ0
(see (3)), we can rewrite γk as
(cid:90) 1
0
(cid:20)
(cid:90) 1
q>0
0
γk = ρ0R0ψ(kR0), ψ(q) = 2q
φ0(s)s sin(qs)ds.
(10)
The growth rate γk is maximal for k = ±kmax with kmax := qmax/R0, more exactly,
for k equal to plus or minus the discrete frequency kmax in the set K that maximizes
ψ(kR0), which is close to qmax/R0. Here
(cid:21)
qmax = arg max
[ψ(q)] = arg max
2q
φ0(s)s sin(qs)ds
(11)
q>0
ditions since ψ(q) (cid:39) 2q2(cid:82) 1
The optimal (continuous) frequency qmax is positive and finite under general con-
0 s2φ0(s)ds for 0 ≤ q (cid:28) 1 and ψ(q) is bounded or decays
to zero at infinity depending on the regularity of φ0.
4.2 Fluctuation theory
By the central limit theorem, if we assume that the initial opinions x1(0), . . . , xN (0)
are sampled identically according to the uniform distribution over the domain
[0, L], then
ρN
1 (t = 0, dx) :=
√
N
ρN (t = 0, dx) − ρ0(dx)
(cid:16)
(cid:32)
(cid:17)
√
N
=
N(cid:88)
i=1
1
N
δxi(0)(dx) − dx
L
(cid:33)
6
Josselin Garnier et al.
converges in distribution as N → ∞ to the measure ρ1(t = 0, dx), whose frequency
components, for k ∈ K\{0},
(cid:90) L
0
√
N
√
N
√
N e
1
1
N
N
−ikx
N(cid:88)
N(cid:88)
j=1
j=1
1
N
N(cid:88)
j=1
δxj (0)(dx) − dx
L
(cid:90) L
0
−ikxj (0) −
e
−ikxdx
e
1
L
−ikxj (0)
e
ρ1(t = 0, k) = lim
N→∞
= lim
N→∞
= lim
N→∞
are independent and identically distributed with complex circular Gaussian ran-
dom variables with mean zero and variance 1:
E [ρ1(t = 0, k)] = 0, E(cid:104)
ρ1(t = 0, k)ρ1(t = 0, k(cid:48))
= δkk(cid:48) ,
(cid:48) ∈ K\{0},
k, k
ρ1(t = 0,−k) = ρ1(t = 0, k), while ρ1(t = 0, k = 0) = 0.
For any T , the measure-valued process
(cid:16)
ρN
1 (t, dx) :=
√
N
ρN (t, dx) − ρ0(dx)
t ∈ [0, T ]
,
(12)
converges in distribution as N → ∞ to a measure-valued process ρ1(t, dx) whose
density ρ1(t, x) satisfies the deterministic PDE
∂ρ1
∂t
(t, x) = ρ0
(t, x − y)yφ(y)dy
(13)
with the random initial condition described above.
Consequently, combining with (8) and (9), at any time t, the frequency com-
ponents ρ1(t, k), k ∈ K\{0}, are independent complex circular Gaussian random
variables, with mean zero and variance exp(2γkt):
ρ1(t, k)ρ1(t, k(cid:48))
= δkk(cid:48) exp(2γkt),
(cid:48) ∈ K\{0},
k, k
(14)
E(cid:104)
ρ1(t,−k) = ρ1(t, k), while ρ1(t, k = 0) = 0. Therefore,
)(cid:3) = E
(cid:48)
E(cid:2)ρ1(t, x)ρ1(t, x
(cid:34)
(cid:88)
E
=
ρ1(t, k)
k
k
eikx
L
ρ1(t,−k)
ρ1(t, k)
ρ1(t, k)
(cid:88)
(cid:35)
k
=
eikx
L
e−ikx(cid:48)
L
(cid:88)
k(cid:54)=0
1
L2
(cid:35)
eikx(cid:48)
L
e2γkteik(x−x(cid:48)
).
(cid:105)
(cid:17)
(cid:90) ∂ρ1
∂x
(cid:105)
(cid:34)(cid:88)
For large times, the spectrum of ρ1(t, x) becomes concentrated around the
max(k − kmax)2 for k
optimal wavenumber kmax. We can expand γk = γmax + 1
2 γ(cid:48)(cid:48)
around kmax and use a continuum approximation for the discrete sum:
Consensus Convergence with Stochastic Effects
(cid:88)
(cid:48)
E(cid:2)ρ1(t, x)ρ1(t, x
(cid:90) ∞
(cid:18)
−∞
2πL
=
1
)(cid:3) =
(cid:90) ∞
Re
e2γmaxt
e2γkteik(x−x(cid:48)
1
L2
e2γkteik(x−x(cid:48)
k(cid:54)=0
)dk (cid:39) 1
πL
Re
) (cid:39) 1
L2
(cid:18)(cid:90) ∞
0
eγ(cid:48)(cid:48)
max(k−kmax)2teik(x−x(cid:48)
)dk
(cid:90) ∞
−∞
(cid:19)
=
=
1
πL
(cid:18) 1
L
0
e2γmaxt cos(kmax(x − x
(cid:48)
))
(cid:19)(cid:32)
1(cid:112)πγ(cid:48)(cid:48)
maxt
− (x−x(cid:48) )2
maxt
e
4γ(cid:48)(cid:48)
(cid:33)
.
e2γkteik(x−x(cid:48)
) L
2π
dk
e2(γmax+ 1
2 γ(cid:48)(cid:48)
max(k−kmax)2)teik(x−x(cid:48)
7
(cid:19)
)dk
(15)
A typical realization of ρ1(t, x) is a modulation with the carrier spatial fre-
quency kmax and a slowly varying envelope with stationary Gaussian statistics,
mean zero, and Gaussian covariance function. This is valid provided L2 (cid:29) 4γ(cid:48)(cid:48)
maxt.
If L2 (cid:28) 4γ(cid:48)(cid:48)
maxt, then the continuum approximation is not valid and we have
E(cid:2)ρ1(t, x)ρ1(t, x
(cid:48)
)(cid:3) =
1
L2
e2γkteik(x−x(cid:48)
(cid:88)
L2 e2γmaxt cos(cid:0)kmax(x − x
k(cid:54)=0
) =
2
L2
(cid:48)
(cid:88)
)(cid:1) .
k>0
(cid:39) 2
e2γkt cos(k(x − x
(cid:48)
))
(16)
A typical realization of ρ1(t, x) is a modulation with the carrier spatial frequency
kmax.
Because γmax > 0, the linear system (13) is unstable and therefore the central
√
limit theorem cannot be extended to arbitrarily large times. In fact the theorem
is limited to times t such that ρ1(t, x)/
N is smaller than ρ0 = 1/L so that the
linearization around ρ0 is valid. Therefore the time up to the onset of clustering
is when the perturbation ρ1 becomes of the same order as
N ρ0, that is to say
when E(cid:2)ρ1(tclu, x)2(cid:3) (cid:39) N L−2, which is approximately (up to terms smaller than
√
ln N ):
when N (cid:29) 1.
tclu (cid:39) 1
2γmax
ln N (cid:39)
1
2ρ0R0ψ(qmax)
ln N
We note that the fact that a random initial distribution gives rise to a quasi-
deterministic subsequent evolution by spectral gain selection occurs in many fields,
for instance in fluid mechanics (hydrodynamic instabilities) or in nonlinear optics
(beam filamentation).
4.3 Consensus convergence
The linear stability analysis shows that the opinion dynamics, starting from a
uniform distribution of agents, gives clustering with a mean distance between
clusters equal to 2π/kmax (see (15) and (16)). Once clustering has occurred, two
types of dynamical evolutions are possible:
1. If 2π/kmax > R0, then the clusters do not interact with each other because
they are beyond the range of the influence function. Therefore, the situation is
frozen and there is no consensus convergence.
8
Josselin Garnier et al.
2. If 2π/kmax < R0, then the clusters interact with each other. There may be
consensus convergence. However, consensus convergence is not guaranteed as
clusters may merge by packets, and the centers of the new clusters may be sepa-
rated by a distance larger than 2π/kmax, and then global consensus convergence
does not happen. The number of mega-clusters formed by this dynamic is not
easy to predict.
If we neglect the rounding and consider kmax = qmax/R0, which is possible if
qmaxL/R0 (cid:29) 1, then the criterion 2π/kmax > or < R0 does not depend on R0, as it
reads 2π/qmax > or < 1, which depends only on the normalized influence function
φ0 by (10) and (11).
These two dynamics can be observed in the examples of Figure 1.1 in [22]:
1. If φ(r) = 1[0,1](r), then qmax (cid:39) 2.75 and the mean distance between clusters is
about 2.3, that is beyond the range 1 of the influence function, and there is no
consensus convergence.
2,1](r), then qmax (cid:39) 9.1 and the mean distance
between clusters is about 0.7, that is within the range of the influence function,
and there is consensus convergence.
2. If φ(r) = 0.1×1[0,1/
2](r)+1[1/
√
√
These predictions are quantitatively in very good agreement with the numerical
simulations (distance between clusters and so on).
To summarize, the main result in the noiseless case σ = 0 is as follows. In
the regime N → ∞, there is no consensus convergence if qmax < 2π. There may
be consensus convergence if qmax > 2π. Of course this stability analysis and the
result that follow can be extended easily to the multi-dimensional case, and to
other types of opinions or flocking dynamics.
4.4 Numerical simulations
We use the explicit Euler scheme to simulate the deterministic opinion dynamic
(1) when σ = 0:
N(cid:88)
j=1
xn+1
i
= xn
i − 1
N
φ(xn
i − xn
j )(xn
i − xn
j )∆t,
φ(s) = φ0(s/R0).
(17)
Although our analysis is on the torus [0, L], we still simulate (17) on the full
space. The simulation results indicate, however, that the analysis under periodic
conditions is still consistent with the numerics with different boundary condi-
tions. As it is shown in [22][16], if x1(0), . . . , xN (0) are in the interval [0, L], then
x1(t), . . . , xN (t) ∈ [0, L] for any t ≥ 0.
We test for the influence functions studied in [22][16]:
√
2](s) + 0.1 × 1(1/
φ1
0(s) = 1[0,1/
φ2
0(s) = 1[0,1](s)
0(s) = 0.5 × 1[0,1/
√
φ3
0(s) = 0.1 × 1[0,1/
√
φ4
0(s) = (1 − s)3 × 1[0,1](s)
φ5
0(s) = (1 − s)6 × 1[0,1](s),
φ6
2](s) + 1(1/
2](s) + 1(1/
√
√
√
2,1](s)
2,1](s)
2,1](s)
Consensus Convergence with Stochastic Effects
9
Fig. 1 The plots of the influence functions φ0(s).
and their plots are shown in Figure 1.
We compute the key quantity qmax by exploring all possible q in [0, 100]:
(cid:20)
(cid:90) 1
0
(cid:21)
qmax =
arg max
R0q∈K,0<q≤100
2q
φ0(s)s sin(qs)ds
.
We find that for the cases of φ3
0, qmax are not unique and the non-uniqueness
of qmax will greatly affect the results of the consensus convergence. The parameters
we use for the simulation are ∆t = 0.1, L = 10, R0 = 1 and N = 500. For each φ0,
0 and φ4
s00.10.20.30.40.50.60.70.80.91φ0(s)00.511.5φ0(s)=1×1[0,1/√2](s)+0.1×1(1/√2,1](s)s00.10.20.30.40.50.60.70.80.91φ0(s)00.511.5φ0(s)=1×1[0,1/√2](s)+1×1(1/√2,1](s)s00.10.20.30.40.50.60.70.80.91φ0(s)00.511.5φ0(s)=0.5×1[0,1/√2](s)+1×1(1/√2,1](s)s00.10.20.30.40.50.60.70.80.91φ0(s)00.511.5φ0(s)=0.1×1[0,1/√2](s)+1×1(1/√2,1](s)s00.10.20.30.40.50.60.70.80.91φ0(s)00.511.5φ0(s)=(1−s)3×1[0,1](s)s00.10.20.30.40.50.60.70.80.91φ0(s)00.511.5φ0(s)=(1−s)6×1[0,1](s)10
Josselin Garnier et al.
Fig. 2 Simulation for φ0(s) = φ1
(17). The vertical dashed line is at t = tclu.
0(s). Left: ψ(q) evaluated at R0q ∈ K. Right: Simulations of
0(s). Left: ψ(q) evaluated at R0q ∈ K. Right: Simulations of
Fig. 3 Simulation for φ0(s) = φ2
(17). The vertical dashed line is at t = tclu.
we also plot the function ψ(s) = 2q(cid:82) 1
the values of ψ(s) at R0q ∈ K and the lines are the continuum approximation.
0 φ0(s)s sin(qs)ds; the stars in the plots are
From Figure 2, we can see that there is a unique qmax = 3.7699. From our anal-
ysis, we do not expect to have consensus convergence because qmax = 3.7699 < 2π.
The distance between clusters is 2πR0/qmax = 1.67, and therefore we should have
roughly L/1.67 = 5.99 clusters, and indeed we have 6 clusters in our simulation.
In addition, tclu = ln N/(2ρ0R0ψ(qmax)) = 21 (the vertical blue dashed line) also
correctly predicts the time to cluster formation.
In Figure 3, if φ0(s) = 1[0,1](s), then ψ(q) has a unique qmax = 2.51 but it also
has many suboptimal q where ψ(q) is very close to ψ(qmax). Note that qmax < 2π
means that there is no consensus convergence. The inter-cluster distance is 2.5,
which is correct for the top and the bottom clusters. However, the central clusters
are affected by the suboptimal q and therefore their inter-cluster distances are
different. We also note that tclu = ln N/(2ρ0R0ψ(qmax)) = 14.9 (the vertical blue
0102030405060708090100−1.5−1−0.500.511.5q,qmax=3.7699ψ(q)φ0(s)=1×1[0,1/√2](s)+0.1×1(1/√2,1](s)050100150012345678910Time,tclu=21Opinions,xi(t)φ0(s)=1×1[0,1/√2](s)+0.1×1(1/√2,1](s)N=500,R0=1,qmax=3.77Inter-ClusterDistance=1.670102030405060708090100−2.5−2−1.5−1−0.500.511.522.5q,qmax=2.5133ψ(q)φ0(s)=1×1[0,1/√2](s)+1×1(1/√2,1](s)050100150012345678910Time,tclu=14.9Opinions,xi(t)φ0(s)=1×1[0,1/√2](s)+1×1(1/√2,1](s)N=500,R0=1,qmax=2.51Inter-ClusterDistance=2.5Consensus Convergence with Stochastic Effects
11
Fig. 4 Simulation for φ0(s) = φ3
(17). The vertical dashed line is at t = tclu.
0(s). Left: ψ(q) evaluated at R0q ∈ K. Right: Simulations of
Fig. 5 Simulation for φ0(s) = φ4
(17) for t ≤ 150. The vertical dashed line is at t = tclu.
0(s). Left: ψ(q) evaluated at R0q ∈ K. Right: Simulations of
√
2](s)+1(1/
√
dashed line) correctly estimates the time to the formation of the top and bottom
clusters.
We see an interesting result in Figure 4 for φ0(s) = 0.5×1[0,1/
2,1](s).
From the plot of ψ(q), we can see that qmax might not be unique and the first few
local maximizers are q = 2.5133, 9.4248, 15.7080, . . ., and the corresponding inter-
cluster distances are 2.5, 0.6667, 0.4000, . . .. We can see from the simulation that
there are two noticeable inter-cluster distances: 2.5 and 0.6667. For R0q ∈ K,
0 ≤ q ≤ 100, qmax = 53.4071 so that the necessary condition to have the consensus
convergence qmax > 2π is satisfied. However, we do not have consensus conver-
gence in this case because qmax > 2π is not a sufficient condition. We notice that
although qmax might not be unique, tclu = 11.5 still predicts the time to cluster
formation because it is related to ψ(qmax) not qmax and thus the non-uniqueness
of qmax does not affect tclu.
In Figure 5 and 6, we see consensus convergence. From the plot of ψ(q), we can
see that qmax might not be unique and the first few local maximizers are q = 2.5133,
0102030405060708090100−3−2−10123q,qmax=53.4071ψ(q)φ0(s)=0.5×1[0,1/√2](s)+1×1(1/√2,1](s)050100150012345678910Time,tclu=11.5Opinions,xi(t)φ0(s)=0.5×1[0,1/√2](s)+1×1(1/√2,1](s)N=500,R0=1,qmax=53.4Inter-ClusterDistance=0.1180102030405060708090100−4−3−2−101234q,qmax=53.4071ψ(q)φ0(s)=0.1×1[0,1/√2](s)+1×1(1/√2,1](s)050100150012345678910Time,tclu=9.51Opinions,xi(t)φ0(s)=0.1×1[0,1/√2](s)+1×1(1/√2,1](s)N=500,R0=1,qmax=53.4Inter-ClusterDistance=0.11812
Josselin Garnier et al.
Fig. 6 Simulation for φ0(s) = φ4
0(s). Simulations of (17) for t ≤ 1000.
Fig. 7 Simulation for φ0(s) = φ5
(17). The vertical dashed line is at t = tclu.
0(s). Left: ψ(q) evaluated at R0q ∈ K. Right: Simulations of
9.4248, 16.3363, . . ., and the corresponding inter-cluster distances are 2.5, 0.6667,
0.3846, . . .. In this case, the only noticeable inter-cluster distance is 0.6667 and we
do not observe the inter-cluster distance of 2.5, because ψ(2.5133) (cid:28) ψ(9.4248).
For R0q ∈ K, 0 ≤ q ≤ 100, qmax = 53.4071 so that the necessary condition to have
the consensus convergence qmax > 2π is satisfied and indeed we see form Figure 6
that we have consensus convergence in this case.
In Figure 7, we choose φ0(s) so that ψ(s) has a unique local maximum and
qmax = 5.0265. In this case, qmax < 2π and therefore there is no consensus conver-
gence. The inter-distance is 1.25 and L/1.25 = 8 which is exactly the number of
clusters in this case. Again, tclu predicts the time to cluster formation very well.
Finally, Figure 8 considers φ0(s) so that ψ(s) has a unique local maximum,
but with a larger exponent, qmax = 8.1681 > 2π. The inter-cluster distance corre-
sponding to qmax = 8.1681 is 0.769, which is consistent with the actual inter-cluster
distance. The quantity L/0.769 = 13 gives a good approximation for the actual
number of clusters, which is 11. As in all the previous cases, tclu = 185 predicts
01002003004005006007008009001000012345678910Time,tclu=9.51Opinions,xi(t)φ0(s)=0.1×1[0,1/√2](s)+1×1(1/√2,1](s)N=500,R0=1,qmax=53.4Inter-ClusterDistance=0.118010203040506070809010000.050.10.150.20.250.30.35q,qmax=5.0265ψ(q)φ0(s)=(1−s)3×1[0,1](s)050100150200250300350400450500012345678910Time,tclu=93.3Opinions,xi(t)φ0(s)=(1−s)3×1[0,1](s)N=500,R0=1,qmax=5.03Inter-ClusterDistance=1.25Consensus Convergence with Stochastic Effects
13
Fig. 8 Simulation for φ0(s) = φ6
(17). The vertical dashed line is at t = tclu.
0(s). Left: ψ(q) evaluated at R0q ∈ K. Right: Simulations of
the time to cluster formation well. Here, qmax > 2π, so we could expect to ob-
serve consensus convergence. However the inter-cluster distance 0.769 is such that
φ(0.769) ∼ 10−4, so we cannot see cluster evolution for the time horizon of the
simulation.
5 Stochastic consensus convergence: σ > 0
In this section, we consider the case that σ > 0 in (1). In other words, the system
is stochastic and we are dealing with a nonlinear Fokker-Planck equation.
5.1 Linear stability analysis
As in the deterministic case, we linearize the Fokker-Planck equation (5) with
σ > 0 by assuming that ρ(t, x) = ρ0 + ρ1(t, x) = 1/L + ρ1(t, x). Substituting
ρ(t, x) = ρ0 + ρ1(t, x) into (5) and assuming that ρ1 is a small perturbation of ρ so
that the O(ρ2
1) term is negligible, we find that ρ1(t, x) satisfies:
∂ρ1
∂t
(t, x) = ρ0
In the Fourier domain:
∂ ρ1
∂t
(t, k) =
(t, x − y)yφ(y)dy +
σ2
2
−ikyyφ(y)dy − σ2k2
e
2
(cid:21)
(cid:90) ∂ρ1
(cid:20)
(cid:90)
∂x
iρ0k
∂2ρ1
∂x2 (t, x).
(18)
ρ1(t, k),
(19)
(cid:20)
(cid:90)
which gives the growth rates of the modes:
γk = Re
iρ0k
−ikyyφ(y)dy − σ2k2
e
2
= ρ0k
(cid:21)
(cid:90)
sin(ky)yφ(y)dy − σ2k2
2
.
(20)
010203040506070809010000.020.040.060.080.10.120.140.160.18q,qmax=8.1681ψ(q)φ0(s)=(1−s)6×1[0,1](s)050010001500012345678910Time,tclu=185Opinions,xi(t)φ0(s)=(1−s)6×1[0,1](s)N=500,R0=1,qmax=8.17Inter-ClusterDistance=0.76914
Josselin Garnier et al.
(cid:90) 1
0
We can rewrite the growth rate γk = ρ0R0ψσ(kR0), where
ψσ(q) = 2q
φ0(s)s sin(qs)ds − σ2q2
2ρ0R3
0
.
(21)
The optimal positive frequency is kmax that is the element of K = {2πn/L, n ∈ N}
that maximizes ψσ(kR0), that is close to qmax/R0, where
qmax = arg max
q>0
[ψσ(q)] .
(22)
There is a critical value σc of σ such that the system has a completely different
overall behavior for σ < σc and for σ > σc. We can view σ as the magnitude of the
noise energy or temperature of the system. There are two types of forces in the
system (1): the attractive interaction −aij(xi − xj) and the random force σdW i(t).
If σ < σc, then the attractive interaction dominates the random force and thus the
system is a perturbation of the deterministic system. If σ > σc, then the random
force dominates, the attractive interaction is negligible, and therefore the overall
system behaves like a system of N independent random processes.
The above observations can be articulated mathematically. Let
(cid:20) 4ρ0R3
(cid:20)
q
0
4ρ0R3
0
(cid:90) 1
(cid:90) 1
0
0
σ2
c = max
q>0
= max
q>0
(cid:21)
(cid:21)
φ0(s)s sin(qs)ds
φ0(s)s2 sin(qs)
ds
qs
(cid:90) 1
0
= 4ρ0R3
0
s2φ0(s)ds.
If σ < σc, then from (21) we find that
max
q>0
ψσ(q) > 0,
(23)
and ρ(t, kmax) has positive growth rate γmax = ρ0R0ψσ(kmaxR0). The linear system
(19) is unstable, which is analogous to the deterministic case.
If σ > σc, then all of ρ(t, k) have negative growth rates. In other words, the
constant density is linearly stable and therefore the overall system is stable, since
this is what linear stability implies in this case.
We note that the same technique for computing σc, with linear stability analysis
for different noisy opinion models, is also used in [23][24][25].
5.2 Fluctuation theory
Since our goal is to analyze the behavior of clusters, we suppose from now on that
σ < σc.
The fluctuation analysis of the stochastic model is similar to that of the de-
terministic case. If x1(0), . . . , xN (0) are independent, uniform random variables in
[0, L], then
ρN
1 (t = 0, dx) :=
√
N
ρN (t = 0, dx) − ρ0(dx)
(cid:16)
(cid:17)
√
N
=
1
N
N(cid:88)
j=1
δxj (0)(dx) − dx
L
Consensus Convergence with Stochastic Effects
15
converges in distribution as N → ∞ to the measure ρ1(t = 0, dx), whose frequency
components
1
N
N(cid:88)
j=1
√
N
−ikxj (0)
e
ρ1(t = 0, k) = lim
N→∞
are independent complex circular Gaussian random variables, with mean zero and
variance 1 for k ∈ K\{0}:
E [ρ1(t = 0, k)] = 0, E(cid:104)
ρ1(t = 0, k)ρ1(t = 0, k(cid:48))
= δkk(cid:48) ,
(cid:48) ∈ K\{0},
k, k
ρ1(t = 0,−k) = ρ1(t = 0, k), while ρ1(t = 0, k = 0) = 0.
For any T < ∞, the measure-valued process
(cid:105)
(cid:17)
ρN
1 (t, dx) :=
(24)
converges in distribution as N → ∞ to a measure-valued process ρ1(t, dx) whose
density ρ1(t, x) satisfies a stochastic PDE (see [7]):
N
,
ρN (t, dx) − ρ0(dx)
t ∈ [0, T ]
dρ1(t, x) =
ρ0
(t, x − y)yφ(y)dy +
σ2
2
∂2ρ1
∂x2 (t, x)
dt + σdW (t, x)
(25)
(cid:20)
(cid:90) ∂ρ1
∂x
(cid:21)
with the random initial condition described above. Here W (t, x) is a space-time
Gaussian random noise with mean zero and covariance
(cid:33)
(cid:90) L
0
min{s, t}
L
(cid:48)
1(x)f(cid:48)
2(x)dx
f
(cid:32)(cid:90) L
0
(cid:16)
√
(cid:90) L
0
Cov
W (s, x)f1(x)dx,
W (t, x)f2(x)dx
=
(cid:82) L
(26)
for any test functions f1(x) and f2(x). The Fourier transform of W (t, x) is W (t, k) =
0 W (t, x)e−ikxdx for k ∈ K. From (26), we see that { W (t, k), k ∈ K, k ≥ 0} are
independent, complex-valued Brownian motions with the variance:
(cid:16) W (t, k), W (t, k)
(cid:17)
Cov
(cid:90) L
0
=
t
L
(−ik)e
−ikx(−ik)e−ikxdx = tk2,
(27)
ρ1(t, k) = (cid:82) L
and W (t,−k) = W (t, k). Taking the Fourier transform on (25), for each k ∈ K,
0 ρ1(t, x)e−ikxdx is a complex-valued Ornstein-Uhlenbeck (OU) pro-
(cid:34)
(cid:35)
cess:
dρ1(t, k) =
iρ0k
−ikyyφ(y)dy − σ2k2
e
2
ρ1(t, k)dt +
d(W (k)(t) + i W (k)(t)).
σk√
2
(cid:90) L
0
(28)
Here {W (k)(t), k ∈ K, k > 0} and { W (k)(t), k ∈ K, k > 0} are independent real
Brownian motions, W (0)(t) = W (0)(t) = 0, W (−k)(t) = −W (k)(t), and W (−k)(t) =
W (k)(t). The equation (28) is solvable and we have, for any k ∈ K\{0},
ρ1(t, k) = eαkt ρ1(0, k) +
eαk(t−s)d(W (k)(s) + i W (k)(s)),
(29)
(cid:90) t
0
σk√
2
(cid:90) L
0
αk = iρ0k
−ikyyφ(y)dy − σ2k2
2
e
.
16
Josselin Garnier et al.
(cid:90) t
0
(cid:20)
(cid:21)
E(cid:104)
(cid:105)
In particular, ρ1(t, k = 0) = 0. Because {ρ1(0, k), W (k)(t), W (k)(t), k ∈ K, k > 0}
are independent, {ρ1(t, k), k ∈ K, k > 0} are independent OU processes with mean
zero and variance
ρ1(t, k)ρ1(t, k)
= e2γkt + σ2k2
e2γk(t−s)ds = e2γkt
1 +
σ2k2
2γk
,
(30)
for k ∈ K, k > 0, where γk is the real part of αk. In addition, because α−k = αk
and W (−k)(t) = −W (k)(t), we have ρ1(t,−k) = ρ1(t, k) for k ∈ K\{0}. Finally,
ρ1(t, 0) = 0. Therefore,
(cid:34)(cid:88)
)(cid:3) = E
(cid:48)
E(cid:2)ρ1(t, x)ρ1(t, x
(cid:34)
(cid:88)
E
=
ρ1(t, k)
k
ρ1(t, k)
ρ1(t, k)
(cid:88)
(cid:35)
k
=
eikx
L
e−ikx(cid:48)
L
(cid:88)
k(cid:54)=0
1
L2
k
eikx
L
ρ1(t,−k)
(cid:35)
eikx(cid:48)
L
e2γkteik(x−x(cid:48)
)
(cid:20)
1 +
(cid:21)
.
σ2k2
2γk
As t increases, the spectrum of ρ1(t, x) becomes concentrated around the opti-
mal wavenumber kmax. In addition, we note that k2/γk is bounded and the term
σ2k2/γk is negligible if σ is sufficiently small. We can assume σ is small because we
need σ < σc for cluster formation. If σ2k2/γk is negligible and L2 (cid:29) 4γ(cid:48)(cid:48)
maxt, we
max(k− kmax)2 for k around kmax, and use a continuum
can expand γk = γmax + 1
approximation for the discrete sum as we do in the deterministic case:
2 γ(cid:48)(cid:48)
(cid:18) 1
L
(cid:48)
E(cid:2)ρ1(t, x)ρ1(t, x
)(cid:3) (cid:39)
E(cid:2)ρ1(t, x)ρ1(t, x
(cid:48)
e2γmaxt cos(kmax(x − x
))
L2 e2γmaxt cos(cid:0)kmax(x − x
)(cid:3) (cid:39) 2
(cid:48)
(cid:48)
(cid:19)(cid:32)
1(cid:112)πγ(cid:48)(cid:48)
)(cid:1)(cid:20)
1 +
(cid:33)
− (x−x(cid:48) )2
maxt
e
4γ(cid:48)(cid:48)
.
maxt
(cid:21)
.
σ2k2
max
2γmax
If L2 (cid:28) 4γ(cid:48)(cid:48)
maxt, then the continuum approximation is not valid and in this case
√
Because σ < σc we have that γmax > 0 and then the linear system (25) is
unstable and therefore the central limit theorem breaks down when ρ1(t, x)/
N
is no longer smaller than ρ0 = 1/L. More precisely, the time tclu for the onset of
clustering is when E(cid:2)ρ1(tclu, x)2(cid:3) (cid:39) N L−2, which is approximately
tclu (cid:39) 1
2γmax
ln N (cid:39)
1
2ρ0R0ψσ(qmax)
ln N
when N (cid:29) 1.
5.3 Consensus convergence
We assume σ < σc so that there are unstable modes for the linearized evolution,
which means that there is clustering. The number of and the distance between
clusters can be estimated with qmax. We find that the first term of the right side
of (21) is bounded while the second term of (21) is quadratic with negative leading
coefficient. Therefore, increasing σ tends to reduce qmax, that is to say, to increase
the mean distance between clusters.
Consensus Convergence with Stochastic Effects
17
Let us consider the case that qmax < 2π. From the analysis of the deterministic
case, the system initially has no consensus convergence and there are several clus-
ters. After clustering, the clusters do not interact with each other, but their centers
move like independent Brownian motions. When two clusters come close to each
other, within a distance R0, they interact and merge. Therefore, we will eventually
have consensus convergence, because two Brownian motions always collide in R.
This can be extended to the multi-dimensional case, but then the conclusion can
be different: in high dimension two Brownian motions may not collide. However,
with periodic boundary conditions, two Brownian motions will always come close
to each other, within a distance R0.
When qmax < 2π and σ is small then there are several clusters, after the cluster
formation time. The fraction of agents in a cluster is the agent density times the
inter-distance of the clusters:
mc = ρ0
2πR0
qmax
= ρ0
2π
kmax
.
Then the j-th cluster consists of about N mc agents. We assume that σ is small
enough so that σ2kmax (cid:28) 2πρ0φ0(0)R2
0. By using the fact that the agents in a
cluster stay close to each other, we can replace φ(xi − xj) by φ(0), and the agents
in the j-th cluster have the approximate dynamics:
dx(j)
N mc(cid:88)
i = − φ0(0)
(cid:80)N mc
l=1
N
i=1 x(j)
i
i − x(j)
(x(j)
l
)dt + σdW (j,i)(t).
σ√
N mc
(cid:80)N mc
(cid:19)
dx,
The center X (j)(t) = 1
N mc
(t) satisfies:
X (j)(t) = X (j)(0) +
W (j)(t),
(31)
where {W (j)(t)} are independent standard Brownian motions.
When N is large, the empirical density
1
N mc
i=1 δ
(dx) is approximately
x(j)
i
a Gaussian density
ρ(j)(t, dx) =
1(cid:112)π(σ(j))2
exp
− (x − X (j)(t))2
(σ(j))2
σ(cid:112)mcφ0(0)
σ(j) =
.
(32)
(cid:18)
For this argument to be valid, we must have that σ(j), the width of ρ(j), is much
smaller than R0, which is equivalent to our assumption σ2kmax (cid:28) 2πρ0φ0(0)R2
0.
This cluster dynamics is valid as long as the centers {X (j)(t)} stay away from
each other by a distance larger than R0. The clusters move, according to indepen-
dent Brownian motions with quadratic variation σ2t
. When two clusters come
N mc
close to each other within a distance R0, they merge. Indeed, once the two centers
are within distance R0, they obey the following differential equations to leading
order in N :
dX (k)(t)
dt
dX (l)(t)
dt
= −mc(X (k)(t) − X (l)(t))φ(X (k)(t) − X (l)(t)),
= −mc(X (l)(t) − X (k)(t))φ(X (k)(t) − X (l)(t)),
18
Josselin Garnier et al.
which shows that the inter-cluster distance converges exponentially fast to zero
and the center converges to the average of the centers just before collision. The
number of agents or mass of the new cluster is the sum of the masses of the two
clusters, the inverse square width of its empirical density is the sum of the inverse
squares of the two widths, its center is at the weighted average (weighted by the
masses) of the two centers just before collision and it moves as a Brownian motion
whose diffusion constant is defined in terms of its new mass. Then the cluster
centers move according to Brownian motions until two of them get within the
distance R0 from each other and a new merge event occurs. This eventually forms
a Markovian dynamics described in the next section.
5.4 Markovian dynamics of the clusters
After the initial clusters are formed, we can use an iterative argument to mathe-
matically describe how all the opinions converge eventually. In the initial configu-
ration, at time τ0, there are M (τ0) = Lkmax/2π clusters with centers X (j)(τ0) =
j2π/kmax (up to a global shift), widths σ(j)(τ0) = σ/(cid:112)mcφ0(0), and masses
m(j)(τ0) = mc for j = 1, . . . , M (τ0).
For t ≥ τn−1, there are M (τn−1) clusters moving as
X (j)(t) = X (j)(τn−1) + σ(j)(τn−1)
W (j)(t) − W (j)(τn−1)
until the stopping time
(cid:110)
τn = inf
t > τn−1 : X (k)(t) − X (l)(t) = R0, for some k (cid:54)= l
(cid:112)φ0(0)√
N
(cid:16)
(cid:17)
(cid:111)
.
Then the two colliding clusters (with indices k and l) merge with the new center
X(τ +
n ) =
m(k)(τn−1)X (k)(τ−
n ) + m(l)(τn−1)X (l)(τ−
n )
m(k)(τn−1) + m(l)(τn−1)
,
the new mass
and the new width
m(τn) = m(k)(τn−1) + m(l)(τn−1)
σ(cid:112) m(τn)φ0(0)
σ(τn) =
The clusters are relabeled to take into account this merging so that there are
M (τn) = M (τn−1)−1 clusters. The above process is repeated until n = (Lkmax/2π)−
1, when we have only one cluster, and hence consensus convergence.
Note that the time scale at which collisions and merges occur is of the order
√
of N , as the Brownian motions are scaled by 1/
N .
Consensus Convergence with Stochastic Effects
19
Fig. 9 Simulations for σ = 0.1. Left: ψσ(q) evaluated at R0q ∈ K. Right: Simulations of (33).
The vertical dashed line is at t = tclu.
5.5 Numerical simulations
We use the explicit Euler scheme to simulate the stochastic opinion dynamics (1)
when σ > 0:
xn+1
i
= xn
i − 1
N
φ(xn
i − xn
j )(xn
i − xn
j )∆t + σ∆W n+1
i
,
φ(s) = φ0(s/R0), (33)
where {W n+1
variance ∆t.
i
} are independent Gaussian random variables with mean zero and
Our analysis is on the torus [0, L], but we simulate (33) on [0, L] with reflecting
boundary conditions. As we will see, the simulation results agree with the analysis
under periodic assumption. Because here we focus on the effects of the randomness,
for simplicity we will work only on the case that φ0(s) = 1[0,1](s).
We compute the key quantity qmax by exploring all possible q in [0, 100]:
N(cid:88)
j=1
qmax =
arg max
R0q∈K,0<q≤100
2q
φ0(s)s sin(qs)ds − σ2q2
2ρ0R3
0
(cid:20)
(cid:90) 1
0
(cid:21)
.
We see form the plots of ψσ(s) that the randomness reduces the possibility of the
non-uniqueness of qmax because it adds a negative quadratic term in ψσ(s). With
randomness, all of our test cases have a clear, unique qmax.
The parameters we use for the simulation are ∆t = 0.1, L = 10, R0 = 1 and
N = 500. For each σ, we also plot the function ψσ(s) in (21); the stars in the
plots are the values of ψ(s) evaluated at R0q ∈ K and the lines are the continuum
approximation.
We first to test for the effect of σc, the critical value for σ, which makes the
0 s2φ0(s)ds = 0.365 and we
system stable or unstable. In our setting, σc = 4ρ0R3
0
simulate (33) for σ = 0.1, 0.2, 0.365, 0.5 that are values below, equal to and above
σc, respectively.
From Figure 9, we see that ψσ(q) decreases quadratically and has the unique
maximum at q = 2.5133. However, maxR0q∈K ψσ(q) is still positive so the linearized
(cid:82) 1
051015202530−45−40−35−30−25−20−15−10−505q,qmax=2.5133ψσ(q)φ0(s)=1[0,1](s),σ=0.1050100150012345678910Time,tclu=17.6Opinions,xi(t)φ0(s)=1[0,1](s),σc=0.36515,σ=0.1N=500,R0=1,qmax=2.51Inter-ClusterDistance=2.520
Josselin Garnier et al.
Fig. 10 Simulations for σ = 0.2. Left: ψσ(q) evaluated at R0q ∈ K. Right: Simulations of
(33).
Fig. 11 Simulations for σ = σc. Left: ψσ(q) evaluated at R0q ∈ K. Right: Simulations of (33).
system (19) is still unstable. Therefore, the overall system behavior is similar to
the deterministic case and can be viewed as a perturbed non-random opinion
dynamics.
We increase σ by setting σ = 0.2 and the result is in Figure 10. We see that
as σ increases, the random noise starts to affect the overall system, and the width
and the inter-cluster distances become larger so we observe fewer clusters. Since
maxR0q∈K ψσ(q) is positive, we still observe cluster formation.
We note that in Figure 11 and 12, if σ ≥ σc, ψσ(q) < 0 for all q > 0 and
ψσ(0) = 0. In other words, the linearized system is stable and thus the full system
is stable. In this case, we do not see cluster formation and the system behaves like
an N -independent agent system.
We see from the simulations that to model opinion dynamic with consensus
convergence it is appropriate to assume that σ < σc. Therefore we will assume
that σ = 0.1 in our simulations of the stochastic system.
We revisit Figure 9 to check our analysis. First of all, qmax = 2.5133 is clearly
a unique maximizer and the corresponding inter-cluster distance is 2.51, which
051015202530−180−160−140−120−100−80−60−40−20020q,qmax=1.885ψσ(q)φ0(s)=1[0,1](s),σ=0.2050100150012345678910Time,tclu=33.9Opinions,xi(t)φ0(s)=1[0,1](s),σc=0.36515,σ=0.2N=500,R0=1,qmax=1.88Inter-ClusterDistance=3.33051015202530−600−500−400−300−200−1000q,qmax=0ψσ(q)φ0(s)=1[0,1](s),σ=0.365050100150012345678910TimeOpinions,xi(t)φ0(s)=1[0,1](s),σc=0.36515,σ=0.36515N=500,R0=1,qmax=0Consensus Convergence with Stochastic Effects
21
Fig. 12 Simulations for σ = 0.5. Left: ψσ(q) evaluated at R0q ∈ K. Right: Simulations of
(33).
agrees with the numerical inter-cluster distance we see in Figure 9. In addition,
L/2.51 = 3.9841 also predicts well the actual number of the clusters, 4. Finally, the
blue dashed line t = tclu indicates the time to the cluster formation, even though
Figure 9 is just one realization.
We test tclu and the width of clusters in a more statistical way by examining
1000 realizations. If φ0(s) = 1[0,1](s) and σ = 0.1, then we can expect that we will
have 4 clusters at T = 150 in most of the realizations. For each realization, we
numerically compute the widths of the clusters, σ(j)(t), j = 1, . . . , 4 by using the
empirical standard deviations of {x(j)
(t)}4
j=1 (see (32)):
i
(σ(j)(t))2 =
2
N (j) − 1
(t) − ¯x(j)(t)
x(j)
i
,
¯x(j)(t) =
1
N (j)
where for each j = 1, . . . , 4, {x(j)
(t)} belong to the j-th cluster and N (j) is the
number of agents in the j-th clusters. Of course, σ(j)(t) in (34) is just one realization
and so we compute σ(j)(t) for 1000 realizations and consider the average.
i
The averages σ(j)(t) are shown in the left part of Figure 13, in different colors.
First, we can see that tclu, as expected, is the halfway from the time to maximum
with to the time to the minimum width. Second, from (32), the width of each
0.25 × 1 = 0.2, which agrees
cluster is analytically σ(j) = σ/(cid:112)mcφ0(0) = 0.1/
√
with the numerical values σ(j)(t) when t is large.
We also analyze the behavior of the centers of the clusters. The centers {X (j)(t)}4
√
of the clusters in Figure 9 are plotted in Figure 14. From the previous analysis (31),
the centers of the clusters are independent Brownian motions σW (j)(t)/
N mc. For
one realization, the opinions {xi(t)}N
i=1 will not be evenly distributed in the clus-
ters. For example, the actual numbers {N (j)}N
j=1 of agents of the clusters in Figure
√
9 are plotted in Figure 13. So for one realization, X (j)(t) is a Brownian motion
√
σW (j)(t)/
N (j). On the right part of Figure 14, we compare the quadratic varia-
N (j) for 75 ≤ t ≤ 150 (after the time to the cluster
tions of X (j)(t) and σW (j)(t)/
formation.) Indeed, from the figure, we can see that their quadratic variations are
very similar and that means X (j)(t) are very close to Brownian motions.
j=1
N (j)(cid:88)
(cid:16)
i=1
(cid:17)2
N (j)(cid:88)
i=1
x(j)
i
(t)
(34)
051015202530−1200−1000−800−600−400−2000q,qmax=0ψσ(q)φ0(s)=1[0,1](s),σ=0.5050100150012345678910TimeOpinions,xi(t)φ0(s)=1[0,1](s),σc=0.36515,σ=0.5N=500,R0=1,qmax=022
Josselin Garnier et al.
Fig. 13 Left: Average of 1000 realizations of σ(j)(t), j = 1, . . . , 4 for σ = 0.1. The vertical
dashed line is at t = tclu. Right: N (j), the number of agents in the j-th clusters in Figure 9.
Fig. 14 Left: Centers of the clusters, X (j)(t), in Figure 9, in different colors. Right: Quadratic
variations of the cluster centers from t = 75 to t = 150. Solid lines: Numerical quadratic varia-
tions of X (j)(t). Dashed lines: Quadratic variations of σW (j)(t)/
are independent standard Brownian motions and {N (j)}4
clusters.
j=1
j=1 are the numbers of agents in the
√
N (j), where {W (j)(t)}4
6 Long time behavior of simulations
We have also simulated numerically the long time behavior of the system defined on
the full real line R, especially the behavior after the onset of consensus convergence.
√
As we discuss in the previous section, when there is randomness the center of
the unique cluster behaves like a diffusion process σW (t)/
N , where W (t) is a
standard Brownian motion. In Figure 15 and 16, we observe that the centers indeed
behave like Brownian motions. The dashed lines are the parabolas with equation
05010015000.20.40.60.811.21.4Time,tclu=17.5559Averageσ(j)(t)φ0(s)=1[0,1](s),σ=0.11234050100150ClustersMassofClustersφ0(s)=1[0,1](s),σ=0.1N=500,R0=1050100150012345678910TimeCentersofClustersφ0(s)=1[0,1](s),σ=0.1N=500,R0=1708090100110120130140150012345678x 10−3TimeQuadraticVariationsφ0(s)=1[0,1](s),σ=0.1N=500,R0=1 Numerical QVAnalytical QVConsensus Convergence with Stochastic Effects
23
dashed curve is the equation x = ±2σ(cid:112)t/N . σ is small and the overall behavior is like a single
Fig. 15 Long time behavior of the opinions for σ = 0.1 and for N = 100, 200. The blue
Brownian motion.
Brownian motion.
Fig. 16 Long time behavior of the opinions for σ = 0.2 and for N = 100, 200. The blue
dashed curve is the equation x = ±2σ(cid:112)t/N . σ is small and the overall behavior is like a single
x = ±2σ(cid:112)t/N so that for any fixed t, the centers are within the parabolas with
95% probability.
However, when σ is sufficiently large, the long time behavior is different. On the
right part of Figure 17, when σ = 0.4 > σc, the system behaves like N -independent
diffusions. A more interesting case is when σ = 0.3 < σc on the left part of Figure
17. In this case, for 0 ≤ t ≤ 5.5 × 105 there is still consensus convergence, but
for t > 5.5 × 105, all xi(t) spread out from the unique cluster and the system
becomes an independent agent evolution. A detailed mathematical analysis using
large deviations theory for such a phenomenon is being considered at present.
012345678910x 105−20−15−10−505101520TimeOpinions,xi(t)φ0(s)=1[0,1](s),σ=0.1N=100,R0=1012345678910x 105−15−10−5051015TimeOpinions,xi(t)φ0(s)=1[0,1](s),σ=0.1N=200,R0=1012345678910x 105−40−30−20−10010203040TimeOpinions,xi(t)φ0(s)=1[0,1](s),σ=0.2N=100,R0=1012345678910x 105−30−20−100102030TimeOpinions,xi(t)φ0(s)=1[0,1](s),σ=0.2N=200,R0=124
Josselin Garnier et al.
Fig. 17 Long time behavior of the opinions for σ = 0.3, 0.4 and for N = 100. The blue dashed
curve is the equation x = ±2σ
t. For σ = 0.3, there is a single cluster for t ≤ 5.5 × 105.
However, for t > 5.5 × 105, xi(t) disintegrate and the system behaves like an N -independent
Brownian motions. For σ = 0.4, the random perturbations are large enough so that the system
is an N -independent Brownian motions at the beginning.
√
7 Conclusion
We have analyzed a stochastic, continuous time opinion dynamics model and we
have carried out extensive numerical simulations. We use the mean-field theory
and obtain a nonlinear Fokker-Planck equation as the number of opinions tends
to infinity. Then we use a linear stability analysis to estimate the critical value
of the noise strength so as to have cluster formation, estimate the number of
clusters and the time to cluster formation. These quantities are closely related to
the frequency that maximizes the growth rate of the linearized modes (20). After
the initial cluster formation we expect, and numerically confirm, that the centers
of the clusters behave like Brownian motions before further consolidation. Finally,
the long time behavior of the system is explored numerically and we observe that
after a unique cluster is formed, there is a small probability that the opinions will
spread out from the unique cluster and the system will become an independent
agent evolution.
References
1. F. Baccelli, A. Chatterjee, and S. Vishwanath. Stochastic bounded confidence opinion
In Decision and Control (CDC), 2014 IEEE 53rd Annual Conference on,
dynamics.
pages 3408 -- 3413, December 2014.
2. V.D. Blondel, J.M. Hendrickx, A. Olshevsky, and J.N. Tsitsiklis. Convergence in mul-
tiagent coordination, consensus, and flocking. In Decision and Control, 2005 and 2005
European Control Conference. CDC-ECC '05. 44th IEEE Conference on, pages 2996 --
3000, December 2005.
3. V.D. Blondel, J.M. Hendrickx, and J.N. Tsitsiklis. On the 2R conjecture for multi-agent
systems. In Control Conference (ECC), 2007 European, pages 874 -- 881, July 2007.
4. C. Canuto, F. Fagnani, and P. Tilli. An Eulerian approach to the analysis of krause's
consensus models. SIAM Journal on Control and Optimization, 50(1):243 -- 265, 2012.
012345678910x 105−600−400−2000200400600TimeOpinions,xi(t)φ0(s)=1[0,1](s),σ=0.3N=100,R0=1012345678910x 105−1500−1000−500050010001500TimeOpinions,xi(t)φ0(s)=1[0,1](s),σ=0.4N=100,R0=1Consensus Convergence with Stochastic Effects
25
5. A. Carro, R. Toral, and M. San Miguel. The Role of Noise and Initial Conditions in the
Asymptotic Solution of a Bounded Confidence, Continuous-Opinion Model. Journal of
Statistical Physics, 151(1-2):131 -- 149, 2013.
6. G. Como and F. Fagnani. Scaling limits for continuous opinion dynamics systems. Ann.
Appl. Probab., 21(4):1537 -- 1567, August 2011.
7. D. A. Dawson. Critical dynamics and fluctuations for a mean-field model of cooperative
behavior. J. Statist. Phys., 31(1):29 -- 85, 1983.
8. G. Deffuant, D. Neau, F. Amblard, and G. Weisbuch. Mixing beliefs among interacting
agents. Advances in Complex Systems, 03(01n04):87 -- 98, 2000.
9. B. During, P. Markowich, J.-F Pietschmann, and M.-T. Wolfram. Boltzmann and
Fokker -- Planck equations modelling opinion formation in the presence of strong leaders.
Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering
Sciences, 465(2112):3687 -- 3708, 2009.
10. J. Gartner. On the McKean-Vlasov limit for interacting diffusions. Math. Nachr., 137:197 --
248, 1988.
11. J. G´omez-Serrano, C. Graham, and J.-Y. Le Boudec. The bounded confidence model of
opinion dynamics. Mathematical Models and Methods in Applied Sciences, 22(02):1150007,
2012.
12. S.-Y Ha and E. Tadmor. From particle to kinetic and hydrodynamic descriptions of
flocking. Kinetic and Related Methods, pages 415 -- 435, 2008.
13. R. Hegselmann and U. Krause. Opinion dynamics and bounded confidence models, anal-
ysis, and simulation. Journal of Artificial Societies and Social Simulation, 5(3), 2002.
14. R. Hegselmann and U. Krause. Opinion dynamics under the influence of radical groups,
charismatic leaders, and other constant signals: A simple unifying model. Networks and
Heterogeneous Media, 10(3):477 -- 509, 2015.
15. M. Huang and J.H. Manton. Opinion dynamics with noisy information.
In Decision
and Control (CDC), 2013 IEEE 52nd Annual Conference on, pages 3445 -- 3450, December
2013.
16. P.-E. Jabin and S. Motsch. Clustering and asymptotic behavior in opinion formation.
Journal of Differential Equations, 257(11):4165 -- 4187, 2014.
17. T. G. Kurtz and J. Xiong. Particle representations for a class of nonlinear SPDEs. Stochas-
tic Processes and their Applications, 83(1):103 -- 126, 1999.
18. N. Lanchier and J. Neufer. Stochastic dynamics on hypergraphs and the spatial majority
rule model. Journal of Statistical Physics, 151(1-2):21 -- 45, 2013.
19. J. Lorenz. Continuous opinion dynamics under bounded confidence: a survey. International
Journal of Modern Physics C, 18(12):1819 -- 1838, 2007.
20. M. Mas, A. Flache, and D. Helbing. Individualization as driving force of clustering phe-
nomena in humans. PLoS Comput Biol, 6(10):e1000959, 10 2010.
21. A. Mirtabatabaei, P. Jia, and F. Bullo. Eulerian Opinion Dynamics with Bounded Confi-
dence and Exogenous Inputs. SIAM Journal on Applied Dynamical Systems, 13(1):425 --
446, 2014.
22. S. Motsch and E. Tadmor. Heterophilious dynamics enhances consensus. SIAM Review,
56(4):577 -- 621, 2014.
23. M. Pineda, R. Toral, and E. Hernandez-Garcia. Noisy continuous-opinion dynamics. Jour-
nal of Statistical Mechanics: Theory and Experiment, 2009(08):P08001, 2009.
24. M. Pineda, R. Toral, and E. Hernandez-Garcia. Diffusing opinions in bounded confidence
processes. The European Physical Journal D, 62(1):109 -- 117, 2011.
25. M. Pineda, R. Toral, and E. Hernandez-Garcia. The noisy Hegselmann-Krause model for
opinion dynamics. The European Physical Journal B, 86(12), 2013.
26. Y. Yang, D.V. Dimarogonas, and X. Hu. Opinion consensus of modified hegselmann-krause
models. In Decision and Control (CDC), 2012 IEEE 51st Annual Conference on, pages
100 -- 105, December 2012.
|
1801.07783 | 2 | 1801 | 2018-10-14T16:49:14 | A General Definition of Network Communities and the Corresponding Detection Algorithm | [
"cs.SI",
"physics.soc-ph"
] | Network structures, consisting of nodes and edges, have applications in almost all subjects. A set of nodes is called a community if the nodes have strong interrelations. Industries (including cell phone carriers and online social media companies) need community structures to allocate network resources and provide proper and accurate services. However, all the current detection algorithms are motivated by the practical problems, whose applicabilities in other fields are open to question. Thence, for a new community problem, researchers need to derive algorithms ad hoc, which is arduous and even unnecessary. In this paper, we represent a general procedure to find community structures in practice. We mainly focus on two typical types of networks: transmission networks and similarity networks. We reduce them to a unified graph model, based on which we propose a general method to define and detect communities. Readers can specialize our general algorithm to accommodate their problems. In the end, we also give a demonstration to show how the algorithm works. | cs.SI | cs | A General Definition of Network Communities and
the Corresponding Detection Algorithm
Haoye Lu, Member, IEEE, Amiya Nayak, Senior Member, IEEE
1
8
1
0
2
t
c
O
4
1
]
I
S
.
s
c
[
2
v
3
8
7
7
0
.
1
0
8
1
:
v
i
X
r
a
Abstract -- Network structures, consisting of nodes and edges,
have applications in almost all subjects. A set of nodes is called
a community if the nodes have strong interrelations. Industries
(including cell phone carriers and online social media companies)
need community structures to allocate network resources and
provide proper and accurate services. However, all the current
detection algorithms are motivated by the practical problems,
whose applicabilities in other fields are open to question. Thence,
for a new community problem, researchers need to derive
algorithms ad hoc, which is arduous and even unnecessary. In
this paper, we represent a general procedure to find community
structures in practice. We mainly focus on two typical types of
networks: transmission networks and similarity networks. We
reduce them to a unified graph model, based on which we
propose a general method to define and detect communities.
Readers can specialize our general algorithm to accommodate
their problems. In the end, we also give a demonstration to show
how the algorithm works.
Index Terms -- Social network, Network modelling, General
community definition, Community detection, Network clustering
I. INTRODUCTION
Our real world consists of elements associated by relations.
We call the entity network made by elements with the relations
among them. Most real world networks are not random as they
reveal big inhomogeneity, high level of order and organization
[1]. For example, people working in a company may have
much closer relations than the ones outside the company.
The observation inspires people to partition the elements into
groups (communities) such that the relations are strong and
dense within the groups but sparse and weak among them
[2 -- 4].
Community detections have widespread applications. Ama-
zon groups customers buying similar products together for
better commodities recommendations. Facebook clusters the
users by relationships, hobbies, etc. to accurately suggest users
with new friends and circles. Carriers group the locations
among which customers have high transportation demands for
a proper assignment of vehicles.
Because of the omnipresent community structures in prac-
tice, researchers try to find proper algorithms to detect them.
There are mainly four traditional methods [1]: graph parti-
tioning [5], hierarchical clustering [6], partitional clustering
[7, 8] and spectral clustering [9 -- 12]. These methods are
designed for different purposes and reveal many fundamental
properties of networks. After that, many related algorithms
Haoye Lu and Amiya Nayak are with School of Electrical Engineering and
Computer Science, University of Ottawa, Ontario, K1N 6N5 Canada e-mail:
([email protected]; [email protected]).
are proposed (for instances, modularity-based methods [13 --
15], dynamic algorithms [16], methods based on statistical
inference [17, 18], maximum likelihood [19, 20] and network
motifs [21 -- 23]). Recent research shows that modularity opti-
mization and maximum likelihood algorithms are equivalent
[24].
Most algorithms work well in the areas from which they
are derived. But the reliabilities outside their zones are con-
troversial. The poor adaptabilities of the algorithms reveal the
demand for general community detection methods as well as
the general community definitions. Besides, most algorithms
start from graphs directly, while the procedure of the math
model abstraction is rarely formalized. In this paper, we try
to tackle these problems. In particular,
1) Is there a general way to abstract a concrete problem
into a unified math model?
2) Based on the unified math model, are there some com-
mon properties shared by most community definitions?
3) Is there a common method to detect community struc-
tures?
The rest of the paper is organized as follows. In Section II, we
have a review on the popular community detection algorithms.
And we also discuss their pros and cons. In Section III, we
introduce how to reduce a concrete problem into a graph
model. Based on this, we define the community structure
in Section IV. In Section V, we propose and prove some
propositions regarding our community definition. Then we
provide a corresponding detection algorithm. A demonstration
is given in Section VI and finally, we talk about the limitations
of our model as well as the future work in Section VIII.
II. RELATED WORK
The research of community detection starts from solving
some concrete problems. For instance, Kernighan-Lin algo-
rithm [5] is designed for clustering digital components into
equal or nearly equal size communities such that mutual
connections among the sets are minimized (due to the cost and
stability consideration, electronic engineers need to minimize
the number of connections among boards).
The researches always reduce the real-world network struc-
tures to the nodes connected by edges, where the edges rep-
resent the relations among the nodes. Although the meanings
of relations vary in different papers, there are two main types:
two nodes is related if
1) there are material transmission between them, AND/OR
2) they share some identical or similar properties.
The material means concrete objects (like goods) or infor-
mation (like data packages). One of the most typical examples
is the transportation among cities. The cities easily communi-
cating with each other are grouped into one community [25].
There are also many network structures constructed by the
similarity of the properties of the nodes. In protein-protein
interaction networks, biologists would cluster proteins with
equivalent or similar functions into one group [26]. Then, the
relations are the function similarities of the proteins. In social
networks, the people active in the similar locations and/or
the time slots could be considered as a community. Then
the relations represent the location and schedule similarity.
In World Wide Web, the communities may correspond to the
groups of pages concerned with the related topics or events
[27, 28]. Then the relations become the content similarity.
Based on the graph model, lots of community detection
algorithms have been proposed.
Graph partitioning method groups the vertices into a pre-
defined number of communities and minimize the number of
edges among the groups. Most of the algorithms belonging to
this method can perfectly solve particular problems in prac-
tice. However, the algorithms are not adapted to community
detections due to the necessity of the pre-specified number of
groups, which is in general unknown in community detection
problems [1]. More seriously, the graph partitioning method
is not derived from an explicit definition of communities. So
there is no guarantee that the vertex groups found by the
method are communities following our intuitions.
Real-world networks commonly have hierarchical struc-
tures from which the abstracted graph models usually inherit.
The corresponding detection algorithms fall into two types:
agglomerative (bottom-up) approach and divisive (top-down)
approach [6]. Briefly, agglomerative approach starts from con-
sidering each node as a community and merges the community
pairs as moving up the hierarchy. The divisible algorithm
works in the opposite way. It starts by grouping all the nodes
in one cluster and performs splitting recursively as moving
down the hierarchy.
Partitional clustering also plays an important role in the
graph clustering family. In order to apply the algorithm, the
user must specify the number of clusters, which causes the
same disadvantages as the ones belonging to graph partitioning
[1]. The method puts all nodes in a metric space, and thus the
distance between each pair of the nodes in the space is defined.
The distance used in the algorithm can be considered as a
measure of dissimilarity between the nodes. The algorithm
needs to cluster the nodes into a pre-specified number of
groups which minimize a given cost function.
All community detection methods and techniques related
to matrix eigenvectors belong to spectral clustering. The
clustering method requires a distance function to measure the
similarity among the objects. The fundamental idea behind
the algorithm is to utilize the eigenvectors to cluster objects
by connectedness rather than the distance. Although there
are many successful applications in image segmentation and
machine learning, researchers have already found several fun-
damental limitations. For instance, spectral clustering would
fail if it uses the first k eigenvectors to find k clusters when
2
confronting with clusters of various scales regarding a multi-
scale landscape potential [29]. Besides, the algorithm needs
the assistance of partitional clustering, whose drawbacks are
also inherited to spectral clustering.
Most of the aforementioned algorithms have remarkable
performances in the problems they derived from. And their
complexities are optimized for the dynamic network commu-
nity detection [16, 30, 31]. However, researchers hardly focus
on the general definition of communities and the correspond-
ing general community detection algorithms. A few prelim-
inary works have been done. In particular, the comparisons
have been made among the different community definitions as
well as the corresponding detection algorithms [32]. Besides,
some researcher believes that the definition often depends on
the specific system at hand and/or application one has in
mind [1].
III. CONCRETE PROBLEM REDUCTION
Most people believe that, a community is some set of objects
where the interrelations are strong. However, there are lots of
arguments on the definitions of relations as well as the ways to
measure them. Generally, we derive the relations in two ways.
One is based on the materials transmission. The materials
here can represent both material substance (like goods) or just
information (like data). Intuitively, the objects that can easily
communicate with each other should have strong relations
among them. Then those objects can somehow be considered
as a community.
The other one is based on the similarity (for example,
people buy the similar kind of books might be considered
as a community). In usual cases, we believe that the objects
in the same community should share some other similar
properties. Then we can make some reasonable predictions
on the community level (for example, Amazon uses this trick
to recommend commodities).
Although two community derivations come from different
motivations, we show that they can be reduced to the same
graph model.
A. Transmission network
1) Transmission relation characteristics: In order to make
the problem easier to discuss, only one material will be
considered. Moreover, we need the following definitions and
assumptions.
Assumption 1. For any material, there is a minimal unit can
be transferred. And we call the minimal unit a point.
Definition 1 (Node). The objects that receives and sends
points is nodes.
Definition 2 (Medium). The object that propagates points is
medium.
Assumption 2. The transmission relations are constructed in
nodes, media and points, which also determine the properties
of the relations.
Because of Assumption 2, the entity under the consider-
ation consists of nodes, points and media. And we name it
transmission network.
Two most important characteristics in a transmission net-
work are the number of points transferred and the time
consumed in a transmission process. Their ratio is termed
speed.
Definition 3 (Speed). Speed is the number of points trans-
ferred in a unit time interval.
The transmission capability can be described by the speed
function of time. For simplicity, only the node pairs connected
by media directly are considered. By Assumption 2,
the
behaviour of the speed function f depends on the properties
of the nodes, media and points. This means a specific analytic
expression of the speed function cannot be given unless all
the properties have been designated. However, some common
characteristics can be expected. Suppose there is a pair of
nodes (u, v) connected by media directly. Then (see Figure 1)
the value of the speed function f(u,v)(t) remains zero until
some point because of the latency caused by the sending,
propagation and reception of the points.
Fig. 1: A typical speed function function of time associated
to node pair (u, v).
that
We call
the moment
the function value becomes
nonzero the shortest transmission time (STT) (theoretically,
ST T = sending time + transmission time + receiving time.).
Besides, there is always an upper bound of the point propa-
gation speed. And we call the least upper bound theoretically
transmission speed (TTS).
However, in the real world, TTS may never be reached,
which leads to the meaninglessness of it. So instead, we can
choose some proper threshold δ ∈ R∗, the lowest acceptable
speed. Correspondingly, we call the time to reach the threshold
the critical moment (CM).
Remark 1. Suppose there are two towns A and B near a river.
A is upstream of B. Consider the goods transportation on the
river. Because of the water stream, f(A,B)(t) ≥ f(B,A)(t).
Thus, in general, f(u,v)(t) (cid:54)= f(v,u)(t).
2) Special relation strength measurement for transmission
network: The speed functions of time can describe almost all
the important properties of the relations in a transmission net-
work. So, the special relation strength measurement (SRSM)
can be derived from the function according to the problem
confronting us. Here are several examples.
3
1) The shorter STT is,
the stronger the corresponding
2) The shorter CM is, the stronger the corresponding rela-
relation is.
tion is.
3) The shorter the time to transfer a certain number of
points is, the stronger the corresponding relation is.
Although a reasonable SRSM cannot be constructed until
a concrete problem is given, several key properties should be
shared by all SRSMs.
Specifically, in a transmission network, relations should not
cancel out each other. So the SRSM is non-negative. Besides,
the strongest relation in a transmission network should be the
one that the node relates to itself as the transmission speed
can be considered as infinity. Intuitively, all SRSMs should
have the same value in this case, which is assigned zero.
Moreover, the relation strength will get weaker if the function
value increases. Therefore, we have the following definition.
Definition 4 (SRSM). Given some network, let N be the set
of nodes in it and P ⊆ N × N the set of node pairs connected
by media directly. Then a function s : P → R∗ is a special
relation strength measurement (SRSM) if it satisfies
1) s(u, v) ≥ 0.
2) s(u, v) = 0 if and only if u = v.
Remark 2. Since transmission functions have various values
if we change the order of the parameters in general, so do
SRSMs. Namely, s(u, v) (cid:54)= s(v, u) in general.
With the help of SRSM,
the transmission network can
be reduced to a graph model. In the graph, the nodes are
represented by the vertices and connected by a weighted edge
if they are connected by media directly. Moreover, the weights
of the edges are assigned by a specific SRSM depending on
the practical problem. In general, the graph should be directed.
If s(u, v) = s(v, u) for all applicable pairs of nodes (u, v) in
a network, the graph can also be considered as an undirected
one.
In Section III-A3, the graph model will be used to define
more general relation strength measurement. Besides, node
and vertex are used alternatively without considering the
difference. So are relation and edge.
3) Relation strength measurement
for transmission net-
work: In this part, the discussion is based on the graph model.
Firstly, some notations of graphs need to be introduced.
Let G := (VG, EG) be a weighted graph where VG and EG
are the sets of vertices and edges of graph G respectively. For
any edge e ∈ EG, its weight is denoted by e. If there is
no ambiguity about the choice of the graph, VG and EG are
abbreviated to V and E.
In the previous section, SRSM measures the direct relations
between any pair of nodes. That is, the retransmission function
of nodes is not taken into account. Neither is the parallel
transmission on various paths. However, in the real world,
the retransmission and parallel transmission of points happen
frequently (like express service and data transmission on the
internet). So we have to derive a more general relation strength
hδCMtf(u,v)(t)STTTTSmeasurement function, which is named relation strength
measurement for transmission network (RSMFTN).
For the same reason in the derivation of SRSM, an analytic
expression of RSMFTN cannot be given until a concrete
problem is designated. But a reasonable RSMFTN must hold
several key properties.
First of all, all the relations between any pair of nodes
should be measurable. That is, the domain of RSMFTN is
V × V . The properties of SRSM should be inherited. Then
RSMFTN is also non-negative and RSM F T N (u, v) = 0 if
and only if u = v. Besides, there is no relation between the
nodes belonging to two disconnected components. In contrast
to the coincidence of two nodes, this is the other extreme. So
it is reasonable to set the value of RSM F T N to be infinity
(∞), an element greater than any real number. The relation
of some vertices u and v gets stronger if the function value
RSM F T N (u, v) approaches to zero.
Consider a linear graph (Figure 2a). The points sent by
u and received by v must be retransmitted by w. So the
difficulty to transfer points from u to v is not
less than
the one from u to v visiting w. Notice that the difficulty
of nodes to receive and send points has been included by
SRSM and so indicated by the weights of the edges. Hence,
the equality should hold. In other words, RSM F T N (u, v) =
RSM F T N (u, w) + RSM F T N (w, v) if w is a cutting node
on the path from u to v. To add on, the transmission dif-
ficulty does not increase if we add some other retransmis-
sion node s (see Figure 2b). Thence, in general, we have
RSM F T N (u, v) ≤ RSM F T N (u, w) + RSM F T N (w, v).
(a)
(b)
Fig. 2
Moreover, the ratio of the relation strengths (the relative
relation strength) of two pairs of nodes should be fully
determined by the relative magnitude of the weights. Also,
for an indirect graph, the directions of edges are not taken
into account; therefore, ∀(u, v) ∈ V ×V. RSM F T N (u, v) =
RSM F T N (v, u).
To sum up, we can define the RSMFTN as follows,
Definition 5 (Relation strength measurement for transmis-
sion network). Suppose G is some directed graph and g :
V × V → R ∪ {∞} a function. Then g is a relation strength
measurement for transmission network (RSMFTN) if and only
if for u, v, w ∈ V ,
1. g(u, v) ≥ 0. (non-negativity)
2. g(u, v) = 0 if and only if u and v coincide. (coincidence
3. g(u, v) = ∞ if and only if there is no path between u
4. g(u, v) ≤ g(u, w)+g(w, v). Moreover, the equality holds
if the two components that contain u and v are connected
by the cutting node w.
axiom)
and v.
4
5. Suppose G(cid:48) is a graph which is same as G except that
the edges' weights in G(cid:48) are all α times greater than the
ones in G. Then for the corresponding vertices u(cid:48) and v(cid:48)
in G(cid:48), g(u(cid:48), v(cid:48)) = αg(u, v)
Besides, if G is undirected,
6. g(u, v) = g(v, u) (symmetry)
Example 1. Actually, many measurements derived by other
researchers are RSMFTNs. A well-known one should be the
shortest distance function (SDF), which evaluates the shortest
distance between some pair of nodes in a graph. Here is the
proof.
Proof. Suppose u, v and w are arbitrary vertices in some
directed graph G. Let g denote the SDF. We prove the
proposition when G is weighted. The proof for the unweighted
graph follows by setting the weights of the edges to one.
Since g(u, v) returns the sum of weights on the shortest path
from u to v, g(u, v) ≥ 0. The property 1 holds. The properties
2 and 3 hold by the definition of SDF.
For property 4, assume g(u, v) > g(u, w) + g(w, v).
Consider the path p consisting of the shortest path from
u to w and the one from w to v. It is easy to see that
the length of the path l(p) is g(u, w) + g(w, v), which is
shorter than g(u, v). So g(u, v) cannot be the length of the
shortest path. We get a contradiction. Moreover, if there exists
a cutting node w connecting the components containing u
and v respectively, the shortest path between u and v can
be split into the one from u to w and the one from w to v. So
g(u, v) = g(u, w) + g(w, v). Therefore, the property 4 holds.
For property 5, suppose path p is some shortest path
from u to v in graph G. Then l(u, v) = g(u, v). Let p(cid:48)
denote its counterpart in G(cid:48). Since the weights in G(cid:48) are α
times the ones in G, so is the length of path p(cid:48). That is,
l(p(cid:48)) = αl(p). Since path p(cid:48) connects u(cid:48) and v(cid:48) in G(cid:48), we
have g(u(cid:48), v(cid:48)) ≤ l(p(cid:48)). In other words, g(u(cid:48), v(cid:48)) ≤ αl(u, v).
Similarly, consider the reverse transformation from G(cid:48) to G.
That is, all the weights of edges in G(cid:48) is 1
α times in the ones
α l(u(cid:48), v(cid:48)) ≥ g(u, v), which is equivalent to
in G. So we have 1
l(u(cid:48), v(cid:48)) ≥ αg(u, v). Combining with g(u(cid:48), v(cid:48)) ≤ αl(u, v), we
conclude that g(u(cid:48), v(cid:48)) = αl(u, v) = αg(u, v). So property 5
holds.
Suppose G is an undirected graph, then by the commutativ-
ity and associativity of the addition operator, g(u, v) = g(v, u).
In other words, the order to add the weights of the edges
compounding the shortest path does not change the final result.
To sum up, SDF is an RSMFTN.
B. Similarity Network
1) Similarity function: In order to make the problem easier
to discuss, we need to give some fundamental definitions at
first. We name the objects that have similarity relations nodes.
Each node may have various properties. Moreover, there are
some possible options for each property (for example, red,
blue, yellow are possible options for property colour), and we
name these options cases.
The similarity network concerns the property similarity
of nodes. We assume that, for a certain problem, the set
uwvuwvsof properties is fixed and for each property, there exists a
similarity function that maps the case pairs to real numbers.
Intuitively, the a measure of similarity should not be negative.
Thus, we assume that the similarity function is non-negative.
Besides, to keep the consistency with the definition of SRSM
given in Section III-A2, the function value increases while the
similarity decreases. Moreover, for some objects A and B,
if A is similar to B, then B is also similar to A. Then we
formalize the preliminary idea:
Definition 6. Let P be some property of the nodes and CP
the set of possible cases of P , then we say s is a similarity
function s : P × P → R if for (γ1, γ2) ∈ CP × CP
1) s(γ1, γ2) ≥ 0 (non-negativity)
2) s(γ1, γ2) = 0 if and only if p1 = p2 (coincidence axiom)
3) s(γ1, γ2) = s(γ2, γ1) (symmetry)
Since more than one properties P1, P2,··· might be consid-
ered in general, we need to define a list of similarity functions
sP1 , sP2,··· . For convenience, we write them in matrix forms.
That is, [P1 P2 ··· ] and [sP1 sP2 ··· ].
Two lists of similarities are not measurable. And the
properties may not be of the identical importance. Thence,
we need a function to translate a list of parameters to an
index. Traditionally, we call the function manipulating the
importances of a list factors weight function. So we have
the following definition:
Definition 7 (Weight function). Suppose N is the set of nodes
under the consideration in some problem. Let P1, P2 ···
denote the properties. Besides, [sP1 sP2 ··· ] is the list of the
corresponding similarity functions. A function of functions w
mapping [sP1 sP2 ··· ] to a non-negative function f is called
a weight function.
Remark 3. The choice of the weight function depends on the
practical problem we try to solve. A trivial weight function is
just a list of weights. In more details, suppose [sP1 sP2 ··· sPn ]
is a list of similarity functions. Let α1, α2 ··· , αn be the
weights indicating the importances. Then w = [α1 α2 ··· αn]
can be a potential weight function. And f is
n(cid:88)
[α1 α2 ··· αn] × [sP1 sP2 ··· sPn ]T =
αi · sPi,
i=1
which is a non-negative function.
Example 2. Suppose we take two properties P1 and P2 into
account. Besides, we have the possible cases γ1, γ2, γ3 for
P1 and ζ1, ζ2 for P2. For two nodes u and v, assume u
has properties γ1 and ζ2, and v has properties γ3 and ζ1.
Let sP1 and sP2 be the similarity function we created for P1
and P2. If we use the way in remark 3 to define w, we have
w = [α1 α2]. So we have f (s, t) = α1sP1(s's P1, t's P1) +
α2sP2(s's P2, t's P2). In particular, for nodes u and v, we
have f (u, v) = α1 · sP1(γ1, γ3) + α2 · sP2(ζ2, ζ1).
2) Relation strength measurement for similarity network:
The weight function can generate a function f to measure the
similarity of a pair of nodes. However, the weight function
here has no guarantee that f always gives the measurement
5
following our intuition. In particular, we require f satisfies the
following properties:
Suppose N is the set of nodes under the consideration and
P the set of properties. Then for u, v and w in N, we have,
1) f (u, v) ≥ 0
2) f (u, v) = 0 if and only if u and v have the exactly same
cases for all properties in P
3) f (u, v) ≤ f (u, w) + f (w, v)
4) f (u, v) = f (v, u)
The first two properties are inherited from the similarity
function. Since the similarity relation should be symmetric
(that is, if A is similar to B, then B is also similar to A),
so we have property 4. Besides, property 3 shows that the
direct measurement of any pair of nodes is at least not greater
than the sum of the ones with an intermediate point. Since
this function is defined for similarity measurement, we name
it the relation strength measurement for similarity network
(RSMFSN).
Remark 4. In other words, f is a distance function. In fact,
the example we give in remark 3 is an RSMFSN.
C. Relations between similarity network and transmission
network
In many cases, there are very strong relations between simi-
larity networks and transmission networks. A typical example
is the pathogen infection among some species. If we consider
the DNA similarity among organisms. It is easier for some
certain pathogen to infect organisms that have similar DNAs.
Or in other words, the easiness of pathogen transmission has
a positive relationship with the DNA similarity. Therefore,
the relative relation strength among the organisms should be
similar whichever relation type we consider here.
Since both RSMFTN and RSMFSN are used to measure
the relations among the nodes in networks, and the follow-up
propositions are based on their shared properties, we call both
two relation measurements relation strength measurement
(RSM) in the sequel.
IV. COMMUNITIES
After defining RSM, the definition of communities can be
derived. Ahead of giving a formal definition, an important
problem needs to be discussed. That is, the community rela-
tion's transitivity. In other words, if A and B are contained in
one community and so are B and C, can we also say A and
C are in one community? In general, this implication is not
true. A typical counterexample is "your friend's friends may
not be your friends". So all relation strength between any pair
of nodes should be considered when we define a community.
Moreover, since only the groups of nodes having mutually
strong enough relations are considered as communities, a
relation strength threshold (community parameter) needs to
be designated.
Definition 8 (Community). Suppose W G ⊆ VG for some
directed graph G, ∈ R∗, and g is some RSM. Then W G
is a community with respect to RSM g and constant if and
only if for all (u, v) ∈ W G × W G. g(u, v) ≤ . Moreover, we
say is the community parameter (CP) of W G with respect
to g. If there is no ambiguity of the choice of RSM and CP,
we will briefly say W G is a community.
Since CP gives a threshold of
the relation strength,
whichever pair of nodes we choose in a community,
the
relation strength of the pair cannot be weaker than the ones
the CP represents. So for those problems considering the worst
cases, the CP can be designated according to some CM with
some certain threshold (in Section III-A1). Then the inner
structure of the community can be ignored since the poorest
performance of the community satisfies the requirement. In
other words, a community can be considered as a relatively
independent entity, and the CP is a global property of it.
Remark 5. Notice that the definition is based on the set of
vertices instead of the subgraph used in many other papers.
Besides, it is worthy to emphasize that the choice of com-
munities usually consider the whole graph's topology rather
than the local one (this shows that the community is some
higher level structure based on the original graph). Since
the results might be different for various choices of graph
topology, the superscripts are used to make the description
clear (for example, W G means W is a vertex set and graph
G is the working topology).
V. PROPOSITIONS AND DETECTION ALGORITHM FOR
COMMUNITIES
Based on the definition of RSM, an adjoint complete graph
can be derived for recording all the relation strengths. More
accurately,
the weights of edges in the adjoint graph is
determined by the corresponding RSM.
Definition 9 (Adjoint complete digraph). Suppose G is some
directed graph and g is some RSM. Let E = VG × VG be a
new set of edges whose weights are assigned by g. Then the
adjoint complete digraph adj(G, g) := {VG, E}.
The definition of communities uses CP to give a threshold of
the relation strength. That means, if the relation strength is not
strong enough, the relation is ignored during the community
detection. Moreover, for any pair of nodes, the definition of
communities requires the enough strengths of the relations
in both two directions. Hence, we can remove the relations
unsatisfying the requirement to simplify our graph without
changing the result of community detection. With this trick in
mind, we have the following transformation.
Definition 10 (Refinement transformation). Suppose G is a
directed weighted graph, DG ⊆ EG, and ∈ R∗ is some CP.
The refinement transformation is defined like this.
R(DG) := {(u, v) ∈ DG : (u, v) ≤ ∧ (v, u) ≤ }
Besides, all the edges' weights are set to 1 after applying the
transformation.
Remark 6. For convenience, the relations (u, v) and (v, u)
are together denoted u ↔ v. In this case the weight is not
applicable.
6
In fact,
the refinement
The definition of refinement transformation shows that if
some edges (u, v) is in R(DG), then so is (v, u). Moreover,
the weights become unnecessary since they all equal one.
Therefore, in R(DG), there is no need for us to consider
the directions and weights of the edges anymore. So, for now
on, R(DG) is thought of a set of undirected unweighted
edges. Moreover, if (u, v) ∈ R(DG), then we say the relation
between u and v is reserved. Or briefly, u ↔ v is reserved.
transformation is a higher order
function that applies a Boolean function to each relation in the
set of edges. The Boolean function here determines whether
the given relation is strong enough to be considered in the
community detection. So for a certain refinement transforma-
tion, the reservation of the relation depends on the strength of
the relation itself rather than the topology in which the relation
is.
Lemma 1. Suppose G is some directed graph. If F1 ⊆ F2 ⊆
EG, then R(F1) ⊆ R(F2).
Proof. Pick (u, v) ∈ R(F1) arbitrary. So u ↔ v is in F1 and
reserved after applying the refinement transformation. Since
F1 ⊆ F2, then u ↔ v ∈ F2. So (u, v) ∈ R(F2).
Then the adjoint complete digraph can derive a simplified
undirected unweighted graph whose edges represent the two-
direction relations strong enough to construct communities.
Definition 11 (Effective edge graph). Suppose G is some
directed graph. g is some RSM. is some CP. Then the
effective edge graph is (VG, R(Eadj(G,g))) and denoted by
eeg(g,)(G). Moreover, suppose the vertices set AG is a subset
of VG. The full subgraphs of eeg(g,)(G) over AG is denoted
by eeg(g,)(G)[AG].
Lemma 2. Let g be some RSM, ∈ R∗ some CP and G some
directed weighted graph. Assume W G ⊆ VG. Then the vertices
set W G is a community if and only if for all u, v ∈ W G, u ↔ v
is reserved after applying the refinement transformation.
transformation will remove all
Proof. The refinement
the
relations that cannot be used in a community structure. In other
words, if all relations are reserved after applying refinement
transformation, the relation in any pair of nodes is strong
enough. This is exactly what the definition of communities
requires. So, W G is a community. On the other hand, if W G
is a community, the relation (in both directions) in any pair of
nodes should be strong enough. Thus, all of them are reserved
after applying the refinement transformation.
Lemma 3. Any full subgraph of a complete graph is again
complete.
Proof. Suppose S is a full subgraph of Cn for some n. Then
for arbitrary vertices u and v in S, edge (u, v) ∈ ECn. So by
the definition of full subgraphs, (u, v) ∈ ES. That is, there is
an edge in an arbitrary pair of nodes in S. So S is a complete
graph.
Theorem 1. Suppose G is some directed graph, g some RSM
and some CP. AG ⊆ VG is a community if and only if
eeg(g,)(G)[AG] is complete.
7
Fig. 3: The Concept Graph of The Algorithm
Proof.
(⇒) Suppose AG is a community. Pick vertices u and v in
AG arbitrary. Since AG is a community, then all the relations
will be reserved after applying the refinement transformation.
Moreover, since adj(G, g)[AG] is complete, then u ↔ v ∈
Eadj(G,g)[AG]. Thus, (u, v) ∈ R(Eadj(G,g)[AG]). Since we
pick u and v arbitrary in AG, there is an edge between any
pair of nodes in eeg(g,)(G)[AG]. Hence, eeg(g,)(G)[AG] is
complete.
(⇐) Suppose eeg(g,)(G)[AG] is complete. Then ∀(u, v) ∈
AG × AG, (u, v) ∈ R(Eadj(G,g)[AG]). Since eeg(G, g)[AG]
is complete, all the relations in Eadj(G,g)[AG] are reserved
after applying the refinement function. Therefore, AG is a
community.
It is easy to find that all single nodes can be considered as
a community because they relate to themselves trivially, and
RSM is zero. However, this kind of result does not follow our
intuition since the community should be some set of nodes.
The definition of the maximal community tackles this problem.
For a better understanding of the definition, a theorem needs
to be introduced first.
Theorem 2. Suppose G is a directed graph, a CP and g an
RSM. Besides, AG ⊆ BG ⊆ VG. If BG is a community, then
so is AG
Proof. Since BG is a community,
eeg(g,)(G)[BG]
then by Lemma 1, eeg(g,)(G)[AG]
eeg(g,)(G)[BG].
then by Theorem 1,
is complete. Besides, since AG ⊆ BG,
is a subgraph of
Moreover, pick u, v ∈ AG arbitrary. Then u, v ∈ BG as
well. Notice that eeg(g,)(G)[BG] is complete. So the relation
u ↔ v ∈ Eadj(G,g)[BG] is reserved, which implies (u, v) ∈
Eeeg(g,)(G)[AG]. Thus, eeg(g,)(G)[AG] is complete. So AG is
a community as well.
Theorem 2 shows that,
if BG can be considered as a
community with respect
then all
the subsets of BG can be considered as a community. This
observation leads to the definition of maximal community.
to some RSM and CP,
Definition 12 (Maximal community). Suppose G is a directed
graph. RSM and CP are given. Moreover, AG is a subset of
VG. Then AG is a maximal community if and only if
1. AG is a community, and
2. There is no BG ⊆ VG such that BG is a community and
AG (cid:40) BG.
With the maximal community definition in mind, we intro-
duce an algorithm to detect them if RSM and CP are specified.
For easier explanation, we define problem A as this:
Definition 13 (Problem A). Given some adjoint graph
adj(G, g) and CP , find all the maximal communities in G
(the set of the maximal communities is denoted Ψ).
Definition 14 (Problem B). Given the effective edge graph
eeg(g,)(G), find the all the maximal cliques in eeg(g,)(G)
(the set of the maximal cliques is denoted by Φ).
The following theorem shows the equivalence of problem
then eef(g,)(G)[AG]
is a clique. Assume eef(g,)(G)[AG]
A and problem B.
Theorem 3. Suppose G is a directed graph, some CP, g
an RSM and AG a subset of VG. Then AG is a maximal
community if and only if eef(g,)(G)[AG] is a maximal clique
in graph eef(g,)(G). Therefore, Ψ = Φ.
Proof.
(⇒) Suppose AG is a maximal community. Then since
AG is a community,
is complete.
So it
is not max-
imal. Then there exists some vertices set BG such that
eef(g,)(G)[AG] (cid:40) eef(g,)(G)[BG] and eef(g,)(G)[BG]
is complete. So AG ⊆ BG. Moreover, since both two
graphs are complete,
the equality cannot hold. Otherwise,
eef(g,)(G)[AG] = eef(g,)(G)[BG]. So we have AG (cid:40) BG.
Besides, since eef(g,)(G)[BG] is complete, BG is a commu-
nity. Hence, AG cannot be a maximal community, which is a
contradiction.
(⇐) Suppose eef(g,)(G)[AG] is a maximal clique. Since
eef(g,)(G)[AG] is complete, then AG is a community. As-
sume AG is not maximal, then there exists some community
BG such that AG (cid:40) BG. Then eef(g,)(G)[BG] is complete.
Moreover, we have eef(g,)(G)[AG] (cid:40) eef(g,)(G)[AG] by
MaximalCommunitiesΨAdjointGraphadj(G,g)OriginalGraphGABRSMgCPEfficientedgegrapheeg(g,)(G)MaximalCliquesΦBron-KerboschalgorithmThm.3Ψ=ΦLemma 1. Therefore, eef(g,)(G)[AG] cannot be maximal,
which is a contradiction.
Remark 7. Bron-Kerbosch algorithm [33] is a well-known
algorithm to find maximal cliques. Thence, by Theorem 3, we
can reduce problem A to problem B and apply Bron-Kerbosch
algorithm to find Φ, which equals Ψ.
Figure 3 shows the relationships among the important con-
cepts and transformations introduced. In more details, suppose
G is some graph, g some RSM and some CP. Moreover, all
the vertices in G have been indexed from 1 to VG. Then we
have the following algorithm,
EEG[i, j] = 1
1: procedure FINDMAXIAMLCOMMUNITIES
for (i, j) ∈ VG × VG where i ≤ j do
2:
if g(i, j) ≤ & g(j, i) ≤ then
3:
4:
5:
6:
7:
8:
9:
10:
11: end procedure
end for
SetOfMaximalCommunities Φ ←
EEG[i, j] = 0
Bron-Kerbosch algorithm(EEG)
else
end if
VI. DEMONSTRATION
In this section, we demonstrate how our new algorithm
works by applying it on Zachary's karate club network [34].
We choose resistance distance [35] as our RSM.
A. The current model
The definition of communities indicates that some certain
RSM is required. We have shown that SDF is RSMFTN in
Example 1, so that SDF is RSM. Although many community
detection algorithms work on SDF, it may not always give
a reasonable result. Intuitively, the relation of a pair nodes
will get stronger if there are more paths between them.
However, SDF does not consider this case (see Figure 4). More
specifically, in SDF view, the relation will not get stronger
unless a path shorter than the previous shortest path is added.
8
In order to avoid this problem, we try to use the Klein and
Randic's effective resistance function (ERF) [35] to measure
the relation strength instead of SDF.
B. Klein and Randic's effective resistance
Suppose G is an indirectly connected graph. Then G can
be considered as an electrical network that all the edges are
resistances with the corresponding weight values (if G is an
unweighted graph, then the resistances of all edges are one).
Let u and v be two vertices in the graph. Then the effective
resistance of these two vertices can be defined like this:
Definition 15. Let the voltage of u be U and the one of v
be 0. We can measure the current I from u to v. Then the
I . Briefly,
efficient resistance R(u, v) between u and v is U
I .
R(u, v) = U
1) Algorithm to get efficient resistance distance: Klein
and Randic [35] also provide an algorithm to compute the
resistance distance for a connected indirect weighted graph.
Suppose graph G is connected. Let A be the adjacent matrix
and D the diagonal degree matrix of G. It is worthy to note
that, in a weighted indirected graph, the degree of a vertex
is the sum of the weights of all its adjacent edges. Then the
Laplacian matrix L can be computed using formula L = D −
A. Let L† be the generalized inverse [36] of L. Then the
efficient resistance distance Ri,j of any pair of vertices (i, j)
in graph G can be obtained by
†
Ri,j = L
i,i + L
†
†
j,j − 2L
i,j
And we usually call the corresponding matrix R resistance
matrix.
2) ERF is an RSMFTN: Since the definition of community
is based on RSM, we have to prove ERF is an RSM first.
Essentially, in this case, the relations among the nodes are
derived from the electron flow in the wires among the vertices.
So we need to consider the criteria of RSMFSN.
Lemma 4. Resistance is distance. That
satisfies the following properties:
the resistance
is,
1) Ra,b ≥ 0
2) Ra,b = 0 ⇔ a = b
3) Ra,b = Rb,a
4) Ra,c + Rc,b ≥ Ra,b
Lemma 5. Let x be a cut-point of a connected graph, and
let a and b be points occurring in different components which
arise upon deletion of x. Then,
Ra,b = Ra,x + Rx,b
(a)
(b)
Fig. 4: Both in (a) and (b), the shortest distance between
Node1 and Node3 is 2. So in SDF view, the relation strengths
between Node1 and Node3 in these two cases are identical.
However, there is one more path between Node1 and Node3
in (a). So, intuitively, the relation between Node1 and Node3
in (a) should be stronger than the one in (b).
Remark 8. The proofs of Lemma 4 and Lemma 5 have been
given by Klein and Randic [35].
Lemma 6. RDF satisfies the property 5 of RSM.
Proof. Suppose G is some graph and G(cid:48) is same as G but
the edges weights in G(cid:48) are all α times greater than the ones
in G. Let A and A(cid:48) be the adjacent matrixes of G and G(cid:48)
respectively. Then we have A(cid:48) = αA. So for the corresponding
15432123degree matrixes D and D(cid:48), we also have D(cid:48) = αD. Therefore,
we have
L(cid:48) = D(cid:48) − A(cid:48) = αD − αA = α(D − A) = αL
Let L† and L(cid:48)† be the generalized inverse of L and L(cid:48)
respectively. Then by the definition of the generalized inverse,
we have
(1)
(2)
(⇔)
(⇔)
LL†L = L
L(cid:48)L(cid:48)†L(cid:48) = L(cid:48)
Since L(cid:48) = αL, we can simplify equation 2
L(cid:48)L(cid:48)†L(cid:48) = L(cid:48)
(αL)L(cid:48)†(αL(cid:48)) = (αL(cid:48))
L(αL(cid:48)†)L = L
Comparing with equation 1, αL(cid:48)† has the same function as
L†. Since the final result does not rely on the choice of the
generalized inverse matrix, we can let L† be the one satisfying
the equation
αL† = L(cid:48)†
(3)
Hence, we have
(cid:48)†
R(cid:48)
i,j = L
i,i + L
(cid:48)†
(cid:48)†
j,j − 2L
i,j
= αL† + αL† − 2αL†
†
†
†
j,j − 2L
= α(L
i,i + L
i,j)
= αRi,j
Proposition 1. ERF is an RSMFSN.
Proof. We can define that the resistance distance of a pair of
vertices is infinite if there is no path between them. Then the
proposition is immediate from Lemmas 4-6.
Therefore, ERF is RSM.
C. Community detection in Zachary's karate club
Fig. 5: Zachary's karate club
The graph we use for demonstration is Zachary's karate club
(Figure 5) [34], which is a popular test case in community
detection research.
At first, we need to choose some proper CP, which is the
lower bound of the relation strength within the communities.
Here, we let CP = 1.5.
9
Then, we use Klein-Randic method to compute the resis-
tance distance for each pair of nodes in the network and get
the corresponding resistance matrix R.
After that, we get the corresponding adjoint graph (adj) from
R and remove all the edges whose weights are greater than
CP. So we get the efficient edges graph (eeg).
Then we apply Bron-Kerbosch algorithm on eeg and get a
list of maximal communities.
In Figure 6, we plot those maximal communities in the
original graph. Here, we have three maximal communities
represented by red, blue and yellow respectively. Some nodes
are multi-colour, which means they belong to various maximal
communities simultaneously.
VII. CONCLUSION
In this paper, we discussed two most common types of
networks: transmission networks and similarity networks. Two
corresponding relation strength measurements (RSMFTN and
RSMFSN) are defined. And we reduce them into a unified
graph model. Based on this, we provide a general definition of
communities and derive a corresponding detection algorithm.
At last, we give a demonstration to show how the algorithm
works.
Our paper gives a general procedure to detect community
structures in practical networks. Readers can specialize our al-
gorithm to derive theirs according to the problems confronting
them.
VIII. LIMITATIONS AND FUTURE WORK
Generally, RSMs consider the whole network topology. So
does the algorithm to find the maximal community structures.
While the algorithm gives the accurate results, it is NP hard.
So our algorithm may not suit the community detections in
dynamic networks. Besides, the definition we give in this paper
is based on the absolute strengths among the nodes. So the
users should always give a proper community parameter ,
which is hard to find sometimes.
Although we proved that SDF and ERF are RSMFTN,
many other RSMFTNs still wait to be discovered. Besides,
the definition based on the absolute relation strength should
derive a corresponding definition based on the relative relation
strength. The key point is how to give a general definition of
the neighbour nodes when applying different RSMs.
REFERENCES
[1] S. Fortunato, "Community detection in graphs," Physics
Reports, vol. 486, pp. 75 -- 174, 2 2010.
[2] M. Porter, J. Onnela, and P. Mucha, "Communities in
networks," Notices of the American Mathematical Soci-
ety, vol. 56, no. 9, pp. 1082 -- 1097, 10 2009.
[3] S. Fortunato, "Community detection in graphs," Physics
Reports, vol. 486, no. 3-5, pp. 75 -- 174, 2010.
[4] M. E. J. Newman, "Communities, modules and large-
scale structure in networks," 2012.
[5] B. W. Kernighan and S. Lin, "An efficient heuristic
procedure for partitioning graphs," Bell System Technical
Journal, vol. 49, pp. 291 -- 307, 1970.
1234567891011121314151617181920212223242526272829303132333410
Fig. 6: Maximal Communities (CP = 1.5)
nity structures in complex networks with a potts model,"
Phys. Rev. Lett., vol. 93, p. 218701, Nov 2004.
[17] C. Wan, S. Peng, C. Wang, and Y. Yuan, "Communities
detection algorithm based on general stochastic block
model in mobile social networks," in 2016 International
Conference on Advanced Cloud and Big Data (CBD),
Aug 2016, pp. 178 -- 185.
[18] P. J. Bickel and A. Chen, "A nonparametric view of
network models and newman-girvan and other modular-
ities," Proceedings of the National Academy of Sciences,
vol. 106, no. 50, pp. 21 068 -- 21 073, 2009.
[19] E. M. Airoldi, D. M. Blei, S. E. Fienberg, and E. P. Xing,
"Mixed membership stochastic blockmodels," J. Mach.
Learn. Res., vol. 9, pp. 1981 -- 2014, Jun. 2008.
[20] J. Wahlstrom,
[6] T. Hastie, R. Tibshirani, and J. Friedman, "The elements
Springer New York, pp. 520 --
of statistical learning."
523.
[7] A. Hlaoui and S. Wang, "A direct approach to graph
clustering," Neural Networks and Computational Intelli-
gence, no. 158-163, 2004.
[8] M. J. Rattigan, M. Maier, and D. Jensen, "Graph clus-
tering with network structure indices," in Proceedings of
the 24th International Conference on Machine Learning,
ser. ICML '07. New York, NY, USA: ACM, 2007, pp.
783 -- 790.
[9] E. R. Barnes, "An algorithm for partitioning the nodes of
a graph," SIAM Journal on Algebraic Discrete Methods,
vol. 3, no. 4, pp. 541 -- 550, 1982.
[10] U. Luxburg, "A tutorial on spectral clustering," Statistics
and Computing, vol. 17, no. 4, pp. 395 -- 416, Dec. 2007.
[11] Y. Li, K. He, K. Kloster, D. Bindel, and J. Hopcroft,
"Local Spectral Clustering for Overlapping Community
Detection," ACM Trans. Knowl. Discov. Data, vol. 12,
no. 2, pp. 17:1 -- -17:27, 2018.
[12] Z. Lu, J. Wahlstrom, and A. Nehorai, "Community De-
tection in Complex Networks via Clique Conductance,"
Sci. Rep., vol. 8, no. 1, p. 5982, 2018.
[13] M. E. Newman, "Fast algorithm for detecting community
structure in networks," Phys. Rev. E, vol. 69, p. 066133,
Jun 2004.
[14] M. Chen, K. Kuzmin, and B. K. Szymanski, "Commu-
nity detection via maximization of modularity and its
variants," IEEE Transactions on Computational Social
Systems, vol. 1, no. 1, pp. 46 -- 65, March 2014.
[15] M. Kaur and A. Mahajan, Community Detection in
Complex Networks: A Novel Approach Based on Ant Lion
Optimizer.
Singapore: Springer Singapore, 2017, pp.
22 -- 34.
[16] J. Reichardt and S. Bornholdt, "Detecting fuzzy commu-
[21] R. Milo, S. Shen-Orr, S.
I. Skog, P. S. L. Rosa, P. Handel,
and A. Nehorai, "The β-model -- maximum likelihood,
cramer -- rao bounds, and hypothesis testing," IEEE Trans-
actions on Signal Processing, vol. 65, no. 12, pp. 3234 --
3246, June 2017.
Itzkovitz, N. Kashtan,
D. Chklovskii, and U. Alon, "Network motifs: Simple
building blocks of complex networks," Science, vol. 298,
no. 5594, pp. 824 -- 827, 2002.
O. N. Yaveroglu, N. Malod-Dognin, D. Davis, Z. Lev-
najic, V. Janjic, R. Karapandza, A. Stojmirovic, and
N. Przulj, "Revealing the hidden language of complex
networks," Scientific Reports, vol. 4, pp. 4547 EP -- , 04
2014.
[22]
[23] A. R. Benson, D. F. Gleich, and J. Leskovec, "Higher-
order organization of complex networks," Science, vol.
353, no. 6295, pp. 163 -- 166, 2016.
[24] M. E. J. Newman, "Equivalence between modularity
optimization and maximum likelihood methods for com-
munity detection," Phys. Rev. E, vol. 94, p. 052315, Nov
2016.
12345678910111213141516171819202122232425262728293031323334:MaximalCommunity1:MaximalCommunity2:MaximalCommunity311
Amiya Nayak received his B.Math. degree in Com-
puter Science and Combinatorics and Optimization
from University of Waterloo, Canada, in 1981, and
Ph.D. in Systems and Computer Engineering from
Carleton University, Canada, in 1991. He has over 17
years of industrial experience in software engineer-
ing, avionics and navigation systems, simulation and
system level performance analysis. He has served
in the Editorial Board of several journals, including
IEEE Transactions on Parallel & Distributed Sys-
tems, International Journal of Parallel, Emergent and
Distributed Systems, Journal of Sensor and Actuator Networks, and EURASIP
Journal of Wireless Communications and Networking. Currently, he is a Full
Professor at the School of Electrical Engineering and Computer Science
at the University of Ottawa. His research interests include software-defined
networking, mobile computing, wireless sensor networks, and vehicular ad
hoc networks.
[25] R. Guimera, S. Mossa, A. Turtschi, and L. A. N. Amaral,
"The worldwide air transportation network: Anomalous
centrality, community structure, and cities' global roles,"
Proceedings of the National Academy of Sciences, vol.
102, no. 22, pp. 7794 -- 7799, 2005.
[26] J. Chen and B. Yuan, "Detecting functional modules in
the yeast protein -- protein interaction network," Bioinfor-
matics, vol. 22, no. 18, pp. 2283 -- 2290, Sep. 2006.
[27] Y. Dourisboure, F. Geraci, and M. Pellegrini, "Extraction
and classification of dense communities in the web,"
Proceedings of
the 16th International Conference on
World Wide Web, pp. 461 -- 470, 2007.
[28] Y. Chaabani and J. Akaichi, "Meaningful communities
detection in medias network," Social Network Analysis
and Mining, vol. 7, no. 1, p. 11, Apr 2017.
[29] B. Scholkopf, J. Platt, and T. Hofmann, "Fundamental
limitations of spectral clustering," Advances in Neural
Information Processing Systems 19:Proceedings of the
2006 Conference, pp. 1017 -- 1024, 2007.
[30] A. Arenas, A. D´ıaz-Guilera, and C. J. P´erez-Vicente,
"Synchronization reveals topological scales in complex
networks," Phys. Rev. Lett., vol. 96, p. 114102, Mar 2006.
[31] D. Li, I. Leyva, J. A. Almendral, I. Sendina Nadal, J. M.
Buld´u, S. Havlin, and S. Boccaletti, "Synchronization
interfaces and overlapping communities in complex net-
works," Phys. Rev. Lett., vol. 101, p. 168701, Oct 2008.
[32] L. Danon, A. Daz-Guilera, J. Duch, and A. Arenas,
"Comparing community structure identification," Journal
of Statistical Mechanics: Theory and Experiment, vol.
2005, no. 09, p. P09008, 2005.
[33] C. Bron and J. Kerboscht, "Finding all cliques of an
undirected graph," Communications of the ACM, vol. 16,
pp. 575 -- 577, 1973.
[34] W. Zachary, "An information flow model for conflict
and fission in small groups," Journal of Anthropological
Research, vol. 33, pp. 452 -- 473, 1977.
[35] D.J.Klein and M.Randic, "Resistance distance," Journal
of Mathematical Chemistry, vol. 12, pp. 81 -- 95, 1993.
[36] E. T. Wong, "Generalised inverses as linear transforma-
tions," The Mathematical Gazette, vol. 63, no. 425, pp.
176 -- 181, October 1979.
Haoye Lu received his Bachelor of Science Joint de-
gree Honours in Computer Science and Mathematics
from University of Ottawa, Canada, in 2017. He was
the recipient of the University Silver Medal for his
second highest academic achievement in Faculty of
Science.
Haoye joined the School of Electrical Engineering
and Computer Science (EECS), University of Ottawa
in 2017 and is currently a master student pursuing
Master of Science degree in Computer Science.
He was also the recipient of the Full International
Scholarship. He is a reviewer of 2017 IEEE Global Communications Con-
ference and has published papers in quantum communication and artificial
intelligence fields. His research interests include quantum communication,
artificial intelligence and networks structures.
|
1610.01655 | 2 | 1610 | 2016-11-03T11:46:48 | Trump vs. Hillary Analyzing Viral Tweets during US Presidential Elections 2016 | [
"cs.SI"
] | In this paper, we provide a quantitative and qualitative analyses of the viral tweets related to the US presidential election. In our study, we focus on analyzing the most retweeted 50 tweets for everyday during September and October 2016. The resulting set is composed 3,050 viral tweets, and they were retweeted over 20.5 million times. We manually annotated the tweets as favorable of Trump, Clinton, or neither. Our quantitative study shows that tweets favoring Trump were usually retweeted more than pro-Clinton tweets, with the exception of a few days in September and two days in October, especially the day following the first presidential debate and following the release of the Access Hollywood tape. On two days in October 2016, pro-Trump tweet volume accounted for than 90\% of the total tweet volume. | cs.SI | cs | Analyzing Viral Tweets during US Presidential Elections 2016
Trump vs. Hillary
Walid Magdy1 and Kareem Darwish2
1School of Informatics, The University of Edinburgh, UK
2Qatar Computing Research Institute, HBKU, Doha, Qatar
Email: [email protected], [email protected]
Twitter: @walid magdy, kareem2darwish
6
1
0
2
v
o
N
3
]
I
S
.
s
c
[
2
v
5
5
6
1
0
.
0
1
6
1
:
v
i
X
r
a
Abstract
In this paper, we provide a quantitative and qual-
itative analyses of the viral tweets related to the
US presidential election. In our study, we focus
on analyzing the most retweeted 50 tweets for
everyday during September and October 2016.
The resulting set is composed 3,050 viral tweets,
and they were retweeted over 20.5 million times.
We manually annotated the tweets as favorable
of Trump, Clinton, or neither. Our quantitative
study shows that tweets favoring Trump were usu-
ally retweeted more than pro-Clinton tweets, with
the exception of a few days in September and two
days in October, especially the day following the
first presidential debate and following the release
of the Access Hollywood tape. On two days in Oc-
tober 2016, pro-Trump tweet volume accounted
for than 90% of the total tweet volume.
Introduction
Social media is an important platform for political
discourse and political campaigns (Shirky 2011; West
2013). Political candidates have been increasingly us-
ing social media platforms to promote themselves and
their policies and to attack their opponents and their
policies. Consequently, some political campaigns have
their own social media advisers and strategists, whose
success can be pivotal to the success of the campaign as
a whole. In the context of this paper, we are interested
in measuring the volume and diversity of support for the
two main candidates for the 2016 US presidential elec-
tions, Donald Trump and Hillary Clinton, on Twitter
during the two months preceding the elections, namely
September and October 2016. The work is based on the
data being collected via TweetElect.com, which is
an online website that tracks tweets and Twitter trends
pertaining to the US presidential elections.
For our analysis, we use the top 50 retweeted tweets,
aka viral tweets, for everyday in September and Oc-
tober 2016 pertaining to the US presidential election.
The total number of unique tweets that we analyze is
3,050, whose retweet volume of 20.5 million retweets ac-
counts for more than 50% of the total retweet volume
Copyright c(cid:13) 2016, All rights reserved.
during these two months on TweetElect. After manu-
ally tagging all the tweets in our collection for support
for either candidate, we looked at: which candidate has
more traction on Twitter and a more diverse support
base; when a shift in the volume of supporting tweets
happens; and which tweets were the most viral.
We observed that retweet volume of pro-Trump
tweets dominated the retweet volume of pro-Clinton
tweets on most days during September 2016, and al-
most all the days during October. A notable exception
was the day after the first presidential debate and the
day after the leak of the Access Hollywood tape in which
Trump used lewd language.
Data Collection
In this section, we describe the collection of viral tweets.
We initially give an introduction to TweetElect website,
which is the source we used to identify the daily viral
tweets. Later, we explain the data annotation process
and give some statistics on the data collected.
TweetElect
TweetElect.com1 is a free website that aggregates
and shows the most retweeted tweets related to the
2016 US presidential election. The website shows tweets
about the elections in general, with the option of dis-
playing tweets about each of the two main candidates
separately. It offers search functionality with filters on
media type (text, image, video, or links), while en-
abling the display of search results related to each can-
didate separately. TweetElect shows the most retweeted
tweets, images, videos, and links in the last hour, 12
hours, 1 day, or 2 days.
During September and October, the number of ag-
gregated tweets per day (including retweets) related to
the US presidential elections typically ranged between
300k and 600k. This number increased dramatically af-
ter specific events or revelations, such as after the pres-
idential debates, where the number of tweets exceeded
4 million tweets.
1http://www.tweetelect.com/
is
a
special
edition
TweetElect
of Tweet-
Mogaz2
(Magdy 2013), which is an Arabic news
portal that automatically generates news from tweets.
It uses state-of-the-art adaptive filtering methods for
detecting relevant tweets on broad and dynamic topics,
such as politics and elections (Magdy and Elsayed
2016). TweetElect used an initial set of 38 keywords
related to the US elections for streaming relevant
tweets. Consequently, adaptive filtering continuously
enriches the set of keywords with additional terms that
emerge by time (Magdy and Elsayed 2016).
Tweet Collection
We were interested in analyzing the most "viral" tweets
pertain to the US presidential elections. Therefore, we
constructed a set of the most retweeted 50 topically
relevant (as provided by TweetElect.com) tweets
for everyday in September and October 2016. Thus,
our collection contained 3,050 unique tweets that were
retweeted 20.5 million times. By month, September had
1,500 unique tweets with a retweet count of 6.67 million,
and October had 1,550 tweets with a retweet count of
13.89 million. This volume of retweets represents more
than 50% of the total tweet volume collected by Tweet-
Elect related to the US elections during September and
October 2016.
In our analysis, we show statistics based on three
types of viral tweets:
• Top50: The top 50 viral tweets per day.
• Top10: The top 10 viral tweets per day. Checking
only the top 10 rather than 50 can give a better in-
dicator of the direction of the trends on Twitter on
that day, and the top few retweeted tweets usually
dominate the retweet volume.
• Top10F: The top 10 viral tweets per day for the
candidates' supporters ("Fans") only and excluding
tweets from the official accounts of the candidates.
Since many of the top tweets are usually coming from
the presidential candidates, this gives a depth on the
support of the candidates by what their fans say.
The total number of retweets for the TOP 50, TOP
10, and TOP 10 Fa n tweets per day are 6.67 million,
3.49 million, and 1.75 million retweets respectively. Fig-
ures 1 and 2 show the virality of the top tweets day-by-
day during September and October 2016 respectively.
As shown, the days with the largest number of retweets
for the top N tweets were September 27 and October
10, which are the days following the first and second
debate between the candidates 3.
Tweet Labeling
We labeled the tweets on two stages, as we labeled the
viral tweets of each month directly after the end of this
2http://www.tweetmogaz.com/
3Tweets time stamp is based on GMT
Figure 1: Total number of retweets of the Top50, Top10,
and Top10F daily viral tweets relating to the US elec-
tions during September 2016
.
.
Figure 2: Total number of retweets of the Top50, Top10,
and Top10F daily viral tweets relating to the US elec-
tions during October 2016
month. Tweets were labeled as pro-Trump, pro-Clinton,
or neither.
Out of the 1,500 tweets collected during September,
636 were tweeted by either of the candidates' official
accounts. This number was 612 out of 1,550 for October.
These tweets were automatically annotated to be in the
favor of the candidate who posted them. The remaining
tweets were then posted to a crowd-sourcing platform4
to be manually annotated. Each tweet was annotated
by at least 3 annotators, and the majority voting is
taken for selecting the final label. A golden control set of
17 tweets was provided to control the annotators work
quality.
We asked annotators to label each of the tweet with
one of three labels: 1) In favor of Trump, 2) In favor of
Clinton, 3) Neither of them.
Instruction were given to annotators as follows:
• Tweets in favor of a candidate can be:
1. Clearly showing support to the candidate
2. Giving positive facts about the candidate or
his/her campaign (for example showing that
he/she leads in polls)
3. Attacking the other candidate
4https://www.crowdflower.com/
0100,000200,000300,000400,000500,000600,000700,000800,000900,0009/1/169/2/169/3/169/4/169/5/169/6/169/7/169/8/169/9/169/10/169/11/169/12/169/13/169/14/169/15/169/16/169/17/169/18/169/19/169/20/169/21/169/22/169/23/169/24/169/25/169/26/169/27/169/28/169/29/169/30/16Number of retweets of the top Nviral tweets on the US electionsTop50Top10Top10F0200,000400,000600,000800,0001,000,0001,200,0001,400,00010/1/1610/2/1610/3/1610/4/1610/5/1610/6/1610/7/1610/8/1610/9/1610/10/1610/11/1610/12/1610/13/1610/14/1610/15/1610/16/1610/17/1610/18/1610/19/1610/20/1610/21/1610/22/1610/23/1610/24/1610/25/1610/26/1610/27/1610/28/1610/29/1610/30/1610/31/16Number of retweets of the top Nviral tweets on the US elections (October 2016)Top50Top10Top10F4. Making fun (or sarcasm) of the other candidate or
his/her supporters.
• "Neither of them" tweets is selected if:
1. The tweet is reporting news about the elections or
a presidential candidate with no clear bias to be in
favor or against.
2. The tweet is attacking both candidates.
Annotators were instructed to check the tweet con-
tent carefully including any images, videos, or external
links to have an accurate annotation. In addition, we
advised them to check the profile of tweet authors to
better understand their position towards the candidates
if needed.
The annotators inter-agreement was 90%, which is
considerably high among three annotators for an an-
notation task with three choices. This gives high confi-
dence in the quality of annotation.
Results and Analysis
Figures 7 and 8 show the direction of support of the
Top50, Top10, and Top10F viral tweets per day for
September and October respectively. As it is shown, the
number of daily viral tweets in favor of Trump is usu-
ally larger than that for Clinton. This observation does
not change when considering the Top 50 or 10 tweets.
Furthermore, when considering the top viral tweets by
their fans (excluding the official accounts of the candi-
dates), the gap between Trump and Clinton was even
larger, where 57% and 65% of the Top10F tweets in
September and October respectively were in favor of
Trump, whereas it was only 27% and 19% in favor of
Clinton respectively. Looking at the daily viral tweets,
it is evident that for most days, Trump had more viral
tweets supporting him than Clinton.
For September 2016, Trump led Clinton in the vol-
ume of viral tweets everyday during the month save 6
days, with the day following the debate (9/27) showing
the highest percentage and volume of tweets supporting
Clinton. We inspected the other 6 days and they cor-
responded to: (September 12-13) Trump complaining
about how the debates would be moderated and ques-
tions about Clinton's health; (September 15-16) Trump
saying that women are bad for business (Oppenheim
2016) and disavowing the "birther" claims that Presi-
dent Obama was not born in the US; and (September
23-24) nothing noteworthy. Trump also led Clinton in
the number of unique viral tweets everyday except for
5 days, namely the 2 days following the debate, and on
September 12, 13, and 16.
Also in September, Pro-Trump tweets surged to more
than 70% of the volume of retweets on 3 days, namely
September 4, 6, and 9. On September 4, news broke that
Clinton mishandled classified material and Trump's
top tweet receiving 19.5k retweets which stated: "Lyin
Hillary Clinton told the FBI that she did not know the
C markings on documents stood for CLASSIFIED. How
can this be happening?" . On the 6th, hacked Clinton
emails were made public with with Trump's top tweet
on the topic receiving more than 14k retweets. On the
9th, Clinton stated that half of Trump supporters are a
"basket of deplorables".
For the month of October, pro-Clinton tweet volume
exceeded pro-Trump tweet volume on only two days
namely Oct. 7 and Oct. 26. October 7 coincides with
the release of the Access Hollywood video of Trump
making lewd comments, and coincides with the day
when pro-Clinton tweets received the largest portion of
retweet volume (58%). The top retweeted tweets favor-
ing Clinton were not as much pro-Clinton as they were
anti-Trump. The most retweeted tweet belonged to Jeb
Bush, the former hopeful in the Republican presidential
primaries, in which he condemned Trump's comments.
Though the tapes were described by some as an "Octo-
ber surprise", pro-Trump tweets constituted 35% of the
tweet volume. On October 26, the user "Bailey Disler"
was praising the person who destroyed Trump's star on
the Walk of Fame. His tweet was retweeted more than
124k times, which accounts for 6% of the volume for
that day.
Also in October, Pro-Trump retweet volume out-
paced pro-Clinton volume for all other days. In fact,
pro-Trump retweet volume accounted for more than
75% of the volume on 13 day during the month. Aside
from Oct. 29 when the Federal Bureau of Investigation
(FBI) announced that they are investigating Hillary
Clinton over misuse of email and Oct. 11 when he at-
tacked the leaders of the Republican Party, nothing out
of the ordinary was happening any of the other days.
The two most prominent sources of pro-Trump viral
tweets were the official accounts of Trump and Wik-
iLeaks.
Results in Figures 7 and 8 are based on the top N
unique tweets. When we take into consideration the real
volume these tweets represents, i.e. counting each tweet
in the top 50 with its number of retweets, the results can
be seen in Figures 3 and 4 for the Top50 for September
and October respectively. The graphs still show that
Trump had a larger number of supporting viral tweets
for most of the days. However, when Clinton gets more
viral tweets, some of the tweets may receive an enor-
mous number of retweets, as is clear on September 15
and 27 when there were large spikes in the favor of Clin-
ton. The overall share of retweets volume during the
month continues to be in favor of Trump. Even with
the spikes in pro-Clinton retweets, 54% and 67% of the
retweet volume for September and October respectively
was for tweets supporting Trump, 39% and 25% were
pro-Clinton, and the remaining 7% and 8% were unbi-
ased news or against both candidates.
We also looked at the diversity of tweet authors, and
found that there was not only more retweets in sup-
port of Trump, but also they were authored by more
people. The viral tweets in support of Trump were au-
thored by 196 and 198 users for September and Oc-
Figure 3: Total number of retweets of the Top50 daily
viral tweets for each candidate during September 2016
.
.
Figure 5: Total number of retweets per users whose
tweets showed in the Top50 during September 2016
.
.
Figure 4: Total number of retweets of the Top50 daily
viral tweets for each candidate during October 2016
tober respectively compared to 135 and 110 users re-
spectively for Clinton. Furthermore, for September, in
terms of the number of unique viral tweets the per-
centage of viral tweets supporting Trump that were au-
thored by his official account was 31% compared to 66%
of pro-Clinton tweets that were authored by her official
account. The percentages for October were consistent
with 35% for Trump and 63% for Hillary. Figures 5 and
6 show the volume of retweets per author in our set of
viral tweets and suggests that there is greater diversity
of pro-Trump tweet authors. Conversely, we looked at
the 50 tweets with the most retweets over the entire two
months of September and October that are supporting
either candidate. For September, 45 were authored by
the official Trump account (making up 92% of the vol-
ume of the top 50 tweets) compared to 39 that were au-
thored by the official Clinton account (making up 68%
of the volume of the top 50 tweets). For October, 32
were authored by the official Trump account (making
up 57% of the volume of the top 50 tweets) compared
to 23 that were authored by the official Clinton account
(making up 39% of the volume of the top 50 tweets).
The drop in percentages of top retweeted tweets being
authored by the candidates from September to Octo-
ber is notable and warrants more investigation. Table
1 and 2 show the top 10 most retweeted Twitter ac-
counts along with the number of tweets in our set and
Figure 6: Total number of retweets per users whose
tweets showed in the Top50 during October 2016
retweet volume 5. One interesting observation is that
accounts with some of the most retweeted pro-Clinton
tweets had only one tweet in our set and there was no
correlation between tweet counts and retweet volume.
For accounts with pro-Trump tweets, there is correla-
tion between tweet count and retweet volume and 4 out
of the top 10 accounts are affiliated with the Trump
campaign in both months.
By volume, tweets from Trump's official account ac-
counted for 62% and 54% of pro-Trump retweets com-
pared to 68% and 52% for Clinton in September and
October respectively. In fact, Trump was more likely to
be retweeted than Clinton. In September, the average
retweet count for Trump was 8,434 compared to 5,140
for Clinton. Similarly in October, Trump was retweeted
13,471 time on average compared to 8,080 for Clinton.
Figures 5 and 2 show the volume of retweets per au-
thor for September and October respectively. Tables 3
and 4 list the most retweeted tweets over the months of
September and October respectively in support of both
5The number of retweets in Tables 1-4 are taken at the
time of the study. This number is expected to change over
time
0100,000200,000300,000400,000500,000600,0009/1/169/2/169/3/169/4/169/5/169/6/169/7/169/8/169/9/169/10/169/11/169/12/169/13/169/14/169/15/169/16/169/17/169/18/169/19/169/20/169/21/169/22/169/23/169/24/169/25/169/26/169/27/169/28/169/29/169/30/16Total number of retweets of the Top50 viral tweets for each candidateTrumpNeitherClinton0100,000200,000300,000400,000500,000600,00010/1/1610/2/1610/3/1610/4/1610/5/1610/6/1610/7/1610/8/1610/9/1610/10/1610/11/1610/12/1610/13/1610/14/1610/15/1610/16/1610/17/1610/18/1610/19/1610/20/1610/21/1610/22/1610/23/1610/24/1610/25/1610/26/1610/27/1610/28/1610/29/1610/30/1610/31/16Total number of retweets of the Top 50 viral tweets for each candidate (October 2016)TrumpNeitherClinton11010010001000010000010000001000000011223344556677889100111122133144155166177188Tweet volume per author (log scale)AuthorsTrumpClinton110100100010000100000100000010000000110192837465564738291100109118127136145154163172181190Unique tweets per user (log scale)AuthorsTrumpClintoncandidates. Again, tweets by the official accounts of the
candidates dominate the top spots. Also, aside from
Trump's tweet stating "Mexico will pay for the wall!",
none of the top tweets discuss policy, but are rather at-
tacks against the other candidate or their supporters or
self promotion.
Limitations
To better understand the results presented here, there
are a few limitations that need to be considered:
1. The top 50 viral tweets do not have to be represen-
tative of the whole collection. Nonetheless, they still
represents over 50% of the tweets volume on the US
elections during the period of the study.
2. Results are based on tweets collected from Tweet-
Elect. Although it is highly robust, the site uses au-
tomatic filtering methods that are not perfect. There-
fore, there might be other relevant viral tweets that
were not captured by the filtering method.
3. Measuring support for a candidate using viral tweets
does not have to represent actual support on the
ground for many reasons. Some of these reasons in-
clude the fact that demographics of Twitter users
may not match the general public, more popular ac-
counts have a better chance of having their tweets go
viral, or either campaign may engage in astroturfing,
in which dedicated groups may methodically tweet or
retweet pro-candidate messages.
Conclusion and Future Work
In this paper, we presented the top retweeted tweets
(viral tweets) from September and October 2016 sup-
porting the two main candidates for the 2016 US pres-
idential elections. We provided quantitative and qual-
itative analysis of these top tweets. Our results show
that pro-Trump tweets were retweeted more often than
pro-Clinton tweets, and he had more support on most
days, especially in October, few days before the election
day.
Further analysis is required to determine the leanings
of the authors of negative/positive tweets and the topics
of interest that they discussed. In addition, it is very
interesting to study if these trends for both candidates
are natural, or if campaign are engaged in astroturfing,
in which dedicated groups of people methodically tweet
or retweet pro-candidate messages.
References
[Magdy and Elsayed 2016] Magdy, W., and Elsayed, T.
2016. Unsupervised adaptive microblog filtering for
broad dynamic topics. Information Processing & Man-
agement 52(4):513–528.
[Magdy 2013] Magdy, W. 2013. Tweetmogaz: a news
portal of tweets. In Proceedings of the 36th international
ACM SIGIR conference on Research and development
in information retrieval, 1095–1096. ACM.
[Oppenheim 2016] Oppenheim, M. 2016. Ivanka trump
cuts interview short after questions over father's 'preg-
nancy is inconvenient for business' quote.
Indepen-
dent.co.uk.
[Shirky 2011] Shirky, C. 2011. The political power of so-
cial media: Technology, the public sphere, and political
change. Foreign affairs 28–41.
[West 2013] West, D. M. 2013. Air wars: Television ad-
vertising and social media in election campaigns, 1952-
2012. Sage.
Figure 7: The direction of support of the top viral tweets during September on the US presidential election 2016
Figure 8: The direction of support of the top viral tweets during October on the US presidential election 2016
051015202530354045509/1/169/2/169/3/169/4/169/5/169/6/169/7/169/8/169/9/169/10/169/11/169/12/169/13/169/14/169/15/169/16/169/17/169/18/169/19/169/20/169/21/169/22/169/23/169/24/169/25/169/26/169/27/169/28/169/29/169/30/16Top50Viral TweetsTrumpNeitherClinton0123456789109/1/169/2/169/3/169/4/169/5/169/6/169/7/169/8/169/9/169/10/169/11/169/12/169/13/169/14/169/15/169/16/169/17/169/18/169/19/169/20/169/21/169/22/169/23/169/24/169/25/169/26/169/27/169/28/169/29/169/30/16Top10Viral TweetsTrumpNeitherClinton02468109/1/169/2/169/3/169/4/169/5/169/6/169/7/169/8/169/9/169/10/169/11/169/12/169/13/169/14/169/15/169/16/169/17/169/18/169/19/169/20/169/21/169/22/169/23/169/24/169/25/169/26/169/27/169/28/169/29/169/30/16Top10FViral TweetsTrumpNeitherClinton54%7%39%Top50Viral Tweets (Overall)TrumpNeitherClinton62%5%33%Top10Viral Tweets (Overall)TrumpNeitherClinton57%16%27%Top10FViral Tweets (Overall)TrumpNeitherClinton0510152025303540455010/1/1610/2/1610/3/1610/4/1610/5/1610/6/1610/7/1610/8/1610/9/1610/10/1610/11/1610/12/1610/13/1610/14/1610/15/1610/16/1610/17/1610/18/1610/19/1610/20/1610/21/1610/22/1610/23/1610/24/1610/25/1610/26/1610/27/1610/28/1610/29/1610/30/16Top50Viral TweetsTrumpNeitherClinton01234567891010/1/1610/2/1610/3/1610/4/1610/5/1610/6/1610/7/1610/8/1610/9/1610/10/1610/11/1610/12/1610/13/1610/14/1610/15/1610/16/1610/17/1610/18/1610/19/1610/20/1610/21/1610/22/1610/23/1610/24/1610/25/1610/26/1610/27/1610/28/1610/29/1610/30/16Top10Viral TweetsTrumpNeitherClinton024681010/1/1610/2/1610/3/1610/4/1610/5/1610/6/1610/7/1610/8/1610/9/1610/10/1610/11/1610/12/1610/13/1610/14/1610/15/1610/16/1610/17/1610/18/1610/19/1610/20/1610/21/1610/22/1610/23/1610/24/1610/25/1610/26/1610/27/1610/28/1610/29/1610/30/16Top10FViral TweetsTrumpNeitherClinton67%8%25%Top50Viral Tweets (Overall)TrumpNeitherClinton75%5%20%Top10Viral Tweets (Overall)TrumpNeitherClinton65%16%19%Top10FViral Tweets (Overall)TrumpNeitherClintonTable 1: Most retweeted accounts supporting the two candidates for September
Account
Hillary Clinton
Ozzyonc
Jerry Springer
Senator Tim Kaine
Daniel Dale
David Fahrenthold
Little Miss Flint
Bernie Sanders
Joe Biden
I'm 5'13
Account
Donald J. Trump
Kellyanne Conway
WikiLeaks
Donald Trump Jr.
Paul Joseph Watson
Daniel Scavino Jr.
Mike Cernovich
DEPLORABLE TRUMPCAT
Fox News
Lou Dobbs
pro-Clinton
Number of Tweets Retweet volume
description
386
1
1
8
5
4
1
5
4
1
1,984,078 Official account
152,756 Twitter user
150,872 Tabloid TV show presenter
31,769 Running mate official account
29,885 Canadian journalist
29,557 Washington Post reporter
28,863 Civic activist
28,513 Democratic presidential candidate
25,300 Vice president
22,306 Twitter user
pro-Trump
Number of Tweets Retweet volume
description
251
48
22
22
29
15
25
14
14
9
2,117,249 Official account
106,796 Campaign strategist
102,242
Site that released Clinton emails
63,611 Trump's son
60,460 Right-leaning journalist
46,300 Campaign strategist
37,317
29,381 Twitter user
28,706 Right-leaning media
22,752
Lawyer and author
Fox News anchor
Table 2: Most retweeted accounts supporting the two candidates for October
Account
Hillary Clinton
Stephen King
Bailey Disler
Kat Combs
Es un racista
Erin Ruberry
Senator Tim Kaine
Richard Hine
billy eichner
Jeb Bush
Account
Donald J. Trump
WikiLeaks
Kellyanne Conway
Official Team Trump
Mike Pence
Dan Scavino Jr.
Paul Joseph Watson
Jared Wyand
Rob Fee
Donald Trump Jr.
Number of Tweets Retweet volume
description
pro-Clinton
246
2
1
1
1
1
12
1
2
1
1987701 Official account
Famous author
135744
124322 Twitter user
105118 Twitter user
102063 Twitter user
72167 Twitter user
68898 Running mate official account
66817 Marketing executive
66761 Comedian and actor
64545 Republican politician
Number of Tweets Retweet volume
description
pro-Trump
366
66
60
30
36
45
40
20
1
18
4930413 Official account
Site that released Clinton emails
758814
271857 Campaign strategist
233680 Trump campaing
216982 Running mate official account
200315 Campaign strategist
189277 Right leaning journalist
110943
Self proclaimed nationalist
99401 Comedian
77036 Trump's son
Table 3: Top retweeted tweets supporting each candidate for September 2016.
Most retweeted pro-Clinton Tweets
Author
Ozzyonc
Date Tweet
9/15 Donald Trump said pregnancy is very inconvenient for businesses like his mother's
Count
152,756
Jerry Springer
Hillary Clinton
pregnancy hasn't been inconvenient for the whole world.
9/27 Hillary Clinton belongs in the White House. Donald Trump belongs on my show.
9/27 RT this if you re proud to be standing with Hillary tonight. #debatenight
Hillary Clinton
Hillary Clinton
9/27
9/10
never
said
https://t.co/91tBmKxVMs
I
https://t.co/6T8qV2HCbL
Except for African Americans Muslims Latinos immigrants women veterans – and
any so-called losers or dummies. https://t.co/rbBg2rXZdm
– Donald Trump who
that. #debatenight
that.
said
Most retweeted pro-Trump Tweets
Author
Donald J. Trump
Donald J. Trump
Donald J. Trump
Donald J. Trump
Donald J. Trump
Date Tweet
9/24
If dopey Mark Cuban of failed Benefactor fame wants to sit in the front row perhaps
I will put Gennifer Flowers right alongside of him
!
9/20 Hillary Clinton is taking the day off again she needs the rest. Sleep well Hillary -
see you at the debate!
9/01 Mexico will pay for the wall!
9/27 Nothing on emails. Nothing on the corrupt Clinton Foundation. And nothing on
#Benghazi. #Debates2016 #debatenight
9/10 While Hillary said horrible things about my supporters and while many of her
supporters will never vote for me I still respect them all!
150,872
72,443
72,111
50,913
Count
30,950
30,900
30,464
27,177
25,882
Table 4: Top retweeted tweets supporting each candidate for October 2016.
Most retweeted pro-Clinton Tweets
Author
Bailey Disler
Date
10/26 Good morning everyone especially the person who destroyed Donald Trump's walk
Tweet
Count
124,322
of fame star https://t.co/IcBthxMPd9
Stephen King
10/21 My newest horror story: Once upon a time there was a man named Donald Trump
121,635
Kat Combs
Es un racista
and he ran for president. Some people wanted him to win.
10/10 Trump writing a term paper: Sources Cited: 1. You Know It 2. I know It 3. Every-
body Knows It
10/08 Anna for you to sit here call Trump a racist is outrageous Anna: OH?! Well lemme
105,118
102,063
Rob Fee
10/08 How are so many people JUST NOW offended by Trump? It s like getting to the
99,401
do it again in 2 languages! https://t.co/nq4DO7bN7J
7th Harry Potter book realizing Voldemort might be a bad guy.
Most retweeted pro-Trump Tweets
Author
Donald J. Trump
WikiLeaks
Tweet
Date
10/08 Here is my statement. https://t.co/WAZiGoQqMQ
10/14 Democrats prepared fake Trump grope under the meeting table Craigslist employ-
Count
52,887
45,348
WikiLeaks
10/03 Hillary Clinton on Assange Can't we
ment advertisement in May 2016 https://t.co/JM9JMeLYet
just drone
https://t.co/S7tPrl2QCZ https://t.co/qy2EQBa48y
this
guy –
report
45,233
Mike Pence
10/10 Congrats to my running mate @realDonaldTrump on a big debate win! Proud to
42,178
Donald J. Trump
stand with you as we #MAGA.
10/08 The media and establishment want me out of the race so badly - I WILL NEVER
DROP OUT OF THE RACE WILL NEVER LET MY SUPPORTERS DOWN!
#MAGA
41,386
|
1410.7143 | 2 | 1410 | 2016-11-07T17:42:52 | Prediction of "Forwarding Whom" Behavior in Information Diffusion | [
"cs.SI",
"physics.soc-ph"
] | Follow-ship network among users underlies the diffusion dynamics of messages on online social networks. Generally, the structure of underlying social network determines the visibility of messages and the diffusion process. In this paper, we study forwarding behavior of individuals, taking Sina Weibo as an example. We investigate multiple exposures in information diffusion and the "forwarding whom" problem associated with multiple exposures. Finally, we model and predict the "forwarding whom" behavior of individuals, combining structural, temporal, historical, and content features. Experimental results demonstrate that our method achieves a high accuracy 91.3%. | cs.SI | cs | ISSN 1673-9418 CODEN JKYTA8
Journal of Frontiers of Computer Science and Technology
1673-9418/2016/10(11)-1524-08
doi: 10.3778/j.issn.1673-9418.1509083
E-mail: [email protected]
http://www.ceaj.org
Tel: +86-10-89056056
*
鲍 鹏 1,2,沈华伟 1+,程学旗 1
1. 中国科学院 计算技术研究所,北京 100190
2. 北京交通大学 软件学院,北京 100044
Prediction of Forwarding Whom Behavior in Information Diffusion
BAO Peng1,2, SHEN Huawei1+, CHENG Xueqi1
1. Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China
2. School of Software Engineering, Beijing Jiaotong University, Beijing 100044, China
+ Corresponding author: E-mail: [email protected]
BAO Peng, SHEN Huawei, CHENG Xueqi. Prediction of
sion. Journal of Frontiers of Computer Science and Technology, 2016, 10(11) 1524-1531.
forwarding whom behavior in information diffu-
Abstract: On online social networks, follow- ship network among users underlies the diffusion dynamics of messages;
meanwhile, the structure of underlying social network determines the visibility of messages and forwarding activities
in the diffusion process. Taking SinaWeibo as an example, this paper focuses on multiple exposure phenomena in
information diffusion, and investigates the patterns and regularities of users
forwarding behavior among multiple
exposures combined with the structure of follow-ship network. This paper analyzes the"forwarding whom"prob-
lem of users among multiple exposures in information diffusion, aiming to model and predict the forwarding behav-
ior of individuals, combining content features, network structure, temporal and historical information. The experi-
mental results demonstrate that the new method achieves a high accuracy of 91.3%.
Key words: online social network; information diffusion; multiple exposures; forwarding whom
在线社会关系网络中,用户之间的关注关系网络承载着上层的信息传播,关注关系网络的结构影响着
* The National Natural Science Foundation of China under Grant Nos. 61472400, 61232010, 61174152 (国家自然科学基金); the
National Basic Research Program of China under Grant Nos. 2014CB340401, 2013CB329606 (国家重点基础研究发展计划(973 计
划)); the Fundamental Research Funds for the Central Universities of China under Grant No. 2015RC031 (中央高校基本科研业务费
专项资金).
Received 2015-09, Accepted 2015-12.
CNKI 网络优先出版: 2015-12-14, http://www.cnki.net/kcms/detail/11.5602.TP.20151214.1644.002.html
鲍 鹏 等:信息传播中的用户转发选择预测
1525
消息的可见度,并影响着信息传播过程的转发选择。以新浪微博为例,围绕信息传播中的多次暴露现象展开
研究,结合用户关注关系网络的结构,探索信息传播过程中多次暴露情形下用户转发选择行为的模式和规
律。针对信息传播中用户在多个暴露源下的转发选择预测问题,融合消息内容、网络结构、时序和交互历史等
多方面因素,建模和预测用户转发选择。实验结果表明,新方法的预测准确率高达 91.3%。
在线社会关系网络;信息传播;多次暴露;转发选择
A
TP391
1
随着信息技术的高速发展,当今人们正逐步迈
进一个全新的网络化、数字化、虚拟化的工作和生活
环境。越来越多的网民通过网络获取信息,并参与
到信息的生成过程中,进而不断地促进网络的社会
化。在用户群体规模飞速增长的同时,人们的信息
需求和参与网络的方式也不断发生着变化。近年
来,社交网站和社会媒体等在线社会关系网络逐渐
成为互联网服务和应用的主流,典型代表包括 Face-
book、Twitter、微博等。这些在线社会关系网络中,人
的互联和信息互联高度融合,人人参与到信息的产
生与传播过程,人们信息传播和信息共享的诉求得
到了极大程度的满足,并获得了前所未有的信息自
主权。同时,大量的用户信息也带来了诸如信息过
载、内容碎片化等问题,给学术研究和产业应用带来
了新的挑战。因此,深入分析在线社会关系网络,建
模和预测个体的行为具有重要意义。
在很长的一段历史时期内,由于难以获得大规
模数据以提供稳定统计,信息传播和人类行为预测
的研究主要局限于统计物理、社会学、认知学、心理
学、行为学等学科的小规模样本分析。然而,对于小
样本的研究分析结果的稳定性和代表性的质疑从未
间断过。作为衔接人类社会与网络空间的纽带,在
线社会关系网络汇聚了大量可感知、可计算的网络
数据。这类网络数据详细记录了用户之间的网络结
构以及用户产生信息的传播轨迹,这些人类活动的
真实记录为研究在线社会关系网络上的信息传播以
及个体行为提供了宝贵的数据资源和难得的机遇。
在国内外学术界和产业界,利用在线社会关系上的在
线行为数据研究人类行为逐渐成为关注的热点[1-2]。
在信息传播过程中,个人行为存在很强的随机
性和自发性,不同的个体具有各异的行为模式,个体
在参与信息传播时会采取不同的决策模式,使得个
体传播行为呈现出差异性和不确定性。Barabási[3]发
表在 Nature 的论文分析了人类行为的时间间隔,指出
人类行为具有阵发性(burst),并给出了一种基于优
先级的排队模型来解释该现象,从此拉开了人类动
力学研究的序幕。Song 等人[4]基于大量手机用户的
通话记录,挖掘了单个用户的移动行为模式,其研究
结果表明,用户的位置移动具有高达 93%的可预测
性。Katz[5]在社会学中提出了"两级传播"理论,强调
了具有高影响力的"意见领袖"在行为传播中起着重
要的作用。Wu 等人[6]对 Twitter 全网数据进行了实证
研究,并发现不同类型用户在行为周期上具有多样
性。Liben-Nowell 等人[7]利用大量互联网连环信的轨
迹,发现连环信的传播树展现出窄而深的树状结
构。Leskovec 等人[8]发现,在社交网络上商品的口口
相传推荐中,人与人之间的影响力会对推荐结果起
到影响。Yang 等人[9]分析了消息传播过程中的时序
性特征,将消息传播过程聚类成 6 种常见类型,为理
解社交网络上的用户行为提供了一些启发。Suh 等
人[10]在大规模社交网络数据上分析了影响个体转发
行为的因素,发现消息自身的 URL 和 Hashtag 对于预
测个体的转发行为具有重要指示作用。Romero等人[11]
提出了粘着力(stickness)和持久力(persistence)两个
重要概念,分析不同领域内的 Hashtag 在 Twitter 上的
传播过程。Myers 等人[12]发现社交网络外部因素是
造成信息扩散不可预测性的一个重要因素,融合了
外部因素后的个体行为建模可以显著地提高信息扩
散的预测准确性。Macskassy 等人[13]从另外一个角度
研究了 Twitter 上用户的转发行为,他们发现反同质
性在个体转发行为上起到重要作用。Aral 等人[14]认
1526
Journal of Frontiers of Computer Science and Technology 计算机科学与探索
2016, 10(11)
为用户自身属性中不仅具有影响力,还有易受影响
程度,进而从接受和影响两个角度对用户行为进行
建模和预测。Bao 等人[15-17]研究了微观结构和时序信
息对个体转发行为的影响,从而更好地预测消息未
来的流行度。Ugander 等人[18]对信息传播的微观机制
做了更深入的研究,发现个体受感染的概率不是由
该个体的接触邻居个数决定的,而是由其接触邻居
的连通分支个数决定的。
综上所述,在线社会关系网络中信息传播的基
本规律目前尚未得到深刻理解和充分掌握,关于个
体行为建模和预测的工作主要针对用户面对一条消
息仅一次暴露的简单传播场景。本文将以新浪微博
(http://weibo.com)为例,研究信息传播过程中的多次
暴露现象(即消息在传播过程中暴露于一个用户多
次),并建模和预测用户的转发选择行为。
2
2.1
微博是一种基于用户关系的信息分享、传播以
及获取平台,用户可以通过 Web、WAP 等各种客户端
组建个人社区,以不超过 140 字的文字更新信息,并
实现即时分享。根据 CNNIC 关于中国社交类应用用
户行为研究报告的统计(http://www.cnnic.net.cn/hlw-
fzyj/hlwxzbg/201408/P020140822379356612744.pdf),
在 2014 年上半年中,43.6%的网民使用过微博,其中
使用过新浪微博的网民比例最高。80.3%的新浪微
博用户通过新浪微博关注新闻/热点话题,新浪微博
已经成为人们了解热点信息的主要渠道之一,也是
在线社会关系网络中信息传播研究的代表性场景。
本文使用的数据集是第 13 届在线信息系统工程
会议(Web information system engineering,WISE)所
发布的新浪微博数据集(http://www.wise2012.cs.ucy.
ac.cy/challenge.html)。该数据集不仅包含 5 800 多万
的用户和他们之间所形成的 2 亿 7 000 多万条关注关
系,而且包括从 2009 年 8 月至 2012 年 1 月期间这些
用户发布的消息及其完整的传播轨迹,其中还包括
消息的主要内容属性(如是否包含嵌入式 URL、相关
热点事件关键词等)。
2.2
在新浪微博中,用户与用户之间存在着"关注"
和"被关注"的关系,形成了一个关注关系网络(rela-
tionship network)。用户发出的消息(文中用户发出
的消息均包括原发和转发两种消息类型)正是沿着
该网络的结构被其关注者看到并传播开的。因此,
关注关系网络的结构是其上信息传播的基础,不仅
影响着消息的传播,同时也会受其作用而动态演
化。随着网络中的连边越来越稠密,信息传播过程
也会产生一些复杂的现象。
本文首先定义并探索了信息传播过程中消息的
"暴露"(exposure)现象。当一条消息被用户发出后,
该用户的所有关注者都会看到这条消息,则称消息
暴露于该用户的关注者一次。如图 1 所示,一条消息
在传播过程中,先后于 t1 时刻被用户 Bob 转发,t2 时
刻被用户 Jim 转发。在关注关系网络中,由于用户
Allen 同时关注了 Bob 和 Jim 两人,该消息将会两次暴
露给 Allen。这就是本文所研究的信息传播中的多次
暴露现象。为了探索真实信息传播过程中,消息多
次暴露现象是否存在,本文利用消息的传播轨迹,结
合关注关系网络,统计信息传播过程中消息暴露于
用户的次数分布,如图 2 所示。
Fig.1 Multiple exposure in information diffusion
1
3
本文首先提出信息传播中的用户转发选择预测
问题,并对其进行形式化。然后从内容、结构、时序、
鲍 鹏 等:信息传播中的用户转发选择预测
1527
外,消息当前的流行度也会对用户转发选择行为起
一定的指示作用。例如对于那些被人们大量转发的
热门消息,用户更愿意转发消息源或者较为权威的
暴露源。
3.2.2
首先考察两个暴露源之间的结构特征。在图 3
中,Allen 所面临的一个暴露源为 Bob,另一个暴露源
为 Jim。在有向关注关系网络中,Bob 与 Jim 之间存
在着 3 种可能的关注关系:(1)Bob 与 Jim 之间互不关
注;(2)Bob 与 Jim 之间为单向关注关系,即 Bob 关注
Jim 或 者 Jim 关 注 Bob;(3)Bob 与 Jim 之 间 互 相 关
注。根据 Bao 等人[15]对信息传播中结构基序的研究,
可以知道两个暴露源之间的关注关系是影响用户转
发行为的一个重要因素。其次,入度是衡量用户影
响力和可信度的一个重要因素,因此用户往往更愿
意转发一个高入度的暴露源。信息传播过程中,消
息的源头往往更容易受到人们的关注,因此暴露源
是否为消息的原发者,是一个重要的特征。此外,由
于互惠边对于信息传播也有着重要的作用[19],暴露源
是否也关注了当前用户 Allen 也是一个重要因素。
3.2.3
除了结构特征外,用户的转发选择行为还会受
到时序信息的影响[10]。例如如果两次转发行为时间
间隔过大,用户很有可能并未看到第一次暴露源,因
此转发时间间隔是影响用户转发选择行为的一个因
素。此外,如果一个消息是在系统不活跃时间段
(如深夜)发出的,当用户第二天登录系统时,之前
进行过转发的暴露源很有可能不会被用户看到,因
此消息的原发时间也是一个重要因素。本文主要考
察三方面因素:(1)两个暴露源之间的转发时间间
隔;(2)消息传播过程中的平均转发时间间隔;(3)消
息的原发时间。
3.2.4
用户之间的交互历史体现了用户之间的亲密程
度以及用户一段时间内的关注兴趣,因此也会对用
户的转发选择行为起到一定的影响[6,20]。本文利用当
前用户是否转发过暴露源来表示用户之间的交互历史。
根据上述影响因素的分析,本文主要从消息内
容、消息暴露源的结构、时序以及交互历史四方面提
Fig.2 Statistics of multiple exposure
2
交互历史四方面挖掘影响因素。最后建模和预测了用
户的转发选择行为,并设计实验对其进行验证和分析。
3.1
本文针对消息两次暴露于用户并被其转发的情形,
将用户转发选择预测问题形式化成一个二分类问题。
图 3 为用户转发选择预测问题示例,具体阐述如下。
Fig.3 An example of
forwarding whom problem
3
3.2
3.2.1
消息内容信息对于信息传播具有重要的影响。
一个直观的认识是:一条富含信息量的消息,更容易
引起人们的关注和转发,而且每个人也有不同话题
粒度的影响力和易受影响程度[11]。结合微博短文本
内容自身的特点,已有研究结论表明,消息内容中是
否包含嵌入式 URL,消息是否与热点事件相关最能
表达消息的内容属性,并影响用户的传播行为[15]。此
1528
Journal of Frontiers of Computer Science and Technology 计算机科学与探索
2016, 10(11)
取特征,用于模型的训练与预测。详细的特征选择
及其描述如表 1 所示。
4
4.1
本文在数据集中选取 2011 年 7 月和 8 月的数据
分别作为训练集和测试集,抽取出所有用户两次暴
露于消息并最终转发的例子。最终,训练集包含
10 390 个例子,测试集包含 11 041 个例子。依据表 1
进行特征提取后,选择机器学习中经典的二分类模
型--逻辑回归(logistic regression)模型来预测用户
的转发选择行为。
文中二分类因变量 y 的取值有两种可能(0 和
=1
表示 Allen 会转发暴露源 Jim,
=0
1)。以图 3 为例,y
=1
,
,…,
表示 Allen 不会转发暴露源 Jim。设结果 y
x1
p 。假设 x1
概率为 p ,y
的概率则为
1-
=0
的
y
x
m
表示结果为 y 的 m 个影响因素。本文实验中 m 对应
=1
的概率为:
表1的特征编号,用逻辑回归公式表示 y
=
p
1
β1x1+
β0+
, …,
1+e-(
,
,
β2
β1
式中,β0
β2x2+…+
)
β
x
m
m
β
m
是模型的参数,即回归系数。
本文采用极大似然法进行回归系数的估计。假
,其对数
y
, …,
,
设有 n 个观测样本,其观测值为 y1
y2
似然函数如下所示:
+…+
]}
=∑
=
+
n {
1
ln[1+e β0+
β1x1
β1x1+
β2x2+…+
β2x2
ln
+
β0
(
L
β
y
i
i
)-
x
m
m
n
β
x
m
m
实验中使用准确率(Precision)、召回率(Recall)
及 F 值为指标对模型预测结果做出评价,其计算方
法如下所示:
Precision
预测
且预测正确的样本总数
将转发
Jim
Allen
Jim
将转发
的样本总数
Recall
预测
Jim
将转发
Allen
Jim
且预测正确的样本总数
实际
转发
的样本总数
=
Allen
=
Allen
预测
Table 1 Features list
1
特征描述
消息是否包含嵌入式 URL
消息是否与热点事件相关
消息当前流行度
(用消息被转发的次数来度量)
Bob 是否关注了 Jim
Jim 是否关注了 Bob
Bob 是否关注了 Allen
Jim 是否关注了 Allen
Jim 的入度是否大于 Bob
Jim 的入度是否大于 Allen
Bob 的入度是否大于 Allen
Bob 是否为消息的原发者
Bob 和 Jim 转发时间间隔(小时)
之前连续转发的平均时间差(小时)
取值
1 表示"是",0 表示"否"
1 表示"是",0 表示"否"
0 表示流行度介于 0~10
1 表示流行度介于 10~100
2 表示流行度介于 100~1 000
3 表示流行度介于 1 000~10 000
4 表示流行度大于 10 000
1 表示"是",0 表示"否"
1 表示"是",0 表示"否"
1 表示"是",0 表示"否"
1 表示"是",0 表示"否"
1 表示"是",0 表示"否"
1 表示"是",0 表示"否"
1 表示"是",0 表示"否"
1 表示"是",0 表示"否"
实数
实数
消息原发时间是否在活跃时间段(10 am-10 pm)
Allen 是否曾转发过 Bob 发出的消息
Allen 是否曾转发过 Jim 发出的消息
1 表示"是",0 表示"否"
1 表示"是",0 表示"否"
1 表示"是",0 表示"否"
特征类型
编号
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
内容特征
结构特征
时序特征
交互历史
鲍 鹏 等:信息传播中的用户转发选择预测
1529
= 2
F值
4.2
+
× Precision × Recall
Precision
Recall
本节重点考察模型的预测性能以及各类特征对
于模型预测能力的重要性,实验结果如表 2 所示。可
以发现在融合本文所提取的四方面特征后,模型的
预测准确率高达 91.3%,远远高于随机猜测的 50%,
从而很好地预测了用户的转发选择行为。
Table 2 Experimental results
2
方法
Our method
Without content features
Without structural features
Without temporal features
Without history features
Precision
0.913
0.814
0.618
0.901
0.887
Recall
0.772
0.631
0.576
0.769
0.782
F 值
0.837
0.711
0.596
0.830
0.831
为了研究各类特征对于模型预测能力的重要
性,本文通过移除相应类别特征的方法,来考察其对
模型预测性能的影响。实验结果表明,移除内容特
征后,F 值从 83.7%下降到 71.1%。因此,内容特征对
于用户转发选择预测具有指示作用。在移除结构特
征后,F 值更是下降到 59.6%。由此可见用户之间的
结构特征,对于用户转发选择行为具有重要的指示
作用。而在分别移除简单时序特征和交互历史特征
后,模型预测性能并没有显著的下降,由此判断,这
两类信息对于用户的转发选择行为的影响较小。
本文将模型训练所得参数列于表 3 中,从而可以
更为清晰地看出各个特征所起的作用。例如特征 11
(表示 Bob 是否为消息的原发者)与 Allen 转发暴露源
Jim 的概率呈负相关,即当 Bob 为消息的原发者时,
Allen 更倾向于转发暴露源 Bob 而不是 Jim。再比如
特征 8(表示 Jim 的入度是否大于 Bob)与 Allen 转发
暴露源 Jim 的概率呈正相关,即当 Jim 的入度大于
Bob 时,Allen 更倾向于转发入度大的暴露源 Jim 而不
是 Bob。
Table 3 Feature coefficients
3
特征编号
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
模型参数
β1
β2
β3
β4
β5
β6
β7
β8
β9
β10
β11
β12
β13
β14
β15
β16
系数-
-
-
0.142
0.014
0.086
0.042
0.014
0.004
0.012
0.213
0.135
0.106
0.246
0.068
0.003
0.017
0.014
0.057
-
-
-
-
露情形下用户转发选择行为的基本规律。针对用户
在多个消息暴露源下的转发选择预测问题,融合了
消息内容、暴露源的结构、时序以及交互历史等多方
面因素,建模和预测了个体的转发选择行为。实验
结果表明,在融合上述特征后,模型的预测准确率高
达 91.3%,其中结构特征和内容特征对于用户转发选
择行为具有重要的指示作用。
本文后续研究方向包括量化用户之间话题层面
的影响力和易受影响程度,探索和建模系统外部事
件对用户转发行为的影响,并结合多次暴露对于用
户转发行为所带来的累积效应,提出了一个用户转
发行为预测的概率模型框架。此外,本文后续还将
研究个体的转发选择行为与消息流行度及其动态过
程之间的关联关系,利用消息早期的扩散信息,通过
对微观个体行为的建模,来预测消息的未来流行
度。为了进一步验证本文的泛化能力和适用场景,
未来还将在多个语料集上进行方法的验证和扩展。
5
本文以新浪微博为场景,围绕信息传播中的多
次暴露现象展开研究,探索信息传播过程中多次暴
References:
[1] Lazer D, Pentland A, Adamic L, et al. Computation social
science[J]. Science, 2009, 323(5915): 721-724.
1530
Journal of Frontiers of Computer Science and Technology 计算机科学与探索
2016, 10(11)
[2] Li Deyi, Zhang Tianlei, Huang Liwei. A down-to-earth cloud
the 18th ACM SIGKDD Conference on Knowledge Discov-
computing: location- based service[J]. Chinese Journal of
ery and Data Mining, Beijing, Aug 12-16, 2012. New York:
Electronics, 2014, 42(4): 786-790.
ACM, 2012: 33-41.
[3] Barabási A-L. The origin of bursts and heavy tails in human
[13] Macskassy S A, Michelson M. Why do people Retweet? anti-
dynamics[J]. Nature, 2005, 435: 207-211.
homophily wins the day![C]//Proceedings of the 5th Inter-
[4] Song Chaoming, Qu Zehui, Blumm N, et al. Limits of pre-
national Conference on Weblogs and Social Media, Barce-
dictability in human mobility[J]. Science, 2010, 327(5968):
lona, Spain, Jul 17-21, 2011. Palo Alto, USA: AAAI, 2011:
1018-1021.
209-216.
[5] Katz E. The two-step flow of communication: an up-to-date
[14] Aral S, Walker D. Identifying influential and susceptible
report on a hypothesis[J]. Public Opinion Quarterly, 1957,
members of social networks[J]. Science, 2012, 337(6092):
21(1): 61-78.
337-341.
[6] Wu Shaomei, Hofman J M, Mason W A, et al. Who says
what to whom on Twitter[C]//Proceedings of the 20th Inter-
national Conference on World Wide Web, Hyderabad, In-
dia, Mar 28-Apr 1, 2011. New York: ACM, 2011: 705-714.
[7] Liben-Nowell D, Kleinberg J. Tracing information flow on
a global scale using Internet chain-letter data[J]. Proceedings
of the National Academy of Sciences of the United States
of America, 2008, 105(12): 4633-4638.
[8] Leskovec J, Adamic L, Huberman B. The dynamics of viral
marketing[J]. ACM Transactions on the We b, 2007, 1(1):
1-28.
[9] Yang J, Leskovec J. Patterns of temporal variation in online
media[C]//Proceedings of the 4th ACM International Con-
ference on Web Search and Data Mining, Hong Kong, China,
Feb 9-12, 2011. New York: ACM, 2011: 177-186.
[10] Suh B, Hong Lichan, Pirolli P, et al. Want to be retweeted?
Large scale analytics on factors impacting retweet in Twitter
network[C]//Proceedings of the 2010 IEEE 2nd International
Conference on Social Computing, Minneapolis, USA, Aug 20-
22, 2010. Piscataway, USA: IEEE, 2010: 177-184.
[11] Romero D M, Meeder B, Kleinberg J. Differences in the
mechanics of information diffusion across topics: idioms,
political hashtags, and complex contagion on Twitter[C]//
Proceedings of the 20th International Conference on World
Wide Web, Hyderabad, India, Mar 28-Apr 1, 2011. New York:
ACM, 2011: 695-704.
[15] Bao Peng, Shen Huawei, Chen Wei, et al. Cumulative effect
in information diffusion: empirical study on a microblogging
network[J]. PLoS ONE, 2013, 8(10): e76027.
[16] Bao Peng, Shen Huawei, Huang Junming, et al. Popularity
prediction in microblogging network: a cxase study on Sina-
weibo[C]//Proceedings of the 22nd International Confer-
ence on World Wide Web, Rio de Janeiro, Brazil, Apr 7-11,
2013. New York: ACM, 2013: 177-178.
[17] Bao Peng, Shen Huawei, Jin Xiaolong, et al. Modeling and
predicting popularity dynamics of microblogs using self-
excited Hawkes processes[C]//Proceedings of the 24th Inter-
national Conference on World Wide Web, Florence, Italy,
Mar 18-22, 2015. New York: ACM, 2015: 9-10.
[18] Ugander J, Backstrom L, Marlow C, et al. Structural diversity
in social contagion[J]. Proceedings of the National Acade-
my of Sciences of the United States of America, 2012, 109
(16): 5962-5966.
[19] Zhu Yuxiao, Zhang Xiaoguang, Sun Guiquan, et al. Influ-
ence of reciprocal links in social networks[J]. PLoS ONE,
2014, 9(7): e103007.
[20] Huang Junming, Li Chao, Wang Wenqiang, et al. Temporal
scaling in information propagation[J]. Scientific Reports,
2014, 4: 5334.
[12] Myers S A, Zhu Chenguang, Leskovec J. Information diffu-
[2] 李德毅, 张天雷, 黄立威. 位置服务: 接地气的云计算[J].
sion and external influence in networks[C]//Proceedings of
电子学报, 2014, 42(4): 786-790.
鲍 鹏 等:信息传播中的用户转发选择预测
1531
BAO Peng was born in 1987. He received the Ph.D. degree in computer science from Institute of Computing Tech-
nology, Chinese Academy of Sciences in 2015. Now he is an assistant professor and M.S. supervisor at Beijing Jiao-
tong University. His research interests include social media analytics, information propagation and network science.
鲍鹏(1987-),男,安徽六安人,2015 年于中国科学院计算技术研究所获得博士学位,现为北京交通大学讲
师、硕士生导师,主要研究领域为社会媒体分析,信息传播,网络科学。作为科研骨干参与了 863 课题、973 课
题和国家自然科学基金等重要科研任务。
SHEN Huawei was born in 1982. He received the Ph.D. degree in computer science from Institute of Computing
Technology, Chinese Academy of Sciences in 2010. Now he is an associate professor and M.S. supervisor at Insti-
tute of Computing Technology, Chinese Academy of Sciences. His research interests include social media analytics,
information propagation and network science.
沈华伟(1982-),男,河南太康人,2010 年于中国科学院计算技术研究所获得博士学位,现为中国科学院计算
技术研究所副研究员、硕士生导师,主要研究领域为社会媒体分析,信息传播,网络科学。发表学术论文 60 余
篇,主持国家自然科学基金项目 3 项,并承担 863 课题和 973 课题等重要科研任务。
CHENG Xueqi was born in 1971. He received the Ph.D. degree in computer science from Institute of Computing
Technology, Chinese Academy of Sciences in 2006. Now he is a professor and Ph.D. supervisor at Institute of Com-
puting Technology, Chinese Academy of Sciences. His research interests include Web information retrieval, social
media analytics and network data science.
程学旗(1971-),男,安徽安庆人,2006 年于中国科学院计算技术研究所获得博士学位,现为中国科学院计算
技术研究所研究员、博士生导师,中国科学院网络数据科学与技术重点实验室主任,主要研究领域为网络信息
检索,社会媒体分析,网络数据科学。发表学术论文 100 余篇,主持 10 余项国家自然科学基金、973 课题、863
课题等重要科研项目,2014 年获国家杰出青年科学基金资助。
|
1704.01660 | 1 | 1704 | 2017-04-05T22:25:13 | The impact of random actions on opinion dynamics | [
"cs.SI",
"math.PR"
] | Opinion dynamics have fascinated researchers for centuries. The ability of societies to learn as well as the emergence of irrational {\it herding} are equally evident. The simplest example is that of agents that have to determine a binary action, under peer pressure coming from the decisions observed. By modifying several popular models for opinion dynamics so that agents internalize actions rather than smooth estimates of what other people think, we are able to prove that almost surely the actions final outcome remains random, even though actions can be consensual or polarized depending on the model. This is a theoretical confirmation that the mechanism that leads to the emergence of irrational herding behavior lies in the loss of nuanced information regarding the privately held beliefs behind the individuals decisions. | cs.SI | cs |
The impact of random actions on opinion dynamics
Amir Leshem∗and Anna Scaglione†
April 7, 2017
Abstract
Opinion dynamics have fascinated researchers for centuries. The
ability of societies to learn as well as the emergence of irrational herd-
ing are equally evident. The simplest example is that of agents that
have to determine a binary action, under peer pressure coming from
the decisions observed. By modifying several popular models for opin-
ion dynamics so that agents internalize actions rather than smooth
estimates of what other people think, we are able to prove that almost
surely the actions final outcome remains random, even though actions
can be consensual or polarized depending on the model. This is a the-
oretical confirmation that the mechanism that leads to the emergence
of irrational herding behavior lies in the loss of nuanced information
regarding the privately held beliefs behind the individuals decisions.
Mathematical models of herding phenomena prove the old saying that
actions speak louder than words. A classical result shows that sequential
Bayesian learners give rise to dysfunctional information cascades because of
the overwhelming effect of the actions that are observed. In this work we
demonstrate that a variety of popular opinion dynamics models, modified so
that the agents internalize the effect of random actions rather than smooth
estimates their peers beliefs, create herding, polarized groups or do not
converge to a fixed belief. Because of the generality of our analysis, our
work cements the notion that actions are poor representations of private
information and lead to unpredictable social herding phenomena.
There is a vast literature on the subject of opinion dynamics, aimed at
modeling how beliefs propagate across a social fabric. In the late 1700s [1]
∗Corresponding Author: Amir Leshem, Faculty of Engineering, Bar-Ilan University,
Ramat-Gan, 52900, Israel. Phone: +972-35317409. email: leshema@ biu.ac.il.
†Dept. of EE Arizona State University.
1
first noted that averaging individuals' beliefs would, by the law of large num-
bers, lead to a noise free average opinion and precise estimate in the limit [1],
a concept later popularized broadly in the early 1900's [2]. The models used
to derive these insights are very similar to the Bayesian multi-agent models
that are pervasive in signal processing [3, 4, 5]. While in signal processing
decision criteria are often based on minimizing the expected Bayesian risk,
in economics, the decision model of rational agents has been long modeled
as maximizing the expected utility in the Bayesian sense. Furthermore, a
substantial body of the economics literature assumes that agents reveal im-
perfectly their private beliefs through their utility maximizing action. The
seminal paper by Bikhchandani, Hirshleifer and Welch (BHW) [6] (see also
[7]) highlighted how pathologies, called informational cascades, seem to de-
velop when agents make a zero-one decisions (for example, zero is "bad"
and one is "good"), instead of averaging continuous values as in [2]. The
BHW paper highlights the significant impact of processing discrete actions,
as opposed to continuous belief values, on the final behavior of the group.
This impact leads to what is often referred to as herding behavior [8]. Other
opinion diffusions models and interactions of agents in social networks are
reviewed in e.g. [9, 10, 11, 12, 13, 14].
In the last forty years, a flurry of models for opinion dynamics has
emerged in the statistical physics literature [12], inspired by ideas aimed
at predicting macroscopic behavior that emerges from simple random par-
ticles interactions. Among them the voter model, introduced in [15], is one
of the simplest non-ergodic opinion diffusion models that leads to herding.
This more closely resemble the zero-one interactions in [6] since the agents
have two discrete opinions and copy at random one of their neighbors. This
model was later mapped onto that of random walkers that coalesce upon
encounter by Liggett [16, 17] which made it analytically tractable. An in-
teresting variant is the one introduced by Mobilia in [18] where, using a
mean-field approach, the author studied the effect of having stubborn agents
in the network that, by not changing their opinion, attempt to influence the
final equilibrium point. In recent work [19, 20, 21] re-examined this question
and analytically characterized its behavior by generalizing the approach in-
troduced by Liggett and providing a solution for the strategic placement of
stubborn agents in the voter model. Stubborn agents were also considered
by Jia et al. [22]
Sznajd and coauthors in [23] considered a different discrete opinion dy-
namic in which it takes two agents to convince their neighbors of the cor-
rectness of their opinion. By contrast, Galam in [24], proposed a variant in
which the opinions of the agents switched to the prevalent opinion (a ma-
2
jority rule) in their neighborhood. Since Sznajd dynamics are a special case
of the general sequential probabilistic model (GPM) in [25], only two differ-
ent phases are possible: either consensus, or coexistence of the two opinions
in equal proportions. Interestingly, in the presence of stubborn agents with
asynchronous updates, opinion fluctuations exist and convergence is not cer-
tain [26].
Continuous belief models and updates, even in the presence of non-
linearities (e.g. bounded confidence) are also a popular way to model so-
cial dynamics of opinions. A popular form is the Hegselmann-Krause (HK)
model (or the bounded confidence (BC) model) [27, 28], where opinions are
represented by a real number and are updated synchronously, by averaging
all the agents' opinions that differ by less than a confidence level (set to 1
in [28]). As long as the network is connected, the agents reach a consensus
[29] with the average belief in the network. A randomized variant of the HK
was introduced by DeGroot in [30] and studied in e.g.
[31, 32, 33, 34] in
which two randomly chosen neighbors meet and adjust their opinions only
when their opinion distance is below a threshold. These models lead either
to consensus or polarization, but opinions do converge.
Note that in the economics literature, due to the Bayesian update rule,
the agents have a continuous belief even if their action and decision variables
are discrete (the probability mass function of the decision variable given the
private information and history of the actions that were observed). Gener-
alizing the analysis in [6] to arbitrary social graphs is both intractable and
perhaps futile, given the ample evidence that social agents are not rational
[35].
In statistical physics the acronym CODA (continuous opinions discrete
actions) was coined much later in [36, 37]. This class of models follows the
general idea from economics of assuming that the agents internalize an es-
timate of the beliefs of the others obtained by observing their actions. But
contrary to the BHW model, CODA models postulate simple mechanisms of
opinion contagion, without offering significant detail on the interpretation of
the models and providing mostly numerical characterization of their asymp-
totic behavior. The strong guarantees and mathematical characterizations
of the limiting behavior is completely known only for the simple chain of
sequential interactions treated in [6].
Our main results is to offer strong theoretical guarantees that the same
emergent behavior of random herding in the BHW model holds more broadly.
Our work supports the argument that it is the discrete and random nature
of what the agents internalize about the beliefs held by their neighbors that
produces the formation of random herds, i.e. herds whose final decision out-
3
come that cannot be predicted with certainty and is, potentially, nefariously
wrong.
1 Consensus under the social pressure of actions
We assume each agent has only two options to chose from, and we label them
choice 0 and choice 1. Assume these choices are made by flipping a coin that
is biased by a belief variable xn(t), generating an action an(t) ∈ {0, 1}. For
each n, an(t) is a Bernoulli random variable with probability xn(t).
To capture the agents' tendency to conform to social norms, we assume
that the agents perturb their belief xn(t) by moving towards the weighted
mean of their neighbors actions. The agents update their belief as a convex
combination of the frequency of action 1 over their neighborhood and their
prior belief, i.e.:
xn(t + 1) = (1 − α)xn(t) + α(cid:80)N
k=1 wnkak(t)
(1)
We also require that(cid:80)
where wnk is a weight function corresponding to the relative weight that
agent n gives to the action of agent k if (n, k) is and edge and zero otherwise.
k wn,k = 1. We require that the matrix W defined
by: will be the transition matrix of an irreducible Markov chain but we
do not require wn,n = 0 since it might be that agent n is influenced by its
own action (even though it is random and determined by its internal belief
xn(t). Basic results from spectral graph theory show that this condition is
equivalent to having a network that has a single component, where we have
weighted edges between agents n, k whenever wn,k (cid:54)= 0. Note that xn(t) is
always an number in [0, 1] and assuming that not all xn(0) are identically 0 or
identically 1, we may assume without loss of generality that they are strictly
between 0 and 1 (since this will happen with probability 1 in finite time by
the averaging property). Introducing the vectors x(t) = (x1(t), . . . , xN (t))T
and a(t) = (a1(t), . . . , aN (t)) we note that:
E{a(t)x(t)} = x(t),
(2)
and
Cov{a(t)x(t)} = diag{v1(t), ..., vn(t)}
(3)
where vj(t) = xj(t)(1 − xj(t)) is the variance of agent j at time t. Further-
more,
P r (a(t) = ax(t)) =
n (t)(1 − xn(t))(1−an).
xan
(4)
N(cid:89)
n=1
4
The value of α determines the influence of the actions on the belief of each
agent1. Let us define also the matrix W which has elements wm,n and define
Wα = (1 − α)I + αW.
(5)
We note that for all 0 ≤ α ≤ 1 both W and Wα are stochastic matrices
with the same right and left eigenvectors, and spectral radius 1. Let π be
the left eigenvector of W corresponding to the largest eigenvalue 1 (nor-
malized such that 1T π = 1) and remember that the corresponding right
eigenvector is 1. By the Perron-Frobenius theorem we have π >> 0, i.e. all
its components are strictly positive. Denoting by
J (cid:44) 1πT ,
(6)
By standard theory of stochastic matrices for all α the spectral radius of
Wα − J 0 < ρ(Wα − J) < 1 and WαJ = J.
Introducing the vectors
x(t) = (x1(t), . . . , xN (t))T and a(t) = (a1(t), . . . , aN (t)), we can also note
that (1) can be written in vector form as follows:
x(t + 1) = (1 − α)x(t) + αWa(t)
(7)
From (7) it is straightforward to prove the following:
Lemma 1 In general E{x(t + 1)x(t)} = Wαx(t) and E{Jx(t + 1)x(t)} =
Jx(t).
The proof of the lemma is provided in the supplementary material. This
lemma clarifies the connection with the classic opinion dynamics model in-
troduced by DeGroot [30], which is identical to our model in expectation.
The weights in the matrix Wα in the DeGroot model typically areinterpreted
as being the trust individuals place on each other. The average dynamics are
also a classic example of the so called Average Consensus Gossiping (AGC)
algorithms [38]. For a connected network is well known that these dynamics
lead to consensus on the state. Note however (7) is not deterministic and
the fact that actions are discrete leads to very different dynamics than AGC
as the following lemma shows:
Lemma 2 The network has only two stationary states: x(t) = 1 and x(t) =
0.
1We assume that α is independent of n for notational simplicity, but all arguments go
through even when αn depends on the player.
5
Proof: It is clear that in both cases, x(t) = 0 or x(t) = 1, if we evaluate (4)
for x(t) = 0 P r (a(t) = 00) = 1 and x(t) = 1 P r (a(t) = 11) = 1. This
implies (7) leads to a fixed point x(t + 1) = x(t). Any other belief level will
place a non-zero probability in all a(t + 1) ∈ {0, 1}N therefore making it
possible to deviate from the previous belief for every α > 0.
Interestingly, the fact that there are stationary states, does not suffice
to prove that the beliefs indeed converge to the stationary states. This
convergence is the main result. Denote the expected value of x(t) by µx(t):
µx(t) = E{x(t)}.
(8)
Let the network weighted sample average of the beliefs according to the
stationary distribution π at time t be:
q(t) = πT x(t).
The next lemma leverages results in the AGC literature [38]:
Lemma 3 The expected value in (8) is such that
t→+∞ µx(t) = E{q(0)}1.
lim
(9)
(10)
The simple proof of this lemma is relegated to the supplementary material
for brevity. While this property is not surprising, what is interesting is the
following result:
Theorem 1 The mechanism in (1) leads to herding, i.e.
(cid:16)
∀n,
P r
t→∞ xn(t) ∈ {0, 1}(cid:17)
lim
= 1.
Moreover, the limit is identical to all agents, i.e., either all agents end up
with belief 0 or all of them end up with belief 1.
The first part of the proof of this lemma is similar to that used in [39] albeit
for a different opinion diffusion model to show that the process converges
to a random variable with probability 1. However, in contrast to [39], our
model leads to herding while their model leads almost surely to consensus
on the true value of the parameter. The second part resorts to the Lesbegue
dominated convergence theorem to prove that the limiting random variable
must be equal to either 0 or 1:
Proof: We know that the only stationary belief levels are x = 0 or x = 1,
since for every other vector there is a positive probability that the average
6
action will cause a deviation up to α, however, in contrast to the voter's
model this is insufficient, since when the initial state has all beliefs strictly
between 0 and 1, at any given stage the beliefs will be in the open interval
(0, 1) since they are convex combinations of the current belief with a num-
ber in [0, 1] and convergence is not achieved in finite time. Since W is a
stochastic matrix. Let q(t) = πT x(t) be the average belief level in the net-
work according to the stationary distribution of Wα. We will show that q(t)
is a martingale process with respect to the beliefs. To that end we observe
that:
q(t + 1) = πT x(t + 1) = πT [(1 − α)x(t) + (αW)a(t)] .
(11)
where a(t) is the action vector at times t. Computing the expectation of
both sides conditioned on x(t) we observe that:
E{q(t + 1)x(t)} = πT Wαx(t) = πT x(t) = q(t),
(12)
since π is a left eigenvector of Wα with an eigenvalue equal to 1 and by
the Perron-Frobenius theorem all its elements are strictly positive, since the
network is connected (which is equivalent to the Markov chain defined by
W is irreducible. This implies that q(t) is a martingale with respect to
the sigma-algebra determined by the sequence of beliefs x(t). By definition
q(t) is a bounded sequence, as the weighted mean of a vector with elements
between 0 and 1. By the martingale convergence theorem the sequence q(t)
must converge to a random variable q∞ with probability 1. We need to show
that q∞ is almost surely either 0 or 1,
Consider now for t > 1 the sequence ∆q(t) = q(t) − q(t − 1), i.e. the
martingale difference sequence. For each t by the martingale property,
E {∆q(t)} = 0.
(13)
Since π is a probability vector and for all n, t 0 ≤ xn(t) ≤ 1 we have that
for all n, t q(t) < 1 as well as ∆q(t) < 1. Therefore, by the almost sure
convergence of q(t)
which implies that also
lim
t→∞ var(∆q(t)) = 0, a.s.
t→∞ var(∆q(t)q(t − 1)) = 0, a.s.
lim
(14)
(15)
Similarly ∆q(t) < 1 and converges almost surely to 0. Hence by the Lesbegue
dominated convergence theorem ∆q(t) converges to 0 in the mean square
7
sense. If we express explicitly the conditional variance of ∆q(t)
var(∆q(t)q(t − 1)) = E(cid:8)∆q2(t)q(t − 1)(cid:9)
= α2(cid:80)N
= α2(cid:80)N
n=1 π2
n=1 π2
nvar(an(t))
nxn(t)(1 − xn(t)).
Since for all n, πn > 0 the MS convergence implies that
∀ n.
t→∞ xn(t)(1 − xn(t)) = 0
lim
Simple probabilistic computation shows that either for all n
lim
t→∞ xn(t) = 0 or
lim
t→∞ xn(t) = 1.
(16)
(17)
(18)
ends the proof of the main theorem.
In fact, if for some j, n which are connected, xn(t) converges to 1 while
xj(t) converges to 0, since the actions are independent, there will be with
probability 1 infinitely many deviations of at least min{Wn,k : wn,k (cid:54)= 0} of
both xn(t) and xj(t), contradicting the convergence of both xn(t) and xj(t).
This implies that herding must be achieved with probability 1, which
It should be noted that while the limit variables xn(∞) have values
0, 1, each initial condition has a different probability of converging to 0 or
1, which implies that what outcomes prevails, wrong or right, is random
and therefore social pressure can lead to umpredictable collective behavior,
in spite of the initial information the agents have available to forge their
opinion. We would like to determine its distribution given an initial value
or a distribution of initial values. The next corollary will show that xn(∞) is
a binomial random variable with mean q(0). This implies that the variance
of xn(∞) is q(0) (1 − q(0)). In fact, the combination of the lemma above
and the main theorem leads to the following corollary:
Corollary 1 Let x(0) be the agents' initial belief level vector. The prob-
ability that the agents herd to action an(t) = 1 is q(0) = 1T x(0), i.e.
limt→+∞ P r(xn(t) = 1) = q(0).
Proof: Since, as t → +∞, the network can only be in one of the two fixed
points x(t) = 1 or x(t) = 0, the probability that it will endup on one of
these two states is, as indicated in Lemma 3, equal to the average initial
belief.
Interestingly, no matter what the initial state is, we cannot predict the
outcome of the herding for sure. No matter how close the population belief
8
is to 0 or 1 initially, it is always possible that they will herd towards the op-
posite action. If it is indeed true that the social pressure mechanism is based
on internalizing the actions of one's peers, we cannot predict accurately the
outcome of the social dynamics. Applying this to market behavior, where
people favor one product over the other, this indicates a quality brand that
has high probability of capturing a large percentage of the market if indi-
viduals were to choose in isolation, may actually fail and other firms with
worse products have a fighting chance to capture it. Furthermore, we can see
that even in large markets driven only by the consumers repeated actions,
a winner takes all cascade eventually happens, and one product wins the
majority of the market share irrespective of the initial individual evidence
to the quality of the product. This may not always be the case however.
In the next section we generalize our analysis first to random interactions
and show the same type of herding phenomenon happens as well in that
context. We also show that when social pressure is mitigated by mistrust
for what deviates excessively from ones prior belief, then the society may
split in multiple herds.
1.1 Randomized interactions
A simple variation of our model is one that captures random interactions
among the agents. In this case (1) becomes
xn(t + 1) = (1 − α)xn(t) + α(cid:80)N
k=1 wnk(t)ak(t)
(19)
where the weights wnk(t) are non zero only for those individuals who ob-
serve and are affected by their peers actions in that particular epoch. We
assume wnk(t) are random processes independent from the actions the nodes
performed, which continue to be modeled as in the previous section. Cor-
respondingly, we can define the random matrices W(t) and Wα(t) as be-
fore.
Interestingly this variation of the model hardly changes the result
and random herding ensues also in this case almost surely. Let us now
assume that these random matrices are ergodic processes and denote by
W = E{W(t)}. If all nodes will speak infinitely often with peers and the
average W = E{W(t)} is a stochastic matrix with eigenvalue 1 with multi-
plicity 1, then we can easily generalize the proof of our main theorem, using
the same definition of π as before:
Corollary 2 The statement of Theorem 1 holds unchanged if the interac-
tions are random and W = E{W(t)}.
9
Proof:
In this case we define:
q(t) = πT x(t)
In this case, like before:
E{q(t + 1)x(t)} = πT Wαx(t) = πT x(t) = q(t),
(20)
(21)
but now the average is also with respect to the process W(t). Nonetheless
everything else from this point on follows the steps of the proof of Theorem
1.
2 Bounded confidence models
2.1 Bounded confidence under the influence of actions
An interesting generalization of our model is the update with bounded-
confidence, where the n'th agent updates happen only where the obser-
vations are sufficiently close to the agent own disposition. A natural option
is to analyze a model similar to the HK model proposed in [27] for continu-
ous opinion dynamics. In the HK model, agents mix their belief only with
agents whose belief sufficiently close to their own. In our case, agents update
their belief only if the empirical distribution of the actions of its neighbors
is sufficiently close to xn(t). We introduce the function:
ρ(x) = αxu(x ≤ τ )
(22)
in which the confidence threshold τ < 1 and u(x) is the Heaviside (i.e. the
unit step) function. The agent's update with bounded confidence in its
neighbors is modeled as:
xn(t + 1) = xn(t) + ρ
wnkak(t) − xn(t)
.
(23)
We note right away that ρ(0−0) = ρ(1−1) = 0, which implies that x(t) = 1
or x(t) = 0 are, once again fixed points. Let us denote by:
(cid:32) N(cid:88)
k=1
(cid:33)
(cid:12)(cid:12)(cid:12) > τ
(cid:33)
(cid:12)(cid:12)(cid:12)x(t)
(cid:32)(cid:12)(cid:12)(cid:12) N(cid:88)
k=1
Pn(x(t)) = P
wnkak(t) − xn(t)
Let:
αn(x(t)) = α(1 − Pn(x(t))).
10
(24)
(25)
We can define a matrix W(x(t)) in the same way as (5), except that we
replace α with a diagonal matrix with diagonal elements αn(x(t)).
It is
straightforward to see that
E{x(t + 1)x(t)} = W(x(t))x(t)
which are smooth non-linear dynamics equivalent to the HK model. In the
action-based HK dynamics a range of stationary beliefs are possible and, also
the beliefs may never converge even in distribution. In fact, next we provide
an example where the action-based HK model exhibits much more complex
behavior than the polarization phenomenon observed in the classical HK
model. Let us illustrate this fact with an example. Consider a network with
four nodes, with an initial beliefs vector x = (0, 0.45, 0.55, 1)T , a confidence
threshold τ = 0.25 and a mixing matrix:
0
W =
1
0
0.5
0.25 0.25
0
0
0
0
0.25 0.25
0.5
0
0
1
.
(26)
(27)
(28)
In this case the dynamics of the four nodes are as follows. For the first node:
(cid:26)x1(t)+αu(1−x1(t) ≤ τ )(1−x1(t)) a2(t) = 1
(cid:26)x1(t) = 0
x1(t)−αu(x1(t) ≤ τ )x1(t)
a2(t) = 1
(1−α)x1(t) = 0 a2(t) = 0
a2(t) = 0
x1(t + 1) =
=
and the reason why x1(t) = 0 is that we assumed that x1(0) = 0 and all
later values remain unchanged. Similarly, without giving a proof we can
show that x4(t) = 1 (just by symmetry 1 − x4(t) behaves like x1(t)). For
node number two, when update is activated, the node has a new state that
is a convex combination of x2(t) with either 0.25 or 0.5. Therefore:
(1 − α)x2(t) + α 0.25 ≤ x2(t + 1) ≤ (1 − α)x2(t) + α 0.5
(29)
and, since the node starts at x2(0) = 0.45, the subsequent values will have
to remain confined in the interval (0.25, 0.5). For similar reasons x3(t) will
remain in the interval (0.5, 0.75). However, they both will change randomly.
In fact, x2(t) will change due to a3(t) and viceversa x3(t) will change based
on a2(t). Therefore no convergence in distribution is attained and the opin-
ions will continue to fluctuate indefinitely in the intervals discussed above.
This is shown numerically in the next section in Fig. 4.
11
2.2 Reinforcement model with random pairwise interactions
We propose an alternative model for the update. We assume that if agents
n observe at random one of its neighbors, say the kth neighbor, make the
same decision, agent n will adjust the belief as follows:
xn(t + 1) = xn(t) + αδ[an(t) − ak(t)](an(t) − xn(t)),
(30)
where δ[x] is the Kronecker delta function.
We view this model as a mechanism that reinforces behavior, because it
tends to decrease or increase the belief based on the frequency with which
ones action is repeated in the neighborhood. In this case the only fixed points
for the dynamics x have integer entries, but unlike either (12) or (21), in this
case the network may never coalesce in taking a single action, but opposite
decisions may persist as well. The expectation of these dynamics given a
random pair (n, k) is:
E{xn(t + 1)x(t), (n, k)} = xn(t)[1 − α(1 − xn(t))(1 − xk(t))]
≤ xn(t).
(31)
Since this holds for each random choice of (n, k) we observe that from the
previous equations, taking the expectation also over the random choices of
(n, k) it is clear that the state is a sub-martingale:
E{xn(t + 1)x(t)} ≤ xn(t)
(32)
Next we prove the following lemma:
Theorem 2 The mechanism in (30) leads to
(cid:16)
∀n,
P r
t→∞ xn(t) ∈ {0, 1}(cid:17)
lim
= 1.
but not necessarily herding, which in turn means society will be polarized in
general.
Proof: The argument follows a similar line of reasoning as our previous
theorem. Because of the dominated convergence theorem the state xn(t)
must converge in the mean square sense. We can see then that the sequence
ynk(t) = αδ[an(t)− ak(t)](an(t)− xn(t)) must go to zero in the mean square
sense, because each pair is selected at random infinitely often. This can
happen in only two cases, either the conditional variance of an(t) − xn(t)
goes to zero or δ[an(t) − ak(t)] = 0 with probability one. If we assume the
12
first is not true, then the second implies that the independent actions of the
random pair of agents are the same, which can only be if they have equal
probability xn(t) = xk(t) ∈ {0, 1}; while this cannot happen in finite time
If this does not happen then the variance of
it can happen at the limit.
an(t) in the limit must be zero which again implies that in the limit the
probability converges to either 1 or 0. Both lead to the same conclusion,
which proves the theorem.
3 Simulated experiments
3.1 Consensus under the social pressure of actions
To demonstrate the herding and clustering phenomenon we proved to be
true in Section 1, we performed several Monte-Carlo trials.
In the first
experiments we randomly picked a random sample graph shown in Figure
1.
Figure 1: The random graph used for simulations.
Then we picked randomly 5000 initial vectors x(0) whose entries are
independent and drawn to have a mean ∀ n E{xn(0)} = p0 varying from 0.2
to 0.8 and chose uniform weights wkn = 1/deg(k), where deg(k) denotes the
degree of node k (the graph is undirected).
Figure 2 shows the histogram of the limit for various random realizations
13
-2-1.5-1-0.500.511.52-2.5-2-1.5-1-0.500.511.522.512345678910Figure 2: Histograms of the final belief for p0 = 0.2 and p0 = 0.6.
of the process for initial belief levels of p0 = 0.2, 0.6. Figure 3 shows clearly
that the actions are Bernoulli random variables whose parameter is correctly
predicted by the theorem.
3.2 Action-based HK model
In Figure 4 we simulated the dynamics discussed in Section 2 pertaining
four nodes with W in (26). Note that there is no agreement but also no
convergence of belief, in contrast to the classical HK model and the claims
made in Section 2 are corroborated by the simulation results. Furthermore
the random process of the opinions of the agents is very complex, as one can
notice from the complex non linear dynamics of the mean. This shows that
it is much harder to predict a form of polarization because the random pro-
cesses x2(t), x3(t) are governed by non-linear stochastic dynamics that are
Markovian but non homogeneous, whose trends are difficult to manipulate
mathematically to obtain optimum forecasts. Either than resorting to the
bounds we mentioned, accurate predictions become intractable, even when
the initial conditions are known.
3.3 Reinforcement model
In Section 2 we introduced a new model in which nodes move their belief
when their action is identical to one of their neighbors, selected at random.
In this case we showed that the network in Figure 1, with uniform initial
belief equal to 0.5, converges to possibly multiple herds. This is illustrated
in our three numerical simulation of the dynamics of the beliefs in Figure 5
where we can clearly observe the emergence of herding towards belief 1 and
14
00.20.40.60.8100.10.20.30.40.50.60.70.80.91p0=0.200.20.40.60.8100.10.20.30.40.50.60.70.80.91p0=0.6Figure 3: Mean and variance of the limit point as a function of p0.
belief 0 by all nodes in the top and bottom figures respectively, as well as
the emergence of polarized groups, whose belief is 1 or 0, in the middle plot.
This corroborate the statement in Theorem 2.
4 Conclusions
In this paper we examined an opinion diffusion model in which agents update
their belief based on their neighbors' empirical distribution of the actions.
The use of the observed actions leads to herding unlike continuous state
updates when neither bounded confidence nor stubborn agents are present
in the system showing that the trend observed in the BHW model extends
to other settings.
5 Appendix
Proof of Lemma 3
We now prove prove Lemma 3 Taking the expectation on both sides of 7,
we obtain:
µx(t + 1) = (1 − α)E{x(t)} + αWE{E{a(t)x(t)}}
= Wαµx(t) = Wα
15
tµx(0)
(33)
0.10.20.30.40.50.60.70.80.900.51E{xn(0)}=p0E{xn(∞)} simulationtheoretical0.10.20.30.40.50.60.70.80.90.050.10.150.20.25E{xn(0)}=p0Var(xn(∞)) simulationtheoreticalFigure 4: The state of the four node network with W in (26).
which is the AGC update that converges to consensus in the limit. In fact
t→+∞ Wt = J
lim
(34)
and
(35)
which proves the claim, since E{q(0)} = πT µx(0). In addition to the lemmas
and theorems in the main paper, the following result holds
Jµx(0) = 1πT µx(0)
Lemma 4 In general
and
Proof:
E{x(t + 1)x(t)} = Wαx(t)
E{Jx(t + 1)x(t)} = Jx(t).
E{x(t + 1)x(t)} = (1 − α)x(t) + αWE{a(t + 1)x(t)}
= (1 − α)x(t) + αWx(t) = Wαx(t).
(36)
(37)
(38)
16
012345678910x 10400.10.20.30.40.50.60.70.80.91 x1(t)x2(t)x3(t)x4(t)Figure 5: Three experiments of the dynamics of the agents beliefs with same
initial beliefs that converge to herding (top 0 and bottom 1) and polarization
(middle).
The second claim follows easily since JWα = J. This shows that in expec-
tation the belief follows the same dynamics as the DeGroot model [30].
Simulations of herding under random pairwise interactions
We also tested the dynamics where each time two random nodes average
their actions, discussed in the Randomized interactions section, and use
the averaged action to update their mutual beliefs. Figure 6 describes the
random graph used. In this case we describe the course of two dynamics
of the population, both where all nodes had an initial belief of 0.9, i.e. all
nodes were very inclined to take action 1. The top Figure 7 presents a
dynamics converging to 1. We present the lowest belief, the highest belief
and the mean belief. As can be seen when the dynamics converge to 1 this
happens quite rapidly, because of the initial state of all nodes. The bottom
of Figure 7 presents another instance of the dynamics, where initial beliefs
were identical to the previous case, but the limiting value of the herding was
0. With the initial conditions defined in the simulation, this occurs only 10%
of the simulations. Still this is surprising, as it would be expected that the
17
initial belief will have significant impact on the results of the herding. As
predicted by the main theorem, the direction of the herding is unexpected,
and governed by the random actions of the agents.
Figure 6: 10 nodes networks used for the asynchronous dynamics.
18
References
[1] de Caritat (marquis de Condorcet) JAN (1785) Essai sur l'application
de l'analyse `a la probabilit´e des d´ecisions rendues `a la pluralit´ee des
voix. (De l'Imprimerie royale).
[2] Galton F (1907) Vox populi. Nature 75:450–451.
[3] Vikram Krishnamurthy ONG, Hamdi M (2014) Interactive sensing and
decision making in social networks. Foundations and Trends in Signal
Processing 7(1-2):1–196.
[4] Krishnamurthy V, Poor HV (2014) A tutorial on interactive sensing in
social networks.
[5] Sayed AH (2014) Adaptation, learning, and optimization over networks.
Foundations and Trends in Machine Learning 7(4-5):311–801.
[6] Bikhchandani S, Hirshleifer D, Welch I (1992) A theory of fads, fashion,
custom, and cultural change as informational cascades in Journal of
Political Economy. Vol. 100, pp. 992–1026.
[7] Lohmann S (1994) Dynamics of informational cascades: The monday
demonstrations in leipzig, east germany, 1989-1991 in World Politics.
Vol. 47, pp. 42–101.
[8] Chamley C (2004) Rational herds: Economic models of social learning.
(Cambridge University Press).
[9] Jackson M (2008) Social and Economic Networks. (Princeton University
Press).
[10] Easley D, Kleinberg J (2010) Networks, Crowds, and Markets: Reason-
ing About a Highly Connected World. (Cambridge University Press).
[11] Acemoglu D, Dahleh M, Lobel I, Ozdaglar A (2010) Bayesian learning
in social networks in Review of Economic Studies. Vol. 78, pp. 1201–
1236.
[12] Castellano C, Fortunato S, Loreto V (2009) Statistical physics of social
dynamics. Reviews of modern physics 81(2):591.
[13] Krishnamurthy V, Poor HV (2013) Social learning and bayesian games
in multiagent signal processing: How do local and global decision mak-
ers interact? IEEE Signal Processing Magazine 30(3):43–57.
19
[14] Friedkin NE (2006) A structural theory of social influence. (Cambridge
University Press) Vol. 13.
[15] Clifford P, Sudbury A (1973) A model for spatial conflict. Biometrika
60(3):581–588.
[16] Liggett TM (1985) Particle systems.
[17] Holley RA, Liggett TM (1975) Ergodic theorems for weakly interacting
infinite systems and the voter model. The annals of probability pp.
643–663.
[18] Mobilia M (2003) Does a single zealot affect an infinite group of voters?
Physical review letters 91(2):028701.
[19] Yildiz E, Ozdaglar A, Acemoglu D, Scaglione A (2010) The voter model
with stubborn agents extended abstract in Communication, Control,
and Computing (Allerton), 2010 48th Annual Allerton Conference on.
(IEEE), pp. 1179–1181.
[20] Yildiz E, Acemoglu D, Ozdaglar A, Saberi A, Scaglione A (2011) Dis-
crete opinion dynamics with stubborn agents. SSRN eLibrary.
[21] Yildiz E, Ozdaglar A, Acemoglu D, Saberi A, Scaglione A (2013) Bi-
nary opinion dynamics with stubborn agents. ACM Transactions on
Economics and Computation 1(4):19.
[22] Jia P, MirTabatabaei A, Friedkin NE, Bullo F (2015) Opinion dynamics
and the evolution of social power in influence networks. SIAM review
57(3):367–397.
[23] Sznajd-Weron K, Sznajd J (2000) Opinion evolution in closed commu-
nity. International Journal of Modern Physics C 11(06):1157–1165.
[24] Galam S (2002) Minority opinion spreading in random geometry. The
European Physical Journal B-Condensed Matter and Complex Systems
25(4):403–406.
[25] Galam S (2005) Local dynamics vs. social mechanisms: A unifying
framework. EPL (Europhysics Letters) 70(6):705.
[26] Acemoglu D, Como G, Fagnani F, Ozdaglar A (2013) Opinion fluctua-
tions and disagreement in social networks. Mathematics of Operations
Research 38(1):1–27.
20
[27] Hegselmann R, Krause U (2002) Opinion dynamics and bounded confi-
dence models, analysis and simulations in Jounral of Artificial Societies
and Social Simulation. Vol. 5.
[28] Blondel V, Hendrickx J, Tsitsiklis J (2009) On krause's multi-agent con-
sensus model with state-dependent connectivity in IEEE Trans. Auto.
Control. Vol. 54, pp. 2586–2597.
[29] Tsitsiklis J (1984) Ph.D. thesis (Dept. of Electrical Engineering and
Computer Science, M.I.T., Boston, MA).
[30] DeGroot M (1974) Reaching a consensus in Journal of American
Statistcal Association. Vol. 69, pp. 118–121.
[31] Deffuant G, Neau D, Amblard F, Weisbuch G (2000) Mixing beliefs
among interacting agents in Adv. Compl. Syst. Vol. 3, pp. 87–98.
[32] Weisbuch G, Deffuant G, Amblard F, Nadal J (2001) Interacting agents
and continuous opinions dynamics in Heterogeneous agents, interac-
tions, and economic performance.
[33] Weisbuch G (2004) Bounded confidence and social networks in The Eu-
ropean Physical Journal B - Condensed Matter and Complex Systems.
Vol. 38, pp. 339–343.
[34] Li L, Scaglione A, Swami A, Zhao Q (2013) Consensus, polarization
and clustering of opinions in social networks. Selected Areas in Com-
munications, IEEE Journal on 31(6):1072–1083.
[35] Kahneman D (2003) Maps of bounded rationality: Psychology for be-
havioral economics. American economic review pp. 1449–1475.
[36] Martins AC (2008) Continuous opinions and discrete actions in opin-
International Journal of Modern Physics C
ion dynamics problems.
19(04):617–624.
[37] Martins AC, Pereira CdB, Vicente R (2009) An opinion dynamics model
for the diffusion of innovations. Physica A: Statistical Mechanics and
its Applications 388(15):3225–3232.
[38] Dimakis A, Kar S, Moura J, Rabbat M, Scaglione A (2010) Gossip
algorithms for distributed signal processing. Proceedings of the IEEE
98(11):1847 –1864.
21
[39] Jadbabaie A, Molavi P, Sandroni A, Tahbaz-Salehi A (2012) Non-
bayesian social learning. Games and Economic Behavior 76(1):210–225.
22
Figure 7: Opinion dynamics herding to 1 (top) and to 0 (bottom), xn(0) =
0.9, ∀n.
23
0501001502002503000.40.50.60.70.80.91txn(t)0500100015002000250030003500400000.10.20.30.40.50.60.70.80.91txn(t) |
1802.08204 | 1 | 1802 | 2018-02-22T17:58:55 | SCRank: Spammer and Celebrity Ranking in Directed Social Networks | [
"cs.SI"
] | Many online social networks allow directed edges: Alice can unilaterally add an "edge" to Bob, typically indicating interest in Bob or Bob's content, without Bob's permission or reciprocation. In directed social networks we observe the rise of two distinctive classes of users: celebrities who accrue unreciprocated incoming links, and follow spammers, who generate unreciprocated outgoing links. Identifying users in these two classes is important for abuse detection, user and content ranking, privacy choices, and other social network features.
In this paper we develop SCRank, an iterative algorithm to identify such users. We analyze SCRank both theoretically and experimentally. The spammer-celebrity definition is not amenable to analysis using standard power iteration, so we develop a novel potential function argument to show convergence to an approximate equilibrium point for a class of algorithms including SCRank. We then use experimental evaluation on a real global-scale social network and on synthetically generated graphs to observe that the algorithm converges quickly and consistently. Using synthetic data with built-in ground truth, we also experimentally show that the algorithm provides a good approximation to planted celebrities and spammers. | cs.SI | cs | SCRank: Spammer and Celebrity Ranking in Directed Social
Networks
Alex Fabrikant
Google Research
Mountain View, CA, USA
[email protected]
Mohammad Mahdian
Google Research
New York, NY, USA
[email protected]
Andrew Tomkins
Google Research
Mountain View, CA, USA
[email protected]
8
1
0
2
b
e
F
2
2
]
I
S
.
s
c
[
1
v
4
0
2
8
0
.
2
0
8
1
:
v
i
X
r
a
ABSTRACT
Many online social networks allow directed edges: Alice can uni-
laterally add an "edge" to Bob, typically indicating some kind of
interest in Bob, or in Bob's content, without Bob necessarily recip-
rocating with an "add-back" edge that would have indicated Bob's
interest in Alice. (cid:140)is signi(cid:128)cantly a(cid:130)ects the dynamics of inter-
actions in the social network. Most importantly, we observe the
rise of two distinctive classes of users, celebrities and follow spam-
mers, who accrue unreciprocated directed links in two di(cid:130)erent
directions: celebrities a(cid:138)ract many unreciprocated incoming links,
and follow spammers create many unreciprocated outgoing links.
Identifying users in both of these two categories is an important
problem since a user's status as a celebrity or as a follow spammer
is an important factor in abuse detection, user and content ranking,
privacy choices, and other social network features.
In this paper we develop SCRank, an iterative algorithm that
exploits a deep connection between these two categories, and clas-
si(cid:128)es both celebrities and follow spammers using purely the so-
cial graph structure. We analyze SCRank both theoretically and
experimentally. Our theoretical analysis shows that SCRank al-
ways decreases a potential function, and therefore converges to
an approximate equilibrium point. We then use experimental eval-
uation on a real global-scale social network and on synthetically
generated graphs to observe that the algorithm converges very
quickly, and consistently to the same solution. Using synthetic
data with built-in ground truth, we also experimentally show that
the algorithm provides a good approximation to the built-in set of
celebrities and spammers. Finally, we generalize our convergence
proof to a general class of "scoring" algorithms, and prove that
under mild conditions, algorithms in this class minimize a (non-
trivial) potential function and therefore converge. We give several
examples to demonstrate the versatility of this general framework
and usefulness of our techniques in proving theoretical results on
the convergence of iterative algorithms.
1 INTRODUCTION
Online social networks can be divided into two categories: undi-
rected networks such as LinkedIn or (pre-2011) Facebook that re-
quire the consent of both endpoints in order to establish an edge,
and directed ones such as Twi(cid:138)er, Google+, and Flickr, that allow
one user to unilaterally create a directed edge to another, such as by
"following" the la(cid:138)er's public updates, without the la(cid:138)er creating a
reciprocal (anti-parallel) edge to the former. As has been observed
in practice [12], this simple distinction signi(cid:128)cantly a(cid:130)ects the dy-
namics of relationships in the system: undirected social networks
like Facebook tend to cultivate socializing with friends, while di-
rected networks like Twi(cid:138)er, interacting with content produced by
strangers constitutes a signi(cid:128)cant portion of social interactions. In
the la(cid:138)er case, there are o(cid:137)en a few individuals who collect many
incoming links, either because they are already famous outside the
social network, or because they contribute exceptionally engaging,
viral content to the social network's ecosystem. (cid:140)ese individuals
are in a sense the "celebrities" of the network. On the other hand,
we have nodes who accumulate many outgoing links to random
strangers. We call these nodes "(follow) spammers". As we explain
below, identifying celebrities and spammers of a network are inter-
twined problems. (cid:140)is paper focuses on developing algorithms to
identify users in these two classes.
(cid:140)e simplest approach to identify a spammer is to count the
number of unreciprocated outgoing edges of each node and classify
the node as a spammer if this number exceeds a threshold. (cid:140)e
problem with this approach is that o(cid:137)en a non-negligible number
of regular users follow many celebrities, and this approach can
identify such users as spammers. Similarly, classifying celebrities
by counting the number of unreciprocated incoming links su(cid:130)ers
from the problem that it can classify regular users who are targeted
by many spammers (for example, by the virtue of having their name
mentioned in a public, crawlable space) as celebrities. Instead, we
focus on this recursive de(cid:128)nition of celebrities and spammers:
• A celebrity is a node who is followed by many non-spammers.
• A spammer is a node who follows many non-celebrities.
(cid:140)is recursive de(cid:128)nition hints at a natural iterative approach for
(cid:128)nding celebrities and spammers. In the next section, we mathe-
matically formulate the problem and the iterative algorithm, which
we call SCRank. We then analyze the convergence properties of
SCRank, both theoretically and experimentally, and argue that its
output provides useful information. We will use a real-world data
set from LiveJournal, as well as randomly generated data, to exper-
imentally evalute the convergence properties of our algorithm. To
evaluate the output of our algorithm, we use randomly generated
data with built in ground-truth, and show that the algorithm can
recover a signi(cid:128)cant portion of the ground truth e(cid:129)ciently and
accurately.
Finally, in Section 5, we give a generalization of our potential
function argument to a more general framework of scoring prob-
lems, and prove that for any scoring problem satisfying a mild
symmetry and monotonicity assumption, a (non-trivial) potential
function can be associated with the natural iterative algorithm for
the problem, and therefore the iterative algorithm provably con-
verges. We give three concrete examples of this general framework
to demonstrate the versatility of our framework.
1.1 Related work
Various measures of an individual's standing in a social network
has been the subject of much research in sociology and social com-
puting, starting well before the dawn of online social networks.
Among the two axes we study, celebrities and follow spammers,
the lion's share of the prior work on social graph structure has
focused on celebrities, typically with a goal of understanding and
algorithmically locating highly in(cid:131)uential people for the purposes
of ranking, marketing, predicting cascades, etc. [7], [2], and many
other early sociometric studies focused on de(cid:128)ning and evaluating
social centrality metrics. In the digital age, algorithms for selecting
high-in(cid:131)uence sets of social network users from the social graph
structure were pioneered by [9], followed by a large literature of its
own. Much of the search engine literature focuses on (cid:128)nding in(cid:131)u-
ential nodes on the web graph, with the results on PageRank [13]
and HITS [10] forming perhaps the most in(cid:131)uential nodes in the
citation network. (cid:140)ese and related techniques have been borrowed
for social network applications as well, such as by [18]. While much
of this work has focused on the relatively more sophisticated notion
of in(cid:131)uence, as measured by impact on viral cascades, less a(cid:138)ention
has been paid to questioning the idea that a high in-degree deter-
mines a user's "celebrity" status. For the corresponding problem
on the Web graph, [16] notably gave experimental evidence that
corporate websites' in-degree is a be(cid:138)er predictor of a company's
prominence and worth than PageRank.
(cid:140)e follow spam problem has been recognized for several years
now [3, 8], but most of the existing work that does consider the
structure of the social graph still focuses on holistic machine-
learning approaches that combine graph properties with a many
signals derived from user content [1, 15, 17] - a very pragmatic
approach for detecting existing spamming activity, but of limited
utility in the common case where creating sibyl accounts is cheap
[19], and most abuser accounts are thus young.
(cid:140)e existing approaches also assign some form of "trust" seman-
tics to each directed edge, typically making it di(cid:129)cult to cope with
"social capitalists" [8]: the many legitimately popular celebrities
such as Barack Obama or Lady Gaga who have been observed to
reciprocate follow edges indiscriminately. Even when such indis-
criminate behavior is fairly common, SCRank is una(cid:130)ected, since
it entirely ignores reciprocated edges, and requires only a fraction
of users to be discerning about follow-backs to get enough input
signals.
(cid:140)e potential function that makes our analysis work combines
the potential functions of potential games [11] and Max-Cut games
[4]. (cid:140)e form of the SCRank algorithm itself is inspired various
iterative numerical algorithms used in machine learning such as
EM and belief propagation [14], and more directly by the HITS [10]
algorithm for web ranking. (cid:140)e di(cid:130)erences between SCRank and
HITS are subtle, but vital to understanding the operation and anal-
ysis behind SCRank, so we now address this speci(cid:128)c relationship.
1.2 SCRank vs HITS
At (cid:128)rst blush, our reciprocal de(cid:128)nition of spammers and celebrities
in terms of one another appears parallel to the de(cid:128)nitions of hubs
and authorities in HITS. But mathematically, the structures are
quite di(cid:130)erent. HITS is expressible as a linear transformation of
2
(cid:0)At(1 − (cid:174)s)(cid:1).
either the original hub or authority vector, which converges by the
Perron-Frobenius theorem to the (positive real) principal eigenvec-
tor of a matrix based on the original graph. (cid:140)ere are two properties
that set the spammer-celebrity iteration apart from HITS. First, the
core update step of the spammer-celebrity iteration involves an
a(cid:129)ne transformation rather than a linear transformation; such
transformations do not in general a(cid:138)ain (cid:128)xed points. (cid:140)us, we use
the current spammer vector (cid:174)s to compute an intermedate celebrity
value (cid:174)c(cid:48) = A(1 − (cid:174)s) via an a(cid:129)ne transformation. Second, for rea-
sons we describe below, the particular update we seek requires an
elementwise modi(cid:128)cation to the results of the a(cid:129)ne transforma-
tion by an arbitrary increasing function Fs. (cid:140)e new version of (cid:174)s
is given by (cid:174)s = Fs((cid:174)c(cid:48)). (cid:140)e actual transformation is therefore no
longer a(cid:129)ne, but will in general be non-linear. Likewise, a similar
transformation applies to produce a new spammer vector from the
current celebrity vector. Combining both the a(cid:129)ne transformation
and the non-linear modi(cid:128)cation, we have (cid:174)c = Fc
We now o(cid:130)er two words of intuition on the form of our up-
date. First, the a(cid:129)ne structure comes about because, unlike HITS,
outliers on the celebrity scale provide no information about spam-
mers. On the contrary, only nodes that receive low scores on one
scale may provide signi(cid:128)cant contributions to the score of nodes
on the other scale. A li(cid:138)le algebraic manipulation will convince
the reader that this property is fundamental to the nature of the
relationship between these classes, and cannot be overcome by
simple linear transformations of the variables, such as introducing
"non-spammer" scores or the like.
Second, the non-linear transfer function comes about for a re-
lated reason. (cid:140)e 1 − (cid:174)s term can be interpreted as a "non-spammer"
score if spammer scores lie in [0, 1], but in general if spammer scores
may grow large, the a(cid:129)ne transformation will produce large nega-
tive non-spammer scores, which break the intuition that links from
spammers should not contribute one way or the other to celebrity
scores. (cid:140)us, scores must be scaled to remain in [0, 1] in order to
perform the iteration with the semantics we desire.
In general, the machinery we develop here is appropriate in
any situation that shows anti-reinforcing behavior: shady groups
fund dishonest politicians, while honest politicians are funded by
non-shady groups; and so forth.
2 THE ALGORITHM
To formalize an algorithm based on the recursive de(cid:128)nition of
the celebrities and spammers in the previous section, we de(cid:128)ne
a celebrity score cv and a spammer score sv for each node v. All
these scores are in [0, 1]. (cid:140)e algorithm is parameterized by two
increasing functions Fc and Fs that map non-negative reals to [0, 1].
We denote the directed social network by G, and the vertex set, the
edge set, and the number of vertices of G by V , E, and n. Also, the
set of unreciprocated directed edges of G is denoted by A. In other
words, A = {(u, v) : (u, v) ∈ E and (v, u) (cid:60) E}.
(cid:140)e algorithm in presented in detail as Algorithm 1. We refer
to this algorithm as the SCRank algorithm, for Spammer-Celebrity
Rank. (cid:140)e algorithm is based on iterating the following two as-
signments until either an approximate (cid:128)xed point is found, or a
maximum number of iterations is reached:
cv = Fc(cid:169)(cid:173)(cid:171)
(u,v)∈A
(1 − su)(cid:170)(cid:174)(cid:172)
sv = Fs(cid:169)(cid:173)(cid:171)
(v,u)∈A
(1 − cu)(cid:170)(cid:174)(cid:172)
(1)
parameters ε and T
Algorithm 1 (SCRank)
Input: Directed social network G; functions Fc and Fs;
Output: Celebrity score cv and spammer score sv for each v ∈ V
1: for all v in V do
cv ← 0, sv ← 0
2:
3: end for
4: k ← 0
5: repeat
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16: until δ < ε or k > T
snew
end for
δ ← max{c − cnew ∞, s − snew ∞}
c ← cnew
s ← snew
k ← k + 1
))
for all v in V do
v ← Fc((u,v)∈A(1 − su))
v ← Fs((v,u)∈A(1 − cnew
cnew
end for
for all v in V do
u
For our experiments, we will use the CDF of a normal distribution
with mean µc and standard deviation σc as the function Fc. (cid:140)is
is essentially a so(cid:137) step function where µc controls the location of
the step (the threshold for the number of non-spammer followers
to count a user as a celebrity) and σc controls the smoothness of
this step function (a large σc means a smooth threshold at µc, while
a small σc we get a sharp threshold). Similarly, we use the CDF of
normal distribution with mean µs and standard deviation σs as Fs.
We note that our results go through even if the functions Fs and
Fc depend on the vertex v. (cid:140)is might be practically useful, for
example, by allowing the threshold µs to depend on the number
of reciprocated neighbors of the vertex (i.e., if a node has a large
number of reciprocated edges, allow it to have more unrecipro-
cated edges without counting it as a spammer). (cid:140)is and further
generalizations will be discussed in Section 5.
Our algorithm is similar in spirit to the Hubs and Authorities
algorithm of Kleinberg [10]. (cid:140)e major di(cid:130)erence is that in our
se(cid:138)ing, the celebrity score of a node is related to the non-spammer
score of its followers. (cid:140)is negation makes a signi(cid:128)cant di(cid:130)erence:
we need the spammer scores to be scaled in [0, 1] with 0 meaning a
non-spammer and 1 meaning a spammer (and similarly for celebri-
ties), whereas in the hubs and authorities algorithm it was enough
to compute scores that induce reasonable rankings. (cid:140)is, forces
us to use non-linear operators Fs and Fc. (cid:140)is is in contrast with
hubs and authorities, which uses linear operators and therefore can
characterize the scores as eigenvectors of a matrix.
Note on the implementation. In order to be able to use the SCRank
algorithm on graphs with hundreds of millions of nodes (as we do
in Section 4), we need to take advantage of parallel computation.
Fortunately, for the SCRank algorithm this is not hard to do, since
the celebrity scores in each iteration only depend on the spammer
scores last computed and vice versa. Using this, we implemented
each iteration of SCRank as two Map-Reduce stages, without any
blow-up in the size of the data in each iteration. (cid:140)is yielded a
very e(cid:129)cient implementation which easily accommodated even
our largest experiments in Section 4, on a social graph of over
400,000,000 nodes.
3 CONVERGENCE OF THE ALGORITHM
Ideally, we would like to show that: (1) when there is no bound T
on the number of iterations, SCRank converges to an (approximate)
(cid:128)xed point; (2) the (cid:128)xed point is unique; and (3) the algorithm
converges quickly to the (cid:128)xed point. In this section, we theoretically
show that (1) holds for all directed social networks. We will give
an example that shows that the (cid:128)xed point of the function is not
necessarily unique, much like in HITS and other similar algorithms
[6]. However, as we will discuss in the next section, we have not
observed such examples in real or randomly generated data sets.
Finally, we will experimentally show that the SCRank algorithm
o(cid:137)en converges very quickly.
We start by proving that the algorithm never falls into a loop.
(cid:140)is is done by showing that there is a potential function whose
value decreases in every iteration. (cid:140)e intuition behind this (complicated-
looking) potential function is that it combines the potential function
for max cut games [4] with those of potential games [11].
In the following theorem, we show the existence of this potential
function. We will then use this result to prove that the algorithm
converges to an approximate (cid:128)xed point of the Equations (1).
Theorem 3.1. For every directed social network G and every pair
of increasing di(cid:130)erentiable functions Fs and Fc , there is a function of
the the vector (c, s) computed by the SCRank algorithm that strictly
decreases in every iteration. (cid:138)erefore, the algorithm will never fall
in an in(cid:128)nite loop.
Proof. Let Rc = Fc([0, n]), i.e., Rc is the range of Fc when its
domain is [0, n]. Since Fc is increasing and di(cid:130)erentiable, its inverse
−1. Next, we
on Rc is a well de(cid:128)ned strictly increasing function Fc
de(cid:128)ne the following function:
Þ x
0
Gc(x) =
−1
c
F
(t)dt .
Similarly, using Fs, we can de(cid:128)ne Rs and Gs. We are now ready
to de(cid:128)ne our potential function. For any vector of celebrity and
spammer scores (c, s) ∈ R2n, the function P is de(cid:128)ned as follows:
P(c, s) :=
(1 − su)(1 − cv) +
Gc(cv) +
Gs(sv) (2)
(u,v)∈A
v ∈V
v ∈V
Next, we show that the value of this potential function decreases
in every iteration of the algorithm. To do this, take the derivative
of P with respect to cv, for a vertex v:
= −
u:(u,v)∈A
(1 − su) + F
−1
c
(cv)
∂P(c, s)
∂cv
3
(cid:140)is derivative is zero when cv is equal to
(1 − su)),
c
v := Fc(
∗
u:(u,v)∈A
to c∗
v, and positive when cv > c∗
negative when cv < c∗
v. (cid:140)erefore, by
v, the value of the potential
changing cv from its old value cold
v
function can not increase. (cid:140)is means that the updates in line 7 of
Algorithm 1 never increase the value of P. In fact, since F−1
is a
c
strictly increasing function, if at least one of the cv's change, then
the potential function must strictly decrease. A similar argument
shows that the updates in line 10 of Algorithm 1 also do not increase
the value of P. (cid:140)is is enough to show that the algorithm never
falls into an in(cid:128)nite loop.
(cid:3)
Next, we prove that the SCRank algorithm eventually converges
to an approximate (cid:128)xed point (also referred to as an approximate
equilibrium). Before stating the theorem, we need to de(cid:128)ne the
notion of approximate (cid:128)xed point.
De(cid:128)nition 3.2. An ε-approximate (cid:128)xed point of Equations (1) is
a set of celebrity and spammer scores (cv , sv) for each node such
that for each vertex v, we have
cv − Fc(
sv − Fs(
(u,v)∈A
(v,u)∈A
(1 − su)) ≤ ε
(1 − cu)) ≤ ε
(3)
Theorem 3.3. For every ε > 0, there is a (cid:128)nite number of iterations
a(cid:135)er which the vector (c, s) computed by the SCRank algorithm is an
ε-approximate (cid:128)xed point of Equations (1).
Proof. We use the notation from the proof of (cid:140)eorem 3.1.
Since Fc is increasing and di(cid:130)erentiable on a closed interval [0, n],
there is an absolute constant α, such that for every non-negative
x ∈ [0, n], the derivative of Fc at x is at most αc. (cid:140)is implies
that the derivative of the function F−1
c on every point in Rc is at
least 1/αc. Similarly, we can de(cid:128)ne αs for Fs and show that the
derivative of F−1
Next, we prove that if an update operation changes the values
by too much, it must also signi(cid:128)cantly decrease the value of the
potential function. Assume in an iteration the value of cv is changed
(the c∗
from cold
v >
v
case can be handled similarly). (cid:140)en for every x ∈ [c∗
v ],
cold
v , cold
v
we have
s on Rs is at least 1/αs. Let α = max(αc , αs).
v ≥ ε. Assume c∗
v, where cold
v −c∗
v < cold
v
to c∗
−1
c
F
(x) > F
∗
v) + (x − c
∗
v)/αc
(1 − su) + (x − c
∗
v)/αc .
=
−1
c
(c
u:(u,v)∈A
v plusÞ cold
(cid:140)erefore, the derivative of the function P(c, v) with respect to
cv at cv = x is at least (x −c∗
v)/αc. (cid:140)us, the value of P(c, v) at cv =
is at least its value at cv = c∗
v)/αcdx ≥ ε2
.
cold
2αc
v
In other words, in each iteration where the value of at least one cv
changes by at least ε, the value of the potential function decreases
2/(2α). Similarly, if the value of at least
by at least ε
one sv changes by at least ε, the potential function decreases by at
2/(2α). Since the value of the potential function
least ε
2/(2αc) ≥ ε
2/(2αc) ≥ ε
(x − c∗
v
c∗
v
Figure 1: Example with more than one (cid:128)xed point
decreases in every iteration and can never become negative, a(cid:137)er a
(cid:128)nite number of iterations it must decrease by an amount less than
2/(2α). (cid:140)is means that at this iteration, each score changes by at
ε
most ε, showing that we are at an ε-approximate (cid:128)xed point.
(cid:3)
Uniqueness of the (cid:128)xed point. It would be nice if we could prove
that the (cid:128)xed point of Equations (1) is unique. (cid:140)is would mean
that the values that the SCRank algorithm seeks to compute are
uniquely well-de(cid:128)ned. Unfortunately, this result is not true in the
worst-case, as the following example shows.
Proposition 1. (cid:138)ere is a directed social network D and functions
Fc and Fs such that more than one (c, s) satis(cid:128)es the Equations (1).
Proof. Consider a regular bipartite graph with all the edges
directed from part 1 to part 2. Intuitively, this situation can be
explained by either declaring nodes in part 1 as spammers, or nodes
in part 2 as celebrities. For a numeric example, say the degrees are
500, µs = µc = 100, and σs = σc = 25. Let F = Fc = Fs. (cid:140)en
nodes in part 1 will have celebrity score F(0) ≈ 0 and spammer
score s, and nodes in part 2 will have celebrity score c and spammer
score F(0) ≈ 0, for values of (c, s) satisfying c = F(500(1 − s)) and
s = F(500(1−c)). (cid:140)ese equations are plo(cid:138)ed in Figure 1. As can be
seen in the picture, there are 3 (cid:128)xed points with (c, s) approximately
equal to (1, 0), (0, 1), and (0.8, 0.8). (cid:140)e (cid:128)rst (cid:128)xed point corresponds
to declaring nodes in part 1 as spammers, the second corresponds to
declaring nodes in part 2 as celebrities, and the third is an unstable
(cid:128)xed point between the other two.
(cid:3)
Despite the above example, as we will see in the next section, in
none of the real world or randomly generated instances we have
tried we have been able to discover more than one solution.
4 EXPERIMENTS
In this section, we present the results of experiments showing that
on real and generated data, the algorithm presented in the last
section converges quickly and to the same point, independent of
the starting con(cid:128)guration. We also show that the computed scores
are reasonable quanti(cid:128)cations of celebritiness and spamminess in
the social networks. (cid:140)is is done with randomly generated data sets
4
with a random generation process that embeds the ground truth
against which the output of the algorithm can be evaluated. For
experimentally evaluating convergence and uniqueness properties,
we use randomly generated data as well as two real-world data sets,
as described in the following.
4.1 Data Sets
We use two sources of data in our experiments. (cid:140)e (cid:128)rst is based
on real-world data from LiveJournal. (cid:140)e second is randomly gen-
erated data according to a model described below. Randomly gen-
erated data allows us to compare the results of the algorithm with
the "ground truth" that the model is based on. (cid:140)is is in contrast
with the real-world data set, which is used to evaluate the conver-
gence and uniqueness properties of the SCRank algorithm. As we
show, manually skimming the results on this data suggests that
the outputs are reasonable, but we do not have quanti(cid:128)able ground
truth.
In the rest of this section, we describe the random generation
process and basic information about our real-world data set.
(cid:138)e random generation process. We use the following method to
generate a random directed graph G that will be used as a test case
for our algorithm: (cid:140)ere are N nodes in the graph, out of which
two disjoint sets C and S are designated as the set of celebrities
and spammers. We then use a graph generation method such as
Erdos-R´enyi or preferential a(cid:138)achment to generate an undirected
graph H with the vertex set V(G). (cid:140)e edges of this graph represent
real friendship relationships among individuals. For each such edge
uv in H, with probability 1 − p we add both directed edges uv and
vu to G. With probability p, we add one of these two edges picked
at random. (cid:140)is represent the fact that even among the edges
corresponding to mutual friendship, some are not reciprocated.
In addition to these edges, we add random directed edges from
S to V(G) and from V(G) to C. We underscore that this models
spammers indiscriminately linking to some subset of all nodes,
including possibly celebrities and other spammers, and the converse
for inbound links to celebrities. For generating these edges, we use
a simple model of independent coin (cid:131)ips: for each pair (u, v) where
u ∈ S and v ∈ V(G), we add (u, v) independently with probability
ps. Similarly, for each (u, v) where u ∈ V(G) and v ∈ C, we add this
edge independently with probability pc. (cid:140)ere is no other edge in
the graph G.
(cid:140)e parameters of the model are as follows: N , C, S, p, pc, ps,
and the parameters of the generation model for the graph H. (cid:140)e
algorithm is successful if it gives high cv scores to nodes in C (and
low cv to nodes in V(G) \ C) and high sv scores to nodes in S (and
low sv to nodes in V(G) \ S).
For the experimental results we present in this paper, we have
picked the following set parameters: N = 2000000, C = 1000,
S = 5000, p = 0.2, pc = ps = 0.00025, and the graph H is a
random graph with expected degree distribution that is a power
law with exponent 0.5. (cid:140)e average degree in H is 100. (cid:140)ese
choices are mostly based on our intuition for typical numbers on a
social network. We have also tried the experiments on several other
sets of parameters, and did not observe any signi(cid:128)cant change in
our conclusions.
5
LiveJournal Data Set. Each node in this data set is a LiveJournal
pro(cid:128)le, and edges correspond to friendship relationships declared
on the pro(cid:128)les. (cid:140)is data set is crawled, and contains more than
4.8 million vertices and 660 million edges. LiveJournal users may
choose to disallow crawling of their metadata via the robots.txt
mechanism. Any user who did so was not included in the crawl,
with all edges to and from this user removed from the data set.
4.2 Convergence speed
Let c and s denote the vector of cv's and sv's, respectively. We
can compute the (cid:96)1 distance between the vector c computed at the
end of iteration t, and the one computed at the end of iteration
t + 1 (and similarly for s). When both of these values reach zero, it
means that the algorithm has converged to a solution. (cid:140)erefore,
we can use these values as a measure of the convergence of the
algorithm. We plot these values as a function of t for di(cid:130)erent
data sets and for di(cid:130)erent initializations of the scores, to see if and
how the initialization a(cid:130)ects convergence speed. (cid:140)e results (in log
scale) for the three data sets are presented in Figure 2.
(cid:140)e initializations labelled init 0, init 1, and init 0.5 cor-
respond to initializing all scores to zero, all scores to one, and all
scores to 0.5. We also tried initializing each score to a random
number picked uniformly from [0, 1]; this initialization produced
results that were essentially indistinguishable from init 0.5 in all
data sets.1 As can be seen in the plots, di(cid:130)erent initializations do
not di(cid:130)er signi(cid:128)cantly in terms of their convergence rate, although
init 0.5 o(cid:137)en performs marginally be(cid:138)er. In all cases, the con-
vergence seems to be exponentially fast (i.e., the log-scale plot has
an almost constant negative slope)
4.3 Uniqueness of the solution
To test whether the scores converge to a single point independent
of the starting point, we plot the l1 distance between the vector
computed by our algorithm starting from di(cid:130)erent initializations. In
particular, we measure the di(cid:130)erence between init 0 and init 1,
and between init 0 and init 0.5. (cid:140)e graphs, plo(cid:138)ed as functions
of t in the log scale, are shown in Figure 3 for the LiveJournal and
randomly generated data sets.
As these graphs show, on the real-world data set a(cid:137)er less than
10 rounds, the solutions computed with di(cid:130)erent initializations are
virtually identical. In randomly generated instances, even though
the distance between the solutions decrease by about two orders
of magnitude in the (cid:128)rst (cid:128)ve iterations, they do not converge to
zero. (cid:140)is indicates that randomly generated instances probably
contains small pockets of nodes with non-unique solutions.
4.4 Solution quality
In this section, we argue that SCRank can recover a signi(cid:128)cant por-
tion of celebrities and spammers. To show this experimentally, we
use randomly generated graphs with the sets C and S in the random
generation process as the hidden ground truth. (cid:140)e algorithm is
successful if it assigns high celebrity scores to nodes in C and high
spammer score to nodes in S. Figure 4 shows the distribution of
1Intuitively, this is due to the law of large numbers: for most nodes, they have enough
neighbors so that the sum of the non-celebrity/non-spammer scores of their neighbors
is essentially the same in init 0.5 and init rand.
(a) LJ celebrity score
(b) Synthetic graph celebrity score
(c) LJ spammer score
(d) Synthetic graph spammer score
Figure 2: Log-scale l1 change in scores for LiveJournal and synthetic data, as a function of time
celebrity and spammer scores, comparing, respectively, all vertices
versus vertices in C; and all vertices versus vertices in S. (cid:140)e score
distributions on these synthetic inputs are almost completely bi-
modal, with both celebrity and spammer scores of generic vertices
being strongly concentrated around zero. To be(cid:138)er observe the
di(cid:130)erence between the two distributions, we also show plots of the
distribution densities with logarithmic y-axes.
We can also study the precision-recall tradeo(cid:130) of the output of
the algorithm. We plot the precision of the algorithm (which we
de(cid:128)ne as the percentage of users with celebrity/spammer score
more than 0.5 who are in C/S, respectively) against recall (de(cid:128)ned
as the percentage of nodes in C/S for which we compute a celebrity
or spammer score, respectively, of more than 0.5). By adjusting the
parameters of the model, we get a tradeo(cid:130) between precision and
recall that is plo(cid:138)ed in Figure 5.
5 GENERALIZATION
(cid:140)e potential function argument used in Section 3 to guarantee
SCRank's convergence can be generalized to a much broader class
of iterative algorithms, which we expect will be of independent
interest. In particular, we will show that the same argument applies
to any iteration that simulates best-response dynamics in a game
where players have bounded real-valued strategies, and whose util-
ities are strictly monotic, continuously di(cid:130)erentiable per-variable
functions which depend only on a linear combination of the others'
strategies, with symmetric linear combination weights.
6
(a) LJ: celebrity scores
(b) Synthetic graph: celebrity scores
(c) LJ: spammer scores
(d) Synthetic graph: spammer scores
Figure 3: Log of l1 di(cid:130)erence between scores computed with di(cid:130)erent initializations, as a function of time
Before we de(cid:128)ne this formally, let us observe how this describes
the SCRank algorithm. SCRank uses 2n variables - two "players"
per SCRank agent. (cid:140)e convergence argument can be rephrased to
ignore the fact the variables are arranged in pairs in the original
setup. (cid:140)e updates in lines 6–11 of the algorithm are equivalent
to the ci players making best-response moves one at a time, then
the si players taking their turns. (cid:140)e utility/update functions for
the cvs and sus both depend only on a linear combination of other
u (u,v)∈A −su) = Fc(indeg v +L), and similarly
. For every (u, v) ∈ A, cv's update function input will include
for Fsu
su with weight −1, and su's update function input will include cv
with weight −1. (cid:140)is meets the "symmetricity" condition - that the
matrix W of variable weights in the update function inputs must be
= −1, and is 0 elsewhere.
symmetric. In SCRank, Wcv su
variables: Fcv (L =
= Wsucv
Formally, we de(cid:128)ne a general Monotonic Update on Symmetric
Linear combinations Iteration (M USLI) system as:
• Real-valued variables x1, . . . , xn with xi ∈ [ai , bi]
• A symmetric weight matrix W with 0s on the diagonal.
• For each variable, a strictly increasing, continously di(cid:130)er-
entiable update function Fi : R → R which takes as input
only (W x)i, the linear combination of the xis weighted
by W 's ith row. Fi must preserve the bounds on xi, i.e.
ai ≤ Fi((W (cid:174)x)i) ≤ bi whenever xj ∈ [aj , bj])
• An activation sequence A : Z≥0 → {1, . . . , n} determining,
for each iteration t ≥ 0, the unique variable xA(t) that gets
updated to FA(t)((W x)A(t)).
(cid:140)e proof of (cid:140)eorem 3.3 generalizes to show:
7
(a) Linear-scale spammer scores
(b) Log-scale spammer scores
(c) Linear-scale celebrity scores
(d) Log-scale celebrity scores
Figure 4: Score distributions (p.d.f.)
8
Figure 5: Precision-recall graph for the detection of spam-
mers in a randomly generated data set.
Theorem 5.1. (cid:138)e state of a M USLI system, (cid:174)x, converges to a (cid:128)xed
point under its iteration.
Proof. (cid:140)e argument is very similar, relying just on a general-
ization of the potential function. As above, the strictly increasing,
continuously di(cid:130)erentiable Fis have well-de(cid:128)ned strictly increasing
inverses F−1
, which lets us de(cid:128)ne Gi(z) and the potential function
i
P((cid:174)x) as:
P((cid:174)x) =
i
Gi(xi) − 1
2 (cid:174)xTW (cid:174)x
Þ z
0
Gi(z) =
−1
i
F
(t)dt
;
(cid:140)is yields the partials:
= −(W (cid:174)x)i + F
−1
i
(xi)
∂P
∂xi
For x∗
i
= Fi((W (cid:174)x)i), this is zero, and, since Wii = 0, the (cid:128)rst term
guarantees
.
is constant relative to xi, and the monotonicity of F−1
that updating xi to x∗
≤ αi for some αi, and d F −1
i − x∗
old
old
i
i
d Fi(t)
dt
An iteration that starts at state x
WLOG, a lower value x∗
i < x
have, for all t ∈ [x∗
]:
old
i , x
i
≥ 1/αi.
old
to,
i
i ≥ ε, will
old and updates xi from x
can't increase P((cid:174)x).
, changing it by x
As before, 0 <
(t)
i
dt
i
F
−1
i
(t) > F
−1
∗
∗
i )/αi
i ) + (t − x
(x
i
∗
old)i + (t − x
= (W x
i )/αi
∗
old−i , t) ≥ (t − x
i )/αi
t − x∗
old−i , x
i
αi
2
dt ≥ ε
2αi
Þ x∗
∗
i ) ≥
i
x old
i
(x
∂P
∂xi
old) − P(x
P(x
Since (cid:174)x remains within the compact set de(cid:128)ned by xi ∈ [ai , bi],
P((cid:174)x) is bounded, and, since it decreases at each step of the iteration,
there is, by the same argument as above, for any δ > 0, a step k∗
such that the update won't change xi by more than √2αiδ.
(cid:3)
Note that the proof doesn't even require that each variable be
"activated" in(cid:128)nitely o(cid:137)en, but we expect most practical uses of
this result will require that each xi be updated in(cid:128)nitely o(cid:137)en for
convergence to a relevant value, or more o(cid:137)en than some threshold
for stronger convergence bounds.
To demonstrate the breadth of these systems, we now give a
couple of examples.
5.1 Example: Graph connectivity
As a trivial example of another algorithmic task solvable via a
M USLI best-response iteration, consider the question of (undi-
rected) graph reachability. If the graph's adjacency matrix is used as
weights, with nodes as players, using starting state 0 for all players
N(i) xi) that
approximates a step function at x = 1 will clearly converge rapidly
to a state where all nodes reachable from the origin are 1.
except the origin, iterating updates of sigmoid Fi(
5.2 Example: In(cid:131)uence games
In SCRank and the above example, M USLI systems are used as al-
gorithms to compute a (cid:128)xed point of interest. We note that the one-
at-a-time update dynamics and the Wii = 0 constraint mean that
M USLI iterations can also be interpreted as classical best-response
dynamics in games, immediately yielding:
Corollary 5.2. A game whose best-response dynamics form a
M USLI system (i.e. an n-player game with bounded real-valued strate-
gies and strictly increasing, continuously di(cid:130)erentiable best-response
functions that depend only on a linear combination of the other play-
ers, with symmetric weights) is a potential game [11], with the above
potential function, and is guaranteed to converge.
(cid:140)is class of games is fairly broad, including, for instance:
Fi((cid:174)x) = sgn
(cid:140)e party a(cid:129)liation game. In the well-studied party a(cid:129)liation
game [5], agents pick "political parties" −1 and 1 based on the
weighted sum of their friends' and enemies' a(cid:129)liations: a player
tries to be in the same party as her friends and in a di(cid:130)erent
party than her enemies. Allowing fractional strategies and so(cid:137)-
ening the best-response function from the original step function
j xi xjwij to a sigmoid that approximates it produces
a game whose best-response dynamics are a M USLI system. (cid:140)e
above argument guarantees a potential function and convergence.
We note that this is quite natural, since our potential function ar-
gument is an extension of the max cut game potential argument
that underlies the analysis of the party a(cid:129)liation game.
(cid:140)e symmetrical technology di(cid:130)usion game. Consider a social
network where agents are deciding, e.g., between 2 technologies
with a network e(cid:130)ect such as cellular providers where a user bene-
(cid:128)ts from having more friends use the same technology. In the US
cellular market, this corresponds to free phone calls to people on
the same network, and heavy charges for calls to people on another
network beyond a (cid:128)xed monthly limit. Let weight Wij indicate how
many minutes i and j expect to talk on the phone per month, 0
and 1 represent the provider choices, and (cid:174)x ∈ [0, 1]n be the current
fractional provider choices, optionally considered as probabilities.
A natural best-response function for i is to use (W (cid:174)x)i, the expected
number of minutes she will spend talking to people using provider
1 (assuming minutes and provider choices are independent), as an
9
input to a sigmoid that is a so(cid:137) step function at or near the maxi-
mum number of free calling minutes for users of provider 0 when
calling users of provider 1. Assuming all phone calls are 2-way, the
best-response dynamics constitute a M USLI system, immediately
demonstrating that the game is a potential game and guaranteeing
convergence.
6 CONCLUSION
In this paper, we presented a framework for iterative algorithms
for giving scores to nodes de(cid:128)ned recursively in terms of the scores
of their neighbors, with a focus with one application in which such
a recursive de(cid:128)nition comes quite naturally: computing celebrity
and spammer scores on a directed social network. We theoretically
proved that under a mild symmetry and monotonicity assump-
tion, there is a potential function that decreases in every iteration
of the iterative algorithm, and therefore, the iterative algorithm
always converges to an approximate equilibrium. In the case of
celebrity/spammer scoring, we experimentally showed that this
convergence is extremely fast, the convergence point is unique, and
when applied on randomly generated data with a built-in ground
truth, it provides a good approximation to the ground truth.
In addition to the obvious application of (cid:128)nding celebrities and
link-spammers in online directed social networks, we believe that
our potential function framework has the potential to be quite useful
in theoretical analysis of iterative algorithms on social networks.
Iterative algorithms such as belief propagation are notoriously hard
to analyze theoretically, despite widespread practical use.
(cid:140)e obvious open directions are to (cid:128)nd other applications or
generalizations of our framework, or prove a theoretical bound on
the convergence speed of the algorithm that is close to the practical
observation.
REFERENCES
[1] F. Benevenuto, T. Rodrigues, V. Almeida, J. Almeida, and M. Gonc¸alves. Detecting
spammers and content promoters in online video social networks. In Proc. of
SIGIR, pages 620–627. ACM, 2009.
[2] P. Bonacich. Power and centrality: a family of measures. Amer. J. Sociology,
92:1170–1182, 1987.
[3] P. Boutin. What's "follow spam" on Twi(cid:138)er? http://gawker.com/5036236/
whats-follow-spam-on-twitter, August 12, 2008.
[4] G. Christodoulou, V. S. Mirrokni, and A. Sidiropoulos. Convergence and ap-
proximation in potential games. In STACS 2006, volume 3884 of Lecture Notes in
Computer Science, pages 349–360. 2006.
[5] A. Fabrikant, C. H. Papadimitriou, and K. Talwar. (cid:140)e complexity of pure Nash
equilibria. In Proc. of STOC, pages 604–612, 2004.
[6] A. Farahat, T. LoFaro, J. C. Miller, G. Rae, and L. A. Ward. Authority rankings
from hits, pagerank, and salsa: Existence, uniqueness, and e(cid:130)ect of initialization.
SIAM Journal on Scienti(cid:128)c Computing, 27(4):1181–1201, 2006.
40:35–41, 1977.
[7] L. Freemann. A set of measures of centrality based on betweenness. Sociometry,
[8] S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma, G. Korlam, F. Benevenuto,
N. Ganguly, and K. P. Gummadi. Understanding and combating link farming in
the twi(cid:138)er social network. In Proc. WWW, pages 61–70, 2012.
through a social network. In Proc. of KDD, pages 137–146, 2003.
J. Kleinberg. Authoritative sources in a hyperlinked environment. J. ACM, 46,
1999.
[11] D. Monderer and L. Shapley. Potential games. Games and Economic Behavior,
twi(cid:138)er: (cid:140)e
[12] T. O'Reilly.
asym-
http://radar.oreilly.com/2009/05/
[9] D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of in(cid:131)uence
14:124–143, 1996.
metric
goodreads-vs-twitter-asymmetric-follow.html, May 10, 2009.
bringing order to the web. 1999.
[13] L. Page, S. Brin, R. Motwani, and T. Winograd. (cid:140)e PageRank citation ranking:
Goodreads
follow.
[10]
vs
bene(cid:128)ts
of
[14] S. Russell, P. Norvig, and E. Davis. Arti(cid:128)cial intelligence: a modern approach.
Prentice Hall, 2010.
J. Song, S. Lee, and J. Kim. Spam (cid:128)ltering in twi(cid:138)er using sender-receiver
[15]
relationship. In R. Sommer, D. Balzaro(cid:138)i, and G. Maier, editors, Recent Advances
in Intrusion Detection, volume 6961 of LNCS, pages 301–317. 2011.
[16] T. Upstill, N. Craswell, and D. Hawking. Predicting fame and fortune: Pagerank
or indegree? In ADCS, 2003.
1–10, 2010.
[17] A. Wang. Don't follow me: Spam detection in twi(cid:138)er. In Proc. SECRYPT, pages
[18] S. White and P. Smyth. Algorithms for estimating relative importance in net-
[19] Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai. Uncovering social
works. In Proc. of KDD, pages 266–275, 2003.
network sybils in the wild. In Proc. IMC, pages 259–268, 2011.
10
|
1106.0359 | 1 | 1106 | 2011-06-02T02:44:26 | Composite Social Network for Predicting Mobile Apps Installation | [
"cs.SI",
"cs.HC",
"physics.soc-ph"
] | We have carefully instrumented a large portion of the population living in a university graduate dormitory by giving participants Android smart phones running our sensing software. In this paper, we propose the novel problem of predicting mobile application (known as "apps") installation using social networks and explain its challenge. Modern smart phones, like the ones used in our study, are able to collect different social networks using built-in sensors. (e.g. Bluetooth proximity network, call log network, etc) While this information is accessible to app market makers such as the iPhone AppStore, it has not yet been studied how app market makers can use these information for marketing research and strategy development. We develop a simple computational model to better predict app installation by using a composite network computed from the different networks sensed by phones. Our model also captures individual variance and exogenous factors in app adoption. We show the importance of considering all these factors in predicting app installations, and we observe the surprising result that app installation is indeed predictable. We also show that our model achieves the best results compared with generic approaches: our results are four times better than random guess, and predict almost 45% of all apps users install with almost 45% precision (F1 score= 0.43). | cs.SI | cs | Composite Social Network for Predicting Mobile Apps Installation
Wei Pan and Nadav Aharony and Alex (Sandy) Pentland
MIT Media Laboratory
20 Ames Street
Cambridge, Massachusetts 02139
Abstract
We have carefully instrumented a large portion of the
population living in a university graduate dormitory by
giving participants Android smart phones running our
sensing software. In this paper, we propose the novel
problem of predicting mobile application (known as
“apps”) installation using social networks and explain
its challenge. Modern smart phones, like the ones used
in our study, are able to collect different social net-
works using built-in sensors. (e.g. Bluetooth proximity
network, call log network, etc) While this information
is accessible to app market makers such as the iPhone
AppStore, it has not yet been studied how app mar-
ket makers can use these information for marketing re-
search and strategy development. We develop a simple
computational model to better predict app installation
by using a composite network computed from the dif-
ferent networks sensed by phones. Our model also cap-
tures individual variance and exogenous factors in app
adoption. We show the importance of considering all
these factors in predicting app installations, and we ob-
serve the surprising result that app installation is indeed
predictable. We also show that our model achieves the
best results compared with generic approaches: our pre-
diction results are four times better than random, and
reach almost 45% prediction precision with 45% recall.
1
1
0
2
n
u
J
2
]
I
S
.
s
c
[
1
v
9
5
3
0
.
6
0
1
1
:
v
i
X
r
a
the bluetooth proximity network, from phone data. However,
it remains an unknown yet important question whether these
data can be used for app marketing. Therefore, in this paper
we address the challenge of utilizing all different network
data obtained from smart phones for app installation predic-
tion.
It is natural to speculate that there are network effects in
users’ app installation, but we eventually realize that it was
very difficult to adopt existing tools from large-scale social
network research to model and predict the installation of cer-
tain mobile apps for each user due to the following facts:
1. The underlying network is not observable. While
many projects assume phone call
logs are true so-
cial/friendship networks (Zhang and Dantu 2010), others
may use whatever network that is available as the un-
derlying social network. Researchers have discovered
that call network may not be a good approximation
(Eagle and Pentland 2006). On the other hand, smart
phones can easily sense multiple networks using built-
in sensors and software: a) The call logs can be used to
form phone call networks; b) Bluetooth radio can be used
to infer proximity networks (Eagle and Pentland 2006);
c) GPS data can be used to infer user moving pat-
terns, and furthermore their working places and affilia-
tions (Farrahi and Gatica-Perez 2010); d) Social network
tools (such as the Facebook app and the Twitter app) can
observe users’ online friendship network. In this work,
our key idea is to infer an optimal composite network, the
network that best describes app installation, from multi-
ple layers of different networks easily observed by mod-
ern smart phones, rather than assuming a certain network
as the real social network explaining app installation.
2. Analysis for epidemics (Ganesh, Massouli´e, and Towsley 2005)
and Twitter networks (Yang and Leskovec 2010) is based
on the fact that network is the only mechanism for
adoption. The only way to get the flu is to catch the flu
from someone else, and the only way to retweet is to see
the tweet message from someone else. For mobile app,
this is, however, not true at all. Any user can simply open
the AppStore (on iPhones) or the Android Market (on
Android phones), browse over different lists of apps, and
pick the one that appears most interesting to the user to
install without peer influence. One big challenge, which
Introduction
projects
have
correlate with
obesity
(Colizza et al. 2007),
demonstrated
individual
research
networks
such
as
diseases
Recent
social
iors,
and
two. Many
and
lar (Eagle, Macy, and Claxton 2010) (Leskovec, Adamic, and Huberman 2007).
that
behav-
(Christakis and Fowler 2007)
name
analyzed,
popu-
becoming
increasing
large-scale
networks
are
this
field
is
to
We are interested in studying the network-based pre-
diction for mobile applications (referred as “apps”) in-
stallation, as the mobile application business is growing
rapidly (Ellison 2010). The app market makers, such as
iPhone AppStore and Android Market, run on almost all
modern smart phones, and they have access to phone data
and sensor data. As a result, app market makers can infer
different types of networks, such as the call log network and
Copyright c(cid:13) 2014, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
makes modeling the spreading of apps difficult, is that
one can install an app without any external influence
and information. One major contribution of this paper is
that we demonstrate it is still possible to build a tool to
observe network effects with such randomness.
3. The individual behavioral variance in app installation is
so significant that any network effect might possibly be
rendered unobservable from the data. For instance, some
geek users may try and install all hot apps on the market,
while many inexperienced users find it troublesome even
to go through the process of installing an app, and as a
result they only install very few apps.
4. There are exogenous factors in the app installation behav-
iors. One particular factor is the popularity of apps. For in-
stance, the Pandora Radio app is vastly popular and highly
ranked in the app store, while most other apps are not. Our
model takes this issue into account too, and we show that
exogenous factors are important in increasing prediction
precision.
Classic
diffusion models
ask each one to list their affiliations (i.e. the academic de-
partment), and rate their relationships with everyone else
in the study. We believe for app market makers the af-
filiation network can also be inferred simply by using
phone GPS/cell tower information as shown by Farrahi et
al(Farrahi and Gatica-Perez 2010). However, this is not the
focus of this work, and here we simply use survey data in-
stead. Though the friendship network is also collected using
surveys, we suggest that the app market makers can obtain
the friendship network from phones by collecting data from
social networking apps such as the Facebook and Twitter
apps. We summarize all the networks obtained from both
phones and surveys in Table 1. We refer to all networks in
Table 1 as candidate networks, and all candidate networks
will be used to compute the optimal composite network. It
should be noted that all networks are reciprocal in this work.
We want to emphasize the fact that the network data we
used in Table 1 are obtainable for app market makers such as
Apple iTunes Store, as they have access to phone sensors as
well as user accounts. Therefore, our approach in this paper
can be beneficial to them for marketing research, customized
app recommendation and marketing strategy making.
are
applicable
as Granovetter’s
such
work (Granovetter and Soong 1983)
to
simulation, but lack data fitting and prediction powers.
Statistical analysis used by social scientists such as matched
sample estimation (Aral, Muchnik, and Sundararajan 2009)
are only for identifying network effects and mechanism.
Recently works in computer science for inferring network
structure assume simple diffusion mechanism, and are
only applicable to artificial simulation data on real net-
works (Gomez Rodriguez, Leskovec, and Krause 2010) (Myers and Leskovec 2010).
On the other hand, our work addresses the above is-
sues
in practical app marketing prediction. On the
mobile-based behavioral prediction side, The closest
research is the churn prediction problem in mobile net-
works (Richter, Yom-Tov, and Slonim 2010), which uses
call logs to predict users’ future decisions of switching
mobile providers. To our knowledge, we don’t see other
related works for similar problems.
Our built-in sensing platform is constantly monitoring the
installation of mobile apps. Every time a new app is in-
stalled, this information will be collected and sent back to
our server within a day. Overall, we receive a total of 821
apps installed by all 55 users. Among them, 173 apps have
at least two users. For this analysis, we only look at app in-
stallations and ignore un-installations. We first demonstrate
statistics for all of the apps in the study: In Fig. 1(a), we plot
the distribution of number of users installing each app. We
discover that our data correspond very well with a power-
law distribution with exponential cut. In Fig. 1(b), we plot
the distribution of number of apps installed per user, which
fits well with an exponential distribution.
Data
We collected our data from March to July 2010 with 55 par-
ticipants, who are residents living in a married graduate stu-
dent residency of a major US university. Each participant
is given an Android-based cell phone with a built-in sens-
ing software developed by us. The software runs in a pas-
sive manner, and it didn’t interfere the normal usage of the
phone.
Our software is able to capture all call logs in the ex-
periment period. We therefore obtained a call log network
between all participants by treating participants as nodes
and the number of calls between two nodes as weights
for the edge in-between. The software also scans near-
by phones and other Bluetooth devices every five min-
utes to capture the proximity network between individu-
als. The counts on the number of Bluetooth hits are used
as edge weights similar to the call log network as done in
Eagle et al (Eagle and Pentland 2006). We have also col-
lected the affiliation network and the friendship network
by deploying a survey, which lists all the participants and
Fig. 1(a) and 1(b) illustrate detailed insight into our
dataset. Even with a small portion of participants, the distri-
bution characteristic is clearly observable. We find that apps
have a power-law distribution of users, which suggests that
most apps in our study community have a very small user
pool, and very few apps have spread broadly. The exponen-
tial decay in Fig. 1(b) suggests that the variance of individ-
ual user is significant: There are users having more than 100
apps installed, and there are users having only a couple of
apps.
Model
In this section, we describe our novel model for capturing
the app installation behaviors in networks. In the following
content, G denotes the adjacency matrix for graph G. Each
user is denoted by u ∈ {1, ..., U }. Each app is denoted by
u to
a ∈ {1, ..., A}. We define the binary random variable xa
represent the status of adoption (i.e. app installation): xa
u =
1 if a is adopted by user n, 0 if not.
As introduced in the previous section, the different social
relationship networks that can be inferred by phones are de-
noted by G1, ..., GM . Our model aims at inferring an opti-
mal composite network Gopt with the most predictive power
from all the candidate social networks. The weight of edge
Network
Type
Call Log Network
Undirected,Weighted
Bluetooth Proximity Network Undirected,Weighted
Undirected,Binary
Undirected,Binary
Friendship Network
Affiliation Network
Source
# of Calls
# of Bluetooth Scan Hits
Survey Results (1: friend; 0: not friend)
Survey Results (1: same; 0: different)
Notation
Gc
Gb
Gf
Ga
Table 1: Network data used in this study.
α
, α=−1.98
y= x
100
y = e
β x, β= −0.04
)
x
≥
X
(
r
P
10−1
100
)
x
≥
X
(
r
P
10−1
10−2
10−3
100
101
x (# of Users per App )
102
(a)
10−2
100
101
102
x (# of Apps Installed per User)
103
(b)
Figure 1: Circles are real data, and lines are fitting curves. Left: Distribution of number of users for each app. Right: Distribution
of number of apps each user installed.
ei,j in graph Gm is denoted by wm
in Gopt is simply denoted by wi,j.
i,j. The weight of an edge
Adoption Mechanism
One base idea of our model is the non-negative accumulative
assumption, which distinguishes our model from other linear
mixture models. We define Gopt to be:
Gopt = Xm
αmGm, where ∀m, αm ≥ 0.
(1)
The intuition behind this non-negative accumulative as-
sumption is as follows: if two nodes are connected by a cer-
tain type of network, their app installation behaviors may
or may not correlate with each other; On the other hand, if
two nodes are not connected by a certain type of network,
the absence of the link between them should lead to nei-
ther positive or negative effect on the correlation between
their app installations. As shown in Table 2 in the exper-
iment session, our non-negative assumption brings signifi-
cant performance increase in prediction. Non-negative as-
sumption also makes the model stochastic and theoretically
sound. We treat binary graphs as weighted graphs as well.
Since α1, ..., αM is the non-negative weights for each can-
didate network in describing the optimal composite network.
We later refer to the vector (α1, ..., αM ) as the optimal com-
posite vector. Our non-negative accumulative formulation is
also similar to mixture matrix models in machine learning
literature (El-Yaniv, Pechyony, and Yom-Tov 2008).
We continue to define the network potential pa(i):
where the neighbor of node i is defined by:
N (i) = {j∃m s.t. wm
i,j ≥ 0}.
(3)
The potential pa(i) can also be decomposed into poten-
tials from different networks:
wm
i,jxa
j )
,
(4)
pa(i) = Xm
αm ( Xj∈N (i)
{z
pm
a (i)
}
where pm
a (i) is the potential computed from one single can-
didate network. We can think of pa(i) as the potential of
i installing app a based on the observations of its neighbors
on the composite network. The definition here is also similar
to incoming influence from adopted peers for many cascade
models (Kempe, Kleinberg, and Tardos 2003).
Finally our conditional probability is defined as:
Prob(xa
u = 1xa
u′ : u′ ∈ N (u)) = 1 − exp(−su − pa(u)),
(5)
where ∀u, su ≥ 0. su captures the individual susceptibility
of apps, regardless of which app. We use the exponential
function for two reasons:
1. The monotonic and concave properties of f (x) = 1 −
exp(−x) matches with recent research (Centola 2010),
which suggests that the probability of adoption increases
at a decreasing rate with increasing external network sig-
nals.
2. It forms a concave optimization problem during maxi-
mum likelihood estimation in model training.
pa(i) = Xj∈N (i)
wi,j xa
j ,
(2)
As shown in the experiment section and based on our expe-
riences, this exponential model yields the best performance.
Model Training
We move on to discuss model training. During the train-
ing phase, we want to estimate the optimal values for the
α1, ..., αM and s1, ..., sU . We formalize it as an optimiza-
tion problem by maximizing the sum of all conditional like-
lihood.
Given all candidate networks, a training set composed of
u : ∀a ∈
a subset of apps TRAIN ⊂ {1, ..., A}, and {xa
TRAIN, u ∈ {1, ..., U }}, we compute:
arg
max
f (s1, ..., sU , α1, ..., αM ),
s1,...,sU ,α1,...,αM
Subject to: ∀u, su ≥ 0, ∀m, αm ≥ 0
(6)
where:
f (s1, ..., sU , α1, ..., αM )
Prob(xa
u = 1xa
u′ : u′ ∈ N (u))
u=1
= log(cid:20) Ya∈TRAIN Yu:xa
Yu:xa
u=0(cid:0)1 − Prob(xa
= Xa∈TRAIN
− Xu:xa
Xu:xa
(su + pa(u))
u=1
u=0
u = 1xa
u′ : u′ ∈ N (u))(cid:1)(cid:21)
log(1 − exp(−su − pa(u))
(7)
(8)
Gp, which can be easily plugged into our composite network
framework. Gp is constructed by adding a virtual node U +1
and one edge eU+1,u for each actual user u. The correspond-
ing weight of each edge wU+1,u for computing pa(u) is C a,
where C a is a positive number describing the popularity of
an app. In our experiment, we use the number of installations
of the app in this experimental community as C a. We have
been looking at other sources to obtain reliable estimates for
C a, but we found that the granularity from public sources to
be unsatisfying. In practice for app market makers, we argue
that C a can be easily obtained accurately by counting app
downloads and app ranks.
The exogenous factors also increase accuracy in measur-
ing network effects for a non-trivial reason: Considering
a network of two nodes connected by one edge, and both
nodes installed an app. If this app is very popular, then the
fact that both nodes have this app may not imply a strong
network effect. On the contrary, if this app is very uncom-
mon, the fact that both nodes have this app implies a strong
network effect. Therefore, introducing exogenous factors
does help our algorithm better calibrate network weights.
Experiments
Our algorithm predicts the probability of adoption (i.e.
installing an app) given its neighbor’s adoption status.
pi ∈ [0, 1] denotes the predicted probability of instal-
lation, while xi ∈ {0, 1} denotes the actual outcome.
The most common prediction measure is the Root Mean
i=1(pi − xi)2). This mea-
sure is known to assess badly the prediction method’s abil-
ity (Goel et al. 2010). Since in our dataset most users have
installed very few apps, a baseline approach can simply pre-
dict the same small pi and still achieve very low RMSE.
Square Error (RMSE = q 1
n Pn
For app marketing, the key objective is not to know
the probability prediction for each app installation, but to
rank and identify a sub-group of individuals who are more
likely to appreciate and install certain apps compared with
average users. Therefore, we mainly adopt the approach
in rank-aware measures from information retrieval prac-
tices (Manning et al. 2008). For each app, we rank the like-
lihood of adoption computed by prediction algorithms, and
study the following factors:
a) Mean Precision at k (MP-k): We select the top k indi-
viduals with highest likelihood of adoption as predicted
adopters from our algorithms, and compute precision at k
( # true adopters among k predicted adopters
). We average precisions
at k among all apps in the testing set to get MP-k. On
average each app has five users in our dataset. Therefore,
the default value for k is five in the following text. MP-
k measures algorithm’s performance on predicting most
likely nodes.
k
This is a concave optimization problem. Therefore, global
optimal is guaranteed, and there exist efficient algorithms
scalable to larger datasets (Boyd and Vandenberghe 2004).
We use a MATLAB built-in implementation here, and it usu-
ally take a few seconds during optimization in our experi-
ments.
Compared
with
works
on
inferring
net-
works (Gomez Rodriguez, Leskovec, and Krause 2010) (Myers and Leskovec 2010),
our work is different as we compute Gopt from existing can-
didates networks. In addition, we don’t need any additional
regularization term or tuning parameters in the optimization
process.
We emphasize that our algorithm doesn’t distinguish the
causality problem (Aral, Muchnik, and Sundararajan 2009)
in network effects: i.e.,we don’t attempt to understand the
different reasons why network neighbors have similar app
installation behaviors. It can either be diffusion (i.e. my
neighbor tells me), or homophily (i.e. network neighbors
share same interests and personality). Instead, our focus is
on prediction of app installation, and we leave the causality
problem as future work.
Virtual Network for Exogenous Factors
Obvious exogenous factors include the popularity and qual-
ity of an app. The popularity and quality of an app will
affect
the ranking and review of the app in the App-
Store/AppMarket, and as a result higher/lower likelihood of
adoption. We can model this by introducing a virtual graph
b) Optimal F1-score (referred later simply as F1 Score). The
optimal F1-score is computed by computing F1-scores
( 2×precision×recall
precision+recall )for each point on the Precision-Recall
curve and selecting the largest F1 value. Unlike MP-k, the
optimal F1 score is used to measure the overall prediction
performance of our algorithms. For instance, F1 = 0.5
suggests the algorithm can reach a 50% precision at 50%
recall.
Prediction using Composite Network
To begin with, we illustrate different design aspects for our
algorithm.
To demonstrate the importance of modeling both net-
works and individual variances in our model, we here
demonstrate the prediction performance with five configu-
rations using a 5-fold cross-validation: a) to model both in-
dividual variance and network effects; b) to model both indi-
vidual variance and network effects, but exclude the virtual
network Gp capturing exogenous factors; c) to model with
only individual variance (by forcing αm = 0 in Eq. 6), d) to
model with only network effects (by forcing su = 0, ∀u),
and e) to model with network effects while allowing the
composite vector to be negative. The results are illustrated
in Table 2.
We find the surprising results that app installations are
highly predictable with individual variance and network in-
formation as shown in Table 2. In addition, Table 2 clearly
suggests that all our assumptions for the model are indeed
correct, and both individual variance and network effects
play important roles in app installation mechanism, as well
as the exogenous factors modeled by Gp.
We also notice that while accuracy almost doubles, it is
often impossible to realize this improvement using RMSE.
Therefore, we will not RMSE for the rest of the work.
work related to app prediction with multiple networks, we
here compare prediction performance with some alternative
approaches we can think of.
Since it is practically difficult to observe every user app
installation behaviors, in our experiments we also want to
test the performance of each algorithm when the test set is
small. In particular, we evaluate the performance of differ-
ent implementations with two approaches for cross valida-
tion: 1) Normal-size training set: We randomly choose half
of all the apps in the dataset as the training set, and test on
the other half of the dataset. 2) Small-size training set: We
randomly choose only 20% of all the app installations in our
dataset as the training set, and test on the the rest 80% apps.
In both cases, we repeat the process for five times for cross
validation and take average of the results.
our
For
feed
it with
algorithm, we
networks
Gp, Ga, Gb, Gf and Gc obtained by phones and sur-
veys as described previously. For SVM, we apply two
different approaches in predictions:
• We don’t consider the underlying network, but simply use
the adoption status of all other nodes as the features for
each node. We test this approach simply to establish a
baseline for prediction. We refer it as “SVM-raw”.
• We compute the potential pm
a (i) for each candidate net-
work Gm, and we use all the potentials from all candi-
date networks as features. Therefore, we partially borrow
some ideas from our own model to implement this SVM
approach. We refer this approach as “SVM-hybrid”.
e
r
o
c
S
1
F
0.5
0.4
0.3
0.2
0.1
0
Rando m
a
G
Gf
b
G
c
G
O ur Approach
Figure 2: We demonstrate the prediction performances using
each single network here. For comparison, we also show the
result of random guess, and the result using our approach,
which combines all potential evidence.
We now illustrate the prediction performance when our
algorithm is only allowed to use one single network. The
results are shown in Fig. 2. We find that except the affilia-
tion network, almost all other networks predict well above
chance level. The call log network seems to achieve the best
results. We conclude that while network effects are strong in
app installations, a well-crafted model such as our approach
can vastly increase the performance by computing the com-
posite network and counting other factors in.
Prediction Performance
We now test the performance of our model with some other
implementations for predictions. As there is no other closer
a
use
implementation
We
(Chang and Lin 2001), which is capable of generating
probabilistic predictions rather than binary predictions.
modern
SVM
We also replace Eq. 5 with a linear regression model by
using pm
a (i), ∀m together with # of apps per user (instead
of learning su in our MLE framework) as independent vari-
ables. We call this approach “Our Approach (Regression)”
in the following text to distinguish the difference. We also
force the non-negative accumulation assumption in the re-
gression setting.
Results for both the normal-size training set and the small-
size training set are shown in Table 3, and we discover that
our algorithm outperforms other competing approaches in
all categories. However, we notice that with many our model
assumptions, generic methods can also achieve reasonably
well results. Performance on half of the users that are less
active in app installation is also shown. Because this group
of users are very inactive, they may be more susceptible to
network influence in app installation behaviors. We notice
that our algorithm performs better in this group with more
than 10% improvement over other methods.
Predicting Future Installations
In app marketing, one key issue is to predict future app in-
stallations. Predicting future app adoption at time t in our
model is equivalent to predicting installation with part of the
neighbor adoption status unknown. These unknown neigh-
bors who haven’t adopted at time t may or may not adopt at
t′ > t. Though our algorithm is trained without the informa-
tion of time of adoption, we show here that the inferred in-
Net.+ Ind. Var. + Exogenous Factor
Net. + Ind. Var.
Ind. Variance Only
Net. Only (non-negative)
Net. Only (allow negative)
RMSE MP-5 F1 Score
0.25
0.26
0.29
0.26
0.30
0.31
0.29
0.097
0.24
0.12
0.43
0.42
0.24
0.37
0.12
Table 2: The performance of our approach under five different configurations. We observe that modeling both individual vari-
ance and networks are crucial in performance as well as enforcing non-negative composition for candidate networks as in Eq.
1.
Methods
Our Approach
SVM-raw
SVM-hybrid
Our Approach (Regression)
Random Guess
Using 20% as Training Set Using 50% as Training Set Using 50% as Training Set
All Users
MP-5
0.28
0.17
0.14
0.27
0.081
Low Activity Users
MP-5
0.20
0.14
0.16
0.18
0.076
All Users
MP-5
0.31
0.24
0.27
0.30
0.081
0.43
0.27
0.30
0.39
0.14
F1 Score
0.46
0.26
0.29
0.42
0.17
F1 Score
F1 Score
0.43
0.32
0.30
0.41
0.17
Table 3: Prediction performance for our algorithm and competing methods is shown.
dividual variance su and composite vector (α1, ..., αM ) can
be used to predict future app adoption.
We here apply the following cross-validation scheme to
test our algorithm’s ability in predicting future installations:
For the adopters of each app, we split them to two equal-size
groups by their time of adoption. Those who adopted earlier
are in G1, and those who adopted later are in G2. The train-
ing phase is the same as the previous section; In the testing
phase, each algorithm will only see adoption information for
subjects in G1, and predict node adoption for the rest. The
nodes in G2 will be marked as non-adopters during predic-
tion phase.
Results from cross validation are shown in Table 4. We
notice that our algorithm still maintains the best perfor-
mance and limited decrease in accuracy compared with Ta-
ble 3. Since the number of adopted nodes are fewer than
those in Table 3, we here show MP with smaller k in Table
4.
Our Approach
SVM-hybrid
Our(Regression)
Random
MP-k
k = 4
0.16
0.13
0.15
0.045
k = 5
0.15
0.12
0.14
0.045
F1 Score
0.35
0.32
0.33
0.090
k = 3
0.18
0.15
0.17
0.045
Table 4: MP-k and F1 scores for predicting future app in-
stallations are shown above.
Notice in Table 4 that the random guess precision is re-
duced by half. Therefore, even the precision here is 30%
lower than in Table 3, it is mainly due to the fact that nodes
in G1 are no longer in the predicting set. Our accuracy is
considerable as it is four times better than random guess.
Predictions With Missing Historical Data
In practice, sometimes it is not possible to observe the app
installation for all users due to privacy reasons. Instead, for
app market markers they may only be allowed to observe and
instrument a small subset of a community. We here want to
study if it is still possible to make some prediction in app
installations under such circumstance.
To formally state this problem, we assume that all the
nodes 1, ..., U are divided into two groups. The observable
group G1 and the unobservable group G2. During cross val-
idation, only nodes in the observable group are accessible to
our algorithms in the training process, and nodes in the un-
observable group are tested with the prediction algorithms.
Therefore, for our algorithm, even the individual variance
su, u ∈ G1 is computed in the training process, we will not
have su′ , u′ ∈ G2 for Eq. 5 in the testing phase. We illustrate
the prediction precision results in Fig. 3. It seems that even
trained on a different set of subjects without calibrating users
variance, the composite vector learned by our algorithm can
still be applied to another set of users and achieve 80% over
random guess.
Conclusion
Our contributions in this paper include a) We show the data
of a novel mobile phone based experiments on the app in-
stallation behavior; b) We illustrate that there are strong net-
work effects in app installation patterns even with tremen-
dous uncertainty in app installation behavior; c) We show
that by combining measurable networks using modern smart
phones, we can maximize the prediction accuracy; d) We de-
velop a simple discriminative model which combines indi-
vidual variance, multiple networks and exogneous factors,
and our model provides prediction accuracy four times bet-
ter than random guess in predicting future installations.
Future works include the causality problem in studying
0.2
0.15
P
M
0.1
0.05
0
Our Approach
SVM−hybrid
Our Approach(Regression)
Random Guess
50%
20%
Percentage of All Subjects Used for Training
Figure 3: The MP from our approach and two comparison
approaches. We here set k for MP to be the average number
of users in G2 for each testing app.
network phenomena and a temporal model for app adoption.
We believe the former one can be done with a much care-
fully crafted lab experiments. For the latter one, we have
attempted multiple temporal adoption models but failed.We
suspect that the mechanism of temporal diffusion of apps is
very complicated, and we leave this as a future work.
Though our convex optimization framework is fast and
reasonably scalable, it should be noted that still the proposed
method in this paper may not be suitable to handle data from
billions of cell phone users. Potential solutions include di-
viding users into small clusters and then conquering, and
sampling users for computation. The scalability problem re-
mains a future work.
Acknowledgements
The authors want to thank Cory Ip for her remarkable efforts
in managing the study, Dr. Riley Crane and Yves-Alexandre
de Montjoye for helpful discussions, and the anonymous
reviewers for their valuable comments. This research was
sponsored by AFOSR under Award Number FA9550-10-1-
0122. The views and conclusions contained in this document
are those of the authors and should not be interpreted as rep-
resenting the official policies, either expressed or implied, of
AFOSR or the U.S. Government.
References
[Aral, Muchnik, and Sundararajan 2009] Aral, S.; Muchnik,
L.; and Sundararajan, A. 2009. Distinguishing influence-
based contagion from homophily-driven diffusion in dy-
namic networks. Proceedings of the National Academy of
Sciences 106(51):21544.
[Boyd and Vandenberghe 2004] Boyd, S.,
and Vanden-
berghe, L. 2004. Convex optimization. Cambridge Univ
Pr.
The Spread of Be-
[Centola 2010] Centola, D.
havior in an Online Social Network Experiment. science
329(5996):1194.
Lin,
[Chang and Lin 2001] Chang,
C.-J.
sup-
at
port
http://www.csie.ntu.edu.tw/cjlin/libsvm.
vector machines.
Software
LIBSVM:
a
library
for
2010.
2001.
C.-C.,
and
available
[Christakis and Fowler 2007] Christakis, N., and Fowler, J.
2007. The spread of obesity in a large social network over
32 years. New England Journal of Medicine 357(4):370.
[Colizza et al. 2007] Colizza, V.; Barrat, A.; Barthelemy, M.;
Valleron, A.; and Vespignani, A. 2007. Modeling the world-
wide spread of pandemic influenza: Baseline case and con-
tainment interventions. PLoS Medicine 4(1):95.
[Eagle and Pentland 2006] Eagle, N., and Pentland, A. 2006.
Reality mining: sensing complex social systems. Personal
and Ubiquitous Computing 10(4):255–268.
[Eagle, Macy, and Claxton 2010] Eagle, N.; Macy, M.; and
Claxton, R. 2010. Network diversity and economic devel-
opment. Science 328(5981):1029.
[Eagle, Pentland, and Lazer 2009] Eagle, N.; Pentland, A.;
and Lazer, D. 2009. Inferring friendship network structure
by using mobile phone data. Proceedings of the National
Academy of Sciences 106(36):15274.
[El-Yaniv, Pechyony, and Yom-Tov 2008] El-Yaniv,
R.;
Pechyony, D.; and Yom-Tov, E. 2008. Better multiclass
classification via a margin-optimized single binary problem.
Pattern Recognition Letters 29(14):1954–1959.
[Ellison 2010] Ellison, S. 2010. Worldwide and U.S. Mobile
Applications, Storefronts, and Developer 20102014 Fore-
cast and Year-End 2010 Vendor Shares: The ”Appification”
of Everything.
[Farrahi and Gatica-Perez 2010] Farrahi, K., and Gatica-
Perez, D. 2010. Probabilistic Mining of Socio-Geographic
Routines From Mobile Phone Data. Selected Topics in Sig-
nal Processing, IEEE Journal of 4(4):746–755.
[Ganesh, Massouli´e, and Towsley 2005] Ganesh, A.; Mas-
souli´e, L.; and Towsley, D. 2005. The effect of network
topology on the spread of epidemics. In INFOCOM 2005.
24th Annual Joint Conference of the IEEE Computer and
Communications Societies. Proceedings IEEE, volume 2,
1455–1466. IEEE.
[Goel et al. 2010] Goel, S.; Reeves, D.; Watts, D.; and Pen-
nock, D. 2010. Prediction without markets. In Proceedings
of the 11th ACM conference on Electronic commerce, 357–
366. ACM.
[Gomez Rodriguez, Leskovec, and Krause 2010]
Gomez Rodriguez, M.; Leskovec, J.; and Krause, A.
2010.
In
Proceedings of
the 16th ACM SIGKDD international
conference on Knowledge discovery and data mining,
1019–1028. ACM.
[Granovetter and Soong 1983] Granovetter, M., and Soong,
R. 1983. Threshold models of diffusion and collective be-
havior. The Journal of Mathematical Sociology 9(3):165–
179.
[Kempe, Kleinberg, and Tardos 2003] Kempe, D.; Klein-
berg, J.; and Tardos, ´E.
2003. Maximizing the spread
of influence through a social network.
In Proceedings
of the ninth ACM SIGKDD international conference on
Knowledge discovery and data mining, 137–146. ACM.
[Leskovec, Adamic, and Huberman 2007] Leskovec,
Inferring networks of diffusion and influence.
J.;
Adamic, L.; and Huberman, B. 2007. The dynamics of viral
marketing. ACM Transactions on the Web (TWEB) 1(1):5.
[Manning et al. 2008] Manning, C.; Raghavan, P.; Schutze,
H.; and Corporation, E. 2008.
Introduction to informa-
tion retrieval, volume 1. Cambridge University Press Cam-
bridge, UK.
[Myers and Leskovec 2010] Myers, S., and Leskovec, J.
2010. On the convexity of latent social network inference.
Arxiv preprint arXiv:1010.5504.
[Richter, Yom-Tov, and Slonim 2010] Richter, Y.; Yom-Tov,
E.; and Slonim, N. 2010. Predicting customer churn in mo-
bile networks through analysis of social groups. In Proceed-
ings of the 2010 SIAM International Conference on Data
Mining (SDM 2010).
[Yang and Leskovec 2010] Yang, J., and Leskovec, J. 2010.
Modeling Information Diffusion in Implicit Networks.
[Zhang and Dantu 2010] Zhang, H., and Dantu, R. 2010.
Discovery of Social Groups Using Call Detail Records. In
On the Move to Meaningful Internet Systems: OTM 2008
Workshops, 489–498. Springer.
|
1610.06941 | 2 | 1610 | 2016-11-21T17:05:07 | Recovering Metabolic Networks using A Novel Hyperlink Prediction Method | [
"cs.SI",
"q-bio.MN"
] | Studying metabolic networks is vital for many areas such as novel drugs and bio-fuels. For biologists, a key challenge is that many reactions are impractical or expensive to be found through experiments. Our task is to recover the missing reactions. By exploiting the problem structure, we model reaction recovery as a hyperlink prediction problem, where each reaction is regarded as a hyperlink connecting its participating vertices (metabolites). Different from the traditional link prediction problem where two nodes form a link, a hyperlink can involve an arbitrary number of nodes. Since the cardinality of a hyperlink is variable, existing classifiers based on a fixed number of input features become infeasible. Traditional methods, such as common neighbors and Katz index, are not applicable either, since they are restricted to pairwise similarities. In this paper, we propose a novel hyperlink prediction algorithm, called Matrix Boosting (MATBoost). MATBoost conducts inference jointly in the incidence space and adjacency space by performing an iterative completion-matching optimization. We carry out extensive experiments to show that MATBoost achieves state-of-the-art performance. For a metabolic network with 1805 metabolites and 2583 reactions, our algorithm can successfully recover nearly 200 reactions out of 400 missing reactions. | cs.SI | cs | Recovering Metabolic Networks using A Novel Hyperlink Prediction Method
Muhan Zhang1, Zhicheng Cui1, Tolutola Oyetunde2, Yinjie Tang2, and Yixin Chen1
1Department of Computer Science and Engineering, Washington University in St. Louis
2Department of Energy, Environmental & Chemical Engineering, Washington University in St. Louis
{muhan, z.cui, toyetunde, yinjie.tang}@wustl.edu, [email protected]
6
1
0
2
v
o
N
1
2
]
I
S
.
s
c
[
2
v
1
4
9
6
0
.
0
1
6
1
:
v
i
X
r
a
Abstract
Studying metabolic networks is vital for many areas such as
novel drugs and bio-fuels. For biologists, a key challenge is
that many reactions are impractical or expensive to be found
through experiments. Our task is to recover the missing re-
actions. By exploiting the problem structure, we model reac-
tion recovery as a hyperlink prediction problem, where each
reaction is regarded as a hyperlink connecting its participat-
ing vertices (metabolites). Different from the traditional link
prediction problem where two nodes form a link, a hyperlink
can involve an arbitrary number of nodes. Since the cardinal-
ity of a hyperlink is variable, existing classifiers based on a
fixed number of input features become infeasible. Traditional
methods, such as common neighbors and Katz index, are not
applicable either, since they are restricted to pairwise similar-
ities. In this paper, we propose a novel hyperlink prediction
algorithm, called Matrix Boosting (MATBoost). MATBoost
conducts inference jointly in the incidence space and adja-
cency space by performing an iterative completion-matching
optimization. We carry out extensive experiments to show
that MATBoost achieves state-of-the-art performance. For a
metabolic network with 1805 metabolites and 2583 reactions,
our algorithm can successfully recover nearly 200 reactions
out of 400 missing reactions.
Introduction
Reconstructed metabolic networks are important tools for
understanding the metabolic basis of human diseases, in-
creasing the yield of biologically engineered systems, and
discovering novel drug targets (Bordbar et al. 2014). Semi-
automated procedures have been recently developed to re-
construct metabolic networks from annotated genome se-
quences (Thiele and Palsson 2010). However, these net-
works are often incomplete -- some reactions can be missing
from them, which can severely impair their utility (Kumar,
Dasika, and Maranas 2007). Thus, it is critical to develop
accurate computational methods for completing metabolic
networks. A method that can automatically recover missing
reactions in metabolic networks is much desired.
Link prediction (Liben-Nowell and Kleinberg 2007; Lu
and Zhou 2011) has been studied broadly in recent years
(Singh and Gordon 2008; Miller, Jordan, and Griffiths 2009;
Rendle et al. 2009; Menon and Elkan 2011; Cao, Kong, and
Yu 2014; Chen et al. 2015; Ermis¸, Acar, and Cemgil 2015;
Song, Meyer, and Tao 2015; Wu et al. 2016). Existing meth-
ods can be grouped into three types:
topological feature-
based approaches, latent feature-based approaches, and su-
pervised learning approaches. Popular criterions and meth-
ods include common neighbors, Jaccard coefficients (Liben-
Nowell and Kleinberg 2007), Katz index (Katz 1953), and
latent feature models (Miller, Jordan, and Griffiths 2009;
Rendle et al. 2009; Menon and Elkan 2011) et al. How-
ever, these approaches are restricted to predicting pairwise
relations. None of them are directly applicable to predicting
hyperlinks. A hyperlink relaxes the assumption that only
two nodes can participate in a link.
Instead, an arbitrary
number of nodes are allowed to jointly form a hyperlink. A
network made up of hyperlinks is called a hypernetwork or
hypergraph.
Many complex networks are actually hypernetworks. Ex-
amples include biological networks, social networks with
group relations, and citation networks.
In metabolic net-
works, every reaction can be regarded as a hyperlink among
its component metabolites. A hypernetwork can be naturally
represented as an incidence matrix S, where each column of
S is a hyperlink and each row represents a vertex. If vertex i
participates in hyperlink j, then Sij = 1, otherwise Sij = 0.
In this paper, we model metabolic reaction recovery as a hy-
perlink prediction problem in hypernetworks. For metabolic
networks, the S matrix is also known as the Binary Stoichio-
metric Matrix. Figure 1 shows an example.
Although hypernetworks are common in the real world,
there are still limited research on hyperlink prediction. One
great challenge lies in the variable cardinality of hyperlinks.
Existing classifiers for link prediction are based on a fixed
number of input features (e.g., concatenating features of ver-
tex a and features of vertex b). However, in hyperlink predic-
tion, the number of vertices in a hyperlink is variable, which
makes existing methods inapplicable. On the other hand,
link prediction methods based on topological features, such
as common neighbors, cannot be applied to hyperlink pre-
diction either. The reason is that these measures are defined
for pairs of nodes (links) instead of hyperlinks. A few basic
methods for hyperlink prediction have poor performance on
recovering metabolic networks. In summary, hyperlink pre-
diction is an important, interesting, yet rarely touched chal-
lenging problem.
In this paper, we introduce a novel hyperlink prediction
algorithm for recovering metabolic networks. Our key ob-
servation is that a hyperlink s (a column vector in an inci-
dence matrix) can be transformed into its equivalent matrix
expression in the vertex adjacency space by ssT.
In this
way, we are able to first infer the pairwise relationships be-
tween vertices leveraging existing link prediction methods,
and then recover the missing hyperlinks through constrained
optimization. Based upon this, we propose a two-step EM-
like optimization method, which alternately performs a C
step (completion) and an M step (matching) to find the best
hyperlinks. We call the resulting algorithm Matrix Boost-
ing (MATBoost). We compare our algorithm with six base-
line methods on eight metabolic networks from five species.
Experimental results demonstrate that our algorithm outper-
forms the state-of-the-art methods by a large margin on re-
covering missing metabolic reactions.
Reaction Recovery as Hyperlink Prediction
One significant difference between link prediction and hy-
perlink prediction is the total number of possible links / hy-
perlinks. For a network with M vertices, the total number of
links is O(M 2), while the total number of hyperlinks will be
O(2M ). This prevents us from giving a score to every possi-
ble hyperlink like what we do in link prediction. Therefore,
we consider a transductive inference setting, where a set of
test hyperlinks are given as candidates, and we only classify
the given test examples instead of classifying all. This set-
ting is natural in practical applications. For instance, in the
reaction prediction task, we do not need to consider all 2M
possible reactions since most of them do not contain biolog-
ical meanings. Instead, we restrict the candidate hyperlinks
to be within a universal reaction pool. This pool is the set of
all known metabolic reactions. Consequently, our task is to
classify which reactions in the pool are the missing reactions
for a specific metabolic network.
Problem definition and notations
We formally define the missing reaction recovery problem as
follows: Given an M × N S binary stoichiometric matrix S
(M metabolites and N S reactions) of a metabolic network,
we assume that several reactions are missing from it. We de-
note these missing columns by ∆S. We also have a universal
reaction pool, whose binary stoichiometric matrix is denoted
by U. U contains all known metabolic reactions, including
both positive reactions (∆S) as well as negative reactions
which do not belong to this metabolic network. Our task
is to recover/predict as many missing reactions from U as
possible. The corresponding hyperlink prediction problem
is parallel. Given a training incidence matrix S (where some
column hyperlinks ∆S are missing) and a testing incidence
matrix U (the candidate hyperlinks to select from), we aim
to predict which columns in U belong to ∆S.
For an incidence matrix S, we can project it into the vertex
adjacency space by A = SST. A is the weighted adjacency
matrix where Aij is the number of hyperlinks that vertices i
and j both participate in. In systems biology, A is called the
Compound Adjacency Matrix.
Matrix Boosting Algorithm
We illustrate the proposed Matrix Boosting (MATBoost) al-
gorithm in Figure 1. The overall framework is as follows.
Input: Initial training adjacency matrix A = SST,
candidate hyperlinks U, initial zero prediction scores
Λ0, maximum iteration number Imax.
Repeat from k = 1:
a) Update A, set:
Ak = A + [U Λk−1U T]A.
(1)
b) The C (completion) step: Input Ak, output the
matrix completion results ∆ Ak.
c) The M (matching) step: Input ∆ Ak, output the
prediction scores Λk.
If Λk − Λk−1F ≥
d) Stopping criterion:
Λk−1−Λk−2F or k = Imax, stop the algorithm;
otherwise k ← k + 1 and repeat from step a).
k−2(cid:88)
Output: The final prediction scores:
¯Λ =
1
k − 2
Λi.
i=1
(2)
We now explain each step in the following subsections.
Building block 1: decomposition of the adjacency
matrix
Since direct inference in the incidence space is difficult (due
to the variable cardinality of hyperlinks), we first project hy-
perlinks into their vertex adjacency space and infer their ver-
tex interactions. Given the training hyperlinks S, we can cal-
culate the training adjacency matrix by A = SST. However,
since S is not complete (some columns ∆S are missing), the
resulting A is also incomplete.
Because ∆S is missing, the complete incidence matrix
should be [ S ∆S ]. We can calculate its adjacency matrix as
follows:
[ S ∆S ] [ S ∆S ]T = SST + ∆S∆ST
= A + ∆A,
(3)
where we define ∆A = ∆S∆ST. We notice that since hy-
perlinks ∆S are missing, the adjacency matrix A also incurs
a loss ∆A. If we can accurately recover ∆A, we will be able
to infer ∆S consequently.
A straightforward idea is to perform link prediction on
∆A using A. However, this will cause problems because
∆A may overlap with A at some entries, while existing link
prediction methods require that training links A and testing
links ∆A are fully separated.
To fix this issue, we first decompose A + ∆A as follows:
A + ∆A = A + [∆A]A
(cid:125)
(cid:124) (cid:123)(cid:122) (cid:125)
+ [∆A] ¯A
∆A−
,
A+
(cid:123)(cid:122)
(cid:124)
(cid:26) Xij,
0,
where we have used [X]A to denote the operation that only
keeps the entries of X at A's nonempty entries and mask all
else, which is defined as:
[Xij]A =
if Aij (cid:54)= 0
if Aij = 0.
(4)
(5)
Figure 1: An illustration of MATBoost. The training incidence matrix S is first transformed to its adjacency matrix A. A has many missing
entries some of which are from ∆S. The C (completion) step uses matrix factorization to complete the missing entries. The M (matching)
step will search for the best matches from the candidate matrix U by solving a constrained optimization. The matched hyperlinks will then
be added to A in order to correct A's bias. This procedure is iterated several times to boost the performance.
[X] ¯A is conversely defined as keeping X only at A's empty
entries.
Equation (4) decomposes the complete adjacency matrix
into A+ and ∆A−. A+ is the training adjacency matrix A
plus the entries of ∆A that overlap with A. ∆A− is ∆A
discarding its entries that overlap with A. Such a decom-
position ensures that A+ and ∆A− are isolated from each
other. Our goal is thus to leverage A+ to predict ∆A−, and
subsequently, to recover ∆S.
Building block 2: the completion step
We first assume that A+ is known (which is not true be-
cause ∆A is unknown beforehand, we will show how to it-
eratively approximate it later). Then predicting ∆A− can be
regarded as a matrix completion (Cand`es and Recht 2009)
or weighted link prediction problem (Lu and Zhou 2010).
Concretely, we aim to complete the empty entries of A+,
which we denote by ∆ A.
Ideally, the predicted ∆ A will
resemble ∆A− by having large values at ∆A−'s nonempty
entries and near-zero values at other places.
(cid:88)
In this paper, we adopt matrix factorization (Koren, Bell,
and Volinsky 2009) to infer ∆A− because it is fast and ac-
curate. The optimization problem is as follows:
ij − yij2
2 + γR(Θ),
k(cid:88)
minimize
A+
i<j,A+
ij >0
where yij = w0 + wi + wj +
vif vjf ,
(6)
Θ
Θ is the set of all parameters w0, wi, wj, vif , vjf .
f =1
The optimization only uses half of the training entries since
the adjacency matrix A+ is symmetric. After training, we
can complete the empty entries by:
(cid:40)
∆ Aij =
w0 + wi + wj + vT
0,
ij (cid:54)= 0.
if A+
i vj,
if A+
ij = 0,
(7)
Building block 3: the matching step
In the matching step, we aim to select a a batch of hyperlinks
from U that best match the predicted ∆ A. Firstly, we define
a diagonal matrix Λ containing the selection indicators λi
for the ith hyperlink in U. λi is 1 if hyperlink i is selected
and 0 otherwise.
Now consider the optimization problem as follows:
[U ΛU T] ¯A − ∆A−2
minimize
F ,
subject to λi ∈ {0, 1}, i = 1 ... N U ,
Λ
λ1
,
where Λ =
λ2
...
λN U
(8)
N U is the number of columns in U,
· F is the Frobenius norm.
Theorem 1. The optimization problem (8) is an integer least
square problem with the ground-truth indicators Λ∗ being a
global minimum of it. (proof in the supplemental material)
In practice, we will substitute ∆ A for ∆A− in (8) to solve
Λ. However, integer least square (ILSQ) optimization is NP
hard. When N U is large (usually thousands in metabolic
networks), it is generally intractable. Therefore, we pro-
pose a constrained lasso regression instead. The optimiza-
?10011001010000010111000100011110000100010001010000001100010001000010100010000121211212211123221312211121211112120212101122321211310120210101100Completion StepMatching StepUpdate AOutput PredictionsA=SST0001101101001001001001011001111001010000100101001000010101010101010100001110000101010100001+ SAk=A+[U⇤k 1UT]A AkUSS:thebinarystoichiometricmatrixofametabolicnetwork,wherecolumnsrepresentreactionsandrowsrepresentmetabolites. S:themissingreactionstopredict.U:theuniversalreactionpool,whichcontainsallknownreactions.A:thecompoundadjacencymatrixofS.Ak:thecorrectedadjacencymatrixatthekthiteration. Ak:thematrixcompletionresults(inred)atthekthiteration.Notations:tion problem is as follows:
[U ΛU T] ¯A − ∆ A2
minimize
F + α
subject to 0 ≤ λi ≤ 1, i = 1 ... N U ,
Λ
λi,
(9)
i=1
N U(cid:88)
,
λ1
where Λ =
λ2
...
λN U
The above optimization relaxes the integer λi to be con-
tinuous within [0, 1]. Because of the limited number of hy-
perlinks in U that contribute to ∆A−, we add an lasso (L1)
penalty to preserve the sparsity of solutions. We solve the
above optimization using subgradient methods. After get-
ting the prediction scores λi, we can rank the hyperlinks in
U and select the top ones as our predictions of the missing
hyperlinks.
Combine all: boosting via iterative optimization
In the completion step, we have assumed that A+ = A +
[∆A]A is known in order to separate ∆A− from A+ and
infer ∆A−. Notice that A+ is essentially the training ad-
jacency matrix A plus the overlapping entries of the miss-
ing hyperlinks ∆S∆ST. Thus, to approximate the unknown
A+, we propose to iteratively add the predicted missing hy-
perlinks U ΛU T into A (Λ is real matrix now) to remedy its
bias from the real A+.
Given the last iteration's prediction scores Λk−1, we
first update Ak by adding to A the predicted hyperlinks
[U Λk−1U T]A from the last iteration. After getting Ak,
which is an approximation of A+, the algorithm performs
the C step and M step subsequently. MATBoost performs
this procedure in an iterative fashion and outputs the aver-
age prediction scores in order to boost the performance. It is
further equipped with an early stopping criterion which we
will explain in the next section.
Algorithm Analysis
We provide two different views of the MATBoost algorithm
in this section. First we define some notations:
Definition 1. We define the C (completion) step (6) and (7)
as a map Tc : A → A, where A is the space of adjacency
matrices A. Tc takes an incomplete adjacency matrix Ak as
input and outputs the predictions ∆ Ak.
Definition 2. We define the M (matching) step (9) as a map
Tm : A → L , where L is the space of diagonal prediction
score matrices Λ. Tm takes the predictions ∆ Ak as input
and outputs the prediction scores Λk.
A coordinate descent view
MATBoost may be viewed as an example of coordinate de-
scent algorithms. In the C step, we fix Λ and update ∆ A. In
the M step, we fix ∆ A and update Λ. Concretely, MATBoost
can be viewed as an alteration between the two steps:
C (completion) step:
Fix Λk−1, update ∆ A by ∆ Ak = Tc(A +
[U Λk−1U T]A).
M (matching) step:
Fix ∆ Ak, update Λ by Λk = Tm(∆ Ak).
A fixed-point view
Here we discuss the convergence properties and the stopping
criterion of MATBoost under a fixed-point view.
Definition 3. We define one iteration of both C and M steps
as a map Tcm : L → L . Tcm takes the Λk−1 from the last
iteration as input and outputs the new prediction scores Λk.
Equivalently, Tcm(Λk−1) = Tm(Tc(A + [U Λk−1U T]A)).
Having defined Tcm, we find that the MATBoost algo-
rithm can be expressed as a fixed-point iteration algorithm
(Khamsi and Kirk 2011), where the algorithm iteratively
takes the intermediate result Λk = Tcm(Λk−1) as input to
get Λk+1, Λk+2... until the stopping criterion is satisfied.
Now we introduce the Banach fixed-point theorem.
Theorem 2. (Banach fixed-point theorem (Palais 2007)) If
Tcm is a contraction mapping, then MATBoost will itera-
tively converge to a fixed-point Λ∗, which satisfies Λ∗ =
Tcm(Λ∗).
Theorem 3. If Tcm is a contraction mapping defined on the
metric space (L, d) and d(Λx, Λy) = Λx − ΛyF , then the
intermediate results Λ1, ..., Λk−2 of MATBoost satisfy the
following inequality for any k > 2:
Λk−1−Λk−2F < Λl−1−Λl−2F , ∀ 2 ≤ l < k. (10)
Besides, Λk−2 is the closest point to Λ∗ among Λ0, ..., Λk−2.
(proof in the supplemental material)
From Theorem 3 we see that Λk − Λk−1F < Λk−1 −
Λk−2F for all k is a necessary condition for Tcm being a
contraction mapping on (L, d). Recall that the stopping cri-
terion in MATBoost is Λk−Λk−1F ≥ Λk−1−Λk−2F .
We can see that it is essentially tracking this necessary con-
dition. Once it is broken, the fixed-point iteration will stop
converging. And the algorithm will stop the iteration earlier
by outputting the average scores before iteration k − 1.
Since Tcm(Λ∗)− Λ∗F = 0, we may also regard Λk −
Λk−1F = Tcm(Λk−1) − Λk−1F as a measure of how
close the iteration k − 1 is to convergence.
In practice, we find that Λk − Λk−1F typically drops
sharply in the first iteration, then keeps decreasing for a few
rounds, and then starts to fluctuate around a small value. In-
stead of using the last Λk−2, we find that using the mean
scores of Λ1 to Λk−2 usually achieves higher performance.
We have Theorem 4 to explain it.
Theorem 4. The MATBoost algorithm is an ensemble of k−
2 weak learners of Tcm with different input matrices A +
[U ΛiU T]A, i from 0 to k − 3.
Proof. It is easy to prove by noticing that Λ1 to Λk−2 are
just the outputs of Tcm(Λ0) to Tcm(Λk−3). Thus the final
prediction scores can be written as:
¯Λ =
1
k − 2
Λi =
1
k − 2
Tcm(Λi).
(11)
k−2(cid:88)
i=1
k−3(cid:88)
i=0
The theorem follows.
Remark: We may regard A+[U ΛiU T]A as noisy samplings
of A+. Therefore, MATBoost can benefit from ensemble
learning which is expected to improve performance.
Related Work
Although hyperlinks are common in real world and can be
used to model multi-way relationships, currently there are
still limited research on hyperlink prediction. Xu et al.
(Xu, Rockmore, and Kleinbaum 2013) proposed a super-
vised HPLSF framework to predict hyperlinks in social net-
works. To deal with the variable number of features, HPLSF
uses their entropy score as a fixed-length feature for train-
ing a classification model. To our best knowledge, this is
the only algorithm that is specifically designed for hyperlink
prediction in arbitrary-cardinality hypernetworks.
Nevertheless, learning with hypergraphs as a special data
structure is popular in the machine learning community,
e.g., semi-supervised learning with hypergraph regulariza-
tion (Yu, Tao, and Wang 2012; Tian, Hwang, and Kuang
2009), modeling label correlations via hypernetworks in
multi-label learning (Sun, Ji, and Ye 2008), and modeling
communities to improve recommender systems (Bu et al.
(Zhou, Huang, and Scholkopf 2006)
2010). Zhou et al.
studied spectral clustering in hypergraphs. They generalized
the normalized cut (Shi and Malik 2000) algorithm to hy-
pergraph clustering and proposed a hypergraph Laplacian.
They also adapted their previous semi-supervised learning
algorithm using graph regularization (Zhou, Huang, and
Scholkopf 2005) to hypergraph vertex classification. These
research mainly aim to improve the learning performance
on nodes by leveraging their hyperlink relations. However,
none of them focuses on predicting the hyperlink relations.
Experimental Results
effectiveness of
the
(MATBoost)
algorithm in
the proposed
To demonstrate
Matrix Boosting
reac-
tion recovery tasks, we compare it with six baseline
methods on eight metabolic networks.
The datasets
and source code in this paper are available online:
https://github.com/ufo0010/HyperLinkPrediction.
Baselline algorithms
We compare the proposed Matrix Boosting algorithm with
the following six baseline algorithms:
SHC (Spectral Hypergraph Clustering) (Zhou, Huang, and
Scholkopf 2006) is a state-of-the-art hypergraph learning al-
gorithm. SHC outputs classification scores by f = (I −
ξΘ)−1y. The hyperparameter ξ is determined by searching
over the grid {0.01,0.1,0.5,0.99,1} using five-fold cross val-
idation. SHC is originally designed to classify hypergraph
vertices leveraging their hyperlink relations. Here we trans-
pose the incidence matrices to change each vertex into a hy-
perlink and each hyperlink into a vertex. Thus SHC can be
used for hyperlink prediction.
HPLSF (Xu, Rockmore, and Kleinbaum 2013) is a hyper-
link prediction method using supervised learning. It calcu-
lates an entropy score among vertices along each latent fea-
ture dimension in order to get a fixed-length feature input.
We train a logistic regression model on these entropy fea-
tures in order to output prediction scores.
FM (Factorization Machine) (Rendle 2010; Rendle 2012)
is a flexible factorization model. We use the classification
function of FM, where columns of the training incidence
matrix are directly used as input features to the model.
HKatz is a generalization of Katz index (Katz 1953) for hy-
perlinks. Concretely, a hyperlink containing m vertices will
have m(m − 1)/2 pairwise Katz indices. We calculate their
average as the HKatz (Hypernetwork Katz) index of the hy-
perlink. The parameter β is determined by searching over
{0.001,0.005,0.01,0.1,0.5} using five-fold cross validation.
HCN is a generalization of common neighbors (Liben-
Nowell and Kleinberg 2007) for hyperlinks. For a hyper-
link containing m vertices, the average of the m(m − 1)/2
pairwise common neighbors is calculated as the HCN (Hy-
pernetwork Common Neighbors) score for this hyperlink.
Random: a theoretical baseline for comparing algorithms'
performance against random. It is equal to assigning random
scores between [0,1] to all testing hyperlinks.
In MATBoost and FM, libFM (Rendle 2012) is adopted as
the default matrix factorization software. The optimization
scheme is MCMC, which has advantages of high accuracy
and automatic regularization. The latent factor number k is
set to 8 (default) in both algorithms. The lasso hyperparam-
eter α and the maximum iteration number of MATBoost is
set to 0.1 and 10 respectively.
Evaluation and implementation
We evaluate the reaction recovery performance based on
their prediction scores. We adopt AUC (area under the ROC
curve) as one measure. We also evaluate performance based
on how many missing reactions can be successfully recov-
ered if we select top n reactions in U as predictions (n is the
number of missing reactions). We call the second measure
"Recovered number". Compared to AUC, this measure only
focuses on top predictions and can more directly reflect how
well hyperlink prediction algorithms perform in practice.
We implement our algorithms mainly in MATLAB. All
experiments are done on a twelve-core Intel Xeon Linux
server. All experiments are repeated twelve times and the
average results are presented.
Datasets and results
We download all 11893 reactions from BIGG1 to build a uni-
versal reaction pool. These reactions are collected from 79
metabolic networks of various organisms. We conduct ex-
periments on eight metabolic networks from five species: E.
coli, H. sapiens, M. barkeri, Cl. ljungdahlii, and H. pylori.
For each metabolic network, we filter out the universal re-
actions which contain exotic metabolites from the pool. We
also filter out the network's existing reactions from the pool.
Table 1 shows the statistics of the eight datasets.
randomly delete
[5:5:40],
[25:25:200],
(according
to network size) reactions as missing hyperlinks, and keep
each dataset, we
[50:50:400] or
[100:100:800]
For
1http://bigg.ucsd.edu
(a) iJO1366 dataset.
(b) iAF1260b dataset.
(c) e coli core dataset.
(d) RECON1 dataset.
(e) iAT PLT 636 dataset.
(f) iAF692 dataset.
(g) iHN637 dataset.
(h) iIT341 dataset.
Figure 2: Number of recovered reactions for different numbers of missing reactions.
Dataset
(a) iJO1366
(b) iAF1260b
(c) e coli core
(d) RECON1
(e) iAT PLT 636
(f) iAF692
(g) iHN637
(h) iIT341
Species
E. coli
E. coli
E. coli
H. sapiens
H. sapiens
M. barkeri
Cl. Ljungdahlii
H. pylori
Vertices Hyperlinks Neg. Hyperlinks
1805
1668
72
2766
738
628
698
485
2583
2388
95
3742
1008
690
785
554
1253
1242
91
973
621
513
740
629
Table 1: Statistics of the eight datasets.
the remaining ones as training data. Due to the space limit,
we only present the results of "Recovered number". The
AUC results are in the supplemental material.
As shown in Figure 2, MATBoost generally achieves
higher performance than other baselines. We observe that
MATBoost recovers a significantly larger number of reac-
tions than other baselines in datasets (a) -- (c) and (f) -- (h),
and achieves competitive results with SHC in datasets (d)
and (e). This is because: 1) MATBoost avoids directly
performing inference in the incidence space that has size
O(2M ) by first inferring the adjacency matrix. This trans-
forms an O(2M ) problem into an O(M 2) problem, which
greatly reduces the problem size and eases the problem; 2)
MATBoost leverages the powerful matrix factorization tech-
nique to perform inference in the adjacency space, which is
able to well recover the unseen compound interactions given
by ∆A−; 3) MATBoost infers the incidence matrix by solv-
ing a constrained optimization problem, which recovers the
reactions that best match the predicted compound interac-
tions in adjacency space; 3) MATBoost takes advantage of a
fixed-point iteration to boost performance and benefits from
ensemble averaging. In all eight datasets, MATBoost is able
to successfully recover over or nearly half of the missing re-
actions with the increasing of missing number. This high
recall in predicting top reactions is very important because
biologists usually can only verify top predictions due to re-
source and time limits.
In addition, we observe that SHC generally ranks second.
This is an interesting result indicating that vertices and hy-
perlinks in a hypernetwork are sometimes interchangeable
(by transposing the incidence matrix). We find that HKatz
and HCN do not perform well. The phenomenon suggests
that simply generalizing topological indices of links to hy-
perlinks by averaging may not be able to reflect the like-
lihood of a hyperlink. In terms of time complexity, MAT-
Boost is also efficient. It takes only a few minutes to finish
on the largest task.
Conclusions
In this paper, we consider the important task of predicting
missing metabolic reactions for metabolic networks. By
exploiting the problem structure, we model it as a hyper-
link prediction problem. Hyperlink prediction is an interest-
ing and challenging problem, however, relevant research are
still limited. We proposed a novel algorithm for hyperlink
prediction, called Matrix Boosting (MATBoost).
It lever-
ages the problem structure and implements an alternating
C-M optimization framework in order to perform inference
jointly in the incidence space and adjacency space. We have
provided extensive evaluation results to demonstrate the un-
matched performance of MATBoost. We compared our al-
gorithm with six baselines. Experimental results on eight
metabolic networks demonstrated that our MATBoost algo-
rithm could recover over half of the missing reactions, which
outperformed all existing methods by a large margin.
Hyperlink prediction may also be useful in many other
application domains such as collaboration, authorship, and
50100150200250300350400Missing number50100150Recovered numberiJO1366MATBoostSHCHPLSFFMHKatzHCNRandom50100150200250300350400Missing number50100150Recovered numberiAF1260bMATBoostSHCHPLSFFMHKatzHCNRandom510152025303540Missing number5101520Recovered numbere_coli_coreMATBoostSHCHPLSFFMHKatzHCNRandom100200300400500600700800Missing number100200300400500Recovered numberRECON1MATBoostSHCHPLSFFMHKatzHCNRandom50100150200250300350400Missing number50100150200Recovered numberiAT_PLT_636MATBoostSHCHPLSFFMHKatzHCNRandom255075100125150175200Missing number20406080100Recovered numberiAF692MATBoostSHCHPLSFFMHKatzHCNRandom255075100125150175200Missing number1020304050607080Recovered numberiHN637MATBoostSHCHPLSFFMHKatzHCNRandom255075100125150175200Missing number20406080Recovered numberiIT341MATBoostSHCHPLSFFMHKatzHCNRandomsocial networks. We will study them in our future work.
References
[Bordbar et al. 2014] Bordbar, A.; Monk, J. M.; King, Z. A.;
and Palsson, B. O. 2014. Constraint-based models predict
metabolic and associated cellular functions. Nature Reviews
Genetics 15(2):107 -- 120.
[Bu et al. 2010] Bu, J.; Tan, S.; Chen, C.; Wang, C.; Wu,
H.; Zhang, L.; and He, X. 2010. Music recommendation
by unified hypergraph: combining social media information
and music content. In Proceedings of the 18th ACM inter-
national conference on Multimedia, 391 -- 400. ACM.
[Cand`es and Recht 2009] Cand`es, E. J., and Recht, B. 2009.
Exact matrix completion via convex optimization. Founda-
tions of Computational mathematics 9(6):717 -- 772.
[Cao, Kong, and Yu 2014] Cao, B.; Kong, X.; and Yu, P. S.
2014. Collective prediction of multiple types of links in het-
erogeneous information networks. In Data Mining (ICDM),
2014 IEEE International Conference on, 50 -- 59. IEEE.
[Chen et al. 2015] Chen, Z.; Chen, M.; Weinberger, K. Q.;
and Zhang, W. 2015. Marginalized denoising for link pre-
diction and multi-label learning. In AAAI, 1707 -- 1713. Cite-
seer.
[Ermis¸, Acar, and Cemgil 2015] Ermis¸, B.; Acar, E.; and
Cemgil, A. T. 2015. Link prediction in heterogeneous data
via generalized coupled tensor factorization. Data Mining
and Knowledge Discovery 29(1):203 -- 236.
[Katz 1953] Katz, L. 1953. A new status index derived from
sociometric analysis. Psychometrika 18(1):39 -- 43.
[Khamsi and Kirk 2011] Khamsi, M. A., and Kirk, W. A.
2011. An introduction to metric spaces and fixed point the-
ory, volume 53. John Wiley & Sons.
[Koren, Bell, and Volinsky 2009] Koren, Y.; Bell, R.; and
Volinsky, C. 2009. Matrix factorization techniques for rec-
ommender systems. Computer (8):30 -- 37.
[Kumar, Dasika, and Maranas 2007] Kumar, V. S.; Dasika,
M. S.; and Maranas, C. D. 2007. Optimization based au-
tomated curation of metabolic reconstructions. BMC bioin-
formatics 8(1):1.
[Liben-Nowell and Kleinberg 2007] Liben-Nowell, D., and
Kleinberg, J. 2007. The link-prediction problem for social
networks. Journal of the American society for information
science and technology 58(7):1019 -- 1031.
[Lu and Zhou 2010] Lu, L., and Zhou, T. 2010. Link pre-
diction in weighted networks: The role of weak ties. EPL
(Europhysics Letters) 89(1):18001.
[Lu and Zhou 2011] Lu, L., and Zhou, T. 2011. Link predic-
tion in complex networks: A survey. Physica A: Statistical
Mechanics and its Applications 390(6):1150 -- 1170.
[Menon and Elkan 2011] Menon, A. K., and Elkan, C. 2011.
Link prediction via matrix factorization. In Machine Learn-
ing and Knowledge Discovery in Databases. Springer. 437 --
452.
[Miller, Jordan, and Griffiths 2009] Miller, K.; Jordan, M. I.;
and Griffiths, T. L. 2009. Nonparametric latent feature mod-
els for link prediction. In Advances in neural information
processing systems, 1276 -- 1284.
[Palais 2007] Palais, R. S. 2007. A simple proof of the ba-
nach contraction principle. Journal of Fixed Point Theory
and Applications 2(2):221 -- 223.
[Rendle et al. 2009] Rendle, S.; Freudenthaler, C.; Gantner,
Z.; and Schmidt-Thieme, L. 2009. Bpr: Bayesian person-
In Proceedings of
alized ranking from implicit feedback.
the twenty-fifth conference on uncertainty in artificial intel-
ligence, 452 -- 461. AUAI Press.
[Rendle 2010] Rendle, S. 2010. Factorization machines. In
Data Mining (ICDM), 2010 IEEE 10th International Con-
ference on, 995 -- 1000. IEEE.
[Rendle 2012] Rendle, S. 2012. Factorization machines with
libfm. ACM Transactions on Intelligent Systems and Tech-
nology (TIST) 3(3):57.
[Shi and Malik 2000] Shi, J., and Malik, J. 2000. Normal-
ized cuts and image segmentation. Pattern Analysis and Ma-
chine Intelligence, IEEE Transactions on 22(8):888 -- 905.
[Singh and Gordon 2008] Singh, A. P., and Gordon, G. J.
2008. Relational learning via collective matrix factorization.
In Proceedings of the 14th ACM SIGKDD international con-
ference on Knowledge discovery and data mining, 650 -- 658.
ACM.
[Song, Meyer, and Tao 2015] Song, D.; Meyer, D. A.; and
Tao, D. 2015. Top-k link recommendation in social net-
works. In Data Mining (ICDM), 2015 IEEE International
Conference on, 389 -- 398. IEEE.
[Sun, Ji, and Ye 2008] Sun, L.; Ji, S.; and Ye, J. 2008. Hy-
pergraph spectral learning for multi-label classification. In
Proceedings of the 14th ACM SIGKDD international con-
ference on Knowledge discovery and data mining, 668 -- 676.
ACM.
[Thiele and Palsson 2010] Thiele,
I., and Palsson, B. Ø.
2010. A protocol for generating a high-quality genome-scale
metabolic reconstruction. Nature protocols 5(1):93 -- 121.
[Tian, Hwang, and Kuang 2009] Tian, Z.; Hwang, T.; and
Kuang, R. 2009. A hypergraph-based learning algorithm
for classifying gene expression and arraycgh data with prior
knowledge. Bioinformatics 25(21):2831 -- 2838.
[Wu et al. 2016] Wu, L.; Ge, Y.; Liu, Q.; Chen, E.; Long,
B.; and Huang, Z. 2016. Modeling users preferences and
social links in social networking services: A joint-evolving
perspective. In Thirtieth AAAI Conference on Artificial In-
telligence.
[Xu, Rockmore, and Kleinbaum 2013] Xu, Y.; Rockmore,
D.; and Kleinbaum, A. M. 2013. Hyperlink prediction in
hypernetworks using latent social features. In Discovery Sci-
ence, 324 -- 339. Springer.
[Yu, Tao, and Wang 2012] Yu, J.; Tao, D.; and Wang, M.
2012. Adaptive hypergraph learning and its application in
image classification. Image Processing, IEEE Transactions
on 21(7):3262 -- 3272.
[Zhou, Huang, and Scholkopf 2005] Zhou, D.; Huang, J.;
and Scholkopf, B. 2005. Learning from labeled and un-
labeled data on a directed graph. In Proceedings of the 22nd
international conference on Machine learning, 1036 -- 1043.
ACM.
[Zhou, Huang, and Scholkopf 2006] Zhou, D.; Huang, J.;
and Scholkopf, B. 2006. Learning with hypergraphs: Clus-
tering, classification, and embedding. In Advances in neural
information processing systems, 1601 -- 1608.
|
1710.09656 | 1 | 1710 | 2017-10-26T12:00:50 | Tackling information asymmetry in networks: a new entropy-based ranking index | [
"cs.SI",
"physics.soc-ph"
] | Information is a valuable asset for agents in socio-economic systems, a significant part of the information being entailed into the very network of connections between agents. The different interlinkages patterns that agents establish may, in fact, lead to asymmetries in the knowledge of the network structure; since this entails a different ability of quantifying relevant systemic properties (e.g. the risk of financial contagion in a network of liabilities), agents capable of providing a better estimate of (otherwise) unaccessible network properties, ultimately have a competitive advantage. In this paper, we address for the first time the issue of quantifying the information asymmetry arising from the network topology. To this aim, we define a novel index - InfoRank - intended to measure the quality of the information possessed by each node, computing the Shannon entropy of the ensemble conditioned on the node-specific information. Further, we test the performance of our novel ranking procedure in terms of the reconstruction accuracy of the (unaccessible) network structure and show that it outperforms other popular centrality measures in identifying the "most informative" nodes. Finally, we discuss the socio-economic implications of network information asymmetry. | cs.SI | cs |
Tackling information asymmetry in networks:
a new entropy-based ranking index
Paolo Barucca,1, 2 Guido Caldarelli,3, 2 and Tiziano Squartini3, ∗
1University of Zurich, Department of Banking and Finance, Zurich, ZH, Switzerland
2London Institute for Mathematical Sciences, 35a South St,
Mayfair, London W1K 2XF, United Kingdom
3IMT School for Advanced Studies, P.zza S.Francesco 19, 55100 Lucca (Italy)
(Dated: October 27, 2017)
Information is a valuable asset for agents in socio-economic systems, a significant part of the
information being entailed into the very network of connections between agents. The different
interlinkages patterns that agents establish may, in fact, lead to asymmetries in the knowledge of
the network structure; since this entails a different ability of quantifying relevant systemic properties
(e.g. the risk of financial contagion in a network of liabilities), agents capable of providing a better
estimate of (otherwise) unaccessible network properties, ultimately have a competitive advantage.
In this paper, we address for the first time the issue of quantifying the information asymmetry
arising from the network topology. To this aim, we define a novel index - InfoRank - intended to
measure the quality of the information possessed by each node, computing the Shannon entropy
of the ensemble conditioned on the node-specific information. Further, we test the performance of
our novel ranking procedure in terms of the reconstruction accuracy of the (unaccessible) network
structure and show that it outperforms other popular centrality measures in identifying the "most
informative" nodes. Finally, we discuss the socio-economic implications of network information
asymmetry.
PACS numbers: 89.75.-k, 89.75.Fb, 89.70.Cf,64.60.Aq
INTRODUCTION
Recognizing the most relevant nodes in a net-
worked system represents a topic of growing interest.
This translates into identifying nodes with key fea-
tures, be they structural or functional. Depending
on the system under study, in fact, possessing cer-
tain features may translate into accessing a compet-
itive advantage or prominent position in the system.
The problem has been tackled by defining a plethora
of indices, aiming at quantifying the importance of
a node in a given system: the so-called centrality
measures [1–4].
The latter are intended to capture the role played
by each node within the network by optimizing an
opportunely-defined objective function:
examples
are provided by the degree-centrality (defined by
the number of neighbors of each vertex) [2], the
closeness-centrality (defined by the average distance
of the reachable nodes from any, given, node) [5],
the PageRank-centrality (defined by the number of
"authoritative" nodes pointing at the vertex under
consideration) [6], etc.
All these centrality measures look at the topolog-
ical role that nodes have in a network, disregarding
the ability of a node to obtain information about the
rest of the system. On the contrary, our methodol-
ogy focuses on the difference in the information con-
tained in the different pattern of interlinkages of each
∗ [email protected]
node. We refer to this difference as to network infor-
mation asymmetry and we will show how it allows
nodes to obtain a significantly-better estimation of
the (otherwise unaccessible) network properties.
Our novel index measures the reduction of uncer-
tainty over the remaining interlinkages that a node's
own ego-network allows: the node whose accessible
information provides the largest uncertainty reduc-
tion will be identified as being the "most informa-
tive" one. More quantitatively, for each node the
uncertainty reduction is computed by comparing the
Shannon entropy benchmark value - measurable by
all nodes - with the one obtained by also condition-
ing on the information ego-network on top of it.
Several attempts to define entropy-based indices
have been made [8–11]; however, the measures that
have been proposed so far are based on specific
definitions of Shannon entropy, an evidence that
severely affects their applicability. As we will show
in what follows, InfoRank can be understood as a
generalization of these measures, applicable to any
maximum-entropy ensemble and to any subset of
nodes.
The paper is organized as follows. In Section 1,
we introduce the general methodology for comput-
ing InfoRank in any ensemble of networks, given any
set of commonly shared information. Then, we apply
this general methodology to the case of the configu-
ration model. In Section 2, we measure InfoRank on
a number of real-world networks and verify its corre-
lation with the reconstruction accuracy achieved by
each node. Finally, in Section 3 we discuss the role of
network information asymmetry in social, economic
and financial systems.
I. METHODS
InfoRank: theoretical foundations
This first subsection is devoted to illustrate the
theoretical foundations of our proposed methodol-
ogy, rooted into information theory. Let us focus
on the simplest case of a single node:
in order to
calculate InfoRank each node (hereafter indexed by
l) can be imagined to solve two different problems.
The first one reads
S = −(cid:88)
− M(cid:88)
G
(cid:34)(cid:88)
ηi
i=0
G
P (G) ln P (G) +
(cid:35)
(1)
P (G)Ci(G) − C∗
i
with S indicating the constrained Shannon entropy
and C0(G) = C∗
0 = 1 encoding the normalization
condition. By solving the constrained-optimization
problem above, node l finds that
i=1
M(cid:88)
ηiC∗
G e−(cid:80)M
(cid:34)(cid:88)
S =
(where Z((cid:126)η) = (cid:80)
S(l) = S −(cid:88)
i=1 ηiCi(G)). On the other
hand, the second problem node l has to solve reads
ψlm
m
G
P (G)alm(G) − a∗
lm
(3)
with S(l) being nothing else than the functional in 1
further constrained by imposing the node l specific
pattern of interconnections (i.e. a∗
lm = 0, 1 where
m runs over all the other nodes of the network).
Upon solving the second constrained-optimization
problem, the expression
M(cid:88)
i=1
(cid:88)
m
S(l) =
θiC∗
i +
ψlma∗
lm + ln Z(cid:48)((cid:126)θ, (cid:126)ψ)
(4)
(cid:80)
G e−(cid:80)M
i=1 θiCi(G)−(cid:80)
Z(cid:48)((cid:126)θ, (cid:126)ψ)
(where
=
m ψlmalm(G)) is found. Both
functionals achieve a minimum in their stationary
point (consistently, since we are trying to minimize
each node - residual - uncertainty). This can be
easily proven, upon noticing that the Hessian matrix
of both S and S(l) is the covariance matrix of the
constraints and, as such, positive-semidefinite.
2
In order to find the stationary point of S(l), node
l must solve the equations δS(l)
δψlm
= 0, ∀ m, i.e.
(cid:32)
(cid:88)
G
e−(cid:80)M
i=1 θiCi(G)−(cid:80)
Z(cid:48)((cid:126)θ, (cid:126)ψ)
(cid:33)
m ψlmalm(G)
alm(G) = a∗
lm
(5)
for each of the m values.
In order to numerically
evaluate the parameters ψlm, ∀ m, let us focus on a
specific value, e.g. ψl1; we can then divide Z(cid:48)((cid:126)θ, (cid:126)ψ)
into two subsums: one where al1 = 0 and one where
al1 = 1. Thus, condition 5 can be rewritten as
−(cid:80)M
i=1 θiCi(G1)−ψl1−(cid:80)
Z(cid:48)((cid:126)θ, (cid:126)ψ)
e
m((cid:54)=1) ψlmalm
(cid:33)
= a∗
l1
(cid:32)
(cid:88)
G1
(6)
where the sum runs over the network configura-
tions having al1 = 1 (and briefly indicated with the
symbol G1). Analogously, Z(cid:48)((cid:126)θ, (cid:126)ψ) = Z(cid:48)
0((cid:126)θ, (cid:126)ψ) +
e−ψl1 Z(cid:48)
1((cid:126)θ, (cid:126)ψ) where
−(cid:80)M
e
Z(cid:48)
0((cid:126)θ, (cid:126)ψ) =
i=1 θiCi(G0)−(cid:80)
m((cid:54)=1) ψlmalm (7)
(cid:88)
(cid:88)
G0
G1
(8)
the first sum runs over the networks having al1 = 0
and the second sum runs over the networks having
al1 = 1. Solving the likelihood equation in the case
l1 = 0 brings to ψl1 = +∞; solving the likelihood
a∗
l1 = 1 brings to ψl1 = −∞.
equation in the case a∗
Thus,
i +
ln Z(cid:48)
1((cid:126)θ, (cid:126)ψ) is suppressed by
the coefficient e−ψl1 which converges to zero; other-
wise, if a∗
1((cid:126)θ, (cid:126)ψ)
since the term Z(cid:48)
0((cid:126)θ, (cid:126)ψ) is suppressed by the coeffi-
cient eψl1 which converges to zero.
l1 = 0 one has S(l) = (cid:80)M
l1 = 1 then S(l) =(cid:80)M
0((cid:126)θ, (cid:126)ψ) since the term Z(cid:48)
i + ln Z(cid:48)
i=1 θiC∗
i=1 θiC∗
if a∗
The estimation of the other parameters proceeds
in an analogous way, by applying the same line of
reasoning to the "surviving" partition functions. In
other words, specifying the single patterns of connec-
tions means reducing the number of configurations
over which the estimation of the constraints is car-
ried out: thus, Z(cid:48)((cid:126)θ) runs over a smaller number of
configurations than Z((cid:126)η).
Let us now evaluate the expressions Z((cid:126)η) and
Z(cid:48)((cid:126)θ) for the same value of the parameters (say
(cid:126)µ): since the number of addenda in Z((cid:126)µ) is larger
than the number of addenda in Z(cid:48)((cid:126)µ), it also holds
true that ln Z((cid:126)µ) ≥ ln Z(cid:48)((cid:126)µ) and the inequivalence
S((cid:126)µ) ≥ S(l)((cid:126)µ) is true as well. Let us now choose a
i + ln Z((cid:126)η).
and
Z(cid:48)
1((cid:126)θ, (cid:126)ψ) =
(2)
−(cid:80)M
i=1 θiCi(G1)−ψl1−(cid:80)
m((cid:54)=1) ψlmalm ,
e
(cid:35)
particular value of the parameters, i.e. the point of
minimum of S: (cid:126)µ = (cid:126)η∗. Thus,
Quantifying the node-specific information
S((cid:126)η∗) ≥ S(l)((cid:126)η∗) ≥ S(l)((cid:126)θ∗)
(9)
Let us now focus on a specific node, e.g. i. Con-
straining the information encoded into its specific
pattern of connections implies letting node i impose
3
where the second inequality follows from the very
definition of minimum. Our ranking procedure
builds upon the evidence that, by imposing more
information on top of the common one, each node
further reduces its uncertainty about the unknown
network structure: the one reducing the residual un-
certainty to the largest extent is identified as the
"most informative" one. The same reasoning and
calculations apply for the case of subsets of nodes,
only quantifying the InfoRank of all possible sub-
sets of s nodes in a network of size N would require
(cid:1) Shannon entropies.
computing(cid:0)N
The next subsections will be devoted to illustrate
the steps defining our approach, by focusing, for the
sake of simplicity, on (the simplest case of) binary,
undirected networks.
s
Quantifying the benchmark information
Let us suppose the benchmark information, which
is accessible to all nodes in the network A, to be rep-
resented by the degree sequence. The benchmark
model is, thus, represented by the usual Configura-
tion Model (CM) [12], defined by the following sys-
tem of equations:
(cid:88)
≡ (cid:88)
j((cid:54)=i)
ki(A) =
xixj
j((cid:54)=i)
1 + xixj
pij, ∀ i.
(10)
The informativeness of the degree sequence in ex-
plaining the network structure can be quantified by
calculating the value of the Shannon entropy defined
by the chosen constraints:
(cid:88)
(cid:88)
i
S(i)
0 =
(cid:88)
j((cid:54)=i)
i
S0 =
1
2
= − 1
2
[pij ln pij + (1 − pij) ln(1 − pij)]
(11)
with S(i)
indicating the contribution of node i to the
0
benchmark entropy S0 (the subscript 0 stresses the
benchmark-like value of this functional, encoding a
kind of information which is accessible to all nodes).
Intuitively, the closer the S0 value to zero, the larger
the explanatory power of the degree sequence with
respect to the network structure.
pij =
xixj
1 + xixj
= aij, ∀ j
(12)
i.e. treating as deterministic the links constituting
its ego-network. As an example, let us suppose that
node i is linked only with nodes 2 and 3 out of the
=
N constituting our ideal network, i.e. that
=
1+xix3
0. This implies that the system of equations that
node i has to solve becomes
= ··· = xixN
= 1 and xix1
1+xix1
= xix4
1+xix4
1+xixN
xix3
xix2
1+xix2
k1(A) =
k2(A) =
k3(A) =
k4(A) =
x1x2
1 + x1x2
x2x1
1 + x2x1
x3x1
1 + x3x1
x4x1
1 + x4x1
+ . . . 0 ··· +
+ . . . 1 ··· +
+ . . . 1 ··· +
+ . . . 0 ··· +
x1xN
1 + x1xN
x2xN
1 + x2xN
x3xN
1 + x3xN
x4xN
1 + x4xN
...
(13)
where we have explicitly specified the value of the
coefficients quantifying the probability of node i to
establish a connection with every other node (notice
that we have omitted the equation controlling for
the value of the i-th degree, since trivially satisfied).
The system above can be rearranged by moving at
the left hand side the known entries of the adjacency
matrix:
(cid:88)
≡ (cid:88)
kl(A) − ail =
xlxj
j((cid:54)=l,i)
1 + xlxj
j((cid:54)=l,i)
lj , ∀ l((cid:54)= i)
p(i)
(14)
i.e. the zeros and the ones characterizing the (miss-
ing) links with node i. More explicitly:
j((cid:54)=1,i)
j((cid:54)=2,i)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
j((cid:54)=3,i)
x1xj
1 + x1xj
x2xj
1 + x2xj
x3xj
1 + x3xj
x4xj
j((cid:54)=1,i)
≡ (cid:88)
≡ (cid:88)
≡ (cid:88)
≡ (cid:88)
j((cid:54)=2,i)
j((cid:54)=3,i)
j((cid:54)=4,i)
1 + x4xj
j((cid:54)=4,i)
p(i)
1j
p(i)
2j
p(i)
3j
p(i)
4j
(15)
k1(A) =
k2(A) − 1 =
k3(A) − 1 =
k4(A) =
...
where the superscript (i) stresses that the numerical
value of the probability coefficients {p(i)
jk} is induced
by the specification of node i patterns of connec-
jk (cid:54)= pjk. Notice, in fact,
tions and, in general, p(i)
that the problem of quantifying the informativeness
of the ego-network of each node can be restated by
imagining that the node itself is removed from the
network, in such a way that a reduced adjacency ma-
trix A remains naturally defined, inducing, in turn,
a reduced system of equations:
(cid:88)
kl( A) =
xlxj
, ∀ l((cid:54)= i).
(16)
j((cid:54)=l,i)
1 + xlxj
Calculating the node-specific InfoRank
Once i has been removed from the network, the
entropy of the "surviving" topological structure can
be computed by employing the novel probability co-
efficients defined by the system of equations in 16,
i.e.
(cid:88)
(cid:88)
k((cid:54)=j)
j
S(i) = − 1
2
[p(i)
jk ln p(i)
jk +(1− p(i)
jk ) ln(1− p(i)
jk )].
Since removing different nodes will,
(17)
in general,
impact on the benchmark entropy S0 differently, a
ranking is naturally induced by the amount of "un-
certainty reduction" caused by the removal of each
node. Since our aim is identifying the node(s) pos-
sessing the largest amount of information, in order
to define a novel ranking index, let us divide S(i) by
S0 and take the complement to 1:
Ii = 1 − S(i)
S0
;
(18)
as apparent from the definition, the larger the en-
tropy reduction, the higher the rank of the node
causing it. In what follows, the index Ii will be re-
ferred to as to the InfoRank index.
Approximating the node-specific InfoRank
Although formally similar, the quantities S(i)
0 and
S(i), respectively defined in eq. 11 and eq. 17, are
conceptually very different and must not be con-
fused. In fact, while S(i)
just represents the contri-
0
bution of node i to the benchmark entropy S0, the
second index S(i) quantifies the residual uncertainty
after the removal of node i, accounting, in partic-
ular, for the effect that removing such a node has
on the remaining vertices. Whenever such an effect
4
FIG. 1. Toy network, whose nodes have been ranked ac-
cording to InfoRank (red nodes are ranked higher than
blue nodes). Since the node with the largest score is the
one maximally reducing the residual uncertainty of the
network, InfoRank is not completely determined by the
nodes degrees: the center of the star, in fact, has exactly
the same number of neighbors of other nodes (i.e. 7);
differently from them, however, its removal would cause
and entire portion of the network to become determinis-
tic.
can be ignored (i.e. when diminishing the nodes de-
gree by one unit doesn't affect much the magnitude
of the surviving probability coefficients), S(i) can be
indeed approximated by S0 − S(i)
0 , further implying
that Ii (cid:39) S(i)
0 /S0.
Remarkably, the term S(i)
0
0 (cid:39) −(cid:80)
can be simplified as
well. For what concerns our analysis, two cases
are worth to be mentioned. The first one con-
cerns sparse networks: when assuming the proba-
bility coefficients to satisfy the requirement pij (cid:28)
1, ∀ i (cid:54)= j, then pij (cid:39) xixj, ∀ i (cid:54)= j, implying that
S(i)
+ ki.
The second approximation is valid whenever the
probability coefficients controlling for the connec-
tions of node i are well represented by their av-
erage value,
in this case, one obtains that S(i)
j((cid:54)=i)[pij ln pij − pij] = −ki ln
N−1 ≡ pij;
= ki
0 (cid:39) −(N −
1)(cid:2)pij ln pij +(cid:0)1 − pij
(cid:80)
(cid:1) ln(cid:0)1 − pij
j((cid:54)=i) pij
N−1
i.e. pij (cid:39)
(cid:16) ki√
(cid:1)(cid:3).
(cid:17)
2L
II. RESULTS
Ranking nodes in synthetic networks
tem of equations ki(A) =(cid:80)
rewritten as ki(A)+1 =(cid:80)
In order to better illustrate the meaning of the
InfoRank index, let us consider two extreme cases,
i.e.
the removal of either an isolated or a fully-
connected node. It is intuitive that, in both cases,
the knowledge of the connections of the considered
nodes adds no information or, equivalently, that re-
moving these nodes doesn't lead to any uncertainty
reduction. This is readily seen by comparing the sys-
tems 10 and 16. In presence of a hub, in fact, the sys-
, ∀ i can be
+1, ∀i((cid:54)= h)
(with h denoting the hub). Since solving the lat-
ter system with respect to {xi}i(cid:54)=h is equivalent to
solve the former system, removing a hub doesn't
change the information content of the network con-
figuration; analogously, when considering an isolated
node. On the other hand, the value Ii = 1 charac-
terizes a node whose removal induces a configuration
which is perfectly deterministic (i.e. composed by
isolated nodes, cliques or both). Naturally, in the
very special case of a star graph, the central node is
both the hub and the vertex with largest InfoRank
value.
j((cid:54)=i)
j((cid:54)=i,h)
1+xixj
xixj
xixj
1+xixj
−(cid:80)
A relationship between InfoRank and the node de-
gree, nonetheless, exists.
In order to understand
it, let us start by considering the quantity S(i)
0 =
j((cid:54)=i)[pij ln pij + (1 − pij) ln(1 − pij)], which cor-
responds to the Shannon entropy of the N − 1 pos-
sible connections of node i: the node bringing the
largest contribution to S0, then, is the one maximiz-
ing the aforementioned sum, i.e. the one encoding
(N − 1) ln 2 nats into its connections (this unit of
measure, also known as "natural bit", is a conse-
quence of having chosen the base of the logarithm to
be the natural one - in base 2, the overall contribu-
tion would have been of N − 1 bits). Each of the ad-
denda can, thus, be imagined to contribute with an
average coefficient pij =
2 , fur-
ther implying that a ranking based on the naıve con-
tribution of each node to S0 would privilege nodes
with ki (cid:39) (N − 1)/2 neighbors.
j((cid:54)=i) pij
N−1 = ki
N−1 (cid:39) 1
(cid:80)
InfoRank, instead, accounts also for the effect that
constraining the pattern of connections of a given
node has on the connections of the neighboring ones.
Let us consider the synthetic network shown in fig.
0 }, one finds
1. Upon computing the vector {S(i)
that the largest contribution to S0 comes from the
hub, consistently with the previous discussion (no-
tice, in fact, that kh = 10 (cid:39) (N − 1)/2 = 11).
Let us know imagine, instead, to remove the cen-
ter of the star: this would cause, in turn, an en-
tire portion of the network to become deterministi-
5
cally determinable (7 nodes would become isolated,
in fact). As a consequence, while the contribution
0 would be enriched by an additional amount of (cid:39)
S(c)
−kc(N − 1) [pleaf ln pleaf + (1 − pleaf ) ln (1 − pleaf )]
(with pleaf = 1
N−1 ), removing the hub would just
disconnect two more nodes (by retaining only the
main contribution). InfoRank correctly assigns the
highest score to the center of the star, pointing it out
as the vertex establishing the most informative set
of interconnections. Our index, in other words, en-
codes higher-order corrections to the naıve contribu-
tion S(i)
0 , by including the "effects" of the additional
constraints on the neighboring vertices.
Ranking nodes in real-world networks
Let us now employ InfoRank to analyse real-world
configurations. The core of our analysis will consist
in a thorough comparison of a number of alterna-
tive ranking indices (in what follows, binary, directed
networks will be considered, since one of the chosen
indicators becomes trivial in the undirected case):
in order to consistently compare the ranking scores
output by the selected algorithms, the former ones
are normalized in order to let them range within the
same interval. More specifically, if we let R(a)
rep-
resent the rank of node i according to the chosen al-
(a)
gorithm a, the applied transformation reads R
i =
i }) ∈ [0, 1]
(R(a)
and ensures that nodes with minimum rank are as-
(a)
signed a value R
i = 0 (in blue, according to the
color scale adopted throughout the paper); vicev-
ersa, nodes with maximum rank are assigned a value
(a)
R
i = 1 (in red, according to the color scale adopted
throughout the paper).
i })/(max{R(a)
i }−min{R(a)
i −min{R(a)
i
The first alternative index is represented by the
degree-centrality, identifying the nodes characterized
by the largest degree as the most important (i.e. cen-
tral) ones. A first limitation of such an index lies in
the nature of the connectivity concept, which lacks
an obvious generalization to, e.g. the directed case
we are considering in the present paper.
In what
follows we will adopt the following definition
Di = kout
i
(19)
which ranks the nodes according to the number of
their out-neighbors. As evident from the first panel
of fig.
4, the (out-)degree-
centrality trivially identifies the hubs as the most
central nodes.
3 and fig.
2, fig.
The second indicator we have considered is the
so-called closeness-centrality [5], defined as
κi(cid:80)
j dij
Ci =
1
di
=
6
(20)
i.e. as the reciprocal of the average topological dis-
tance of a vertex from the other, connected ones (κi
is the number of nodes that can be reached from i -
following the links direction - and dij is the topolog-
ical distance separating i from any reachable node
j). Intuitively, any two nodes are said to be "close"
when their distance is "small", i.e.
few links must
be walked to reach one from the other. Naturally,
the nodes with Ci = 0 are the ones with zero out-
degree, while a node with exactly N − 1 connections
will be also the most central one. Generally speak-
ing, however, nodes with small degree do not nec-
essarily have a small closeness-centrality value: an
example is provided by the second panel of fig. 3,
where nodes behaving like "local hubs" (e.g. at the
center of star-like subgraphs) are, in fact, character-
ized by a large Ci independently from their degree.
On the other hand, nodes with a large degree do not
necessarily have a large closeness-centrality value: in
fact, the first panel of fig. 4 shows that although a
large number of nodes can be reached from the hub,
many lie at a large distance from it.
Interestingly, as the second panels of fig. 2 and fig.
4 show, the nodes minimizing the (average) topolog-
ical distance from them are the ones connected to a
strongly connected component (SCC - either belong-
ing to it or not). In the case of C. Elegans neural
network, its large reciprocity ((cid:39) 0.43) further lev-
els out the differences between the Ci values of such
vertices.
The third indicator considered in the present anal-
ysis is the PageRank-centrality [6]. It is computed
by solving to iterative equation
1 − α
N
+ α
Pi =
(cid:32)
(cid:88)
j
(cid:33)
aji
kout
j
Pj
(21)
FIG. 2. C. Elegans neural network [13]. From top to bot-
tom, nodes are ranked according to their (out-)degree-
centrality, closeness-centrality, PageRank-centrality, In-
foRank (red nodes are ranked higher than blue nodes).
Notice that, according to PageRank, (only) the node
with largest in-degree is ranked first; the same node,
however, is characterized by a zero out-degree which, in
turn, causes its closeness-induced score to be zero as well.
j
which can be imagined to describe a Markov chain:
if aji = 1 a walker moves from j to i with probability
1−α
; if aji = 0 such a probability becomes 1−α
N + α
kout
(in a sense, the walker "jumps" from j to i). The
introduction of the addendum accounting for jumps
guarantees the convergence of the formula above to
the stationary distribution of this dynamical process
(which exists and is unique - its Markov chain, in
fact, becomes strongly connected and aperiodic by
construction) which also provides the searched rank-
ing scores. In what follows we have set α = 0.85.
N
By oversimplifying a bit, PageRank scores higher
nodes that are pointed either 1) by a large number of
nodes which, in turn, have low out-degree (thus be-
coming "authoritative" nodes) or 2) by authoritative
7
FIG. 3. US airports network in 1997 [14]. Nodes are ranked according to their value of (out-)degree-centrality (left),
closeness-centrality (center) and InfoRank (right - red nodes are ranked higher than blue nodes). Nodes with a large
(out-)degree-centrality (hubs) do not necessarily coincide with the nodes characterized by a large value of closeness-
centrality: in fact, although many nodes can be reached by a walker leaving the hubs, these may lie at a large distance
from it.
nodes themselves [6]. The evidence that nodes with
a large PageRank value do not necessarily coincide
with the nodes having a large in-degree is provided
by the Little Rock food web: in this particular case,
a couple of species predated by a limited number
of predators can be, indeed, observed; the former,
however, constitute the only preys of the latter. In
all the other cases the correlation coefficient between
i } is quite large: 0.70 for the
the vectors {Pi} and {kin
US airports network (in 1997), 0.82 for the C. Ele-
gans neural network, 0.99 for both the World Trade
Web and the e-MID interbank network (notice that
upon lowering α the two vectors become less corre-
lated, since the random contribution to the dynam-
ics becomes the prevalent one). Such a correlation
has been also noticed elsewhere [16].
Let us now consider our novel InfoRank index.
As a first observation, the ranking induced by it
shows a little overlap with the one provided by the
other indices, thus confirming its degree of novelty.
The intuitive idea according to which the nodes
with largest InfoRank are the ones disconnecting the
largest number of subgraphs is confirmed upon look-
ing at the fourth panel of fig. 2 and the third panel
of fig. 3: when considering either the C. Elegans
neural network or the US airport networks, in fact,
vertices acting as "junctions" between a group of
leaves and the remaining part of the network are of-
ten assigned an InfoRank value that is larger than
the one assigned to the "most internal" nodes. Natu-
rally, when directed networks are considered, reduc-
ing uncertainty does not necessarily imply isolating
nodes: it is often enough to exactly determine either
their out- or in-degree to gain a notable amount of
information.
Exploring the InfoRank degree-dependence
Let us now consider the World Trade Web
(WTW) [17]. The main reason we include it in our
analysis is its link density: being much denser than
the other networks considered so far, it also allows
us to better understand the relationship between In-
foRank and the degree sequence(s).
Since the WTW topological structure can be de-
duced with great accuracy from the knowledge of
its degree-sequence(s) [18], we may also expect the
latter to be correlated with the ranking indices con-
sidered for the present analysis. This is indeed
the case. As the fourth panel of fig.
5 shows,
both the closeness-centrality and the PageRank are
highly correlated with the total degree (i.e. ktot
i =
kout
i + kin
i ). The monotonic, increasing, relatioship
between total degree and closeness-centrality can
be straightforwardly explained by noticing that all
countries have established a direct connection with
the nodes that can be reached by them via some
other (indirect) path. This is not true, for exam-
ple, for the Little Rock food web shown in fig. 4:
in that case, the node with largest out-degree is
connected to only some of the nodes constituting
a strongly connected sub-component; as a conse-
quence, the overall distance from the set of reachable
nodes increases.
The monotonic, increasing, relationship between
total degree and PageRank, instead, rests upon a
double (empirical) evidence: countries with a large
out-degree are 1) also characterized by a large in-
degree and are usually 2) "pointed" by countries
with a small out-degree.
InfoRank, on the other hand, shows an overall
bell-shaped trend with a maximum in correspon-
i (cid:39) (N − 1)/2 + (N − 1)/2 =
dence of the values ktot
8
N − 1. This means that the nodes providing the
largest contribution to the entropy reduction overlap
with the ones maximizing S(i)
0 . However, as evident
upon inspecting fig. 8, this doesn't mean that the
removal of a given node has a small impact on the
other vertices; evident deviations from the S(i)
trend
0
are, in fact, clearly visible: InfoRank adjusts the es-
timation provided by exclusively accounting for the
nodes degrees, although its functional dependence on
them is, overall, similar to the one characterizing
S(i)
0 .
Exploring the relationship between InfoRank
and the reconstruction accuracy
As we have seen,
InfoRank individuates the
node(s) reducing the network residual uncertainty
to the largest extent. We may, thus, suspect In-
foRank to also "select" the nodes able to provide
the best reconstruction of the network itself. In or-
der to verify our conjecture, we have explicitly tested
the agreement between the reconstruction achieved
by each node and the observed network structure.
In order to do so, we have computed an index of-
ten employed to test the (global) goodness of a
reconstruction algorithm: the accuracy, defined as
(cid:104)A(cid:105) =
i
(cid:80)
ber of true positives, i.e. (cid:104)T P(cid:105) =(cid:80)
(cid:104)T N(cid:105) =(cid:80)
(cid:104)T P(cid:105)+(cid:104)T N(cid:105)
N (N−1) where (cid:104)T P(cid:105) is the expected num-
(cid:80)
j((cid:54)=i) aijpij,
(cid:104)T N(cid:105) is the expected number of true negatives, i.e.
j((cid:54)=i)(1− aij)(1− pij) and N is the to-
tal number of vertices [7]. We have then summarized
our findings by calculating the correlation between
the vector {Ai} and the vector {Ii}.
i
FIG. 4. Little Rock food web [15]. From top to bot-
tom, nodes are ranked according to their (out-)degree-
centrality, closeness-centrality, PageRank-centrality, In-
foRank (red nodes are ranked higher than blue nodes).
Nodes with large in-degree do not necessarily coincide
with nodes having a large value of PageRank: this is ev-
ident in the case of food-webs, where species exist that
are predated by a limited number of predators of which
constitute the only preys.
In other networks however,
the correlation between the PageRank value and the in-
degree is quite large.
The results are reported in table I: while the cor-
relation between InfoRank and accuracy is almost 1,
when comparing the goodness of the reconstruction
achieved by nodes ranked via alternative indices a
worse agreement is found. In particular, e-MID and
the WTW show a negative correlation value: this is
due to the bell-shaped trend recovered, e.g. when
scattering the accuracy value versus any of the cho-
sen ranking indicators, consistently with the results
illustrated in fig. 6.
Exploring the relationship between InfoRank
and systemic risk estimation
In this subsection, we try to give a quantitative il-
lustration of how reconstruction accuracy can lead to
better estimation of relevant properties of a financial
system, focusing on a real network of transaction in
an interbank money market. Interbank money mar-
kets are essential for financial institutions for the
provision of liquidity. In such markets, information
asymmetry [19] on the network of connections can
9
FIG. 5. Dependence of the (rescaled) ranking indices considered for the present analysis (closeness-centrality (cid:3),
PageRank centrality ∗, InfoRank (cid:4)) on the nodes total degree. Notice how both e-MID and the World Trade Web
are characterized by a strongly positive correlation between the closeness-centrality and the total degree and the
PageRank centrality and the total degree; InfoRank, instead, is characterized by a bell-shaped trend for the same
i (cid:39) (N − 1)/2 + (N − 1)/2 = N − 1. Although the nodes
systems, whose point-of-maximum lies close to values ktot
providing the largest contribution to the entropy reduction overlap with the ones maximizing S(i)
0 , this doesn't imply
that the removal of a given node has a small impact on the other vertices (see also fig. 8). For what concerns sparser
systems, instead, InfoRank shows an overall increasing trend while a clear functional dependence between closeness-
centrality and total degree and PageRank centrality and total degree is not visible (a weakly positive correlation
between closeness-centrality and total degree is, however, present in the C. Elegans neural network).
translate in a better estimation of the expected pay-
ments, widely recognized as a measure of systemic
risk in networks of interbank liabilities [20]. Here,
we focus on data from the e-MID (electronic market
of interbank deposit) platform, that served a signif-
icant percentage (∼ 17%) of the unsecured money
market in the Euro Area before the 2007-2008 cri-
sis [22]. We apply the clearing mechanism originally
proposed in [20], in the generalization discussed in
[21], and compute the payment vector, whose com-
ponents represent the amount a financial institution
is able to repay to its creditors. When the payment
of a bank is less then its corresponding obligation,
that bank is considered insolvent. Hence, comput-
ing the payment vector corresponds to identify in-
solvencies and estimate systemic risk in a financial
network. A detailed discussion on such measures of
systemic risk is found in [23, 24]. Insolvency of bank
occurs when its equity, the difference between as-
sets and liabilities, becomes negative. The external
cash flow is given by the external assets Ae, affected
by fire sales in case of insolvency, and external lia-
bilities Le. Both are sampled from a Gaussian dis-
tribution, with parameters µa = 10, σa = 0.1 and
µl = 1, σl = 0.1, respectively. For our analysis on
the role of InfoRank, first, we compute the payment
vector {p(r)
i } - that entails the information on sys-
temic risk losses - starting from the real e-MID net-
work. Secondly, for each node, we compute the pay-
ment vector using a sample of networks from its spe-
cific ensemble, then evaluate the normalized squared
error of each these sampled payment vectors {p(s)
i }
with respect to the real payment vector. Finally, we
calculate the mean over the set of sampled payment
vectors and obtain the mean squared error that each
node is subjected to in computing this systemic risk
10
FIG. 6. Dependence of the accuracy value on the (rescaled) ranking indices considered for the present analysis
((out-)degree-centrality x, closeness-centrality (cid:3), PageRank centrality ∗, InfoRank (cid:4)). Notice the clear, increasing,
trend describing the functional dependence of the accuracy value on the InfoRank value, further confirming that the
node(s) establishing the most informative sets of interconnections are the ones characterized by the largest InfoRank
value(s).
measure. In Figure 7, we recognize that a larger In-
foRank yields a smaller error in the estimation of
systemic risk.
III. DISCUSSION
We introduced a new index of node relevance
in networks based on an information-theoretic ap-
proach. Differently from other indices, InfoRank can
be generalized in several, highly non-trivial, ways.
First, its perfectly general derivation allows it to be
employed to analyze directed, as well as weighted,
networks with any set of commonly shared informa-
tion. Secondly, it can be extended to quantify the
informativeness of whole subsets of nodes: this is
usually a major limitation for the other centrality in-
dicators, tailored to provide single nodes estimates.
Thirdly, it does not depend on any arbitrary parame-
ter (as PageRank, for example), but only on a max-
imum entropy principle. We verified the financial
consequences of the information-theoretic approach
we followed in this paper, by applying our algorithm
to the estimation of contagion processes in the e-
MID network of interbank loans. To the best of our
knowledge, this work is the first to provide a quan-
titative measure of network information asymmetry
leading to competitive advantage for some agents
upon others in socio-economic and financial systems.
Finally, the ability of identifying highly informed
nodes - characterized by high InfoRank values - may
also provide strategies to optimally sample networks,
when gathering information on individual nodes is
costly, e.g. when surveying a financial system for
regulatory purposes.
ACKNOWLEDGEMENTS
PB and TS acknowledge support from: FET
Project DOLFINS nr. 640772 and FET IP Project
MULTIPLEX nr. 317532.
[1] Newman M.E.J. Networks: An Introduction. Ox-
[2] Bloch F., Jackson M.O. & Tebaldi P. Centrality
ford University Press (2010).
Measures in Networks, arXiv:1608.05845 (2017).
11
[7] Squartini T., Cimini G., Gabrielli A. & Garlaschelli
D. Network reconstruction via density sampling,
Applied Network Science 2 (3), doi:10.1007/s41109-
017-0021-8 (2017).
[8] Zhang Q., Meizhu L., Yuxian D. & Yong D.
structure entropy of complex networks,
Local
arXiv:1412.3910v1 (2014).
[9] Bianconi G., Pin P. & Marsili M., Assess-
ing the relevance of node features for network
structure, PNAS 106 (28),
1143311438, doi:
10.1073/pnas.0811511106 (2009).
[10] Bianconi, G. The entropy of randomized network
ensembles. Europhysics Letters 81 (2), 28005 (2007).
[11] Borgatti S.P. Identifying sets of key players in a
social network, Computational and Mathematical
Organization Theory 12, 2134, doi:10.1007/s10588-
006-7084-x (2006).
[12] Park J. & Newman M.E.J. The statistical mechan-
ics of networks, Physical Review E 70, 066117,
doi:10.1103/PhysRevE.70.066117 (2004).
[13] Oshio K., Iwasaki Y., Morita S., Osana Y., Gomi S.,
Akiyama E., Omata K., Oka K. & Kawamura K.,
Tech. Rep. of CCeP, Keio Future 3, (Keio Univer-
sity, 2003).
[14] Colizza V., PastorSatorras R. & Vespignani A., Re-
actiondiffusion processes and metapopulation mod-
els in heterogeneous networks Nature Physics 3,
276-282 (2007).
[15] Martinez N.D. Artifacts or Attributes? Effects of
Resolution on the Little Rock Lake Food Web, Eco-
logical Monographs 61 (4), 367-392 (1991).
[16] Fortunato S., Boguna M., Flammini A. & Menczer
F. Approximating PageRank from In-Degree in Lec-
ture Notes in Computer Science 4936. Springer,
Berlin (2008).
[18] Squartini T.,
[17] Gleditsch, K.S. Expanded trade and GDP data,
Journal of Conflicts Resolution 46, 712724 (2002).
Fagiolo G., Garlaschelli D.
Randomizing world trade.
I. A binary net-
work analysis, Physical Review E 84, 046117,
doi:10.1103/PhysRevE.84.046117 (2011).
[19] Wittenberg-Moerman R., The role of information
asymmetry and financial reporting quality in debt
trading: Evidence from the secondary loan mar-
ket,Journal of Accounting and Economics 46 (2),
240-260 (2008).
[20] Eisenberg L. & Noe T.H. Systemic risk in finan-
cial systems, Management Science 47 (2), 236-249
(2001).
[21] Rogers L.C.G. & Veraart L.A.M. Failure and rescue
in an interbank network, Management Science 59
(4), 882-898, (2013).
[22] Barucca P. & and Lillo F. The organization of
the interbank network and how ECB unconven-
tional measures affected the e-MID overnight mar-
ket, arXiv:1511.08068 (2015).
[23] Glasserman P. & Young P.H. Contagion in financial
networks, Journal of Economic Literature 54 (3),
779-831 (2016).
[24] Barucca P., Bardoscia M., Caccioli F., D'Errico M.,
Visentin G., Battiston S. & Caldarelli, G. Network
valuation in financial systems, arXiv:1606.05164
(2016).
FIG. 7. Mean squared error over the payment vector
of the financial clearing process on the e-MID network.
The parameters that account for fire sales effect and in-
solvency costs in the Rogers-Veraart [21] clearing mecha-
nism are α = β = .9. The dotted line is a linear fit of the
data y = −0.087∗ x + 0.14 (RSS = 0.0070645), while the
solid line is a quadratic fit y = −0.79∗x2−0.063∗x+0.14
(RSS = 0.007046).
rAi,Ri
Di
Ci
Pi
Ii
Little Rock food web
0.44 0.34 0.27 0.97
C. Elegans neural network 0.82 0.60 0.65 0.98
US airports network (1997) 0.89 0.39 0.89 0.99
e-MID interbank network
0.52 0.44 0.57 0.99
World Trade Web (1950) 0.097 0.008 0.098 0.99
-0.1 -0.23 -0.15 0.99
World Trade Web (1970)
World Trade Web (2000)
-0.39 -0.52 -0.42 0.99
TABLE I. Table showing the Pearson correlation coeffi-
cient between the vector of accuracy values Ai and the
vector of (rescaled) ranking scores Ri. The transforma-
tion (which doesn't affect the correlation value) reads
i }) ∈
R
[0, 1] with R(a)
representing the rank of node i according
to the chosen algorithm a.
i })/(max{R(a)
i } − min{R(a)
i
(a)
i = (R(a)
i − min{R(a)
[3] Borgatti S.P. Centrality and network flow, Social
Networks 27, 55-71 (2005).
[4] Benzi M. & Klymko C. A matrix analysis of
different centrality measures, SIAM Journal on
Matrix Analysis and Applications 36, 686706,
doi:10.1137/130950550 (2013).
[5] Sabidussi G. The centrality index of a graph, Psy-
chometrika 31, 581603 (1966).
[6] Langville A.N. & Meyer C. Google's PageRank and
Beyond. Princeton University Press (2006).
12
(cid:16) kout
(cid:17)
0 and −(N − 1)(cid:2)pout
0 (cid:39) −kout
FIG. 8. Comparison between InfoRank Ii ((cid:4)) and S(i)
(blue, dashed line). We have also tested the agreement
between the latter and the two approximation derived in the Methods section (red, dashed line). While, for sparse
networks, S(i)
between S(i)
ij = kout
pout
(cid:16) kin
(cid:17)
(cid:1) ln(cid:0)1 − pout
ij +(cid:0)1 − pout
(cid:1)(cid:3) − (N − 1)(cid:2)pin
, for dense networks a non-trascurable difference exists
ij +(cid:0)1 − pin
ij
(cid:1) ln(cid:0)1 − pin
(cid:1)(cid:3) with
+ kout
i − kin
i
ij ln pin
i
N−1 and pin
ij = kin
N−1 ).
i
ln pout
+ kin
i
i√
L
ij
ln
i√
L
ln
i
0
ij
ij
ij
|
1812.08933 | 1 | 1812 | 2018-12-21T03:56:59 | Neural Diffusion Model for Microscopic Cascade Prediction | [
"cs.SI",
"physics.soc-ph"
] | The prediction of information diffusion or cascade has attracted much attention over the last decade. Most cascade prediction works target on predicting cascade-level macroscopic properties such as the final size of a cascade. Existing microscopic cascade prediction models which focus on user-level modeling either make strong assumptions on how a user gets infected by a cascade or limit themselves to a specific scenario where "who infected whom" information is explicitly labeled. The strong assumptions oversimplify the complex diffusion mechanism and prevent these models from better fitting real-world cascade data. Also, the methods which focus on specific scenarios cannot be generalized to a general setting where the diffusion graph is unobserved.
To overcome the drawbacks of previous works, we propose a Neural Diffusion Model (NDM) for general microscopic cascade prediction. NDM makes relaxed assumptions and employs deep learning techniques including attention mechanism and convolutional network for cascade modeling. Both advantages enable our model to go beyond the limitations of previous methods, better fit the diffusion data and generalize to unseen cascades. Experimental results on diffusion prediction task over four realistic cascade datasets show that our model can achieve a relative improvement up to 26% against the best performing baseline in terms of F1 score. | cs.SI | cs |
TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015
1
Neural Diffusion Model for
Microscopic Cascade Prediction
Cheng Yang, Maosong Sun, Haoran Liu, Shiyi Han, Zhiyuan Liu, Huanbo Luan
Abstract -- The prediction of information diffusion or cascade has attracted much attention over the last decade. Most cascade
prediction works target on predicting cascade-level macroscopic properties such as the final size of a cascade. Existing microscopic
cascade prediction models which focus on user-level modeling either make strong assumptions on how a user gets infected by a
cascade or limit themselves to a specific scenario where "who infected whom" information is explicitly labeled. The strong assumptions
oversimplify the complex diffusion mechanism and prevent these models from better fitting real-world cascade data. Also, the methods
which focus on specific scenarios cannot be generalized to a general setting where the diffusion graph is unobserved.
To overcome the drawbacks of previous works, we propose a Neural Diffusion Model (NDM) for general microscopic cascade
prediction. NDM makes relaxed assumptions and employs deep learning techniques including attention mechanism and convolutional
network for cascade modeling. Both advantages enable our model to go beyond the limitations of previous methods, better fit the
diffusion data and generalize to unseen cascades. Experimental results on diffusion prediction task over four realistic cascade datasets
show that our model can achieve a relative improvement up to 26% against the best performing baseline in terms of F1 score.
Index Terms -- Information Diffusion, Neural Network
!
1 INTRODUCTION
I Nformation diffusion is a ubiquitous and fundamental
event in our daily lives, such as the spread of rumors,
the contagion of viruses and the propagation of new ideas
and technologies. The diffusion process, also called a cascade,
has been studied over a broad range of domains. Though
some works believe that even the eventual size of a cascade
cannot be predicted [1], recent works [2], [3], [4] have shown
the ability to predict the size, growth and many other
key properties of a cascade. Nowadays the modeling and
prediction of cascades play an important role in many real-
world applications, e.g. production recommendation [5], [6],
[7], [8], [9], epidemiology [10], [11], social networks [12],
[13], [14] and the spread of news and opinions [15], [16],
[17].
Most previous works on cascade prediction focus on the
prediction of macroscopic properties such as the total number
of users who share a specific photo [2] and the growth curve
of the popularity of a blog [3]. However, macroscopic cas-
cade prediction is a rough estimate of cascades and cannot
be adapted for microscopic questions as shown in Fig. 1.
Microscopic cascade prediction, which pays more attention
to user-level modeling and prediction instead of cascade-
level, is much more powerful than macroscopic prediction
and allows us to apply user-specific strategies for real-world
• Cheng Yang, Maosong Sun (corresponding author), Zhiyuan Liu and
Huanbo Luan are with the Department of Computer Science and Tech-
nology, Tsinghua University, Beijing 100084, China.
E-mail: [email protected],
{sms,liuzy}@mail.tsinghua.edu.cn, [email protected]
• Haoran Liu is with the Department of Electric Engineering, Tsinghua
University, Beijing 100084, China.
E-mail: [email protected]
Shiyi Han is with the Department of Computer Science, Brown Univer-
sity, U.S.A.
E-mail: [email protected]
•
Fig. 1. Macroscopic cascade prediction v.s. microscopic cascade pre-
diction.
applications. For example, during the adoption of a new
product, microscopic cascade prediction can help us deliver
advertisements to those users that are most likely to buy the
product at each stage. In this paper, we focus on the study
of microscopic cascade prediction.
Though useful and powerful, the microscopic prediction
of cascades faces great challenges because the real-world
diffusion process could be rather complex [18] and usually
partially observed [11], [19]:
Complex mechanism. Since the mechanism of how a
specific user gets infected 1 is sophisticated, traditional
cascade models based on strong assumptions and simple
formulas may not be the best choice for microscopic cascade
prediction. Existing cascade models [20], [21], [22], [23]
which could be adopted for microscopic prediction mostly
ground in Independent Cascade (IC) model [12]. IC model
1. We use "infected" and "activated" alternatively to indicate that a
user is influenced by a cascade.
TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015
2
assigns a static probability pu,v to user pairs (u, v) with
pairwise independent assumptions, where the probability
pu,v indicates how likely user v will get infected by user u
when u is infected. Other diffusion models [24], [25] make
even stronger assumptions that the infected users are only
determined by the source user. Though intuitive and easy
to understand, these cascade models are based on strong
assumptions and oversimplified probability estimation for-
mulas, both of which limit the expressivity and ability to fit
complex real-world cascade data [26]. The complex mech-
anism of real-world diffusions encourages us to explore
more sophisticated models, e.g. deep learning techniques,
for cascade modeling.
Incomplete observation. On the other hand, the cascade
data is usually partially observed indicates that we can
only observe those users getting infected without knowing
who infected them. However, to the best of our knowledge,
existing deep-learning engined microscopic cascade mod-
els [27], [28] are based on the assumption that the diffusion
graph where a user can only infect and get infected by
its neighbors is already known. For example, when we
study the retweeting behavior on the Twitter network, "who
infected whom" information is explicitly labeled in retweet
chain and the next infected user candidates are restricted
to the neighboring users rather than the whole user set.
While in most diffusion processes such as the adoption of a
product or the contamination of a virus, the diffusion graph
is unobserved [11], [19], [29]. Therefore, these methods
consider a much simpler problem and cannot be generalized
to a general setting where the diffusion graph is unknown.
To fill in the blank of general microscopic cascade pre-
diction and address the limitations of traditional cascade
models, we propose a neural diffusion model based on
relaxed assumptions and employ up-to-date deep learning
techniques, i.e. attention mechanism and convolutional neu-
ral network, for cascade modeling. The relaxed assumptions
enable our model to be more flexible and less constrained,
and deep learning tools are good at capturing the complex
and intrinsic relationships that are hard to be characterized
by hand-crafted features. Both advantages allow our model
to go beyond the limitations of traditional methods based on
strong assumptions and oversimplified formulas and better
fit the complicated cascade data. Following the experimental
settings in [23], we conduct experiments on diffusion pre-
diction task over four realistic cascade datasets to evaluate
the performances of our proposed model and other state-
of-the-art baseline methods. Experimental results show that
our model can achieve a relative improvement up to 26%
against the best performing baseline in terms of F1 score.
To conclude, our contributions are 3-fold:
• To the best of our knowledge, our work is the first
attempt to employ deep learning techniques for gen-
eral microscopic cascade prediction problem where
the diffusion graph is unknown.
• We design a neural diffusion model based on relaxed
assumptions compared with the pairwise indepen-
dence assumption in traditional cascade models and
allow our model to better fit real-world cascades and
generalize to unseen data.
• Experimental results on diffusion prediction task
over four realistic datasets demonstrate the effective-
ness and robustness of our proposed model. Com-
pared with the best performing baseline, our model
can achieve a relative improvement up to 26% on F1
score.
2 RELATED WORKS
We organize related works into macroscopic and micro-
scopic cascade prediction methods. In terms of method-
ology, our work is also related to network representation
learning methods.
2.1 Macroscopic Cascade Prediction
Most previous works on cascade prediction focused on
macroscopic level prediction such as the eventual size of
a cascade [4] and the growth curve of popularity [3]. Macro-
scopic cascade prediction methods can further be classified
into feature-based approaches, generative approaches, and
deep-learning based approaches. Feature-based approaches
formalized the task as a classification problem [2], [30] or
a regression problem [31], [32] by applying SVM, logistic
regression and other machine learning algorithms on hand-
crafted features including temporal [33] and structural [2]
features. Generative approaches considered the growth of
cascade size as an arrival process of infected users and
employed stochastic processes, such as Hawkes self-exciting
point process [4], [34], for modeling. With the success of
deep learning techniques in various applications, deep-
learning based approaches, e.g. DeepCas [26] and Deep-
Hawkes [35], were proposed to employ Recurrent Neural
Network (RNN) for encoding cascade sequences into feature
vectors instead of hand-crafted features. Compared with
hand-crafted feature engineering, deep-learning based ap-
proaches have better generalization ability across different
platforms and give better performance on macroscopic pre-
diction task.
2.2 Microscopic Cascade Prediction
Our work is more related to microscopic cascade prediction
which focuses on user-level modeling and predictions. We
classify related works into three categories: IC-based ap-
proaches, embedding-based approaches, and deep-learning
based approaches.
IC model [12], [15], [36], [37] is one of the most popu-
lar diffusion models which assumed independent diffusion
probability through each link. Extensions of IC model fur-
ther considered time delay information by incorporating a
predefined time-decay weighting function, such as continu-
ous time IC [38], CONNIE [19], NetInf [20] and Netrate [21].
Infopath [22] was proposed to infer dynamic diffusion prob-
abilities based on information diffusion data and study the
temporal evolution of information pathways. MMRate [39]
inferred multi-aspect transmission rates by incorporating
aspect-level user interactions and various diffusion patterns.
All above methods learned the probabilities from cascade
sequences. Once a model is trained, it can be used for
microscopic cascade prediction by simulating the generative
process using Monte Carlo simulation.
TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015
3
Embedding-based approaches encoded each user into
a parameterized real-valued vector and trained the pa-
rameters by maximizing an objective function. Embedded
IC [23] followed the pairwise independence assumption in
IC model and modeled the diffusion probability between
two users by a function of their user embeddings. Other
embedding-based diffusion models [24], [25] made even
stronger assumptions that infected users are determined
only by the source user and the content of information item.
As shown in previous work [26], such models with strong
assumptions oversimplify the reality and generally show
poor performance on real prediction tasks.
Existing deep-learning based microscopic cascade pre-
diction approaches [27], [28] focused on the retweeting and
sharing behaviors in a social network where "who infected
whom" information is explicitly labeled in retweet chain.
The next infected user candidates are also restricted to
the neighboring users when the diffusion graph is known.
However, the diffusion graph is usually unknown for most
diffusion processes [11], [19]. For example, during the con-
tamination of a virus, by whom a patient gets infected is
unobserved. Existing deep-learning based methods consid-
ered a much simpler problem and cannot be generalized to
a general setting where the diffusion graph is unobserved.
To the best of our knowledge, our work is the first attempt
to employ deep learning techniques for general microscopic
cascade prediction problem where the diffusion graph is
unknown.
2.3 Network Representation Learning
Researchers have explored many algorithms to represent
nodes in a network by real-valued vectors. By projecting
topology structure into vectors, we can apply machine learn-
ing techniques for many network applications, e.g. classifi-
cation. Most network representation learning works focus
on task unspecific learning where the downstream task is
unknown. Early stage works [40] use eigenvector computa-
tion to learn node embeddings. With the success of neural
networks, people also employ simple neural networks for
representation learning [41], [42]. For task specific learning,
a certain task such as classification [43] and recommenda-
tion [44] is specified and the network embeddings serve
as the bottom layer of their model as what we will do in
this paper. In terms of diffusion prediction task, Embedded
IC [23] is proposed and will be used as our baseline method.
3 DATA OBSERVATION
In this section, we will conduct data observation on real-
world datasets and investigate the intrinsic relationships
between activated users in a diffusion sequence. In specific,
we will try to figure out whether consecutively activated
users are more likely to be relevant and thus appear in
more diffusion sequences together. We will first introduce
the datasets.
3.1 Datasets
We collect four real-world cascade datasets that cover a
variety of applications for evaluation. A cascade is an item
or some kind of information that spreads through a set of
TABLE 1
Statistics of Datasets.
# Users
982
540
498
19,546
# Links
506,582
62,605
158,194
18,687,423
# Cascades Avg. Length
23,802
471
8,304
6,158
7.66
13.63
8.43
36.74
Dataset
Lastfm
Irvine
Memetracker
Twitter
users. Each cascade consists of a list of (user, timestamp)
pairs where each pair indicates the fact that the user gets
infected at the timestamp.
Lastfm is a music streaming website. We collect the
dataset from [45]. The dataset contains the full history of
nearly 1, 000 users and the songs they listened to over one
year. We treat each song as an item spreading through users
and remove the users who listen to no more than 5 songs.
Irvine is an online community for students at University
of California, Irvine collected from [46]. Students can partic-
ipate in and write posts on different forums. We regard each
forum as an information item and remove the users who
participate in no more than 5 forums.
Memetracker 2 collects a million of news stories and blog
posts and track the most frequent quotes and phrases, i.e.
memes, for studying the migration of memes across a group
of people. Each meme is considered to be an information
item and each URL of websites or blogs is regarded as a
user. Following the settings of previous works [23], we filter
the URLs to only keep the most active ones to alleviate the
effect of noise.
Twitter dataset [47] concerns tweets containing URLs
posted on Twitter during October 2010. The complete tweet-
ing history of each URL is collected. We consider each
distinct URL as a spreading item over Twitter users. We filter
out the users with no more than 5 tweets. Note that the scale
of Twitter dataset is competitive and even larger than the
datasets used in previous neural-based cascade modeling
algorithms [23], [28].
Note that all the above datasets have no explicit evidence
about by whom a user gets infected. Though we have the
following relationship in Twitter dataset, we still cannot
trace the source of by whom a user is encouraged to tweet a
specific URL unless the user directly retweets.
We list the statistics of datasets in Table 1. Since we
have no interaction graph information between users, we
assume that there exists a link between two users if they
appear in the same cascade sequence. Each virtual "link"
will be assigned a parameterized probability in traditional
IC model and thus the space complexity of traditional
methods is relatively high especially for large datasets. We
also calculate the average cascade length of each dataset in
the last column.
3.2 Statistical Analysis
Now we will try to reveal the correlation patterns between
users by statistical results. By intuition, two consecutively
infected users in a cascade sequence are more likely to have
connections, e.g. one infects another, and thus participate in
many other diffusion sequences together.
2. http://www.memetracker.org
TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015
4
(a) Lastfm
(b) Irvine
(c) Memetracker
(d) Twitter
Fig. 2. Statistical results of the expectation of co-occurrence times of two random users given the fact that they are both infected by a cascade with
K users infected between them. Here < 10 and ≥ 10 are average co-occurrence times for K < 10 and K ≥ 10.
(a) Lastfm
(b) Irvine
(c) Memetracker
(d) Twitter
Fig. 3. Statistical results of the expectation of co-occurrence times of two random users given the fact that they are both infected by a cascade with
K users infected between them and they are the top 5% user pairs in terms of co-occurrence times satisfying the previous condition.
To demonstrate this statement, we consider the follow-
ing statistics: given the fact that user ui and uj are infected
in a cascade sequence with K users infected between them
in this sequence, what will be the expectation of the number
of cascade sequences that user ui and uj both participate in?
Here K = 0 indicates that user ui and uj are consecutively
activated. If the intuition is true, then the expectation should
decrease as K increases.
Fig. 2 presents the statistical results of all four datasets.
Here we list the results for K = 0, 1, 2, 3 and the average
for K < 10 and K ≥ 10. The statistics show that the expec-
tations of co-occurrence times for K < 10 are consistently
larger than those for K ≥ 10. Note that the gap is not very
large for some datasets due to the long-tail effect. Therefore,
we further present the results only for the top 5% user pairs
in terms of co-occurrence times for each K in Fig. 3. We can
see the differences more clearly in this setting.
These statistical results demonstrate that consecutively
infected users in a cascade sequence are more likely to be
relevant. By saying two users are "relevant", there could
be a direct diffusion path between them or they are both
likely to be infected by a third one. Also, we find that
not only the most recently infected user will be relevant to
the next infected one: As shown in Fig. 2 and 3, all recent
infected users (K = 0, 1, 2, 3) could be relevant with minor
differences (more relevant for smaller K). We will build our
model based on these findings in next section.
4 METHOD
In this section, we will start by formalizing the problem and
introducing the notations. Then we propose two heuristic
assumptions according to the data observations as our basis
and design a Neural Diffusion Model (NDM) using deep
learning techniques. Finally, we will introduce the overall
optimization function and other details of our model.
0, ui
4.1 Problem Formalization
A cascade dataset records the information that an item
spreads to whom and when during its diffusion. For ex-
ample, the item could be a product and the cascade records
who bought the product at what moment. However, in most
cases, there exists no explicit interaction graph between the
users [23], [37]. Therefore, we have no explicit information
about how a user was infected by other users.
Formally, given user set U and observed cascade se-
quence set C, each cascade ci ∈ C consists a list of users
1 . . . uici−1} ranked by their infection time, where ci
{ui
j ∈ U is the j-th user
is the length of sequence ci and ui
in the sequence ci. Note that we only consider the order
of users getting infected and ignore the exact timestamps of
infections in this paper as previous works did [23], [28], [29].
In this paper, our goal is to learn a cascade prediction
model which can predict the next infected user uj+1 given
a partially observed cascade sequence {u0, u1 . . . uj}. The
learned model is able to predict the entire infected user
sequence based on the first few observed infected users and
thus be used for microscopic cascade prediction illustrated
in Figure 1. In our model, we add a virtual user called
"Terminate" to the user set U. At training phase, we append
"Terminate" to the end of each cascade sequence and allow
the model to predict next infected user as "Terminate" to
indicate that no more users will be infected in this cascade.
Further, we represent each user by a parameterized real-
valued vector to project users into vector space. The real-
valued vectors are also called embeddings. We denote the
embedding of user u as emb(u) ∈ Rd where d is the
0123<10>=101616.51717.51818.519KCo−occurence Times0123<10>=101.81.851.91.9522.052.1KCo−occurence Times0123<10>=101520253035KCo−occurence Times0123<10>=104.555.566.57KCo−occurence Times0123<10>=107580859095100105110KCo−occurence Times0123<10>=1066.577.58KCo−occurence Times0123<10>=10120140160180200220240260KCo−occurence Times0123<10>=102025303540KCo−occurence TimesTRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015
dimension of embeddings. In our model, a larger inner
product between the embeddings of two users indicates a
stronger correlation between the users.
4.2 Model Assumptions
In traditional Independent Cascade (IC) model [12] set-
tings, all previously infected users can activate a new user
independently and equally regardless of their orders of
getting infected. Many extensions of IC model further con-
sidered time delay information such as continuous time IC
(CTIC) [38] and Netrate [21]. However, none of these models
tried to find out which users are actually active and more
likely to activate other users at the moment. To address this
issue, we propose the following assumption.
Assumption 1. Given a recently infected user u, users
that are strongly correlated to user u including user u itself
are more likely to be active.
This assumption is intuitive and straight-forward. As a
newly activated user, u should be active and may infect
other users. The users strongly correlated to user u are
probably the reason why user u gets activated recently and
thus more likely to be active than other users at the moment.
We further propose the concept of "active user embedding"
to characterize all such active users.
Definition 1. For each recently infected user u, we aim
to learn an active user embedding act(u) ∈ Rd which
represents the embedding of all active users related to user
u, and can be used for predicting the next infected user in
next step.
The active user embedding act(uj) characterizes the
potential active users related to the fact that user uj gets
infected. From the data observations, we can see that all
recently infected users could be relevant to the next infected
one. Therefore, the active user embeddings of all recently
infected users should contribute to the prediction of next
infected user, which leads to the following assumption.
Assumption 2. All recently infected users should con-
tribute to the prediction of next infected user and be pro-
cessed differently according to the order of getting infected.
Compared with the strong assumptions made by IC-
based and embedding-based method introduced in related
works, our heuristic assumptions allow our model to be
more flexible and better fit cascade data. Now we will
introduce how to build our model based on these two
assumptions, i.e. extracting active users and unifying these
embeddings for prediction.
4.3 Extracting Active Users with Attention Mechanism
For the purpose of computing active user embeddings, we
propose to use attention mechanism [48], [49] to extract the
most likely active users by giving them more weights than
other users. As shown in Figure 4, the active embedding
of user uj is computed as a weighted sum of previously
infected users:
act(uj) =
wjkemb(uk),
(1)
where the weight of uk is
(cid:80)j
wjk =
exp(emb(uj)emb(uk)T )
m=0 exp(emb(uj)emb(um)T )
.
(2)
j(cid:88)
k=0
j(cid:88)
Note that wjk ∈ (0, 1) for every k and(cid:80)j
m=0 wjm = 1. wjk
is the normalized inner product between the embeddings
of uj and uk which indicates the strength of correlation
between them.
5
From the definition of active user embedding act(uj)
in Eq. 1, we can see that the user embeddings emb(uk)
which have a larger inner product with emb(uj) will be
allocated a larger weight wjk. This formula naturally follows
our assumption that users strongly correlated to user u
including user u itself should be paid more attention.
To fully utilize the advantages of a neural model, we
further employ the multi-head attention [49] to improve
the expressibility. Multi-head attention projects the user
embeddings into multiple subspaces with different linear
projections. Then multi-head attention performs attention
mechanism on each subspace independently. Finally, multi-
head attention concatenates the attention embeddings in all
subspaces and feeds the result into a linear projection again.
Formally, in a multi-head attention with h heads, the
embedding of i-th head is computed as
headi =
wi
jkemb(uk)W V
i ,
(3)
k=0
where
wi
jk =
i (emb(uk)W K
(cid:80)j
exp(emb(uj)W Q
m=0 exp(emb(uj)W Q
i ∈ Rd×d are head-specific linear projection
W V
matrices. In particular, W Q
can be seen to project
user embeddings into receiver space and sender space respec-
tively for asymmetric modeling.
i )T )
i (emb(um)W K
i and W K
i
i , W Q
i , W K
i )T )
(4)
,
Then we have the active user embedding act(uj)
act(uj) = [head1, head2 . . . headh]W O,
(5)
indicates concatenation operation and W O ∈
where []
Rhd×d projects the concatenated results into d-dimensional
vector space.
Multi-head attention allows the model to "divide and
conquer" information from different perspectives (i.e. sub-
spaces) independently and thus is more powerful than the
traditional attention mechanism.
4.4 Unifying Active User Embeddings for Prediction
with Convolutional Network
Different from previous works [21], [50] which directly give
a time-decay weight that assumes larger weights for the
most recently infected users, we propose to use a param-
eterized neural network to handle the active user embed-
dings at different positions. Compared with a predefined
exponential-decay weighting function [21], a parameterized
neural network can be learned automatically to fit the real-
world dataset and capture the intrinsic relationship between
active user embedding at each position and next infected
user prediction. In this paper, we consider Convolutional
Neural Network (CNN) to meet this purpose.
CNN has been widely used in image recognition [51],
recommender systems [52] and natural language process-
ing [53]. CNN is a shift-invariant neural network and allows
TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015
6
Fig. 4. An overview of our Neural Diffusion Model (NDM). NDM sequentially predicts the next infected user based on the active embeddings (the
blue nodes) of recent activated users and the active embeddings is computed by an attention layer over the user embeddings (the green nodes) of
all previous infected users.
us to assign position-specific linear projections to the em-
beddings.
Figure 4 illustrates an example where the window size
of our convolutional layer win = 3. The convolutional
layer first converts each active user embedding act(uj−n)
into a U-dimensional vector by a position-specific linear
n ∈ Rd×U for n = 0, 1 . . . win − 1.
projection matrix W C
Then the convolutional layer sums up the projected vectors
and normalizes the summation by softmax function.
Formally, given partially observed cascade sequence
(u0, u1 . . . uj), the predicted probability distribution prej ∈
RU is
prej = softmax(
act(uj−n)W C
n ),
(6)
n=0
(cid:80)
where softmax(x)[i] = exp(x[i])
p exp(x[p]) and x[i] denotes the i-
th entry of a vector x. Each entry of prej represents the
probability that the corresponding user gets infected at next
step.
Since the initial user u0 plays an important role in the
whole diffusion process, we further take u0 into considera-
tion:
win−1(cid:88)
win−1(cid:88)
act(uj−n)W C
prej = softmax(
init · Finit),
(7)
init ∈ Rd×U is the projection matrix for initial user
where W C
u0 and Finit ∈ {0, 1} is a hyperparameter which controls
whether incorporate initial user for prediction or not.
n + act(u0)W C
n=0
4.5 Overall Architecture, Model Details and Learning
Algorithms
We naturally maximize the log-likelihood of all observed
cascade sequences to build the overall optimization func-
tion.
log prei
j[ui
j+1],
(8)
(cid:88)
ci−2(cid:88)
ci∈C
j=0
L(Θ) =
j[ui
n , W Q
n , W K
init, W C
where prei
j+1] is the predicted probability of ground
truth next infected user ui
j+1 at position j in cascade ci, and
Θ is the set of all parameters need to be learned, including
user embeddings emb(u) ∈ Rd for each u ∈ U, projection
n ∈ Rd×d for
matrices in multi-head attention W V
n = 1, 2 . . . h, W O ∈ Rhd×d and projection matrices in con-
n ∈ Rd×U for n = 0, 1 . . . win−1.
volutional layer W C
Implementation Details. We implement our model us-
ing PyTorch 3 and optimize the parameters by gradient
descent with Adam optimizer [54]. We further employ layer
normalization [55] and residual connection [56] operation
to active user embedding to avoid gradient explosion or
vanishment problem that may occur in deep neural net-
works. In other words, the active user embedding act(u)
is replaced by LayerN orm(emb(u) + act(u)) instead where
the LayerN orm(·) function encourages the output to have
zero mean and unit variance. We also use dropout [57] to the
attention mechanism to prevent our model from overfitting
and the dropout rate is set to 0.1. Since the same user will
3. http://pytorch.org
TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015
7
Complexity. The space complexity of our model
not be infected twice, we mask the users that are already
infected in the Eq. 7 so that they won't be predicted. We
release our source code at github 4 and all the details are
listed. Hyperparameter settings will be introduced in next
section.
is
O(dU) where d is the embedding dimension which is
much less than the size of user set. Note that the space
complexity of training traditional IC model will go up to
O(U2) because we need to assign an infection probability
between each pair of potential linked users. Therefore, the
space complexity of our neural model is less than that of
traditional IC methods.
The computation of a single active embedding takes
O(cid2) time where ci is the length of corresponding cas-
cade and the next infected user prediction in Eq. 7 step takes
O(dU) time. Hence the time complexity of training a single
ci∈C(ci2d2 +cidU)) which is competitive
with previous neural-based models such as embedded IC
model [23]. But as we will show in the experiments, our
model converges much faster than embedded IC model and
is capable of handling large-scale dataset.
cascade is O((cid:80)
5 EXPERIMENTS
We conduct experiments on diffusion prediction task as
previous works did [23] to evaluate the performance of our
model and various baseline methods. We will first introduce
the baseline methods, evaluation metrics and hyperparam-
eter settings. Then we will present the experimental results
and give further analysis about the evaluation.
5.1 Baselines
We consider a number of state-of-the-art baselines to
demonstrate the effectiveness of our algorithm. Most of the
baseline methods will learn a transition probability matrix
M ∈ RU×U from cascade sequences where each entry
Mij represents the probability that user uj gets infected by
ui when ui is activated.
Netrate [21] considers the time-varying dynamics of
diffusion probability through each link and defines three
transmission probability models, i.e. exponential, power-law
and Rayleigh, which encourage the diffusion probability to
decrease as the time interval increases. In our experiments,
we only report the results of exponential model since the
other two models give similar results.
Infopath [22] also targets on inferring dynamic diffusion
probabilities based on information diffusion data. Infopath
employs stochastic gradient to estimate the temporal dy-
namics and studies the temporal evolution of information
pathways.
Embedded IC [23] explores representation learning tech-
nique and models the diffusion probability between two
users by a function of their user embeddings instead of a
static value. Embedded IC model is trained by stochastic
gradient descent method.
LSTM is a widely used neural network framework [58]
for sequential data modeling and has been used for cascade
modeling recently. Previous works employ LSTM for some
4. https://github.com/albertyang33/NeuralDiffusionModel
simpler tasks such as popularity prediction [26] and cascade
prediction with known diffusion graph [27], [28]. Since
none of these works are directly comparable to ours, we
adopt LSTM network for comparison by adding a softmax
classifier to the hidden state of LSTM at each step for next
infected user prediction.
5.2 Hyperparameter Settings for Neural Models
Though the parameter space of neural network based meth-
ods is much less than that of traditional IC models, we
have to set several hyperparameters to train neural models.
To tune the hyperparameters, we randomly select 10% of
training cascade sequences as validation set. Note that all
training cascade sequences including the validation set will
be used to train the final model for testing.
For Embedded IC model, the dimension of user embed-
dings is selected from {25, 50, 100} as the original paper
did [23]. For LSTM model, the dimensions of user embed-
dings and hidden states are set to the best choice from
{16, 32, 64, 128}. For our model NDM, the number of heads
used in multi-head attention is set to h = 8, the window
size of convolutional network is set to win = 3 and the
dimension of user embeddings is set to d = 64. Note that
we use the same set of (h, win, d) for all the datasets. The
flag Finit in Eq. 7 which determines whether the initial user
is used for prediction is set to Finit = 1 for Twitter dataset
and Finit = 0 for the other three datasets. We will show the
robustness of our model in parameter sensitivity subsection.
Note that neural models, i.e. Embedded IC, LSTM and
NDM, are based on matrix multiplication operations and
thus naturally benefit from the GPU acceleration. Therefore,
we train these three methods on a GPU device (GeForce
GTX TITAN X) instead of a CPU device (Intel Xeon E5-2620
@ 2.0GHz).
5.3 Diffusion Prediction
To compare the ability of cascade modeling, we evaluate
our model and all baseline methods on the diffusion predic-
tion task. We follow the experimental settings in Embed-
ded IC [23]. We randomly select 90% cascade sequences
as training set and the rest as test set. For each cascade
sequence c = (u0, u1, u2 . . . ) in the test set, only the ini-
tial user u0 is given and all successively infected users
Gc = {u1, u2 . . . uGc} need to be predicted.
All baseline methods and our model are required to
predict a set of users and the results will be compared with
ground truth infected user set G. For baseline methods that
ground in IC model, i.e. Netrate, Infopath and Embedded
IC, we will simulate the infection process according to
the learned pairwise diffusion probability and their corre-
sponding generation process. For LSTM and our model, we
can sequentially sample a user according to the probability
distribution of softmax classifier at each step.
Note that the ground truth infected user set could also be
partially observed because the datasets are crawled within a
short time window. Therefore, for each test sequence c with
Gc ground truth infected users, all the algorithms are only
required to predict the first Gc infected users in a single
simulation. Also note that the simulation may terminate and
stop infecting new users before activating Gc users.
TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015
8
Experimental results on diffusion prediction.
TABLE 2
Metric
Macro-F1
Micro-F1
Dataset
Lastfm
Irvine
Twitter
Lastfm
Irvine
Twitter
Memetracker
Memetracker
Netrate
0.017
0.068
0.032
0.007
0.050
0.029
-
-
Infopath
0.030
0.110
0.052
0.044
0.046
0.142
0.073
0.010
Method
Embedded IC
0.020
0.060
0.054
0.085
0.115
0.102
-
-
LSTM
0.026
0.102
0.041
0.103
0.072
0.137
0.080
0.052
NDM
0.056
0.139
0.076
0.139
0.095
0.171
0.108
0.087
Improvement
+87%
+26%
+41%
+35%
+12%
+20%
+6%
+67%
Experimental results on diffusion prediction at early stage where only the first five infected users are predicted in each cascade.
TABLE 3
Metric
Macro-F1
Micro-F1
Dataset
Lastfm
Irvine
Twitter
Lastfm
Irvine
Twitter
Memetracker
Memetracker
Netrate
0.018
0.071
0.031
0.016
0.076
0.028
-
-
Infopath
0.028
0.094
0.030
0.040
0.035
0.106
0.030
0.050
Method
Embedded IC
0.010
0.042
0.027
0.013
0.040
0.029
-
-
LSTM
0.018
0.091
0.018
0.097
0.019
0.094
0.020
0.093
NDM
0.048
0.122
0.064
0.123
0.045
0.126
0.065
0.118
Improvement
+71%
+30%
+106%
+27%
+29%
+19%
+117%
+27%
We conduct 1000 times Monte Carlo simulations for each
test cascade sequence c for all algorithms and compute the
u of each user u ∈ U. We evaluate
infection probability P c
the prediction results using two classic evaluation metrics:
Macro-F1 and Micro-F1.
Macro-F1. Macro-averaged F1 first computes the pre-
cision prec, recall recc and F1 score fc locally for each
test cascade sequence c in the test set Ctest. Then macro-
averaged F-measure takes the average over all test cascade
sequences:
prec =
, recc =
, fc =
(cid:80)
(cid:80)
u∈Gc P c
u
u∈U P c
u
M acro − F 1 =
(cid:80)
u∈Gc P c
u
Gc
(cid:80)
c∈Ctest fc
Ctest
.
2prec · recc
prec + recc
,
Micro-F1. Micro-averaged F1 computes precision pre,
recall rec globally by averaging over all predictions and
serves as a complementary view by giving larger weights
to longer cascades:
c∈Ctest(cid:80)
(cid:80)
(cid:80)
c∈Ctest Gc
u∈Gc P c
u
,
c∈Ctest(cid:80)
(cid:80)
(cid:80)
c∈Ctest(cid:80)
pre =
u∈Gc P c
u
u∈U P c
u
, rec =
M icro − F 1 =
2pre · rec
pre + rec
.
To further evaluate the performance of cascade predic-
tion at early stage, we conduct additional experiments by
only predicting the first five infected users in each test cas-
cade. We present the experimental results in Table 2 and 3.
Here "-" indicates that the algorithm fails to converge in 72
hours. The last column represents the relative improvement
of NDM against the best performing baseline method. We
have the following observations:
(1) NDM consistently and significantly outperforms all
the baseline methods. As shown in Table 2, the relative
improvement against the best performing baseline is at
least 26% in terms of Macro-F1 score. The improvement on
Micro-F1 score further demonstrates the effectiveness and
robustness of our proposed model. The results also indicate
that well-designed neural network models are able to sur-
pass traditional cascade methods on cascade modeling.
(2) NDM has even more significant improvements on
cascade prediction task at early stage. As shown in Table 3,
NDM outperforms all baselines by a large margin on both
Macro and Micro F1 scores. Note that it's very important to
predict the first wave of infected users accurately for real-
world applications because a wrong prediction will lead to
error propagation in following stages. A precise prediction
of infected users at early stage enables us to better control
the spread of information items through users. For example,
we can prevent the spread of a rumor by warning the most
vulnerable users in advance and promote the spread of
a product by paying the most potential customers more
attention. This experiment demonstrates that NDM has the
ability to be used for real-world applications.
(3) NDM is capable of handling large-scale cascade
datasets. Previous neural-based method, Embedded IC, fails
to converge in 72 hours on Twitter dataset with around 20
thousand users and 19 million of potential links. In contrast,
NDM converges in 6 hours on this dataset with the same
GPU device, which is at least 10 times faster than Embedded
IC. This observation demonstrates the scalability of NDM.
5.4 Social Link Prediction
Sometimes the underlying social network of users is avail-
able, e.g. the Twitter dataset used in our experiments. In
the Twitter dataset, a network of Twitter followers is ob-
served though the information diffusion is not necessarily
passed through the edges of the social network. Though
the diffusion network and the social network do not strictly
align with each other, we still expect that the most closely
related users in information diffusion should also be socially
TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015
9
Fig. 5. Experimental results on social link prediction in Twitter dataset.
Fig. 7. Comparisons between NDM and NDM+SN on diffusion prediction
at early stage where only the first five infected users are predicted.
the social links in Twitter dataset to some extent. Even the
accuracy of LSTM is much higher than a random guess
(around 0.005%). This indicates that information spreads
through some social links frequently and thus these links
can be inferred successfully. Moreover, our NDM model
performs best on this task. This fact indicates that NDM
can better capture the intrinsic relationship between users.
Also, the absolute value of social link prediction accuracy is
still not high enough (less than 5%). One possible reason is
that the overlap between a diffusion network and a social
network is small compared with the entire network.
5.5 Benefits from Social Network
On the other side, we also hope that diffusion prediction
process could benefit from the observed social network
structure. We apply a simple modification on our NDM
model to take advantage of the social network. Now we
will introduce the modification in detail.
Firstly, we embed the topological social network struc-
ture into real-valued user features by DeepWalk [41], a
widely used network representation learning algorithm. The
dimension of network embeddings learned by DeepWalk
is set to 32 which is half of the dimension d = 64 which
is the representation size of our model. Secondly, we use
the learned network embeddings to initialize the first 32
dimensions of the user representations of our model and
fix them during the training process without changing
any other modules. In other words, a 64-dimensional user
representation is made up of a 32-dimensional fixed net-
work embedding learned by DeepWalk from social network
structure and another 32-dimensional randomly initialized
trainable embedding. We name the modified model with
Social Network considered as NDM+SN for short. This is
a simple but useful implementation and we will explore a
more sophisticated model to take the social network into
modeling directly in future work. Fig. 6 and 7 show the
comparison between NDM and NDM+SN.
Experimental results show that NDM+SN is able to im-
prove the performance on diffusion prediction task slightly
Fig. 6. Comparisons between NDM and NDM+SN on diffusion predic-
tion.
connected in the social network. Therefore, we conduct
social link prediction experiments to verify this statement.
Firstly, we need to specify "the most closely related
users". For Infopath algorithm, the model output directly
contains the diffusion probability of each inferred edge.
Thus we can rank the users by their diffusion probability
to get the most closely related users. For LSTM and our
model NDM, the output contains users' embeddings as real-
valued vectors and we can simply use the inner product
or the multi-head attention weight in Eq. 4 between user
embeddings to measure the closeness of two users.
Secondly, we use the following experimental settings for
evaluation. Note that this setting is a reasonable choice but
not the only choice. For each user u in the dataset, we select
the most closely related user according to the first step and
check whether this most closely related user is a follower
of user u or not. Then we naturally use the accuracy as
evaluation metric. We present the experimental results in
Fig. 5.
From the results in Fig. 5 we can see that all three al-
gorithms, i.e. LSTM, Infopath and NDM, are able to predict
012345NDMInfopathLSTMRandomAccuracy (%)Micro−F1Macro−F100.050.10.150.2 NDMNDM+SNMicro−F1Macro−F100.050.10.150.2 NDMNDM+SNTRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015
10
(a) # heads h ∈ {1, 2, 4, 8}
#
(b)
{16, 32, 64, 128}
dimensions
d
∈
(c) # window size win ∈ {2, 3, 4, 5}
(d) Flag Finit ∈ {0, 1}
Fig. 8. Parameter sensitivity of hyperparameters in Lastfm Dataset. Macro-F1 (Early) and Micro-F1 (Early) correspond to the prediction performance
at early stage.
with the help of incorporating social network structure as
prior knowledge. The relative improvement of Micro-F1 is
around 4%. The results demonstrate that our neural model
is very flexible and can be easily extended to take advan-
tage of external features. Note that these results are also
consistent with those in previous subsection: The diffusion
network and social network have overlapping parts but the
overlapping part is relative small compared to the whole
network.
5.6 Parameter Sensitivity
In this subsection, we will take Lastfm dataset as an il-
lustrative example to present how hyperparameter settings
affect the performance of our model. We use the best set of
hyperparameter settings as our basis, i.e. number of heads
h = 8, window size of convolutional network win = 3,
dimension of user embeddings d = 64 and flag of using
initial user for prediction Finit = 0. Then we vary each
hyperparameter while keeping others fixed. Figure 8 shows
the performance on diffusion prediction under different
hyperparameter settings.
We can see that the performance of NDM is stable when
we vary the hyperparameters within a reasonable range.
NDM does not encounter serious overfitting problem when
we double the dimension of embeddings d to 128. This
experiment demonstrates the robustness of our model.
5.7 Interpretability
Admittedly, the interpretability is usually a weak point of
neural network models. Compared with feature engineering
methods, neural-based models encode a user into a real-
valued vector space and there is no explicit meaning of each
dimension of user embeddings. In our proposed model,
each user embedding is projected into 16 subspaces by an 8-
head attention mechanism. Intuitively, the user embedding
in each subspace represents a specific role of the user.
But it is quite hard for us to link the 16 embeddings to
interpretable hand-crafted features. We will consider the
alignment between user embeddings and interpretable fea-
tures based on a joint model in future work.
Fortunately, we still have some findings in the convo-
n ∈ Rd×U for n = 0, 1, 2 are
lutional layer. Recall that W C
position-specific linear projection matrices in convolutional
layer and W C
init is the projection matrix for the initial user.
All four matrices are randomly initialized before training. In
The scale of learned projection matrices in convolutional layer
measured by Frobenius norm · 2
F .
TABLE 4
Dataset
Lastfm
Irvine
Twitter
Memetracker
W C
init W C
60.0
32.3
13.3
16.6
13.9
13.9
130.3
93.6
0 W C
49.2
13.3
13.7
91.5
1 W C
2
49.1
13.0
13.7
91.5
a learned model, if the scale of one of these matrices is much
larger than that of other ones, then the prediction vector is
more likely to be dominated by the corresponding position.
For example, if the scale of W C
0 is much larger than that of
other ones, then we can infer that the most recent infected
user contributes most to the next infected user prediction.
Following the notations in Eq. 7, we set Finit = 1 for
all datasets in this experiment and compute the square of
Frobenius norm of learned projection matrices as shown in
Table 4. We have the follow observations:
0 , W C
(1) For all four datasets, the scales of W C
1 and W C
2
are competitive and the scale of W C
is always a little bit
0
larger than that of the other two. This observation indicates
that the active embeddings act(uj), act(uj−1), act(uj−2) of
all three recently infected users will contribute to the pre-
diction of uj+1. Also, the most recent infected user uj is the
most important one among the three. This finding naturally
matches our intuitions and verifies Assumption 2 proposed
in method section.
(2) The scale of W C
init is the largest on Twitter dataset.
This indicates that the initial user is very important in
diffusion process on Twitter. This is partly because Twitter
dataset contains the complete history of the spread of a URL
and the initial user is actually the first one tweeting the
URL. While in the other three datasets, the initial user is
only the first one within the time window of crawled data.
Note that we set hyperparameter Finit = 1 only for Twitter
dataset in diffusion prediction task because we find that the
performances are competitive or even worse on the other
three datasets if we set Finit = 1.
6 CONCLUSION
In this paper, we propose a Neural Diffusion Model (NDM)
for microscopic cascade modeling. To go beyond the limita-
tions of traditional cascade models based on strong assump-
12480.020.040.060.080.10ScoreMacro-F1Macro-F1 (Early)Micro-F1Micro-F1 (Early)1632641280.020.040.060.080.10ScoreMacro-F1Macro-F1 (Early)Micro-F1Micro-F1 (Early)23450.020.040.060.080.10ScoreMacro-F1Macro-F1 (Early)Micro-F1Micro-F1 (Early)010.020.040.060.080.10ScoreMacro-F1Macro-F1 (Early)Micro-F1Micro-F1 (Early)TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015
11
tions and oversimplified formulas, we build our model
based on two heuristic assumptions and employ deep learn-
ing techniques including convolutional neural network and
attention mechanism to implement the assumptions. Ex-
perimental results on diffusion prediction task demonstrate
the effectiveness and robustness of our proposed model. In
addition, NDM greatly outperforms baseline methods on
diffusion prediction at early stage, which shows the applica-
bility and feasibility of NDM for real-world applications.
For future works, we will consider linking neural-based
model with hand-crafted features and statistics to improve
the interpretability of learned models. An intelligible model
is always welcome and can help us better understand the
motivations and behaviors of users in a diffusion process.
The incorporation of extra information for cascade mod-
eling is also an intriguing direction. For example, the times-
tamp information and the description of information items
can be used for more accurate cascade modeling.
ACKNOWLEDGMENTS
This work was supported by the 973 Program (No.
2014CB340501), the Major Project of the National Social
Science Foundation of China (13&ZD190) and the National
Natural Science Foundation of China (No. 61772302). This
work is also part of the NExT++ project, supported by
the National Research Foundation, Prime Ministers Office,
Singapore under its IRC@Singapore Funding Initiative.
[2]
REFERENCES
[1] M. J. Salganik, P. S. Dodds, and D. J. Watts, "Experimental study
of inequality and unpredictability in an artificial cultural market,"
science, 2006.
J. Cheng, L. Adamic, P. A. Dow, J. M. Kleinberg, and J. Leskovec,
"Can cascades be predicted?" in Proceedings of WWW. ACM, 2014.
[3] L. Yu, P. Cui, F. Wang, C. Song, and S. Yang, "From micro to macro:
Uncovering and predicting information cascading process with
behavioral dynamics," in Data mining (ICDM).
IEEE, 2015, pp.
559 -- 568.
[4] Q. Zhao, M. A. Erdogdu, H. Y. He, A. Rajaraman, and J. Leskovec,
"Seismic: A self-exciting point process model for predicting tweet
popularity," in Proceedings of the 21th ACM SIGKDD. ACM, 2015,
pp. 1513 -- 1522.
[5] P. Domingos and M. Richardson, "Mining the network value of
[6]
[7]
customers," in Proceedings of SIGKDD. ACM, 2001.
J. Leskovec, A. Singh, and J. Kleinberg, "Patterns of influence in a
recommendation network," in Pacific-Asia Conference on Knowledge
Discovery and Data Mining. Springer, 2006, pp. 380 -- 389.
J. Leskovec, L. A. Adamic, and B. A. Huberman, "The dynamics
of viral marketing," ACM Transactions on the Web (TWEB), vol. 1,
no. 1, p. 5, 2007.
[8] D. J. Watts and P. S. Dodds, "Influentials, networks, and public
opinion formation," Journal of consumer research, vol. 34, no. 4, pp.
441 -- 458, 2007.
S. Aral and D. Walker, "Identifying influential and susceptible
members of social networks," Science, 2012.
[10] H. W. Hethcote, "The mathematics of infectious diseases," SIAM
[9]
review, vol. 42, no. 4, pp. 599 -- 653, 2000.
[11] J. Wallinga and P. Teunis, "Different epidemic curves for severe
acute respiratory syndrome reveal similar impacts of control mea-
sures," American Journal of epidemiology, 2004.
[12] D. Kempe, J. Kleinberg, and ´E. Tardos, "Maximizing the spread
of influence through a social network," in Proceedings of SIGKDD.
ACM, 2003, pp. 137 -- 146.
[13] T. Lappas, E. Terzi, D. Gunopulos, and H. Mannila, "Finding
effectors in social networks," in Proceedings of SIGKDD. ACM,
2010, pp. 1059 -- 1068.
[14] P. A. Dow, L. A. Adamic, and A. Friggeri, "The anatomy of large
facebook cascades." ICWSM, 2013.
[15] D. Gruhl, R. Guha, D. Liben-Nowell, and A. Tomkins, "Informa-
tion diffusion through blogspace," in Proceedings of WWW. ACM,
2004.
[16] D. Liben-Nowell and J. Kleinberg, "Tracing information flow on
a global scale using internet chain-letter data," Proceedings of the
national academy of sciences, vol. 105, no. 12, pp. 4633 -- 4638, 2008.
[17] J. Leskovec, L. Backstrom, and J. Kleinberg, "Meme-tracking and
the dynamics of the news cycle," in Proceedings of SIGKDD. ACM,
2009, pp. 497 -- 506.
[18] D. M. Romero, B. Meeder, and J. Kleinberg, "Differences in the
mechanics of information diffusion across topics: idioms, political
hashtags, and complex contagion on twitter," in Proceedings of
WWW. ACM, 2011, pp. 695 -- 704.
[19] S. Myers and J. Leskovec, "On the convexity of latent social
network inference," in Advances in neural information processing
systems, 2010, pp. 1741 -- 1749.
[20] M. Gomez Rodriguez, J. Leskovec, and A. Krause, "Inferring
networks of diffusion and influence," in Proceedings of SIGKDD.
ACM, 2010.
[21] M. G. Rodriguez, J. Leskovec, D. Balduzzi, and B. Scholkopf,
"Uncovering the structure and temporal dynamics of information
propagation," Network Science, vol. 2, no. 1, pp. 26 -- 65, 2014.
[22] M. Gomez Rodriguez, J. Leskovec, and B. Scholkopf, "Structure
and dynamics of information pathways in online media," in
Proceedings of WSDM. ACM, 2013.
[23] S. Bourigault, S. Lamprier, and P. Gallinari, "Representation learn-
ing for information diffusion through social networks: an embed-
ded cascade model," in Proceedings of WSDM. ACM, 2016.
[24] S. Bourigault, C. Lagnier, S. Lamprier, L. Denoyer, and P. Gallinari,
"Learning social network embeddings for predicting information
diffusion," in Proceedings of WSDM. ACM, 2014.
[25] S. Gao, H. Pang, P. Gallinari, J. Guo, and N. Kato, "A novel
embedding method for information diffusion prediction in social
network big data," IEEE Transactions on Industrial Informatics, 2017.
[26] C. Li, J. Ma, X. Guo, and Q. Mei, "Deepcas: An end-to-end
predictor of information cascades," in Proceedings of WWW.
Inter-
national World Wide Web Conferences Steering Committee, 2017,
pp. 577 -- 586.
[27] W. Hu, K. K. Singh, F. Xiao, J. Han, C.-N. Chuah, and Y. J. Lee,
"Who will share my image?: Predicting the content diffusion path
in online social networks," in Proceedings of the Eleventh ACM
International Conference on Web Search and Data Mining. ACM,
2018, pp. 252 -- 260.
[28] J. Wang, V. W. Zheng, Z. Liu, and K. C.-C. Chang, "Topological
recurrent neural network for diffusion prediction," in ICDM.
IEEE, 2017, pp. 475 -- 484.
[29] Z. T. Kefato, N. Sheikh, and A. Montresor, "Di: Diffusion network
inference through representation learning," 2017.
[30] P. Cui, S. Jin, L. Yu, F. Wang, W. Zhu, and S. Yang, "Cascading
outbreak prediction in networks: a data-driven approach," in
Proceedings of SIGKDD. ACM, 2013.
[31] O. Tsur and A. Rappoport, "What's in a hashtag?: content based
prediction of the spread of ideas in microblogging communities,"
in Proceedings of WSDM. ACM, 2012, pp. 643 -- 652.
[32] L. Weng, F. Menczer, and Y.-Y. Ahn, "Predicting successful memes
using network and community structure." in ICWSM, 2014.
[33] H. Pinto, J. M. Almeida, and M. A. Gonc¸alves, "Using early
view patterns to predict the popularity of youtube videos," in
Proceedings of WSDM. ACM, 2013, pp. 365 -- 374.
[34] S. Gao, J. Ma, and Z. Chen, "Modeling and predicting retweeting
dynamics on microblogging platforms," in Proceedings of WSDM.
ACM, 2015.
[35] Q. Cao, H. Shen, K. Cen, W. Ouyang, and X. Cheng, "Deephawkes:
Bridging the gap between prediction and understanding of infor-
mation cascades," in Proceedings of CIKM. ACM, 2017.
[36] J. Goldenberg, B. Libai, and E. Muller, "Talk of the network:
A complex systems look at the underlying process of word-of-
mouth," Marketing letters, 2001.
[37] K. Saito, R. Nakano, and M. Kimura, "Prediction of informa-
tion diffusion probabilities for independent cascade model,"
in Knowledge-based intelligent information and engineering systems.
Springer, 2008, pp. 67 -- 75.
[38] K. Saito, M. Kimura, K. Ohara, and H. Motoda, "Learning
continuous-time information diffusion model for social behavioral
data analysis," in Asian Conference on Machine Learning. Springer,
2009, pp. 322 -- 337.
TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015
12
[39] S. Wang, X. Hu, P. S. Yu, and Z. Li, "Mmrate: inferring multi-aspect
diffusion networks with multi-pattern cascades," in Proceedings of
SIGKDD. ACM, 2014, pp. 1246 -- 1255.
[40] L. Tang and H. Liu, "Relational learning via latent social dimen-
sions," in Proceedings of SIGKDD. ACM, 2009, pp. 817 -- 826.
[41] B. Perozzi, R. Al-Rfou, and S. Skiena, "Deepwalk: Online learning
of social representations," in Proceedings of SIGKDD. ACM, 2014,
pp. 701 -- 710.
[42] J. Tang, M. Qu, M. Wang, M. Zhang, J. Yan, and Q. Mei, "Line:
Large-scale information network embedding," in Proceedings of
WWW.
International World Wide Web Conferences Steering
Committee, 2015, pp. 1067 -- 1077.
[43] T. N. Kipf and M. Welling, "Semi-supervised classification with
graph convolutional networks," arXiv preprint arXiv:1609.02907,
2016.
[44] C. Yang, M. Sun, W. X. Zhao, Z. Liu, and E. Y. Chang, "A neural
network approach to jointly modeling social networks and mobile
trajectories," TOIS, vol. 35, no. 4, p. 36, 2017.
`O. Celma Herrada, "Music recommendation and discovery in the
long tail," 2009.
[46] T. Opsahl and P. Panzarasa, "Clustering in weighted networks,"
[45]
Social networks, vol. 31, no. 2, pp. 155 -- 163, 2009.
[47] N. O. Hodas and K. Lerman, "The simple rules of social conta-
gion," Scientific reports, vol. 4, p. 4343, 2014.
[48] D. Bahdanau, K. Cho, and Y. Bengio, "Neural machine trans-
lation by jointly learning to align and translate," arXiv preprint
arXiv:1409.0473, 2014.
[49] A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N.
Gomez, Ł. Kaiser, and I. Polosukhin, "Attention is all you need," in
Advances in Neural Information Processing Systems, 2017, pp. 5998 --
6008.
[50] M. G. Rodriguez, D. Balduzzi, and B. Scholkopf, "Uncovering
the temporal dynamics of diffusion networks," arXiv preprint
arXiv:1105.0697, 2011.
[51] Y. LeCun et al., "Lenet-5, convolutional neural networks," URL:
http://yann. lecun. com/exdb/lenet, 2015.
[52] A. Van den Oord, S. Dieleman, and B. Schrauwen, "Deep content-
based music recommendation," in Advances in neural information
processing systems, 2013, pp. 2643 -- 2651.
[53] R. Collobert and J. Weston, "A unified architecture for natural lan-
guage processing: Deep neural networks with multitask learning,"
in Proceedings of ICML. ACM, 2008.
[54] D. Kingma and J. Ba, "Adam: A method for stochastic optimiza-
tion," arXiv preprint arXiv:1412.6980, 2014.
[55] J. L. Ba, J. R. Kiros, and G. E. Hinton, "Layer normalization," arXiv
preprint arXiv:1607.06450, 2016.
[56] K. He, X. Zhang, S. Ren, and J. Sun, "Deep residual learning for
image recognition," in Proceedings of CVPR, 2016, pp. 770 -- 778.
[57] N. Srivastava, G. Hinton, A. Krizhevsky,
I. Sutskever, and
R. Salakhutdinov, "Dropout: A simple way to prevent neural net-
works from overfitting," The Journal of Machine Learning Research,
vol. 15, no. 1, pp. 1929 -- 1958, 2014.
[58] S. Hochreiter and J. Schmidhuber, "Long short-term memory,"
Neural computation, vol. 9, no. 8, pp. 1735 -- 1780, 1997.
Cheng Yang is a 4-th year PhD student of the
Department of Computer Science and Technol-
ogy, Tsinghua University. He got his B.E. degree
from Tsinghua University in 2014. His research
interests include natural
language processing
and network representation learning. He has
published several
top-level papers in interna-
tional journals and conferences including ACM
TOIS, IJCAI and AAAI.
Maosong Sun is a professor of the Department
of Computer Science and Technology, Tsinghua
University. He got his BEng degree in 1986
and MEng degree in 1988 from Department of
Computer Science and Technology, Tsinghua
University, and got his Ph.D. degree in 2004
from Department of Chinese, Translation, and
Linguistics, City University of Hong Kong. His
research interests include natural language pro-
cessing, Chinese computing, Web intelligence,
and computational social sciences. He has pub-
lished over 150 papers in academic journals and international confer-
ences in the above fields. He serves as a vice president of the Chinese
Information Processing Society, the council member of China Computer
Federation, the director of Massive Online Education Research Center
of Tsinghua University, and the Editor-in-Chief of the Journal of Chinese
Information Processing.
Haoran Liu is a 4-th year undergraduate student
of the Department of Electric Engineering, Ts-
inghua University. His research interests include
network representation learning and machine
learning.
Shiyi Han is a 1-st year master student in Com-
puter Science department at Brown University.
He got his B.E. degree from Beihang University
in 2018. His research interests include natural
language processing and machine learning.
Zhiyuan Liu is an associate professor of the De-
partment of Computer Science and Technology,
Tsinghua University. He got his BEng degree in
2006 and his Ph.D. in 2011 from the Department
of Computer Science and Technology, Tsinghua
University. His research interests are natural lan-
guage processing and social computation. He
has published over 40 papers in international
journals and conferences including ACM Trans-
actions, IJCAI, AAAI, ACL and EMNLP.
Huanbo Luan is the deputy director of NExT++
Research Center at both Tsinghua University
and National University of Singapore. He re-
ceived his B.S. degree in computer science from
Shandong University in 2003 and Ph.D degree
in computer science from Institute of Comput-
ing Technology, Chinese Academy of Sciences
in 2008. His research interests include natural
language processing, multimedia information re-
trieval, social media and big data analysis.
|
1605.01901 | 1 | 1605 | 2016-05-06T11:53:29 | Bridging Online and Offline Social Networks: Multiplex Analysis | [
"cs.SI",
"physics.soc-ph"
] | We show that three basic actor characteristics, namely normalized reciprocity, three cycles, and triplets, can be expressed using an unified framework that is based on computing the similarity index between two sets associated with the actor: the set of her/his friends and the set of those considering her/him as a friend. These metrics are extended to multiplex networks and then computed for two friendship networks generated by collecting data from two groups of undergraduate students. We found that in offline communication strong and weak ties are (almost) equally presented, while in online communication weak ties are dominant. Moreover, weak ties are much less reciprocal than strong ties. However, across different layers of the multiplex network reciprocities are preserved, while triads (measured with normalized three cycles and triplets) are not significant. | cs.SI | cs |
Bridging Online and Offline Social Networks: Multiplex
Analysis
Sonja Filiposkaa,b, Andrej Gajduka, Tamara Dimitrovaa, Ljupco Kocareva,b,∗
aMacedonian Academy of sciences and Arts, Skopje, Macedonia
bFaculty of Computer Science and Engineering, "Ss Cyril and Methodius University",
Skopje, Macedonia
Abstract
We show that three basic actor characteristics, namely normalized reciprocity,
three cycles, and triplets, can be expressed using an unified framework that is
based on computing the similarity index between two sets associated with the
actor: the set of her/his friends and the set of those considering her/him as a
friend. These metrics are extended to multiplex networks and then computed
for two friendship networks generated by collecting data from two groups of
undergraduate students. We found that in offline communication strong and
weak ties are (almost) equally presented, while in online communication weak
ties are dominant. Moreover, weak ties are much less reciprocal than strong
ties. However, across different layers of the multiplex network reciprocities are
preserved, while triads (measured with normalized three cycles and triplets) are
not significant.
Keywords: Multiplex analysis, Social networks, Graph theory
1. Introduction
Intensity of involvement among actors in a social network and the types of
actions and interactions that arise between them are a long active topic in soci-
ological research. The analysis of group structures has started with the study of
dyads and triads that was pioneered by German sociologist Georg Simmel at the
∗[email protected]
Preprint submitted to Phisica A
November 6, 2018
end of the nineteenth century [1]. In network analysis, the importance of triads
has long been emphasized in many research studies, including the highly influen-
tial work of Granovetter [2] and, more recently, the work of Watts and Strogatz
[3], where the notion of clustering (formation of many triangles in networks) is
an integral part of the analysis. Thus, both social and network analysis that
represent actors as networks nodes and their interactions as (un)directed links
have shown that the network structural properties like reciprocity and cycles
are very important when trying to explain processes like information spreading
and network evolution.
However, retaining the perspective on different connections, i.e. Granovet-
ter's strong and weak ties, sheds additional light on the nature of connections
between actors and provides deeper understanding of the triads formations and
network clustering. Thus, deeper understanding of the network properties, and
therefore the processes that run on top of it, can be gained if it is viewed
as a collection of multiple types of links wherein each set of link types rep-
resents a separate layer of the network. This multilayered representation has
led to the introduction of the concept of multiplex networks which refers to
systems in which nodes are connected through more than one type of edges,
and therefore, belong to multiple interacting and co-evolving networks. The
importance of multiplex networks in sociology has been emphasized by many
scholars. In the seminal treatment of multiple networks as the foundation of
social structure, White, Boorman and Breiger [4] and Boorman and White [5]
argued that the patterning and interweaving of different types of ties are needed
to describe and characterize social structures. It has been demonstrated that
multiplexity is critical to diverse phenomena, such as the mobilization of social
movements [6], the consolidation of political power [7], the emergence of trust in
economic relationships [8], the creation of social bonds within civic networks [9],
and the organization of party coalitions [10]. Multiplexity has been studied to
understand scientific collaboration [11], structural logic of intra-organizational
networks [12], formation of ties featuring both an economic and a social compo-
nent in inter-organizational networks [13], and formation of relationships among
2
producers in the multiplex triads [14].
Multiplex networks have also been recently subject of particularly intense
research by the network science and physics communities. Szell, Lambiotte,
and Thurner [15] worked on correlations and overlap between different types
of links and demonstrated the tendency of individuals to play different roles in
different networks. Algorithmic detection of tightly connected groups of nodes
known as communities in multiplex networks was studied in [16]. A framework
for growing multiplexes where a node can belong to a different networks was
developed by Nicosia et al [17], while Kim and Goh [18] studied the possibility
of growth of coevolving layers that can shape the network structure and showed
analytically and numerically that the coevolution can induce strong degree cor-
relations across layers, as well as modulate degree distributions. Evolutionary
game dynamics on structured populations in which individuals take part in sev-
eral layers of networks of interactions simultaneously which accounts for the
different kind of social ties each individual has was studied by Gomez et al [19].
In this paper we aim to study social relations among actors (strong and weak
ties) as they appear in real life face-to face (offline) and virtual via social network
sites (online) communications using the apparatus of multiplex network anal-
ysis/analytics. Real data was collected using an online survey/questionnaire
given to two groups of students (two classroom based social networks). The
students answers were used to map their own perception of strong vs. weak of-
fline and online connections, thus constructing several offline and online directed
friendship networks that constitute the layers of our multiplex network. The
primary goal of this research is to study the interrelationship of different social
structures represented as multiplex networks. For this reason, we develop nor-
malized actor characteristics for multiplex networks, including metrics for dyads
(such as reciprocity) and triads. We found that normalized reciprocity, three
cycles, and triplets of an actor can be expressed using an unifying framework
that is based on the comparison of two sets associated with the actor: the set of
her/his friends - out links and the set of actors that consider her/him as a friend
- in links. By extending these metrics for multiplex networks, we were able to
3
observe the relationship of strong and weak ties in the offline and online space.
Analyzing the collected data from two groups of undergraduate students we
found that in offline communication strong and weak ties are (almost) equally
presented, while in online communication weak ties are dominant. Moreover,
weak ties are a lot less reciprocal than strong ties. However, while reciprocities
are preserved across layers, the triads (measured using normalized three cycles
and triplets) are not significant on the different layers of the multiplex network.
This is the outline of the paper. First, we describe the participants in-
volved in the study and the procedure for collecting data. Next, we address
the network endogenous (structural) and exogenous factors. Endogenous fac-
tors include graph characteristics such as reciprocity, three-cycles, transitive
triplets, together with their normalized versions, as well as their generalizations
for multiplex graphs. The section Results summarizes our findings regarding the
offline and online multiplex networks generated by collecting the data described
in the section Materials and Methods. We conclude the paper with the section
Conclusions where we also discuss our future work.
2. Materials and Methods
2.1. Participants and the procedure
Participants in this study were two groups of undergraduate students en-
rolled on two courses given at the Faculty of Computer Science and Engineering
within the Cyril and Methodius University in Skopje, Macedonia. During the
courses there was a dedicated lecture to explain the study and it's objectives in
which the students were informed about the research experiment and only those
who agreed to participate were part of the experiment. Thus, the two groups
represent two social networks of students that attend the same class during one
semester of their studies. The total number of students in the first group, Group
1, is 171, out of which 153 voluntarily participated in the study. The gender
distribution is almost equal; there were 86 female and 85 male students. The
total number of students in the second group, Group 2, is 150 (118 male, 32
4
female), while only 80 participated in the At the end we summarize our findings
regarding the offline and online multiplex networks generated from the collected
datastudy. The students age for both groups ranges from 19 years to 22 years.
Additional data was also collected for each student via the university online
electronic course enrollment system (such as: gender, study program, GPA,
accumulated credits).
The online survey was developed by the research team. Each student (that
participated in the study) was asked to select from the presented list of class-
mates those with whom she/he was engaged in face-to-face (offline) communica-
tion and Facebook (online) communication. Each chosen contact was described
as weak or strong according to the student's own perception by the means of
pre-defined categories for frequency of communication. In the case of face-to-
face communication a contact (tie) is considered to be strong if the frequency of
communication is higher than 5 interactions per month, while it is considered as
weak contact (tie) if the number of interactions is larger than once in 3 months,
but less than 5 interactions per month. When considering the online communi-
cation, strong contacts (ties) are those with whom the student interacts more
than five times per week, while a weak contact (tie) is the one with whom there
was Facebook activity more than once a month, but less than five times per
week. Facebook was chosen as the online social network representative since it's
use is extremely wide spread among the population.
2.2. Friendship graphs as multiplex networks
Graphs provide a powerful primitive for modeling data in social science.
Nodes usually represent real world objects and edges indicate relationships be-
tween objects. In sociology, nodes may have attributes associated with them and
graphs may contain many different types of relationships. The node attributes
are used to describe the features of the objects that the nodes represent. For
example, a node representing a student may have attributes that represent the
student's gender and department. Different types of edges in a graph correspond
to different types of relationships between nodes, such as friends and classmates
5
relationships.
Here we study friendship relations among n actors: the existence of a tie
i → j will be described as i calling j a friend. The ties are represented as
binary variables, denoted by xij. A tie from actor i to actor j, i → j, is
either present or absent (xij then having values 1 and 0, respectively). The
tie variables constitute the network, represented by its n × n adjacency matrix
X = [xij] (self-ties are excluded). The graph is directed, where each tie i → j
has a sender i, who will also be referred to as ego, and a receiver j, referred to
as alter, as it is common in social network analysis.
We model different types of relationships among actors using the concept of
multiplex graphs. In sociology, multiplex graphs (networks) refer to the case
when nodes (actors) are connected through more than one type of (socially
relevant) ties.
In mathematics, such graphs are also called multi-graphs (a
multi-graph is a graph that is allowed to have multiple edges, that is, edges that
have the same end nodes). We give a definition of multiplex graphs adapted
for the study reported in this paper. Let V denote the set of nodes; nodes are
connected via L different type of connections (ties). Each type of connection
(together with the set of nodes) forms a (directed) graph with n vertices. We
denote with Gα = (V, Eα) the graph which represents the connection type
α, where Eα denotes the set of α-type ties, α = 1, . . . , L. Let [xij(Gα)] be
n × n adjacency matrix of the graph Gα. A multiplex graph G is then defined
as a collection of all graphs Gα and all edge-aggregated graphs of the form
Eα), where α1, αm ∈ {1, . . . , L}. We assume that the case α1 = αm
(V,∪αm
is not excluded and thus write
α=α1
G = {Gα1α2...αm = (V, Eα1 ∪ Eα2 ∪ . . . ∪ Eαm) : α1, . . . αm ∈ {1, . . . , L}}
for the multiplex graph G. In the study discussed here, different types of edges
correspond to the four types of friendship relations: online weak or strong con-
nections and offline weak or strong connections.
6
2.3. Jaccard similarity coefficient
In order to introduce an unifying framework for discussing graph character-
istics, we use the Jaccard index, also known as Jaccard similarity coefficient.
It measures the similarity between finite sets and is defined as the size of the
intersection divided by the size of the union of the sets:
A ∩ B
J(A, B) =
A ∩ B
A ∪ B =
A + B − A ∩ B ,
where S denotes the cardinality of the set S.
J(A, B) is defined as 1. Note that
If A and B are both empty,
0 ≤ J(A, B) ≤ 1.
The Jaccard distance, which measures dissimilarity between sets and is a metric
on the collection of all finite sets, is complementary to the Jaccard coefficient
and is obtained by subtracting the Jaccard coefficient from 1. Using Jaccard
index to introduce various actor-based characteristics is based on the following
observation. Let Ai = {a : i → a} and Bj = {b : j → b}. Then
Ai ∩ Bj =
(cid:88)
(cid:88)
h xih and Bj =(cid:80)
Ai ∪ Bj =
h
h
h xjh.
xihxjh
xih +
(cid:88)
xjh −(cid:88)
xihxjh,
h
h
where Ai =(cid:80)
2.4. Network (endogenous) characteristics
We consider a number of social network characteristics; those depending
only on the network are called structural or endogenous characteristics, while
characteristics depending on externally given attributes are called covariate or
exogenous characteristics.
2.4.1. Simple-graph characteristics
Let G = (V, E) be a directed graph and let i be an arbitrary node (actor)
in the graph. We denote Sin
i (k) and Sout
i
(k) for the k-in-neighborhood of i and
7
k-out-neighborhood of i, respectively, i.e., for the set of vertices from where
vertex i can be reached and for the set of vertices that can be reached from i in
k steps (using k directed edges). More formally, these sets are defined as
i (k) = {j : there is a path of length k from j to i}
Sin
(k) = {j : there is a path of length k from i to j}
Sout
i
(1)
(2)
The general case of arbitrary k will be discussed elsewhere, here we consider only
to the case when k = 1. For k = 1 we use the shorter notations Sin
i (1) = Sin
i
. In other words, we consider the 1-hop-neighbor sets of node
and Sout
i
(1) = Sout
i
i defined as:
Sout
i
Sin
i
= {j : i → j},
= {j : j → i},
(3)
(4)
If the existence of a tie i → j is being interpreted as j is a friend of i, then
Sout
is the set of nodes that consider i as
j xij = Sout
is the number of i's friends and din
i
their friend. For the cardinalities of these sets, we write dout
is the set of i's friends, while Sin
i
i =(cid:80)
i =(cid:80)
. Therefore, dout
j xji = Sin
and din
i
i
i
i
is the number of nodes that consider i as their friend. These two metrics are
known as activity, i.e. tendency to establish friendships, and popularity, i.e.
ability to gain friends, in social science. In this paper, we analyse several graph
characteristics that can all be expressed using the Jaccard similarity index for
a given pair of node sets. Out of the many different possible characteristics,
here the focus is set on those that we consider most relevant for this study:
reciprocity, three-cycles, and triplets.
Reciprocity -- One of the most basic properties of social networks is reci-
procity, represented by the number of reciprocated ties of actor i and defined
as(cid:80)
j xijxji, which can be rewritten as
Reci = Sout
i ∩ Sin
i
=
Here we consider normalized reciprocity defied as:
ri = J(cid:0)Sout
i
, Sin
i
(cid:1) =
xijxji
(cid:88)
(cid:80)
i −(cid:80)
j xijxji
j
8
dout
i + din
j xijxji
.
(5)
The normalized reciprocity enables one to decide on the quantity of reciprocated
ties when compared to the total number of ties of both actors. This normal-
ization provides a perspective and places the phenomenon of reciprocity into
context by comparing it to the total number of possibilities for reciprocated ties
under the given circumstances. Three-cycles -- Next to reciprocity, an essential
feature in most social networks is transitivity, or transitive closure which is rep-
resented by two metrics: three-cycles and triplets. A cycle of length 3 in a given
graph is defined as a sub-graph that consists of a sequence of directed edges
i → j → h → i which connect a sequence of vertices i, j, h, all distinct from
one another. We discuss the first metric, three-cycles, defined as the number of
three-cycles an actor i is involved in, that is
(cid:88)
cyci =
xijxjhxhi
We introduce a normalized characteristic for the number of three-cycles an actor
j,h
i is involved in as follows:
tci =
=
(cid:88)
(cid:88)
h
h
1
din
i
1
din
i
xhiJ(Sout
i
, Sin
h )
(cid:80)
h −(cid:80)
xhi
j xijxjh
dout
i + din
j xijxjh
h is the number of the common neighbors for both i and h or, the
Sout
i ∩ Sin
number of i's friends that consider h to be a friend as well. The Jaccard index
between these two sets Sout
and Sin
i
h reflects how similar these sets are in terms
of common versus non-common friends. Moreover,
(cid:88)
(cid:88)
(cid:88)
xhiSout
i ∩ Sin
h =
xhi
xijxjh
h
h
j
is the number of three-cycles that actor i is involved in. Therefore, by sum-
marizing the Jaccard indexes J(Sout
h ) for all h one can obtain a measure
(metric) tci that represents the status of common versus non-common friends
, Sin
i
of i in the graph when considered in terms of transitive three-cycles.
Transitive triplets -- A transitive triplet of length 3 in a given graph is a sub-
graph that consists of a sequence of directed edges i → j → h and i → h which
9
connect a sequence of vertices i, j, h that are all distinct from one another.
Recall, the metric triplets is defined as the number of triplets an actor i is
involved in, that is
plti =
xijxjhxih.
(cid:88)
In a similar fashion as for the three-cycles, one can define normalized metric for
j.h
the number of triplets in the graph:
(cid:88)
(cid:88)
j
j
tpi =
=
1
dout
i
1
dout
i
xijJ(Sout
i
j
)
, Sout
(cid:80)
j −(cid:80)
xij
h xihxjh
dout
i + dout
h xihxjh
Note that the normalized reciprocity, normalized transitive triplets, and normal-
ized three-cycles are related to reciprocity, transitive triplets, and three-cycles,
respectively - quantities that are commonly used in social science and graph
theory. The fact, shown here, that they can be expressed with Jaccard simi-
larity index not only brings novel understanding of these quantities, but also
suggests how they can be extended for multiplex networks, which will be done
in the next section. However, take into consideration that while using the Jac-
card similarity index to express the network characteristics, we define it as 0
when both considered sets are empty in order to reflect the social aspects of the
interpretation, i.e. two nodes that have no friends at all are not reciprocated
and are not part of any triplets or cycles.
2.4.2. Multiplex-graph characteristics
When considering a multiplex graph wherein α and β (α = β is not ex-
cluded) represent two types of social relationships, the normalized reciprocity,
normalized three-cycles, and normalized transitive triplets can be generalized
as:
ri(Gα, Gβ) = J(cid:0)Sout
(cid:88)
i
tci(Gα, Gβ) =
1
din
i
i (Gβ)(cid:1)
(Gα), Sin
xhiJ(Sout
i
(Gα), Sin
h (Gβ))
h
10
tpi(Gα, Gβ) =
(cid:88)
j
1
dout
i
xijJ(Sout
i
(Gα), Sout
j
(Gβ)).
By using these metrics we can analyze how different types of links interact
and form mixed dyad and triad formations. Recalling that in the general case
a multiplex graph can consist of several different layers, the multiplex-graph
extension of the reciprocity, cycles and triplets metrics enables us to study what
type of links are stronger than others, as well as how the network characteristics
change when considering only a subset of all existing interrelations among its
nodes.
We also consider the following two characteristics called overlapping indexes
and defined as:
oiout
i
(Gα, Gβ) = J(Sout
i
(Gα), Sout
i
(Gβ))
oiin
i (Gβ))
i (Gα, Gβ) = J(Sin
i (Gα), Sin
These two metrics are introduced in order to create a contrasting view compared
to the normalized multiplex graph characteristics as they are defined above. By
analyzing the Jaccard similarity of sets of links for a given node that belong
to different layers of the multiplex graph, we are able to infer the consistency
of the relationship intensity for different types of links. In other words, does
the node have the tendency to have different types of relationship with the
same set of friends in different environments (for example, online and offline
environment in our study case). We argue that the out overlapping index shows
the node activity in creating and maintaining different types of links, while the
in overlapping index represents the node popularity, i.e. ability to gain different
types of relationships.
2.5. Exogenous characteristics
Nodes in a graph may have a set of associated attributes, also called exoge-
nous actor covariates. In order to emphasize the completeness of the approach,
in this section we show that our unified framework based on the Jaccard sim-
ilarity index can also be used for the analysis of the exogenous characteristics
11
of the multiplex graph. The results for the exogenous characteristics will be
presented elsewhere.
Let Ai be the set of attributes associated to the node i. There are two
basic characteristics for the actor i: the out-attributes characteristic, measuring
whether actors with higher similarity-index values tend to nominate more friends
and hence have a higher out-degree; the in-attributes characteristic, measuring
whether actors with higher similarity-index values will tend to be nominated by
many others and hence have higher in-degrees. These two characteristics are
defined as
attout
i
=
1
dout
i
xijJ(Ai, Aj)
xjiJ(Ai, Aj),
attin
i =
1
din
i
(6)
(7)
(cid:88)
(cid:88)
j
j
(cid:88)
i,j;i<j
which will be compared to the average un-networked similarity value computed
as
att =
2
n(n − 1)
J(Ai, Aj).
The characteristic attout
nodes i and j for all the friends of i, that is, for all nodes in the set Sout
i measures similarity of attributes of the pair of end-
. The
i
characteristic attin
i measures similarity of attributes of the pair of end-nodes i
and j for those j that consider i as a friend, that is, for all nodes in the set Sin
.
i
The quantities (6) and (7) can be extended for multiplex networks as
1
dout
i
(cid:88)
(cid:88)
j
j
attout
i
(Gα) =
xij(Gα)J(Ai, Aj)
attin
i (Gα) =
1
din
i
xji(Gα)J(Ai, Aj)
With this extension once can also analyze the similarity of the attributes for
different pairs of nodes that are connected across different layers of the multiplex
network. Therefore, these metrics provide insight into how different types of
links influence the attribute based node similarity.
12
Figure 1: Visualization of a part of the multiplex graph constructed according to
the data from Group 2 with 2 basic and 2 aggregated graphs. Note that all nodes
(if present) are in the same positions across the layers.
3. Results
Let V be the set of all students enrolled on a given course (group). For
each group of students, there are four distinct directed graphs that have been
generated based on the answers collected from the online survey: offline/online
social network with strong ties and offline/online social network with weak ties,
defined as:
Gof
s = (V, Eof
s ),
Gof
w = (V, Eof
w ),
Gon
s
= (V, Eon
s ),
Gon
w = (V, Eon
w ),
s = {i → j is an offline strong tie}
Eof
w = {i → j is an offline weak tie}
Eof
s = {i → j is an online strong tie}
Eon
w = {i → j is an online weak tie}
Eon
(8)
(9)
(10)
(11)
From these four (basic) graphs, five more aggregated graphs are constructed:
Gof = (V, Eof ),
Gon = (V, Eon),
Gs = (V, Es),
Eof = Eof
Eon = Eon
s ∪ Eof
s ∪ Eon
w
w
Es = Eon
s ∪ Eof
s
13
(12)
(13)
(14)
Gw = (V, Ew),
G = (V, E) E = Eof ∪ Eon = Es ∪ Ew
Ew = Eon
w ∪ Eof
w
(15)
(16)
Two multiplex networks are studied for two groups. Each network consists
of nine layers or nine sets of ties: four basic - strong OFF, weak OFF, strong
ON, and weak ON and five aggregated sets - strong, weak, ON, OFF, and all,
as described with the given equations. In Fig. 1 a partial visual representa-
tion of the multiplex network for Group 2 is presented aiming to conceptualize
the different types of links in each layer together with the possible ways for
aggregation.
Table 1: Basic graph characteristics for all layers in the multiplex graph that
represents the social interrelations between the students from Group 1
TotDegree
Assor
Group 1
strong OFF
weak OFF
OFF
strong ON
weak ON
ON
strong
weak
all
V
153
153
153
153
153
153
153
153
153
E
675
756
4.412
4.941
1420
9.281
428
783
2.797
5.118
1201
7.850
730
4.771
1046
6.837
1487
9.719
V1
122
E1
630
Path
Diam
4.632
14
135
150
693
3.856
1402
2.994
9
7
0.431
0.018
0.238
0.235
87
0.154
0.253
0.392
0.087
0.195
138
150
128
145
153
9
7
319
742
5.196
14
3.782
1192
3.251
689
4.339
11
1016
3.212
1487
2.937
7
7
Multiplex networks are particularly significant when they overlap and in-
teract to create phenomena or processes that cannot be explained by a single
network alone. Tables 1 and 2 summarize the basic graph characteristics for all
graphs generated in the study (total of 9 graphs per group): number of actors
V , number of ties E, average degree and assortativity. Recall, a directed
graph is strongly connected if there is a directed path from each vertex to every
other vertex. The strongly connected components (SCC) of a directed graph
are its maximal strongly connected sub-graphs. The number of actors V1 and
14
Group 2
strong OFF
weak OFF
OFF
strong ON
weak ON
ON
strong
weak
all
E
412
521
930
226
465
690
455
728
V
80
80
80
80
80
80
80
80
80
5.150
6.513
11.625
2.825
5.812
8.625
5.688
9.100
V1
64
E1
390
57
71
49
62
68
65
67
73
420
892
188
414
651
430
675
985
Path
Diam
3.337
2.697
2.282
9
5
5
4.468
12
2.922
2.544
3.157
2.463
2.243
7
5
9
5
5
0.184
0.297
0.360
0.199
0.352
0.356
0.213
0.352
0.384
Table 2: Basic graph characteristics for all layers in the multiplex graph that
represents the social interrelations between the students from Group 2
TotDegree
Assor
1013
12.662
ties E1 for the largest SCCs for each of these graphs are also presented in the
tables, including the average path length and the diameter.
Since the number of participants in the two groups (153 versus 80) is differ-
ent, it is significant to confirm that the same conclusions (especially concerning
the ratios) hold for both groups. Namely, the number of strong ties is smaller
than the number of weak ties: 689 versus 1016 (40% strong ties and 60% weak
ties) for the first group and 430 versus 685 (41% strong ties and 59% weak ties)
for the second group. However, if we take a closer look at the strong ties graphs,
one can notice that there are more strong offline ties than strong online ties.
This leads us to the conclusion that the students have closer friendship relations
in the offline real rather than the online virtual environment. The number of
ON ties is smaller than the number of OFF ties: 1192 versus 1402 (46% ON
ties and 54% OFF ties) for Group 1 and 651 versus 892 (42% ON ties and 58%
OFF ties) for Group 2. Moreover, the number of strong OFF ties is almost
the same as the number of weak OFF ties for both groups: 630 and 693 (48%
and 52%) for the first group and 390 and 420 (48% and 52%) for the second
group. This suggests that weak communications are (almost) equally presented
15
in the online and real life communication. However, the number of strong ON
ties is almost half the number of weak ON ties: 319 and 742 (30% and 70%)
for the first group and 188 and 414 (31% and 69%) for the second group. This
could be interpreted as the fact that students within one group interact with all
colleagues no matter whether they consider them close or distant which could
be due to the necessities of working together on different projects, homework or
labs for example. However, looking at the number of online strong and online
weak ties, we can infer that the students use the virtual world to spread weak
and more common friendships most probably aiming to expand their circle of
acquaintances.
Comparing the average total degrees between basic graphs and aggregated
graphs in the multiplex network it is fairly straightforward to conclude that
both groups exhibit similar patterns for the average degrees: strong OFF and
weak OFF graphs have average degrees 4.4 and 4.9 for the first group and 5.1
and 6.5 for the second group, respectively. Strong ON and weak ON graphs
have average degrees 2.8 and 5.1 for the first group and 2.8 and 5.8 for the
second group, respectively. At the aggregated level, the average degrees for
strong and weak graphs are 4.8 and 6.8 for the first group and 5.7 and 9.1 for
the second group, while for the OFF and ON graphs these numbers are 9.3 and
7.8 for the first group and 11.6 and 8.6 for the second group. Note that the
average degrees for all graphs in the multiplex network of the second group are
greater than the average degrees for the corresponding graphs of the first group.
One possible explanation is that the students which are part of smaller group
are more friendly and associative between them. This is especially the case in
this scenario since the the students belonging to Group 2 have a more diverse
background (i.e. type of study program, year of study and alike) compared to
Group 1. However, we do not have more data to confirm (or disconfirm) this
conclusion (hypothesis).
Tables 3 and 4 provide summaries of the basic metrics: average values for
the reciprocities, three cycles, and triplets for all (single) graphs in the mul-
tiplex networks that represent group 1 and 2, respectively. All weak graphs
16
(weak OFF, weak ON, and weak) have smaller values for reciprocity, three
cycles, and triplets for both groups indicating that weak ties are less socially
significant. Both transitive triplets and three-cycles represent closed structures,
however, triplets indicate hierarchical ordering in contrast to three-cycles which
are against of such ordering. For all graphs studied here, the average values
of transitive triplets is slightly larger than the average values of three-cycles
showing that the elements of hierarchical ordering are present in these social
networks. Also, the results given in both tables 3 and 4 indicate that there is a
correlation between dyads (reciprocity) and triads (transitive triplet and three-
cycle) such that larger (smaller) values of the former imply larger (smaller)
values of the latter.
Table 3: Basic endogenous characteristics for all layers in the multiplex network
that represents social interactions in Group 1
Group 1
Average ri Average tci Average tpi
strong OFF
0.445
weak OFF
OFF
strong ON
weak ON
ON
strong
weak
all
0.154
0.467
0.465
0.204
0.442
0.482
0.278
0.492
0.153
0.029
0.147
0.141
0.045
0.133
0.159
0.061
0.155
0.168
0.039
0.190
0.136
0.049
0.173
0.177
0.074
0.200
Tables 5 and 6 show the average values of 5 different additional characteris-
tics that are focusing on the interrelationship of different parts of the multiplex
graph. Here, in addition to reciprocity, three-cycle, and triplet, we also have
the two overlapping indexes, all as they are defined in the subsection Multiplex
graph characteristics. The given results indicate that reciprocity is preserved
across different layers of the multiplex network; in particular the ties in strong
17
Table 4: Basic endogenous characteristics for all layers in the multiplex network
that represents social interactions in Group 2
Group 2
Average ri Average tci Average tpi
strong OFF
0.425
weak OFF
OFF
strong ON
weak ON
ON
strong
weak
all
0.074
0.335
0.448
0.099
0.342
0.509
0.148
0.360
0.156
0.041
0.139
0.146
0.049
0.115
0.150
0.081
0.153
0.161
0.049
0.200
0.149
0.064
0.172
0.171
0.102
0.216
OFF are reciprocal with ties in strong ON and vice versa (the normalized average
values are ri(GOF F
s
, GON
s
) = 0.417 and ri(GON
s
, GOF F
s
) = 0.406, respectively.
Similar values are also obtained for the pairs (OFF, ON) and (ON, OFF). How-
ever, for the considered social multiplex network, the triads (measured with
normalized three cycles and triplets) are not significant. On the other hand, the
values for the overlapping indexes show that activity and popularity patterns
among some layers of the multiplex network are significant. For instance, the
number of out-degree and in-degree friends in the strong OFF layer coincides
with the out-degree and in-degree friends in the strong ON layer. Or, out-degree
and in-degree friends in the weak OFF layer are also out-degree and in-degree
friends in the weak ON layer. On the other hand, the overlapping indexes for
both out-degree (activity) and in-degree (popularity) are small for the following
combinations of two graphs (strong ON, weak ON) and (strong OFF, weak,
OFF) for both Groups 1 and 2.
In social science structural equivalence is defined as "two nodes are consid-
ered structurally equivalent if they share many of the same network neighbors."
A possible operationalization of this definition could be done as follows: two
18
Table 5: Multiplex-graph characteristics for different pairs of layers reflecting the
combined types of ties for Group 1
Group 1
Reciprocity tc2
tp2
oi1
oi2
strong OFF, strong ON
0.417
0.136
0.148
0.568
0.524
weak OFF, weak ON
0.160
0.032
0.037
0.427
0.512
strong OFF, weak OFF
0.091
0.061
0.065
0.025
0.005
strong ON, weak ON
strong, weak
OFF, ON
0.081
0.175
0.434
0.052
0.059
0.028
0.006
0.093
0.102
0.195
0.180
0.141
0.182
0.735
0.775
strong ON, strong OFF
0.406
0.145
0.136
0.568
0.524
weak ON, weak OFF
0.165
0.038
0.042
0.427
0.512
weak OFF, strong OFF
0.116
0.040
0.061
0.025
0.005
weak ON, strong ON
weak, strong
ON, OFF
0.098
0.207
0.433
0.046
0.064
0.028
0.006
0.075
0.098
0.195
0.180
0.139
0.179
0.735
0.775
nodes i and j are structurally equivalent if ri = rj, tci = tcj and tpi = tpj. We
found that in each network some of the actors are structurally equivalent. For
example in the strong ON graph for Group 1, the actors with id 2, 24, and 127
are structurally equivalent having ri = 1, tci = 0.55, and tpi = 0.532. These
actors have out-degree and in-degree dout
i = 4, respectively. Ta-
ble 7 shows characteristics for those actors in the strong OFF graph that have
i = 4 and din
dout
i = 4 and din
i = 4. Again some of those actors are structurally equivalent (2
and 127). These initial results are very promising and open up a way to formally
mathematically define the concept of structural equivalence. However, further
deeper study on this matter must be carefully conducted in order to confirm
the viability of our proposed method. For instance, if we relax the condition to
approximately equal then nodes 80 and 83 from Table 7 will also be considered
equivalent.
Finally, we have also tested and confirmed the hypothesis of Granovetter.
19
Table 6: Multiplex-graph characteristics for different pairs of layers reflecting the
combined types of ties for Group 2
Group 2
Reciprocity tc2
tp2
oi1
oi2
strong OFF, strong ON
0.411
0.127
0.138
0.517
0.470
weak OFF, weak ON
0.072
0.038
0.057
0.400
0.401
strong OFF, weak OFF
0.071
0.054
0.056
0.093
0.003
strong ON, weak ON
strong, weak
OFF, ON
0.062
0.132
0.334
0.042
0.047
0.102
0.001
0.086
0.095
0.269
0.141
0.117
0.181
0.708
0.604
strong ON, strong OFF
0.362
0.130
0.138
0.517
0.470
weak ON, weak OFF
0.067
0.040
0.047
0.400
0.401
weak OFF, strong OFF
0.110
0.041
0.070
0.093
0.003
weak ON, strong ON
weak, strong
ON, OFF
0.135
0.209
0.306
0.039
0.065
0.102
0.001
0.073
0.103
0.269
0.141
0.118
0.180
0.708
0.604
Consider two arbitrary selected individuals A and B and the set of all persons
with ties to either or both of them. The hypothesis is: the stronger the tie
between A and B, the larger the proportion of individuals in S to whom they
will be both tied (connected by a weak or strong tie). For Group 1, there are a
total of 5526 strong wedges out of which: 39.052 % are closed by another strong
link, 33.406 % are closed by a weak link and 72.457 % are closed by any link.
Also, there are a total of 29860 weak wedges out of which: 8.279 % are closed
by a strong link, 9.752 % are closed by another weak link and 18.031 % are
closed by any link. For Group 2, there are a total of 4811 strong wedges out
of which: 39.243 % are closed by another strong link, 45.022 % are closed by a
weak link and 84.265 % are closed by any link. Also, there are a total of 25424
weak wedges out of which: 14.301 % are closed by a strong link, 23.450 % are
closed by another weak link and 37.752 % are closed by any link.
20
Table 7: Structural equivalence. Graph characteristics of the nodes in Group 1
with dout
i = 4 and din
strong OFF ri
i = 4
tci
tpi
i = 2
i = 40
i = 80
i = 83
i = 94
i = 122
i = 127
i = 148
1
0.424
0.442
0.333
0.042
0.094
0.6
0.6
0.6
1
1
0.343
0.353
0.356
0.287
0.053
0.056
0.376
0.366
0.424
0.442
0.143
0.083
0.191
4. Conclusions
By studying friendship relations among students enrolled on two different
courses represented using a multiplex structure, a number of interesting con-
clusions regarding the strength of online and offline ties can be drawn: (1)
strong ties are preferred in face-to-face (offline) communications; (2) weak ties
are equally presented in online and offline communications; (3) in offline com-
munication, strong and weak ties are (almost) equally included; (4) in online
communication weak ties are dominant; (5) weak ties (in three layers of the
multiplex network: weak offline, weak online, and weak) are much less recip-
rocal than strong ties; (6) dyads (that is, reciprocities) are preserved, however
triads (measured with normalized three cycles and triplets) are not significant in
different layers of a multiplex network; (7) activity and popularity patterns for
some layers of the multiplex network are significant: out-degree and in-degree
friends in one layer could also be out-degree and in-degree friends in another
layer. These conclusions are supported by the data obtained from both groups.
The number and consistency of the drawn conclusions have confirmed that by
approaching the problem of different interrelationships between actors as a mul-
tiplex network problem, one can gain useful insight on the importance of each
21
type of link within the social network as a whole, as well as on the interaction
and overlapping between different link types, especially in the offline/online
(real/virtual) environments as was our case of study.
In the future, we plan to study how exogenous characteristics influence the
structure of the multiplex network and how the network structure dominates
the actors (students) characteristics and their temporal evolution. In particular,
we will address questions on: how student grades are distributed; students'
commitment and progress to the studies; how one could empower the students
to obtain better grades or determine their specific areas of interest with greater
success. Are the students with better grades and habits more central to the
network or not, and how changing the placement of these individuals could
influence the structure of the network?
References
[1] Simmel, G. (1908), "Soziologie, Untersuchungen uber die formen der
vergesellschaftung" In K.H.Wolff (1950) (Ed., trans.), "The sociology of
Georg Simmel", New York: Free Press (pp.87-408)
[2] Granovetter M, "The strength of weak ties", American Journal of Sociol-
ogy (1973), 81, 1287-1303
[3] Watts D. and Strogatz S., "Collective dynamics of small-world networks,"
Nature 393, 440 (1998).
[4] Boorman, S.A., & White, H.C., "Social structure from multiple networks:
II Role structures", American Journal of Sociology (1976), 81, 1384-1446
[5] White, H.C., Boorman, S.A., & Breiger, R.L., "Social structure from mul-
tiple networks: I. Blockmodels of roles and positions" American Journal
of Sociology (1976), 87, 517-547
[6] Gould, R.V., "Multiple Networks and Mobilization in the Paris Com-
mune", American Sociological Review (1991), 56, 716-729
22
[7] Padgett, J.F., Ansell, C.K. "Robust Action and the Rise of the Medici",
American Journal of Sociology (1993), 98, 1259-1319
[8] Granovetter, M. "Economic Action and Social Structure: The Problem of
Embeddedness", American Journal of Sociology (1985), 91, 481-510
[9] Baldassarri, D., Diani, M., "The Integrative Power of Civic Networks",
American Journal of Sociology (2007), 113, 735-780
[10] Grossman, M., Dominguez, C.B.K. "Party Coalitions and Interest Group
Networks", American Politics Research (2009), 37, 767-800
[11] Maggioni MA, Breschi S, Panzarasa P, "Multiplexity, growth mechanisms
and structural variety in scientific collaboration networks", Industry and
Innovation (2013), 20(3): 185-194
[12] Rank ON, Robins GL, Pattison PE, "Structural logic of intraorganiza-
tional networks", Organization Science (2010) 21(3): 745-764
[13] Ferriani S, Fonti F, Corrado R, "The social and economic bases of net-
work multiplexity: Exploring the emergence of multiplex ties", Strategic
Organization (2012), 11(1): 7-34
[14] Shipilov AV, Li SX, "The Missing link: The effect of customers on the
formation of relationships among producers in the multiplex triads", Or-
ganization Science (2012), 23(2): 472-91
[15] Szell M, Lambiotte R, Thurner S, "Multirelational organization of large-
scale social networks in an online world", PNAS (2010), 107:13636-13641
[16] Mucha PJ, Richardson T, Macon K, Porter MA, Onnela JP, "Community
structure in time dependent, multiscale, and multiplex networks", Science
(2010), 328: 876-878
[17] Nicosia V, Bianconi G, Latora V, Barthelemy M, "Growing multiplex
networks", Phys. Rev. (2013), Lett. 111: 058701.
23
[18] Kim JY, Goh KI, "Coevolution and correlated multiplexity in multiplex
networks", Phys. Rev. (2011), Lett. 111: 058702
[19] Gomez-Gardenes J, Reinares I, Arenas A, Floria LM, "Evolution of coop-
eration in multiplex networks", Sci (2012), Rep. 2: 620.
[20] Sola L, Romance M, Criado R, Flores J, Garcia del Amo A, Boccaletti
S, "Eigenvector centrality of nodes in multiplex networks", arXiv (2013),
1305.7445
24
|
1604.03235 | 1 | 1604 | 2016-04-12T03:43:33 | Growing Wikipedia Across Languages via Recommendation | [
"cs.SI",
"cs.DL"
] | The different Wikipedia language editions vary dramatically in how comprehensive they are. As a result, most language editions contain only a small fraction of the sum of information that exists across all Wikipedias. In this paper, we present an approach to filling gaps in article coverage across different Wikipedia editions. Our main contribution is an end-to-end system for recommending articles for creation that exist in one language but are missing in another. The system involves identifying missing articles, ranking the missing articles according to their importance, and recommending important missing articles to editors based on their interests. We empirically validate our models in a controlled experiment involving 12,000 French Wikipedia editors. We find that personalizing recommendations increases editor engagement by a factor of two. Moreover, recommending articles increases their chance of being created by a factor of 3.2. Finally, articles created as a result of our recommendations are of comparable quality to organically created articles. Overall, our system leads to more engaged editors and faster growth of Wikipedia with no effect on its quality. | cs.SI | cs | Growing Wikipedia Across Languages via
Recommendation
Ellery Wulczyn
Wikimedia Foundation
[email protected]
Robert West
Stanford University
[email protected]
Leila Zia
Wikimedia Foundation
[email protected]
Jure Leskovec
Stanford University
[email protected]
6
1
0
2
r
p
A
2
1
]
I
S
.
s
c
[
1
v
5
3
2
3
0
.
4
0
6
1
:
v
i
X
r
a
ABSTRACT
The different Wikipedia language editions vary dramatically in how
comprehensive they are. As a result, most language editions con-
tain only a small fraction of the sum of information that exists
across all Wikipedias.
In this paper, we present an approach to
filling gaps in article coverage across different Wikipedia editions.
Our main contribution is an end-to-end system for recommending
articles for creation that exist in one language but are missing in an-
other. The system involves identifying missing articles, ranking the
missing articles according to their importance, and recommending
important missing articles to editors based on their interests. We
empirically validate our models in a controlled experiment involv-
ing 12,000 French Wikipedia editors. We find that personalizing
recommendations increases editor engagement by a factor of two.
Moreover, recommending articles increases their chance of being
created by a factor of 3.2. Finally, articles created as a result of our
recommendations are of comparable quality to organically created
articles. Overall, our system leads to more engaged editors and
faster growth of Wikipedia with no effect on its quality.
1.
INTRODUCTION
General encyclopedias are collections of information from all
branches of knowledge. Wikipedia is the most prominent online
encyclopedia, providing content via free access. Although the web-
site is available in 291 languages, the amount of content in different
languages differs significantly. While a dozen languages have more
than one million articles, more than 80% of Wikipedia language
editions have fewer than one hundred thousand articles [24]. It is
fair to say that one of the most important challenges for Wikipedia
is increasing the coverage of content across different languages.
Overcoming this challenge is no simple task for Wikipedia vol-
unteers. For many editors, it is difficult to find important miss-
ing articles, especially if they are newly registered and do not have
years of experience with creating Wikipedia content. Wikipedians
have made efforts to take stock of missing articles via collections
of "redlinks"1 or tools such as "Not in the other language" [15].
Both technologies help editors find missing articles, but leave ed-
itors with long, unranked lists of articles to choose from. Since
editing Wikipedia is unpaid volunteer work, it should be easier for
1 Redlinks are hyperlinks that link from an existing article to a non-
existing article that should be created.
Copyright is held by the International World Wide Web Conference Com-
mittee (IW3C2). IW3C2 reserves the right to provide a hyperlink to the
author's site if the Material is used in electronic media.
WWW 2016, April 11–15, 2016, Montréal, Québec, Canada.
ACM 978-1-4503-4143-1/16/04.
http://dx.doi.org/10.1145/2872427.2883077.
editors to find articles missing in their language that they would
like to contribute to. One approach to helping editors in this pro-
cess is to generate personalized recommendations for the creation
of important missing articles in their areas of interest.
Although Wikipedia volunteers have sought to increase the con-
tent coverage in different languages, research on identifying miss-
ing content and recommending such content to editors based on
their interests is scarce. Wikipedia's SuggestBot [6] is the only
end-to-end system designed for task recommendations. However,
SuggestBot focuses on recommending existing articles that require
improvement and does not consider the problem of recommending
articles that do not yet exist.
Here we introduce an empirically tested end-to-end system to
bridge gaps in coverage across Wikipedia language editions. Our
system has several steps: First, we harness the Wikipedia knowl-
edge graph to identify articles that exist in a source language but not
in a target language. We then rank these missing articles by impor-
tance. We do so by accurately predicting the potential future page
view count of the missing articles. Finally, we recommend missing
articles to editors in the target language based on their interests. In
particular, we find an optimal matching between editors and miss-
ing articles, ensuring that each article is recommended only once,
that editors receive multiple recommendations to choose from, and
that articles are recommended to the the most interested editors.
We validated our system by conducting a randomized experi-
ment, in which we sent article creation recommendations to 12,000
French Wikipedia editors. We find that our method of personaliz-
ing recommendations doubles the rate of editor engagement. More
important, our recommendation system increased the baseline ar-
ticle creation rate by a factor of 3.2. Also, articles created via our
recommendations are of comparable quality to organically created
articles. We conclude that our system can lead to more engaged
editors and faster growth of Wikipedia with no effect on its quality.
In Sec. 2 we
present the system for identifying, ranking, and recommending miss-
ing articles to Wikipedia editors. In Sec. 3 we describe how we
evaluate each of the three system components. In Sec. 4 we discuss
the details of the large scale email experiment in French Wikipedia.
We discuss some of the opportunities and challenges of this work
and some future directions in Sec. 5 and share some concluding
remarks in Sec. 6.
The rest of this paper is organized as follows.
2. SYSTEM FOR RECOMMENDING MISS-
ING ARTICLES
We assume we are given a language pair consisting of a source
language S and a target language T . Our goal is to support the
creation of important articles missing in T but existing in S.
Figure 1: System overview. Sec. 2.1, 2.2, 2.3 describe the com-
ponents in detail; we evaluate them in Sec. 3.1, 3.2, 3.3.
Figure 2:
Language-independent Wikidata concepts (oval)
linking to language-specific Wikipedia articles (rectangular).
Clusters are merged via redirects and inter-language links
hand-coded by Wikipedia editors.
Our system for addressing this task consists of three distinct
stages (Fig. 1). First, we find articles missing from the target lan-
guage but existing in the source language. Second, we rank the set
of articles missing in the target language by importance, by build-
ing a machine-learned model that predicts the number of views an
article would receive in the target language if it existed. Third, we
match missing articles to well-suited editors to create those articles,
based on similarities between the content of the missing articles
and of the articles previously edited by the editors. The steps are
explained in more details in the following sections.
2.1 Finding missing articles
For any pair of languages (S,T ), we want to find the set of arti-
cles in the source language S that have no corresponding article in
the target language T . We solve this task by leveraging the Wiki-
data knowledge base [20], which defines a mapping between lan-
guage-independent concepts and language-specific Wikipedia arti-
cles. For example, the abstract concept Q133212 in Wikidata maps
to 62 language-specific Wikipedia articles about tumors (such as
the TUMOR article in German Wikipedia, TUMEUR in French Wiki-
pedia or NOVOTVORINA in Croatian Wikipedia). We refer to these
language-independent concepts as Wikidata concepts.
This mapping induces a clustering of the Wikipedia articles from
all languages, such that each cluster contains all articles about the
same concept in the different languages. Therefore, a simple ap-
proach to finding articles that are present in S but missing in T
would be to consider those concepts whose cluster contains an arti-
cle in S but none in T . We could, for example, assume that Estonian
Wikipedia has no coverage of the TUMOR concept because the cor-
responding Wikidata concept Q133212 has no link to the Estonian
language.
A complicating factor is that distinct Wikidata concepts may cor-
respond to nearly identical real-world concepts, but every Wikidata
concept can link to only one article per language. For example,
there are separate Wikidata concepts for NEOPLASM and TUMOR.
The English and German Wikipedias have decided that these con-
cepts are similar enough that each only covers one of them: German
covers TUMOR, while English covers NEOPLASM, so the simple ap-
proach described above would consider the NEOPLASM article to be
missing in German-something we want to avoid, since the topic
is already covered in the TUMOR article.
In order to solve this problem, we need a way to partition the
set of Wikidata concepts into groups of near-synonyms. Once we
have such a partitioning, we may define a concept c to be missing
in language T if c's group contains no article in T .
In order to group Wikidata concepts that are semantically nearly
identical, we leverage two signals. First, we extract inter-language
links which Wikipedia editors use to override the mapping speci-
fied by Wikidata and to directly link articles across languages (e.g.,
in Fig. 2, English NEOPLASM is linked via an inter-language link
to German NEOPLASMA). We only consider inter-language links
added between S and T since using links from all languages has
been shown to lead to large clusters of non-synonymous concepts
[3]. Second, we extract intra-language redirects. Editors have the
ability to create redirects pointing to other articles in the same
language (e.g., as shown in Fig. 2, German Wikipedia contains a
redirect from NEOPLASMA to TUMOR). We use these two addi-
tional types of links-inter-language links and redirects-to merge
the original concept clusters defined by Wikidata, as illustrated by
Fig. 2, where articles in the red and blue cluster are merged under
the same concept by virtue of these links.
In a nutshell, we find missing articles by inspecting a graph
whose nodes are language-independent Wikidata concepts and lan-
guage-specific articles, and whose edges are Wikidata's concept-
to-article links together with the two additional kinds of link just
described. Given this graph, we define that a concept c is miss-
ing in language T if c's weakly connected component contains no
article in T .
2.2 Ranking missing articles
Not all missing articles should be created in all languages: some
may not be of encyclopedic value in the cultural context of the
target language. In the most extreme case, such articles might be
deleted shortly after being created. We do not want to encourage
the creation of such articles, but instead want to focus on articles
that would fill an important knowledge gap.
A first idea would be to use the curated list of 10,000 articles ev-
ery Wikipedia should have [23]. This list provides a set of articles
that are guaranteed to fill an important knowledge gap in any Wi-
kipedia in which they are missing. However, it is not the case that,
conversely, all Wikipedias would be complete if they contained all
of these articles. For instance, an article on PICADA, an essential
aspect of Catalan cuisine, may be crucial for the Catalan and Span-
ish Wikipedias, but not for Hindi Wikipedia. Hence, instead of
trying to develop a more exhaustive global ranking and prioritizing
the creation of missing content according to this global ranking, we
build a separate ranking for each language pair.
Ranking criterion. We intend to rank missing articles according
to the following criterion: How much would the article be read if it
were to be created in the given target language? Since this quantity
is unknown, we need to predict it from data that is already known,
such as the popularity of the article in languages in which it already
exists, or the topics of the article in the source language (all features
are listed below).
In particular, we build a regression model for predicting the nor-
malized rank (with respect to page view counts) of the article in
question among all articles in the target language. The normalized
rank of concept c in language T is defined as
yT (c) :=
rankT (c)
T
,
(1)
Sec. 2.1 & 3.1FindmissingarticlesRankarticles byimportanceMatcheditors andarticlesSec. 2.2 & 3.2Sec. 2.3 & 3.3Q1216998de:Tumoren:Neoplasmde:Neoplasmafr:Néoplasiefr:Tumeurzh:肿瘤et:KasvajaWikipediaRedirectWikidataQ133212where rankT (c) is the (unnormalized) rank of T 's article about con-
cept c when all articles in language T are sorted in increasing or-
der of page view counts. We considered page views received by
each article in our dataset over the period of six months prior to
the data collection point. Page view data was obtained via the raw
HTTP request logs collected by the Wikimedia Foundation. Re-
quests from clients whose user-agent string reveals them as bots
were excluded [14].
For a given source–target pair (S,T ), the model is trained on con-
cepts that exist in both languages, and applied on concepts that exist
in S but not in T . We experiment with several regression techniques
(Sec. 3.2), finding that random forests [5] perform best.
Features. Finally, we describe the features used in the regression
model for source language S and target language T . Here, cL is the
article about concept c in language L. Information about cT is not
available at test time, so it is also excluded during training.
Wikidata count: The more Wikipedias cover c, the more impor-
tant it is likely to be in T . Hence we include the number of Wiki-
pedias having an article about c.
Page views: If c is popular in other languages it is also likely to
be popular in T . Thus these features specify the number of page
views the articles corresponding to c have received over the last
six months in the top 50 language versions of Wikipedia. Since
some languages might be better predictors for T than others, we
include page view counts for each of the 50 languages as a separate
feature. (If the article does not exist in a language, the respective
count is set to zero.) In addition to the raw number of page views,
we also include the logarithm as well as the normalized page view
rank (Eq. 1).
Geo page views: If cS is popular in certain countries (presum-
ably those where T is spoken), we expect cT to be popular as well.
Hence these features specify the number of page views cS has re-
ceived from each country.
Source-article length: If cS contains substantial content we ex-
pect c to be important in T . Hence we consider the length of cS
(measured in terms of bytes in wiki markup).
Quality and importance classes: If cS is considered of high qual-
ity or importance, we expect c to be an important subject in general.
To capture this, we use two signals. First, several Wikipedias clas-
sify articles in terms of quality as 'stub', 'good article', or 'featured
article' based on editor review [25]. Second, members of WikiProj-
ects, groups of contributors who want to work together as a team
to improve a specific topic area of Wikipedia, assign importance
classes to articles to indicate how important the article is to their
topical area [22]. We compute the maximum importance class that
cS has been given by any WikiProject. Quality and importance class
labels are coded as indicator variables.
Edit activity: The more editors have worked on cS, the more
important we expect c to be for T as well. Hence we consider the
number of editors who have contributed to cS since it was created,
as well as the number of months since the first and last times cS
was edited.
Links: If cS is connected to many articles that also exist in T then
the topical area of c is relevant to T . Therefore this feature counts
the numbers of inlinks (outlinks) that cS has from (to) articles that
exist in T . We also include the total indegree and outdegree of cS.
Topics: Some topics are more relevant to a given language than
others. To be able to model this fact, we build a topic model over all
articles in S via Latent Dirichlet Allocation (LDA) [4] and include
the topic vector of cS as a feature. We use the LDA implementation
included in the gensim library [18], set the number of topics to 400,
and normalize all topic vectors to unit length.
Figure 3: Embedding of an editor's edit history into the topic
vector space.
2.3 Matching editors to articles
Our high-level objective is to encourage editors to create im-
portant articles. We have already described how to find important
missing articles (Sec. 2.1, 2.2). What is needed next is to find the
best editors to create those articles. We hypothesize that editors are
more likely to create articles that fall into their area of interest, and
therefore we need a way of capturing how interested an editor is in
creating a given article (Sec. 2.3.1). Finally, in order to make the
most effective recommendations, we need a way to combine the in-
herent importance of an article with an editor's interest in creating
that article (Sec. 2.3.2), and to match editors with articles based on
the resulting scores (Sec. 2.3.3).
2.3.1 Editor interest modeling
For an editor e and concept c we want to score how closely c
matches the topics of interest to e. Later we will use these interest
scores to match editors with missing articles.
We quantify e's interest in creating an article about c via the sim-
ilarity of c to the articles e has previously edited (i.e., e's edit his-
tory). This idea is illustrated schematically in Fig. 3, where the
black crosses represent the articles e has edited, summarized in a
single point by the orange cross. Gray dots stand for missing ar-
ticles that could potentially be recommended to e. The closer two
points, the more similar the concepts they represent, and the closer
a missing article (gray cross) is to e's summarized edit history (or-
ange cross), the better a recommendation it is. Operationalizing
this idea poses the challenges of (1) representing articles in a vec-
tor space and (2) aggregating an entire edit history into a single
point in that vector space.
Vector-space representation of concepts. First, to embed con-
cepts in vector space, we represent the concept c by the LDA topic
vector of cS (cf. Sec. 2.2). We can include contributions e made in
languages other than S if the edited articles have a corresponding
article in S. In this case, we use the topic vector of cS to represent
the edited article. The distance between two concepts is measured
as the Euclidean2 distance between their normalized topic vectors.
Aggregating edit histories into interest vectors. Second, to sum-
marize edit histories as interest vectors, we proceed as follows. For
each revision made by e, we compute the number of bytes that were
added to the article. We then compute the total number of bytes e
has added to an article over the course of all the revisions to that
article. Revisions that remove bytes are not included. This way,
each concept appears at most once in each edit history. We con-
sider three different methods of summarizing an edit history into
a single vector in the LDA topic space, which we refer to as the
editor's interest vector (all interest vectors are normalized to unit
length):
2Since vectors are normalized, cosine distance and Euclidean dis-
tance are equivalent for our purposes.
topic vectors for articlesin e's edit historyinterest vector for editor etopic vectors forarticles in S that are missing in TVW GolfFront Wheel DriveVW Golf VIIBMW B38Engine EfficiencyMotor Sailor1. Average. The interest vector for editor e is computed as the
mean of the topic vectors of all articles in e's edit history.
2. Weighted average. As above, with the difference that each
concept c is weighted by the logarithm of the number of bytes
e has added to c.
3. Weighted medoid. The interest vector is defined as the topic
vector of the article from e's edit history that minimizes the
weighted sum of distances between it and all other topic vec-
tors from the edit history. Weights are computed as above.
History size. When computing an interest vector, we may not want
to include all articles from the edit history. For instance, some ed-
itors have worked on thousands of articles, which leads to unnec-
essarily long interest vector computation times and very dense in-
terest vectors when using averaging. An editor's interests may also
evolve over time, so including articles edited a long time ago adds
noise to the signal of what topics the editor is interested in now.
For these reasons, we introduce history size as a tunable parameter,
specifying the number of most recently edited articles considered
for computing interest vectors.
2.3.2
We aim to recommend a missing article cT to an editor e if
(1) concept c is important in the target language T and (2) it is
relevant to e's interests. Above, we have proposed methods for
quantifying these two aspects, but in order to make effective rec-
ommendations, we need to somehow integrate them.
Integrating importance and interest
A simple way of doing so is to first rank all articles missing from
language T by importance (Sec. 2.1), then discard all but the K
most important ones (where K is a parameter), and finally score the
relevance of each remaining concept c for editor e by computing
the distance of c's topic vector and e's interest vector (Sec. 2.3.1).
A slightly more complex approach would be to keep all missing
articles on the table and compute a combined score that integrates
the two separate scores for article importance and editor–article in-
terest, e.g., in a weighted sum or product.
Both approaches have one parameter: the number K of most im-
portant articles, or the weight for trading off article importance and
editor–article interest. Since we found it more straightforward to
manually choose the first kind of parameter, we focus on the se-
quential strategy described first.
2.3.3 Matching
When several editors simultaneously work on the same article,
the danger of edit conflicts arises.
In order to prevent this from
happening, we need to ensure that, at any given time, each article
is recommended to only a single editor. Further, to avoid over-
whelming editors with work, we can make only a limited number
of recommendations per editor. Finally, we want the articles that
we recommend to be as relevant to the editor as possible. Formally,
these goals are simultaneously met by finding a matching between
editors and articles that maximizes the average interest score be-
tween editors and assigned articles, under the constraints that each
article is assigned to a unique editor and each editor is assigned a
small number k of unique articles.
We formulate this matching problem as a linear program [7] and
solve it using standard optimization software.
In practice, we find that a simple greedy heuristic algorithm gives
results that are as good as the optimal solutions obtained from the
matching algorithm. The heuristic algorithm iterates k times over
the set of editors for whom we are generating recommendations
and assigns them the article in which they are interested most and
which has not yet been assigned.
Rank Lenient precision
0.85 [0.64, 0.95]
0.90 [0.70, 0.97]
0.95 [0.76, 0.99]
1.00 [0.84, 1.00]
1.00 [0.84, 1.00]
1
101
1,001
10,001
100,001
Strict precision
0.55 [0.34, 0.74]
0.55 [0.34, 0.74]
0.90 [0.70, 0.97]
0.95 [0.76, 0.99]
0.95 [0.76, 0.99]
Table 1: Empirical values with 95% credible intervals for pre-
cision of missing-article detector (Sec. 2.1). Rows are predicted
importance levels of missing articles; for definition (also of two
kinds of precision), cf. Sec. 3.1.
3. OFFLINE EVALUATION
Before evaluating our system based on deploying the complete
pipeline in a live experiment (Sec. 4), we evaluate each component
offline, using English as the source language S, and French as the
target language T .
3.1 Finding missing articles
Here we assess the quality of the procedure for detecting miss-
ing articles (Sec. 2.1). We do not assess recall since that requires
a ground-truth set of missing articles, which we do not have. Fur-
thermore, using English as a source and French as the target, our
procedure produces 3.7M missing articles. Given this large num-
ber of articles predicted to be missing, we are more concerned with
precision than with recall. Precision, on the other hand, is straight-
forward to evaluate by manually checking a sample of articles pre-
dicted to be missing for whether they are actually missing.
Our first approach to evaluating precision was to sample 100
articles uniformly at random from among the 300K most impor-
tant ones (according to our classifier from Sec. 2.2). This gives
99% precision: only one of 100 actually exists. The English EC-
TOSYMBIOSIS was labeled as missing in French, although French
ECTOSYMBIOSE exists-it just has not been linked to Wikidata yet.
Since precision might not be as high for the most important miss-
ing articles, we ran a second evaluation. Instead of taking sample
test cases at random, we took a sample stratified by predicted im-
portance of the missing article. We manually checked 100 cases in
total, corresponding to ranks 1–20, 101–120, 1,001–1,020, 10,001–
10,020, and 100,001–100,020 in the ranking produced by our im-
portance model (Sec. 2.2).
In addition to the unambiguous errors arising from missing Wi-
kidata and inter-language links, we observed two types of cases
that are more difficult to evaluate. First, one language might spread
content over several articles, while the other gathers it in one. As
an example, French covers the Roman hero HERCULE in the arti-
cle about the Greek version HÉRACLÈS, while English has separate
articles for HERCULES and HERACLES. As a consequence, the En-
glish article HERCULES is labeled as missing in French. Whether
HERCULE deserves his own article in French, too, cannot be an-
swered definitively. Second, a concept might currently be covered
not in a separate article but as a section in another article. Again,
whether the concept deserves a more elaborate discussion in an ar-
ticle of its own, is a subjective decision that has to be made by the
human editor. Since it is hard to label such borderline cases un-
equivocally, we compute two types of precisions. If we label these
cases as errors, we obtain strict precision; otherwise we obtain le-
nient precision.
Precision results are summarized in Table 1. While we overall
achieve good performance (lenient precision is at least 85% across
importance levels), the results confirm our expectation that detect-
ing missing articles is harder for more prominent concepts (strict
Model RMSE Spearman correlation
Mean baseline
Source-language baseline
Random forests
0.287
0.276
0.130
N/A
0.673
0.898
Table 2: Importance ranking test results (Sec. 3.2).
Figure 5: Empirical page view ranks for newly created articles
as a function of predicted ranks (for target language French).
Results. As seen in Table 2, the simple mean baseline yields an
RMSE of 0.287. The source-language baseline improves on this
only slightly, with an RMSE of 0.276. Fig. 4 plots the prediction
of this baseline against the ground-truth value (i.e., it shows a scat-
ter plot of the normalized ranks in English and French). We see
that, while there is significant correlation, the source-language rank
tends to overestimate the target-language rank.
Table 2 compares the performance of the baselines with the tuned
random forest regression model. The latter performs better by a
large margin in terms of both RMSE (0.130 vs. 0.276) and Spear-
man correlation (0.898 vs. 0.673). We conclude that leveraging
additional features in a machine-learned model lets us overcome
the aforementioned overestimation bias inherent in the source-lan-
guage baseline.
To validate that highly ranked missing articles indeed attract more
page views after being created, we performed a time-based evalua-
tion by tracking readership for the set of 5.7K English articles that
were missing in French Wikipedia as of June 25, 2015, but were
created by July 25, 2015. Rank predictions are made based on
features of the English articles before June 25, and empirical page
view ranks are computed based on traffic from July 25 through Au-
gust 25. Fig. 5 shows that the predicted ranks of these new articles
correlate very well with their empirical ranks.
The RMSE between the predicted rank and the empirical rank
is 0.173, which is higher than the offline validation step suggests
(0.130; Table 2). This is to be expected, since empirical ranks were
computed using page view counts over a single month directly after
the article is created, whereas the model was trained on ranks com-
puted using page view counts over six months for articles that may
have existed for many years. Articles predicted to have a low rank
that get created tend to have a higher empirical rank than predicted.
This makes sense if the creation is prompted by news events which
drive both the creation and subsequent readership, and which are
not anticipated by the model.
Figure 4: Scatterplot of page view ranks for articles in English
vs. French Wikipedia.
precision is only 55% for the two highest importance levels). We
conclude that it is important to ask editors to whom we make sug-
gestions to double-check whether the article is really missing in
the target language. Since the effort of this manual check is small
compared to the effort of creating the article, this is a reasonable
requirement.
3.2 Ranking missing articles
In this section we discuss the performance of our method for
ranking missing articles by importance. Recall that here impor-
tance is measured in terms of the number of page views received
by a page once it is created. We use English as the source, and
French as the target language.
Evaluation metrics. We use two evaluation metrics, Spearman's
rank correlation coefficient and root mean squared error (RMSE).
The former is appropriate as we care mostly about the ranking of
predictions, rather than the exact predicted values. The latter is
useful because it has a natural interpretation: since we predict nor-
malized page view ranks (Sec. 2.2), an RMSE of, say, 0.1 means
that the average article ranks 10 percentile points higher or lower
than predicted.
Baselines. The simplest baseline is to always predict the same con-
stant value. We use the mean normalized rank over all articles in
the target language (i.e., 0.5) as the constant and call this the mean
baseline.
It is reasonable to assume that the newly created version of an
article in the target language will not be too different in terms of
page view rank, compared to the version in the source language.
Hence our second baseline (termed source-language baseline) is
given by the normalized rank of the already existing source version
of c (yS(c) in the notation of Eq. 1).
Random forests.
In order to improve upon these baselines, we
experimented with several regression techniques, including linear
regression, ridge regression, least-angle regression, and random
forests, using implementations in scikit-learn [17]. We found that
random forests [5] gave the best performance, so we focus on them.
In all experiments, the data is split into a training and a testing set.
To tune the hyperparameters of the random forest model (the num-
ber of trees in the ensemble, as well as their maximum depth), we
perform cross-validation on the training set.
Feature set added
Page views
1
2 Topics
3 Links
4 Geo page views
5 Qual. & import. classes
6 Edit activity
7
Source-article length
RMSE Spearman correlation
0.165
0.133
0.132
0.131
0.130
0.130
0.130
0.827
0.893
0.895
0.895
0.898
0.898
0.898
Table 3: Forward stepwise feature selection results (features
explained in Sec. 2.2).
Feature importance. Finally, to better understand which feature
sets are important in our prediction task, we used forward stepwise
feature selection. At each iteration, this method adds the feature set
to the set of training features that gives the greatest gain in perfor-
mance. Feature selection is done via cross-validation on the train-
ing set; the reported performance of all versions of the model is
based on the held-out testing set. For an explanation of all features,
see Sec. 2.2.
The results are listed in Table 3. As expected, the single strongest
feature set is given by the page views the missing article gets in
Wikipedias where it already exists. Using this feature set gives
an RMSE of 0.165, a significant decrease from the 0.276 achieved
by the source-language baseline (Table 2). Enhancing the model
by adding the LDA topic vector of the source version of the miss-
ing article results in another large drop in RMSE, down to 0.133.
Thereafter, adding the remaining feature sets affords but insignifi-
cant gains.
3.3 Matching editors and articles
Here we evaluate our approach to modeling editors' interests and
matching editors with missing articles to be created. Recall that we
model articles as topic vectors (Sec. 2.3.1), and an editor e's inter-
est vector as an aggregate of the topic vectors corresponding to the
articles e has edited. To measure the predictive power of these in-
terest vectors with regard to the edits e will make next, we hold out
e's most recently edited article and use the remaining most recent
w articles to compute e's interest vector (where w is the history size
parameter, cf. Sec. 2.3.1).
Then, all articles of the source language S are ranked by their
distance to e's interest vector, and we measure the quality of the
prediction as the reciprocal rank of the held-out article in the rank-
ing. The quality of a method, then, is the the mean reciprocal rank
(MRR) over a test set of editors.
Fig. 6 explores how performance depends on the history size w
and the edit-history aggregation method (Sec. 2.3.1), for a set of
100,000 English Wikipedia editors who have contributed to at least
two articles. We observe that the average and weighted-average
methods perform equally well (considerably better than weighted
medoids). Their performance increases with w up to w = 16 and
then slowly decreases, indicating that it suffices to consider short
edit-history suffixes. Under the optimal w = 16 we achieve an MRR
of 0.0052. That is, the harmonic mean rank of the next article an
editor edits is 1/0.0052 = 192. Keeping in mind that there are 5M
articles in English Wikipedia, this is a good result, indicating that
editors work within topics as extracted by our LDA topic model.
4. ONLINE EXPERIMENT
Figure 6: Mean reciprocal rank of predicting the article a user
edits next, based on her previous w edits (logarithmic x-axis),
with bootstrapped 95% confidence intervals; one curve per ag-
gregation method.
tify important missing articles, match them to appropriate editors
based on their previous edits, and suggest to these editors by email
that they might be interested in creating those articles. We focus
on the source/target pair English/French and, to lower the partici-
pation threshold, give contacted editors the option to use a content
translation tool built by the Wikimedia Foundation [16].
To assess the effectiveness of our system, we then ask the fol-
lowing research questions:
RQ1 Does recommending articles for creation increase the rate at
which they are created compared to the rate at which articles
are organically created in Wikipedia?
RQ2 Do our targeted recommendations increase editor engage-
ment, compared to a scenario where we ask editors to create
randomly assigned important missing articles?
RQ3 How high is the quality of articles created in response to our
targeted recommendations?
4.1 Experimental design
In order to measure the outcomes of recommending missing ar-
ticles to editors, we need a set of articles as well as a set of edi-
tors. The set of articles included in the experiment consists of the
top 300K English articles missing in French (Sec. 2.1) in the im-
portance ranking (Sec. 2.2). These articles were assigned to three
groups A1, A2, and A3 (each of size 100K) by repeatedly taking
the top three unassigned articles from the ranking and randomly as-
signing each to one of the three groups. This ensures that the arti-
cles in all three groups are of the same expected importance. There
were 12,040 French editors who made an edit in the last year and
displayed proficiency in English (for details, cf. Appendix A.1.).
These editors are suitable for receiving recommendations and were
randomly assigned to treatment groups E1 and E2. All other French
Wikipedia editors were assigned to the control group E3. Within
E3, there are 98K editors who made an edit in the last year.
Based on these groupings, we define three experimental condi-
tions (Fig. 7):
The challenge we address in this research is to boost the creation
of articles purveying important knowledge. We now put our solu-
tion to this challenge to the test in an in vivo experiment. We iden-
C1 Personalized recommendation: Editors in group E1 were
sent an email recommending five articles from group A1 ob-
tained through our interest-matching method (Sec. 2.3).
Potentially created
Actually created
Creation rate
C1
30,055
316
C2
30,145
177
1.05% 0.59%
C3
100,000
322
0.32%
Table 4: Article creation rates for the experimental conditions
defined in Sec. 4.1.
ference between conditions C1 and C2 is that in C1 articles are as-
signed to editors based on our recommendation method, whereas in
C2 articles are assigned to editors randomly. Therefore, by compar-
ing the article creation rates of conditions C1 and C2, we may ad-
dress the potential concern that a boost in article creation rate might
be caused by the mere fact that an email recommending something
was sent, rather than by the personalized recommendations con-
tained in the email.
Table 4 shows the article creation rates for all experimental con-
ditions.
Important articles not recommended to any editor (C3)
had a background probability of 0.32% of being organically created
within the month after the experiment was launched. This probabil-
ity is boosted by a factor of 3.2 (to 1.05%) for articles that were rec-
ommended to editors based on our interest-matching method (C1).
On the other hand, articles that were recommended to editors on a
random, rather than a personalized, basis (C2) experienced a boost
of only 1.8 (for a creation rate of 0.59%).3
A possible confound in comparing the creation rates in C1 and
C2 to C3 is the possibility that our recommendation emails diverted
effort from articles in C3 and that, consequently, the creation rate
in C3 is an underestimate of the organic creation rate. Although the
number of editors in E1 and E2 is small (6K each) compared to the
number of editors in E3 (over 98K), they differ in that editors in E1
and E2 showed proficiency in English, which might be correlated
with high productivity. To address this concern, we computed the
creation rate for the top 300K most important missing articles in
the month prior to the experiment. We found a creation rate of
0.36%, which is only slightly higher than the rate we observed in
C3 (0.32%). This indicates that the degree of underestimation in
C3 is small.
A possible confound in comparing the creation rates between C1
and C2 is that, if articles matched via personalization are also pre-
dicted to be more important, then the boost in creation rate might
not stem from topical personalization but from the fact that more
important articles were recommended. To investigate this possibil-
ity, we compare the predicted importance (Sec. 2.2) of the articles
recommended in condition C1 and C2. Fig. 9 shows that the two
distributions are nearly identical, which implies that the boost in
article creation rate is not mediated merely by a bias towards more
popular articles among those recommended in C1.
We conclude that recommending articles to suitable editors based
on their previously edited articles constitutes an effective way of
increasing the creation rate of articles containing important knowl-
edge. Although some of this increase is caused merely by remind-
ing editors by email to contribute, the quality of the specific per-
sonalized suggestions is of crucial importance.
4.2.2 RQ2: Effect on editor engagement
We continue our evaluation with a more editor-centric analysis.
To gauge the effectiveness of our method in terms of editor engage-
ment, we pose the following questions: What fraction of contacted
3All pairs of creation rates are statistically significantly different
(p < 10−7 in a two-tailed two-sample t-test) with highly non-over-
lapping 95% confidence intervals.
Figure 7: Experimental design of user test.
Figure 8: Screenshot of the content translation tool. The user
is in the process of translating the NASA HELIOS article from
English to French.
C2 Randomized recommendation: Editors in group E2 were
sent an email recommending five articles selected from group
A2 at random. (In both conditions C1 and C2, each article
was assigned to at most one editor.)
C3 No recommendation: Articles in group A3 were not recom-
mended to any editor. Editors in group E3 did not receive
any recommendations.
Note that not all articles from groups A1 and A2 were recom-
mended to editors: each group contains 100K articles, but there are
only about 6K editors in each of E1 and E2; since every editor re-
ceived five recommendations, only about 30K of the 100K articles
in each group were recommended.
Emails were sent to the editors in conditions C1 and C2 on June 25,
2015. The emails were written in French and generated from the
same template across conditions (cf. project website [27] for exact
text). To facilitate the article-creation process, each of the five rec-
ommendations was accompanied with a link to the translation tool
that allows for easy section-by-section translation from the source
to the target language (Fig. 8).
4.2 Results
We now evaluate the data collected through the experiment de-
scribed above to answer research questions RQ1, RQ2, and RQ3.
4.2.1 RQ1: Effect on article creation rates
We measure the article creation rate for each condition as the
fraction of articles in the respective group that were created in the
one-month period after the recommendation email was sent. (Ap-
pendix A.2 provides methodological details on how we count the
articles created in each condition.)
Comparing the article creation rates of conditions C1 and C3 will
let us estimate the effect of personalized recommendation on the
probability that an article is created. Further, note that the only dif-
Personalized recommendationRandomized recommendationArticlesA1A2A3EditorsE1E2No recommendationConditionC1:C2:C3:E3Figure 9: Box plots for predicted page view rank for articles in
experimental conditions C1 and C2.
Figure 10: Editor activation rate in condition C1 as a function
of months since last edit.
Editors contacted
Active editors
Publishing editors
Activation rate
Publication rate
Personal (C1) Random (C2)
6,029
145
69
2.4%
1.1%
6,011
258
137
4.3%
2.3%
Table 5: Effect of personalizing the recommendations.
editors become active in creating a recommended article? Are ed-
itors more likely to become active in response to an email if they
receive personalized, rather than random, recommendations?
Formally, we define an active editor as an editor who starts work-
ing on a recommended article in the translation tool (without neces-
sarily publishing it), and a publishing editor as one who starts and
publishes a recommended article. Given these definitions, we com-
pute activation and publication rates as the fractions of all editors
in each group who become active or published, respectively.
Table 5 compares these rates between the personalized (E1) and
randomized (E2) editor groups (corresponding to experimental con-
ditions C1 and C2), showing that about one in fifty editors in the
randomized group (E2) started a recommended article in the trans-
lation tool (activation rate 2.4%), and that half of them went on to
publish the newly created article (publication rate 1.1%).
In the
personalized group (E1), on the other hand, the activation (publi-
cation) rate is 4.3% (2.3%); i.e., personalization boosts the activa-
tion as well as the publication rate by a factor of about two.4 This
clearly shows that personalization is effective at encouraging edi-
tors to contribute new important content to Wikipedia.
Recency of activity. The set of 12K editors who received recom-
mendation emails included editors proficient in both English and
French and having made at least one edit within the 12 months prior
to the experiment (cf. Appendix A.1). However, being active many
months ago does not necessarily imply being currently interested
in editing. So, in order to obtain a more fine-grained understanding
of activation rates, we bucketed editors into three roughly equally
sized groups based on how many months had passed between their
last edit and the experiment. Fig. 10 shows that users who were
active recently are much more likely to participate, for an activa-
4Publication and activation rates in the two conditions are statisti-
cally significantly different (p < 10−5 in a two-tailed two-sample
t-test) with highly non-overlapping 95% confidence intervals.
tion rate of 7.0% among editors with at least one edit in the month
before the experiment (compare to the overall 4.3%; Table 5).
4.2.3 RQ3: Article quality
We conclude the analysis of results by evaluating the quality of
articles created with the help of our recommendations. This is im-
portant as it is conceivable that editors might work more thoroughly
when creating articles of their own accord, compared to our situa-
tion, where editors are extrinsically prompted to create new con-
tent.
Deletion rate. We define the deletion rate as the percent of newly
created articles deleted within 3 months of being created. The dele-
tion rate for articles in C1 that were published in response to rec-
ommendations is 4.8%, 95% CI [2.6%, 8.6%], while the deletion
rate for articles in C2 that were published in response to recommen-
dations is 9.3%, 95% CI [4.8%, 17.3%]. Note that this difference is
not significant (p = 0.063). The aggregate deletion rate of articles
published in response to recommendations (conditions C1 and C2)
is 6.1%, 95% CI [3.9%, 9.4%]. In comparison, the overall deletion
rate of articles created in French Wikipedia in the month following
the experiment is vastly higher at 27.5%, 95% CI [26.8%, 28.2%]
(p < 0.001).
Automatic quality score. We use the article quality classifier built
for French Wikipedia [19, 12] to assess the quality of articles cre-
ated by recommendation. Given an article, the model outputs the
probability that the article belongs to each of the six quality classes
used in French Wikipedia. Fig. 11 shows the averaged quality class
probabilities for articles created and published in response to rec-
ommendations (conditions C1 and C2) and for articles that were
organically created but are of similar estimated importance (condi-
tion C3) 3 months after creation. As a baseline, we also include the
distribution for a random sample of French Wikipedia articles. Ar-
ticles created based on recommendations are of similar estimated
quality compared to articles that were organically created and the
average French Wikipedia article.
Article popularity. Although not directly related to article quality,
we include here a brief comparison of article popularity. Fig. 12
shows the distributions over the number of page views received in
the first 3 months after creation for articles created due to a recom-
mendation and for all other French Wikipedia articles created in the
month after the start of the experiment. On average, articles created
< 11-44<months since last edit0.010.020.030.040.050.060.070.08activation rate95% confidence intervalFigure 11: Aggregated quality class probabilities for articles in
conditions C1 and C3, as well as for a set of 1,000 randomly se-
lected French Wikipedia articles (with bootstrapped 95% con-
fidence intervals).
Figure 13: Screenshot of the Web application for translation
recommendation.
13]. In other words, languages form barriers preventing knowledge
already available in some editions of the free encyclopedia from
being accessible to speakers of other languages [2, 28].
Until recently, very little was done to support cross-language
content creation, with the exception of a few initiatives in specific
topic areas such as the translation of medical information at the
height of the Ebola crisis [1]. Multilingual contributors have been
identified as playing a key role in transferring content across dif-
ferent language editions, particularly in smaller Wikipedias which
still struggle to reach a critical mass of editors [11].
Part of this research uses knowledge from the rich literature on
personalized task recommendation. Instead of going over that lit-
erature exhaustively, we refer the interested reader to the state of
the art research on personalized task recommendation systems in
crowdsourcing environments [10].
In the rest of this section, we discuss how future research can
help address some of the challenges we faced in our work.
Email campaigns. Email campaigns such as the one conducted
in this research are limiting in several respects. Emailing recom-
mendations involves contacting editors who may not be interested
in receiving recommendations. On the other hand, editors who en-
joy the recommendations may wish to receive more of them. To
address these issues, we built a Web application5 that allows users
to request missing article recommendations for several language
pairs. In order to make the tool useful for new editors without an
edit history and to allow existing editors to explore different inter-
ests, we prompt users for a seed article. The topic vector for the
seed article is used analogously to the user's interest vector and
is used to generate personalized recommendations as described in
Sec. 2.3.1. Fig. 13 shows the relevant missing articles generated by
the application for a user interested in translating articles on GE-
NETICS from English to Romanian.
Incentives to contribute. As part of this research we did not test
for the impact of different incentive mechanisms. The only in-
centivizing information participants received was that the recom-
mended articles were important and missing in their language. Fu-
ture research on the effect of different incentive mechanisms and
how much they can increase or sustain the observed boost in the
article creation rate is a promising direction.
5http://recommend.wmflabs.org
Figure 12: Box plots for the number of page views received
in the first three months after creation for articles created due
to a recommendation (C1/C2) and for all other French articles
created in the month after the start of the experiment (Other).
Summary
based on a recommendation attract more than twice as many page
views as organically created articles.
4.2.4
In conclusion, personalized recommendations from our system
constitute an effective means of accelerating the rate at which im-
portant missing articles are created in a given target language. The
chance of an article recommended via personalization being cre-
ated is three times that of a similar article being created organically.
Further, personalizing recommendations to the emailed editor adds
significant value over sending randomly selected recommendations
via email, in terms of both article creation rate and editor engage-
ment. Finally, the articles created in response to our targeted rec-
ommendations are less likely to be deleted than average articles,
are viewed more frequently, and are of comparable quality.
5. DISCUSSION AND RELATED WORK
Each Wikipedia language edition, large or small, contains signif-
icant amounts of information not available in any other language [8,
The measure of importance. In this work we rank the missing
articles with respect to their predicted page views once they are
created. However, it is debatable whether page views should be
used as the sole measure of importance. For example, an article
which is predicted to be widely read in a language may not meet
the requirements for notability [26] in that language project even if
the article exists in one or more other languages. This is because
the notability policies and practices are sometimes different in dif-
ferent Wikipedia language projects. Using notability as a substitute
for predicted page views has the limitation that building a good
training set is hard. Although many articles have been deleted from
Wikipedia due to the lack of their notability, this is not the only
reason for deletion and not all articles that are still in Wikipedia are
notable. Research in identifying better measures of importance for
article ranking can improve the quality of the recommendations.
Language imperialism and translation. An editor contacted in
the experiment described recommending translations from English
to French as an act of "language imperialism". Providing only En-
glish as a source language would imply that all concepts worth
translating are contained in English Wikipedia, that only non-English
Wikipedias need to be augmented by translation, and that out of all
Wikipedia articles that cover a concept, only the English version
should be propagated. A related concern is that different Wiki-
pedia language editions cover the same concepts very differently
[13] and that fully translated articles may fail to contain important
information relevant to a particular language community. A ma-
jor advantage of computer-supported human translation over the
current state-of-the-art in machine translation is that human trans-
lators who understand the culture of the target language can alter
the source where appropriate. An interesting avenue of further re-
search would be to compare the cultural differences expressed in
the initial version as well as the revisions of translated articles with
their source texts.
Knowledge gaps. In this work we focused on missing articles that
are available in one language but missing in another. There are
multiple directions in which future research can expand this work
by focusing on other types of missing content. For example, an ar-
ticle may exist in two languages, but one of the articles may be
more complete and could be used to enhance the other. Given
a method of determining such differences, our system could eas-
ily be extended to the task of recommending articles for enhance-
ment. Alternatively, there may be information that is not available
in any Wikipedia language edition, but is available on the web. The
TREC KBA research track [9] has focused on this specific aspect,
though their focus is not limited to Wikipedia. By personalizing the
methodologies developed by TREC KBA research one could help
identify and address more knowledge gaps in Wikipedia.
6. CONCLUSION
In this paper we developed an end-to-end system for reducing
knowledge gaps in Wikipedia by recommending articles for cre-
ation. Our system involves identifying missing articles, ranking
those articles according to their importance, and recommending
important missing articles to editors based on their interests. We
empirically validated our proposed system by running a large-scale
controlled experiment involving 12K French Wikipedia editors. We
demonstrated that personalized article recommendations are an ef-
fective way of increasing the creation rate of important articles in
Wikipedia. We also showed that personalized recommendations
increase editor engagement and publication rates. Compared to
organically created articles, articles created in response to a rec-
ommendation display lower deletion rates, more page views and
comparable quality,
In summary, our paper makes contributions to the research on
increasing content coverage in Wikipedia and presents a system
that leads to more engaged editors and faster growth of Wikipedia
with no effect on its quality. We hope that future work will build
on our results to reduce the gaps of knowledge in Wikipedia.
Acknowledgements. The authors would like to thank Dario Taraborelli
for fruitful discussions, the Wikimedia Foundation Language Engineering
team for technical support prior, and the French Wikipedia community for
their engagement. This research has been supported in part by NSF CNS-
1010921, IIS-1149837, NIH BD2K, NIH R01GM107340, ARO MURI,
DARPA XDATA, DARPA SIMPLEX, Stanford Data Science Initiative, Boe-
ing, SAP, and Volkswagen.
7. REFERENCES
[1] P. Adams and F. Fleck. Bridging the language divide in
health. Bulletin of the World Health Organization,
93(6):356–366, 2015.
[2] E. Adar, M. Skinner, and D. S. Weld. Information arbitrage
across multi-lingual Wikipedia. In WSDM, 2009.
[3] P. Bao, B. Hecht, S. Carton, M. Quaderi, M. Horn, and
D. Gergle. Omnipedia: Bridging the Wikipedia language
gap. In CHI, 2012.
[4] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent Dirichlet
allocation. J. Mach. Learn. Res., 3:993–1022, 2003.
[5] L. Breiman. Random forests. Machine Learning, 45(1):5–32,
2001.
[6] D. Cosley, D. Frankowski, L. Terveen, and J. Riedl.
SuggestBot: Using intelligent task routing to help people
find work in Wikipedia. In IUI, 2007.
[7] J. Edmonds. Maximum matching and a polyhedron with
0,1-vertices. J. Res. Nat. Bur. Standards B, 69:125–130,
1965.
[8] E. Filatova. Multilingual Wikipedia, summarization, and
information trustworthiness. In SIGIR Workshop on
Information Access in a Multilingual World, 2009.
[9] J. R. Frank, D. A. Max Kleiman-Weiner, N. Feng, C. Zhang,
C. Ré, and S. I. Building an entity-centric stream filtering
test collection for TREC 2012. In TREC, 2012.
[10] D. Geiger and M. Schader. Personalized task
recommendation in crowdsourcing information systems:
Current state of the art. Decision Support Systems, 65:3–16,
2014.
[11] S. A. Hale. Multilinguals and Wikipedia editing. In WebSci,
2014.
[12] A. Halfaker and M. Warncke-Wang. Wikiclass, 2015.
https://github.com/wiki-ai/wikiclass.
[13] B. Hecht and D. Gergle. The tower of Babel meets Web 2.0:
User-generated content and its applications in a multilingual
context. In CHI, 2010.
[14] T. Langel. UA Parser, 2015.
https://github.com/tobie/ua-parser.
[15] M. Manske. Not in the other language. https://tools.
wmflabs.org/not-in-the-other-language/.
[16] MediaWiki. Content translation, 2015. https:
//www.mediawiki.org/wiki/Content_translation.
[17] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel,
B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss,
V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau,
M. Brucher, M. Perrot, and E. Duchesnay. Scikit-learn:
dia, chosen a French title for the recommended missing article, and
started translating their first section. This makes determining if an
editor became active in response to the recommendation email easy
if they used the tool. A complicating factor is that there were 39 ed-
itors who published a recommended translation (as captured by the
publicly available edit logs) but did not engage with the translation
tool at all. We also consider these editors to be active.
Counting articles created organically. To determine the organic
creation rate of article group A3, we need to determine which newly
created French articles previously existed in English, and divide by
the number of articles that previously existed only in English and
not in French. We observe that, within one month of being cre-
ated, nearly all new French articles (92%) were linked to Wikidata,
so to determine if a new article had an English version, we may
simply check if the respective Wikidata concept had an English ar-
ticle associated with it. 62% of the new French articles meet this
criterion. Further, since many newly created articles are spam and
quickly deleted, we only consider articles that have persisted for at
least one month. This defines the 324 articles created organically
in condition C3 (Table 4).
Machine learning in Python. J. of Mach. Learn. Res.,
12:2825–2830, 2011.
[18] R. Rehurek and P. Sojka. Software framework for topic
modelling with large corpora. In LREC Workshop on New
Challenges for NLP Frameworks, 2010.
[19] M. Warncke-Wang, D. Cosley, and J. Riedl. Tell me more:
An actionable quality model for Wikipedia. In WikiSym,
2013.
[20] Wikidata, 2015. https:
//www.wikidata.org/wiki/Wikidata:Main_Page.
[21] Wikipedia. Babel template, 2015.
https://en.wikipedia.org/wiki/Wikipedia:Babel.
[22] Wikipedia. Importance assessments, 2015. https:
//en.wikipedia.org/wiki/Wikipedia:WikiProject_
Wikipedia/Assessment#Importance_assessment.
[23] Wikipedia. List of articles every wikipedia should have,
2015. https://meta.wikimedia.org/wiki/List_of_
articles_every_Wikipedia_should_have.
[24] Wikipedia. List of Wikipedias. Website, 2015. https:
//meta.wikimedia.org/wiki/List_of_Wikipedias.
[25] Wikipedia. Quality assessments, 2015. https:
//en.wikipedia.org/wiki/Wikipedia:WikiProject_
Wikipedia/Assessment#Quality_assessments.
[26] Wikipedia. Wikipedia:Notability, 2015. https:
//en.wikipedia.org/wiki/Wikipedia:Notability.
[27] E. Wulczyn, R. West, and L. Zia. Project website.
https://meta.wikimedia.org/wiki/Research:
Increasing_article_coverage.
[28] C.-M. A. Yeung, K. Duh, and M. Nagata. Providing
cross-lingual editing assistance to Wikipedia editors. In
Computational Linguistics and Intelligent Text Processing,
pages 377–389. Springer, 2011.
APPENDIX
A. ONLINE EXPERIMENT:
METHODOLOGICAL DETAILS
A.1 Editor and article selection
Editor selection. Only editors with high proficiency in both En-
glish and French are suitable for translating from English to French.
Editors can explicitly signal their proficiency level in different lan-
guages on their user pages using the Babel template [21]. Editors
of French Wikipedia who signaled high proficiency in English were
included in the experiment. We also included editors who made an
edit in both French and English Wikipedia in the 12 months be-
fore the experiment (regardless of their use of the Babel template),
assuming that these editors would be proficient in both languages.
Since the same editor can have different user names on different
Wikipedias, we use the email addresses associated with user ac-
counts to determine which English and French accounts correspond
to the same editor. We obtained a total of 12,040 editors.
Article selection. We find English articles missing in French us-
ing the method described in Sec. 2.1. We excluded disambigua-
tion pages, very short articles (less than 1,500 bytes of content) and
rarely read articles (less than 1,000 page views in the last 6 months).
A.2 Counting articles created
Counting recommended articles created. The translation tool
starts logging an editor's actions after they have signed into Wikipe-
|
1911.08994 | 1 | 1911 | 2019-11-07T03:23:27 | A Hierarchical Optimizer for Recommendation System Based on Shortest Path Algorithm | [
"cs.SI",
"cs.IR"
] | Top-k Nearest Geosocial Keyword (T-kNGK) query on geosocial network is defined to give users k recommendations based on some keywords and designated spatial range, and can be realized by shortest path algorithms. However, shortest path algorithm cannot provide convincing recommendations, so we design a hierarchical optimizer consisting of classifiers and a constant optimizer to optimize the result by some features of the service providers. | cs.SI | cs |
A Hierarchical Optimizer for Recommendation
System Based on Shortest Path Algorithm
Jiacheng Dai, Zhifeng Jia, Xiaofeng Gao(cid:63), and Guihai Chen
Shanghai Key Laboratory of Scalable Computing and Systems,
Department of Computer Science and Engineering, Shanghai Jiao Tong University,
{daijiacheng,fergusjia}@sjtu.edu.cn, {gao-xf,gchen}@cs.sjtu.edu.cn
Shanghai 200240, China
Abstract. Top-k Nearest Geosocial Keyword (T-kNGK) query on geoso-
cial network is defined to give users k recommendations based on some
keywords and designated spatial range, and can be realized by short-
est path algorithms. However, shortest path algorithm cannot provide
convincing recommendations, so we design a hierarchical optimizer con-
sisting of classifiers and a constant optimizer to optimize the result by
some features of the service providers.
Keywords: Geosocial Network · Keyword query · Spatial Query.
1 Problem Statement
Top-k Nearest Geosocial Keyword Search Query (T-kNGK) works on a geosocial
network. A T-kNGK query's task is to recommend k service providers (SP's)
that best meet the user's requirement (keywords and location). Shortest path
algorithms are used to solve this problem. We simply take the length of the
shortest path between user u and SP v as the basis for recommendation. A
geosocial network [1] is a weighted undirected graph G = (V, E, W, K, L). We
give a simple instance Figure 1 to illustrate its structure and contents. The weight
of an edge shows the intimacy between users or rating for SPs (mapped to [0, 1]).
Each SP v has a keyword set kv ∈ K and location lv ∈ L. The process of a T-
kNGK query is shown in Figure 2 (together with the Hierarchical Optimizer).
The defect of T-kNGK query is that it seems to be unconvincing since it only
references one comment (one path) due to shortest path algorithm. Therefore,
we should optimize the results of T-kNGK query to enhance reliability and avoid
extreme bad cases.
2 Hierarchical Optimizer
Constant Optimizer We try to let the SP's with more comments get higher
score and reduce the score of SP's who have few comments. We define multiplier
α to calculate the new score Scorec. αsi = 1 + 1
average−min1≤j≤n{countsj } )γ
β (
countsi−average
when countsi < average and αsi = 1 + 1
max1≤j≤n{countsj }−average )γ when
β (
countsi ≥ average, where average =
, β and γ are adjustable pa-
rameters and countsi is the number of comments of SP si. Finally, Scorec =
αsi × ratingsi.
(cid:63) Xiaofeng Gao is the corresponding author.
countsi−average
n
Σn
j=1countsj
2
J. Dai et al.
Fig. 1. An instance of geosocial network
Fig. 2. The optimized T-kNGK query
Rank Classifier We defined four features to train a classifier which ranks the
SP's from 1 to 5: "Matched Keyword Ratio" Ratiom =
, "Specific Key-
kq∩ksi
kq
, "Count of Ratings" Countsi , "Average Score"
word Ratio" Ratios =
Scoreavgsi
.
kq∩ksi
ksi
In the Hierarchical Optimzer, we first use Rank Classifier to rank the SP's
we get from the shortest path algorithm and sort them by their rank. Then we
use Constant Optimizer to calculate Scorec and sort the SP's of the same rank
by Scorec. Thus, we got the optimized results.
3 Experiments and Results
We use Yelp dataset (over 3 GB and has over 6.5 million reviews) which contains
all the data we need in the T-kNGK query and the hierarchical optimizer. For
Constant Optimizer, we set β = 5 and γ = 2. For Rank Classifier, we choose
random forest with accuracy of 82%. We use 80% of the data to train the model
and 20% to test the model. First, we run shortest path algorithm on the geoso-
cial network built on Yelp dataset and get some raw result. Then we use our
Hierarchical Optimizer to re-order the raw results and get ideal result. One of
our optimized result is shown in Figure 3.
Fig. 3. The result of optimization
Acknowledgments. This work was supported by the National Key R&D
Program of China [2018YFB1004703]; the National Natural Science Founda-
tion of China [61872238, 61672353]; the Shanghai Science and Technology Fund
[17510740200]; the Huawei Innovation Research Program [HO2018085286]; the
State Key Laboratory of Air Traffic Management System and Technology [SKLAT
M20180X]; and the Tencent Social Ads Rhino-Bird Focused Research Program.
References
1. Y. Sun, N. Pasumarthy, and M. Sarwat, On Evaluating Social Proximity-Aware
Spatial Range Queries, in IEEE International Conference on Mobile Data Man-
agement (MDM), KAIST, Taejeon, South Korea, 2017, pp. 7281.
|
1110.2724 | 1 | 1110 | 2011-10-12T18:11:16 | Information Transfer in Social Media | [
"cs.SI",
"physics.soc-ph",
"stat.AP"
] | Recent research has explored the increasingly important role of social media by examining the dynamics of individual and group behavior, characterizing patterns of information diffusion, and identifying influential individuals. In this paper we suggest a measure of causal relationships between nodes based on the information-theoretic notion of transfer entropy, or information transfer. This theoretically grounded measure is based on dynamic information, captures fine-grain notions of influence, and admits a natural, predictive interpretation. Causal networks inferred by transfer entropy can differ significantly from static friendship networks because most friendship links are not useful for predicting future dynamics. We demonstrate through analysis of synthetic and real-world data that transfer entropy reveals meaningful hidden network structures. In addition to altering our notion of who is influential, transfer entropy allows us to differentiate between weak influence over large groups and strong influence over small groups. | cs.SI | cs |
Information Transfer in Social Media
Greg Ver Steeg and Aram Galstyan∗
USC Information Sciences Institute,Marina del Rey, CA 90292
(Dated: December 20, 2013)
Recent research has explored the increasingly important role of social media by examining the
dynamics of individual and group behavior, characterizing patterns of information diffusion, and
identifying influential individuals. In this paper we suggest a measure of causal relationships between
nodes based on the information–theoretic notion of transfer entropy, or information transfer. This
theoretically grounded measure is based on dynamic information, captures fine–grain notions of
influence, and admits a natural, predictive interpretation. Causal networks inferred by transfer
entropy can differ significantly from static friendship networks because most friendship links are not
useful for predicting future dynamics. We demonstrate through analysis of synthetic and real–world
data that transfer entropy reveals meaningful hidden network structures. In addition to altering our
notion of who is influential, transfer entropy allows us to differentiate between weak influence over
large groups and strong influence over small groups.
I.
INTRODUCTION
Recent years have witnessed an explosive growth of
various social media sites such as online social networks,
discussion forums and message boards, and inter-linked
blogs. For researchers, social media serves as a fertile
ground for examining social interactions on an unprece-
dented scale [4]. One important problem is the charac-
terization and identification of influentials, which can be
defined as users who influence the behavior of large num-
bers of other users. Recent work on influence propaga-
tion has used numerous characterizations of influentials
based on topological centrality measures such as Pager-
ank score [8, 11]. To characterize influence in Twitter, re-
searchers have suggested number of followers, mentions,
and retweets [5], and Pagerank of follower network [9].
It has been observed, however, that the purely structural
measures of influence can be misleading [6] and high pop-
ularity does not necessarily imply high influence [14, 16].
More recent work has used the size of the cascade trees [1]
and influence–passivity score [14]. One serious drawback
of existing methods is that they are based on explicit
causal knowledge (i.e., A responds to B), whereas for
many data sets such knowledge is not available and needs
to be discovered.
Here we suggest a model–free approach to uncover-
ing causal relationships and identifying influential users
based on their capacity to predict the behavior of other
users, through the information-theoretic notion of trans-
fer entropy, interchangeably referred to as information
transfer.
In a nutshell, transfer entropy between two
stochastic processes characterizes the reduction of un-
certainty in one process due to the knowledge of the
other process; a mathematical definition is given below.
Transfer entropy can be thought of as a nonlinear gen-
eralization of Granger causality [3], and has been used
extensively in computational neuroscience, e.g., for ex-
amining causal relationships in cortical neurons [7]. In
contrast to other correlation measures such as mutual
information, transfer entropy is asymmetric and allows
differentiation in the direction of information flow. Fur-
thermore, whereas most existing studies are concerned
with aggregate measures of influence, the approach out-
lined here allows more fine–grained analysis of informa-
tion diffusion by analyzing information transfer on each
existing link in the network. Finally, our approach is
model-free. Information–theoretic measures allow us to
statistically characterize our uncertainty without making
assumptions about human behavior.
The rest of this paper is organized as follows. We
begin by describing the basic intuition and mathemat-
ics behind the information transfer, and briefly mention
computational issues of the approach. In Section III A we
present results of our simulation with synthetically gen-
erated data, where we thoroughly examine how the infor-
mation transfer depends on various characteristics of the
data generating process. In Section III B we present our
results on real-world data extracted from user activities
on Twitter. We conclude the paper by discussing results
and some future work in Section IV.
II. TRANSFER ENTROPY
A. Notation
For each user, X , we record the history of activity,
e.g., timing of tweets, as a sequence of times as SX =
{tj : 0 < t1 < t2 . . .}. In general, we assume each user’s
activity is described by some stochastic point process.
We are limited by finite data to consider finite temporal
(cid:26) 1 if ∃tj ∈ SX ∩ (b, a],
resolution, so we introduce the binned random variable,
0 otherwise.
BX (a, b) ≡
(1)
∗ {gregv,galstyan}@isi.edu
If we observe the actions of a user for some long period
of time T , we can define probabilities over these coarse-
(cid:90) T
grained variables. Fix δ ∈ R, then
δ
P (BX (t, t − δ) = Xt ) ≡ 1
T − δ
dt[Bi (t, t − δ) = Xt ]
Similarly, we could define a joint probability distribution
over a sequence of adjacent bins,
P (BX (t, t − δ0 ) = Xt , BX (t − δ0 , t − δ0 − δ1 ) = Xt−1 , . . .),
with widths δ0 , δ1 , . . . , δk ∈ R. We will omit the binning
function for succinctness, P (Xt , Xt−1 , . . . , Xt−k ). We can
write this even more compactly by defining X (t−k)
≡
{Xt , . . . , Xt−k }.
t
The dynamics of a user may depend on users they
are linked to in some unknown, arbitrary way. There-
fore, for two users X and Y , with activities recorded by
SX , SY , we define a joint probability distribution using
a common set of bins denoted with widths δ0 , δ1 , . . . as
, Y (t−k)
P (X (t−k)
). Conditional and marginal probability
t
t
distributions are defined in the usual way and we use the
standard definition for conditional entropy for discrete
H (AB ) = − (cid:88)
random variables A, B distributed according to P (A, B ),
P (A, B ) log P (AB ).
A,B
B. Definition of transfer entropy
The transfer entropy introduced in [15] is defined as
, X (t−l)
) − H (Yt Y (t−k)
TX→Y = H (Yt Y (t−k)
t−1
t−1
t−1 )
(2)
The first term represents our uncertainty about Yt given
Y ’s history only. The second term represents the smaller
uncertainty when we know X ’s history as well. Thus,
transfer entropy explicitly describes the reduction of un-
certainty in Yt due to knowledge of X ’s recent activity.
Note that information transfer is asymmetric, as opposed
to mutual information, and thus better suited for char-
acterizing directed information transfer. For simplicity,
we take l = k from here on.
C. Sampling problems and solutions
The use of information–theoretic techniques to analyze
real-world point processes has been studied almost exclu-
sively in the context of neural activity[17]. Therefore, it
is in this literature that the problems associated with
estimating entropies for sparse point process data have
been explored most thoroughly. The fundamental prob-
lem is that, in the absence of sufficient data, estimating
entropies from probability distributions based on binned
frequencies leads to systematic bias [13]. Intuitively, if
we have k bins of history then we need O(2k ) pieces of
data in order to sample all possible histories.
2
A variety of remedies are available and we make use
of several. The most obvious solution is to restrict our-
selves to situations where we have adequate data. In the
subsequent analysis, we filter out users that are below a
certain activity level. In practice, however, raising our
activity threshold high enough to guarantee convergence
of entropies would eliminate almost all users from our
dataset.
The next remedy to apply is to estimate the average
magnitude of the systematic bias that results from using
sparse data and subtract it from our estimate. When
we calculate the entropies in Eq. 2, we subtract out the
Panzeri-Treves bias estimate[12]. Fig. 2 illustrates the
effect of this bias correction as a function of amount of
data collected.
The definition in Eq. 2 implicitly depends on bin
widths specified by the δi ’s. The simplest procedure, and
the one taken in the neural spike train literature, is to set
all the bins to have equal width. We have a great deal of
pre-existing empirical knowledge about human activity
that can help us improve on this method. Many studies
have shown that humans exhibit a heavy tail in the dis-
tribution of their response times to communications[2].
This implies that bins accounting for recent activity
should be narrower while bins accounting for older ac-
tivity can be wider. We can even base these bin widths
on measured response times, if such data is available. Us-
ing more informative bins means we can use fewer bins,
reducing the effect of sampling problems.
A final technique to reduce bias is discussed in [17]
and uses a class of binless entropy estimators. These
techniques carry their own mathematical difficulties and
we will not consider them here. With these tools in hand,
we can proceed to use information transfer to analyze
user activity in social media.
III. RESULTS
In this section we report the results of our experiments
with both synthetic data and real world data from Twit-
ter. The ultimate goal is to infer information transfer
between agents in the network by analyzing their pat-
terns of activity. Patterns of activity could include many
things including timing, content, and medium of mes-
sages. We focus only on the timing of activity on Twitter
(tweeting of URLs). In principle, our analysis could be
extended to include more complex information, but, as
discussed, this would require either more data or better
methods for dealing with sparse data.
We test and validate our ability to infer information
transfer from patterns of activity in two ways. First,
while our information–theoretic analysis of social net-
work data uses only timing of activity, the data includes
unique identifiers allowing us to track the flow of informa-
tion through the network. On Twitter, we track specific
URLs. We can use the spread of these trackable pieces
of information to confirm that the information transfer
inferred solely from the timing of activity corresponds to
actual exchanges of information.
For the synthetic data, we dictate that an agent’s ac-
tivity depends on its neighbors’ activity in some fixed
way. This allows us to check how well information trans-
fer recovers the hidden dependence structure from activ-
ity patterns alone. For instance, even without knowing
anything about the network structure, we find that a
sufficient amount of data allows perfect reconstruction of
the underlying network.
A. Experiments with synthetic data
To form a better understanding of different factors im-
pacting information transfer, we performed extensive ex-
periments with synthetically generated data. Ideally, we
would like our synthetic data to reflect, in a tunable way,
the challenges we face with real world data. These chal-
lenges include a long tail for human response times, het-
erogeneous response to neighbors’ activity, background
noise affecting node dynamics, incorrect data, and insuf-
ficient data. We explore these challenges first for a pair
of nodes, and then for an entire network.
We model user activity as a coupled, non-homogeneous
Poisson point process. Suppose that we have two nodes
and a single link from X → Y . We can characterize Y ’s
activity in terms of a time-dependent rate. We define
(cid:88)
X ≡ SX ∩ [0, t), that is, the activity for X until time t.
S t
g(t − ti )
λY (tS t
X ) = µ + γ
ti∈S t
X
(3)
The first term, µ, represents a constant rate of back-
ground activity. The second term represents a time-
dependent increase in the rate of activity in response
to activity from a neighbor. The strength of influence
of X is parametrized by γ . In practice, we will set the
background rate equal to a constant and vary the rela-
(cid:16) 1 hour
(cid:17)3
tive strength γ /µ through the parameter γ . The time
dependence of the influence is captured by the function
g . We set g(∆t) = min(1,
) to reflect the ob-
∆t
served fact that the distribution of human response times
are characterized by a long tail[2].
Along with a causal network, Eq. 3 defines a genera-
tive model for point process activity. We can efficiently
generate activity according to this model using the thin-
ning method discussed in [10]. We vary the total amount
of data by fixing the background rate µ = 1 event/day
and varying the total amount of observation time, T .
Equivalently, we could have fixed T and varied the rate
of activity. After fixing the parameters, we can gener-
ate data and then use that data to infer the appropriate
probabilities to calculate information transfer according
to Eq. 2.
As discussed in Sec. II C, we take a variety of measures
to ensure good estimation. In this case, we directly con-
trol the amount of data through the parameter T . For
3
the bin widths we choose δ0 = 1 sec, fixing the finest
temporal resolution. For the history we choose wider bin
widths for less recent history. In the synthetic examples
we take the past three hours of history into account by
choosing δ1 = 1 hour, δ2 = 2 hours. Also, it should be
assumed that the Panzeri-Treves bias estimate has been
taken into account, except in Fig. 2(a) where we compare
results without bias correction.
FIG. 1: If we have influence from X → Y but not vice versa,
the asymmetry in the information transfer correctly reflects
the direction of influence. Information transfer plotted for a
single pair of users.
Note that in the example in Eq. 3, we have allowed X
to affect Y , but not vice versa. As a first test we can
generate some data for a pair of users and then compare
TX→Y and TY →X . In Fig. 1, we compare these two quan-
tities when γ /µ = 2 as a function of the total observation
time T .
In Fig. 2 we examine the accuracy and convergence of
information transfer estimates as a function of time both
with and without bias correction. We ran 200 trials and
plot the mean and standard deviation of the information
transfer estimate at each time step. Clearly, there is a
systematically high estimate in the low sampling regime,
but, even in that case, higher influence leads to a higher
information transfer on average. The Panzeri-Treves bias
correction drastically reduces, but does not completely
eliminate, this systematic error.
Next, we consider the same scenario, where we gen-
erate X, Y according some stochastic process, but now
imagine that we do not see all activity. That is, what
if we do not see every event due to limited sampling?
This is often the case, for instance, with Twitter data,
where researchers typically have access to only a small
fraction of all tweets, ranging from 1% − 20%. So we set
a sampling parameter f , and say that for each ti ∈ SX ,
we only keep that event with probability f . A summary
of how the final transfer entropy, TY →X , depends on the
sampling rate, f , is given in Fig. 3. We show the results
after 500 days to guarantee enough data to be very close
to convergence. We see that sampling drastically reduces
the inferred transfer entropy, destroying our ability to de-
duce flow of information.
So far, we have only considered two nodes with a single
link between them. Now, we want to consider a directed,
causal network of N nodes, with some arbitrary connec-
4
FIG. 4: Each row represents a different user. Each line repre-
sents an event for that user over a time period of thirty days.
With enough data we could calculate the information transfer
between each pair of users and recover the unknown network
structure exactly.
pick some threshold T0 , and if TX→Y > T0 , we con-
sider there to be an edge from X → Y , otherwise not.
We could check our true positive rate and false posi-
tive rate as a function of T0 , as shown in Fig. 5(a), for
N = 20, γ /µ = 1.0 and time = 450 days. We show an ex-
ample of the recovered versus actual network in Fig. 5(b),
using a threshold picked according to F-measure.
The previous example was chosen to show what kinds
of errors arise given a weak signal. In general, with either
enough data or strong enough influence, we can perfectly
recover the underlying graph structure. If we consider the
area under the ROC curve (AUC), as in Fig. 5(a), then
an AUC of 1 corresponds to perfect reconstruction of the
graph. We summarize the AUCs for random networks
with N = 20 and (cid:104)k(cid:105) = 3, while varying T and γ /µ in
Fig. 6.
As a final experiment, we can consider the effect of al-
lowing different γ between different pairs of nodes. Fig. 7
shows that transfer entropy is able to recover the relative
influence well.
In principle, there are many other effects we could
have considered to make a more realistic synthetic model.
Background and influence rates should vary for different
individuals. There may be periodicity defined by daily,
weekly, and monthly cycles. However, because informa-
tion transfer makes no model assumptions, it is relatively
insensitive to such details. The main constraint is data,
which is why we focused on sensitivity to amount and
quality of observations.
B. Results for Twitter dataset
(a)
(b)
FIG. 2: Mean and std for the estimate of information transfer
averaging over 200 pairs of users with γ /µ = 0, 2 as a function
of time. (a) Results without correcting for bias and (b) with
Panzeri-Treves bias correction[12].
FIG. 3: A summary of the mean and std of the inferred value
of TY →X averaged over 200 trials as a function of the sampling
rate, with T = 500 days and γ /µ = 2.
tivity pattern. We consider a similar stochastic model
as defined in Eq. 3, except now we denote the set of Y ’s
(cid:88)
(cid:88)
neighbors (i.e., people who can influence Y ) as N (Y ).
λY (tS tN (Y ) ) = µ +
g(t − ti )
X ∈N (Y )
ti∈S t
X
γX
(4)
To begin we imagine γX = γ for all neighbors, but in
general a node may be affected more strongly by some
neighbors than others. A sample of activity generated
according to this model is given in Fig. 4.
The challenge is to take the information given by the
activity and recover the underlying graph structure. For
each pair of nodes, X, Y , we calculate TX→Y . Then we
Twitter is a popular micro-blogging service. As of July
2011, users send 200 million tweets per day. Twitter has
become an important tool for researchers both due to
the volume of activity and because of the easily available
tools for data collection. Twitter’s “Gardenhose” API,
allows access to 20% − 30% of all tweets.
Unfortunately, as discussed in Sec. III A, filtering of
105010015020002.(cid:180)10(cid:45)64.(cid:180)10(cid:45)66.(cid:180)10(cid:45)68.(cid:180)10(cid:45)60.00001TimedaysInformationTransferΓΜ(cid:61)2ΓΜ(cid:61)0105010015020002.(cid:180)10(cid:45)64.(cid:180)10(cid:45)66.(cid:180)10(cid:45)68.(cid:180)10(cid:45)60.00001TimedaysInformationTransferΓΜ(cid:61)2ΓΜ(cid:61)0525507510002.(cid:180)10(cid:45)74.(cid:180)10(cid:45)76.(cid:180)10(cid:45)78.(cid:180)10(cid:45)71.(cid:180)10(cid:45)61.2(cid:180)10(cid:45)6Samplingrate(cid:37)InformationTransfer5
FIG. 7: Information transfer between pairs of nodes for vary-
ing γ /µ with T = 500 days. The black line corresponds to the
mean information transfer for a given γ /µ and the shaded re-
gion denotes the standard deviation after 100 trials.
who tweeted a URL in the three week collection period.
The data we used was collected in the fall of 2010 [6].
The dataset included about 70 thousand distinct URLs,
3.5 million tweets, and 800 thousand users. We further
filtered our results to “very active” users, namely, users
who tweeted at least 10 URLs during this time period.
Before we can calculate transfer entropy as presented
in Eq. 2, we need to specify the relevant bin widths. We
take the finest resolution to be δ0 = 1 second, the same
resolution as presented by the Twitter API. For binning
of the history, we used distribution of observed re-tweet
response times to motivate a choice of δ1 = 10 min, δ2 =
2 hours, δ3 = 24 hours. Although we saw a long tail of
re-tweet times stretching into days, our data were insuffi-
cient to include this weak effect. By limiting ourselves to
only three bins, we only have to sample over 8 possible
histories. Note that the activity is for any tweeting of
URLs; our calculations do not make use of the informa-
tion encoded in the URL. We then calculate the transfer
entropy between each pair of users who are connected.
The result of this procedure is the construction of a
directed, weighted graph, where each edge in the original
directed graph is now labeled by the calculated transfer
entropy. We can now compare standard measures of in-
fluence to measures based on this weighted graph. The
simplest measure of influence on static graphs is to count
the number of followers a user has. This ignores the fact
that not all followers are the same, nor do followers re-
act in the same way to different people that they follow.
For instance, it may be that a recommendation from a
close friend is worth more to a person than the same
recommendation from five acquaintances. This problem
is only exacerbated by the recent emergence of “follow-
ers for pay” services, which seek to artificially inflate the
number of followers to your Twitter account. In Fig. 8,
we explore the comparison between out degree and trans-
fer entropy and we find that although on average people
with more followers have more transfer entropy, two peo-
ple with the same number of followers may have vastly
different influence as measured by transfer entropy.
To verify that transfer entropy is a meaningful quan-
tity, we could test how well the transfer entropy, based
(a)
(b)
(a) ROC curve and (b) transfer–entropy induced
FIG. 5:
graph for the synthetically generated data described in the
text. Threshold is chosen according to F-measure. Black
solid lines correspond to true positives, red dashed lines to
false positives and blue dotted lines to false negatives.
FIG. 6: AUC of the network inferred using transfer entropy
as a function of T , with γ /µ = 2, 4.
data can lead to a drastic reduction in the measured in-
formation transfer.
Instead, the Gardenhose API was
used to identify URLs being tweeted. Then, the search
API was used to find all mentions of these URLs in any
tweets by any users. In this way, the filtering limitation
is avoided, while we restrict ourselves to the domain of
URL posting. Additionally, each URL corresponds to a
unique piece of information whose movement through the
network can be traced. The data also includes the full
social network among “active users”, in this case, anyone
0501001502002503003500.750.800.850.900.951.00DaysAUC(cid:224)ΓΜ(cid:61)4(cid:230)ΓΜ(cid:61)20.00.51.01.52.02.53.03.505.(cid:180)10(cid:45)71.(cid:180)10(cid:45)61.5(cid:180)10(cid:45)62.(cid:180)10(cid:45)62.5(cid:180)10(cid:45)63.(cid:180)10(cid:45)6ΓΜInformationTransferduplicate accounts. Many of the accounts on this list
have since been banned by Twitter.
6
User
Free2BurnMusic
Earn Cash Today
BuzTweet com
Free2Burn
Kamagra drug2
sougolinkjp
kcal bot
nr1topforex
wpthemeworld
viagrakusurida
BoogieFonzareli
A tango
Kamagra drug2
dti affiliate
Best of Deals
viagrakusurida
kcal bot
kamagra 100mg3
viagra drug
kcal bot
Follower
Free2Burn
income ideas
scate
Free2BurnMusic
sogradrug3
sogolinksite
FF kcal bot
nr1forexmoney
wpthememarket
viagrakusuride
Nyce Hunnies
kobuntango
sogra drug3
kekkonjyoho
Orbilook SMI
kamagra 100mg3
Family Mart
viagrakusuride
baiagura drug
Seven Eleven
I.T.(·10−6 )
4328
1159
1006
939
929
903
902
795
709
679
668
662
638
630
621
561
542
535
532
530
TABLE I: List of edges with highest information transfer. All
are promotion accounts and many of the accounts have been
banned since the data were collected.
To see more complex examples, we restrict ourselves
to the top 1000 edges according to information trans-
fer. Then we look at the largest connected compo-
nents. The largest component involved 600 users in
Brazil, most of whom had multiple tweets of the form
“BOMBE O SEU TWITTER, COM MILHARES DE
NOVOS FOLLOWERS, ATRAVES DO SITE: http://?
#QueroSeguidores”, where “?” was a frequently chang-
ing URL. Google translates this as “Pump up your Twit-
ter, get thousands of new followers,
link to this site:
http://? #IWantFollowers.” Clicking on some of these
links suggests that this a “followback” service. You agree
to follow previous users who have signed up and in return
other users of the service follow your account. It also ap-
pears from the text that you are required to re-tweet the
link to get your followers. Some other examples of high
information transfer clusters are shown in Fig. 10.
We consider another advantage of measuring influence
through information transfer by looking at two users who
had almost the same outgoing transfer entropy (∼ 0.025,
in the top 20 for individuals in our dataset), but vastly
different behavior of followers. The first Twitter ac-
count is SouljaBoy, a prominent American rapper who
is also very active in social media. The second account
is “silva marina”, the Twitter account of Marina Silva,
a popular Brazilian politician. This data was taken dur-
ing the run up to the Brazilian presidential election, in
which Marina Silva was a candidate; she received 19.4%
of the popular vote. At first it seems surprising that
the SouljaBoy, who has six times the followers, should
have a similar outgoing transfer entropy to a politician
known mostly in one country and with fewer than a mil-
FIG. 8: For each user, we compare the number of their fol-
lowers to their cumulative outgoing transfer entropy. Note
that the outgoing transfer entropy may differ by an order of
magnitude for people with the same number of followers.
only on the timing of activity, matches the measured flow
of information, as determined by tracing specific URLs.
To that end, for each pair of connected users, X → Y ,
we count how many specific URLs were first tweeted by
X and then subsequently re-tweeted by Y . This num-
ber is compared to the transfer entropy in Fig. 9. The
existence of even a weak correlation is surprising consid-
ering the limited amount of data and the fact the transfer
entropy is not making use of URL or re-tweet informa-
tion at all. We also note that while a high number of
re-tweets implies high information transfer, a low num-
ber of re-tweets is uncorrelated with information transfer.
This makes sense because information transfer measures
influence that is not necessarily in the form of re-tweets;
we will give some examples below.
FIG. 9: The number of URLs that were first tweeted by user
X and subsequently tweeted by X’s follower, Y, is correlated
with the calculated transfer entropy between X and Y, even
though transfer entropy is calculated only from the timing of
activity, without regard for specific URLs. Pearson’s correla-
tion coefficient is 0.22.
Table I shows the edges with the highest information
transfer. These accounts are all solely for the purpose of
promotion. Taking the top example, for instance, reveals
that these two accounts will tweet exactly the same mes-
sage within a few seconds of each other. Note that in
the text of their tweets neither account uses re-tweets or
an “@” for attribution. Twitter specifically forbids indis-
criminate automatic re-tweets and has a policy against
7
The strength of Marina Silva’s influence along with the
serendipitous timing before the Brazilian elections sug-
gests another intriguing possibility. It seems likely that
not only does transfer entropy vary for different follow-
ers, it may vary over time as well. This suggests that
a dynamic estimate of information transfer could detect
changes in the importance of individuals in the network.
IV. DISCUSSION
We have presented a novel information–theoretic ap-
proach for measuring influence. In contrast to previous
studied that focused on aggregate measures of influence,
the transfer entropy used here allows us to characterize
and quantify the causal information flow for any pair of
users. For a small number of users, this can allow us to
reconstruct the network of connections from user activity
alone. For large networks, this allows us to identify the
most important links in the network.
The method used here for calculating information
transfer did not require any explicit causal knowledge
in the form of re-tweets or other textual information. On
the one hand, this may be an advantage in situations
where such information is either missing or misleading,
as was the case in the example for marketers on Twit-
ter. On the other hand, we may be neglecting valuable
information, and in the future we would like to incorpo-
rate textual information in more sophisticated ways but
still within an information–theoretic approach. Although
this should be straightforward in principle, in practice
entropy based approaches require large amounts of data.
More complex signals require a commensurate increase
in data. Therefore, the other main thrust of future work
should be towards reducing data required for entropy es-
timation, either through better bias correction or through
binless approaches[17].
Because this measure has a rigorous interpretation in
terms of predictability, it allows us to easily understand
results that might otherwise seem anomalous. For in-
stance, in one example we found that Marina Silva, the
Brazilian presidential candidate, had high information
transfer both to and from a Brazilian news service. Nei-
ther Twitter account ever retweeted or explicitly men-
tioned a tweet of the other. However, there was an ex-
ternal cause, the upcoming debates and elections, that
explains both of their activities. Without knowing this
external cause, it is entirely consistent to say that either
user’s activity could help you predict the others. In fact,
it may be possible to use this bi-directional predictability
to identify external causes in the first place.
Another result that is easy to understand in the con-
text of predictability is the high incidence of “spam” in
our results. This is no surprise since a large amount of
spam is produced by automated systems and these sys-
tems are intrinsically very predictable. Although identi-
fying spam is a natural application of our analysis, some
human behavior stood out as well. Diehard fandom also
(a)
(b)
(c)
FIG. 10: (a) This cluster appears to be non-automated, and
revolves around fandom of singer Justin Bieber. (b) The clus-
ter of drug spam accounts. (c) An account which aggregates
soccer news by following and re-tweeting different regional
soccer accounts.
lion Twitter followers. On the other hand, Fig. 11 re-
veals the reason for this disparity. Marina Silva may
have fewer followers, but her effect on them tended to
be much stronger. Marina Silva’s activity tended to be
a better predictor of her followers’ behavior than Soulja
Boy’s activity was for his followers.
FIG. 11: A histogram showing the probability distribution of
outgoing transfer entropy for followers of two different Twitter
accounts.
00.000010.000020.000030.000040.00.20.40.60.8I.T.toasinglefollowerProbabilitySouljaBoysilva_marinaleads to quite predictable behavior.
Many existing notions of
ill-
influence are static,
defined, ad hoc, or only apply in aggregate. Information
transfer is a rigorously defined, dynamic measure capable
of capturing fine-grain notions of influence and admitting
a straightforward predictive interpretation. Many of the
mathematical techniques necessary have already been de-
veloped in the neuroscience literature and we have shown
how to usefully adapt them to a social media context.
Acknowledgments
8
We would like to thank Armen Allahverdyan for useful
discussions. This research was supported in part by the
National Science Foundation under grant No. 0916534
and US AFOSR MURI grant No. FA9550-10-1-0569.
[1] Eytan Bakshy, Jake M. Hofman, Winter A. Mason, and
Duncan J. Watts. Everyone’s an influencer: quantifying
influence on twitter. In Proc. fourth ACM international
conference on Web search and data mining, WSDM ’11,
pages 65–74, New York, NY, USA, 2011. ACM.
[2] Albert-Laszlo Barab´asi. The origin of bursts and heavy
tails in human dynamics. Nature, 435:207–211, May
2005.
[3] Lionel Barnett, Adam B. Barrett, and Anil K. Seth.
Granger causality and transfer entropy are equivalent
for gaussian variables. Phys. Rev. Lett., 103:238701, Dec
2009.
[4] Claudio Castellano, Santo Fortunato, and Vittorio
Loreto. Statistical physics of social dynamics. Rev. Mod.
Phys., 81(2):591–646, May 2009.
[5] Meeyoung Cha, Hamed Haddadi, Fabrcio Benevenuto,
and Krishna P. Gummadi. Measuring user influence in
twitter: The million follower fallacy. In in ICWSM 10:
Proceedings of international AAAI Conference on We-
blogs and Social, 2010.
[6] Rumi Ghosh and Kristina Lerman. Predicting influential
users in online social networks. In Proc. KDD workshop
on Social Network Analysis (SNAKDD), May 2010.
[7] Boris Gourevitch and Jos J Eggermont. Evaluating in-
formation transfer between auditory cortical neurons. J
Neurophysiol, 97(3):2533–43, 2007.
[8] Glen Jeh and Jennifer Widom. Scaling personalized web
search. In Proceedings of the 12th international confer-
ence on World Wide Web, WWW ’03, pages 271–279,
New York, NY, USA, 2003. ACM.
[9] Haewoon Kwak, Changhyun Lee, Hosung Park, and Sue
Moon. What is twitter, a social network or a news media?
In Proceedings of the 19th international conference on
World wide web, WWW ’10, pages 591–600, New York,
NY, USA, 2010. ACM.
Seismicity analysis through point-
[10] Yosihiko Ogata.
process modeling: A review.
Pure appl. geophys.,
155:471–507, 1999.
[11] Lawrence Page, Sergey Brin, Ra jeev Motwani, and Terry
Winograd. The PageRank Citation Ranking: Bringing
Order to the Web. Technical report, Stanford Digital
Library Technologies Pro ject, 1998.
[12] S. Panzeri and A. Treves. Analytical estimates of limited
sampling biases in different information measures. Net-
work: Computation in Neural Systems, 7:87–107, 1996.
[13] Stefano Panzeri, Riccardo Senatore, Marcelo A. Monte-
murro, and Rasmus S. Petersen. Correcting for the sam-
pling bias problem in spike train information measures.
Journal of Neurophysiology, 98(3):1064–1072, 2007.
[14] Daniel M. Romero, Wo jciech Galuba, Sitaram Asur, and
Bernardo A. Huberman. Influence and passivity in social
media. Social Science Research Network Working Paper
Series, August 2010.
[15] Thomas Schreiber. Measuring information transfer.
Phys. Rev. Lett., 85(2):461–464, Jul 2000.
[16] Greg Ver Steeg and Aram Galstyan. Information transfer
in social media. In Workshop on Information Networks,
Stern School of Business, New York University, 2011.
[17] Jonathan D. Victor. Approaches to information-theoretic
analysis of neural activity. Biological Theory, 1(3):302–
316, 2006.
|
1907.00725 | 1 | 1907 | 2019-06-26T04:16:20 | Social Media-based User Embedding: A Literature Review | [
"cs.SI"
] | Automated representation learning is behind many recent success stories in machine learning. It is often used to transfer knowledge learned from a large dataset (e.g., raw text) to tasks for which only a small number of training examples are available. In this paper, we review recent advance in learning to represent social media users in low-dimensional embeddings. The technology is critical for creating high performance social media-based human traits and behavior models since the ground truth for assessing latent human traits and behavior is often expensive to acquire at a large scale. In this survey, we review typical methods for learning a unified user embeddings from heterogeneous user data (e.g., combines social media texts with images to learn a unified user representation). Finally we point out some current issues and future directions. | cs.SI | cs | Social Media-based User Embedding: A Literature Review
Department of Information Systems,University of Maryland, Baltimore County
Shimei Pan∗ and Tao Ding
{shimei, taoding01}@umbc.edu
9
1
0
2
n
u
J
6
2
]
I
S
.
s
c
[
1
v
5
2
7
0
0
.
7
0
9
1
:
v
i
X
r
a
Abstract
Automated representation learning is behind many
recent success stories in machine learning. It is of-
ten used to transfer knowledge learned from a large
dataset (e.g., raw text) to tasks for which only a
small number of training examples are available.
In this paper, we review recent advance in learning
to represent social media users in low-dimensional
embeddings. The technology is critical for creat-
ing high performance social media-based human
traits and behavior models since the ground truth
for assessing latent human traits and behavior is of-
ten expensive to acquire at a large scale.
In this
survey, we review typical methods for learning a
unified user embeddings from heterogeneous user
data (e.g., combines social media texts with images
to learn a unified user representation). Finally we
point out some current issues and future directions.
1 Introduction
People currently spend a significant amount of time on so-
cial media to express opinions, interact with friends and share
ideas. As a result, social media data contain rich informa-
tion that is indicative of who we are and predictive of our
online or real world behavior. With the recent advent of
big data analytics, social media-based human trait and be-
havioral analytics has increasingly been used to better under-
stand human minds and predict human behavior. Prior re-
search has demonstrated that by analyzing the information
in a user's social media account, we can infer many latent
user characteristics such as political leaning [Pennacchiotti
and Popescu, 2011; Kosinski et al., 2013; Benton et al.,
2016], brand preferences [Pennacchiotti and Popescu, 2011;
Yang et al., 2015], emotions [Kosinski et al., 2013], mental
disorders [De Choudhury et al., 2013], personality [Kosin-
ski et al., 2013; Schwartz et al., 2013; Liu et al., 2016;
Golbeck et al., 2011], substance use [Kosinski et al., 2013;
Ding et al., 2017] and sexual orientation [Kosinski et al.,
2013].
Although social media allow us to easily record a large
amount of user data, the characteristics of social media data
also bring significant challenges to automated data analyt-
ics. For example, the texts and images are unstructured data.
Making sense of unstructured data is always a big challenge.
It is also hard to efficiently search and analyze a large so-
cial graph. Moreover, social media analytics can easily suffer
from the curse of dimensionality problem. If we use the basic
text features such as unigrams or TF*IDF scores as the fea-
tures to represent text, we can easily have hundreds of thou-
sands of text features. Moreover, assessing human traits and
behavior often requires psychometric evaluations or medical
diagnosis, which are expensive to perform at a large scale
(e.g., only trained professionals can provide an accurate as-
sessment on whether someone has substance use disorders or
not). Without proper user feature learning, a machine learn-
ing model can easily overfit the training data and will not gen-
eralize well to new data.
Recent years have seen a surge in methods that automat-
ically encode features in low-dimensional embeddings us-
ing techniques such as dimension reduction and deep learn-
ing [Mikolov et al., 2013; Le and Mikolov, 2014; Bengio et
al., 2013; Grover and Leskovec, 2016; Perozzi et al., 2014].
Representation learning has increasingly become a critical
tool to boost the performance of complex machine learning
applications.
In this paper, we review recent work on au-
tomatically learning user representations from social media
data. Since automated user embedding simultaneously per-
forms latent feature learning and dimension reduction, it can
help downstream tasks to avoid overfitting and boost perfor-
mance.
2 Overview
Here we define social media-based user embedding as the
function that maps raw user features in a high dimensional
space to dense vectors in a low dimensional embedding space.
The learned user embeddings often capture the essential char-
acteristics of individuals on social media. Since they are quite
general, the learned user embeddings can be used to support
diverse downstream user analysis tasks such as user prefer-
ence prediction [Pennacchiotti and Popescu, 2011], person-
ality modeling [Kosinski et al., 2013] and depression detec-
tion [Amir et al., 2017].
Automated user embedding is different from traditional
user feature extraction where a pre-defined set of features is
extracted from data. For example, based on the Linguistic In-
quiry and Word Count (LIWC) dictionary [Pennebaker et al.,
2015], a set of pcycholinguistic features can be extracted from
text. Similarly, a set of egocentric network features such as
degree, size and betweenness centrality can be extracted from
one's social network. The main difference between user em-
bedding and traditional user feature extraction is that in user
embedding, the user features are not pre-defined. They are
latent features automatically learned from data.
Figure 1 shows the typical architecture of a system that
employs automated user embedding for personal traits and
behavior analysis. One or more types of user data are first
extracted from a social media account. For each type of
user data such as text or image, a set of latent user fea-
tures is learned automatically via single-view user embed-
ding (e.g., text-based user embedding and image-based user
embedding). The embeddings learned from different types
of user data (e.g., text embeddings and image embeddings)
are combined to form a single unified user representation via
multi-view user embedding. The output of multi-view user
embedding is then used in subsequent applications to predict
human traits and behavior.
Given the page limit, we define the scope of this survey
quite narrowly to include only embedding methods published
within the last 10 years that have been used to learn user rep-
resentations from social media data. Although very relevant,
We exclude embedding methods that do not learn a repre-
sentation of social media users. For example, we exclude
the papers on learning word embeddings from social media
data [Zeng et al., 2018]. Table 1 lists the papers included in
our survey. We summarize each paper along six dimensions:
Data Type, Single-view Embedding Method, Auxiliary Train-
ing Task, Multi-view Embedding Method, Target Task and
Supervised Tuning.
Figure 1: A Typical System Architecture
3 Single-View User Embedding
Since most papers in table 1 learn user embedding from text,
we focus on text-based user embeddings. We will also discuss
the typical methods used in learning user embeddings from
social networks. Finally, we briefly describe how to learn
user embeddings from other types of social media data such
as likes and images.
3.1 Text-based User Embedding
The goal of text-based user embedding is to map a sequence
of social media posts by the same user into a vector repre-
sentation which captures the essential content and linguistic
style expressed in the text. Here, we focus on methods that do
not require any human annotations such as traditional unsu-
pervised dimension reduction methods (e.g., Latent Dirichlet
Allocation and Single Value Decomposition) or the more re-
cent neural network-based prediction methods.
Latent Dirichlet Allocation (LDA)
LDA is a generative graphical model that allows sets of ob-
servations to be explained by unobserved latent groups. In
natural language processing, LDA is frequently used to learn
a set of topics (latent themes) from a large number of doc-
uments. Several methods can be used to derive a user rep-
resentation based on LDA results:(1)User-LDA which treats
all the posts from each user as a single document and trains
an LDA model to drive the topic distribution for this docu-
ment. The per-document topic distribution is then used as the
representation for this user. (2) Post-LDA which treats each
post as a separate document and trains an LDA model to de-
rive a topic distribution for each post. All the per-post topic
distribution vectors by the same user are aggregated (e.g., by
averaging them) to derive the representation of each user. Ac-
cording to [Ding et al., 2017], Post-LDA often learns better
Among them, Data Type is used to indicate the types of
social media data used in each study. Here, text refers to
user-generated text data (e.g., tweets or status update on Face-
book); like refers to things/people a social media user likes
such as books, celebrities, music, movies, TV shows, pho-
tos and products; user profile includes demographic informa-
tion (gender, age, occupation, relationship status etc.) and
aggregated statistics (the number of friends, followers, fol-
lowings etc.); image includes the profile and background pho-
tos as well as the images shared on social media; social net-
work refers to social connections between different user ac-
counts such as the friendship network on Facebook and the
follower/retweet network on Twitter.
We also list the main methods used in Single-view and
Multi-view user embedding. They typically employ unsuper-
vised or self-supervised learning to automatically uncover the
latent structures/relations in the raw data. To employ self-
supervised user embedding, frequently an Auxiliary Training
Task is employed for which the system can easily construct a
large number of training examples. We will explain the de-
tails of these methods later. Target task describes the down-
stream applications that make use of the learned embeddings.
We also indicate whether the learned embeddings are further
tuned/adjusted so that they are optimized for the target tasks.
In the following, We first present the typical Single-view
User Embedding methods. Then we summarize the methods
that combine multiple types of user information together to
form a unified user representation.
Paper
Data Type
[Pennacchiotti and
Popescu, 2011]
text,user
profile
[Kosinski et al.,
2013]
like
[Schwartz et al.,
2013]
text
Single-view
embedding
Method
LDA
SVD
LDA
Auxiliary
Training Task
NA
NA
NA
Multi-view
embedding
Task
concatenation
NA
NA
Target Task
political learning
ethnicity
user preference
age,gender, personality
relationship
substance use
religion
political learning
age,gender
personality
attribute
user interests
text
network
SVD
DeepWalk
NA
NA
node prediction NA
user
SVD
NA
concatenation
occupation
text,
profile
text
text
text
network
user profile
text
network
text
text
like
text
Word2Vec
LDA
LDA
LDA
PCA
Word2vec
PCA
NA
Doc2vec
Doc2vec
Word2vec
LDA
Word2vec
word prediction
NA
NA
NA
NA
NA
interest
occupation
volunteerism
NA
CCA
topic engagement
word prediction
NA
word prediction NA
word prediction
like prediction
word prediction NA
CCA
NA
word prediction NA
friend recommendation
age, gender
political learning
sarcasm detection
substance use
political learning
depression
et
[Gao et al., 2014]
[Perozzi
al.,
2014]
[Preot¸iuc-Pietro et
al., 2015]
[Song et al., 2015]
[Hu et al., 2016]
[Song et al., 2016]
[Benton
2016]
et
al.,
et
[Wallace
2016]
[Ding et al., 2017]
al.,
[Preot¸iuc-Pietro et
al., 2017]
[Zhang
2017]
[Ding
2018a]
[Liao et al., 2018]
[Zhang
2018a]
[Ribeiro
2018]
[Zhang
2018b]
et
al.,
et
al.,
et
al.,
[Do et al., 2018]
[Amir et al., 2017]
text
et
al.,
network
NA
[Wang et al., 2017]
user profile
network
NMF
et
al.,
like
SVD, LDA
NA
NA
NA
NA
NA
NA
NA
NA
UPPSNE
gender
NA
NA
SNE
NA
education
political learning
community
delay discounting
group classification
user image popularity
GraphSage
hateful user
ANRL
group classification
word prediction
node prediction
NA
concatenation
location
network,user
profile
image
text
text
network
network
user profile
text
network
timestamp
Doc2vec
NA
VGGNet
LSTM
GloVe
NA
Doc2vec
Node2Vec
Target-
task
Tuning
No
No
No
No
No
No
No
No
Yes
No
Yes
No
No
No
No
NA
No
No
Yes
No
No
Yes
Table 1: Summary of User Embedding Methods
user representations than User-LDA in downstream applica-
tions. This may be due to the fact that social media posts are
often short and thus each post may only have a single topic,
which makes it easier for LDA to uncover meaningful topics
than from one big document containing all the user posts.
Matrix Representation
Since we can also use a matrix to represent user-word and
word-word co-occurrences, matrix optimization techniques
are often used in learning user embeddings. If we use a sparse
matrix to represent the relations between users and words
where each row represents a user and each column represents
a unique term in the dataset, we can use matrix decomposi-
tion techniques such as Singular Value Decomposition (SVD)
and Principle Component Analysis (PCA) to yield a set of
more manageable and compact matrices that reveal hidden
relations and structures in the data (e.g., correlation, orthogo-
nality and sub-space relations).
Recently, there is a surge of new text embedding methods
that are designed to capture the semantics of words and docu-
ments. Except for GloVe ( Global Vectors for Word Repre-
sentation), which uses matrix optimization to learn a general
representation of words, most text embedding methods em-
ploy neural network-based methods. Since neural network-
based methods are supervised learning methods, to learn user
embeddings, we often need an auxiliary training task for
which a large number of training examples can be automati-
cally constructed from raw social media data. We called these
methods self-supervised machine learning.
Word Embedding
Word2Vec is a popular neural network-based method de-
signed to learn dense vector representations for individual
words. The intuition behind the model is the Distributional
Hypothesis, which states words that appear in the same con-
text have similar meanings. There are two models for training
a representation of word: Continuous Bag of Word (CBOW)
and Skip Gram (SG) model. CBOW predicts a target word
from one or more context words, while SG predicts one or
more context words from a target word. Thus, predicting
words in the neighborhood is the auxiliary task used to train
word embeddings. The models are frequently trained using
either a hierarchical softmax function (HS) or negative sam-
pling (NS) for efficiency. To learn user embeddings from so-
cial media posts, the word2vec model is first applied to learn
a vector representation for each word. Then a simple average
of all the word vectors by the same user is used to represent a
user [Benton et al., 2016; Ding et al., 2017].
GloVe is an unsupervised learning algorithm designed to
learn vector representations of words based on aggregated
global word-word co-occurrence statistics from a text corpus.
GloVe employs a global log bi-linear regression model that
combines the advantages of global matrix factorization with
that of local context window-based methods. GloVe has been
used in [Ding et al., 2017] to learn a dense vector for each
word. To summarize all the words authored by a user, we can
use a vector aggregation function such as average to combine
the vectors of all the words in a user's posts.
Document Embedding
Doc2Vec is an extension of Word2Vec, which produces a
dense low dimensional feature vector for a document. There
are two Doc2Vec models: Distributed Memory (DM) and
Distributed Bag-of-Words (DBOW). Given a sequence of to-
kens in a document, DM can simultaneously learn a vector
representation for each individual word token and a vector
for the entire document. In DM, each sequence of words (e.g.
a document) is mapped to a sequence vector (e.g., document
vector) and each word is mapped to a unique word vector.
The document vector and one or more word vectors are aggre-
gated to predict a target word in the context. DBOW learns a
global vector to predict tokens randomly sampled from a doc-
ument. Unlike DM, DBOW only learns a vector for the entire
document. It does not use a local context window since the
words for prediction are randomly sampled from the entire
document.
There are two typical methods for learning a user embed-
ding from doc2vec results: (1) User-D2V which combines all
the posts by the same user in one document and trains a doc-
ument vector to represent the user. (2) Post-D2V which treats
each post as a document and train a doc2vec model to learn
a vector for each post. To derive a user embedding, all the
post vectors from the same person can be aggregated using
"average".
Recurrent Neural Networks (RNN).
The text embedding methods described above ignore the tem-
poral order of the words in a post and of the posts in a user
account. Since the order of text contains important infor-
mation, to capture the sequential relations between words
and posts, Recurrent Neural Network (RNN) models such as
Long Short-Term Memory (LSTM) can be used [Zhang et al.,
2018a]. The input to an LSTM is a sequence of word em-
beddings and the output of an LSTM is a sequence of hidden
states, which are the input to downstream applications. Sim-
ilar to word2vec, a language model-based auxiliary task is
used to train a LSTM model on raw texts.
Among all the text embedding methods we discussed,
some employ prediction-based technologies (e.g., Word2Vec,
Doc2Vec and LSTM), others use count-based methods (e.g.,
PCA, SVD, LDA and GloVe). There are some empirical
evidence indicating that prediction-based methods may have
some advantage over count-based methods in feature learn-
ing [Baroni et al., 2014]. Among all the text embedding
methods we discussed, only LDA generates embeddings that
are somewhat interpretable.
3.2 Social Network-based User Embedding
The objective of social network-based user embedding is to
map very large social networks into low-dimensional embed-
dings that preserve local and global topological similarity.
These methods focus primarily on learning a user represen-
tation that captures essential social structures and relations of
a user. The three most widely used network embedding meth-
ods are DeepWalk [Perozzi et al., 2014], Node2vec [Grover
and Leskovec, 2016] and Matrix Factorization.
DeepWalk learns latent representations of vertices in a net-
work from truncated random walks. It first generates short
random walks. Each random walk S = v1, v2, ..., vl is treated
as a sequence of words in a sentence. DeepWalk then em-
ploys the SkipGram model (SG) in word2vec to learn the la-
tent representation of a vertex. The learned embeddings can
be used in many applications such as predicting user interests
and anomaly detection [Perozzi et al., 2014].
Node2Vec is a modification of DeepWalk which employs
a biased random walk to interpolate between Breadth-first
Sampling (BFS) and Depth-first Sampling (DFS). With bi-
ased random walks, Node2vec can better preserve both
the second-order and high-order proximity [Grover and
Leskovec, 2016]. Given the set of neighboring vertices gen-
erated by a biased random walk, Node2Vec learns the vertex
representation using the SkipGram model (SG). The learned
embedding has been used to characterize a Twitter user's so-
cial network structure [Do et al., 2018] and predict user inter-
ests [Grover and Leskovec, 2016].
Non-Negative Matrix Factorization (NMF) is a matrix de-
composition method with the additional constraint that all the
entries in all the matrices have only positive values. The
connections between network vertices are represented in an
adjacency matrix. Non-negative matrix factorization is used
to obtain a low-dimensional embedding of the original ma-
trix. NMF was used in [Wang et al., 2017] to learn a
network-based user embedding that preserves both the first-
and second-order proximity.
3.3 Other Single-View User Embedding Methods
In addition to texts and social networks, it is also possible to
learn user embeddings from other types of social media data
such as likes and images. For example, User Like Embed-
ding was used in [Kosinski et al., 2013; Ding et al., 2018a]
for personality and delay discounting prediction. Many text-
based user embedding methods are also applicable here. For
example, SVD was used in [Kosinski et al., 2013]; LDA,
GloVe, Word2Vec, Doc2vec were used in [Ding et al., 2017;
Ding et al., 2018a]. In addition, AutoEncoder (AE) can be
used in learning like embeddings. AE is a neural network-
based feature learning method [Hinton and Salakhutdinov,
2006]. It learns an identity function so that the output is as
close to the input as possible. Although an identity function
seems a trivial function to learn, by placing additional con-
straints (e.g,, to make the number of neurons in the hidden
layer much smaller than that of the input), we can still force
the system to uncover latent structures in the data. Finally,
Image-based User Embedding can be obtained by extracting
low-level latent image features from pre-tained deep neural
network models such as VGGNet [Simonyan and Zisserman,
2014].
4 Multi-View User Embedding
To obtain a comprehensive and unified user representation
based on all the social media data available, we need to com-
bine user features from different views together.
In addi-
tion to simply concatenating features extracted from different
views, we can also apply machine learning algorithms to sys-
tematically fuse them. We categorize these fusion methods
into two types: (a) general fusion methods (b) customized
fusion methods. General fusion methods can be applied to
diverse types of embedding vectors such as text and image
embedding or text and like embedding .
In contrast, cus-
tomized fusion methods are specifically designed to combine
certain types of user data together. For example, ANRL is a
method specifically designed to fuse user attributes and net-
work topology together [Zhang et al., 2018b].
4.1 General Fusion Methods
First, we introduce two widely used general fusion methods.
Canonical Correlation Analysis (CCA) CCA is a statisti-
cal method that explores the relationships between two mul-
tivariate sets of variables (vectors) [Hardoon et al., 2004].
Given two feature vectors, CCA tries to find a linear trans-
formation of each feature vector so that they are maximally
correlated. CCA has been used in [Sharma et al., 2012;
Ding et al., 2017] for multi-view fusion.
Deep Canonical Correlation Analysis (DCCA) DCCA is
a non-linear extension of CCA, aiming to learn highly corre-
lated deep architectures [Andrew et al., 2013]. The intuition
is to find a maximally correlated representation of two fea-
ture vectors by passing them through multiple stacked layers
of nonlinear transformation. Typically, there are three steps
in training DCCA: (1) using a denoising autoencoder to pre-
train each single view; (2) computing the gradient of the cor-
relation of top-level representation; (3) tuning parameters us-
ing back propagation to optimize the total correlation.
The features learned from multiple views are often more
informative than those from a single view. Comparing with
single-view user embedding, multi-view embedding achieved
significantly better performance in predicting demographics
[Benton et al., 2016], politic leaning [Benton et al., 2016]
and substance use [Ding et al., 2017].
4.2 Customized Fusion Methods
Several studies in our survey employ algorithms that are
specifically designed to combine certain types of data. For
example, [Zhang et al., 2017] proposed a new algorithm
called User Profile Preserving Social Network Embedding
(UPPSNE), which combines user profiles and social net-
work structures to learn a joint vector representation of a
user. Similarly, Attributed Network Representation Learn-
ing (ANRL) [Zhang et al., 2018a] employed a deep neu-
ral network to incorporate information from both network
structure and node attributes.
It learns a single user rep-
resentation that jointly optimizes AutoEncoder loss, Skip-
Gram loss and Neighbour Prediction Loss. [Liao et al., 2018]
proposed a Social Network Embedding framework (SNE),
which learns a combined representations for social media
users by preserving both structural proximity and attribute
proximity. [Ribeiro et al., 2018] creates embeddings for each
node with word embeddings learn from text using GloVe and
the activity/network-centrality attributes associated with each
user. So far, most of the customized fusion methods are de-
signed to fuse network topology with additional node infor-
mation (e.g., user profiles).
5 Embedding Fine Tuning Using Target Tasks
In many cases, the learned user embeddings are simply used
as the input to a target task. It is also possible that the learned
user embeddings can be further refined to better support the
target tasks with supervised learning. For example, in [Miura
et al., 2017], the authors propose an attention-based neural
network model to predict geo-location.
It simultaneously
learns text, network and metadata embeddings in supervised
In [Song et al., 2016], the authors collected
fine turning.
multi-view user data from different platforms (e.g., Twitter,
Facebook, LinkedIn of the same user) and predicted volun-
teerism based on user attributes and network features. Then,
they combine these two sets of features in supervised fine
tuning to enhance the final prediction. [Farnadi et al., 2018]
learned a hybrid user profile which is a shared user represen-
tation learned from three data sources. They were combined
at decision level to predict multiple user attributes (e.g., age,
gender and personality).
6 Discussion
Large-scale social media-based user trait and behavior analy-
sis is an emerging multidisciplinary field with the potential to
transform human trait and behavior analysis from controlled
small scale experiments to large scale studies of natural hu-
man behavior in an open environment. Although raw so-
cial media data are relatively easy to obtain, it is expensive
to acquire the ground truth data at a large scale. The pro-
posed unsupervised/self-supervised user embedding methods
can alleviate the "small data" problem by transferring knowl-
edge learned from raw social media data to a new target task.
This step is very important for many human trait and behav-
ior analysis applications. According to [Benton et al., 2016;
Preot¸iuc-Pietro et al., 2015], machine learning models that in-
corporate unsupervised/self-supervised user embedding sig-
nificantly outperform the baselines that do not employ use
embedding. Based on the survey, we have also identified a
few major issues in the current social media analysis research.
6.1
Although systems employing user embeddings significantly
outperform baselines in terms of prediction accuracy, these
systems also suffer from one significant drawback: low inter-
pretability. Since user embedding features are latent features
automatically uncovered by the system, it is often difficult
for humans to understand the meaning of these features. This
may significantly impact our ability to gain insight into these
behavioral models. So far, there have not been much work fo-
cusing on learning user representations that are both effective
and interpretable.
6.2 Ethical Issues
Due to the privacy concerns in accessing user data on social
media and the sensitive nature of the inferred user character-
istics, if not careful, there could be significant privacy conse-
quences and ethical implications. So far, most of the studies
in our survey focused primarily on optimizing system perfor-
mance. There have not been sufficient discussion on ethical
concerns when conducting research in this field.
Interpretability
7 Future Directions
Each of the main issues we identified above also presents a
good opportunity for future work.
7.1
we need more research on learning high-performance user
representations that are also interpretable. Some preliminary
work has conducted in this area. In [Ding et al., 2018b], a
Interpretable User Representation Learning
knowledge distillation framework was proposed to train be-
havior models that are both highly accurate and interpretable.
Developing causal models for both inference and interpreta-
tion is another potential new direction.
7.2 Ethical Research on Data-driven Behavior
Analysis
Ethical issues are complex, multifaceted and resist simple so-
lutions.
In addition to privacy concerns in data collection,
researchers working on social media-based human trait and
behavior analysis also face other ethical challenges including
informed consent, traceability and working with children and
young people. There is an urgent need for the research com-
munity to decide an ethical framework to guide researchers to
navigate obstacles, gain trust and still allow them to capture
salient behavioral and social phenomena. Recently there is
a surge of interests and research on fair data-driven decision
making. As a researcher, we also need to be aware of the po-
tential impact of social media analytics on the well-being of
individuals and our society.
We have also identified a few possible research directions
to improve the state of the art user embedding techniques.
7.3 Temporal User Embedding
since most social media data are collected over a long period
of time and associated with time stamps, it is an ideal data
source for longitudinal data analysis. Also, for many medical
and public health applications, analyzing behavioral changes
over time is critical to understanding one's decision making
process. Although Recurrent Neural Networks such as LSTM
can capture some sequential patterns, they totally ignore the
time stamp associated with each event. More work on learn-
ing user embedding from time is needed.
7.4 User Embedding with Multi-task Learning
Since individual traits and behavior are highly correlated,
building a prediction model that simultaneous infer multiple
correlated traits and behavior should yield better performance
than predicting each trait/behavior separately. Most exist-
ing studies only predict one user attribute/behavior at a time.
More research is needed to jointly train and predict multiple
user attributes together for better performance.
7.5 Cross-platform Fusion
It is also common for a user to have multiple accounts on
different social media platforms. Recently, new technologies
have been developed to link different social media accounts
of the same user together [Abel et al., 2013]. With this linked
data, it is possible to perform novel cross-platform user trait
and behavior analysis such as (1) domain bias analysis that
focuses on studying the impact of domain or social media
platform on user trait and behavior analysis, (2) domain adap-
tation that addresses how to adjust prediction models trained
on one platform (e.g., Twitter) to predict the traits and behav-
ior on another platform (e.g., Facebook). So far, there is some
initial work on domain bias analysis and correction [Kilic¸ and
Pan, 2016]. More research is needed in order to develop more
robust tools for human trait and behavior analysis.
References
[Abel et al., 2013] F. Abel, E. Herder, G. Houben, N. Henze, and
D. Krause. Cross-system user modeling and personalization on
the social web. UMUAI, 2013.
[Amir et al., 2017] Silvio Amir, Glen Coppersmith, Paula Car-
valho, Mario J Silva, and Bryon C Wallace. Quantifying mental
health from social media with neural user embeddings. In Ma-
chine Learning for Healthcare Conference, 2017.
[Andrew et al., 2013] G. Andrew, R. Arora,
J. Bilmes, and
K. Livescu. Deep canonical correlation analysis. In ICML, 2013.
[Baroni et al., 2014] M. Baroni, G. Dinu, and G. Kruszewski. Don't
count, predict! a systematic comparison of context-counting vs.
context-predicting semantic vectors. In ACL, 2014.
[Bengio et al., 2013] Yoshua Bengio, Aaron Courville, and Pascal
Vincent. Representation learning: A review and new perspec-
tives. IEEE Trans. Pattern Anal. Mach. Intell., 35(8), 2013.
[Benton et al., 2016] A. Benton, R. Arora, and M. Dredze. Learn-
ing multiview embeddings of twitter users. In ACL, 2016.
[De Choudhury et al., 2013] Munmun De Choudhury, Michael Ga-
mon, Scott Counts, and Eric Horvitz. Predicting depression via
social media. In ICWSM, 2013.
[Ding et al., 2017] T. Ding, W. Bickel, and S. Pan. Multi-view un-
supervised user feature embedding for social media-based sub-
stance use prediction. In EMNLP, 2017.
[Ding et al., 2018a] Tao Ding, Warren K Bickel, and Shimei Pan.
Predicting delay discounting from social media likes with unsu-
pervised feature learning. In ASONAM, 2018.
[Ding et al., 2018b] Tao Ding, Fatema Hasan, Warren K Bickel,
and Shimei Pan. Interpreting social media-based substance use
prediction models with knowledge distillation. In ICTAI, 2018.
[Do et al., 2018] Tien Huu Do, Duc Minh Nguyen, Evaggelia Tsili-
gianni, Bruno Cornelis, and Nikos Deligiannis. Twitter user ge-
olocation using deep multiview learning. In ICASSP, 2018.
[Farnadi et al., 2018] Golnoosh Farnadi,
Jie Tang, Martine
De Cock, and Marie-Francine Moens. User profiling through
deep multimodal fusion. In WSDM, 2018.
[Gao et al., 2014] H. Gao, J. Mahmud, J. Chen, J. Nichols, and
Michelle X. Zhou. Modeling user attitude toward controversial
topics in online social media. In ICWSM, 2014.
[Golbeck et al., 2011] Jennifer Golbeck, Cristina Robles, and
Karen Turner. Predicting personality with social media. In CHI,
2011.
[Grover and Leskovec, 2016] Aditya Grover and Jure Leskovec.
node2vec: Scalable feature learning for networks. In KDD, 2016.
[Hardoon et al., 2004] D. Hardoon, S. Szedmak, and J. Shawe-
Taylor. Canonical correlation analysis: An overview with appli-
cation to learning methods. Neural computation, 16(12), 2004.
[Hinton and Salakhutdinov, 2006] G. Hinton and R. Salakhutdinov.
Reducing the dimensionality of data with neural networks. sci-
ence, 313(5786), 2006.
[Hu et al., 2016] T. Hu, H. Xiao, J. Luo, and T. Nguyen. What
the language you tweet says about your occupation. In ICWSM,
2016.
[Kilic¸ and Pan, 2016] D. Kilic¸ and S. Pan. Analyzing and prevent-
ing bias in text-based personal trait prediction algorithms. In IC-
TAI, 2016.
[Kosinski et al., 2013] M. Kosinski, D. Stillwell, and T. Graepel.
Private traits and attributes are predictable from digital records of
human behavior. PNAS, 110(15), 2013.
[Le and Mikolov, 2014] Quoc Le and Tomas Mikolov. Distributed
representations of sentences and documents. In ICML, 2014.
[Liao et al., 2018] Lizi Liao, Xiangnan He, Hanwang Zhang, and
Tat-Seng Chua. Attributed social network embedding. TKDE,
2018.
[Liu et al., 2016] L. Liu, D. Preotiuc-Pietro,
Z. Samani,
M. Moghaddam, and L. Ungar. Analyzing personality through
social media profile picture choice. In ICWSM, 2016.
[Mikolov et al., 2013] Tomas Mikolov, Ilya Sutskever, Kai Chen,
Greg Corrado, and Jeffrey Dean. Distributed representations of
words and phrases and their compositionality. In NIPS, 2013.
[Miura et al., 2017] Yasuhide Miura, Motoki Taniguchi, Tomoki
Taniguchi, and Tomoko Ohkuma. Unifying text, metadata, and
user network representations with a neural network for geoloca-
tion prediction. In ACL, 2017.
[Pennacchiotti and Popescu, 2011] M.
and
A. Popescu. A machine learning approach to twitter user
classification. ICWSM, 2011.
Pennacchiotti
[Pennebaker et al., 2015] James W Pennebaker, Ryan L Boyd,
Kayla Jordan, and Kate Blackburn. The development and psy-
chometric properties of liwc2015. Technical report, 2015.
[Perozzi et al., 2014] Bryan Perozzi, Rami Al-Rfou, and Steven
Skiena. Deepwalk: Online learning of social representations. In
KDD, 2014.
[Preot¸iuc-Pietro et al., 2015] D. Preot¸iuc-Pietro, V. Lampos, and
N. Aletras. An analysis of the user occupational class through
twitter content. In ACL, 2015.
[Preot¸iuc-Pietro et al., 2017] D. Preot¸iuc-Pietro, Y. Liu, D. Hop-
kins, and L. Ungar. Beyond binary labels: political ideology
prediction of twitter users. In ACL, 2017.
[Ribeiro et al., 2018] Manoel Horta Ribeiro, Pedro H Calais,
Yuri A Santos, Virg´ılio AF Almeida, and Wagner Meira Jr. Char-
acterizing and detecting hateful users on twitter. In AAAI, 2018.
[Schwartz et al., 2013] A. Schwartz, J. Eichstaedt, M. Kern, L. Dz-
iurzynski, S. Ramones, M. Agrawal, A. Shah, M. Kosinski,
D. Stillwell, M. Seligman, et al. Personality, gender, and age
in the language of social media: The open-vocabulary approach.
PloS one, 8(9), 2013.
[Sharma et al., 2012] A. Sharma, A. Kumar, H. Daume, and D. Ja-
cobs. Generalized multiview analysis: A discriminative latent
space. In CVPR, 2012.
[Simonyan and Zisserman, 2014] Karen Simonyan and Andrew
Zisserman. Very deep convolutional networks for large-scale im-
age recognition. arXiv:1409.1556, 2014.
[Song et al., 2015] X. Song, L. Nie, L. Zhang, M. Liu, and T. Chua.
Interest inference via structure-constrained multi-source multi-
task learning. In IJCAI, 2015.
[Song et al., 2016] X. Song, Z. Ming, L. Nie, Y. Zhao, and T. Chua.
Volunteerism tendency prediction via harvesting multiple social
networks. TOIS, 2016.
[Wallace et al., 2016] Silvio Amir Byron C Wallace, Hao Lyu, and
Paula Carvalho M´ario J Silva. Modelling context with user em-
beddings for sarcasm detection in social media. CoNLL, 2016.
[Wang et al., 2017] Xiao Wang, Peng Cui, Jing Wang, Jian Pei,
Wenwu Zhu, and Shiqiang Yang. Community preserving net-
work embedding. In AAAI, 2017.
[Yang et al., 2015] C. Yang, S. Pan, J. Mahmud, H. Yang, and
P. Srinivasan. Using personal traits for brand preference predic-
tion. In EMNLP, 2015.
[Zeng et al., 2018] Ziqian Zeng, Xin Liu, and Yangqiu Song. Bi-
ased random walk based social regularization for word embed-
dings. In IJCAI, 2018.
[Zhang et al., 2017] Daokun Zhang, Jie Yin, Xingquan Zhu, and
Chengqi Zhang. User profile preserving social network embed-
ding. In IJCAI, 2017.
[Zhang et al., 2018a] Wei Zhang, Wen Wang, Jun Wang, and
Hongyuan Zha. User-guided hierarchical attention network for
multi-modal social image popularity prediction. In WWW, 2018.
Jiajun Bu,
Sheng Zhou, Pinggang Yu, Jianwei Zhang, Martin Ester, and Can
Wang. Anrl: Attributed network representation learning via deep
neural networks. In IJCAI, 2018.
[Zhang et al., 2018b] Zhen Zhang, Hongxia Yang,
|
1809.07690 | 1 | 1809 | 2018-08-11T05:57:04 | Optimal flow analysis, prediction and application | [
"cs.SI",
"cs.AI"
] | This thesis employs statistical learning technique to analyze, predict and solve the fixed charge network flow (FCNF) problem, which is common encountered in many real-world network problems. The cost structure for flows in the FCNF involves both fixed and variable costs. The FCNF problem is modeled mixed binary linear programs and can be solved with standard commercial solvers, which use branch and bound algorithm. This problem is important for its widely applications and solving challenges. There does not exist a efficient algorithm to solve this problem optimally due to lacking tight bounds. To the best of our knowledge, this is the first work that employs statistical learning technique to analyze the optimal flow of the FCNF problem. Most algorithms developed to solve the FCNF problem are based on the cost structure, relaxation, etc. We start from the network characteristics and explore the relationship between properties of nodes, arcs and networks and the optimal flow. This is a bi-direction approach and the findings can be used to locate the features that affect the optimal flow most significantly, predict the optimal arcs and provide information to solve the FCNF problem. In particular, we define 33 features based on the network characteristics, from which using step wise regression, we identify 26 statistical significant predictors for logistic regression to predict which arcs will have positive flow in the optimal solutions. The predictive model achieves 88% accuracy and the area under receiver operating characteristic curve is 0.95. Two applications are investigated. Firstly, the predictive results can be used directly as component critical index. The failure of arcs with higher critical index result in more cost increase over the entire network. | cs.SI | cs |
UNIVERSITY OF OKLAHOMA
GRADUATE COLLEGE
OPTIMAL FLOW ANALYSIS, PREDICTION AND APPLICATIONS
A THESIS
SUBMITTED TO THE GRADUATE FACULTY
in partial fulfillment of the requirements for the
Degree of
MASTER OF SCIENCE
By
WEILI ZHANG
Norman, Oklahoma
2015
OPTIMAL FLOW ANALYSIS, PREDICTION AND APPLICATIONS
A THESIS APPROVED FOR THE
DEPARTMENT OF ENGINEERING
BY
Dr. Charles D. Nicholson, Chair
Dr. Kash A. Barker
Dr. Suleyman Karabuk
c(cid:13) Copyright by WEILI ZHANG 2015
All rights reserved.
This thesis is dedicated to my wife for her endless love, support and
understanding.
Acknowledgments
First and foremost, I would like to express my deepest gratitude to my advisor,
Dr. Charles D. Nicholson, for his excellent guidance, patience, encouragement
and providing me with an excellent laboratory for doing research. It has been
a privilege for me to work with him. He has taught me all the necessary skills
to be a good scientific researcher. I appreciate all his contributions of time and
ideas that made my research journey productive and fascinating. Not only do
his recommendations contribute to my research over the course of my studies,
but his recommendations have also been a source of inspiration in many other
aspects of my life. In addition, I would like to thank him due to coming to
the gym and teaching me how to work out correctly.
I gratefully acknowledge the funding sources provided by Dr.Nicholson and
Dr. Naiyu Wang that made my graduate studies possible. Special thanks goes
to Dr. Naiyu Wang who kindly hired me as her research assistant and funded
me during my graduate studies. Her support and companionship were endless.
My research would not have been possible without her kind support.
I would also acknowledge Dr. Kash A. Barker who has always been supportive
during the course of my studies. I am grateful to him for his enthusiasm for
providing a friendly and enjoyable atmosphere in the School of Industrial and
Systems Engineering. I also like to thank Dr. Suleyman Karabuk for accepting
to be in my committee.
Finally, I would like to appreciate all the faculties and staff for building the
new Master degree of Data Science and Analytics, which is a fantastic and
interesting program. It is my honor to be the first graduate student in this
program. My time at the University of Oklahoma was made enjoyable in large
part due to the many friends and groups that became a part of my life. My
iv
time at the University of Oklahoma was also enriched by getting along with
absolutely nice faculty members, and amazing graduate and undergraduate
students.
v
Contents
1 Introduction
1.1 Fixed Charge Network Flow Problem . . . . . . . . . . . . . .
1.2
Identification of Critical Components . . . . . . . . . . . . . .
1.3 Principal Goals and Thesis Outlines . . . . . . . . . . . . . . .
2 Background
2.1 Fixed Charge Network Flow Formulation . . . . . . . . . . . .
2.2 Logistic Regression Model
. . . . . . . . . . . . . . . . . . . .
3 Optimal Flow Analysis
3.1 Network Features Extraction . . . . . . . . . . . . . . . . . . .
3.2 Data Collection . . . . . . . . . . . . . . . . . . . . . . . . . .
3.3 Akaike Information Criterion Selection . . . . . . . . . . . . .
4 Validation and Interpretation
4.1 Model Diagnostics
4.2
. . . . . . . . . . . . . . . . . . . . . . . .
Interpretation of Logistic Regression Model . . . . . . . . . . .
5 Applications of Predictive Model
5.1
Important Index and Case Study . . . . . . . . . . . . . . . .
5.2 Regression Based Relaxation . . . . . . . . . . . . . . . . . . .
5.2.1 RBR Formulation . . . . . . . . . . . . . . . . . . . . .
5.2.2 RBR Computation Results . . . . . . . . . . . . . . . .
6 Conclusion
7 Future Research
References
vi
1
1
3
5
7
7
8
11
11
14
18
21
21
26
29
29
35
35
36
43
46
48
List of Tables
3.1 Entire Feature List of arc (i, j) ∈ A . . . . . . . . . . . . . . .
. . . .
3.2 Statistic Information of arc (i, j) ∈ A of Train Dataset
3.3 Logistic Regression Model with 26 predictors . . . . . . . . . .
4.1 Confusion Matrix with Cut-off 0.49 of Train Dataset
. . . . .
4.2 Static Information of Selected Features of Test Dataset . . . .
4.3 Confusion Matrix with Cut-off 0.49 of Test Dataset . . . . . .
4.4 Confusion Matrix of logistic regression with only lij on Train
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Dataset
5.1 Probability and Failure Effect for Each Arc in Network . . . .
5.2 Statistics Information of the Test Bed . . . . . . . . . . . . . .
5.3 Objective Gap and Time Difference Statistics
. . . . . . . . .
15
16
20
23
24
25
28
33
38
39
vii
List of Figures
3.1 Example of Node i
. . . . . . . . . . . . . . . . . . . . . . . .
4.1 Cost Value over Cut-off of Train Dataset . . . . . . . . . . . .
4.2 ROC Curve on Test Dataset . . . . . . . . . . . . . . . . . . .
14
23
23
5.1 Small Directed Network with 10 Nodes and 28 Arcs . . . . . .
32
5.2 Distribution of Failure Effect by Removing Top Two Critical Arcs 34
41
5.3 Distribution of Gap between zRBR and zLP by Level
. . . . .
41
5.4 CPU Time of RBR and LP over Number of Variables . . . . .
5.5 Distribution of Gap between zRBR and zGRB by Level
. . . . .
42
viii
Abstract
This thesis employs statistical learning technique to analyze, predict and solve
the fixed charge network flow (FCNF) problem, which is common encountered
in many real-world network problems. The cost structure for flows in the
FCNF involves both fixed and variable costs. The FCNF problem is modeled
mixed binary linear programs and can be solved with standard commercial
solvers, which use branch and bound algorithm. This problem is important for
its widely applications and solving challenges. There does not exist a efficient
algorithm to solve this problem optimally due to lacking tight bounds.
To the best of our knowledge, this is the first work that employs statistical
learning technique to analyze the optimal flow of the FCNF problem. Most
algorithms developed to solve the FCNF problem are based on the cost struc-
ture, relaxation, etc. We start from the network characteristics and explore
the relationship between properties of nodes, arcs and networks and the op-
timal flow. This is a bi-direction approach and the findings can be used to
locate the features that affect the optimal flow most significantly, predict the
optimal arcs and provide information to solve the FCNF problem.
In particular, we define 33 features based on the network characteristics, from
which using step wise regression, we identify 26 statistical significant predic-
tors for logistic regression to predict which arcs will have positive flow in the
optimal solutions. The predictive model achieves 88% accuracy and the area
under receiver operating characteristic curve is 0.95. Two applications are in-
vestigated. Firstly, the predictive results can be used directly as component
critical index. The failure of arcs with higher critical index result in more
cost increase over the entire network. Specifically, in the 100 instances, total
cost has an average of 9.8% increase while blocking highest two critical arcs.
ix
Secondly, we develop a regression-based relaxation (RBR) solution approach
to the FCNF problem, in which the variable costs are replaced by a function of
predictive probability. The rigorous experiments demonstrate the efficacy of
the RBR by outperforming linear programming and state-of-the-art standard
exact technique.
x
Chapter 1
Introduction
1.1. Fixed Charge Network Flow Problem
The fixed charge network flow problem (FCNF) was first developed by Hirsch
and Dantzig [29], which can be easily described as follows. For a given network,
each node has supply/demand request and all the arcs between nodes have
variable and fixed costs. The aim of the FCNF is to select the arcs and
assign flow on them to transfer commodities from supply nodes to demand
nodes, such that the total cost is minimum. Many practical problems, such
like transportation problem [3, 22], lot sizing problem [49], facility location
problem [41], network design [33, 27, 14] and others [30, 2, 37, 56, 58, 40, 61,
54, 55, 59, 60, 57] can be modeled as the FCNF.
The FCNF is NP-hard [26] and over the decades, a significant number of
papers have been published providing solution approaches to the FCNF. In
1966, Driebeek [21] proposed an algorithm to solve a mixed integer problem,
which contains a large number of continuous variables and a few integer vari-
1
ables. He solved the problem without integer constraints first and search for
the optimum integer solution. This work was among the pioneers of mixed
integer programming. Many techniques commonly utilities branch and bound
(B&B) to search the exact solution of the FCNF. Kennington and Unger [31]
presented a new branch and bound algorithm to fixed charge transportation
problem, which exploited the underlying transportation structure. Barr et al.
[5] revised B&B to solve large scale and sparse fixed charge transportation
problem. Cabot and Erenguc [11] discussed three properties that may improve
B&B algorithm. Palekar et al. [44] developed a stronger conditional penalty
for the FCNF problem, which reduced the B&B enumeration and solving time
significantly. Ortega and Wolsey [43] developed branch and cut system for un-
capacitated FCNF problem, including a heuristic for the dicut inequalities and
branching and pruning rules. Hewitt et al. [28] obtained better solution us-
ing careful neighborhood search from arc-based formulation of the FCNF and
improved the lower bound by linear relaxation of the path-based formulation.
Due to lacking the tight upper and lower bounds, the B&B algorithm might be
computational difficulty for the large-scale and complex problems. Hence, ap-
proximate solution approaches to find the near-optimal solution for the FCNF
have generated considerable research interests. Balinski [3] formulated fixed
cost transportation problem as integer programming and proposed a approx-
imate method of solution. Sun et al. [50] applied Tabu search algorithm to
solve the FCNF problem, using recency based and frequency based memories,
intermediate and long term memory processes. For local search, they used
network simplex method. Kim and Pardalos [32] developed a dynamic slope
scaling procedure, incorporating variable and fixed costs together as a new
2
coefficient and solve linear programming problem iteratively. Monteiro et al.
[38] proposed a hybrid ant colony optimization algorithm to combine two as-
pects of meta-heuristic search behavior, exploration and exploitation. Based
on spanning tree and Prüfer number representation, Molla-Alizadeh-Zavardehi
et al. [37] proposed an artificial immune algorithm and genetic algorithm and
discussed the proper values of parameters.
State-of-the-art MIP solvers combine a variety of cutting plane techniques,
heuristics and the branch and bound algorithm to find the global optimal solu-
tion. All the modern MIP solvers use preprocessing/pre-solve methods to find
a better upper bound by taking information from the original formulations,
then the solvers are able to reduce the search space during B&B procedure,
which significantly accelerate the entire solving processes [9]. More details of
the preprocessing techniques can be found in the books of Nemhauser and
Wolsey [39], Wolsey [52], Fügenschuh and Martin [25] and Mahajan [35].
1.2.
Identification of Critical Components
Modern societies are heavily dependent on many distributed systems, e.g. com-
munication networks [13], electric power transmission networks [20], trans-
portation networks [62], and all these belongs to network science area. A
substantial body of work has been done to identify critical components of
networks.
In general,the removal or blockage of one or more critical links
could have direct and serious economic consequences in terms of overall sys-
tem performance [6, 47]. Therefore, we need to identify critical segments in
the network, as specified by several national and transnational directives [8].
3
The definition of criticality is always associated with a metric, such as travel
time, maximum traffic flow, reliability and resilience, etc and the failure of
critical components affect the system performance most. The term 'criticality'
is used to qualify the role that the elements play with respect to the global
properties of the whole network.
Many literature employed topological approach to identify critical components,
which is capable of identifying the network edges and nodes whose failure can
induce a severe structural damage to the network through the physical discon-
nection of its parts [16, 10]. However, focusing on network topology neglects
other characteristics of the network. Eusgeld et al. [23] employed simulation
technique to capture the dynamics of the operational scenarios involving the
most vulnerable parts of the critical infrastructure combined with the analysis
of network topology. Bier et al. [7] proposed a computational efficient greedy
algorithm, named max line interdiction algorithm, to identify the highest load
line in the power system. Dheenadayalu et al. [19] identified critical high-
way links using localized level-of-service measures such as the volume/capacity
(V/C) ratio. Scott et al. [45] developed a comprehensive Network Robustness
Index for identifying critical components and network performance consid-
ering traffic flow, capacity and network connectivity. Through hypothetical
networks, they proved that the Network Robustness Index yields different
greater system-wide benefits with respect to travel time savings, than solution
identified by V/C ratio.
Besides network analysis and simulation approach, optimization is widely to
identify critical components. Zio et al. [63] proposed a multi-objective opti-
mization model aimed at the maximization of the importance of the impor-
4
tance of the groups and minimization of their dimension. They applied the
model to analyze the Italian high-voltage electrical transmission network. Sim-
ilarly, Shen et al. [46] developed three objectives including the maximization of
the number of connected components, minimization of the largest component
size and maximization of the minimum cost required to reconnect the whole
network, by deleting a group of nodes.
In addition, Demšar et al. [18] proposed a dual graph model to identify critical
locations in a spatial network in terms of vulnerability risk. Crucitti et al. [15]
proved that the disruption of a single critical node is sufficient to decrease the
efficiency or performance of the entire system. Barker et al. [4] involves two
critical importance measures considering the adverse impact while blocking
the link and positive impact if the link is not disrupted in the disaster.
In summary, the critical index can be built in terms of different scenarios.
Removing the network component and quantifying the corresponding system-
wide consequence is widely employed to build the component importance index
regardless which technique used in the literature.
1.3. Principal Goals and Thesis Outlines
As the best of our knowledge, none of existing literature have developed models
to analyze and predict which arcs are used in the optimal solution of the FCNF.
This is the first paper that employs statistical learning technique to analyze the
optimal flow of the FCNF and distinguishes the features to predict the optimal
arcs. This thesis involves three tasks. Task 1 will extract network features
that can be used as predictors and how to develop a predictive model with
5
these features. By solving thousands of random generated FCNF instances, we
collect over 60, 000 observations and develop logistic regression model based
on the dataset, which can be used to quantify the influence of each statistical
significant network characteristics. Task 2 will validate the predictive model
through a series of diagnostic techniques will interpret the model. Task 3
of this thesis, will discuss two applications of this model. The first one is to
identify critical arcs in a network with respect to the FCNF problem without
solving any optimization problems. The other one is named regression-based
relaxation (RBR), a approximate method for the FCNF.
The remainder of this thesis is organized as follows. Chapter 2 introduces the
background of the FCNF and the logistic regression model. The whole process
for developing logistic regression model is discussed in Chapter 3 and Chapter
4 validates and interprets the predictive model. Chapter 5 introduces two
applications of the predictive model. Chapter 6 and 7 summarize the thesis
and future work, respectively.
6
Chapter 2
Background
2.1. Fixed Charge Network Flow Formulation
The fixed charge network flow (FCNF) problem is described on a network
G = (N, A), where N and A are the set of node index i and arc index (i, j),
respectively. Let cij and fij denote the variable and fixed cost of arc (i, j) ∈ A,
respectively. Each node has a supply/demand request Ri (Ri > 0 if node i
is a supply node; Ri < 0 if node i is a demand node; otherwise, Ri = 0).
Artificial capacity, Mij, is used in the problem formulation to ensure that the
fixed cost fij is incurred whenever there is a positive flow on arc (i, j) ∈ A.
There are two variables in the FCNF, xij denotes the flow and yij represents
the corresponding decision variable on arc (i, j) ∈ A . All the instances in this
work are single-commodity FCNF and the formulation is as follows,
7
min (cid:88)
s.t. (cid:88)
(i,j)∈A
(i,j)∈A
(cijxij + fijyij)
(cid:88)
xij −
(j,i)∈A
xji = Ri
0 ≤ xij ≤ Mijyij
yij ∈ {0, 1}
(2.1)
(2.2)
(2.3)
(2.4)
∀i ∈ N
∀(i, j) ∈ A
∀(i, j) ∈ A
Here, the objective function in (2.1) is nonlinear. Constraint (2.2) ensures
that the inflow and outflow satisfy the supply/demand at node i ∈ N. Mi,j is
arc capacity in constraint (2.3) to ensure that the flow on arc (i, j) ∈ A can
be positive only when the arc (i, j) ∈ A is open (yij = 1). If arc(i, j) is not
capacitated, Mij should be artificially set to a number which is larger than the
total supply requests to not inhibit feasible solution. Constraint (2.4) defines
yij as binary, which makes the problem a 0-1 mixed integer programming
problem.
2.2. Logistic Regression Model
The logistic regression is a classification model and only has one response/dependent
variable. The logistic regression is commonly used in data mining applications,
computer science, biology and so on [12]. There are two classes of the logistic
regression, binomial and multinomial. The response variable of binomial logis-
tic regression has exactly two classes or binary outcomes, while multinomial
logistic regression has more than two. The dependent variable in this paper,
8
denoted by Y , is binary and
Y =
1, arc is used in the FCNF
0, otherwise.
The initial output of the logistic regression is not 0 or 1, but the probability
that the response variable equals to 1, which in this work refers to the like-
lihood that the arc has positive flow in the optimal solution of the FCNF.
The probability is derived by a logistic function of a variety of independent
predictors and the logistic regression coefficients. We use π(p) = P (Y =
1p1, p2, . . . , pk, . . . , pK) to represent the conditional probability of Y = 1 given
pk when the logistic regression is used. The specific logistic regression model
is,
π(p) =
1 + e−(β0+β1p1+β2p2+···+βkpk+···+βK pK )
1
(2.5)
where K is the total number of independent predictors, pk is the kk predictor
and βk is the kth parameter. Let g(p) denote the logistic transformation of
π(p) and defined as,
g(p) = ln[
π(p)
1 − π(p)
]
= β0 + β1p1 + β2p2 + ··· + βkpk + ··· + βKpK
The logit, g(p), is linear in its parameters. The logistic transformation has
many desirable properties of linear regression which we will use to discuss the
model and interpretation. Transforming the likelihood to binary value needs
9
a cut-off point, above which the response variable is set to 1. The details of
setting the cut-off value is discussed in Chapter 4.
10
Chapter 3
Optimal Flow Analysis
3.1. Network Features Extraction
In this section, we extract features from network to predict which arcs will
be open in the optimal solutions of the FCNF with four types of features
(network, arcs, relaxation solutions and nodes).
In the network level, the
features include the total number of nodes (n), the number of arcs (m), the
sum of supply requests (S) and the density of network , which is denoted
. The total supplies is transformed to the average supply per
by ρ = m
2)
2(n
n. Arc (i, j) ∈ A has variable cost cij and fixed cost fij based on
node, ¯S = S
formulation (2.1). Let γij denote the ratio between fixed cost and variable cost
of arc (i, j) ∈ A,
γij =
fij
cij
∀(i, j) ∈ A.
11
Let lij denote the flow solution of arc (i, j) ∈ A in linear relaxed FCNF problem
and the normalized value of lij is denoted by ¯lij,
¯lij =
lij
S
∀(i, j) ∈ A.
The value of ¯lij indicates the optimal flow of the linearized FCNF, and another
binary predictor of the optimal arc is created, which is denoted by lB
ij,
1, ¯lij > 0
0, otherwise.
lB
ij =
The two predictors are both related with the optimal flow in the linear relaxed
FCNF, but reflect two different types of information. The value of ¯lij indicates
ij shows the arc is open or not in the
how much flow on arc (i, j) ∈ A and lB
linearized FCNF.
The information of head node i and tail node j of arc (i, j) ∈ A should also
be considered as the features that may facilitate the predictive model due to
the fact that the goal of FCNF is to transfer commodities from supply nodes
to demand nodes through several transshipment nodes. Accordingly, we detail
the predictors associated with head node i ∈ N, with which tail node j ∈ N
is same. Let ti denote the type of node i ∈ N,
ti =
1, ri > 0
0, ri = 0
.
−1, ri < 0
12
This is to say if node i is a supply node, ti = 1; if node i is a transshipment
node, ti = 0 ; and otherwise if node i is a demand node, ti = −1. Let di∗ denote
the outdegree of node i. It is reasonable to assume that the nodes adjacent
to node i have a significant influence on the corresponding response variable.
For example, if a supply node is connected with node i, the probabilities of
this arc and other arcs out from node i to be selected will increase. Let dS
i∗
i∗) denote the number of supply (demand) tail nodes adjacent to node i. If a
demand node is connected with node i, the probabilities of this arc and other
(dD
arcs into node i to be selected will increase as well. Let rS
i∗) denote the
sum of supply (demand) requirements of the tail endpoints adjacent to node i.
i∗ (rD
In the same way, the indegree of node i is denoted as d∗i, the number of supply
(demand) head nodes adjacent to node i is denoted by dS∗i (dD∗i), and sum of
supply (demand) requests of head endpoints adjacent to node i are denoted as
rS∗i (rD∗i). Figure 3.1 illustrates the notations with a small directed network, in
which the number under each node is the requirements of that node and arrow
shows the direction of the corresponding arc. The value of di is 6 because we
have three arcs into node i and three arcs out from node i. The requirement
of node i is 100 and thus the value of ti is 1. All the notations defined before
are showed in this figure.
We observe that all the predictors with respect to degrees and requirements
are correlated with the size and total requirements of each specified instance,
consequently it is necessary to normalize such predictors. All the predictors
with respect to degrees are divided by the number of nodes N, and then we
i∗, ¯d∗i, ¯dS∗i, ¯dD∗i ( ∀i ∈ N). All the predictors related with
i∗, ¯rS∗i, ¯rD∗i
have ¯di, ¯di∗, ¯dS
requirements are divided by total supply S, and we get ¯ri, ¯rS
i∗ , ¯dD
i∗, ¯rD
13
Figure 3.1: Example of Node i
In summary, we totally have 33 predictors for a individual arc
(∀i ∈ N).
(i, j) ∈ A as summarized in Table 3.1.
3.2. Data Collection
In order to obtain sufficient data set, we create 1249 single-commodity FCNF
instances randomly, each which has characteristics corresponding to difficult
FCNF problem instances (e.g. high fixed to variable cost ratio). All prob-
lems are solved by GUROBI 5.6 on the platform of Windows 7 64bit machine
with Intel Xeon CPU E5-1620 and 8 GB RAM. The tests include network
works with range in 5 to 15, thus we can solve them optimally quickly. For
each problem, the number of arcs m is randomly selected. Specifically, we
randomly choose n − 1 ≤
stance where each of the m
2
The percentage of supply, demand, and transshipment nodes are respectively
m
2 ≤
undirected arcs is replaced by two directed arcs.
and create a connected network in-
n(n − 1)
2
randomly selected with approximate probabilities 0.2, 0.2 and 0.6. The proba-
14
i100−100−100100100100−100di=6ti=1di∗=3ri=100dSi∗=1dDi∗=2rSi∗=100rDi∗=−200d∗i=3dS∗i=2dDi∗=1rSi∗=200rD∗i=−100Table 3.1: Entire Feature List of arc (i, j) ∈ A
Notation Description
n
m
ρ
¯S
cij
fij
γij
¯lij
lB
ij
ti
tj
¯ri
¯rj
¯rS
i∗
¯rD
i∗
¯rS∗i
¯rD∗i
¯rS
j∗
¯rD
j∗
¯rS∗j
¯rD∗j
¯di∗
¯dS
i∗
¯dD
i∗
¯d∗i
¯dS∗i
¯dD∗i
¯dj∗
¯dS
j∗
¯dD
j∗
¯d∗j
¯dS∗j
¯dD∗j
number of nodes
total number of arcs
network density
average supply
variable cost of arc (i, j)
fix cost of arc (i, j)
ratio between fix cost and variable cost of arc (i, j)
normalized value of linearized relaxation solution of arc (i, j)
binary version of linearized relaxation solution of arc (i, j)
type of head node i
type of tail node j
requirements of head node i
requirements of tail node j
sum of supply requirements of tail endpoints adjacent to node i
sum of demand requirements of tail endpoints adjacent to node i
sum of supply requirements of head endpoints adjacent to node i
sum of demand requirements of head endpoints adjacent to node i
sum of supply requirements of tail endpoints adjacent to node j
sum of demand requirements of tail endpoints adjacent to node j
sum of supply requirements of head endpoints adjacent to node j
sum of demand requirements of head endpoints adjacent to node j
outdegree of head node i
number of supply tail nodes adjacent to node i
number of demand tail nodes adjacent to node i
indegree of head node i
number of supply head nodes adjacent to node i
number of demand head nodes adjacent to node i
outdegree of tail node j
number of supply tail nodes adjacent to node j
number of demand tail nodes adjacent to node j
indegree of tail node j
number of supply head nodes adjacent to node j
number of demand head nodes adjacent to node j
15
Table 3.2: Statistic Information of arc (i, j) ∈ A of Train Dataset
Max.
Notation Min.
5.00
15.00
210.00
8.00
0.13
1.00
84.93
0.00
20000
2018
0.00
0.00
-1.00
-1.00
0.00
-1.00
0.00
-11.00
0.07
0.00
0.00
0.07
0.00
0.00
0.00
1st Qu. Median Mean
11.71
10.00
89.86
50.00
0.69
0.51
307.20
480.50
5.01
2.52
40024
29998
5242
42839
0.02
0.00
0.11
0.00
0.15
-1.00
-0.16
0.00
0.60
0.40
-0.65
-1.00
0.00
0.64
-0.66
-1.00
0.64
0.50
0.17
0.28
0.18
0.10
0.64
0.50
0.28
0.00
0.00
0.18
0.11
0.00
3rd Qu.
14.00
126.00
0.88
622.93
7.49
50056
15942
0.00
0.00
1.00
0.15
0.90
-0.45
1.01
0.00
0.83
0.38
0.25
0.83
0.62
0.36
0.00
n
m
ρ
¯S
cij
fij
γij
¯lij
lB
ij
ti, tj
¯ri, ¯rj
i∗, ¯rS
¯rS
j∗
i∗, ¯rS
¯rD
j∗
¯rS∗i, ¯rS∗j
¯rD∗i, ¯rD∗j
¯di∗, ¯dj∗
¯dS
i∗, ¯dS
j∗
i∗, ¯dD
¯dD
j∗
¯d∗i, ¯d∗j
¯dS∗i, ¯dS∗j
¯dD∗,i, ¯dD∗,j
yij
12.00
84.00
0.72
456.75
5.00
39983
7997
0.00
0.00
0.00
0.00
0.60
-0.69
0.00
0.00
0.67
0.27
0.17
0.67
0.00
0.00
0.00
1325.80
10.00
60000
141547369
1.00
1.00
1.00
1.00
1.00
0.00
10.00
0.00
0.93
0.83
0.67
0.93
0.93
0.93
1.00
bilities are approximate in that adjustments are made to ensure an instance is
feasible. The variable costs and fixed costs for each link are randomly assigned
on U (0, 20) and U (20000, 60000), respectively. The total requirements for each
supply node is randomly assigned on U (1000, 2000). The total requirements of
supply node is distributed randomly as negative requirements to the demand
nodes. The statistics information of the final predictors created in Table 3.1
in our train dataset are reported in Table 3.2. Please note that head nodes
and tail nodes share the same statistical information.
Every arc in each instance is an unique record in our dataset and there are
16
61594 rows in train dataset with 1067 instances and 37651 rows in test dataset
with 182 instances. The yij is the binary variable in the optimal solution
of the FCNF instances and it is apparently to observe from Table 3.2 that
the average value of yij is quite low, which means only 11% of arcs are used
in the optimal solutions overall and this value is smaller when the problem
is larger. Zhang and Nicholson [53] provides evidence to illustrate that only
a tiny proportion of integer variables are nonzero in the optimal solution of
general mixed integer programming problems. Among the 61594 records, only
6755 arcs are used (yij = 1) and a huge proportion of arcs are relative useless
(yij = 0). Accordingly, the dataset now is biased and can not be used to
perform analysis at this point. Moreover, the records are related with each
other in the same instance since an trivial arc could be chosen if the optimal
arc is removed, which is like an underlying feature affecting the probability,
consequently it is necessary to adjust the data set to weaken this effect. To
make the dataset fair and reasonable to train predictive model, we use the
undersampling technique to adjust train dataset as described below. Reversely,
we can also use oversampling to increase the number of records where yij = 1.
Process of undersampling:
Step 1. Fetch the records that yij equals 1 and number of rows is stored as
Row1;
Step 2. Set Row0 = 0 as the number of rows that yij equals 0;
Step 3. Randomly fetch a record from the records that yij equals 0, and Row0 =
Row0 + 1;
Step 4. If Row0 < Row1, go to step 3; otherwise, output all records and stop.
Following above process, the final train dataset contains 13349 rows and the
17
mean value of yij is 0.51. Note, the undersampling procedure is only performed
on train dataset but not on the test dataset.
3.3. Akaike Information Criterion Selection
In this subsection, we use stepwise variable selection algorithm to select the
features based on the Akaike information criterion (AIC) [1]. The formulation
of AIC is [51],
AIC = −2logL + 2K,
(3.1)
where L is the likelihood and K is the number of predictors. From the for-
mulation (3.1), it is straightforward to identify that step wise regression pro-
cess handles the trade-off between the performance and the complexity of the
model.
Step wise AIC process could be performed with three directions: backward,
forward and bi-direction. In this work, the process of backward stepwise selec-
tion starts from 33 predictors and the value of AIC equals to 7, 924.72, drops
one feature at each step, and finally stops at 26 predictors with AIC value of
7, 910. The final logistic regression model is reported in Table 3.3, in which the
value of coefficients (β) indicates the magnitude and direction of the features
affecting the probability that an arc is in the optimal solution. The odds ratio
18
(OR) is the exponential of the coefficients (β) and can be derived by,
π(pk) =
odds(π(pk)) =
OR(pk) =
1
1 + e−β0+βkpk
,
,
π(pk)
1 − π(pk)
odds(π(pk + 1))
odds(π(pk))
= eβk.
The value of OR provides an interpretation for the coefficients β, which is the
change of dependent variable for 1-unit increase/decrease of the corresponding
independent predictor. If the predictor is binary, replace the π(pk + 1) with
π(pk = 1) and π(pk) with π(pk = 0).
19
Table 3.3: Logistic Regression Model with 26 predictors
Predictors
(Intercept)
n
m
cij
fij
γij
ti = 0
ti = 1
tj = 0
tj = 1
¯lB
ij
¯lij
¯ri
¯rS
i∗
¯rD
i∗
¯rS∗i
¯rD∗i
¯rS
j∗
¯rD
j∗
¯rS∗j
¯di∗
¯d∗i
¯dD
i∗
¯dS∗i
¯dD∗i
¯dj∗
¯dD
j∗
¯dS∗j
¯dD∗j
β
8.32E+00
-4.80E-02
-5.52E-03
-8.79E-02
-1.50E-04
1.28E-07
-5.43E-01
2.17E+00
-3.01E+00
-2.38E+00
1.40E+00
5.76E+00
9.67E-01
7.65E-01
8.78E-01
-2.15E-01
4.64E-01
-7.97E-01
-9.17E-01
-1.22E-01
-2.59E+00
-2.69E+00
-1.30E+00
1.84E+00
4.57E+00
-2.30E+00
-1.58E+00
3.19E+00
1.26E+00
Std. Error
4.41E-01
2.63E-02
1.86E-03
1.04E-02
3.49E-06
1.15E-07
3.15E-01
2.60E-01
2.98E-01
2.10E-01
1.16E-01
5.11E-01
3.38E-01
1.73E-01
1.99E-01
5.46E-02
8.81E-02
1.67E-01
2.04E-01
4.16E-02
5.67E-01
3.37E-01
7.08E-01
4.98E-01
5.85E-01
5.69E-01
7.49E-01
4.96E-01
5.04E-01
OR
Pr(> z)
4121.613533 <2.00E-16
0.067393
0.953095662
0.994499185
0.003003
0.915861616 <2.00E-16
0.999850511 <2.00E-16
1.000000128
0.268276
0.58094453
0.084507
8.793387337 <2.00E-16
0.049242412 <2.00E-16
0.092458073 <2.00E-16
4.067383833 <2.00E-16
318.3018034 <2.00E-16
0.004193
2.629516529
2.148779486
9.98E-06
9.82E-06
2.406323346
8.15E-05
0.806380148
1.590104918
1.40E-07
1.86E-06
0.450724045
6.71E-06
0.399596496
0.003284
0.884971357
0.07487015
4.79E-06
1.37E-15
0.067609958
0.066353
0.272259397
6.296538261
0.000221
5.60E-15
96.73739121
5.19E-05
0.100258844
0.034836
0.205769226
24.21567135
1.26E-10
0.01215
3.536013632
Significant code
***
.
**
***
***
.
***
***
***
***
***
**
***
***
***
***
***
***
**
***
***
.
***
***
***
*
***
*
Significant codes: '***', 0.001; '**', 0.01; '*', 0.05;
i referred to the head node i and j referred to the tail node j of arc (i, j) ∈ A
20
Chapter 4
Validation and Interpretation
4.1. Model Diagnostics
In this subsection, a series of diagnostic techniques are performed to validate
the logistic regression model as showed in Table 3.3. Firstly, k-fold cross
validation is used on the train data set. Specifically, k equals to 10 in our test,
which is the most common used value of k [36]. The train data set is randomly
partitioned into 10 equal size subsamples. A single subsample is retained as
validation data set for testing the model and the remaining 9 subsamples
are used as training data. This process is repeated 10 times, in which each
subsample is employed as test exactly once. The 10 results then are averaged
to give one estimation. In this test, the average estimation accuracy is 0.884.
Then, analysis of confusion matrix, also named contingency table or an error
matrix [48], is performed on the train dataset as well, which is widely used to
visualize the performance of logistic regression. In the confusion matrix, each
row represents the number of 1 or 0 from observations (yij in Table 3.2), which
21
is called actual value, and every column shows the predict values from logistic
regression model. Confusion matrix reports four derivations, false positives
(FP), false negatives (FN), true positives (TP), and true negatives (TN). Let
F P R denote the false positive rate and F N R denote the false negative rate.
The formulation to compute F P R and F N R are,
F P R =
F N R =
F P
F P + T N
F N
F N + T P
,
.
As explained before, the logistic regression model only gives the probability
that an arc is used in the optimal solution. Therefore, there is a need to find
a cut-off point, so that the response variable with the probability larger than
the point is set to 1; otherwise, the response variable is assigned with 0. To
find the optimal cut-off point, two costs are associated with F P R and F N R,
represented by CF P R and CF N R, and the false cost function is,
CF P RF P R + CF N RF N R.
(4.1)
The optimal cut-off point is obtained by solving the minimization problem
with the false total cost based on formulation (4.1) as objective function,.
Accordingly, the optimal solution varies with different cost structures, which
should be determined by specified applications. Assume the cost of F P R
equals to F N R in this thesis, Figure 4.1 plots the cost as a function of cut-off
point and the optimal cut-off point is 0.49. The detailed confusion matrix with
cut-off point equals to 0.49 is listed in Table 4.1.
Furthermore, the model is validated on test data set, which is never touched
22
Figure 4.1: Cost Value over Cut-off of Train Dataset
Table 4.1: Confusion Matrix with Cut-off 0.49 of Train Dataset
Predictive
False
True
Actual
0
1
5683 (TN)
638 (FP)
899 (FN)
6129 (TP)
Figure 4.2: ROC Curve on Test Dataset
23
CutoffExplicit cost0.00.20.40.60.81.00.10.20.30.40.5False positive rateTrue positive rate0.00.20.40.60.81.00.00.40.800.20.61Table 4.2: Static Information of Selected Features of Test Dataset
1st Qu. Median
20.00
19.00
50.00
84.00
0.00
0.00
476.90
312.20
2.50
5.00
Mean
20.62
89.86
0.00
464.20
5.01
3rd Qu.
23.00
126.00
0.00
565.50
7.52
20000.00
2024.00
30150.00
5256.00
40260.00
8038.00
40140.00
42790.00
50180.00
15940.00
60000.00
78880000.00
Notation
n
m
1
N 2
¯S
cij
fij
γij
¯lij
ti
¯ri
¯rS
i∗
¯rD
i∗
¯rS∗i
¯rD∗i
¯di∗
¯dS
i∗
¯dD
i∗
¯d∗i
¯dS∗i
¯dD∗,i
yij
Min.
15.00
8.00
0.00
58.22
0.00
0.00
-1.00
-1.00
0.00
-1.00
0.00
-19.00
0.04
0.00
0.00
0.04
0.00
0.00
0.00
0.00
-1.00
-0.10
0.47
-0.88
0.00
-0.98
0.50
0.19
0.10
0.50
0.00
0.00
0.00
Max.
25.00
210.00
0.00
993.60
10.00
0.99
1.00
0.99
1.00
0.00
16.11
0.00
0.96
0.61
0.48
0.96
0.96
0.96
1.00
0.01
0.15
0.00
0.65
-0.65
0.65
-0.66
0.65
0.27
0.18
0.65
0.27
0.19
0.07
0.00
1.00
0.09
0.86
-0.46
1.09
0.00
0.83
0.36
0.25
0.83
0.60
0.35
0.00
0.00
0.00
0.00
0.68
-0.68
0.00
0.00
0.68
0.27
0.18
0.68
0.00
0.00
0.00
24
Table 4.3: Confusion Matrix with Cut-off 0.49 of Test Dataset
Predictive
False
True
Actual
0
1
29820 (TN)
221 (FP)
5363 (FN)
2246 (TP)
before. The statistics information of test data set is summarized in Table 4.2,
in which we can see the number of nodes ranges between 15 and 25. Therefore,
the problems solved in the test data set are larger than train data and none
of problems exist in both data sets. Firstly, Table 4.3 reports the confusion
matrix applied test data set with cut-off point of 0.49. According to the
table, the predictive model also performs well. Secondly, receiver operating
characteristic (ROC) is used to measure the performance of the predictive
mode as the cut-off point is varied. This curve is created by true positive rate
and false positive rate. The diagonal is called random guess line since that if
we guess randomly, F P R and T P R are 50% to 50% (Figure 4.2). The ROC
space is the distance between point on ROC curve and line. The best possible
prediction yield the left corner point (0, 1) which is also named perfection
classification. In this test, the area under ROC curve achieves 0.95.
In summary, through rigorous validation process, it can be inferred that the
logistic regression model is accurate on both train data set and test data set.
The final model is displayed in Table 3.3 and the cut-off point is set as 0.49 in
the Chapter 5.
25
4.2.
Interpretation of Logistic Regression Model
This section interprets the notations and the corresponding values in the lo-
gistic regression model in detail. Firstly, the model is in agreement with some
intuitive network characteristics and quantifies the exact effect statistically. In
Table 3.3, m denotes the total number of arcs in the network and is statistical
significant in terms of the low p-value (0.003) and the high significant code
('***' refers to the most significance). The logistic parameter of m (βm) equals
−5.52E−03 with the standard error of 1.86E−03 and the corresponding odds
ratio is 0.994, which is obtained by taking the exponential of βm. This is to
say, holding every predictors constant except m, when the network has one
more arc, the response variable decreases by 0.5%. Intuitively, more arcs in
the network results in more alternative paths exiting in the network. There-
fore, the overall probability for an arc to be selected in the optimal solution
is naturally negative correlated with the number of arcs. Both variable and
fixed costs have a significantly effect on the response variables as showed in
Table 3.3. The 1-unit increase of variable cost and fixed cost can drop the
response variable by 8.4% and 0.01%, respectively. However, we can not di-
rectly infer that variable costs are more influential than fixed costs, since the
odds ratio should be combined with the range of the predictors to evaluate the
impact. As shown in Table 3.2, the range of cij is 10 and the corresponding of
response variable has maximum 84% increase/decrease, while the fij can vary
between 20, 000 and 60, 000, hence the possible corresponding probability can
increase/decrease by 400% at most. Consequently, fixed cost has more effect
with above variety with this range.
Secondly, two hidden findings can be concluded from the model. Although
26
fixed and variable costs are statistical significant, the ratio between them
is not so important because the p-value is 0.27 and the odds ratio of γij is
1.000000128, close to 1. In addition, total supply requirements and density
are involved in our candidate predictors, but they are not statistically sig-
nificant in terms of Akaike information criterion. Therefore, the accuracy of
the predictive model is not affected by total supply requests and the network
density.
Thirdly, an arc is whether or not used in the FCNF is notably affected by the
corresponding head and tail nodes because almost all the features of nodes
are statistically significant. For example, the response variable increases by
779% if the type of head node changes from demand to supply. This could also
be verified by the odds ratio of ¯ri, which indicates that 1-unit increase of the
requests of head node leads to 162% increase of response variable. Keeping
the other predictors constant, if the indegree of the head node increase 1-unit,
there is 93% decrease of the response variable. The other relationships can be
found in Table 3.3.
Finally, an arc has positive flow in the linear relaxed FCNF has a much higher
probability to be used in the original FNCF. With the notable influence of ¯lij,
the response variable is 3, 1730% more likely to be used when the flow of arc
increases from zero to full capacity. If an arc is open in the linearized FCNF,
the likelihood of this arc has positive flow increases by 307%. This property
is commonly employed to improve the branch and bound technique at either
root node or branch nodes [24, 17, 34, 53]. This paper provides statistical
evidence to support these works but also indicates the non-negligible difference
between the optimal solutions of the linear relaxation problem and the original
27
Table 4.4: Confusion Matrix of logistic regression with only lij on Train
Dataset
Predictive
False
True
Actual
0
1
6187 (TN)
2844 (FP)
395 (FN)
3923 (TP)
FCNF. In order to illustrate the problem, we build a logistic regression model
on the train dataset only with one predictor ( ¯lij) and the confusion matrix
is showed in Table 4.4. The total false cost of Table 4.4 is 0.21, while the
logistic regression model (Table 3.3) is only 0.11, in which other predictors
revise the misclassification of ¯lij. All these findings can be applied to analyze
the networks characteristics, identify critical components of the network and
provide preprocessing information to the FCNF problem.
28
Chapter 5
Applications of Predictive Model
5.1.
Important Index and Case Study
According to literature review in Section 1.2, to identify the critical compo-
nents or develop components importance index (CII), a measure is required
to evaluate the network performance. In this thesis, the objective value of the
optimal solution in FCNF is employed to quantify the network service level.
The objective value is not a single cost value, but results through solving the
FCNF. The optimal solution considers many metrics that are widely used in-
dividually to evaluate the network, e.g. network flow, link capacity, delivery
costs and network connectivity. Since FCNF is NP-hard and computational
expensive to find the optimal solution, no existing literature uses it to mea-
sure the network performance. When the problem extends to identify critical
groups of edges of different sizes over the entire network, it is a NP-complete
combination problem, which is difficult to solve by itself. The predictive model
provides a efficient, simple, inexpensive and practical way to compute the CII
29
for each arc in terms of FCNF without solving any NP-complete or NP-hard
problems, which extends the metrics of evaluating network performance family.
The CII is defined as the probability that an arc is selected in the optimal
solution of the FCNF for the reason that, intuitively, destruction or damaging
of arcs in the optimal solutions causes a rerouting of the flow from optimal path
to a non-optimal path with higher costs between supply and demand nodes.
The higher probability indicates the arc is more important and vice verse.
To formulate the measure, let πij denote the likelihood that arc (i, j) ∈ A is
used in the optimal solution, the value of which is directly from the predictive
model developed in Section 3.3. Let bij represent whether or not to remove
arc (i, j) ∈ A from the network,
0, remove arc (i,j)
1, otherwise
bij =
∀(i, j) ∈ A.
Furthermore, let z = z(bij) where z(bij) represents the relationship between
total cost of the network and removal status of arc (i, j) ∈ A,
z(bij) = min (cid:88)
s.t. (cid:88)
(i,j)∈A
(cijxij + fijyij)
(cid:88)
xij −
xji = Ri
(i,j)∈A
(j,i)∈A
0 ≤ xij ≤ Mijyij
yij ∈ {0, 1}
yij ≤ bij
bij ∈ {0, 1}
30
∀i ∈ N
∀(i, j) ∈ A
∀(i, j) ∈ A
∀(i, j) ∈ A
∀(i, j) ∈ A
Finally, we define the failure effect as the percentage increase of cost caused
by the disruption of segments compared with the cost incurred when all arcs
are present in the network (bij = 0,∀(i, j) ∈ A) represented by z0. Let η(bij)
denote the failure effect and the equation is expressed as,
η(bij) =
z(bij) − z0
z0
× 100%
In real-world, it is not practical to solve the large FCNF problem exactly and
the value of ηij is unavailable due to the computational difficulty. According
to our experiments, the solving time increase significantly when the number of
nodes achieves 30. However, the predictive model is simply linear calculation
and can output the results immediately. The critical components measure
approach is illustrated with a random directed network as depicted in Figure
5.1. Node 1, 7 and 9 are supply nodes and node 0, 5 and 6 are demand
nodes. The arrow on the line indicates the direction and each node-pair has
two directed arcs, thus we total have 28 arc variables. The value of z0 for this
instance is 316074.
Table 5.1 displays the variable cost, fixed cost, probability to be in optimal
solution, failure effect for each arc comprising the network. Note, since this
is a directed network, arc (0, 1) ∈ A is not same as arc (1, 0) ∈ A. Based on
this table, both the probability of arc (7, 6) and (9, 0) is 0.99, and their failure
effects are 10.22% and 6.78%, respectively. Although they do not have the
lowest variable cost or fixed cost, the endpoints of these two arcs are a pair of
supply and demand nodes. The predictive model automatically considers all
the features of this arc and give the probability that the likelihoods of these
two arcs to be selected in the optimal solution are close to 1. Some arcs with
31
Figure 5.1: Small Directed Network with 10 Nodes and 28 Arcs
low costs, e.g. (6, 7), (0, 9), (8, 0), (5, 8) and (8, 7), have high CII values as
well. These arcs can be contrasted with arcs with very low CII values, which
means they do not contribute to any failure effects.
In addition, according
to the table, the directed arcs connecting same pair of nodes do not share
same failure effect and probability. For example, the value of probability and
failure effect of arc (9, 4) are much higher than arc (4, 9). Consequently, it
is non-trivial to consider the direction of arcs in the identification of critical
components. Finally, optimization approach to Zio et al. [63], Shen et al. [46]
can only find the optimal critical segments in the network, but the predictive
model is capable to calculate CII for each bridge. Accordingly, decision maker
can combine the CII with other indices, e.g. social and economic, to select
critical components.
In order to evaluate the quality of critical identification method, the experi-
ment design includes tests on a variety of network densities, each which has
characteristics corresponding to difficult FCNF problem instances (e.g. high
fixed to variable cost ratio). The tests consists of 100 networks with 20 nodes,
32
1234567890Table 5.1: Probability and Failure Effect for Each Arc in Network
Arc(i, j)
(7,6)
(9,0)
(9,4)
(1,0)
(6,7)
(1,2)
(0,9)
(8,0)
(2,5)
(5,8)
(7,3)
(8,7)
(4,6)
(3,7)
(7,8)
(0,1)
(2,3)
(5,2)
(4,9)
(8,5)
(0,8)
(3,2)
(2,1)
(6,4)
(4,2)
(4,3)
(3,4)
(2,4)
cij
7.20
6.51
5.95
9.69
1.93
7.17
3.10
7.54
8.90
3.90
1.47
0.13
9.09
4.93
5.68
1.27
5.90
2.53
1.21
4.01
8.61
3.43
5.07
7.67
7.62
4.77
6.18
3.63
fij
41011.33
44846.94
22028.81
42158.06
24561.20
44364.01
28765.87
26588.18
52552.74
28365.83
43307.38
33349.63
53894.90
40543.16
49949.96
56093.72
31594.21
46060.27
48247.28
57456.67
47039.03
41127.17
50998.22
48589.75
39342.56
46389.37
48528.36
54166.87
πij
0.99
0.99
0.95
0.95
0.82
0.73
0.66
0.49
0.45
0.35
0.23
0.17
0.11
0.09
0.09
0.04
0.03
0.03
0.03
0.02
0.02
0.01
0.01
0.01
0.01
0.00
0.00
0.00
ηij
10.22 %
6.78 %
7.81 %
7.81 %
10.22 %
0.37 %
6.78 %
4.54 %
0.37 %
7.81 %
7.81 %
7.81 %
4.54 %
0.37 %
0.00 %
0.00 %
0.00 %
0.00 %
0.00 %
0.00 %
0.00 %
0.00 %
0.00 %
0.00 %
0.00 %
0.00 %
0.00 %
0.00 %
33
Figure 5.2: Distribution of Failure Effect by Removing Top Two Critical Arcs
for which we can solve optimally in a reasonable time horizon. Specifically,
we create a connected network with the number of arcs randomly selected
between 38 to 380. In this experiment, we perform comparison of failure ef-
fect by blocking two arcs with highest CII and two arcs with lowest CII. The
distribution of failure effect by removing top two critical arcs is displayed in
Figure 5.2. Among all the 100 instances, the blockage of the two critical arcs
leads to average 9.85% increase of network cost and in some cases, the failure
effect achieves over 30%. However, the failure effects of two non-critical arcs
are average to 0.21% and in the 94 instances among tests, the failure effects
are 0%. Consequently, it is reasonable to conclude that the arcs with higher
CII values can lead to more failure effects and should be protected as critical
segments.
34
0.000.020.040.060102030Failure EffectDensity5.2. Regression Based Relaxation
5.2.1 RBR Formulation
In this section, a novel approximate solution approach to the FCNF based on
the predictive model is discussed, which is named regression-based relaxation
(RBR). Let pij denote the probability that arc (i, j) ∈ A is open in the FCNF
problem, which is calculated by the predictive model. Let c
ij = − ln pij where
0 < pij ≤ 1(∀(i, j) ∈ A) and z(cid:48)
RBR denote the objective value of the RBR
FCNF, which is defined as
(cid:48)
(cid:88)
(cid:88)
(i,j)∈A
(i,j)∈A
z(cid:48)
RBR =
=
(cid:48)
ijxij
c
−xij ln pij
(cid:89)
pxij
ij
= − ln
(i,j)∈A
The RBR problem formulation is: min z(cid:48)
RBR subject to (2.2) -- (2.4). In a simple
case with single supply node s, single demand node t, and total network supply
equal to 1 in a feasible problem, the RBR solution will be a most probable
feasible path from s to t. That is, if Pst denotes a most probable feasible path
from s to t,
(cid:89)
min z(cid:48)
RBR = − ln
pij
(i,j)∈Pst
and xij = 1 ⇐⇒ xij ∈ Pst.
In general for feasible FNCF problems with
x ≥ 0, the solution to RBR identifies a set of arcs which form feasible likely
paths from possibly many supply nodes to many demand nodes.
35
Here, the RBR problem is linear and can be solved immediately. The optimal
solution of RBR is easily transformed to a feasible solution of the original
FCNF. Let x∗
ij denote the value of optimal flows on arc (i, j) ∈ A in the RBR
problem, and the corresponding decision variables, y∗
ij , are assigned as,
1, x∗
y∗
ij =
ij > 0
0, otherwise
∀(i, j) ∈ A.
(5.1)
The updated solution satisfies all the constraints in the FCNF. Let the objec-
tive value of the FCNF found using RBR be denoted by zRBR and calculated
by,
(cid:88)
(i,j)∈A
zRBR =
(cijx∗
ij + fijy∗
ij).
5.2.2 RBR Computation Results
In order to evaluate the solution quality and efficacy of the RBR approximate
solution approach to the FCNF, we randomly generate 626 FCNF instances
as the test bed, which includes a large variety of network sizes and all the
instances have characteristics with respect to difficult FCNF (high fixed and
variable cost ratio). The tests are classified into three levels by the number of
nodes, 224 easy (10− 300 nodes), 236 medium (350− 650 nodes), and 166 hard
(700 − 1000 nodes) problems. The number of arcs, m, is randomly selected.
The percentage of supply, demand and transshipment nodes are randomly
chosen with respectively approximate probabilities, 0.2, 0.2, and 0.6. The
probabilities are approximate because adjustments are necessary to ensure
36
the instance is feasible. The variable costs and fixed costs follow U(0, 10)
and U(20000, 60000), respectively. The total number of supplies is randomly
assigned on U(1000, 2000).
Let ρs and ρd denote the percentage of supply and demand nodes, respectively.
Table 5.2 reports the statistics of the network characteristics of the test bed
(Min., 1st Qu., Median, Mean, 3rd Qu. and Max.). The smallest instance is
composed of 10 nodes and 20 directed arcs, which is close to the problem size
of train dataset, whereas the largest problem contains 1, 000 nodes and 82, 010
arcs, which is extremely lager than the network in train and test dataset.
Furthermore, the first quarter of number of nodes is 250 which is also much
larger than the largest problem in train and test dataset. The average supply
quantity ranges from 333 to 1, 971. The ratio of fixed costs to variable costs
averages to 8, 008. The test bed includes FCNF instances with 10% to 50% of
nodes as supply nodes, and 8% to 40% as demand nodes.
The experiments employs linear programming (LP) relaxation and state-of-
the-art exact technique as the benchmarks. The objective value of the FCNF
found using LP relaxation is denoted by zLP. We select state-of-the-art Gurobi
software as the exact optimization technique, which is a commercial optimiza-
tion (linear, integer and mixed integer programming) software. By default
setting, Gurobi uses 14 different MIP heuristics, 16 cutting plane strategies,
and several presolve techniques [42]. The best objective value found using
Gruobi 5.6.3 is denoted as zGRB. The experiments are performed on a Win-
dows 7 64bit machine with Intel Xeon CPU E5-1620 and 8 GB RAM. The
time limit for all three techniques is 60 seconds and the actual running time
for RBR, LP and Gurobi are recoded as tRBR, tLP and tGRB, respectively.
37
Table 5.2: Statistics Information of the Test Bed
Paramters Min.
10
20
0.03
333
7110
0.1000
0.0800
n
m
ρ
¯S
γ
ρs
ρd
1st Qu. Median Mean
446.7
29520
0.55
968.4
8008
0.3173
0.2033
400
26270
0.58
947
8000
0.3178
0.2000
250
9497
0.24
858.2
7986
0.3000
0.1887
3rd Qu. Max.
1000
82010
1.00
1971
9809
0.5000
0.4000
700
46480
0.89
1039
8010
0.3329
0.2161
In this section, we report the analysis of solution quality and efficiency of RBR,
LP and Grurobi. Let zx
gap denote the percentage gap between zRBR and zx,
zx
gap =
zRBR − zx
zx
× 100%.
(5.2)
where zx is one of zLP or zGRB. Let tx
faster/slower than x ∈ {LP, GRB},
diff denote how many times RBR is
tx
diff =
tx
tRBR
,
(5.3)
here, if tLP
diff equals to 2, then solving the RBR problem is twice faster than
diff equals to 0.5, then tRBR is twice
solving the LP problem; reversely, if tLP
longer than tLP.
The performance is measured with respect to zx
diff together. Based on
the formulation (5.2), if RBR outperforms LP (Gurobi) in terms of objective
gap and tx
value, the value of zLP
gap (zGRB
with respect to CPU time, the value of tLP
gap ) is negative; if RBR outperforms LP (Gurobi)
diff ) is larger than 1. Let binary
diff (tGRB
38
Table 5.3: Objective Gap and Time Difference Statistics
RBRvsLP
RBRvsGRB
Levels
Easy Medium Hard Overall
97.12
91.96
-43.39
-46.94
-32.03
-25.23
0.00
0.00
1.26
1.26
31.5
24.65
147
186.2
51.69
5.28
-20.60
-44.93
-6.16
14.29
51.20
51.20
3.31
3.31
2052
5756
82430
82430
100
-46.94
-36.18
-7.31
2.93
26.55
116.9
98.05
-44.93
-29.84
14.62
11.28
177
2791
100
-45.05
-35.57
-11.96
3.17
41.48
186.2
46.41
-41.17
-1.25
32.68
87.41
591
5752
θLP = 1(%)
min zLP
gap(%)
mean zLP
max zLP
gap(%)
gap(%)
min tLP
diff
mean tLP
diff
max tLP
diff
gap (%)
θGRB = 1(%)
min zGRB
gap (%)
mean zGRB
max zGRB
min tGRB
diff
mean tGRB
diff
max tGRB
diff
gap (%)
variable θx denote whether RBR outperforms x ∈ {LP, GRB},
θx = [zx
gap < 0][tx
diff > 1]
where, [X] returns 1 if X is true; otherwise, returns 0. In this investigation,
we claim RBR outperforms LP (Gurobi) only when θLP = 1 (θGRB = 1),
respectively. Table 5.3 reports the experimental results by techniques.
Overall, RBR outperforms LP in 97.12% of the test bed and is never outper-
formed by LP (the maximum value of zLP
gap is 0.00%). Figure 5.3 shows the
distribution of objective gap between RBR and LP by difficult levels. RBR
39
finds objective values average 32.03% lower than LP relaxation solution ap-
proach. The percentage of FCNF instances in which RBR outperforms LP in
both solution quality and efficiency achieves 100% for the medium and hard
problems. For some specified instances, RBR performs quite well and the
highest improvement of RBR to LP achieves 46.94%.
In addition, running
time of solving a RBR problem is overall 31.5 times faster than solving a LP
relaxation problem. Based on the minimum value of tLP
diff (1.26), there does not
exist a problem instance in which RBR uses longer time than LP. Figure 5.4
plots the running time as a function of the number of variables, from which
it is observed that the running time of RBR is not affected apparently by the
size of the problem instances (average tRBR = 0.33 seconds), albeit the run-
ning time of LP appears exponential relationship with the number of variables
(average tLP = 12.75 seconds). Specifically, LP performs equally with RBR
only when the number of nodes is less than 10. Therefore, RBR is guaranteed
to find a better solution in a shorter time period than LP regardless of the
scale and complexity of FNCF problem.
State-of-the-art exact solver outperforms RBR with respect to solution quality
in 95% of the test instances, but solving RBR problem is overall 5, 756 times
faster than GRB with 60 seconds limit.
In detail, GRB achieves the time
limit (60 seconds) when the number of variables is 220, in which RBR only
runs around 0.001 seconds. The solution produced by RBR begins showing
comparable to Gurobi when the difficult level is medium. Figure 5.5 shows the
gap distribution between zRBR and zGRB by difficult level. For hard FCNF
problems, RBR outperforms Gurobi in 98% of the hard instances and is only
outperformed by Gurobi in 5 over 248 hard cases. The average improvement
40
Figure 5.3: Distribution of Gap between zRBR and zLP by Level
Figure 5.4: CPU Time of RBR and LP over Number of Variables
41
EasyMediumHard01020304050−50−40−30−20−100−50−40−30−20−100−50−40−30−20−100Gap (%)Observations0204060020000400006000080000Number of VariablesCPU Time (Seconds)TechniqueLPRBRFigure 5.5: Distribution of Gap between zRBR and zGRB by Level
for hard instances is around 30% with much less running time. Since the
running time of Gurobi is always extended to 60 seconds while average RBR
running time is only 0.33 seconds, the investment in involving RBR as a pre-
prosessing technique to the FCNF is efficient. Specifically, RBR could could
find a better upper bound in the solving process and then reduce total running
time of optimization solver.
42
EasyHardMedium0255075−3003060−3003060−3003060Gap (%)ObservationsChapter 6
Conclusion
The fixed charge network flow problem has many real-world applications and
can be transformed to various problem types. Because it is a classically NP-
hard problem, many approximate algorithms have been developed to find a
near-optimal solution in a reasonable time period. This research provides a
novel and original framework to analyze the optimal flow of the FCNF. In
this work, we address three questions in terms of the analysis, prediction and
application.
Firstly, by analyzing the possible features that may affect the optimal flow,
we follow three levels from the entire network to an arc and to a single node
to ensure we extract all the useful features. There are 33 independent features
and only 26 of them are employed as predictors for the final predictive model
with respect to Akaike information criterion. The validation process includes
most common diagnostic techniques, e.g. confusion matrix, k-fold cross vali-
dation, ROC curve. The results indicate that the predictive ability is highly
accurate on both train dataset and test dataset. According to the model, we
43
can conclude that: (1) as the increase of network size, the average probability
for each arc decreases; (2) the characteristics of arcs (e.g. variable and fixed
costs) and nodes (e.g. node type and degree) have a statistical significant ef-
fect on the likelihood; (3) the logistic regression model is in agreement with
that the linear relaxation and original problem share a significant proportion
of optimal arcs. However, our study also finds that the linear relaxed FCNF
loses considerable number of optimal arcs in the original problems. The rest
predictors play an important role on improving the predictive capability. It
is observed that the types of nodes of the arc and endpoints adjacent to the
nodes provide a vital contribution in reducing the predictive errors.
Secondly, this predictive model can be used directly to identify critical arcs
in the network. The component importance index (CII) is defined as the
likelihood that the arc is selected in the optimal solution and the network
performance is evaluated by the objective value of the FCNF. In our rigorous
tests, the failure effects cased by high-CII arcs are statically significant than
cased by low-CII arcs. The FNCF has never been used to measure the network
performance due to the computational difficulty, not to mention quantifying
the failure effect for each arc. The values of CII in our experiments are consis-
tent with the failure effects and rank all the arcs, which supports the decision
make on critical components identification or priorization.
Finally, the other application of the predictive mode is presented in the work,
which we name regression-based relaxation (RBR). The RBR solution ap-
proach replaces the objective function with the natural logarithm of the prod-
uct of probabilities calculated by predictive model. Then, the optimal solu-
tion of RBR problem is the most probable feasible path of the original FCNF
44
problem. The solution quality of RBR is compared with linear programming
relaxation solution approach, and state-of-the-art optimization software. The
rigorous experiments show that RBR outperforms LP in 97.12% of the test
bed and produced objective values average 32.03% lower than LP on average.
Overall, solving a RBR problem is 31.5% times faster then solving a LP prob-
lem. The empirical results indicates RBR stably outperforms Gurobi in the
large-scale and high-complexity FNCF problems.
In summary, it is the first time to combine statistical learning technique and
network flow problem. There are several vital network characteristics affecting
the optimal flow regardless of the density and total requirements of the prob-
lem. The predictive model provides a novel approach to analyze and predict
the optimal flow, which can be used independently on the identification of the
critical components or approximate solution approach to the FCNF.
The regression-based relaxation is one of possible applications and shows great
advantage over the linear programming and standard exact technique. In the
future work we will explore more applications that most benefit from this
predictive model.
45
Chapter 7
Future Research
Solution approach to discrete optimization has been popular for many years,
but still a evolving research area. This research is the first to apply machine
learning algorithms to study the optimal flows of the FCNF instead of tran-
sitional approach. We exploited the special structures of the FCNF problem
and presented two possible applications. As part of our research, we identify
the following important research topics that we plan to explore.
1. Network Science. Currently, many research topics have transfered from
single object to a group of homogeneous or inhomogeneous objects, e.g., trans-
portation network, social network and community networks, etc. Network
science, as a maturing field, offers a unique perspective to tackle complex
problems, impenetrable to linear-proportional thinking. The framework pro-
posed in this work is for a specified optimization problem, but the concept
or procedure can be applied to all types of networks with modification of fea-
tures. In the future work, more types of network problems will be explored by
this procedure and reversely, these networks can be employed to validate the
46
methodology.
2. Solution Approach to difficult optimization problem. Due to the
success of regression-based relaxation, we plan to develop strategy combing
the RBR and Branch-and-bound technique to provide a high efficiency exact
solution approach to the FCNF problem. Furthermore, many difficult opti-
mization problems has their own characteristics, such like Knapsack problem,
traveling salesman problem, and job shop scheduling, etc, thus, we can study
the parameters, decision variables and constraints of these problems and de-
velop predictive model based on the known optimal solution.
3. Scala Machine Learning. As the datasets growing exponentially, many
machine learning techniques are not practical to apply because of the limitation
of computational power. Scala machine learning is a relative new area in
artificial intelligent area. According to the experimental results in this work,
the predictive model can be trained on a small data set of easy-solve instances,
and keep its highly accuracy for larger and more complex problems. This
conclusion is same as Scala Machine Learning and we plan to explore methods
to apply machine learning algorithms to big data more reliably and efficiently.
47
References
[1] H. Akaike. A new look at the statistical model identification. Automatic
Control, IEEE Transactions on, 19(6):716 -- 723, 1974.
[2] C. Armacost, A. Barnhart and K. Ware. Composite variable formulations
for express shipment service network design. Transportation science, 36
(1):1 -- 20, 2002.
[3] M. Balinski. Fixed-cost transportation problems. Naval Research Logistics
Quarterly, 8(1):41 -- 54, 1961.
[4] K. Barker, J. Ramirez-Marquez, and C. Rocco. Resilience-based net-
work component importance measures. Reliability Engineering & System
Safety, 117:89 -- 97, 2013.
[5] R. Barr, F. Glover, and D. Klingman. A new optimization method for
large scale fixed charge transportation problems. Operations Research, 29
(3):448 -- 463, 1981.
[6] M.G. Bell. A game theory approach to measuring the performance reli-
ability of transport networks. Transportation Research Part B: Method-
ological, 34(6):533 -- 545, 2000.
48
[7] V. M. Bier, E. R. Gratz, N.J. Haphuriwat, W. Magua, and K.R.
Wierzbicki. Methodology for identifying near-optimal interdiction strate-
gies for a power transmission system. Reliability Engineering & System
Safety, 92(9):1155 -- 1161, 2007.
[8] J. Birchmeier. Systematic assesment of the degree of criticality of infras-
tructures. In Proceedings of ESREL, pages 859 -- 64, 2007.
[9] E. Bixby, M. Fenelon, Z. Gu, E. Rothberg, and R. Wunderling. MIP: The-
ory and practice closing the gap. In System modelling and optimization,
pages 19 -- 49. Springer, 2000.
[10] E. Bompard, R. Napoli, and F. Xue. Analysis of structural vulnerabilities
in power transmission grids. International Journal of Critical Infrastruc-
ture Protection, 2(1):5 -- 12, 2009.
[11] A. Cabot and S. Erenguc. Some branch-and-bound procedures for fixed-
cost transportation problems. Naval Research Logistics Quarterly, 31(1):
145 -- 154, 1984.
[12] H. Camdeviren, A. Yazici, Z. Akkus, R. Bugdayci, and M. Sungur. Com-
parison of logistic regression model and classification tree: An application
to postpartum depression data. Expert Systems with Applications, 32(4):
987 -- 994, 2007.
[13] R. Cohen, K. Erez, D. Ben-Avraham, and S. Havlin. Resilience of the in-
ternet to random breakdowns. Physical review letters, 85(21):4626, 2000.
[14] A. Costa. A survey on benders decomposition applied to fixed-charge
49
network design problems. Computers & Operations Research, 32(6):1429 --
1450, 2005.
[15] P. Crucitti, V. Latora, and M. Marchiori. Model for cascading failures in
complex networks. Physical Review E, 69(4):045104, 2004.
[16] P. Crucitti, V. Latora, and M. Marchiori. Locating critical lines in high-
voltage electrical power grids. Fluctuation and Noise Letters, 5(02):L201 --
L208, 2005.
[17] E. Danna, E. Rothberg, and C. Le Pape. Exploring relaxation induced
neighborhoods to improve mip solutions. Mathematical Programming, 102
(1):71 -- 90, 2005.
[18] U. Demšar, O. Špatenková, and K. Virrantaus. Identifying critical loca-
tions in a spatial network with graph theory. Transactions in GIS, 12(1):
61 -- 82, 2008.
[19] Y. Dheenadayalu, B. Wolshon, and C. Wilmot. Analysis of link capacity
estimation methods for urban planning models. Journal of transportation
engineering, 130(5):568 -- 575, 2004.
[20] I. Dobson, B.A. Carreras, V.E Lynch, and D.E. Newman. Complex sys-
tems analysis of series of blackouts: Cascading failure, critical points,
and self-organization. Chaos: An Interdisciplinary Journal of Nonlinear
Science, 17(2):026103, 2007.
[21] N. Driebeek. An algorithm for the solution of mixed integer programming
problems. Management Science, 12(7):576 -- 587, 1966.
50
[22] M. El-Sherbiny and R. Alhamali. A hybrid particle swarm algorithm
with artificial immune learning for solving the fixed charge transportation
problem. Computers & Industrial Engineering, 64(2):610 -- 620, 2013.
[23] I. Eusgeld, W. Kröger, G. Sansavini, M. Schläpfer, and E. Zio. The role of
network theory and object-oriented modeling within a framework for the
vulnerability analysis of critical infrastructures. Reliability Engineering &
System Safety, 94(5):954 -- 963, 2009.
[24] M. Fischetti and A. Lodi. Local branching. Mathematical programming,
98(1-3):23 -- 47, 2003.
[25] A. Fügenschuh and A. Martin. Computational integer programming and
cutting planes. Handbooks in Operations Research and Management Sci-
ence, 12:69 -- 121, 2005.
[26] M. Garey and S. David. Computers and Intractability: A Guide to the
Theory of NP-Completeness. W. H. Freeman, New York, NY, 1979.
[27] I. Ghamlouche, T. Crainic, and M. Gendreau. Cycle-based neighbour-
hoods for fixed-charge capacitated multicommodity network design. Op-
erations research, 51(4):655 -- 667, 2003.
[28] M. Hewitt, G. Nemhauser, and M. Savelsbergh. Combining exact and
heuristic approaches for the capacitated fixed-charge network flow prob-
lem. INFORMS Journal on Computing, 22(2):314 -- 325, 2010.
[29] W. Hirsch and G. Dantzig. The fixed charge problem. Technical report,
DTIC Document, 1954.
51
[30] J. Jarvis, R. Rardin, V. Unger, R. Moore, and C. Schimpeler. Optimal
design of regional wastewater systems: A fixed-charge network flow model.
Operations Research, 26(4):538 -- 550, 1978.
[31] J. Kennington and E. Unger. A new branch-and-bound algorithm for
the fixed-charge transportation problem. Management Science, 22(10):
1116 -- 1126, 1976.
[32] D. Kim and P. Pardalos. A solution approach to the fixed charge net-
work flow problem using a dynamic slope scaling procedure. Operations
Research Letters, 24:195 -- 203, 1999.
[33] P. Lederer and R. Nambimadom. Airline network design. Operations
Research, 46(6):785 -- 804, 1998.
[34] A. Lodi. Mixed integer programming computation. In 50 Years of Integer
Programming 1958-2008, pages 619 -- 645. Springer, 2010.
[35] A. Mahajan. Presolving mixed -- integer linear programs. Wiley Encyclo-
pedia of Operations Research and Management Science, 2010.
[36] G. McLachlan, K. Do, and C. Ambroise. Analyzing microarray gene ex-
pression data, volume 422. John Wiley & Sons, 2005.
[37] S. Molla-Alizadeh-Zavardehi, M. Hajiaghaei-Keshteli, and R. Tavakkoli-
Moghaddam. Solving a capacitated fixed-charge transportation problem
by artificial immune and genetic algorithms with a prüfer number repre-
sentation. Expert Systems with Applications, 38(8):10462 -- 10474, 2011.
[38] M. Monteiro, D. Fontes, and F. Fontes. An ant colony optimization algo-
52
rithm to solve the minimum cost network flow problem with concave cost
functions. In GECCO, pages 139 -- 146, 2011.
[39] G. Nemhauser and L. Wolsey. Integer and combinatorial optimization,
volume 18. Wiley New York, 1988.
[40] Charles D Nicholson and Weili Zhang. Optimal network flow: A pre-
dictive analytics perspective on the fixed-charge network flow problem.
Computers & Industrial Engineering, 99:260 -- 268, 2016.
[41] L. Nozick. The fixed charge facility location problem with coverage re-
strictions. Transportation Research Part E: Logistics and Transportation
Review, 37(4):281 -- 296, 2001.
[42] Gurobi Optimization.
Inc.. gurobi optimizer reference manual, version
5.0, 2012.
[43] F. Ortega and L. Wolsey. A branch-and-cut algorithm for the single-
commodity, uncapacitated, fixed-charge network flow problem. Networks,
41(3):143 -- 158, 2003.
[44] U. Palekar, M. Karwan, and S. Zionts. A branch-and-bound method for
the fixed charge transportation problem. Management Science, 36(9):
1092 -- 1105, 1990.
[45] D.M. Scott, D.C. Novak, L. Aultman-Hall, and F. Guo. Network robust-
ness index: a new method for identifying critical links and evaluating the
performance of transportation networks. Journal of Transport Geography,
14(3):215 -- 227, 2006.
53
[46] S. Shen, J. Smith, and R. Goli. Exact interdiction models and algorithms
for disconnecting networks via node deletions. Discrete Optimization, 9
(3):172 -- 188, 2012.
[47] B.L. Smith, L. Qin, and R. Venkatanarayana. Characterization of freeway
capacity reduction resulting from traffic accidents. Journal of Transporta-
tion Engineering, 129(4):362 -- 368, 2003.
[48] S.V. Stehman. Selecting and interpreting measures of thematic classifica-
tion accuracy. Remote sensing of Environment, 62(1):77 -- 89, 1997.
[49] E. Steinberg and H. Napier. Optimal multi-level lot sizing for require-
ments planning systems. Management Science, 26(12):1258 -- 1271, 1980.
[50] M. Sun, J. Aronson, P. McKeown, and D. Drinka. A tabu search heuristic
procedure for the fixed charge transportation problem. European Journal
of Operational Research, 106(2):441 -- 456, 1998.
[51] W. Venables and B. Ripley. Modern applied statistics with S. Springer,
2002.
[52] L. Wolsey. Integer programming, volume 42. Wiley New York, 1998.
[53] W. Zhang and C. Nicholson. Objective scaling ensemble approach for
integer linear programming. Manuscript Submitted for Publication, 2014.
[54] Wei-li ZHANG and Lin-du ZHAO. Lattice gas model for simulating pedes-
trian evacuation in the dormitory fire [j]. Journal of Safety and Environ-
ment, 1:045, 2010.
54
[55] Weili Zhang and Charles Nicholson. A multi-objective optimization model
for retrofit strategies to mitigate direct economic loss and population dis-
location. Sustainable and Resilient Infrastructure, 1(3-4):123 -- 136, 2016.
[56] Weili Zhang and Charles D Nicholson. Prediction-based relaxation solu-
tion approach for the fixed charge network flow problem. Computers &
Industrial Engineering, 99:106 -- 111, 2016.
[57] Weili Zhang and Naiyu Wang. Resilience-based risk mitigation for road
networks. Structural Safety, 62:57 -- 65, 2016.
[58] Weili Zhang and Naiyu Wang. Bridge network maintenance prioritization
under budget constraint. Structural safety, 67:96 -- 104, 2017.
[59] Weili Zhang and Zhengyu Yao. A reformed lattice gas model and its
application in the simulation of evacuation in hospital fire. In Industrial
Engineering and Engineering Management (IEEM), 2010 IEEE Interna-
tional Conference on, pages 1543 -- 1547. IEEE, 2010.
[60] Weili Zhang, Naiyu Wang, and Charles Nicholson. Resilience-based post-
disaster recovery strategies for road-bridge networks. Structure and In-
frastructure Engineering, 13(11):1404 -- 1413, 2017.
[61] Weili Zhang, Peihui Lin, Naiyu Wang, Charles Nicholson, and Xianwu
Xue. Probabilistic prediction of postdisaster functionality loss of commu-
nity building portfolios considering utility disruptions. Journal of Struc-
tural Engineering, 144(4):04018015, 2018.
[62] J. Zheng, Z. Gao, and X. Zhao. Clustering and congestion effects on
55
cascading failures of scale-free networks. EPL (Europhysics Letters), 79
(5):58002, 2007.
[63] E. Zio, L.R. Golea, et al. Identifying groups of critical edges in a real-
istic electrical network by multi-objective genetic algorithms. Reliability
Engineering & System Safety, 99:172 -- 177, 2012.
56
|
1801.04898 | 1 | 1801 | 2018-01-15T18:15:46 | Network assembly of scientific communities of varying size and specificity | [
"cs.SI",
"physics.soc-ph"
] | How does the collaboration network of researchers coalesce around a scientific topic? What sort of social restructuring occurs as a new field develops? Previous empirical explorations of these questions have examined the evolution of co-authorship networks associated with several fields of science, each noting a characteristic shift in network structure as fields develop. Historically, however, such studies have tended to rely on manually annotated datasets and therefore only consider a handful of disciplines, calling into question the universality of the observed structural signature.To overcome this limitation and test the robustness of this phenomenon, we use a comprehensive dataset of over 189,000 scientific articles and develop a framework for partitioning articles and their authors into coherent, semantically-related groups representing scientific fields of varying size and specificity. We then use the resulting population of fields to study the structure of evolving co-authorship networks. Consistent with earlier findings, we observe a global topological transition as the co-authorship networks coalesce from a disjointed aggregate into a dense giant connected component that dominates the network. We validate these results using a separate, complimentary corpus of scientific articles, and, overall, we find that the previously reported characteristic structural evolution of a scientific field's associated co-authorship network is robust across a large number of scientific fields of varying size, scope, and specificity. Additionally, the framework developed in this study may be used in other scientometric contexts in order to extend studies to compare across a larger range of scientific disciplines. | cs.SI | cs |
Network assembly of scientific communities of varying size and specificity
Daniel T. Citron1, ∗ and Samuel F. Way2, †
1Department of Physics, Cornell University, Ithaca, New York, 14853 USA
2Department of Computer Science, University of Colorado, Boulder CO, 80309 USA
How does the collaboration network of researchers coalesce around a scientific topic? What sort of
social restructuring occurs as a new field develops? Previous empirical explorations of these questions
have examined the evolution of co-authorship networks associated with several fields of science,
each noting a characteristic shift in network structure as fields develop. Historically, however, such
studies have tended to rely on manually annotated datasets and therefore only consider a handful of
disciplines, calling into question the universality of the observed structural signature. To overcome
this limitation and test the robustness of this phenomenon, we use a comprehensive dataset of over
189,000 scientific articles and develop a framework for partitioning articles and their authors into
coherent, semantically-related groups representing scientific fields of varying size and specificity.
We then use the resulting population of fields to study the structure of evolving co-authorship
networks. Consistent with earlier findings, we observe a global topological transition as the co-
authorship networks coalesce from a disjointed aggregate into a dense giant connected component
that dominates the network. We validate these results using a separate, complimentary corpus of
scientific articles, and, overall, we find that the previously reported characteristic structural evolution
of a scientific field's associated co-authorship network is robust across a large number of scientific
fields of varying size, scope, and specificity. Additionally, the framework developed in this study
may be used in other scientometric contexts in order to extend studies to compare across a larger
range of scientific disciplines.
Keywords: collaboration networks, network assembly, social network analysis, topic modeling, scientometrics
I.
INTRODUCTION
A co-authorship network outlines the professional con-
nections between scientific researchers and their collab-
orators. Co-authorship networks are important objects
of study, as they are a measurable representation of the
communities that assemble in order to work in an par-
ticular area of research. Such communities allow for the
transfer of knowledge and skills and sharing of resources
required for researching complex problems [1–4]. The as-
sembly of co-authorship networks represents one aspect
of the more general problem of understanding the process
through which social or collaborative networks attract
new members and evolve structurally over time [5, 6].
The recent availability of electronic publishing and on-
line repositories of scientific articles has enabled large-
scale studies of scientific research practices [7–9]. In par-
ticular, these repositories provide record of collaborations
between the authors of each paper, making it possible to
construct comprehensive co-authorship networks and an-
alyze their assembly over time.
Two recent studies have investigated the development
of a small group of research fields (9 and 12 fields, re-
spectively), by measuring the assembly of each field's
co-authorship network using a large electronic collec-
tion of articles [10, 11]. Expanding upon historiograph-
ical surveys, they search for patterns in the growth and
development of co-authorship networks across different
∗ [email protected]
† [email protected]
scientific fields. These studies argue that while each
field differs in size and publishing practices (differing
in rate of publication, size of collaborations, etc.), nev-
ertheless there appear to be common patterns in how
each field's co-authorship network develops.
Specifi-
cally, each co-authorship network undergoes a topolog-
ical transition in which a densely connected giant com-
ponent of researchers forms over time. This dramatic
structural change has been compared to the emergence
of a giant component seen in a percolation transition
[12], and serves as an empirical indication that the re-
search community undergoes large-scale social reorgani-
zation as more researchers join and collaborate with oth-
ers [3, 10, 11].
Another study [13] takes three example fields (complex
networks research; ADS/CFT; Randall-Sundrum model)
and describes three stages of development characteristic
to co-authorship network assembly in science. Each net-
work begins as a set of disconnected groups, which then
join together to form a large treelike component. As the
research community grows and mixes further, the large
component becomes densely connected to itself through
the formation of long-range ties. This general pattern
is consistent with what was reported in [10, 11], which
also emphasized how the long-range ties between authors
created a densely connected community with very short
distances between different authors.
Together, these previous studies suggest the existence
of common patterns in how scientific communities assem-
ble over time. However, they rely on manual annotation
of their data, which requires a great deal of labor in order
to assemble a co-authorship network. This in turn limits
the number of examples studied and reported on, making
it difficult to justify the claim that the patterns observed
for a few examples are universal across all scientific fields.
In the present study, we propose a framework for an-
alyzing a large population of example topics in order to
verify that the development of co-authorship networks,
as characterized by earlier studies, is robust across many
scientific fields. Specifically, we use techniques from nat-
ural language processing and machine learning to gen-
erate a larger set of example co-authorship networks
from the arXiv, a large scientific corpus. We use topic
modeling to cluster articles together based on their se-
mantic content, and interpret the clusters of articles as
representing different fields of science. We measure the
algorithmically-generated co-authorship networks to de-
termine whether they develop in a manner similar to
the manually-annotated co-authorship networks studied
previously. We aim to facilitate a larger survey of co-
authorship networks across scientific fields first by testing
the efficacy of topic modeling as a way to rapidly detect
a large number of fields, and then by comparing the as-
sembly behavior of each field's co-authorship network for
the purposes of testing whether their growth patterns re-
main consistent for a large set of fields of varying size
and specificity.
II. DATA SET
The arXiv is an open-access repository of scientific
preprints accessible online at www.arxiv.org. The site
was founded in 1991 and, as of the end of 2016, hosts
over 1.1 million articles, primarily in the areas of Physics,
Mathematics, and Computer Science [14]. Here, we take
as our data set the 189,000 articles categorized as Con-
densed Matter Physics ("cond-mat" on the arXiv) by the
submitting author (or by the arXiv's administrators) dur-
ing the period starting in April of 1992 and ending in
June 2015.
The arXiv data have several important advantages for
the purposes of the present study. The articles' full texts
and relevant metadata are available to the public. Addi-
tionally, arXiv has been well studied from a scientometric
perspective [15], and has been used to test techniques for
algorithmically categorizing scientific articles according
to their content [8].
The set of arXiv articles is only a sample of all pub-
lished works, and, due to differences in the site's adop-
tion across communities, arXiv's coverage varies from one
subfield to the next. We therefore test that our results
obtained by measuring the arXiv actually represent real-
world co-authorship networks and not an artifact of the
arXiv's incompleteness. Specifically, to validate our re-
sults, we also analyze a subset of the condensed mat-
ter articles found on the Web of Science (WoS). WoS is
a database of scientific articles maintained by Clarivate
Analytics. We use the 660,000 articles classified as Con-
densed Matter Physics published between April 1992 and
June 2015, requiring that all have titles, abstracts, and
2
author names available in the database [16]. The set of
articles from Web of Science partially overlaps with the
arXiv data set and represents a complementary data set
with non-uniform coverage of the subfields contained on
arXiv [15]. Using the WoS as a secondary data set makes
it possible to verify whether the arXiv contains a truly
representative sample of Condensed Matter Physics arti-
cles, as well as to check whether the results obtained us-
ing the articles from the arXiv are not merely an artifact
of the arXiv's incomplete coverage of certain scientific
subfields.
To track the contributions of individual authors, we
adopt the convention of labeling each author with their
uppercase full names as reported in the publication meta-
data. In the context of co-authorship network measure-
ment, this author naming convention errs on the side of
splitting individual authors into multiple entities. That
is to say, authors who inconsistently report their names
in publications will be counted as multiple separate nodes
for the purposes of this study. This convention also de-
creases the possibility of many different entities becoming
combined into a single composite node, which would ar-
tificially collapse together many different nodes in our
co-authorship networks. We verify that our results are
robust to changing the author labeling convention by re-
peating all subsequent analysis using "[First Initial] [Last
Name]" in Appendix C. Larger-scale analyses involving
a broader reach of disciplines will require additional steps
to disambiguate author identities (such as the tools de-
scribed in [17, 18]). After preprocessing author names
in this way, the arXiv data set includes 96,000 unique
authors.
For the purposes of text mining and topic modeling
we focus on each article's title and abstract under the
assumption that authors write titles and abstracts with
the intention of concisely summarizing an article's con-
tents. Past studies have argued that focusing on ar-
ticle abstracts has the additional benefit of minimizing
the amount of "structural" text processed by the topic
model, allowing the inferred topic structures to focus on
field-specific content, rather than commonalities in pre-
sentation of the English language [8, 19].
III. METHODS
A. Topic Model
Past studies exploring the formation of co-authorship
networks have relied on manual annotation to determine
which authors contribute to and are therefore considered
part of a scientific field [10, 11, 13]. This approach, how-
ever, requires a great deal of human effort and, conse-
quently, has been applied to only a few disciplines and
with somewhat arbitrary definitions of which publica-
tions and authors belong to the community in question.
It therefore remains unclear how robust past results are
to varying the criteria for selecting communities, and for
varying levels of specificity governing the breadth and
size of such communities.
To address these limitations, we introduce an approach
that uses topic modeling to automate the process of
identifying groups of semantically-related documents and
partitioning their authors into fields corresponding to
their areas of expertise [20]. As a consequence of the
number of documents belonging to a given subfield and
the commonality of its language, the topics and thus the
fields extracted by this technique will vary in terms of size
and specificity, yielding a population of corresponding co-
authorship networks. That is, we can test whether the
reported structural patterns are robust to varying defi-
nitions of sub-community. At the same time, we explore
the usefulness of topic modeling as an automated, scal-
able means for partitioning the global network of all re-
searchers into co-authorship networks organized around
specific fields.
Topic modeling is an unsupervised machine learn-
ing technique that characterizes the underlying the-
matic content of a given corpus by identifying groups of
semantically-related, co-occurring words-the "topics"-
while simultaneously identifying the proportion of each
topic present in each document in the corpus. Here, we
use latent Dirichlet allocation (LDA) [21, 22], a popular
topic model that produces static definitions for topics,
formalized as probability distributions over all words in
a given vocabulary. Accordingly, for each document the
model infers a distribution over these topics.
Prior to applying topic modeling, we utilize several
common natural language processing techniques to pre-
process the corpus text. In particular, we combine the
text from each article's title and abstract into a sin-
gle document, remove all non-alphabetic characters, and
convert all letters to lowercase. Common English stop
words ("the," "and," "of," etc.) are also removed, as well
as certain words that appear very commonly in the arXiv
data set but that contain no scientific content (numbers,
names of publishers, "thank you," etc.). The document
text is also lemmatized in order to increase the likelihood
of discovering overlaps in the word usage within and be-
tween documents
After preprocessing all articles, we use MALLET [23] ,
an open-source implementation of LDA, to train a series
of topic models, varying the number of topics between
k = 25 and k = 100. As expected, for small k, LDA
produces broadly-defined topics, and for large k, more
narrowly-defined topics. For our purposes, k = 50 pro-
vides sufficient resolution for the model to recover top-
ics that resemble established subfields within condensed
matter physics. We emphasize that we do not intend to
use this topic model to represent the optimal or definitive
partition of arXiv according to subject matter. Rather,
our model provides a large set of readily-interpretable
topics, varying in both size and specificity, allowing us to
test the robustness of past claims against a heterogeneous
population of fields and their corresponding authors. We
present our analysis of the k = 50 topic model below and
3
note that our results are robust to small changes in k.
That is, the results that we report below do not change
significantly if we repeat our subsequent analyses using
a model with k = 45 or k = 55 topics.
After training our topic model, we manually inspect
each topic to determine whether it resembles a field of
condensed matter physics. As an example, the most
probable words associated with Topic 5 include key-
words such as "quantum," "state," "qubit," "entangle-
ment," and "decoherence." Looking at the set of arti-
cles to which the topic model assigns a high probability
(P (Topic = 5) > 0.6), we find articles such as "Demon-
stration of Two-Qubit Algorithms with a Superconduct-
ing Quantum Processor" (0903.2030) and "Controllable
coupling between flux qubits" (cond-mat/0507496). To-
gether, these observations suggest that articles strongly
associated with Topic 5 are related to quantum comput-
ing and quantum information. We also check that the ar-
ticles identified by the topic model do not merely reflect
clusters of articles specific to arXiv by inferring topics
on the articles belonging to the Web of Science (WoS)
data set.
In the case of Topic 5, we find articles such
as "Flexible two-qubit controlled phase gate in a hybrid
solid-state system" and "Two-electron coherence and its
measurement in electron quantum optics," which con-
firms that articles associated with Topic 5 appear to be
related to quantum computing.
In addition to quantum computing, LDA recovers
topics resembling other established subfields of con-
densed matter physics, including spin glasses (Topic 1);
Bose-Einstein condensates (Topic 3); magnetic materi-
als (Topic 19); glassy physics (Topic 28); topological
phases (Topic 30); and cuprate superconductors (Topic
43). (Refer to Appendix A to see each topic's interpre-
tation.)
B. Co-authorship Network Generation
We use our topic model to construct a set of co-
authorship networks, where each network represents the
set of authors that produced the articles strongly as-
sociated with one of the topics discovered by the topic
model. We emphasize that the topic modeling algorithm
is only given information related to the textual content
of the articles and receives no information about author-
ship, authors' collaborative relationships, or publication
dates. While there are topic modeling algorithms that
do take into account other links between documents (e.g.
[24, 25]), we want to determine whether textual content
is sufficient to reproduce patterns in how groups of re-
searchers in the same related form a collaborative com-
munity.
We find the articles that are primarily associated with
each topic t by selecting the subset of articles assigned a
probability weight P (t) > 0.6. The cutoff at 0.6 selects
articles that are strongly associated with one particular
topic, but is not so strict that it excludes too many ar-
4
FIG. 1. Examples of different network behaviors. Each row shows how a topic's co-authorship network develops over time,
with network snapshots labeled by the year observed. Each node represents an author, and each edge represents a collaboration
between the two authors. Disconnected single nodes are not pictured. The top two rows (Topics 5 and 19) illustrate three stages
of network assembly: disjointed group of cliques; treelike connected cluster of cliques; densely connected giant component. The
third row (Topic 12) is an example of a network that only forms a treelike largest component. The bottom row (Topic 41) is
an example of a network that forms no single giant component.
ticles. With P (t) > 0.6, we associate between 100 and
3000 arXiv articles with each topic. We also use an alter-
native thresholding criterion to check whether the choice
of thresholding biases our results. We repeat all sub-
sequent analysis using a second method of categorizing
articles whereby each article is assigned to the smallest
set of topics that account for 50% of its subject matter.
All reported results are robust to varying the threshold-
ing scheme.
We construct a co-authorship network by identifying
the authors of each topic's associated articles. Each au-
thor is represented in the topic's network as a node. Two
author nodes are linked by an edge if they have written
an article together.
[26, 27]. Hence, a group of authors
who collaborated on an article together appears in the
network as a fully connected clique, and two articles with
multiple authors in common will appear in the network
as overlapping cliques that share nodes. (We also use a
modularity score to measure the extent to which authors
associated with different topics connect to one another.
We find that our topic model does tend to sort authors
into distinct communities in D)
We reconstruct each co-authorship network's assembly
and growth over time using each month of arXiv's oper-
ation from April 1992 through June 2015 as a discrete
time step. At each time step we include in the network
all author nodes that have written articles at or prior to
the current time step. We also connect all pairs of author
nodes that have collaborated on one or more articles at
or prior to the current time step.
IV. RESULTS
A. Co-Authorship Network Measurements
Figure 1 shows the network growth for four different
example topics: quantum computing (Topic 5), magnetic
material properties (Topic 19), transport measurements
(Topic 12), and mechanical properties of materials (Topic
41). For the first two topics in Figure 1 there appear to
be three separate stages through which the giant compo-
nent develops. Each network begins as a disjointed set
of cliques, as the authors who share a field publish in
separate groups. Next, a few of the cliques join together,
forming a loosely connected, almost tree-like backbone
of connected cliques. In the final stage, enough cliques
overlap with one another such that the largest connected
component becomes densely connected. This character-
istic three-stage pattern is consistent with what has been
reported previously [13]. By contrast, the largest com-
ponent of Topic 12's network only grows to reach the
treelike stage, and Topic 41's network has no giant com-
ponent.
We confirm this interpretation of the network visual-
izations by measuring various properties of each topic's
co-authorship network. We measure the fraction of nodes
belonging to the largest connected component ("giant
component size"). We also measure the giant com-
ponent's mean geodesic path length between all pairs
of nodes belonging to the giant connected component
("mean path length"). The mean path length ranges
between a minimum for fully connected networks and a
maximum for treelike networks, and so serves as a mea-
sure of how closely connected the individuals belonging
to the giant component are to one another [11, 12, 28]
Figure 2 shows measurements of the size and mean
path length of the giant component for each of the topics
shown in Figure 1. For Topics 5 and 19 (two leftmost
columns), the giant component's size increases steadily
as more and more nodes are added to the network. At
the same time, the mean path length first increases as the
giant component grows initially and then peaks and de-
creases [28]. This non-monotonic behavior suggests two
5
stages in the development of the giant component:
ini-
tial growth as cliques first start to overlap with one an-
other, and densification when enough "long-range" edges
form to reduce the average distance between authors
[12, 13, 29] These two growth stages are consistent with
a treelike cluster of cliques that becomes a densely con-
nected cluster. As a point of comparison, the largest
component in Topic 12 does grow to include a large frac-
tion of the nodes in the network, but its mean path length
increases steadily over time.
The co-authorship network development patterns are
not merely the result of sampling a large number of ar-
ticles that join together by chance. For comparison, we
consider a null model in which articles are grouped to-
gether at random, rather than grouped together accord-
ing to topic modeling, to test whether the topic model-
ing is responsible for identifying the clusters of authors.
For each instance of the null model, thousands of arti-
cles are selected from the arXiv cond-mat data set at
random. The co-authorship network of this randomly-
selected group of articles is then constructed, and the
properties of the largest connected component are mea-
sured. The results of this null model are plotted in gray
in Figure 2, where the vertical height of the gray region
represents the mean ± one standard deviation across 100
instances of the null model. The null model's average
behavior contrasts dramatically with the measurements
of the scientific co-authorship networks identified using
the topic model. These results strongly suggest that the
aggregation of authors to form a giant, densely connected
component is not merely the result of sampling an arbi-
trary subset of arXiv. Rather, it appears that the topic
model, which was given no information about authorship
or other such links between documents, was able to iden-
tify clusters of researchers based on their textual content
alone. The nonrandom grouping of authors further vali-
dates the topic model's meaningful clustering of articles:
the articles represent the output of an association of re-
searchers with similar interests.
The example topics shown in Figure 1 and Figure 2
exemplify three general types of network assembly ob-
served for the other topics. Out of the 50 topics, 22 have
co-authorship networks that undergo the transition from
a scattered collection of cliques; to an extended, tree-
like connected group of cliques; to a densely connected
giant component. These results are qualitatively consis-
tent with those obtained earlier for groups of articles an-
notated by human experts [10, 11]. From the remaining
topics, 17 form a single large component that occupies a
small fraction of nodes in the network, but have not yet
formed enough long-range ties that the network mean
path length stops growing monotonically. The remain-
ing 9 topics show little or no sign that they form any
giant connected component. (Refer to Appendix B for a
summary of all co-authorship networks' behavior.)
Finding that a topic's corresponding co-authorship
network does not form a densely connected GCC does
not necessarily suggest that the research field is not well-
6
FIG. 2. Quantitative measurements of co-authorship networks. The top row shows the fraction of nodes belonging to the
largest component as a measure of network size, plotted vs. the total number of nodes in the network. The bottom row shows
the mean geodesic path length of the largest component ("mean path length") vs. the total number of nodes in the network.
For Topics 5 and 19, the largest component grows to dominate the network. As the largest component grows, its mean path
length increases quickly at first and then begins to decrease. For Topic 12, a single large component grows, but remains treelike
and its mean path length only continues to increase. For Topic 41, no giant component forms.
established. There are several possible reasons why a
dense giant component does not form in all cases. The
existence of a giant component only indicates that there
are a great many researchers that have collaborated with
one another. Inter-group collaborations may be more fre-
quent in some fields than in others, and a giant compo-
nent is only likely to form when there are many collabo-
rations between research groups. Additionally, the arXiv
does not necessarily represent a comprehensive sampling
of articles from all subfields of science. The arXiv's cover-
age of some fields may be incomplete, such as microscopy
(Topic 15) and surface chemistry (Topic 47).
B. Validation Across Corpora
The characteristic growth patterns seen for the co-
authorship networks of authors from the arXiv remain
consistent when we repeat the same analysis using an-
other corpus. We use the topic model trained on the
arXiv data to infer topics for the condensed matter
physics articles from the Web of Science (WoS). The
same procedures for generating and measuring the co-
authorship networks for the WoS articles reveals that the
topic model trained on the arXiv is still able to identify
large connected clusters of articles in the WoS. Figure
3 compares the behavior of the co-authorship networks
that occur within both the arXiv and WoS.
In the majority of cases, the co-authorship networks
identified from the WoS articles behave similarly to the
ones identified on arXiv. For example, the co-authorship
networks for research on quantum computing and mag-
netic material properties (Topics 5 and 19, the two left-
most columns of Figure 3) form a dense giant component
for both arXiv and for WoS. There is also a group of top-
ics whose networks form only a treelike giant component
or no giant component in the arXiv data but do form a
dense component with a shrinking mean path length in
the WoS data. Topics that do this include transport mea-
surements and mechanical material properties (Topics 12
and 41, shown in the two rightmost columns of Figure 3),
as well as nanoscale devices (Topic 16) and inelastic scat-
tering experiments (Topic 33). We note that these topics
have an experimental focus. Experimental research sub-
jects are known to have less coverage on arXiv, but are
covered more comprehensively in the WoS [15]. There are
also a few topics with decreased coverage on WoS because
the WoS does not categorize them as condensed matter.
For example, articles on ultracold atoms (Topics 3 and
20) may be categorized separately as "atomic, molecu-
lar, and optical physics" and articles on soft condensed
matter (Topics 25 and 50) may be categorized separately
as "fluids." Consequently, these topics' decreased inclu-
sion in the WoS data set leads to smaller and less densely
50010001500200025000.00.20.40.60.81.0Giant Component SizeTopic 5: Quantum ComputingMeasurementNull Model5001000150020002500Nodes (Authors)0246810Mean Path LengthMeasurementNull Model50010001500200025000.00.20.40.60.81.0Topic 19: Magnetic Materials5001000150020002500Nodes (Authors)0246810200400600800100012000.00.20.40.60.81.0Topic 12: Transport Measurements20040060080010001200Nodes (Authors)0246810200400600800100012000.00.20.40.60.81.0Topic 41: Mechanical Properties20040060080010001200Nodes (Authors)02468107
FIG. 3. Comparison between co-authorship networks generated from arXiv and Web of Science. Each column corresponds to a
different topic. The top row shows the fraction of nodes belonging to the largest component as a measure of network size vs. the
total number of nodes in the network. The bottom row shows the mean geodesic path length of the largest component ("mean
path length") vs. the total number of nodes in the network. Each plot shows the measurements made of the co-authorship
network from the Web of Science (in red), from arXiv (in blue), as well as co-authorship networks generated from randomly
chosen articles from Web of Science (null model, in gray).
connected co-authorship networks.
Overall,27 out of 50 topics have co-authorship net-
works that develop similarly for both the WoS data
and the arXiv data (Appendix B). Additionally, 10
experimentally-focused topics have co-authorship net-
works that grow to form large giant components on on
account of having better coverage on the WoS compared
to the arXiv. Another three topics (Topics 9, 10, and
42) have very low coverage on the arXiv (fewer than 100
associated articles) and do not form giant connected com-
ponents with either the arXiv or the WoS. Given that,
across both corpora, none of these three topics has many
strongly associated articles, it is likely that Topics 9, 10,
and 42 are actually "junk topics," meaning that they do
not reflect coherent themes and so are not useful for the
purposes of the present study. The consistency of the be-
havior of these co-authorship networks measured across
different corpora suggests that the collaborative commu-
nities identified using the model are reflected in multiple
data sets.
C. Robustness to Edge Removal
Finally, we address the question of whether the co-
authorship network development patterns seen in our
data and in previous studies are robust to relaxing the as-
sumption that all edges in the co-authorship network are
maintained indefinitely after they are established. Pre-
vious studies have constructed co-authorship networks
wherein that collaborative link, once established, are
maintained forever [10, 11, 13]. In practice, when such
a collaborative relationship requires significant efforts to
maintain, this assumption is not necessarily valid.
We re-assemble the co-authorship networks for each of
the topics, this time allowing edges to expire after a fixed
number of months. That is to say, if two authors do not
repeat a collaboration after a certain amount of time, the
edge representing their relationship is removed from the
network. The results are plotted in Figure 4, where the
uppermost curve (gray; "no limit") shows how the giant
component grows if edges survive indefinitely, while the
other curves show how those measurements change if the
edges are removed after 2 (blue), 5 (green), or 10 (red)
years.
Limiting the lifetime of edges to a few years causes
giant components to develop much more slowly, or to
not develop at all. For Topics 5 and 19, the network
measurements for 5 and 10 years are very close to the
indefinite lifetime limit. This suggests that these net-
works are particularly robust to edge removal, reflecting
a very densely connected giant component where edges
are frequently renewed [13]. For Topic 38, the giant com-
ponent forms much more slowly, and actually begins to
disassemble for edge lifetimes of 2 or 5 years. For Topic
12, finite edge lifetime only suppresses the component
5001000150020000.00.20.40.60.81.0Giant Component SizeTopic 5:Quantum ComputingWeb of Science ArticlesArXiv ArticlesNull Model500100015002000Nodes (authors)12345678910Mean Path LengthWeb of Science ArticlesArXiv ArticlesNull Model50010001500200025000.00.20.40.60.81.0Topic 19: Magnetic Materials5001000150020002500Nodes (authors)123456789101000200030000.00.20.40.60.81.0Topic 12: Transport Measurements100020003000Nodes (authors)2468101210002000300040000.00.20.40.60.81.0Topic 41: Mechanical Properties1000200030004000Nodes (authors)123456789108
FIG. 4. Network Robustness to Edge Removal. For four topics, we show how the network assembly changes when edges only
remain in the network for a limited amount of time. Each plot shows the network's giant component size over time for four
different edge lifetimes. For short edge lifetimes (2 years in blue; 5 years in green), the giant connected component fails to
develop or develops much more slowly compared to the permanent edge ("no limit," gray) case. For longer edge lifetimes (10
years, red), the giant component approaches the no limit case.
formation of a large component. (Appendix E contains
additional visualizations of these graphs, comparable to
those appearing in Figure 1.)
Currently, it is unknown what criteria for including
and excluding nodes and edges from co-authorship net-
work models best reflect the reality of authors entering
and exiting different fields. What is clear, however, is
that the assumption that the relationships represented
by edges between authors last forever is important for ob-
taining the quantitative results that reflect a topological
transition in the co-authorship network. Shortening the
lifetime of edges can dramatically change a co-authorship
network's evolution over time.
V. DISCUSSION
This study expands upon previous research explor-
ing the growth and development of co-authorship net-
works using topic modeling to algorithmically identify
and study a large population of scientific fields, along
with their associated articles and authors. Our results
show that, for the topics determined using LDA, a large
majority of co-authorship networks undergo a topologi-
cal transition to form a densely-connected giant compo-
nent characterized by three stages of development. These
patterns corroborate findings from earlier studies that fo-
cused on small numbers of (often manually assembled)
co-authorship networks. Our results demonstrate that
the characteristic topological transition is robust to vari-
ations in the definition of a scientific field, both in terms
of size and specificity. Additionally, our methods em-
ploy algorithmic clustering and require no input from hu-
man experts, yet the results are largely consistent with
previous studies. We also found that the patterns in
co-authorship network development are consistent across
corpora, which we demonstrate by repeating our analysis
using data from both the arXiv and the Web of Science.
One notable difference between the two corpora is re-
flected in how arXiv's selections of articles related to cer-
tain experimentally-focused topics are under-populated:
in these cases, the co-authorship networks constructed
using the larger WoS data set undergo a topological tran-
sition, while the corresponding networks drawn from the
arXiv data do not.
Topic modeling is a rich and actively growing area of
research within the statistical modeling and natural lan-
guage processing communities.
In our study, we used
latent Dirichlet allocation, one of the most popular yet
simplest forms of topic modeling. This model assumes a
static definition for topics and thus scientific communi-
ties, which are known evolve with time. Additionally, the
model does not directly incorporate other, non-semantic
relationships between documents (such as co-authorship
or citations), which may signal alternate forms of cohe-
sion within a scientific community. For our purposes,
199920032007201120150.00.20.40.60.81.0Giant Component SizeTopic 5: Quantum Computing19992003200720112015Time (years)0246810Mean Path Length199920032007201120150.00.20.40.60.81.0Giant Component SizeTopic 19: Magnetic Materials19992003200720112015Time (years)0246810Mean Path Length199920032007201120150.00.20.40.60.81.0Giant Component SizeTopic 12: Transport Measurements19992003200720112015Time (years)0246810Mean Path Length199920032007201120150.00.20.40.60.81.0Giant Component SizeTopic 38: Mott Insulators19992003200720112015Time (years)0246810Mean Path Lengthwe consider the assembly and development co-authorship
networks over relatively short periods of time and thus
favor LDA's straightforward approach. Future work in
this area, however, should explore more sophisticated
algorithms that consider topic dynamics (e.g.
[30, 31])
and additional measures of community cohesion in order
to more thoroughly address the co-evolution of scientific
fields.
Our method for algorithmically generating and analyz-
ing a large number of fields can also be used as a frame-
work for further exploring the claims made in a wide
variety of bibliometric contexts. For example, one could
also perform a comparison of the micro-scale dynamics of
individual authors many different fields. Recent studies
have used agent-based models of author behavior to ex-
plain the patterns in publishing behavior that one sees in
different fields of science (e.g. [20, 32]). Once again, most
of these studies have relied on manually annotated data
sets, and as such, they have historically been limited to
only a handful of fields. The approach that we develop in
this study, however, enables future work, in conjunction
9
with comprehensive data sets like the arXiv or Web of
Science, to further test the accuracy of these models of
author behavior across a large and diverse population of
scientific fields.
VI. ACKNOWLEDGMENTS
This material is based upon work supported by the Na-
tional Science Foundation Graduate Research Fellowship
under Grant No. DGE-1144153, and NSF award SMA
1633747. Any opinion, findings, and conclusions or rec-
ommendations expressed in this material are those of the
authors and do not necessarily reflect the views of the
National Science Foundation. The authors would also
like to acknowledge Michael W. Macy, Paul H. Ginsparg,
Alexandra Schofield, and Haofei Wei, as well as Brent
Schneeman, Laurence Brandenberger, Richard Barnes,
and the other attendees of the Santa Fe Institute's 2015
Complex Systems Summer School for helpful discussions.
[1] K. Borner, N. Contractor, H. J. Falk-Krzesinski,
S. M. Fiore, K. L. Hall, J. Keyton, B. Spring,
and B. Uzzi, Sci-
D. Stokols, W. Trochim,
ence Translational Medicine
2,
(2010),
http://stm.sciencemag.org/content/2/49/49cm24.full.pdf.
49cm24
[2] D. J. de Solla Price, Little Science, Big Science... and
Beyond (Columbia University Press, 1986).
[15] V. Larivi`ere, C. R. Sugimoto, B. Macaluso, S. Milojevi´c,
B. Cronin, and M. Thelwall, Journal of the Association
for Information Science and Technology 65, 1157 (2014).
[16] "Certain data included herein are derived from Clarivate
Analytics Web of Science TM. c(cid:13)Copyright Clarivate An-
alytics 2017. All rights reserved.".
[17] I. Bhattacharya and L. Getoor, ACM Transactions on
[3] R. Guimera, B. Uzzi, J. Spiro, and L. A. N. Amaral,
Knowledge Discovery from Data (TKDD) 1, 5 (2007).
Science 308, 697 (2005).
[4] D. Kaiser, Drawing Theories Apart: The Dispersion of
Feynman Diagrams in Postwar Physics (University of
Chicago Press, 2005).
[5] L. Backstrom, D. Huttenlocher, J. Kleinberg,
and
X. Lan, in Proceedings of the 12th ACM SIGKDD in-
ternational conference on Knowledge discovery and data
mining (ACM, 2006) pp. 44–54.
[6] A. Z. Jacobs, S. F. Way, J. Ugander, and A. Clauset, in
Proceedings of the ACM Web Science Conference (ACM,
2015) p. 18.
[18] Y. Song, J. Huang, I. G. Councill, J. Li, and C. L. Giles,
in Proceedings of the 7th ACM/IEEE-CS joint conference
on Digital libraries (ACM, 2007) pp. 342–351.
[19] T. Joachims, Learning to Classify Text Using Sup-
port Vector Machines: Methods, Theory and Algorithms
(Kluwer Academic Publishers, 2002).
[20] K. W. Boyack, R. Klavans, and K. Borner, Scientomet-
rics 64, 351 (2005).
[21] D. M. Blei, A. Y. Ng,
and M. I. Jordan, Journal of
Machine Learning Research 3, 993 (2003).
[22] T. L. Griffiths and M. Steyvers, Proceedings of the Na-
[7] K. Borner and R. M. Shiffrin, Proceedings of the National
tional Academy of Sciences 101, 5228 (2004).
Academy of Sciences 101, 5183 (2004).
[8] P. Ginsparg, P. Houle, T. Joachims, and J. H. Sul, Pro-
ceedings of the National Academy of Sciences 101, 5236
(2004).
[9] A. N. Tabah, Annual Review of Information Science and
Technology 34, 249 (1999).
[10] L. M. A. Bettencourt and D. I. Kaiser, arXiv.org (2015),
1504.00319v1.
[11] L. M. A. Bettencourt, D. I. Kaiser, and J. Kaur, Journal
[23] A. K. McCallum, "Mallet: A machine learning for lan-
guage toolkit," (2002), http://mallet.cs.umass.edu.
[24] Z. Guo, S. Zhu, Y. Chi, Z. Zhang,
and Y. Gong, in
Proceedings of the 32nd international ACM SIGIR con-
ference on Research and development in information re-
trieval (ACM, 2009) pp. 720–721.
[25] M. Rosen-Zvi, T. Griffiths, M. Steyvers, and P. Smyth,
in Proceedings of the 20th Conference on Uncertainty in
Artificial Intelligence (AUAI Press, 2004) pp. 487–494.
of Informetrics 3, 210 (2009).
[26] M. E.
[12] M. E. J. Newman, Networks: An Introduction (Oxford
University Press, 2010).
J. Newman, Proceedings
98,
tional Academy
http://www.pnas.org/content/98/2/404.full.pdf.
Sciences
of
of
404
the Na-
(2001),
[13] D. Lee, K.-I. Goh, B. Kahng,
and D. Kim, Physical
[27] M. E. J. Newman, Proceedings of the National Academy
Review E 82, 026112 (2010).
submission
"arXiv
[14] arXiv,
rate
statistics,
2016.
http://arxiv.org/help/stats/2016 by area/index,"
(2016).
of Sciences 101, 5200 (2004).
[28] J. Leskovec, J. Kleinberg, and C. Faloutsos, in Proceed-
ings of the eleventh ACM SIGKDD international con-
ference on Knowledge discovery in data mining (ACM,
1
2005) pp. 177–187.
[29] D. J. Watts and S. H. Strogatz, Nature 393, 440 (1998).
[30] D. M. Blei and J. D. Lafferty, in Proceedings of the 23rd
international conference on Machine learning (ACM,
2006) pp. 113–120.
[31] X. Wang and A. McCallum, in Proceedings of the 12th
ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining (ACM, 2006) pp. 424–433.
[32] X. Sun, J. Kaur, S. Milojevi´c, A. Flammini,
and
F. Menczer, Scientific Reports 3 (2013).
Appendix A: Interpreting Topic Model Output
This table lists the properties of each of the k = 50 topics identified using LDA trained on the condensed matter
physics (cond-mat) articles on arXiv. Keywords represent a few of the words most strongly associated with a topic.
The Example Article is the reference number of an article with a high probability assigned to a topic. We interpret
each topic as representing a research field, and the Interpretation is the name that we use to refer to that research
field.
#
1
2
3
4
5
6
7
8
9
Keywords
critical scaling ising transition temperature spin glass dimen-
sion random order phase correlation lattice
network node distribution degree random graph complex dy-
namic population scalefree market pattern
condensate boseeinstein atom trap gas bose interaction poten-
tial condensation trapped atomic bec
pressure phase alloy compound gpa temperature transition
structural crystal lattice diffraction xray superconductivity
quantum state qubit entanglement spin dot decoherence cou-
pling single control gate coupled information
dynamic noise quantum state oscillator dynamical regime
frequency nonequilibrium driven coupled evolution fluctuation
spin magnetic ferromagnetic magnetization effect current
anisotropy polarization exchange layer interaction coupling
experimental recent theoretical physic experiment phenomenon
present review work physical discus understanding
coupling interaction spinorbit phonon electronphonon effect
phonons electron strong mode rashba polaron
Article
Interpretation
cond-mat/9709165 Spin Glasses; Magnetic Frustration
cond-mat/9709165 Complex Networks; Population
0812.0499
0712.2955
0903.2030
1411.2637
Dynamics
Bose-Einstein Condensates
Superconducting Phases; High Pres-
sure Phases
Quantum Computing; Quantum
Information
Quantum Oscillators
1205.2835
Spins in Materials; Spintronics
1306.1774
Review Articles
cond-mat/9911404 Polarons
10 phase transition diagram order critical temperature point state
cond-mat/0602237 Phase Transitions; Quantum Phase
quantum region firstorder behavior
11 quantum optical dot exciton semiconductor emission electron
0906.3260
energy excitons hole laser excitation
Transitions
Quantum Dots; Mesoscale Physics
12 temperature conductivity thermal transport dependence low
cond-mat/0210047 Transport Measurements
effect resistivity heat coefficient scattering thermoelectric
13 wave soliton nonlinear periodic lattice potential instability
0904.4417
Solitons; Stationary States
velocity oscillation mode dynamic propagation
14 vortex magnetic pinning lattice superfluid flux core supercon-
cond-mat/9908317 Superconductor Vortices
ductors current critical superconducting defect
15 scanning microscopy measurement tunneling image force local
1009.2393
Microscopy
tip surface imaging probe atomic resolution
16 device material application design control cell efficiency perfor-
0804.1389
Electronic Devices
mance memory potential power circuit technology
17 approximation density potential energy calculation solution
cond-mat/0007282 Mathematical Physics
effective functional exact expression expansion order
18 spin lattice chain magnetic quantum heisenberg state interac-
1404.0194
tion antiferromagnetic phase order exchange
19 magnetic temperature heat measurement magnetization
susceptibility transition specific crystal single compound
ferromagnetic
1411.2135
Magnetic Frustration; Spin Chains &
Lattices
Magnetic Material Properties
20 gas lattice atom interaction fermi superfluid optical boson
0806.4310
Ultracold Atoms Dynamics
fermion ultracold state quantum
21 film thin layer substrate temperature sample surface growth
1502.07223
Oxide Thin Films
thickness grown deposition nanoparticles
22 spin relaxation magnetic nuclear electron temperature rate
1501.02897
Nuclear Magnetic Resonance
resonance nmr dynamic frequency hyperfine
Continued on next page
2
#
23 quantum hall electron magnetic state effect landau level frac-
Keywords
Article
Interpretation
1109.6219
Quantum Hall Effect
TABLE I – continued from previous page
tional twodimensional edge filling
24 nanotube carbon nanowires transistor device gate channel
1112.4397
effect voltage nanowire tube contact transport
Electronic Devices; Nanoscale
Devices
25 polymer chain protein interaction dna solution simulation
cond-mat/0504108 Soft Condensed Matter; Polymer
length charge molecule force charged concentration
26 impurity disorder interaction kondo liquid localization effect
1209.1606
Physics
Disordered Systems
disordered electron quantum fermi anderson
27 frequency optical cavity mode light microwave wave resonance
1212.0237
Optics; Metamaterials
resonator dielectric radiation photonic
28 dynamic glass liquid temperature simulation relaxation transi-
1209.3401
Glasses
tion molecular water density fluid correlation glassy
29 graphene layer edge bilayer electronic dirac gap band mono-
1309.5398
Graphene
layer graphite sheet nanoribbons
30 topological symmetry state insulator phase quantum fermion
cond-mat/0506581 Topological Phases
gauge dirac chiral majorana breaking edge
31 simulation monte carlo algorithm problem numerical quantum
0705.4173
Simulation Methods; Monte Carlo
present efficient technique scheme calculation
32 quantum dot transport conductance tunneling electron current
0706.2950
Mesoscale Transport
effect voltage charge lead contact junction
33 scattering mode spectrum excitation peak frequency energy
cond-mat/0308170 Inelastic Scattering Experiments
optical raman neutron inelastic phonon
34 distribution random correlation matrix statistic fluctuation
cond-mat/9704191 Condensed Matter Theory; Random
probability gaussian ensemble large statistical density
Matrices
35 flow particle granular fluid velocity shear force dynamic simu-
cond-mat/9511105 Soft Condensed Matter; Granular
lation friction hydrodynamic viscosity
Physics
36 current junction josephson superconducting ring magnetic flux
cond-mat/9811017 Superconducting Devices; Josephson
critical effect array wire temperature tunnel
37 entropy equilibrium energy nonequilibrium fluctuation statisti-
cal heat thermodynamic distribution relation thermodynamics
theorem temperature
1111.7014
Junctions
Thermodynamics
38 hubbard interaction electron correlation charge mott state
cond-mat/0508385 Mott-Hubbard Model
lattice insulator correlated phase coulomb band hopping
39 band surface fermi state electronic gap electron energy photoe-
1101.5615
Electronic Spectra; ARPES
mission calculation level spectroscopy
40 scaling exponent percolation size cluster dimension critical
cond-mat/0608223 Critical Phenomena
alpha lattice law fractal distribution
41 stress elastic strain material deformation dislocation shear
cond-mat/0410642 Mechanical Properties of Materials
modulus mechanical crack solid response fracture
42 state energy ground bound number spectrum density excited
cond-mat/9712133 Quantum States
level particle potential excitation
43 superconducting superconductivity doping superconductors
1504.06972
Cuprate Superconductors
cuprates temperature order state pseudogap magnetic charge
44 magnetic ferroelectric phase transition orbital ordering polar-
ization temperature order manganite state charge
1309.0291
Ferroelectrics
45 matrix quantum entanglement operator boundary lattice chain
cond-mat/0211081 Condensed Matter Theory
entropy exact group solution spin representation
46 superconducting state superconductors superconductivity su-
perconductor gap pairing symmetry dwave temperature order
pair
cond-mat/0307345 Superconductivity
47 surface interface domain wall growth boundary force nucle-
0809.1779
Surface Physics; Surface Chemistry
ation droplet bulk substrate layer
48 calculation atom energy density molecule electronic surface
1312.4272
Density Functional Theory
functional molecular cluster defect hydrogen
49 particle diffusion process motion dynamic brownian rate reac-
1207.6190
tion random stochastic transport probability
50 crystal membrane nematic liquid surface curvature defect
1304.0575
order rod orientation elastic phase
Nonequlibrium Stat Mech; Stochastic
Processes
Soft Condensed Matter; Structured
Fluids
Appendix B: Network Assembly Results for All Topics
This table summarizes the behavior of each topic's corresponding co-authorship network. For each topic (denoted
by # and Interpretation), we show the number of articles for both the arXiv and Web of Science data sets (#
Articles arXiv and # Articles WoS, respectively). Also shown is the assembly behavior of the co-authorship
network for each topic (GC Transition). Referring back to Figures 1 and 2, "No GC" refers to no giant component
formation, where cliques of authors remain disjointed. "Treelike GC" refers to cases where cliques of authors join
together to form an extended, treelike giant component that has a mean path length that continues to grow. "Dense
GC" refers to cases where cliques join together to form a densely connected giant component with many overlapping
cliques and a mean path length that increases and then decreases.
3
# Interpretation
Spin Glasses; Magnetic Frustration
1
2 Complex Networks; Population Dynamics
3 Bose-Einstein Condensates
4
Superconducting Phases; High Pressure
Phases
# Articles
arXiv
1558
2677
1020
695
GC Transition
arXiv
Dense GC
Dense GC
Dense GC
Dense GC
# Articles
WoS
1765
731
105
3780
GC Transition
WoS
Treelike GC
No GC
No GC
Dense GC
Spins in Materials; Spintronics
5 Quantum Computing
6 Quantum Oscillators
7
8 Review Articles
9 Polarons
10 Phase Transitions; Quantum Phase
Transitions
11 Quantum Dots; Mesoscale Physics
12 Transport Measurements
13 Solitons; Stationary States
14 Superconductor Vortices
15 Microscopy
16 Electronic Devices
17 Mathematical Physics
18 Spin Chains & Lattices
19 Magnetic Material Properties
20 Ultracold Atoms Dynamics
21 Oxide Thin Films
22 Nuclear Magnetic Resonance
23 Quantum Hall Effect
24 Electronic Devices; Nanoscale Devices
25 Soft Condensed Matter; Polymer Physics
26 Disordered Systems
27 Optics; Metamaterials
28 Glasses
29 Graphene
30 Topological Phases
31 Simulation Methods; Monte Carlo
32 Mesoscale Transport
33 Inelastic Scattering Experiments
34 Condensed Matter Theory
35 Soft Condensed Matter; Granular Physics
36 Superconducting Devices
37 Thermodynamics
38 Mott-Hubbard Model
39 Electronic Spectra; ARPES
40 Critical Phenomena
41 Mechanical Material Properties
42 Quantum States
43 Cuprate Superconductors
44 Ferroelectrics
1135
523
840
369
60
60
821
366
280
450
122
324
752
1539
1087
1300
1116
196
742
422
1276
444
676
1187
402
913
754
1416
220
641
1375
596
1574
798
457
786
525
62
1030
1043
Dense GC
No GC
Dense GC
No GC
No GC
No GC
Dense GC
Treelike GC
Treelike GC
Dense GC
No GC
No GC
Dense GC
Dense GC
Dense GC
Dense GC
Treelike GC
Treelike GC
Dense GC
Treelike GC
Treelike GC
No GC
Treelike GC
Dense GC
Treelike GC
Dense GC
No GC
Dense GC
Treelike GC
Treelike GC
Dense GC
Dense GC
Treelike GC
Treelike GC
Dense GC
Treelike GC
No GC
No GC
Dense GC
Dense GC
677
238
1461
429
85
52
6489
1189
233
756
439
5375
786
1623
5714
104
54823
620
799
3663
993
285
2125
844
392
433
356
1774
756
100
421
1191
140
901
1451
109
2345
29
858
2591
Dense GC
No GC
Dense GC
No GC
No GC
No GC
Dense GC
Treelike GC
No GC
Dense GC
No GC
Dense GC
Treelike GC
Dense GC
Dense GC
No GC
Dense GC
Dense GC
Dense GC
Dense GC
No GC
No GC
Dense GC
Dense GC
Treelike GC
Dense GC
Treelike GC
Dense GC
Dense GC
No GC
No GC
Dense GC
No GC
Dense GC
Dense GC
No GC
Dense GC
No GC
Dense GC
Dense GC
Continued on next page
TABLE II – continued from previous page
# Interpretation
45 Condensed Matter Theory
46 Superconductivity
47 Surface Physics; Surface Chemistry
48 Density Functional Theory
49 Nonequlibrium Stat Mech
50 Soft Condensed Matter; Structured Fluids
# Articles
arXiv
1595
576
467
1002
993
432
GC Transition
arXiv
Treelike GC
Dense GC
No GC
Treelike GC
Treelike GC
Treelike GC
# Articles
WoS
467
528
938
8439
130
139
GC Transition
WoS
No GC
Dense GC
Dense GC
Dense GC
No GC
No GC
4
Appendix C: Author Name Disambiguation
Determining the identities of document authors in publication data sets like the arXiv and Web of Science is a
complex open problem in information science (Cf. [17, 18]). The analysis in the main text is conducted by labeling
each article's author using their their full names as reported in the metadata. Punctuation is removed and all letters
are set to the same case, such that "Lindsay M. Barnes" becomes "lindsay m barnes" for the purposes of labeling
an author. We adopt this convention because it avoids artificially combining multiple authors with the same name
into a single node. At the same time, this convention is more likely to split single authors across multiple labels. For
example, "H. Eugene Stanley," "H. E. Stanley," and "H. Stanley" would all be treated as separate entities in our
co-authorship networks.
To test whether the results reported above are robust to the choice of naming convention, we repeat our analysis by
naming authors according to their first initials and last names. With this convention, "Lindsay M. Barnes" becomes
"l barnes." Examining the distribution of articles produced by each author, the new convention does appear to create
a large number of entities with common names (e.g. "h kim," "y lee") with a far above average publications count.
These entities appear to be composites of many different authors with similar names.
We reconstruct and measure the co-authorship networks using both author labeling conventions. The plots in
Figure S1 show measurements of each co-authorship network, similar to the measurements plotted in Figure 2 above.
Measurements of the co-authorship networks generated using the first initials and last names are plotted in red, while
the measurements of the co-authorship networks generated using full names are plotted in blue. The qualitative
behavior of the co-authorship network assembly is largely consistent across all topics, with the full author name
co-authorship graphs' giant components tending to be smaller and slower to develop. Despite these quantitative
differences, the qualitative behavior seen for each topic's network assembly remains consistent between the two naming
conventions. For Topic 5 and Topic 19, each case's respective co-authorship network forms a giant component whose
mean path length grows and then shrinks. For Topic 12, each case's co-authorship network forms a treelike largest
connected component. For Topic 41, each case's network fails to form a connected component.
Overall, the results reported in the main text are robust to changing how author nodes are labeled, but the full
name convention is more conservative about artificially creating composite author nodes.
5
FIG. S1. Comparison between co-authorship networks drawn using two different naming conventions. Each panel shows
measurements of co-authorship networks using two different node labeling conventions. Measurements of the co-authorship
networks generated using the first initials and last names are plotted in red, while the measurements of the co-authorship
networks generated using full names are plotted in blue. The top row shows the fraction of nodes belonging to the largest
component as a measure of network size, plotted vs. the total number of nodes in the network. The bottom row shows the
mean geodesic path length of the largest component ("mean path length") vs. the total number of nodes in the network.
50010001500200025000.00.20.40.60.81.0Giant Component SizeTopic 5:Quantum Computing5001000150020002500Nodes(Authors)012345678Giant Component Diameter"F Lastname""Full Name"500100015002000250030000.00.20.40.60.81.0Topic 19:Magnetic Materials50010001500200025003000Nodes (Authors)012345678200400600800100012000.00.20.40.60.81.0Topic 12:Transport Measurements20040060080010001200Nodes (Authors)01234567820040060080010000.00.20.40.60.81.0Topic 41:Mechanical Properties2004006008001000Nodes (Authors)012345678199920032007201120150.00.20.40.60.81.0Giant Component SizeTopic 5:Quantum Computing19992003200720112015Time (years)0246810Mean Path Length199920032007201120150.00.20.40.60.81.0Giant Component SizeTopic 19:Magnetic Materials19992003200720112015Time (years)0246810Mean Path Length199920032007201120150.00.20.40.60.81.0Giant Component SizeTopic 48:DFT19992003200720112015Time (years)0246810Mean Path Length199920032007201120150.00.20.40.60.81.0Giant Component SizeTopic 38:Mott Insulators19992003200720112015Time (years)0246810Mean Path LengthAppendix D: Modularity
6
We evaluate the extent to which topic modeling is effective at detecting distinct communities of authors using a
modularity score. The modularity score, as defined in [12] measures the extent to which nodes of a given type (for
example, associated with a particular topic) tend to form links with other nodes of the same type vs. nodes of a
different type.
For a pair of topics X and Y , we calculate the modularity by first identifying the authors who have written articles
associated with either or both topics. Based on co-authorship, we then identify all edges between authors belonging
to the same topic. If the two connected authors are both only associated with topic X or only with topic Y , then this
edge connects like with like. (We consider cases where an author in topic X connected to an author in both topics X
and Y to be "unlike" edges.) After identifying these edges, we can then calculate the standard normalized modularity
score
(cid:80)
2m −(cid:80)
(S1)
Q
Qmax
=
ij (Aij − kikj/2m) δ (ci, cj)
ij (kikj/2m) δ (ci, cj)
where m is the total number of edges, A is the adjacency matrix, ki is the degree of the ith author, ci is the
community that the ith author belongs to, and the sum is performed over all authors [12]. A modularity score close
to one means that there are relatively few links between nodes of different types. A modularity score of less than one
means that the different types of nodes are mixed. A network consisting of nodes of only a single type has modularity
0.
In the case of our co-authorship networks, we label our author nodes according to whether they have written one
or more articles that is strongly associated with one of the topics detected using LDA. The modularity scores for each
pair of topics is shown in Figure S2, and a histogram of values is shown in Figure S3. For the majority of pairs of
topics, the modularity scores are close to 1, meaning that the communities of authors associated with different topic
are only sparsely connected to one another. There are a few exceptions where the modularity score is lower (in the
left tail of Figure S3), but these are cases where the topics are closely related to one another and one expects there to
be a lot of overlap between the two topics. For example, Topics 3 and 20 are both related to ultracold atoms, while
Topics 43 and 46 are both related to superconductors and superconductivity.
FIG. S2. Modularity scores for the co-authorship networks of each pair of topics.
11020304050110203040500.00.20.40.60.81.07
FIG. S3. Histogram of modularity scores for all pairs of topics. A modularity score close to one means that two topics are
mostly separated from one another. The left tail includes pairs of topics that are more closely related to one another, meaning
that one expects the two communities to overlap more in those cases.
0.00.20.40.60.81.0Modularity0.00.050.1Modularity Histogram8
Appendix E: Robustness to Edge Removal, Visualizations
Figure 4 in the main text shows how the quantitative measurements of four topics change if an edge is removed
from the network if a collaboration is not repeated after a finite amount of time. Figures S4-S7 show the network
visualizations that accompany those quantitative measurements. In each figure, each row shows how the co-authorship
network evolves over time for a given edge survival lifetime (that is to say, the four rows in each of these diagrams
correspond to the four lines in each of the panels in Figure 4). Disconnected single nodes are not pictured.
The co-authorship networks for both Topic 5 (Figure S4) and Topic 19 (Figure S5) robustly grow to form large
connected components for survival times of 5 years. By contrast, the co-authorship networks for Topic 38 (Figure S7)
are less robust to edge removal, and only for survival times of longer than 10 years does the giant component appear
to form. The co-authorship network for Topic 12 (Figure S6) only contains a treelike connected component if edges
are allowed to survive indefinitely. Allowing edges to be removed only breaks up this largest component.
9
FIG. S4. Topic 5 Network Visualizations with Edge Removal: The giant component formation is somewhat suppressed for
short survival times (2 years, top row), although a single large connected component does form. The dense giant component
forms robustly for survival times longer than 5 years (bottom three rows).
10
FIG. S5. Topic 19 Network Visualizations with Edge Removal: Similar to the network for Topic 5 shown in Figure S4 above,
the giant component is somewhat suppressed for short survival times (2 years, top row), although large connected components
do form. The dense giant component forms robustly for survival times longer than 5 years (bottom three rows).
11
FIG. S6. Topic 12 Network Visualizations with Edge Removal: The co-authorship network only forms relatively small treelike
connected component if edges are allowed to survive indefinitely. Allowing edges to be removed only breaks up this largest
component.
12
FIG. S7. Topic 38 Network Visualizations with Edge Removal: For short survival times (2 years and 5 years, top 2 rows), no
component develops. For longer survival times (10 years, third row), a sparse, treelike large component does form. Only for
very long survival times (bottom row) does the largest component appear to densify. The co-authorship network for Topic 38
is less robust to removal than those of Topic 5 (Figure S4) and Topic 19 (Figure S5).
Appendix F: Review Articles
13
The topic model also appears to identify a set of articles as review articles that are distinguished according to their
stylistic content. In addition to reflecting standard research terminology, Topic 8 has keywords such as "review,"
"comment," and "discuss." The articles strongly associated with Topic 8 are often also associated with other Topics.
Topic 8 is different from a "junk topic" in that it contains an interpretable stylistic theme without having a coherent
scientific theme. The articles associated with Topic 8 have lots of terms in common, but those terms lack the specificity
of the scientific terminology detected in some of the other topics. As such, one cannot expect that the authors who
contributed to the articles associated with Topic 8 have common research interests, and so no giant component of
collaborators should form in the co-authorship network. Figures S8 and S9 show how the cliques in Topic 8's co-
authorship network fail to join together. Even though Topic 8's articles share a common set of terminology, the
co-authorship network does not form a giant component. Only when a topic's keywords reflect a coherent scientific
theme does a giant component form.
FIG. S8. Topic 8 Network Visualizations: The co-authorship network remains a disjointed collection of cliques.
FIG. S9. Topic 8 Network Measurements: In contrast to Topic 5 and Topic 19 seen in Figure 2, no giant component forms.
2004006008000.00.20.40.60.81.0Giant Component SizeMeasurementNull Model200400600800Nodes (Authors)0246810Mean Path LengthMeasurementNull Model |
1308.1160 | 1 | 1308 | 2013-08-06T02:55:11 | Coolhunting for the World's Thought Leaders | [
"cs.SI",
"eess.SY",
"physics.soc-ph"
] | Which thinkers are we guided by? A novel "Thought Leader Map" shows the select group of people with real influence who are setting the trends in the market for ideas. The influencers in philosophy, sociology, economics, and the "hard sciences" have been identified by a Delphi process, asking 50 thought leaders to name their peers. The importance of the influencers is calculated by constructing a co-occurrence network in the Blogosphere. Our main insight is that the era of the great authorities seems to be over. Major thought leaders are rare - the picture is composed of many specialists. | cs.SI | cs | PROCEEDINGS COINs13
MIT
CCI
COOLHUNTING FOR THE WORLD’S THOUGHT LEADERS
5
Cambridge
Center
Cambridge
MA
02138
Peter A. Gloor
[email protected]
Karin Frick, Detlef Guertler,
GDI Gottlieb Duttweiler Institute
Langhaldenstrasse 21
CH-8803 Rüschlikon/Zurich
Switzerland
{karin.frick, detlef.guertler}@gdi.ch
ABSTRACT
Which thinkers are we guided by? A novel “Thought
Leader Map” shows the select group of people with
real influence who are setting the trends in the market
for ideas. The influencers in philosophy, sociology,
economics, and the “hard sciences” have been
identified by a Delphi process, asking 50 thought
leaders to name their peers. The importance of the
influencers
is calculated by constructing a co-
occurrence network in the Blogosphere. Our main
insight is that the era of the great authorities seems to
be over. Major thought leaders are rare – the picture
is composed of many specialists.1
MOTIVATION
Who are
the
thought
leaders shaping current
discourse on the future of business and society? What
are the new global perspectives and theories helping
to drive social change and innovation?
Every year, numerous lists are published about the
world’s largest companies, the most promising start-
ups, the strongest consumer brands, the richest
individuals, the most successful sports stars, the top
chefs and the most important trends in technology.
Unlike these lists of business or technology leaders
and trends, the most important thought leaders and
trends shaping our society have not been subjected so
far to any truly systematic analysis and regular
publication – nothing remotely comparable to the
analysis behind Gartner’s technology trends, for
example. And yet the market of “big” ideas also
yields both innovators and trends, which guide the
decisions made within politics and business, which
influence public opinion and which inspire further
research or attract investors – and which are therefore
well worth monitoring. As a rule, the importance of
individual thinkers is measured on the basis of
frequency of citation (citation index), sales figures
from non-fiction and reference works, and academic
1 This paper is an extended version of (Frick 2012)
published in German in the GDI Impuls Magazine.
accolades (e.g. the Nobel Prize). Magazines such as
Foreign Policy and Time publish annual lists of
leading personalities
from business, politics,
research, art and culture, based on the results of
polling experts for their opinions. And the TED.com
website beautifully showcases the current leaders in
the market for ideas, showing which talks with ideas
for
the future have had
the most views and
recommendations. While such rankings can give a
rough idea of the popularity of individual thought
leaders, they say little about the size of their actual
influence, nor about the trendsetters in the market of
ideas and how these ideas propagate. Nor do they
show how the various thinkers and doctrines are
interconnected – and who is influencing whom. New
ideas are not created in a vacuum but in the act of
engagement with a range of separate doctrines:
accordingly, one must also consider these ideas in
their juxtaposition to views held by other academics
and researchers. A thinker gains influence only if his
or her ideas attract attention, are taken on board by
others and are then discussed in depth. This not only
means discussions held within an inner circle or
research group but also the wider, subsequent debate
with a broader public, which also includes laypeople.
Today, the most important marketplace for new ideas
is the Internet, where they are first presented,
disseminated and most vigorously debated. If we
want to gauge the actual influence thinkers possess,
we therefore need to assess their status on the net and
the intensity of debate in the virtual infosphere about
these people and their ideas.
OUR APPROACH
To analyze the status and the popularity of selected
thought leaders in the infosphere/blogosphere, we
have been using the network analysis tool Condor
(Gloor & Zhao 2004). The same method has been
used for analyzing product brands, or measuring
stocks, for example. We have been working with this
approach since 2005 to compare the positioning of
brands, companies, concepts or individuals in the
infosphere and to produce graphics of this kind. The
2
software itself doesn’t care whether the subject is
Pepsi vs. Coke, Obama vs. Romney or Krugman vs.
Kahneman. We started our list by manually selecting
a list of over 100 thinkers in the fields of philosophy,
sociology, economics, and the “hard sciences” based
on the assessment of three researchers based on
extensive literature research. These thinkers were
then ranked using the following process: To find the
most significant pages about a certain thought leader
involves
the application of a
subject-driven
betweenness algorithm similar to Google’s page rank.
Condor collects the most important Blogs mentioning
say “Daniel Kahnemann”, and then plugs these URLs
into a Web search engine to see which other blogs
link back to them. While Google’s page rank is fixed
with each website having a predetermined value, our
page rank is topic-based: for debates about ideas, the
“Huffington Post” has very high relevance, for
example – but very low relevance for conversations
about dog food.
Figure 1. Most important blogs for thought leaders
(sorted by betweenness centrality)
important Websites
the most
Figure 1 shows
collected through this process, listing the Web sites
from figure 2 by their betweenness in the network.
While the search was run on the entire Web, the top
scoring blogs were all English-language blogs. For
the resulting visualization (figure 2) Condor is using
a graph-layout algorithm based on force-directed
spring layout, where two people are connected if they
appear on the same Web page. To put it in other
words: the more often two thinkers are named
together in the infosphere, the closer together they are
shown here in the graph. The size itself is determined
by betweenness centrality, which is influenced by the
citation frequency and by the relevance of the pages
on which they are featured. Our Coolhunting tool
Condor then generates this image by aggregating the
links between the individuals analyzed.
Making use of the fact that – other than general Web
sites – blogs are continuously updated, this method is
very sensitive to the time when the blog queries have
been conducted. When this analysis was carried out
(August/September 2012),
for example, Thilo
Sarrazin had just published his most recent book
“Europe doesn't need the euro” – and this had a
positive effect on his ranking. Re-evaluating his
position six months later, his position will certainly
be quite different – and thinkers who are then being
hotly debated will have a higher
relevance.
Comparisons over extended periods of time will let
us distinguish between “one-hit thinkers” and long-
term thought leaders.
A FRAGMENTATION OF IDEAS
The results of this network analysis present a highly
fragmented picture. There are no thinkers who really
dominate the landscape: the distance between the
«stars» and the less significant and less well-known
researchers is relatively small and presumably only
temporary. Other analyses will reveal the degree to
which the relative social network positions change
over time. The era of the great authorities seems to be
over. Instead of a handful of key thinkers, we see a
broad spectrum of specialists, who focus on niche
topics, who remain generally unknown outside their
specialist field and whose work is not discussed
(figure 2 and table 1 in the appendix). As with the
market for books and films, the market for ideas also
seems increasingly a niche market, where major ideas
and their creators are now losing ground to minor
ideas and unknown researchers. Attention is no
longer focused on the next big idea or the next
Einstein, but is now increasingly divided up among
many small-scale ideas – the “long tail of ideas”.
This picture – namely the absence of authoritative
thinkers and key concepts that influence whole
generations of intellectuals – seemed so extraordinary
that we tested it by means of a different assessment
technique: we surveyed contributing authors to the
journal GDI Impuls, a German knowledge and ideas
magazine published by GDI. We asked these former
authors for GDI Impuls (experts from both research
3
and practice) to name the thinkers who have most
strongly influenced their own work and also the
persons who will be the thought leaders of the 21st
century. Receiving no prior briefing, fifty experts
from home and abroad (including such luminaries as
were already ranked in our Thought Leader list)
generated a list of around 300 different names. On
this long list of the major thinkers of yesterday and
tomorrow, multiple mentions are rare. Karl Marx (5),
Niklas Luhmann (4) and Michel Foucault (3) are the
most-cited thinkers from the past, whose ideas have
most strongly influenced the work of our experts.
Figure 2. Thought leader map
(3),
(5), Anthony Giddens
Daniel Kahneman
Malcolm Gladwell (3) and Paul Krugman (3) top the
list of the most important thinkers for the 21st
century. All in all, then, this survey gives us the same
picture as that from the network analysis: it’s not
about altitude, but latitude.
Economists rule
A thought leader’s importance depends on the one
hand on whom you ask and on the other, on how one
measures it. If we take the citation frequency in
academic journals as our benchmark, we
find the behavioral economist and Nobel
Prize winner Daniel Kahneman also
among
the
leaders
(table 1
in
the
appendix), but the remaining positions in
the Thought Leader map now look very
different: Thilo Sarrazin, author and
former Berlin Finance Senator, would no
longer be ranked first, for example, but
would be bringing up the rear. This seems
to indicate that individuals who carry little
weight in research circles may be ideas
market trendsetters, however, and can –
for a certain period of time – set the
agenda of public debate. If we take
Google search hits as our benchmark then
our
rankings
once
again
change
completely. Of the thinkers we consider,
the physicist Stephan Hawking now has
the most Google hits – although he is a
mid-fielder in terms of network status.
Only Daniel Kahneman
achieves
consistently high rankings. It appears,
therefore, that a strong online presence
does not automatically lead to the actual
discussion of an idea – and thus to a
greater influence on the zeitgeist – than
ideas whose creators have fewer Google
hits. The field of influential thinkers is
broad and too large to present in its
entirety on the Thought Leader map. If we
consider our thought leaders’ disciplines,
however, and the universities at which
they work, then the field contracts once
again. The
categories
have
been
determined based on the thought leaders’
Wikipedia pages and home pages.
Discussions about the future are clearly
dominated by economists (24), followed
by political theorists (8), social theorists
(7) and philosophers (5). Scientists, in
in
represented
less
are
contrast,
discussions about the future in purely quantitative
terms. Yet these few individuals – biologists (5),
computer scientists (4), physicists (3) and chemists
4
(2) – are nonetheless all ranked in the upper half of
the thought leader list, i.e. they enjoy above-average
popularity in the blogosphere. Individual thinkers are
not the only constituent parts of the network. Their
environment – friends, research partners, students,
sponsors and institutions where they work – also
plays a part. Here, we note that the traditional elite
universities continue to exert a powerful influence:
Harvard (12) leads New York (6), Princeton, London
(4 each), Yale and Columbia (3 each). While
knowledge creation continues to become more and
more open, and operates much like a bazaar – where
many thinkers develop and exchange a wide variety
of new ideas – the universities, as “cathedrals of
learning”, have clearly not
their central
lost
importance (Raymond 1999).
today, still write a book that gets one noticed and
triggers a debate
is clearly necessary for
that
disseminating one’s ideas. A book makes the idea
tangible and durable, ensuring
that people’s
engagement with the idea can develop and grow, both
online and offline. The US social theorist Randall
Collins (1998) has written what is probably the most
comprehensive work on the formation of intellectual
standpoints. One core aspect of his theory is that new
ideas are always generated by the rivalry between
contemporary thinkers, and that creativity is at its
highest when there is an especially high level of
friction between competing ideas. If one therefore
assumes that new ideas are generated by engagement
and debate, it is interesting to track the viewpoints
between which these lines of conflict are drawn up
Figure 3. Key terms in Blog posts about thinkers
today.
Writing a Book is key
Figure 3 shows a tag cloud generated with Condor
based on the text nearest to the names of the thinkers
on the blog posts, illustrating the big role Harvard,
Facebook, and the US President play in launching
new ideas. At the same time we also notice a
spillover effect from the banking crises, leading to a
discussion of new social models and ethics. Thinkers
who generate a strong response from the blogosphere
and occupy a central position in the thought leader
network are also successful authors in their own right
and have produced one or more bestsellers in recent
years. Out of the 76 thought leaders we surveyed, 74
have written at least one book. It seems, therefore,
that the book continues to be the medium of choice
for making one’s ideas heard and achieving a central
role in the knowledge market. Accordingly, it seems
that anyone wishing to change the world must, even
WIKIPEDIA ADDS A MULTICULTURAL
DIMENSION
Our thinker short-list seems to favor the West.
Viewed from India, the Middle East or China, the
Thought Leader map might look quite different.
To compare key leaders across different cultures, we
use a completely different set of sources. We
therefore also applied another method (Kleeb et al.
2012) where we constructed a global link network
using Wikipedia as the source. Articles about people
in Wikipedia include many social cues about a
particular person. In the English Wikipedia there is a
category called “Living People” which includes
articles of people currently alive. To construct the
social network of living people, we collected each
article’s contents and extracted the internal links to
other living people articles. Similarly to the Google
page rank algorithm, this linking structure gives us a
5
clue about which person is more prominent from the
Wikipedians’ perspective. As metric of importance
we took the ratio between in-degree and out-degree
because having a higher in-degree might be a proxy
for the power or importance of the person described
in the article. Because the size of the original map
was too huge, we only included articles having more
than a predefined number of incoming links and
those peripheral articles that have a direct link to the
most prominent articles.
Figure 4.World leaders according to the 2011
English Wikipedia (Kleeb 2011)
Figure 5. World leaders according to the Spanish
2011 Wikipedia (Kleeb 2011)
To draw a temporal map of the “living people
network”, we collected snapshots of the contents of
the living people articles at different points in time.
We also visualized living people networks in seven
different-language Wikipedias (English, German,
Spanish, French, Chinese, Arabic, Korean, Japanese)
collecting the articles of people who were born after
1880 and not dead until 2010. Figure 4 shows the key
leaders in the English Wikipedia, figure 5 the same
for the Spanish Wikipedia.
Obviously the world view of Spanish speakers is
rather different from native English speakers, with
former Chilean president Michele Bachelet, and
movie dirctor Pedro Almovodar occupying central
positions.
CONCLUSIONS
The new ideas show great diversity: the
question of whether the field will continue to
differentiate or consolidate can be answered
only in the long term. The diversity of ideas
and thinkers also reflects the complexity of the
world itself, which is “too big to know”
(Weinberger, 2012). Knowledge volume and
rate of growth are now too great for the market
to be dominated by just a few ideas. Never
have there been so many researchers as today
– nor has academic output ever been so
diverse. We can no longer rely on the old
measurement systems as a means of orienting
ourselves and finding relevant, new ideas. Our
Thought Leader map is an attempt to establish a new
approach for classifying the most influential thinkers
and trends in published research. We will continue to
develop this ranking system and will conduct further
network analyses at regular time intervals, combining
our
system with
blog-ranking
polling-based
autogenerated maps from Wikipedia.
REFERENCES
Collins, R. (1998) The Sociology of Philosophies. A
Global Theory of Intellectual Change”, Belknap
Press of Harvard University Press.
Frick, K. (2012) The Megatrendsetters. GDI Impuls,
issue 4.
Gloor, P. Zhao, Y. (2004) TeCFlow - A Temporal
Communication Flow Visualizer for Social
Networks Analysis , ACM CSCW Workshop on
Social Networks. ACM CSCW Conference,
Chicago, Nov. 6.
Kleeb, Reto, Peter A. Gloor, Keiichi Nemoto, and
Michael Henninger. (2012) "Wikimaps: dynamic
maps of knowledge." International Journal of
Organisational Design and Engineering 2, no. 2:
204-224.
Raymond, E. (1999). The cathedral and the bazaar.
Knowledge, Technology & Policy, 12(3), 23-49.
Weinberger, D. (2012) Too Big to Know: Rethinking
Knowledge Now That the Facts Aren't the Facts,
6
Experts Are Everywhere, and
the Smartest
Person in the Room Is the Room. Basic Books
Table 1. (Frick
2012) Top 41 key
thinkers (out of 76)
ranked by our
approach,
compared against
citation index and
search hits
|
1702.00048 | 1 | 1702 | 2017-01-31T20:37:04 | When Follow is Just One Click Away: Understanding Twitter Follow Behavior in the 2016 U.S. Presidential Election | [
"cs.SI"
] | Motivated by the two paradoxical facts that the marginal cost of following one extra candidate is close to zero and that the majority of Twitter users choose to follow only one or two candidates, we study the Twitter follow behaviors observed in the 2016 U.S. presidential election. Specifically, we complete the following tasks: (1) analyze Twitter follow patterns of the presidential election on Twitter, (2) use negative binomial regression to study the effects of gender and occupation on the number of candidates that one follows, and (3) use multinomial logistic regression to investigate the effects of gender, occupation and celebrities on the choice of candidates to follow. | cs.SI | cs |
When Follow is Just One Click Away: Understanding Twitter Follow Behavior in
the 2016 U.S. Presidential Election
Yu Wang
Computer Science
University of Rochester
Rochester, NY 14627
[email protected]
Xiyang Zhang
Psychology
Beijing Normal University
Beijing 100875
[email protected]
Jiebo Luo
Computer Science
University of Rochester
Rochester, NY 14627
[email protected]
Abstract
Motivated by the two paradoxical facts that the marginal cost
of following one extra candidate is close to zero and that the
majority of Twitter users choose to follow only one or two
candidates, we study the Twitter follow behaviors observed in
the 2016 U.S. presidential election. Specifically, we complete
the following tasks: (1) analyze Twitter follow patterns of the
presidential election on Twitter, (2) use negative binomial re-
gression to study the effects of gender and occupation on the
number of candidates that one follows, and (3) use multino-
mial logistic regression to investigate the effects of gender,
occupation and celebrities on the choice of candidates to fol-
low.
Introduction
President Obama is often credited as the first to extend his
political campaign onto social media during his first presi-
dential run in 2008 (Tumasjan et al. 2010). Eight years later
in the 2016 presidential election, social media was consid-
ered to be Donald Trump's most powerful weapon (Alaimo
2016; Lockhart 2016). After winning the election, Donald
Trump himself commented that tweeting "is a great way
of communication" (Stahl 2016). In his book Our Revo-
lution, which reflects on the 2016 presidential campaign,
Bernie Sanders suggests that one of the reasons why his
campaign did well is the campaign team's success with
social media (Sanders 2016). One opinion shared by both
Trump and Sanders is that having a large number of follow-
ers on Twitter is an invaluable campaign asset (Stahl 2016;
Sanders 2016).
Given the prominent role that Twitter played in the
presidential election, a systematic study of how individuals
behave on Twitter and the informing factors underlying the
observed behavior is warranted. Our work is motivated (1)
by the paradoxical observation that most individuals choose
to follow only one or two presidential candidates, when the
marginal cost of following the fifteen others is just one click
away and therefore technically close to zero, and (2) by the
common criticism that Twitter follow is not a strong signal
of support. We started by compiling the entire universe of
the 2016 U.S. presidential election on Twitter.
Copyright c(cid:13) 2017, Yu Wang, Xiyang Zhang and Jiebo Luo. All
rights reserved.
Figure 1: We use first names, profile images and family roles to
identify gender, and we extract from self-descriptions individuals'
occupations.
We recorded all the 15.5 million individuals who were
following one or more of the 16 candidates in early April,
2016. With such a rich dataset, we are able to (1) explore the
most frequent follow patterns among these 15.5 million in-
dividuals, (2) explore the correlation between following two
different candidates and examine the question of electorate
polarity, (3) study the effects of gender and occupation on
the number of candidates that one chooses to follow with
negative binomial regression, and (4) study the effects of
gender, occupation and the endorsement of celebrities on the
choice of candidates. When coding the variable gender, we
integrate information from first names, profile images and
self descriptions (Figure 1) and we show in the paper that
the effect of gender is consistent across all the three chan-
nels.
The contributions of our paper are as follows: (1) we
demonstrate to what extent the leading presidential candi-
dates have dominated the Twitter sphere using a weighted
follower metric, (2) we quantitatively measure how polar-
ized Twitter followers are when it comes to choosing pres-
idential candidates across party lines, (3) we show that
women tend to follow fewer candidates than men and that
journalists are more likely to follow a large number of can-
didates, (4) we find that women tend to follow Democratic
candidates, which supports the idea that women vote fol-
lowing party lines (Miller 2016), and (5) we find that peo-
ple who follow celebrities such Beyonc´e, Lebron James and
Lady Gaga are more likely to be following candidates of
both parties and that when choosing between Hillary Clin-
ton and Bernie Sanders, endorsements by these celebrities
favor Clinton.
Related Literature
Our paper builds on previous literature on electoral studies,
data mining and computer vision.
Previous work has studied the increasing polarization of
American politics at both the elite level (Hare and Poole
2014; McCarty, Poole, and Rosenthal 2009) and the mass
level (Campbell 2016; Doherty 2014). Druckman et al., in
particular, study how elite partisan polarization affects pub-
lic opinion formation and find that party polarization de-
creases the impact of substantive information (Druckman,
Peterson, and Slothuus 2013). Social clustering, on the other
hand, is analyzed in (McPherson, Smith-Lovin, and Cook
2001; Barber´a 2015). In our work, we contribute to analyz-
ing political polarization at the public level on Twitter.
Gender plays an important role in the forming and dis-
solving of relationships (Burt 2000), in online behavior (Ot-
toni et al. 2013) and in political voting (King and Mat-
land 2003; Dolan 2008; Brians 2005; Wang et al. 2016).
One common observation is that women tend to vote for
women, which is usually referred to as gender affinity ef-
fect. In this paper we will analyze specifically the effects
of gender on the number of presidential candidates that an
individual chooses to follow and on which party that one
chooses to follow.
Given the importance of gender in real applications, a
large number of studies have attempted to classify gender
based on user names (Mislove et al. 2011; Nilizadeh et al.
2016), tweets, screen name and description (Burger et al.
2011) and friends (Zamal, Liu, and Ruths 2012). Following
this line of research, our study will take advantage of in-
formation from both user names and user-provided descrip-
tions.
Recent advances
in computer vision (Krizhevsky,
Sutskever, and Hinton 2012; Simonyan and Zisserman 2015;
Srivastava, Greff, and Schmidhuber 2015; He et al. 2016),
on the other hand, have made object detection and classi-
fication increasingly accurate. In particular, face detection
and gender classification (Farfade, Saberian, and Li 2015;
Jia and Cristianini 2015; Levi and Hassner 2015) have both
achieved very high accuracy, largely thanks to the adop-
tion of deep learning (LeCun, Bengio, and Hinton 2015)
and the availability of large datasets (Huang et al. 2007;
Jr. and Tesafaye 2006; Phillips et al. 1998) and more re-
cently (Guo et al. 2016). Our paper extracts gender-related
information based on Twitter profile images and is related
to gender classification using facial features (Levi and Has-
sner 2015; Ginosar et al. 2015; Wang, Li, and Luo 2016;
Wang et al. 2016; Nilizadeh et al. 2016).
Data
Our dataset includes two components, both of which come
from Twitter. The first component consists of the followers'
Twitter ID information for all the presidential candidates in
Table 1: The Number of Followers (April, 2016)
# Followers Candidate
23,282 Clinton (D)
130,119 Sanders (D)
25,731 Bush
Candidate
Chafee (D)
O'Malley (D)
Webb (D)
Carson (R)
Cruz (R)
Kasich (R)
Paul (R)
Trump (R)
Note: Sorted by party affiliation and alphabetically.
266,534 Huckabee (R)
841,663 Rubio (R)
7,386,778 Walker (R)
1,248,240 Christie (R)
1,012,955 Fiorina (R)
# Followers
5,855,286
1,859,856
25,731
120,934
672,863
460,693
1,329,098
226,282
April, 2016. This component is exhaustive in the sense that
we have recorded all the followers' IDs. In total, there are
15,455,122 individuals following the 16 presidential candi-
dates and some of them are following more than 1 candi-
date. We transform this component into a 15.5 million by 16
matrix of 1's and 0's, with each row representing an indi-
vidual and each column a presidential candidate. We report
the summary statistics in Table 11. It can be easily observed
that Donald Trump and Marco Rubio have the largest num-
bers of followers among the Republican candidates and that
Hillary Clinton and Bernie Sanders have the largest numbers
of followers among the Democratic candidates.
The second component of our dataset has 1 million indi-
viduals, randomly sampled from the first component.2 Based
on these individuals, we extract user name, user-provided
description, the starting year of using Twitter, social capital
(Wang et al. 2016), and the profile image (Wang, Li, and Luo
2016).
The third component comprises follower information of
Beyonc´e, Lady Gaga, Lebron James, three media celebrities
all of whom have explicitly endorsed Hillary Clinton. These
three celebrities constitute a significant presence among in-
dividuals who follow the presidentail candidates: 5.65% of
the individuals in the dataset follow Beyonc´e, 15.9% follow
Lebron James and 19.58% follow Lady Gaga. In the book
Our Revolution, Bernie Sanders also emphasizes the impor-
tance of celebrity support (Sanders 2016). Donald Trump,
by contrast, contended that he does not need celebrities to
fill up rallies, when Jay Z and Beyonc´e held public events
to rally votes for Clinton.3. This data component then en-
ables us to analyze the celebrity effect in a quantitative man-
ner: whether individuals who follow these celebrities are
also more likely to follow the candidates who have won the
celebrities' endorsement.
We summarize the variables used in this work and their
definitions in Table 2.
1The number of followers is changing every minute. To make
sure the statistics are comparable across candidates, we decided to
collect the data exclusively between April 1st and April 7th, 2016.
2To faciliate replication of our results, we have set the random
seed (Python) to 11.
3https://www.washingtonpost.com/video/politics/trump-we-
dont-need-jay-z-to-fill-up-arenas/2016/11/05/25d536e2-a365-
11e6-8864-6f892cad0865 video.html.
Name
Independent variables:
Tweets
Social Capital
Journalist
Name
Image
Description
Female
Beyonc´e
Lady Gaga
Lebron James
Celebrity
Dependent variables:
# Candidates
Count, number of tweets posted
Count, number of followers
Binary, a journalist
Binary, female based on first names
Binary, female based on profile
images
Binary, female based on self-provided
descriptions
Binary, female by first name or image
or description.
Binary, follow Beyonc´e
Binary, follow Lady Gaga
Binary, follow Lebron James
Binary, follow Beyonc´e or Lady Gaga
or Lebron James
Count, number of candidates
that one follows
Table 2: Variable Definitions
Definition
Democrat follower Binary, follow Democrats only
Republican follower Binary, follow Republicans only
Independent follower Binary, follow both Democrats
and Republicans
Binary, follow Bernie Sanders
Binary, follow Hillary Clinton
Bernie Sanders
Hillary Clinton
Note: (1) Following previous studies (Wang et al. 2016), we define
social capital on Twitter as the raw number of followers. (2) By con-
struction, Democrat follower, Republican follower and Independent
follower always sum up to 1.
Methodology
Gender classification
We employ three methods to extract information on gender.
As in several prior studies (Mislove et al. 2011; Nilizadeh
et al. 2016), we first compile a list of 800 names, based on
appearance frequency on Twitter, that are gender-revealing,
such as Mike, Jake, Emily, Isabella and Sarah.4 This con-
stitutes our first channel. We then use this list to classify
individuals whose names are contained in this list. As one
would expect, a large number of individuals can not be clas-
sified with this list.
Our second channel is the profile image. We train a con-
volutional neural network using 42,554 weakly labeled im-
ages, with a gender ratio of 1:1. These images come from
Trump's and Clinton's followers. We infer their labels using
the followers' names (channel 1). For validation, we use a
manually labeled data set of 1,965 profile images for gen-
der classification. The validation images come from Twitter
as well so we can avoid the cross-domain problem. More-
over, they do not intersect with the training samples as they
come exclusively from individuals who unfollowed Hillary
Clinton before March 2016.
4The complete name list is available for download on the first
author's website.
The architecture of our convolutional neural network is
reported in Figure 2, and we are able to achieve an accuracy
of 90.18%, which is adequate for our task (Table 3).5
Table 3: Summary Statistics of CNN Performance (Gender)
Architecture
2CONV-1FC 91.36
Precision Recall
90.05
F1
90.70
Accuracy
90.18
Third, we extract gender-revealing keywords from user-
provided descriptions. These keywords are papa, mama,
mom, father , mother, wife and husband.
We prioritize the first channel (first names) most and the
third channel (self description) the least. Only when the
more prioritized channels are missing do we use the less
prioritized channels:
first names > profile images > self descriptions
Based on this ranking, we are able to label 38.7% of the
observations from first names, another 17.2% with profile
images and 0.7% with self descriptions. In total, we are able
to classify 56.6% of the 1 million individuals. We summarize
the number of labeled individuals and the net contribution of
each channel in Table 4.
Table 4: 3-Channel Classification of Gender
First Name Profile Image Self Description
1
Channel
Priority
Identification 387,148
Contribution 38.7%
Note: Partly as a result of our priority ranking, the net contri-
bution of profile images is significantly smaller than first names.
The net contribution of self descriptions (3rd channel) is about 1
percent.
2
304,278
17.2%
3
30,786
0.7%
Negative binomial regression
Our work is motivated by the observation that the majority
of individuals choose to follow only one or two candidates
when the marginal cost of "following" other candidates is
just one click away. In order to understand this phenomenon,
especially the role that gender plays, we apply the negative
binomial regression (Greene 2008) and link the number of
candidates that one follows, which is count data, to the ex-
planatory gender variable. In this regression, the conditional
likelihood of the number of candidates that individual j fol-
lows, yj, is formulated as
f (yjvj) =
(vjµj)yj e−vj µj
Γ(yj + 1)
where µj = exp(xjβββ) is the link function that con-
nects our explanatory variables to the number of candi-
dates that one chooses to follow and vi is a hidden variable
5The trained model has been deployed at our demo website.
Figure 2: The CNN model consists of 2 convolutional layers, 2 max-pool layers, and a fully connected layer.
with a Gamma( 1
α, α) distribution. After plugging in the ex-
planatory variables, the unconditional log-likelihood func-
tion takes the form:
N
X
j=1
lnL =
[ln(Γ(m + yj) − ln(Γ(yj + 1)) − ln(Γ(m))
+ mln(pj) + yjln(1 − pj)]
p = 1/(1 + αµ)
m = 1/α
µ = exp(β0 + β1Tweets Posted + β2Follower Count
+ β3Journalist + β4Year Fixed Effects
+ β5β5β5 · Name + β6β6β6 · Image
+ β7β7β7 · Description + β8β8β8 · Female)
where α is the over-dispersion parameter and will be
estimated as well.
Multinomial Logistic Regression
Besides the number of candidates, another question we try to
answer is which candidates one chooses to follow. For this
purpose, we identify three classes: (1) follow Democratic
candidates only, (2) follow candidates from both parties, and
(3) follow Republican candidates only. We use the class c
as the dependent variable and formulate the probability of
each observation in a multinomial logistic setting (Maddala
1983):
P 1 = P r(c = 1) =
P 2 = P r(c = 2) =
P 3 = P r(c = 3) =
exβ1
exβ1 + 1 + exβ3
1
exβ1 + 1 + exβ3
exβ3
exβ1 + 1 + exβ3
where x is the vector of explanatory variables: number of
posted tweets, number of followers, being a journalist (bi-
nary), gender, following a celebrity and year controls. No-
tice that the coefficients for the second class (following can-
didates from both parties) have been normalized to 0 to solve
the identification problem.
The log-likelihood function then takes the form:
lnL =
[δ1iln(P1) + δ2iln(P2) + δ3iln(P3)]
n
X
i=1
where δij=1 if i=j and 0 otherwise. Note that logistic re-
gression, which we will use to differentiate the celebrity ef-
fects on Hillary Clinton and Bernie Sanders, is a special case
of the multinomial logistic regression with β3 set to zero.
Results
In this section, we report on (1) election follow patterns ob-
served on Twitter (2) negative binomial regression analysis
of the number of candidates that one follows (3) multinomial
logistic regression analysis of gender affinity effects on the
choice of candidates and (4) logistic regression analysis of
celebrity effects.
Election F ollow Patterns on Twitter
In Table 5, we report on how committed each candidate's
followers are. By commitment, we mean how many of the
followers follow only that one specific candidate. It can be
seen that Clinton, Trump and Sanders have highest percent-
ages of 'committed' followers in the Twitter sphere, whereas
only 9 percent of Bush's 529,820 followers follow him alone
and 89 percent of Cruz's 1,012,955 followers follow other
candidates besides Cruz. This suggests that while having a
large number of followers is always beneficial, not all fol-
lowers are equally committed.
To overcome this problem, we propose a simple and intu-
itive method to weight each follower by the reciprocal of the
total number of candidates that he or she is following. For
example, an individual who follows Bernie Sanders, Don-
3 , and an
ald Trump and Ted Cruz will receive a weight of 1
individual who follows Hillary Clinton only will receive a
weight of 1. Mathematically, the Twitter share of candidate
j is then calculated as:
i=1 δijweighti
i=1 δikweighti
sharej = Pn
Pm
k=1Pn
Pm
k=1 δik
1
weighti =
28
1
5
5
28
3
Max-pooling(2x2)
5
5
14
7
7
64
Max-pooling(2x2)
14
32
2
1024
Table 5: Follower Engagement for Each Candidate (in Dec-
imals)
Candidate
Chafee
Clinton
O'Malley
Sanders
Webb
Bush
Carson
Christie
Cruz
Fiorina
Kasich
Huckabee
Paul
Rubio
Trump
Walker
# 1
0.39
0.75
0.29
0.6
0.15
0.09
0.24
0.11
0.11
0.41
0.25
0.28
0.2
0.25
0.72
0.14
# 2
0.13
0.16
0.23
0.23
0.13
0.16
0.19
0.13
0.17
0.15
0.13
0.15
0.16
0.16
0.14
0.08
# 3
0.08
0.04
0.17
0.07
0.1
0.14
0.14
0.12
0.18
0.08
0.1
0.11
0.14
0.15
0.05
0.08
# 4
0.06
0.02
0.07
0.03
0.09
0.11
0.12
0.09
0.15
0.07
0.08
0.09
0.12
0.13
0.03
0.08
# 5+
0.34
0.04
0.24
0.07
0.52
0.51
0.3
0.56
0.39
0.29
0.44
0.37
0.38
0.32
0.06
0.62
Note: '#5+' stands for 'following five or more presidential candi-
dates. For example, six percent of Trump followers follow five or
more candidates.
where n is the total number of followers (15,455,122), m is
the total number of candidates (16), δik is 1 if individual i
follows candidate k and 0 otherwise.
After applying this weighting mechanism, we find the
Twitter share of the leading candidates, such as Donald
Trump, Hillary Clinton and Bernie Sanders, further in-
creases. Their aggregated share of Twitter followers rises
from 68.7% to 80.1% (Figure 3).
Figure 3: Share of the three leading candidates Trump, Clinton
and Sanders further increases after weighting the followers.
We further analyze the top 15 most frequent patterns
present in the Twitter sphere (Table 6). One immediate ob-
servation is that Trump, Clinton and Sanders are the three
dominant forces in the Twitter sphere. 34.5% of the individ-
uals recorded in our exhaustive dataset are following Don-
ald Trump alone. 28.4% are following Hillary Clinton alone.
7.2% are following Sanders alone. These three groups ac-
count for 69.9% of the entire recorded population in our
dataset. Individuals who follow only Marco Rubio or Car-
son or Fiorina make up no more than 2 percent of the popu-
lation. Individuals who follow both Clinton and Trump con-
stitute 3 percent of the entire recorded population.6 Other
frequent 2-itemsets (Han, Kamber, and Pei 2011) include
Carson and Trump (1%), Sanders and Trump 0.6/% and Ru-
bio and Trump (1%). The only 3-itemset among the top 15
frequent pattern is Clinton, Sanders and Trump (0.5%).
Table 6: Top 15 Most Frequent Items in the Election's Twit-
ter Sphere
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
0.345 Trump
0.284 Clinton
0.072
Sanders
0.030 Clinton Trump [2-itemset]
0.021 Rubio
0.021 Clinton Sanders [2-itemset]
0.020 Carson
Fiorina
0.018
0.011
Paul
0.010 Carson Trump [2-itemset]
0.008 Kuckabee
0.007 Cruz
0.006
0.006 Rubio Trump [2-itemset]
0.005 Clinton Sanders Trump [3-itemset]
Sanders Trump [2-itemset]
We further examine how the decision of following one
candidate correlates with that of following another candi-
date using the Pearson correlation coefficient. One imme-
diate observation is that correlation between following can-
didates from the same party tends to be positive and corre-
lation between following candidates from different parties
tends to be negative (Figure 4). In particular, the correla-
tion is -0.51 between Clinton and Trump and -0.22 between
Sanders and Trump. By contrast, Marco Rubio and Ted Cruz
have a strong and positive correlation coefficient of 0.43.
This constitutes our first piece of evidence that individuals
on Twitter are also polarized (Campbell 2016).
Motivated by the fact that Twitter follow behavior appears
to cluster around the two parties, we refer to individuals who
follow Democratic candidates exclusively as Democrat fol-
lowers and refer to individuals who follow Republican can-
didates exclusively as Republican followers and lastly we
refer to those who follow candidates from both parties as In-
dependent followers.7 It turns out that 92% of the 15.5 mil-
lion followers are either Democrat followers or Republican
followers, i.e., they are following candidates from only one
party not both parties, which lends further support to the idea
that the public are polarized on Twitter (Campbell 2016).
6This number is surprisingly low and suggests that Twitter 'fol-
low' behavior is more of a signal of support/interest than commu-
nication as far as the presidential campaign is concerned.
7Note that this definition is based on Twitter follow behavior
not on real party affiliation.
Candidate
Chafee
Clinton
O'Malley
Sanders
Webb
Bush
Carson
Chris
Cruz
Fiorina
Kasich
Kuckabee
Paul
Rubio
Trump
Walker
Unweighted
Weighted
0.4
0.3
0.2
0.1
0.0
Share of Followers (April, 2016)
The coefficient on journalist measures whether journalists
tend to follow a larger number of the presidential candi-
dates (and we expect the answer to be yes). gender mea-
sures the effects of being female. Following (Burt 2000;
Wang et al. 2016), we expect the coefficient on gender to
be negative, i.e., women tend to follow fewer candidates.
We report our regression results in Table 7. Across all the
four specifications, we find that tweets, social capital and
journalist are all positively correlated with the number of
candidates that one chooses to follow. With respect to gen-
der, we find that regardless of the channel that we use (name
in Column 1, image in Column 2, description in Column 3,
all the three in Column 4), the coefficient on female is con-
sistently negative, suggesting that women are more likely to
follow fewer candidates. 8
Table 7: Negative Binomial: the Number of Candidates
Name
Image
Descr.
All
# Candidates
Tweets
2.906∗∗∗
(0.146)
Social Capital 2.168∗∗∗
(0.482)
0.249∗∗∗
(0.0234)
-0.0817∗∗∗
(0.00270)
Journalist
Name
2.180∗∗∗ 3.543∗∗∗ 2.427∗∗∗
(0.105)
(0.134)
1.153∗∗∗
1.282∗∗∗
(0.298)
(0.329)
0.201∗∗∗
0.223∗∗∗
(0.0208)
(0.0181)
(0.418)
0.753
(0.920)
0.0444
(0.0646)
-3.804∗∗∗ -4.327∗∗∗ -2.046∗∗∗ -4.320∗∗∗
(0.0600)
(0.0441)
387148
557777
(0.0330)
30786
(0.0826)
294987
Observations
Standard errors in parentheses
∗ p < 0.05, ∗∗ p < 0.01, ∗∗∗ p < 0.001
Multinomial Logistic Regression: Gender Affinity
Effect
Having demonstrated that women behave differently from
men in the number of candidates that they choose to fol-
low, in this subsection we analyze whether women also dif-
fer from men in choosing which candidates to follow. We
summarize the gender ratio of each candidates' followers in
Figure 6.9 It can be seen that Clinton has the highest female
to male ratio, followed closely by Bernie Sanders. Rand Paul
8In all the specifications, we have controlled for the year fixed
9We used all the three channels to extract gender-related infor-
effects.
mation.
-0.0286∗∗∗
(0.00340)
-0.150∗∗∗
(0.00936)
Yes
0.257∗
(0.129)
Yes
0.268∗
(0.134)
Yes
0.546
(0.319)
-0.0536∗∗∗
(0.00230)
Yes
0.299∗∗
(0.108)
Image
Description
Female
Year F.E.
Constant
ln(α)
Constant
Figure 4: Party clustering observed in Twitter following behavior.
Individuals who follow Trump are more likely to follow Ted Cruz
and Marco Rubio and less likely to follow Hillary Clinton or Bernie
Sanders.
Negative Binomial: Follow the Candidates
Having summarized the election f ollow patterns as a whole,
we are now ready to analyze the factors behind an individ-
ual's decision to follow a certain number of candidates. In
particular, while the marginal cost of following an extra can-
didate is close to zero, most individuals choose to follow
only 1 or 2 candidates (Figure 5).
Figure 5: This figure is generated using all 15.5 million observa-
tions. In spite of the low marginal cost of following extra people on
Twitter, most individuals chose to follow no more than 2 candidates
during the 2016 U.S. presidential election.
In the regression, we use the number of candidates that
one follows (# candidates) as the dependent variable. so-
cial capital, journalist and gender are the three variables
that we are particularly interested in. The coefficient on so-
cial capital would enable us to learn whether more promi-
nent individuals tend to follow more candidates or not.
(R) and Jim Webb (D) on the other hand have the lowest fe-
male to male ratio. In general, the Democratic candidates
mostly have a gender ratio close to or over 40%, while the
Republican candidates tend to have a gender ratio well be-
low 40%. Carly Fiorina, the only female candidate in the
Republican party, is the only Republican to reach 40%.
Independent follower, suggesting that individuals who are
following these celebrities are more likely to follow candi-
dates from both parties. This result is also consistent across
all the four specifications (5-8).
Figure 6: In percentage, the leading Democratic candidates
have more female followers than the leading Republican
candidates.
Building from previous studies (King and Matland 2003;
Dolan 2008; Brians 2005; Wang et al. 2016), we construct
a multinomial logistic regression model to test whether
women are more likely to follow Democratic candidates. In
addition, we examine whether followers of Beyonc´e, Lady
Gaga and Lebron James, all of whom have explicitly en-
dorsed Hillary Clinton, thus revealing support for Demo-
cratic causes, are more likely to follow Democratic candi-
dates exclusively.
We report our results in Table 7. Using Independent as
the baseline for comparison, we examine the role of social
capital, occupation, gender and celebrities. Across all spec-
ifications, we find that people with higher social capital and
people working as a journalist are more likely to be Indepen-
dent followers, i.e., following candidates from both parties.
From Columns 1 to 4, we examine the role of gender in
determining whom to follow. The coefficient on gender is
negative for Republican, positive for Democrat and 0 for In-
dependent, suggesting that women are more likely to follow
Democrats and less likely to follow Republicans (Figure 7).
This result is consistent across all the four specifications.
From Columns 5 to 8, we examine the role of celebrities
in determining whom to follow. The coefficient on celebrity
(Beyonc´e, Lebron James and Lady Gaga) is negative for
both Democratic follower and Republican follower and 0 for
Figure 7: As indicated by the slope, the effects of being female are
positive on Democrat, negative on Republican and slightly negative
on Independent.
Logistic Regression: Celebrity Effects
When comparing between Democratic followers, Republi-
can followers and Independent followers, we find that in-
dividuals who follow celebrities are more likely to be In-
dependent followers, i.e., they follow candidates from both
parties. In this subsection, we restrict our comparison to the
two dominant classes, Democratic followers and Republican
followers, which constitute 92% of our observations. In par-
ticular, we will analyze whether following celebrities who
have explicitly endorsed Hillary Clinton can affect (1) the
probability of being a Democratic follower over a Repub-
lican follower and (2) the probability of following Hillary
Clinton instead of Bernie Sanders.
We report our results in Table 8. When comparing
between Democrat followers and Republican followers
(Columns 1-5), we find that individuals who follow Beyonc´e
and Lady Gaga are more likely to be Democratic followers.
By contrast, those who follow Lebron James are more likely
to be Republican followers, which suggests that celebrities
and celebrity followers do not necessarily share the same
political opinion. In addition, we show in Column 3 that
the interaction variable James # Female has a positive and
significant coefficient, suggesting that effect of following
Lebron James is significantly smaller for females than for
males with regards to following the presidential candidates.
When restricting our observation to only Sanders follow-
ers and Clinton followers, we find that all the celebrity ef-
fects to be positive, suggesting that endorsements by these
celebrities are giving Hillary Clinton an edge over Sanders
for individuals who follow these celebrities.
0
Female
Independent
1
Democrat
0.6
Republican
0.4
Probability
0.2
-0.909
(0.605)
-5.104∗
(2.568)
-0.749∗∗∗
(0.0801)
0.644∗∗∗
(0.0128)
Yes
1.924∗∗∗
(0.534)
-25.61∗∗∗
(0.842)
-38.05∗∗∗
(7.154)
-1.838∗∗∗
(0.0911)
-0.130∗∗∗
(0.0123)
-0.856
(0.543)
-6.716∗
(3.038)
-0.677∗∗∗
(0.0686)
0.316∗∗∗
(0.0149)
1.561
(1.707)
-1.351
(2.537)
-0.536∗∗
(0.206)
0.732∗∗∗
(0.0426)
Yes
1.767∗∗
(0.540)
-18.03∗∗∗
(0.741)
-22.61∗∗∗
(5.235)
-1.804∗∗∗
(0.0834)
-0.0207
(0.0148)
Yes
1.172
(1.125)
-14.99∗∗∗
(2.059)
-59.30∗∗
(18.91)
-1.506∗∗∗
(0.222)
-0.0888∗
(0.0393)
Social Capital
Journalist
Name
Image
Description
Female
Beyonc´e
Lebron James
Lady Gaga
Celebrity
Year F.E.
Constant
Social Capital
Journalist
Name
Image
Description
Female
Beyonc´e
Lebron James
Lady Gaga
Celebrity
-0.149
-0.384
(0.452)
(0.446)
-6.521∗∗
-7.334∗∗
(2.579)
(2.515)
-0.640∗∗∗ -0.646∗∗∗
(0.0609)
(0.0608)
-0.296
(0.450)
-7.145∗∗
(2.593)
-0.668∗∗∗
(0.0610)
-0.333
(0.447)
-6.831∗∗
(2.543)
-0.651∗∗∗
(0.0609)
-0.180
(0.451)
-6.757∗∗
(2.525)
-0.664∗∗∗
(0.0610)
0.490∗∗∗ 0.516∗∗∗
(0.0106)
(0.0107)
-0.424∗∗∗
(0.0179)
Yes
Yes
1.588∗∗∗ 1.595∗∗∗
(0.413)
(0.413)
0.438∗∗∗
(0.0107)
0.506∗∗∗
(0.0106)
0.490∗∗∗
(0.0106)
-0.594∗∗∗
(0.0131)
-0.302∗∗∗
(0.0121)
Yes
1.619∗∗∗
(0.413)
Yes
1.627∗∗∗
(0.413)
-0.391∗∗∗
(0.0107)
Yes
1.654∗∗∗
(0.414)
-22.70∗∗∗ -21.87∗∗∗
(0.618)
(0.619)
-29.51∗∗∗ -27.58∗∗∗
(4.992)
(4.937)
-1.838∗∗∗ -1.851∗∗∗
(0.0716)
(0.0718)
-22.62∗∗∗
(0.619)
-29.51∗∗∗
(5.000)
-1.859∗∗∗
(0.0717)
-22.66∗∗∗
(0.619)
-27.82∗∗∗
(4.918)
-1.858∗∗∗
(0.0717)
-22.22∗∗∗
(0.619)
-28.07∗∗∗
(4.924)
-1.871∗∗∗
(0.0718)
-0.0518∗∗∗ -0.00658
(0.0104)
(0.0104)
-0.895∗∗∗
(0.0180)
-0.0895∗∗∗
(0.0104)
-0.0237∗ -0.0525∗∗∗
(0.0104)
(0.0104)
-0.406∗∗∗
(0.0123)
-0.577∗∗∗
(0.0118)
Table 8: Multinomial Logistic Analysis of the Choice of Candidates to Follow
Names Only
Images Only Description Only
All
Beyonc´e Lebron James Lady Gaga Celebrity
Democratic Follower
Tweets
Independent Follower (baseline)
Republican Follower
Tweets
Year F.E.
Constant
Yes
1.393∗
(0.582)
Observations
387148
Standard errors in parentheses
∗ p < 0.05, ∗∗ p < 0.01, ∗∗∗ p < 0.001
Yes
1.422∗
(0.575)
294987
Yes
0.859
(1.226)
30786
Yes
1.203∗∗
(0.449)
557777
Yes
1.215∗∗
(0.449)
557777
Yes
1.226∗∗
(0.449)
557777
Yes
1.265∗∗
(0.450)
557777
-0.545∗∗∗
(0.0103)
Yes
1.286∗∗
(0.450)
557777
Table 9: Celebrity Effects: A Logistic Regresssion
Democrat Democrat Democrat Democrat Democrat Clinton Clinton Clinton
36.23∗∗∗ 37.99∗∗∗
5.404
5.946
(4.887)
(5.194)
(4.833)
(5.273)
1.057∗∗∗ 1.081∗∗∗ 1.084∗∗∗
1.242∗∗∗ 1.230∗∗∗
(0.0620)
(0.0619)
(0.103)
(0.103)
0.525∗∗∗ 0.531∗∗∗
(0.00597) (0.00598) (0.00636) (0.00595) (0.00594)
0.489∗∗∗
(0.0126)
Clinton
5.356
36.74∗∗∗ 36.81∗∗∗
(4.705)
(5.209)
(5.211)
1.100∗∗∗
1.245∗∗∗ 1.245∗∗∗
(0.0620)
(0.103)
(0.0619)
0.534∗∗∗ 0.546∗∗∗ 0.0484∗∗∗ 0.123∗∗∗ 0.0534∗∗∗ 0.0753∗∗∗
(0.0105)
37.96∗∗∗
(5.272)
1.230∗∗∗
(0.0619)
0.523∗∗∗
(0.0105)
0.578∗∗∗
(0.0226)
(0.0105)
(0.0105)
6.922
(4.866)
(0.103)
0.865∗∗∗
(0.0185)
Social Capital
Journalist
Female
Beyonc´e
Lebron James
Female # James
Lady Gaga
Celebrity
-0.183∗∗∗ -0.202∗∗∗
(0.00855)
(0.0102)
0.0654∗∗∗
(0.0185)
0.283∗∗∗
(0.00766)
Year F.E.
Constant
Yes
0.578∗
(0.289)
Observations
509810
Standard errors in parentheses
∗ p < 0.05, ∗∗ p < 0.01, ∗∗∗ p < 0.001
Yes
0.595∗
(0.289)
509810
Yes
0.597∗
(0.289)
509810
Yes
0.562
(0.289)
509810
Figure 8: While Lebron James has endorsed Hillary Clinton, his
followers are less likely to follow Democrats than individuals who
do not follow him.
Conclusion
This paper studies the paradoxical observation that while
technically the marginal cost of following one extra pres-
idential candidate is just a click a way, most individuals
choose to follow only 1 or 2 candidates. Building from an
exhaustive dataset that includes 15.5 million records, taking
advantage of three information channels (name, image, de-
scription), and applying various regression models, we (1)
explored the frequent patterns of the 2016 U.S. presidential
1.012∗∗∗
(0.0159)
Yes
0.606
(0.357)
227525
Yes
0.593
(0.357)
227525
Yes
0.513
(0.360)
227525
0.783∗∗∗
(0.0126)
Yes
0.509
(0.359)
227525
0.163∗∗∗
(0.00653)
Yes
0.565
(0.289)
509810
campaign on Twitter, calculated the weighted presence for
each candidate, and measured the extent to which individu-
als on Twitter are polarized, (2) studied how gender has had
an effect on the number of candidates that one chooses to
follow, (3) found that females are more likely to be follow-
ing Democratic candidates exclusively and that followers of
celebrities tend to be following candidates from both parties,
(4) found that when considering Democrats and Republicans
only, followers of Beyonc´e and Lady Gaga are more likely to
follow the Democratic candidates, that followers of Lebron
James are more likely to follow the Republican candidates
and that all of these tend to favor Hillary Clinton over Bernie
Sanders.
Acknowledgments
We gratefully acknowledge the generous financial support
from the University and from our corporate sponsors.
References
Alaimo, K. 2016. Where donald trump got his real power.
CNN.
Barber´a, P. 2015. Birds of the same feather tweet together.
bayesian ideal point estimation using twitter data. Political
Analysis 23(1).
Brians, C. L. 2005. Women for Women? Gender and Party
Bias in Voting for Female Candidates. American Politics
Research.
Burger, J. D.; Henderson, J.; Kim, G.; and Zarrella, G.
2011. Discriminating gender on twitter. Proceedings of
0
Female
1
James Follower
0.45
Non−James Follower
0.40
0.35
Pr(Democrat Follower)
the 2011 Conference on Empirical Methods in Natural Lan-
guage Processing.
Burt, R. S. 2000. Decay functions. Social Networks 22:1–
28.
Campbell, J. E. 2016. Polarized: Making Sense of a Divided
America. Princeton University Press.
Doherty, C. 2014. 7 things to know about polarization in
america. Pew Research Center.
Dolan, K. 2008.
Is There a "Gender Affinity Effect" in
American Politics? Information, Affect, and Candidate Sex
in U.S. House Elections. Political Research Quarterly.
Druckman, J. N.; Peterson, E.; and Slothuus, R. 2013. How
elite partisan polarization affects public opinion formation.
American Political Science Review 107(1):57–79.
Farfade, S. S.; Saberian, M.; and Li, L.-J. 2015. Multi-view
face detection using deep convolutional neural networks. In
ICMR.
Ginosar, S.; Rakelly, K.; Sachs, S.; Yin, B.; and Efros, A. A.
2015. A Century of Portraits: A Visual Historical Record of
American High School Yearbooks. In ICCV 2015 Extreme
Imaging Workshop Proceedings.
Greene, W. 2008. Functional forms for the negative bino-
mial model for count data. Economic Letters (99):585–590.
Guo, Y.; Zhang, L.; Hu, Y.; He, X.; and Gao, J. 2016.
Ms-celeb-1m: A dataset and benchmark for large-scale face
recognition. ECCV.
Han, J.; Kamber, M.; and Pei, J. 2011. Data Mining: Con-
cepts and Techniques. Morgan Kaufmann.
Hare, C., and Poole, K. T. 2014. The polarization of con-
temporary american politics. Polity 46(3):411–429.
He, K.; Zhang, X.; Ren, S.; and Sun, J. 2016. Deep residual
learning for image recognition. CVPR.
Huang, G. B.; Ramesh, M.; Berg, T.; and Learned-Miller, E.
2007. Labeled faces in the wild: A database for studying
face recognition in unconstrained environments. Technical
report, University of Massachusetts.
Jia, S., and Cristianini, N. 2015. Learning to classify gender
from four million images. Pattern Recognition Letters.
Jr., K. R., and Tesafaye, T. 2006. Morph: a longitudinal
image database of normal adult age-progression. 7th Inter-
national Conference on Automatic Face and Gesture Recog-
nition (FGR06).
King, D. C., and Matland, R. E.
Sex and the
Grand Old Party: An Experimental Investigation of the Ef-
fect of Candidate Sex on Support for a Republican Candi-
date. American Politics Research.
2012.
Krizhevsky, A.; Sutskever, I.; and Hinton, G. E.
Imagenet classification with deep convolutional neural net-
works. In NIPS.
LeCun, Y.; Bengio, Y.; and Hinton, G. 2015. Deep learning.
Nature.
Levi, G., and Hassner, T. 2015. Age and Gender Classifi-
cation using Deep Convolutional Neural Networks. In Pro-
ceedings of the IEEE Conference on Computer Vision and
Pattern Recognition, 34–42.
2003.
Lockhart, K. 2016. Watch: Why social media is donald
trump's most powerful weapon. The Telegraph.
Maddala, G. S. 1983. Limited-Dependent and Qualitative
Variables in Econometrics. Cambridge University Press.
McCarty, N.; Poole, K. T.; and Rosenthal, H. 2009. Does
gerrymandering cause polarization? American Journal of
Political Science 53(3):666.
McPherson, M.; Smith-Lovin, L.; and Cook, J. M. 2001.
Birds of a feather: Homophily in social networks. Annual
Review of Sociology.
Miller, C. C. 2016. Why women did not unite to vote against
donald trump. The New York Times.
Mislove, A.; Lehmann, S.; Ahn, Y.-Y.; Onnela, J.-P.; and
Rosenquist, J. N. 2011. Understanding the demographics
of twitter users. Proceedings of the Fifth International AAAI
Conference on Weblogs and Social Media.
Nilizadeh, S.; Groggel, A.; Lista, P.; Das, S.; Ahn, Y.-Y.; ;
Kapadia, A.; and Rojas, F. 2016. Twitter's glass ceiling:
The effect of perceived gender on online visibility. Proceed-
ings of the Tenth International AAAI Conference on Web and
Social Media.
Ottoni, R.; Pesce, J. P.; Casas, D. L.; Jr., G. F.; Jr., W. M.;
Kumaraguru, P.; and Almeida, V. 2013. Ladies first: Ana-
lyzing gender roles and behaviors in pinterest. Proceedings
of the Seventh International AAAI Conference on Weblogs
and Social Media.
Phillips, P. J.; Wechslerb, H.; Huangb, J.; and Raussa, P. J.
1998. The feret database and evaluation procedure for face-
recognition algorithms. Image and Vision Computing 295–
306.
Sanders, B. 2016. Our Revolution: A Future to Believe In.
Thomas Dunne Books.
Simonyan, K., and Zisserman, A. 2015. Very Deep Convo-
lutional Networks for Large-Scale Image Recognition. In In-
ternational Conference on Learning Representations 2015.
Srivastava, R. K.; Greff, K.; and Schmidhuber, J. 2015.
Highway network. arXiv:1505.00387v2.
Stahl, L. 2016. President-elect trump speaks to a divided
country on 60 minutes. CBS.
Tumasjan, A.; Sprenger, T. O.; Sandner, P. G.; and Welpe,
I. M. 2010. Predicting Elections with Twitter: What 140
Characters Reveal about Political Sentiment.
In Proceed-
ings of the Fourth International AAAI Conference on We-
blogs and Social Media.
Wang, Y.; Feng, Y.; Zhang, X.; and Luo, J. 2016. Voting with
Feet: Who are Leaving Hillary Clinton and Donald Trump?
In Proceedings of the IEEE Symposium on Multimedia.
Wang, Y.; Li, Y.; and Luo, J. 2016. Deciphering the 2016
U.S. Presidential Campaign in the Twitter Sphere: A Com-
parison of the Trumpists and Clintonists. In Tenth Interna-
tional AAAI Conference on Web and Social Media.
Zamal, F. A.; Liu, W.; and Ruths, D. 2012. Homophily and
latent attribute inference: Inferring latent attributes of twitter
users from neighbors. Proceedings of the Sixth International
AAAI Conference on Weblogs and Social Media.
|
1103.0784 | 1 | 1103 | 2011-03-03T21:05:17 | Happiness is assortative in online social networks | [
"cs.SI",
"cs.CL",
"physics.soc-ph"
] | Social networks tend to disproportionally favor connections between individuals with either similar or dissimilar characteristics. This propensity, referred to as assortative mixing or homophily, is expressed as the correlation between attribute values of nearest neighbour vertices in a graph. Recent results indicate that beyond demographic features such as age, sex and race, even psychological states such as "loneliness" can be assortative in a social network. In spite of the increasing societal importance of online social networks it is unknown whether assortative mixing of psychological states takes place in situations where social ties are mediated solely by online networking services in the absence of physical contact. Here, we show that general happiness or Subjective Well-Being (SWB) of Twitter users, as measured from a 6 month record of their individual tweets, is indeed assortative across the Twitter social network. To our knowledge this is the first result that shows assortative mixing in online networks at the level of SWB. Our results imply that online social networks may be equally subject to the social mechanisms that cause assortative mixing in real social networks and that such assortative mixing takes place at the level of SWB. Given the increasing prevalence of online social networks, their propensity to connect users with similar levels of SWB may be an important instrument in better understanding how both positive and negative sentiments spread through online social ties. Future research may focus on how event-specific mood states can propagate and influence user behavior in "real life". | cs.SI | cs |
Happiness is assortative in online social networks.
Johan Bollen, Bruno Gonçalves, Guangchen Ruan, & Huina Mao
January 13, 2013
Abstract
Social networks tend to disproportionally favor connections between individuals with either similar or
dissimilar characteristics. This propensity, referred to as assortative mixing or homophily, is expressed as
the correlation between attribute values of nearest neighbour vertices in a graph. Recent results indicate that
beyond demographic features such as age, sex and race, even psychological states such as “loneliness” can
be assortative in a social network. In spite of the increasing societal importance of online social networks
it is unknown whether assortative mixing of psychological states takes place in situations where social ties
are mediated solely by online networking services in the absence of physical contact. Here, we show that
general happiness or Subjective Well-Being (SWB) of Twitter users, as measured from a 6 month record of
their individual tweets, is indeed assortative across the Twitter social network. To our knowledge this is the
first result that shows assortative mixing in online networks at the level of SWB. Our results imply that online
social networks may be equally subject to the social mechanisms that cause assortative mixing in real social
networks and that such assortative mixing takes place at the level of SWB. Given the increasing prevalence
of online social networks, their propensity to connect users with similar levels of SWB may be an important
instrument in better understanding how both positive and negative sentiments spread through online social ties.
Future research may focus on how event-specific mood states can propagate and influence user behavior in
“real life”.
1 Introduction
As the old adage goes, “Birds of a feather flock together”. In network theory, this effect is known as homophily [1]
or assortative mixing [2, 3, 4], occurs in a network when it disproportionally favors connections between vertices
with similar characteristics. The opposite trend, that of favouring connections between nodes with different char-
acteristics, is known as disassortative mixing. For example, a friendship network [1] may be highly assortative
if it connects individuals who are at similar locations or have similar musical tastes. A heterosexual network [5]
on the other hand will be highly disassortative since partners will tend to be of the opposite sex. However, few
networks are entirely assortative or disassortative: most will exhibit both properties to some degree depending on
the particular characteristic.
Social networks can exhibit significant degrees of assortative mixing with respect to a variety of demographic
attributes such as sex, race, age, religion and education, including behavioral and health attributes [6, 7, 8, 9] and
even genotypes [10]. Surprisingly, this is also the case for certain psychological states such as loneliness [1].
In the latter case individuals preferentially share relations with individuals who report equally elevated levels of
1
loneliness and this homophilic tendency increases over time.
Although it is clear that psychological states affect behaviour both online [11] and offline, the mechanisms through
which such states exhibit assortativity and contagion across social bonds are not yet fully understood. However,
two different processes are conceiveable: that individuals seek homophilic social relations to share subjective
experiences (homophilic attachment), or that the emotional state of an individual can influence that of the people
with which he or she interacts (contagion) [12]. While both possibilities are clearly in play in real-world social
interactions, it is not clear whether or not they are present in online social systems which do not necessarily
emerge from physical contact or in-person communication [13, 14].
The Twitter1 microblogging service is a case in point. Twitter users can post brief personal updates of less than
140 characters at any time. These updates, known as “tweets”, are distributed to a limited group of “followers”,
i.e. other Twitter users who have elected to “follow” the particular user’s tweets [15]. These follower relations
are of a fundamentally different nature than their off-line counterparts [16]; they are not necessarily reciprocated,
i.e. directed, nor modulated and are mostly focused on the exchange of information. In effect, a Twitter Follower
relation simply represents the fact that one individual is interested in the content produced by another, without
the requirement that the interest be reciprocated. As a simple example, consider the case of celebrities that attract
the attention and interest of a large number of people without reciprocating it. This arrangement results in a so-
cial network in the form of a directed, unweighted graph which is quite different from naturally occurring social
networks in which friendship ties are generally symmetric and vary in strength. As a consequence, one would
expect homophily and assortative mixing of emotional states to be absent or fundamentally altered in online social
networking environments, in particular those with asymmetric, unweighted connections such as Twitter.
However, in spite of the expectation that online environments fundamentally alter social interaction, recent re-
sults indicate that personal preferences do indeed exhibit homophilic properties in online environments such as
BlogCatalog and Last.fm [17]. Tantalizingly this has also been found the case for sentiment [18] in LiveJournal2 .
Given the increasing importance of social networking environments in coordinating social unrest [19] and mod-
ulating the public’s response to large-scale disasters [20], it has become a matter of tremendous interest whether
and how online social networking environments exhibit homophily or even contagion on the level of sentiment
and mood and how online tools can be leveraged to gain understanding about social behaviour [21, 22].
Here we investigate whether and to which degree the general happiness or Subjective Well-Being (SWB) [23] of
individual Twitter users exhibits assortative mixing. Several previous works have focused on aggregate [24, 25,
26, 27, 28] measurements of mood or emotion in entire communities or systems, but we analyse individual mood
state in an online social network. On the basis of a collection of 129 million tweets, we track the SWB levels
of 102,009 Twitter users over a 6 months period from the content of their tweets. Each is rated on an emotional
scale using a standard sentiment analysis tool. A subsequent assortativity analysis of the Twitter social network
then reveals its degree of SWB assortative mixing. Our results indicate that the overall SWB of Twitter users is
positive, and highly assortative. In other words, Twitter users are preferentially connected to those with whom
they share the same level of general happiness or SWB. Furthermore, tie strength seems to play a significant role
in modulating the degree of SWB assortativity.
1Twitter – http://www.twitter.com
2LiveJournal: http://www.livejournal.com/
2
2 Data and methods
We collected a large set of Tweets submitted to Twitter in the period from November 28, 2008 to May 2009.
The data set consisted of 129 million tweets submitted by several million Twitter users. Each Tweet contained a
unique identifier, date-time of submission (GMT+0), submission type, and textual content, among other informa-
tion. Some examples are shown below in Table 1.
ID date-time
1
2008-11-28 02:35:48
2
2008-11-28 02:35:48
type
text
web Getting ready for Black Friday. Sleeping out at Circuit City or
Walmart not sure which. So cold out.
web @dane I didn’t know I had an uncle named Bob :-P I am going
to be checking out the new Flip sometime soon
· · ·
Table 1: Examples of Tweet data collected from November 28, 2008 to May 2009 for 4, 844, 430 users
We complemented this cross-section sample of twitter activity by retrieving the complete history of over 4 million
users, as well as the identity of all of their followers. The final Twitter Follower network contained 4, 844, 430
users (including followers of our users for which we did not collect timeline information). Armed with the social
connections and activity of these users we were able to measure the way in which the emotional content of each
users varied in time and how it spread across links.
2.1 Creating a Twitter “Friend” network
The “Follower” network we collected consists of a directed graph G = (V , E ) in which V represents the set of
all 4, 844, 430 Twitter users in our collection, and the set of edges E ⊆ V 2 in which each directional edge v ∈ E
consist of the 2-tuplet (vi , vj ) that indicates that user vi follows user vj . By design the Twitter social network is
based on “Follower” relations which are uni-directional and very easy to establish. As such they form a very min-
imal representation of possible interaction between those who follow and those who are being followed. In fact,
it is quite common for a user vi to follow a user vj , but for vj not to follow vi back. As such, follower relations are
not necessarily indicative of any personal relation which may de facto preclude the establishment of assortative
mixing and homophily. We therefore distinguish between mere Twitter “Followers” and actual “Friends” [29, 30]
by applying the following transformations to the Twitter follower graph G:
First, we create a network of Twitter Friend relations from the Follower relations in G by only retaining edges
(vi , vj ) ∈ E for which we can find a reciprocal relation (vj , vi ), i.e. the set of Friend connections E (cid:48) = {(vi , vj ) :
∃(vj , vi ) ∈ E }, i.e. two users only share a Friendship tie if they are both following each other.
Second, to exclude occasional users that are not truly involved in the Twitter social network, we only retained
those users in our Twitter Friend network that posted more than 1 tweet per day on average over the course of 6
months.
3
Figure 1: Converting the original Follower network of Twitter into a Friend network by only taking into account
reciprocal connections.
Third, we assign a weight wi,j to each edge (vi , vj ) that serves as an indication of the degree to which users vi and
vj have similar sets of friends:
wi,j = Ci ∩ Cj
Ci ∪ Cj
where Ci denotes the neighbourhood of friends surrounding user vi . Note that this approach does not take into
account the number of tweets exchanged between two users, but simply the degree to which two Twitter users
have similar friends.
(1)
Figure 2: Example of Twitter Friend similarity as calculated according to Eq. 1. Users vi and vj share 1 friend
out of three total. Therefore their connection is assigned a weight wi,j = 1
3 .
Finally, we extracted the largest Connected Component (GCC ) from the resulting network, thereby obtaining a
Twitter Friend network of 102, 009 users and 2, 361, 547 edges.
The reduction in nodes from our original Twitter Follower network (4, 844, 430) to the resulting Friend network
(102, 009) indicates that in Twitter only a small fraction of users are involved in the type of reciprocated Follower
type that we considere indicative of actual social relationships. However, once this reduction has occurred, we
4
FriendFollowerFollower networkFriend networkvivjcontentofeachusersvariedintimeandhowitspreadacrosslinks.2.1CreatingaTwitter“Friend”networkThe“Follower”networkwecollectedconsistsofadirectedgraphG=(V,E)inwhichVrepresentsthesetofall4,844,430Twitterusersinourcollection,andthesetofedgesE⊆V2inwhicheachdirectionaledgev∈Econ-sistofthe2-tuplet(vi,vj)thatindicatesthatuservifollowsuservj.BydesigntheTwittersocialnetworkisbasedon“Follower”relationswhichareunidirectionalandveryeasytoestablish.Assuchtheyformaveryminimalrepresentationofpossibleinteractionbetweenthosewhofollowandthosewhoarebeingfollowed.Infact,itisquitecommonforauservitofollowauservj,butforvjnottofollowviback.Assuch,followerrelationsarenotindicativeofanypersonalrelationanddefactoprecludetheestablishmentofassortativemixingandhomophily.Sinceweareinterestedinmutualinfluenceofclosecontacts,asmeasuredbytheirSWB,wedistinguishbetweenmereTwitter“Followers”andactual“Friends”[12,6]byapplyingthefollowingtransformationstotheTwitterfollowergraphG:First,wecreateanetworkofTwitterFriendrelationsfromtheFollowerrelationsinGbyonlyretainingedges(vi,vj)∈Eforwhichwecanfindareciprocalrelation(vj,vi),i.e.thesetofFriendconnectionsE!={(vi,vj):∃(vj,vi)∈E},i.e.twousersonlyshareaFriendshiptieiftheyarebothfollowingeachother.FriendFollowerFollower networkFriend networkFigure1:ConvertingtheoriginalFollowernetworkofTwitterintoaFriendnetworkbyonlytakingintoaccountreciprocalconnections.Second,toexcludeoccasionalusersthatarenottrulyinvolvedintheTwittersocialnetwork,weonlyretainedthoseusersinourTwitterFriendnetworkthatpostedmorethan1tweetperdayonaverageoverthecourseof6months.Third,weassignaweightwi,jtoeachedge(vi,vj)thatservesasanindicationofthedegreetowhichusersviandvjhavesimilarsetsoffriends:wi,j=Ci∩Cj=1Ci∪Cj=3=13(1)whereCidenotestheneighbourhoodoffriendssurroundinguservi.Notethatthisapproachdoesnottakeintoaccountthenumberoftweetsexchangedbetweentwousers,butsimplythedegreetowhichtwoTwitterusers3contentofeachusersvariedintimeandhowitspreadacrosslinks.2.1CreatingaTwitter“Friend”networkThe“Follower”networkwecollectedconsistsofadirectedgraphG=(V,E)inwhichVrepresentsthesetofall4,844,430Twitterusersinourcollection,andthesetofedgesE⊆V2inwhicheachdirectionaledgev∈Econ-sistofthe2-tuplet(vi,vj)thatindicatesthatuservifollowsuservj.BydesigntheTwittersocialnetworkisbasedon“Follower”relationswhichareunidirectionalandveryeasytoestablish.Assuchtheyformaveryminimalrepresentationofpossibleinteractionbetweenthosewhofollowandthosewhoarebeingfollowed.Infact,itisquitecommonforauservitofollowauservj,butforvjnottofollowviback.Assuch,followerrelationsarenotindicativeofanypersonalrelationanddefactoprecludetheestablishmentofassortativemixingandhomophily.Sinceweareinterestedinmutualinfluenceofclosecontacts,asmeasuredbytheirSWB,wedistinguishbetweenmereTwitter“Followers”andactual“Friends”[12,6]byapplyingthefollowingtransformationstotheTwitterfollowergraphG:First,wecreateanetworkofTwitterFriendrelationsfromtheFollowerrelationsinGbyonlyretainingedges(vi,vj)∈Eforwhichwecanfindareciprocalrelation(vj,vi),i.e.thesetofFriendconnectionsE!={(vi,vj):∃(vj,vi)∈E},i.e.twousersonlyshareaFriendshiptieiftheyarebothfollowingeachother.FriendFollowerFollower networkFriend networkFigure1:ConvertingtheoriginalFollowernetworkofTwitterintoaFriendnetworkbyonlytakingintoaccountreciprocalconnections.Second,toexcludeoccasionalusersthatarenottrulyinvolvedintheTwittersocialnetwork,weonlyretainedthoseusersinourTwitterFriendnetworkthatpostedmorethan1tweetperdayonaverageoverthecourseof6months.Third,weassignaweightwi,jtoeachedge(vi,vj)thatservesasanindicationofthedegreetowhichusersviandvjhavesimilarsetsoffriends:wi,j=Ci∩Cj=1Ci∪Cj=3=13(1)whereCidenotestheneighbourhoodoffriendssurroundinguservi.Notethatthisapproachdoesnottakeintoaccountthenumberoftweetsexchangedbetweentwousers,butsimplythedegreetowhichtwoTwitterusers3contentofeachusersvariedintimeandhowitspreadacrosslinks.2.1CreatingaTwitter“Friend”networkThe“Follower”networkwecollectedconsistsofadirectedgraphG=(V,E)inwhichVrepresentsthesetofall4,844,430Twitterusersinourcollection,andthesetofedgesE⊆V2inwhicheachdirectionaledgev∈Econ-sistofthe2-tuplet(vi,vj)thatindicatesthatuservifollowsuservj.BydesigntheTwittersocialnetworkisbasedon“Follower”relationswhichareunidirectionalandveryeasytoestablish.Assuchtheyformaveryminimalrepresentationofpossibleinteractionbetweenthosewhofollowandthosewhoarebeingfollowed.Infact,itisquitecommonforauservitofollowauservj,butforvjnottofollowviback.Assuch,followerrelationsarenotindicativeofanypersonalrelationanddefactoprecludetheestablishmentofassortativemixingandhomophily.Sinceweareinterestedinmutualinfluenceofclosecontacts,asmeasuredbytheirSWB,wedistinguishbetweenmereTwitter“Followers”andactual“Friends”[12,6]byapplyingthefollowingtransformationstotheTwitterfollowergraphG:First,wecreateanetworkofTwitterFriendrelationsfromtheFollowerrelationsinGbyonlyretainingedges(vi,vj)∈Eforwhichwecanfindareciprocalrelation(vj,vi),i.e.thesetofFriendconnectionsE!={(vi,vj):∃(vj,vi)∈E},i.e.twousersonlyshareaFriendshiptieiftheyarebothfollowingeachother.FriendFollowerFollower networkFriend networkFigure1:ConvertingtheoriginalFollowernetworkofTwitterintoaFriendnetworkbyonlytakingintoaccountreciprocalconnections.Second,toexcludeoccasionalusersthatarenottrulyinvolvedintheTwittersocialnetwork,weonlyretainedthoseusersinourTwitterFriendnetworkthatpostedmorethan1tweetperdayonaverageoverthecourseof6months.Third,weassignaweightwi,jtoeachedge(vi,vj)thatservesasanindicationofthedegreetowhichusersviandvjhavesimilarsetsoffriends:wi,j=Ci∩Cj=1Ci∪Cj=3=13(1)whereCidenotestheneighbourhoodoffriendssurroundinguservi.Notethatthisapproachdoesnottakeintoaccountthenumberoftweetsexchangedbetweentwousers,butsimplythedegreetowhichtwoTwitterusers3Values
Network parameter
102, 009 users
Nodes
2, 361, 547 edges
Edges
0.000454
Density
14
Diameter
46.300
Average Degree
Average Clustering Coefficient 0.262
Table 2: Network parameters for largest Connected Component of Twitter Friend network.
find that the largest Connected Component of the Friend network, GCC , retains 97.9% of users in the original
Twitter Friend network. This indicates a high degree of connectivity across all users in the final Friend graph.
This is further confirmed by the diameter of GCC which was found to be only 14 in spite of its low density. Other
relevant network parameters for GCC are provided in Table 2.
Figure 3: A sub-graph of 3, 587 users extracted from the generated Twitter social network (102, 009 users and
2, 361, 547 edges).
5
Figure 4: Twitter Friend network edge weight and degree distributions.
Examining the edge weight distribution as shown in Fig. 4 we observe a strongly skewed frequency distribution
indicating very many connections in the GCC with low edge weights (wi,j < 0.3) and few connections with
very high edge weights (wi,j > 0.6). The degree frequency distribution reveals a similar pattern with most users
connected to only a few users and a small minority of users connected to thousands of users.
2.2 User-level measurements of Subjective Well-Being
We can not directly interrogate Twitter users about their Subjective Well-Being (SWB) [23], but we can infer
users’ SWB from the aggregate emotional content of their tweets over a period of 6 months. To do so we apply
the following procedure.
To reduce noise we only include Twitters users in GCC that posted at least 1 tweet per day. This guarantees at least
180 tweets for every individual user from which to assess their SWB. We then analyze the emotional content of
each user’s 6 month record of tweets using OpinionFinder (OF)3 which is a publicly available software package
for sentiment analysis that can be applied to determine sentence-level subjectivity [31]. OF has been successfully
used to analyze the emotional content of large collections of tweets [32] by using its lexicon to determine the
dominance of positive or negative tweets on a given day. Here we select both positive and negative words that
are marked as either “weak” and “strong” from the OF sentiment lexicon resulting in a list of 2718 positive and
4912 negative words. For each tweet in an individual user’s 6 month record we count the number of negative and
positive terms from the OF lexicon that it contains, and increase the individual user’s score of either negative or
positive tweets by 1 for each occurrence.
The Subjective Well-Being (S (u)) of user u is then defined as the fractional difference between the number of
tweets that contain positive OF terms and those that contain negative terms:
Np (u) − Nn (u)
Np (u) + Nn (u)
S (u) =
3http://www.cs.pitt.edu/mpqa/opinionfinderrelease/
6
0.00.20.40.60.81.0weight100101102103104105freq(weight=k)edge weight distribution102103104degree100101102103104freq(degree=k)degree distributionwhere Np (u) and Nn (u) represent respectively the number of positive and negative tweets for user u.
A number of examples is shown in Table 3.
Tweets submitted by high SWB users (> 0.5).
So...nothing quite feels like a good shower, shave and haircut...love it
My beautiful friend. i love you sweet smile and your amazing soul
i am very happy. People in Chicago loved my conference. Love you, my sweet friends
@anonymous thanks for your follow I am following you back, great group amazing people
Tweets submitted by low SWB users (< 0.0).
She doesn’t deserve the tears but i cry them anyway
I’m sick and my body decides to attack my face and make me break out!! WTF :(
I think my headphones are electrocuting me.
My mom almost killed me this morning. I don’t know how much longer i can be here.
Table 3: Examples of Tweets posted by users with very high and very low SWB values.
2.3 Defining SWB assortativity
Having calculated the SWB values of each users, we can now proceed to measure the degree to which the SWB
of connected users is correlated. Intuitively, a person can be emotionally influenced by their friends in two, com-
plementary, ways: influence can come from interacting with specific individuals to which one may attribute more
importance [33]. We refer to this first type as “pairwise node assortativity" since it assesses the degree to which
every two pairwise-connected users have similar SWB values. Another possibility is that each individual is in-
fluenced by the overall SWB of all of the people it interacts with. We refer to this second type as “neighborhood
assortativity".
Fig. 5 illustrates this distinction; it shows the actual neighborhood Friend network of an individual in GCC who
has very high SWB values. Nodes are colored according to their SWB values with red indicating high SWB val-
ues, blue indicating low SWB values and white indicating neutral or zero SWB values. The particular individual
with high SWB values is connected to a local network of equally high SWB individuals (red). The individual
could thus be said to be neighborhood assortative within this cluster. However, the individual is also connected
to several individuals with low SWB values (blue). For each individual connection this is a case of pairwise
disassortativity. The cluster of low SWB individuals on the other hand exhibits neighborhood assortativity for
low SWB values, and the network in its entirety, including both low and high SWB clusters, exhibits strong SWB
assortativity; nodes with similar low or high SWB values tend to be connected (blue and red clusters).
We formally define Pairwise SWB assortativity as follows: For each edge (vi , vj ) in the GCC of our social
network, we extract the corresponding two SWB values, one for the source node and one for the target node.
These values are then aggregated into two vectors, S (S ) and S (T ) for sources and targets respectively. The value
7
Figure 5: Neighborhood network of a very high SWB individual (center). Blue, white, and red node colors
correspond respectively to low, neutral and high SWB values.
of the pairwise assortativity, denoted AP (GCC ), is then given by the Pearson correlation coefficient ρ of these two
(cid:19)(cid:21)
(cid:19) (cid:18)
(cid:20)(cid:18)
(cid:88)
vectors.
S (Ti ) − (cid:104)S (T )(cid:105)
S (Si ) − (cid:104)S (S )(cid:105)
1
AP (GCC ) ≡ ρ(S (S ), S (T )) =
σ (S (T ))
σ (S (S ))
n − 1
i
The pairwise assortativity is then defined in the [−1, +1] interval, with −1 indicating perfect disassortativity, 0
indicates a lack of any assortativity, and +1 meaning perfect assortativity.
(2)
The neighborhood assortativity of GCC with regards to SWB, denoted AN (GCC ) can be calculated as follows.
For each user u ∈ V , we define its neighborhood:
(3)
κ(u) = {∀v : ∃(u, v) ∈ E }
so that κ(u) or κu represents the set of users that user u is connected to. We then calculate an average SWB value
(cid:88)
for κ(v) which we denote
v∈κ(u)
1
κ(u)
(4)
S (κu ) =
S (v)
8
low SWBhigh SWBWe can now define two vectors, one for the SWB values of every unique user and one for the average SWB
values of their neighborhoods, denoted by S (U ) and S (κ). The neighborhood assortativity of the network GCC
with regards to SWB, denoted Aκ , is then given by the correlation function ρ computed over these two vectors as
(cid:18)
(cid:19) S (κu ) − (cid:104)S (κ)(cid:105)
follows:
(cid:88)
(cid:16)
(cid:17)
S (u) − (cid:104)S (U )(cid:105)
1
σ (S (U ))
n − 1
S (κ)
σ
u
with the sum to be taken over every user, u. AK (GCC ) then represents the correlation between the SWB values of
user vi and the mean SWB values of its Friends. Similarly to the pairwise version, Aκi is expressed in the range
[−1, +1] where −1 indicates perfect neighborhood disassortativity and where +1 indicates perfect neighborhood
assortativity.
AK (GCC ) ≡ ρ(S (U ), S (κ)) =
(5)
3 Results and discussion
3.1 SWB distribution
In Figure 6 we plot the probability distribution of Subjective Well-Being values across all Twitter users in our
sample. The distribution seems bimodal with two peaks: one in the range [−0.1, 0.1] and another in the range
[0.2, 0.4]. Excluding users whose SWB=0 (due to a lack of emotional content in their Tweets) we find that a
majority of Twitter users in our sample have positive SWB values in a rather narrow range [0.1, 0.4] with a peak
at SWB=0.16. This is confirmed by the cumulative distribution shown on the left-bottom of Fig. 6; 50% of users
have SWB values ≤ 0.1, and 95% of users have SWB values ≤ 0.285.
Figure 6: Probability distribution (%) and cumulative distribution (%) of Subjective Well-Being (SWB) and
Emotionality values for our sample of Twitter users.
9
3.2 Pairwise and neighborhood SWB assortativity
In Eq. 2 we defined pairwise SWB as the correlation between the SBW values of connected users in our Twitter
Friends networks, whereas Eq. 5 defined neighborhood assortativity was defined as the correlation between the
SWB values of individual users and the mean SWB values of their neighbors in the graph GCC .
The assortativity values were found to be 0.443(cid:63)(cid:63)(cid:63) (N=2,062,714 edges) for the pairwise SBW assortativity and
0.689(cid:63)(cid:63)(cid:63) (N=102,009)4 for the neighborhood assortativity. Both correlations are highly statistically significant
(p-values < 0.001) for the sample sizes.
Regarding pairwise SWB assortativity, the scatterplots on the left of Fig. 7 and Fig. 8 show the distribution of
SWB values across the sample of all edges and nodes in GCC and confirm the observed correlation between the
SWB values of connected or neighboring users in GCC .
Figure 7: Scatterplot of SWB values for user connected in Twitter Friends network. Left: all edges in-
cluded. SWB assortativity=0.443(cid:63)(cid:63)(cid:63) , N=2,062,714 edges. Right: scatterplot includes edges wi,j ≥ 0.1, SBW
assortativity=0.712(cid:63)(cid:63)(cid:63) , N=479,401
The pairwise assortativity scatterplot (Fig. 7-left) indicates a significant amount of scatter, commensurate to the
lower correlation value of 0.443(cid:63)(cid:63)(cid:63) which is nevertheless statistically highly significant. The observed relation is
not obviously linear. The distribution of values is affected by the bimodal distribution of SWB values as shown
in Fig. 6; large numbers of observations cluster at SWB values within the ranges of either [−0.05, 0.05] and
[0.1, 0.3]. The clustering pattern of Fig. 7 however indicates that users with SWB values in a particular range are
preferentially connected to users within that same range, thereby confirming the observed positive pairwise SWB
assortativity.
The neighborhood assortativity scatterplot (Fig. 8-left) indicates a similar effect but here the clustering of users
is less pronounced and the amount of scatter is lower than that observed for the pairwise assortativity scatterplot,
4The sample sizes for pairwise assortativity and neighborhood assortativity) are expressed in edges and nodes respectively, since the
former correlation is calculated on the basis of a sample of edges that connect pairs of nodes whereas the other is calculated on the basis
of a sample of nodes and their neighborhood
10
Figure 8: Scatterplot of SWB values for users (x) and their neighborhood (y) connected in Twitter Friends net-
work. Left: all edges included. SWB assortativity=0.689(cid:63)(cid:63)(cid:63) , N=102,009 nodes. Right: scatterplot includes edges
wi,j ≥ 0.1, SBW assortativity=0.746(cid:63)(cid:63)(cid:63) , N=59,952
commensurate to the higher neighborhood assortativity value of 0.689(cid:63)(cid:63)(cid:63) . Although less pronounced the bimodal
distribution of SWB values is apparent and leads to a clustering of user and neighborhood SWB values in the
ranges of [−0.05, 0.05] and [0.1, 0.3]. Nevertheless it is again the case that users with SWB values in either range
are most likely to be connected to users or neighborhoods with SWB values in the same range. The distribution
of user and neighborhood SWB value is furthermore in line with a positive, linear relationship.
3.3 Edge weight and SWB assortativity
Pairwise SWB assortativity and neighborhood SWB assortativity diverge significantly (0.443(cid:63)(cid:63)(cid:63) < 0.689(cid:63)(cid:63)(cid:63) ) .
The former is based on the pairwise comparison of SWB values across all connection in GCC many of which may
be weak or irrelevant connections from the perspective of indicating actual Friend ties. To measure the effect of
edge weights, we calculate pairwise and neighborhood assortativity values under different edge thresholds, i.e. we
only take into account edges in GCC whose weight as defined in Eq. 1 is wi,j ≥ where ∈ [0, 1] represents
a given edge threshold. The consequent assortativity calculations will therefore more strongly reflect only those
connections between users that are indicative of stronger Friend relations (higher wi,j ). In other words we are
verifying whether stronger user relations lead to higher or lower assortativity.
The results of the calculation of pairwise and neighborhood SWB assortativity under various edge thresholds are
shown in Table 4 and visualized in Fig. 9. Values for > 0.8 are excluded since the correlation coefficients were
not statistically significant (p-value < 0.1). The graph in Fig. 9 overlays the different pairwise and neighborhood
SWB assortativity values along with the number of remaining edges and nodes under the given edge threshold,
i.e. the sample size for the given assortativity calculation.
Both pairwise and neighborhood assortativity values increase as the edge threshold increases, but not in a linear
manner. Pairwise SWB assortativity values increase sharply as increases from 0 to 0.10 and afterwards stabilizes
at a value of approximately 0.750 which is maintained in the interval ∈ [0.15, 0.85]. In other words, removing
11
Edge threshold () A(SWB)
0.0
0.443(cid:63)(cid:63)(cid:63)
0.712(cid:63)(cid:63)(cid:63)
0.10
0.754(cid:63)(cid:63)(cid:63)
0.20
0.30
0.755(cid:63)(cid:63)(cid:63)
0.743(cid:63)(cid:63)(cid:63)
0.40
0.757(cid:63)(cid:63)(cid:63)
0.50
0.798(cid:63)(cid:63)(cid:63)
0.60
0.70
0.755(cid:63)(cid:63)(cid:63)
0.434(cid:63)(cid:63)(cid:63)
0.80
0.90
-
Pairwise
Neighborhood
N edges A(SWB) N nodes
2,062,714
0.689(cid:63)(cid:63)(cid:63)
102,009
59,952
0.746(cid:63)(cid:63)(cid:63)
479,401
33,693
0.769(cid:63)(cid:63)(cid:63)
128,261
36,255
0.780(cid:63)(cid:63)(cid:63)
16,334
7,699
0.779(cid:63)(cid:63)(cid:63)
10,355
3,793
0.781(cid:63)(cid:63)(cid:63)
3,255
1,439
0.805(cid:63)(cid:63)(cid:63)
1,375
689
0.816(cid:63)(cid:63)(cid:63)
502
149
0.768(cid:63)(cid:63)(cid:63)
301
-
-
-
Table 4: Pairwise and Neighborhood Subjective Well-Being assortativity values A(SW B ) vs. edge threshold .
(cid:63)(cid:63)(cid:63) : p-value < 0.001.
Figure 9: Pairwise Subjective Well-Being assortativity and log(number of edges) values vs. edge weight thresh-
olds.
edges with wi,j < 0.1 increases pairwise SWB assortativity considerably, but the removal of edges with higher
wi,j values has little to no additional effect. We observe that = 0.1 reduces the number of edges by a fifth,
12
0.050.100.150.200.250.300.35Edge threshold [0,1]0.40.50.60.70.8assortativity(SWB: pairwise and neighborhoodA(SWB pairwise)A(SWB neighborhood)104105106log(number of edges)N edges(pairwise)N edges(neighborhood)namely from 2,062,714 to 479,401 indicating that a large number of edges are characterized by low similarity
values which when included lead to lower pairwise SWB assortativity.
The neighborhood SWB assortativity increases with higher values but in a less pronounced manner. At = 0 we
find a neighborhood SWB assortativity value of 0.689 which increases to approximately 0.760 for ∈ [0.10, 0.90].
We observe significant declines in the number of nodes that remain under increasing values as was the case for
pairwise assortativity.
At a value of = 0.1 we find the highest pairwise and neighborhood SWB assortativity values combined with the
largest sample sizes, excluding no threshold i.e. = 0. We therefore generate new scatterplots of SWB values for
pairwise and neighborhood SWB assortativity at = 0.1 as shown in Fig. 7 (right) and Fig. 8 (right). The re-
spective scatterplots reflect higher assortativity values; we find less scatter, a stronger positive and linear relation
between SWB value of connected users, and a less pronounced clustering caused by the bimodal distribution of
SWB values.
3.4 Discussion
The above outlined results indicate the following.
First, Twitter users in general exhibit a low to moderate SWB, with very few users being characterized by low
SWB values. The Twitter population in our sample can therefore in the mean be considered moderately happy.
This observation is most likely an underestimation given the relative preponderance of negative terms in the OF
lexicon. However, the SWB distribution is bi-modal showing a group of Twitter users with zero to very low SWB
values, i.e. those that are on the average somewhat happy, and another group with more pronounced, higher SWB
values. This may result from socio-cultural differences in how emotions and mood are expressed on Twitter.
Some users may infrequently express their emotional states whereas other are more prone to do so.
Second, we find statistically significant levels of pairwise and neighborhood SWB assortativity indicating that
Twitter users either prefer the company of users with similar SWB values (homophilic attachment) or converge
on their Friends’ SWB values (contagion). The relation between user SWB values is not linear and biased by
the bi-modal distributions of SBW values causing users to be clustered in two groups with equally low or high
SWB values. In other words, low SWB users are connected to low SWB and high SWB users are connected to
high SWB users. Again, this may confirm the notion that distinct socio-cultural factors affect the expression of
emotion and mood on Twitter, and cause users to cluster according to their degree of expressiveness as well as
SWB.
The results of measuring pairwise and neighborhood assortativity under different edge weights indicate that we
find a stronger and more significant relation between the SWB values of connected users when we only take into
account connections with higher wi,j weights, i.e. those that are deemed more reliable indicators of actual Friend
ties. A possible mechanism to explain the difference in magnitude between pairwise and neighborhood assorta-
tivity might be that users’ neighborhoods contain individuals that they are indeed strongly assortative with, and
whose SWB values affect mean neighborhood SWB values and thus neighborhood assortativity overall, whereas
13
they are “drowned out” in the process of making pairwise comparisons between all individuals that a user is con-
nected to in the process of calculating pairwise SWB assortativity.
For example, users might generally have 10 neighbors, but are generally highly SWB assortative with only 1
Friend. In the calculation of pairwise assortativity, this leads to 10 pairwise comparisons between SBW values
only one of which contributes to the overall observed pairwise SWB assortativity in the graph. However, the
neighborhood assortativity relies on a mean SWB value calculated for the entire neighborhood, including the 1
highly assortative individual. The latter thus influences the average SBW value for the entire neighborhood caus-
ing an increased neighborhood assortativity value.
The greatest improvement in assortativity values indeed occurs for pairwise SWB assortativity which is most
affected by the preponderance of weakly weighted connections since it is defined at the level of all individual user
to user connections. Both pairwise and neighborhood SWB assortativity converge on a value of approximately
0.750 which indicates a significant degree of SWB assortativity in our Twitter Friend graph GCC .
4 Conclusion
Recent findings show that assortative mixing can occur in a variety of social contexts and personal attributes.
Here we show that Subjective Well-Being is equally assortative in the Twitter social network, i.e. the SWB of
individuals that have reciprocal Twitter follower links are strongly related. Happy users tend to connect to happy
users whereas unhappy users tend to be predominantly connected to unhappy users. The convergence of pair-
wise and neighborhood assortativity under increasing edge weight thresholds indicates that users tend to be most
assortative with a limited number of individuals that they have strong social ties to and that weaker ties fulfill a
different social role possibly as outlined by Centola et al (2007)[34].
We do not not address the social or cognitive mechanisms that cause the observed SWB assortativity. Two differ-
ent mechanisms may be at work[35]. The first is based on the notion of “homophily”, i.e. users and connections
tend to preferentially connect to users with similar SWB values. As an online social network grows, new con-
nections are thus biased towards connecting individuals with similar SWB values. This process may be modeled
in terms of “preferential attachment” theory. The second mechanism that may cause SWB assortativity is that of
“mood contagion”, namely that connected users converge to similar SWB values over time. In other words, being
connected to unhappy users can make one unhappier and vice versa. The latter suggests that users may control
their own level of SWB by choosing the right set of online friends and influence their Friends’ SWB by creating
strong social ties and hoping for some form of SBW contagion to take place. A third possibility is that users asses
or express their SWB relative to that of their friends. As a user’s neighborhood becomes happier, this may affect
their own expression of SWB-related sentiment. This phenomenon may occur at the level of entire cultures which
may be comparatively more or less prone to open expressions of individual sentiment.
At this point our research does not offer any information on which of these mechanisms cause the observed
SWB assortativity or in fact whether both may be occurring. Future research will therefore focus on analyzing
user connections and SWB values over time, and relating these changes in the framework of homophily and
preferential attachment[36]. Twitter has now become a major international phenomenon, and this investigation
must therefore include linguistic, cultural and geographic factors.
14
Acknowledgements
We are grateful to Eliot Smith, Peter Todd and Ishani Banerji for their very useful feedback and input throughout
the research that led to this paper. This research was supported by NSF Grant BCS #1032101.
References
[1] Miller McPherson, Lynn Smith-Lovin, and James M Cook. Birds of a Feather: Homophily in Social Net-
works. Annual Review of Sociology, 27(1):415–444, August 2001.
[2] Mark E J Newman. Assortative mixing in networks. Phys. Rev. Lett., 89:208701/1–4, 2002.
[3] Mark E J Newman. The structure and function of complex networks. SIAM Review, 45:167, 2003.
[4] Mark E J Newman. Mixing patterns in networks. Physical Review E, 67(2):26126, 2003.
[5] Luis E. C. Rocha, Fredrik Liljeros, and Petter Holme. Information dynamics shape the sexual networks of
internet-mediated prostitution. PNAS, 107:5706, 2010.
[6] Herminia Ibarra. Homophily and Differential Returns: Sex Differences in Network Structure and Access in
an Advertising Firm. Administrative Science Quarterly, 37(3):422, September 1992.
[7] Kelly a. Mollica, Barbara Gray, and Linda K. Trevino. Racial Homophily and Its Persistence in Newcomers’
Social Networks. Organization Science, 14(2):123–136, March 2003.
[8] Nicholas a Christakis and James H Fowler. The spread of obesity in a large social network over 32 years.
The New England journal of medicine, 357(4):370–9, July 2007.
[9] John T Cacioppo, James H Fowler, and Nicholas A Christakis. Alone in the Crowd: The Structure and
Spread of Loneliness in a Large Social Network. Journal of personality and social psychology, 97(6):977–
991, 2010.
[10] James H. Fowler, Jaime E. Settle, and Nicholas A. Christakis. Correlated genotypes in friendship networks.
PNAS, 108:1993, 2011.
[11] Anna Chmiel, Julian Sienkiewicz, Georgios Paltoglou, Kevan Buckley, Mike Thelwall, and Janusz A.
Holyst. Negative emotions boost users activity at bbc forum. Technical Report 1011.5459, arXiv, 2010.
[12] Brian Parkinson and Gwenda Simons. Affecting others: social appraisal and emotion contagion in everyday
decision making. Personality and social psychology bulletin, 35(8):1071–84, August 2009.
[13] Winter a Mason, Frederica R Conrey, and Eliot R Smith. Situating social influence processes: dynamic,
multidirectional flows of influence within social networks. Personality and social psychology review : an
official journal of the Society for Personality and Social Psychology, Inc, 11(3):279–300, August 2007.
15
[14] Jeffrey R Huntsinger, Janetta Lun, Stacey Sinclair, and Gerald L Clore. Contagion without contact: an-
ticipatory mood matching in response to affiliative motivation. Personality and social psychology bulletin,
35(7):909–22, July 2009.
[15] Akshay Java, Xiaodan Song, Tim Finin, and Belle Tseng. Why we twitter: understanding microblogging
usage and communities. In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web
mining and Social Network Analysis, pages 56–65, New York, NY, USA, 2007. ACM.
[16] Haewoon Kwak, Changhyun Lee, Hosung Park, and Sue Moon. What is Twitter, a social network or a
news media? In WWW ’10: Proceedings of the 19th international conference on World wide web, pages
591—-600, Raleigh, North Carolina, USA, 2010. ACM.
[17] Halil Bisgin, Nitin Agarwal, and Xiaowei Xu. Investigating Homophily in Online Social Networks. In 2010
IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pages
533–536, Toronto, Canada, August 2010. IEEE.
[18] Reza Zafarani, William D Cole, and Huan Liu. Sentiment Propagation in Social Networks : A Case Study
in LiveJournal. In Patricia Chai, Sun-Ki And Salerno, John And Mabry, editor, SBP 2010 - Advances in
Social Computing, Lecture Notes in Computer Science (6007), pages 413–420. Springer Berlin, 2010.
[19] Alina Mungiu-Pippidi and Igor Muntean. Moldova’s “Twitter” Revolution. Journal of Democracy, 20(3),
2009.
[20] Onook Oh, Kyounghee Hazel Kwon, and H. Raghav Rao. An exploration of social media in extreme events:
rumor theory and twitter during the Haiti earthquake. In International Conference on Information Systems
(ICIS), page Paper 231, St. Louis, Missouri, USA, 2010.
[21] David Lazer, Alex Pentland, Lada Adamic, Sinan Aral, Albert-László Barabási, Devon Brewer, Nicholas
Christakis, Noshir Contractor, James Fowler, Myron Gutmann, Tony Jebara, Gary King, Michael Macy, Deb
Roy, and Marshall Van Alstyne. Computational social science. Science, 323:5915, 2009.
[22] Sang Hoon Lee, Pan-Jun Kim, Yong-Yeol Ahn, and Hawoong Jeong. Googling social interactions: Web
search engine based social network construction. PLoS One, 5:e11233, 2010.
[23] Ed Diener. Subjective Well-Being, pages 11–58. Springer Netherlands, 2009.
[24] K. Balog, G. Mishne, and M. de Rijke. Why are they excited? identifying and explaining spikes in blog
mood levels. In 11th Conference of the European Chapter of the Association for Computational Linguistics.
Trento, Italy, 2006.
[25] Peter Sheridan Dodds and Christopher M Danforth. Measuring the Happiness of Large-Scale Written Ex-
pression: Songs, Blogs, and Presidents. Journal of Happiness, 11(4), July 2009.
[26] A. Mislove, S. Lehmann, Y.-Y. Ahn, J.-P. Onnela, and J. N. Rosenquist. Pulse of the nation: visualizing the
mood of twitter. http://www.ccs.neu.edu/home/amislove/twittermood/, 2010.
[27] Johan Bollen, Huina Mao, and Alberto Pepe. Determining the public mood state by analysis of microblog-
ging posts. In Proceedings of the Proc. of the Alife XII Conference, Odense, Denmark, 2010. MIT Press.
16
[28] Johan Bollen, Huina Mao, and Xiaojun Zeng. Twitter mood predicts the stock market. Journal of Compu-
tational Science, In press, 2011.
[29] M. Szell, R. Lambiotte, and S. Thurner. Multirelational organization of large-scale social networks in an
online world. Proceedings of the National Academy of Sciences, 107(31), July 2010.
[30] B A Huberman, D M Romero, and F Wu. Social networks that matter: Twitter under the microscope. First
Monday, 14:1, 2008.
[31] Theresa Wilson, Janyce Wiebe, and Paul Hoffmann. Recognizing contextual polarity in phrase-level senti-
ment analysis. Proceedings of the conference on Human Language Technology and Empirical Methods in
Natural Language Processing - HLT05, (October):347–354, 2005.
[32] Brendan O’Connor, Ramnath Balasubramanyan, Bryan R Routledge, and Noah A Smith. From Tweets to
Polls: Linking Text Sentiment to Public Opinion Time Series. In Proceedings of the International AAAI
Conference on Weblogs and Social Media, Washington DC, USA, 2010. AAAI Press.
[33] Jukka-Pekka Onnela and Felix Reed-Tsochas. Spontaneous emergence of social influence in online systems.
PNAS, 107:18375, 2010.
[34] Damon Centola and Michael Macy. Complex Contagion and the weakness of long ties. American Journal
of Sociology, 113(3):702–734, 2007.
[35] Sinan Aral, Lev Muchnik, and Arun Sundararajan. Distinguishing influence-based contagion from
homophily-driven diffusion in dynamic networks. Proceedings of the National Academy of Sciences of
the United States of America, 106(51):21544–9, December 2009.
[36] Cosma Rohilla Shalizi and Andrew C. Thomas. Homophily and Contagion Are Generically Confounded in
Observational Social Network Studies. Sociological Methods and Research (arXiv:1004.4704v3), 2011.
17
|
1312.2237 | 1 | 1312 | 2013-12-08T17:37:24 | Clustering online social network communities using genetic algorithms | [
"cs.SI",
"physics.soc-ph"
] | To analyze the activities in an Online Social network (OSN), we introduce the concept of "Node of Attraction" (NoA) which represents the most active node in a network community. This NoA is identified as the origin/initiator of a post/communication which attracted other nodes and formed a cluster at any point in time. In this research, a genetic algorithm (GA) is used as a data mining method where the main objective is to determine clusters of network communities in a given OSN dataset. This approach is efficient in handling different type of discussion topics in our studied OSN - comments, emails, chat expressions, etc. and can form clusters according to one or more topics. We believe that this work can be useful in finding the source for spread of this GA-based clustering of online interactions and reports some results of experiments with real-world data and demonstrates the performance of proposed approach. | cs.SI | cs | Clustering online social network communities using genetic algorithms
Dipankar Dasgupta*
Mustafa H. Hajeer*
Sugata Sanyal#
Alka Singh*
#School of Technology & Computer Science
*Center for Information Assurance
Tata Institute of Fundamental Research
Department of Computer Science
The University of Memphis
Homi Bhabha Road,
Mumbai-400005, INDIA
Memphis, TN 38138, USA
ABSTRACT
To analyze the activities in an Online Social Network (OSN), we
introduce the concept of “Node of Attraction” (NoA) which
represents the most active node in a network community. This
NoA is identified as the origin/initiator of a post/communication
which attracted other nodes and formed a cluster at any point in
time. In this research, a genetic algorithm (GA) is used as a data
mining method where the main objective is to determine clusters
of network communities in a given OSN dataset. This approach is
efficient in handling different type of discussion topics in our
studied OSN –comments, emails, chat sessions, etc. and can form
clusters according to one or more topics. We believe that this
work can be useful in finding the source for spread of
rumors/misinformation, help
law enforcement
in
resource
allocation in crowd management, etc. The paper presents this GA-
based clustering of online interactions and reports some results of
experiments with
real-world data and demonstrates
the
performance of proposed approach.
Keywords: Online Social Network, Node of Attraction, GA-
Based clustering.
1. INTRODUCTION
Blogging, twitting and online social networking have
become an integral part of modern-day life. Studies have
shown that people spend a lot of their time in online media
such as Facebook, MySpace, Twitter, YouTube, Google+
and
in
other
blogosphere.
These web-based
services/applications are designed to assist people and
businesses alike to stay in touch, communicate and
collaborate more effectively, and socialize across borders
and in general, maintain a second avatar in cyberspace. The
way blog sites (nodes) attract people for participating in
discussion, share information and/or spread rumor is very
interesting and
to study. The dynamic
fascinating
interaction among these nodes and the period of increased
interaction and manner in which such interaction get
decreased can provide useful information about the current
events, topics of discussion, and human behavior. In the
analysis of online social network (OSN) data, the basic
problem lies in the detection of groups of closely connected
nodes which are called ‘network communities’. In this
work, we consider the relation among the nodes in OSN,
and group
their
the strength of
to
them according
relations/interactions. The work is motivated by the need to
understand how the interactions in virtual-world can
manifest real-world security concerns or law and order
situations. Such a clustering of online social communities
may also help to detect insider threats, employee behavior,
or recognizing competitor interests in social activities as
possible motivators.
In this research, a genetic algorithm (GA) is used as a data
mining method where the main objective of clustering is to
find network communities from a given OSN dataset.
There exist some works which addresses different aspects
of online social behavior and used un-weighted social
network data for clustering [2], i.e. every edge in the
network has equal value/weight and distributed community
detection in delay tolerant networks [3, 9-10].
2. GA-BASED APPROACH
An OSN community can be defined as a set of users who
are frequently interacting with each other and participating
in some discussion e.g. group, subgroup, module, and
cluster.
A Genetic algorithm (GA) is an optimization method which
uses biological process as a model to find solutions in the
search problem. We used a GA here for finding the clusters
in OSN data having multiple values for each edge
indicating individual node participating in more than one
discussion groups or activities. The goal is to improve the
processing and efficient interpretation of real-world OSN
data, relevant knowledge, and subsequent information
processing and representation. The underlying approach
tries to find dense clusters using an edge removal strategy
in an intelligent way based on the context of discussions.
The reasons for using GA-based approach are
• Huge search space and non-linearity in search space.
• The dynamic nature of network topology and the need
of adaptive multi-fitness function.
• GAs perform global search in problem space
GAs are easy to interface to existing simulations and
•
models
GAs are extensible and easy to hybridize
•
GAs are remarkably noise tolerant
•
The implementation details of the GA approach for OSN
data clustering is explained in the next section, the section
4 provides some experiments and results. The last section
gives some concluding remarks.
2.1 Node of Attraction:
As we know, nodes in a social network are not
physical nodes rather web sites, postings, user blogs, pages
with some news, etc. For example, the documentary on
Invisible Children (Kony 2012) was posted at a video-
sharing website, YouTube.com on 5th March 2012. In two
weeks time, over 78 million viewers visited the site;
another website vimeo.com also posted the same video and
attracted over 16.6 million viewers during the same time.
This indicates that the sites which hosted the video
attracted significant number of viewers forming clusters
with the posted page as the focal point.
We introduced the concept of Node of Attraction (NoA)
which represents the most active node in a network
community. This NoA is identified as the origin of a
post/communication which attracts other nodes to form a
cluster. The need of finding such nodes and to keep track of
these nodes in social networks has many real-world
applications such as detection of spreading news or rumor
in the society.
3. IMPLEMENTATION DETAILS
to find
In
this work, a genetic algorithm
is used
clusters/groups
in online network data by removing
minimum number of edges while the clusters have
maximum number of ties.
3.1 Encoding schemes
We have used
two encoding schemes where each
chromosome represents groups or clusters.
In the first scheme, each chromosome is variable in size,
composed of edge list as shown in Figure 1 (top left). These
edges are derived from nodes in each row of the table
(right). The genetic process will remove edges from the
chromosome to form clusters as illustrated in Figure 1
(bottom left).
Figure 1: First encoding scheme showing edge removal from
the OSN data
The
real-valued
second encoding
scheme uses a
representation, where the first number denotes the number
of groups and the rest fields denote the points of separation
between nodes to form groups as shown in Figure 2.
Figure 2: The second encoding scheme
3.2 The fitness function
Two properties of clustering such as high intra-cluster
similarity and low inter-cluster similarity are considered for
fitness measure of each chromosome. Accordingly, the
number of edges connected to a node form a group are
considered for fitness, where we calculate the clossness of
groups/clusters and penalize the chromosome with smaller
groups with same fitness. The fitness function uses the
most updated edge values rather than old values in order to
adapt to the changes in the interactions.
3.3 Setting of GA control parameters
To create diversity in the candidate solution list, the initial
population is generated with random edges, and the fitness
for each chromosome is calculated.
We run a steady-state GA with two different datasets. A
single-point crossover with probability of 0.85, population
size 100, maximum evaluations 10,000, and the binary
tournament selection operator are used. The high rate of
mutation is used so that the genetic search can adapt to
dynamic user interactions (as reflected in data) over time.
After crossover and mutations are performed, each
chromosome is repaired (if necessary) in order to remove
repeated edges in the chromosome.
For the second encoding scheme, we used a different type
of crossover where each chromosome uses the swap
operator where some genes are exchanged, and the
mutations are restricted to the second and first parts of the
chromosome.
4. EXPERIMENTS AND RESULTS
In order to determine the correct NoA for an attribute, the
chromosome exhibiting the best fitness is searched and then
it is decoded/ mapped to form groups. After the mapping
operation, these groups are sent to a function which finds
the NoA (the node with maximum number of edges) and is
saved in a file to keep track of all NOAs over a period of
time.
the GA-based
the performance of
To demonstrate
clustering approach, we first experiment with a hand-
crafted synthetic datasets and then we use some real-world
OSN data.
4.1 Synthetic (small) dataset
Table 1 shows the small dataset containing 15 edges each
with 3 attributes as different type of interactions between a
pair of nodes. Such interactions represent multi-valued
edges among
the nodes. Here
the
interactions/edges
represent number of emails, number of comments and the
number of posts between nodes. Figure 3
the
is
corresponding network diagram (of Table 1) with some
multi-valued edge. If there is no edge between any two
nodes which indicates that attribute values between these
two nodes are zero.
Table 1: A small synthetic dataset
Number of
Number
Node A Node B Number
comments
of posts
of emails
4
4
4
3
3
3
4
4
4
5
5
4
4
4
3
4
3
3
3
3
3
3
3
3
1
29
1
30
1
2
1
39
1
3
4
5
3
5
4
4
4
4
5
3
4
3
4
4
5
5
4
35
1
1
3
4
4
3
3
3
4
3
4
5
4
2
3
3
4
5
4
5
4
5
4
5
4
3
4
3
4
5
4
3
1
1
1
1
5
5
2
2
4
8
5
6
6
6
7
7
8
6
10
10
10
11
11
11
12
13
12
14
After running the program, we observed that the GA is able
to form clusters corresponding to each discussion groups
(attributes) as shown in Figure 4.
2
3
4
5
4
3
3
4
7
14
6
7
8
9
8
9
9
10
11
12
14
12
13
14
13
14
14
15
Figure 3: A graphical representation of the small dataset.
Figure 4(a) graphically represents results of a GA run
which contains edges
list forming network clusters
according to the first attribute of the synthetic dataset
(Table 1).
Figure 4(a): GA-based clustering according to number of
Emails.
Similarly, Figure 4(b) and Figure 4(c) show the clusters
formed based on other two attributes: number of comments
and number of posts.
exchanged among nodes. Other attributes should be
selected in conjunction.
Now, let us take a look at figure 5(a) and Figure 5(b)
below, where inter-group interactions and overlapping are
demonstrated. If the OSN data are clustered according the
first and the second attributes as per the dataset (Table 1),
the overlapped groups are formed.
Figure 4(b): Clustering according to number of comments.
Figure 5 (a): Groups formed according multi-valued edges
Figure 5(b): Groups formed according multi-valued edges
If we consider multiple attributes, it is observed that some
nodes connect two or more separate clusters; such a node is
identified as the “linkage node”. These nodes help to
analyze the interactions between two different discussion
groups or topics (figure 5).
To illustrate the dynamic interactions in social networks
and to demonstrate the performance of our GA-based
clustering approach, we changed some attribute values
during the run. At time T0 during the execution of the
algorithm, clusters started to form, based on the dataset as
shown in figure 6, and after that some changes are made in
the first attribute. This process is illustrated through the
following example:
Here the second group is formed with the nodes {6, 7, 8, 9}
before changes were made and NoA was the node number
{9}. Sometime after T0, node X is added to the second
Figure 4(c): Clustering according to number of posts.
As per definition, the NoA for different attribute can be
observed in each figure above. Accordingly, in figure 4(a)
NoAs are {1, 9 and 14}, in figure 4(b) NoA nodes are {14
and 1} and in figure 4(c) these nodes are {6 and 14}.
However, this provides a simplest analysis of real online
social network interactions. Only one attribute is not
sufficient to classify the entire social network. In particular,
groups should not be clustered only on the basis of email
group and it was connected to all group members. Since it
was connected with all group members, and it was
observed that the system immediately considers X as the
new node of attraction.
So after initial clustering, the groups’ formation adapts to
changes made to the network interaction. Table 2 shows
the results of these dynamic changes, where the changes
take place between time period T0 and T1 as follows:
• Node X was added to the data set.
• Edges were connected from X to nodes {6,7,8,9}
and the changes which take place between time T1 and T2
are:
• Node Y added to the dataset.
• Edge from X to node 6 and node 7 is removed to
reduce its value.
• Edges from Y added to nodes {6, 7, 8, 9, X}. Hence
node Y becomes the new node of attraction.
Table2: second group dynamics
Node of attraction
Group members
6,7,8,9
9
X
6,7,8,9,X
6,7,8,9,X,Y
Y
Time
T0
T1
T2
Figure 6 illustrates these changes where the blue edges
represent the regular nodes which are added to the dataset
and red edges show new Node of Attraction.
Gnutella peer to peer network. This dataset contains 20,777
edges and random value is assigned to each edge (Figure
7),
Figure 7: An example network dataset with 1000 edges [5]
Our solutions contain the groups which start to form slowly
with smaller groups with strong ties. Hence after each (100)
iterations we extracted the solution and observed more
groups being formed in the solution set. The GA-based
system responds slowly especially in the beginning (takeoff
time) because of the huge solution space, but after forming
the initial groups, it could quickly reflect changes to the
groups, and produce better and reliable results as the time
passes.
Figure 6: Cluster results with dynamic changes in the
synthetic dataset
4.2 Experiments with real-world dataset
The real-world dataset considered here is taken from
Stanford Large Network Dataset Collection [5], it is called
Figure 8: Clusters formed in 1000 edges network data after
running GA for 1000 iterations
The clustering results obtained after 1000 iteration of a GA
run is visualized in Figure 8. It shows that some small
groups and a big group are formed. If we keep running the
program, the big group would have further divided into
smaller groups. It was observed that the groups which are
already formed are adaptable to any change in the input
dataset.
The differences between Figure 7 and Figure 8 are clearly
visible; the original data representation in Figure 7 contains
all nodes which are connected to each other in some
manner (these figures are a presentation of clusters). The
size of the groups varies based on the complexity of
interactions.
Again, to illustrate the dynamism, some nodes are added to
the dataset (Blue); the nodes with high value and high
connectivity (shown in red) are the new nodes of attraction
(Red) which are shown in Figure 9 below. It shows that
updated clusters are formed
in
the social network
interactions.
Figure 9: Changes on the dataset during running the system
causes restructuring of groups or clusters.
Because of multi-attribute clustering technique used, this
work provides
the power
to observe
the points of
connections nodes, indicating the nodes that connect more
than one group, and it’s considered as linkage nodes.
5. DATA AVAILABILITY
In the first test case (Table 1 -Synthetic dataset), we
assumed that the user has access to data that have multiple
weights for each connection, like weight for messages
exchange and weights for discussions, but in real-world we
may not have such information. So for the second set of
experiments (real-world dataset), we considered equal
values for all connections (i.e. either there is a connection
or no connection) since we have only edge-list in the
datasets [5].
6. CONCLUDING REMARKS
An OSN community can be defined as a set of users who
are frequently interacting with each other and participate in
some discussions. Determining such communities in an
OSN has a wide verity of applications, such as
• Understanding the interactions among group of people
• Visualizing and navigating huge networks of NoAs
Forming a basis for other tasks such as data mining
•
• Marketing, handling law and order situations
This approach allows us to form clusters based on
interactions among group members
in OSNs; we
introduced the term NoA (Node of Attraction) which
represents a node that attracts most of other nodes in the
same group at a given time. The Node of Attraction in a
social network, captures interaction dynamics “subsets of
actors among whom there are relatively strong, direct,
intense, frequent or positive ties”[1]. This NoA can help to
predict the forming and merging of groups and subgroups.
For example, if nodes from one sub group starts to interact
with NoA of another sub group, there is a high probability
that these sub groups may merge soon to form a larger
group. Another benefit of NoA is that it helps to identify
the source of a post/news and also may help in community
detection in blogsphere.
.Because of the huge size of the solution space, we chose to
use a GA approach to solve this problem, the main idea is
to cluster the whole network into groups and at the same
time keep track of NoAs in dynamic interactions.
The experimental run takes some time in producing reliable
results but results seems to be persistent even with the
dynamic changes. In case of a snapshot of the best
individual (best so far) solution is desired from the
population, the software is capable of producing such a
result at any given time.
7. References:
[1] Stanley Wasserman and Katherine Faust, Social Network
Analysis, Methods and Applications (Book), November 25, 1994.
[2] Santo Fortunato. Community detection in graphs, Complex
Networks and Systems Lagrange Laboratory, ISI Foundation,
Viale S. Severo 65, 10133, Torino, ITALY.
[3] Pan Hui, Eiko Yoneki, Shu-Yan Chan, Jon Crowcroft.
Distributed Community Detection in Delay Tolerant Networks,
University of Cambridge, Computer Laboratory Cambridge CB3
0FD United Kingdom
[4] Jorg Reichardt and Stefan Bornholdt. Statistical Mechanics of
Community Detection,
Institute
for Theoretical Physics,
University of Bremen, Otto-Hahn-Allee, D-28359 Bremen,
Germany, February 3, 2008
[5]
Collection
Dataset
Network
Large
Stanford
http://snap.stanford.edu/data/ , Collaboration network of Arxiv
General Relativity.
[6] M. E. J. Newman, 'Modularity and community structure in
networks', PNAS103 (23), pages 8577-8582, June 6, 2006.
[7] Scott White and Padhraic Smyth, A spectral Clustering
Approaches To Finding Communities in Graphs, in 'SDM', 2005.
[8]
KONY
2012:
Invisible
Children
http://www.youtube.com/watch?v=Y4MnpzG5Sqc
[9] Shihua Zhanga, Rui-Sheng Wangb, Xiang-Sun Zhang.
Identification of overlapping community structure in complex
networks using fuzzy c-means clustering. Physica A, 2007.
[10] Lei Tang and Huan Liu. Graph Mining Applications to social
network analysis. Book chapter C.C. Aggarwal and H. Wang
(eds.), Managing and Mining Graph Data, Advances in Database
Systems 40, Springer Science+Business Media, LLC 2010.
|
1908.02591 | 1 | 1908 | 2019-07-31T22:10:01 | Anti-Money Laundering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial Forensics | [
"cs.SI",
"cs.CY",
"cs.LG",
"q-fin.GN"
] | Anti-money laundering (AML) regulations play a critical role in safeguarding financial systems, but bear high costs for institutions and drive financial exclusion for those on the socioeconomic and international margins. The advent of cryptocurrency has introduced an intriguing paradox: pseudonymity allows criminals to hide in plain sight, but open data gives more power to investigators and enables the crowdsourcing of forensic analysis. Meanwhile advances in learning algorithms show great promise for the AML toolkit. In this workshop tutorial, we motivate the opportunity to reconcile the cause of safety with that of financial inclusion. We contribute the Elliptic Data Set, a time series graph of over 200K Bitcoin transactions (nodes), 234K directed payment flows (edges), and 166 node features, including ones based on non-public data; to our knowledge, this is the largest labelled transaction data set publicly available in any cryptocurrency. We share results from a binary classification task predicting illicit transactions using variations of Logistic Regression (LR), Random Forest (RF), Multilayer Perceptrons (MLP), and Graph Convolutional Networks (GCN), with GCN being of special interest as an emergent new method for capturing relational information. The results show the superiority of Random Forest (RF), but also invite algorithmic work to combine the respective powers of RF and graph methods. Lastly, we consider visualization for analysis and explainability, which is difficult given the size and dynamism of real-world transaction graphs, and we offer a simple prototype capable of navigating the graph and observing model performance on illicit activity over time. With this tutorial and data set, we hope to a) invite feedback in support of our ongoing inquiry, and b) inspire others to work on this societally important challenge. | cs.SI | cs | Anti-Money Laundering in Bitcoin: Experimenting with Graph
Convolutional Networks for Financial Forensics
Mark Weber∗
Jie Chen
Giacomo Domeniconi∗
MIT-IBM Watson AI Lab
[email protected]
Tom Robinson
Elliptic
[email protected]
MIT-IBM Watson AI Lab
[email protected]
IBM Research
[email protected]
Daniel Karl I. Weidele
IBM Research AI
[email protected]
Claudio Bellei
Elliptic
[email protected]
9
1
0
2
l
u
J
1
3
]
I
S
.
s
c
[
1
v
1
9
5
2
0
.
8
0
9
1
:
v
i
X
r
a
Charles E. Leiserson
MIT CSAIL
[email protected]
ABSTRACT
Anti-money laundering (AML) regulations play a critical role in
safeguarding financial systems, but bear high costs for institutions
and drive financial exclusion for those on the socioeconomic and
international margins. The advent of cryptocurrency has intro-
duced an intriguing paradox: pseudonymity allows criminals to
hide in plain sight, but open data gives more power to investigators
and enables the crowdsourcing of forensic analysis. Meanwhile
advances in learning algorithms show great promise for the AML
toolkit. In this workshop tutorial, we motivate the opportunity to
reconcile the cause of safety with that of financial inclusion. We
contribute the Elliptic Data Set, a time series graph of over 200K
Bitcoin transactions (nodes), 234K directed payment flows (edges),
and 166 node features, including ones based on non-public data;
to our knowledge, this is the largest labelled transaction data set
publicly available in any cryptocurrency. We share results from a
binary classification task predicting illicit transactions using varia-
tions of Logistic Regression (LR), Random Forest (RF), Multilayer
Perceptrons (MLP), and Graph Convolutional Networks (GCN),
with GCN being of special interest as an emergent new method for
capturing relational information. The results show the superiority
of Random Forest (RF), but also invite algorithmic work to combine
the respective powers of RF and graph methods. Lastly, we consider
visualization for analysis and explainability, which is difficult given
the size and dynamism of real-world transaction graphs, and we
offer a simple prototype capable of navigating the graph and ob-
serving model performance on illicit activity over time. With this
tutorial and data set, we hope to a) invite feedback in support of
our ongoing inquiry, and b) inspire others to work on this societally
important challenge.
∗Both authors contributed equally to this research.
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permitted. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior specific permission and/or a
fee. Request permissions from [email protected].
KDD '19 Workshop on Anomaly Detection in Finance, August 2019, Anchorage, AK, USA
© 2019 Association for Computing Machinery.
CCS CONCEPTS
• Security and privacy → Database activity monitoring; • Com-
puting methodologies → Machine learning; • Applied com-
puting → Network forensics.
KEYWORDS
Graph Convolutional Networks, Anomaly Detection, Financial
Forensics, Cryptocurrency, Anti-Money Laundering, Visualization
ACM Reference Format:
Mark Weber, Giacomo Domeniconi, Jie Chen, Daniel Karl I. Weidele, Claudio
Bellei, Tom Robinson, and Charles E. Leiserson. 2019. Anti-Money Laun-
dering in Bitcoin: Experimenting with Graph Convolutional Networks for
Financial Forensics. In Proceedings of ACM Conference (KDD '19 Workshop
on Anomaly Detection in Finance). ACM, New York, NY, USA, 7 pages.
1 TOWARD FINANCIAL INCLUSION
"It's expensive to be poor." This is a common credo among advocates
for financial inclusion. It speaks to the fact that those on the margins
of society suffer from restricted access to the financial system and
higher relative costs of participation.
The problem of restricted access (e.g. the ability to sign up for
a bank account) is, in part, an unintended consequence of increas-
ingly stringent anti-money laundering (AML) regulations, which,
while essential for safeguarding the financial system, have a dis-
proportionately negative effect on low-income people, immigrants,
and refugees [16]. Approximately 1.7 billion adults are unbanked
[7]. The problem of higher relative costs is also, in part, a function
of AML policy, which enforces high fixed costs of compliance on
money service businesses (MSBs) along with the fear of criminal
and monetary penalties for noncompliance -- "low value" customers
just aren't worth the risk. Consider global remittances to low-and-
middle-income countries, which reached a record high $529 billion
in 2018, far outpacing the global aid contribution of $153 billion.
The current average cost of sending $200 is an expensive 7 per-
cent, with some countries suffering rates of over 10 percent. The
United Nations Sustainable Development Goal number 10.7 targets
a reduction to 3 percent by 2030.[12]
And yet AML regulations cannot be summarily dismissed as over
burdensome. Multi-billion dollar illicit industries like drug cartels,
human trafficking, and terrorist organizations cause intense human
KDD '19 Workshop on Anomaly Detection in Finance, August 2019, Anchorage, AK, USA
Weber and Domeniconi, et al.
suffering around the world. The recent 1Malaysia Development
Berhad (1MDB) money laundering scandal robbed the Malaysian
people of over $11 billion in taxpayer funds earmarked for the na-
tion's development [22], with mega-fines and criminal indictments
for Goldman Sachs among others implicated in the wrongdoing.
The even more recent Danske Bank money laundering scandal in
Estonia, which served as a hub for an estimated $200 billion in illicit
money flows from Russia and Azerbaijan, similarly extracted an
incalculable toll on innocent citizens of these countries and served
implicated institutions like Danske Bank and Deutsche Bank with
billions of dollars in losses [23].
Money laundering is not a victimless crime, and current methods
for the traditional financial system are doing a poor job of stopping
it. Without reducing this complex challenge to data analysis alone,
we pose the question: with the right tools and open data, can we help
reconcile the need for safety with the cause of financial inclusion?
1.1 AML in a cryptocurrency world
The advent of cryptocurrency introduced by Bitcoin [17] ignited an
explosion of technological and entrepreneurial interest in payment
processing. Around the world, money transfer startups spun up to
compete with legacy banks and MSBs like Western Union. They
focused on enabling low-cost, peer-to-peer transfers of cash within
and across borders using Bitcoin and other cryptocurrencies as the
"rails" (a commonly used term in this space). Many explicitly tar-
geted remittances and championed the cause of financial inclusion.
Alongside these entrepreneurs grew a community of academics and
policy advocates supporting updated regulatory considerations for
cryptocurrency.
Dampening this excitement was Bitcoin's bad reputation. Many
criminals used Bitcoin's pseudonymity to hide in plain sight, con-
ducting ransomware attacks and operating dark marketplaces for
the exchange of illegal goods and services.
In May 2019, the Financial Crimes Enforcement Network (Fin-
CEN) of the United States issued new guidance on how the Bank
Secrecy Act (BSA) of 1970 applies to cryptocurrency, or what Fin-
CEN calls convertible virtual currencies (CVC) [18]. Consistent
with the BSA, the guidance calls for MSBs to generate individual-
ized risk assessments measuring exposure to money laundering,
terrorism finance, and other financial crime. These assessments are
based on customer composition, geographies served, and financial
products or services offered. The assessments must inform the man-
agement of customer relationships, including the implementation
of controls commensurate with risk; in other words, MSBs must not
only report suspicious accounts, but must also take action against
them (e.g. freeze them or shut them down). The guidance defines a
"well-developed risk assessment" as "assisting MSBs in identifying
and providing a comprehensive analysis of their individual risk
profile." Reinforcing the Know Your Customer (KYC) requirements
of the BSA, the guidance requires MSBs to "know enough about
their customers to be able to determine the risk level they represent
to the institution."
What it means to "know enough" about one's customer is the
subject of much debate in compliance and policy circles. In practice,
one of the most challenging aspects of this is an implicit but effec-
tively enforced requirement to not only know your customer, but to
know your customer's customer. In the fragmented data ecosystem
of traditional finance, this aspect of compliance is often executed
by phone calls between MSBs. But in the open system of Bitcoin,
the full graph transaction network data is publicly available, albeit
in pseudonymous and unlabelled form.
To meet the opportunity this public data presents, cryptocur-
rency intelligence companies have emerged to provide AML solu-
tions tailored to the cryptocurrency domain. Whereas the pseudonymity
of Bitcoin is an advantage for criminals, the public availability of
data is a key advantage for investigators.
2 THE ELLIPTIC DATA SET
Elliptic is a cryptocurrency intelligence company focused on safe-
guarding cryptocurrency ecosystems from criminal activity. For
this tutorial and as a contribution to the research community, we
present The Elliptic Data Set, a graph network of Bitcoin transac-
tions with handcrafted features. As a contribution to the research
and AML communities, Elliptic has agreed to share this data set pub-
licly. To our knowledge, it constitutes the world's largest labelled
transaction data set publicly available in any cryptocurrency.
2.1 Graph Construction
The Elliptic Data Set maps Bitcoin transactions to real entities
belonging to licit categories (exchanges, wallet providers, miners,
licit services, etc.) versus illicit ones (scams, malware, terrorist
organizations, ransomware, Ponzi schemes, etc.). From the raw
Bitcoin data, a graph is constructed and labelled such that the nodes
represent transactions and the edges represent the flow of Bitcoin
currency (BTC) going from one transaction to the next one. A given
transaction is deemed licit (versus illicit) if the entity initiating the
transaction (i.e., the entity controlling the private keys associated
with the input addresses of a specific transaction) belongs to a licit
(illicit) category1. Importantly, all features are constructed using
only publicly available information.
2.1.1 Nodes and Edges. There are 203,769 node transactions and
234,355 directed edge payments flows. For perspective, using the
same graph representation the full Bitcoin network has approxi-
mately 438M nodes and 1.1B edges as of this writing. In the Elliptic
Data Set, two percent (4,545) are labelled class1 (illicit). Twenty-one
percent (42,019) are labelled class2 (licit). The remaining transac-
tions are not labelled with regard to licit versus illicit, but have
other features.
Features. Each node has associated 166 features. The first 94
2.1.2
features represent local information about the transaction -- includ-
ing the time step, number of inputs/outputs, transaction fee, output
volume and aggregated figures such as average BTC received (spent)
by the inputs/outputs and average number of incoming (outgoing)
transactions associated with the inputs/outputs. The remaining 72
features, called aggregated features, are obtained by aggregating
transaction information one-hop backward/forward from the cen-
ter node - giving the maximum, minimum, standard deviation and
correlation coefficients of the neighbour transactions for the same
information data (number of inputs/outputs, transaction fee, etc.).
1Note that for simplicity, this argument ignores mixer transactions where the inputs
are controlled by multiple entities.
Anti-Money Laundering in Bitcoin
KDD '19 Workshop on Anomaly Detection in Finance, August 2019, Anchorage, AK, USA
Figure 1: (Top) Fraction of illicit vs. licit nodes at different time steps in the data set. (Bottom) Number of nodes vs. time step.
2.1.3 Temporal Information. A time stamp is associated with each
node, representing an estimate of the time when the transaction is
confirmed by the Bitcoin network. There are 49 distinct time steps,
evenly spaced with an interval of about two weeks. Each time
step contains a single connected component of transactions that
appeared on the blockchain within less than three hours between
each other; there are no edges connecting different time steps.
Clearly the nodes in a specific time step have associated time stamps
very close to each other, so effectively each one of them can be
thought of as an instantaneous "snapshot" in time. The number of
nodes for each time step is reasonably uniform over time (ranging
from 1,000 to 8,000 nodes). See Figure 1.
2.2 Notes on Feature Construction
The licit versus illicit labelling process is informed by a heuristics-
based reasoning process. For example, a higher number of in-
puts and the reuse of the same address is commonly associated
with higher address-clustering [10], which results in a degrade of
anonymity for the entity signing the transaction. On the other hand,
consolidating funds controlled by multiple addresses in one single
transaction provides benefits in terms of transaction costs (fee). It
follows that entities eschewing anonymity-preserving measures for
large volumes of user requests are likely to be licit (e.g. exchanges).
In contrast, illicit activity may tend to favor transactions with a
lower number of inputs to reduce the impact of de-anonymizing
address-clustering techniques.
Additionally, there are two major challenges in building features
for Bitcoin transactions. The first is rooted in the size of the Bitcoin
blockchain amounting to 200GB of compressed data and about 400
million addressed transactions. Though not all transactions are
included in the subset used in this study, it is still necessary to
access the complete blockchain in order to observe the full history
of wallets participating in the selected transactions. To overcome
this, Elliptic uses a high-performance all-in-memory graph engine
for the computation of features.
The second challenge arises from the underlying graph structure
of the data and the heterogeneity in the number of neighbors a
transaction can have. In building the 72 aggregated features, the
problem of heterogeneous neighborhoods is addressed by naively
constructing statistical aggregates (minimum, maximum, etc.) of the
local features of a neighbor transaction. In general, this solution is
sub-optimal because it carries a significant loss of information. We
address this in our forthcoming discussion of graph deep learning
methods, which may better account for the local graph topology.
3 TASK AND METHODS
At a high level, AML analytics is an anomaly detection challenge of
accurately classifying a small number of illicit transactions in mas-
sive, ever-growing data sets. Industry standard high false positive
rates of upwards of 90% inhibit this effort. We want to reduce false
positive rates without increasing false negative rates, i.e. include
more innocent people without allowing more criminals. Logistic
Regression and Random Forest are among the benchmark methods
for this task. Graph deep learning has also emerged as potential
tool for AML [21].
In the case of the Elliptic Data Set, the task to be performed
on this data is transaction screening for assessing the risk associ-
ated with a given transaction to-and-from cryptocurrency wallets.
Specifically, each unlabelled Bitcoin transaction is to be classified
illicit or licit.
KDD '19 Workshop on Anomaly Detection in Finance, August 2019, Anchorage, AK, USA
Weber and Domeniconi, et al.
3.1 Benchmark Methods
Given the features previously described, benchmark machine learn-
ing methods use the first 94 features in supervised learning for
binary classification. Such techniques include Logistic Regression
[1], Multilayer Perceptron (MLP) (ibid), and Random Forest [2]. In
MLP, each input neuron takes in a data feature and the output is a
softmax with a probability vector for each class. Logistic Regression
and Random Forest are popular for AML, especially when used in
concert with one another for their respective advantages -- Random
Forest for accuracy and Logistic Regression for explainability. These
methods, however, do not leverage any graph information.
In the Elliptic Data Set, the local features are enhanced with a set
of 72 features that contain information about the immediate neigh-
bourhood. We will see the utilization of these features improves
performance. While this approach shows the graph structure carries
in the binary classification problem, and that this can be used with
standard machine learning techniques, it is challenging to extend
the purely feature-based method beyond the immediate neighbour-
hood. This drawback motivates the use of Graph Convolutional
Networks.
3.2 Graph Convolutional Networks (GCN)
Deep learning on graph structured data is a subject of rapidly in-
creasing interest [3, 6, 8, 9, 14]. Dealing with combinatorial com-
plexity inherent to graph structures poses scalability challenges
for practical applications, and significant strides have been made
in addressing these challenges [5, 11, 24]. Specifically, we consider
Graph Convolutional Networks (GCNs). A GCN consists of multiple
layers of graph convolution, which is similar to a perceptron but
additionally uses a neighborhood aggregation step motivated by
spectral convolution.
Consider the Bitcoin transaction graph from the Elliptic Data
Set as G = (N , E), where N is the set of node transactions and E is
the set of edges representing the flow of BTC. The l-th layer of the
GCN takes the adjacency matrix A and the node embedding matrix
H(l) as input, and uses a weight matrix W (l) to update the node
embedding matrix to H(l +1) as output. Mathematically, we write
(1)
(l +1) = σ((cid:98)AH
where(cid:98)A is a normalization of A defined as:
2 , (cid:101)A = A + I , (cid:101)D = diag
(cid:98)A =(cid:101)D
(cid:32)
2(cid:101)A(cid:101)D
(cid:101)Aij
(l)),
(cid:33)
(l)
W
− 1
− 1
H
,
j
and σ is the activation function (typically ReLU) for all but the
output layer. The initial embedding matrix comes from the node
features; i.e., H(0) = X. Let there be L layers of graph convolutions.
In the case of node classification, the output layer is the softmax,
where H(L) consists of prediction probabilities.
layer, except for the multiplication with(cid:98)A in the front. This matrix
the other hand, one may also interpret the multiplication with(cid:98)A as
is motivated by spectral graph filtering on the graph Laplacian
matrix and it results from a linear functional of the Laplacian. On
One sees a graph convolution layer is similar to a feed forward
an aggregation of the transformed embeddings of the neighboring
nodes. The parameters of the GCN are the weight matrices W (l),
for different layers l.
H
(1)).
(0)) · W
A 2-layer GCN, as often used, can be neatly written as
A "skip" variant, which we find practically useful, inserts a skip con-
(2) = softmax((cid:98)A · ReLU((cid:98)AXW
(cid:101)H
(2) = softmax((cid:98)A · ReLU((cid:98)AXW
nection between the intermediate embedding H(1) = ReLU((cid:98)AXW (0))
where(cid:101)W (1) is a weight matrix for the skip connection. We call this
and the input node features X, resulting in the architecture
(1)),
architecture Skip-GCN. When W (0) and W (1) are zero, Skip-GCN
is equivalent to Logistic Regression. Hence, Skip-GCN should be at
least as powerful as Logistic Regression.
(1) + X(cid:101)W
(0)) · W
3.3 Temporal Modeling
Financial data are inherently temporal as transactions are time
stamped. It is reasonable to assume there exists certain dynamics,
albeit hidden, that drive the evolution of the system. A prediction
model will be more useful if it is designed in a manner to capture the
dynamism. This way, a model trained on a given time period may
better generalize to subsequent time steps. The better the model
captures system dynamics, which are also evolving, the longer
horizon it can forest into.
A temporal model that extends GCN is EvolveGCN [19], which
computes a separate GCN model for each time step. These GCNs
are then connected through a recurrent neural network (RNN) to
capture the system dynamics. Hence, the GCN model for a future
time step is evolved from those in the past, where the evolution
captures the dynamism.
In EvolveGCN, the GCN weights are collectively treated as the
system state. The model is updated upon an input to the system
every time, by using an RNN (e.g., GRU). The input is the graph
information at the current time step. The graph information may
be instantiated in many ways; in EvolveGCN, it is represented by
the embeddings of the top-k influential nodes in the graph.
4 EXPERIMENTS
Here we show experimental results obtained on the Elliptic Data
Set. We performed a 70:30 temporal split of training and test data,
respectively. That is, the first 34 time steps are used for training
the model and the last 15 for test. We use a temporal split because
it reflects the nature of the task. As such, GCN is trained in an
inductive setting.
We first tested standard classification models for the licit/illicit
prediction using three standard approaches: Logistic Regression
(with default parameters from the scikit-learn Python package [4]),
Random Forest (also from scikit-learn, with 50 estimators and 50
max features), and Multilayer Perceptron (implemented in PyTorch).
Our MLP had one hidden layer of 50 neurons and was trained for
200 epochs by using the Adam optimizer and a learning rate of
0.001.
We evaluated these models by using all the 166 features (referred
to as AF), as well as only the local ones, i.e., the first 94 (referred to
as LF). The results are summarized in the top part of Table 1.
The bottom part of Table 1 reports the results achieved when
we leveraged the graph structure of the data. We trained the GCN
model for 1000 epochs using the Adam optimizer with a learning
Anti-Money Laundering in Bitcoin
KDD '19 Workshop on Anomaly Detection in Finance, August 2019, Anchorage, AK, USA
Figure 2: Illicit F1 results over test time span.
Table 1: Illicit classification results. Top part of the table
shows results without the leverage of the graph information,
for each model are shown results with different input: AF
refers to all features, LF refers to the local features, i.e. the
first 94, and N E refers to the node embeddings computed by
GCN. Bottom part of the table shows results with GCN.
Method
Logistic RegrAF
Logistic RegrAF +N E
Logistic RegrLF
Logistic RegrLF +N E
RandomForestAF
RandomForestAF +N E
RandomForestLF
RandomForestLF +N E
MLPAF
MLPAF +N E
MLPLF
MLPLF +N E
GCN
Skip-GCN
Illicit
Precision Recall
0.593
0.528
0.668
0.571
0.670
0.675
0.611
0.668
0.617
0.617
0.662
0.5782
0.512
0.623
0.404
0.537
0.348
0.518
0.956
0.971
0.803
0.878
0.694
0.780
0.637
0.6819
0.812
0.812
MicroAVG
F1
0.481
0.533
0.457
0.543
0.788
0.796
0.694
0.759
0.653
0.689
0.649
0.6258
0.628
0.705
F1
0.931
0.945
0.920
0.945
0.977
0.978
0.966
0.973
0.962
0.967
0.958
0.986
0.961
0.966
rate of 0.001. In our experiment we used a 2-layer GCN and, after
hyper-parameter tuning, we set the size of the node embeddings to
be 100.
The task is a binary classification and the two classes are im-
balanced (see Figure 1). For AML, more important is the minority
class (i.e., the illicit class). Hence, we trained the GCN model using
a weighted cross entropy loss to provide higher importance to the
illicit samples. After hyperparameter tuning, we opted for a 0.3/0.7
ratio for the licit and illicit classes. Table 1 shows the testing results
in term of precision, recall, and F1 score for the illicit class. For the
sake of completeness, we also show the micro-averaged F1 score.
Note that GCN and the variant Skip-GCN outperform Logistic
Regression, indicating the usefulness of the graph-based method
compared to one agnostic to graph information. On the other hand,
in this case, the input features are quite informative already. Using
these features alone, Random Forest achieves the best F1 score. The
representation power of the input features is also reflected by the
gain of Skip-GCN over GCN.
Another insight from Table 1 is obtained from the comparison
between methods trained on all the features (AF) and those on
only the 94 local features (LF). For all the three evaluated mod-
els, the aggregated information led to higher accuracy, indicating
the importance of the graph structure in this context. With this
observation, we further evaluated the methods with an enhanced
input feature set. The goal of this experiment was to show that
graph information was useful to enhance the representation of a
transaction. In this setting, we concatenated the node embeddings
obtained from GCN with the original features X. Results show that
with the enhanced feature set the accuracy of the model improves,
for both full features (AF + N E) and local features (LF + N E).
Table 2 compares the prediction performance between the non-
temporal GCN and the temporal EvolveGCN. EvolveGCN consis-
tently outperforms GCN, although the improvement is not substan-
tial for this data set. One avenue of further investigation is the use
of alternative forms of system input to drive the recurrent update
inside GRU.
Table 2: GCN v.s. EvolveGCN
GCN
Precis. Recall
0.623
0.812
0.966
0.966
F1
0.705
0.966
EvolveGCN
Precis. Recall
0.624
0.850
0.968
0.968
F1
0.720
0.968
Illicit
MicroAVG
The Dark Market Shutdown. An important consideration for
AML is the robustness of a prediction model with respect to emerg-
ing events. One interesting aspect of this data set is the sudden
closure of a dark market occurring during the time span of the data
(at time step 43). As seen in Figure 2, this event causes all methods
to perform poorly after the shutdown. Even a Random Forest model
re-trained after every test time step, assuming the availability of
ground truth after each time, is not able to reliably capture new
illicit transactions after the dark market shutdown. The robustness
of methods to such events emerges as a major challenge to address.
KDD '19 Workshop on Anomaly Detection in Finance, August 2019, Anchorage, AK, USA
Weber and Domeniconi, et al.
5 DISCUSSION
We have seen Random Forest significantly outperforms Logistic
Regression; in fact, it also outperforms GCN even though the latter
is empowered by the graph structure information. Random Forest
uses a voting mechanism to ensemble the prediction results from
a number of decision trees, each trained by using a subsample of
the data set. GCN, in contrast, like most deep learning models,
uses Logistic Regression as the final output layer; hence, it can be
considered a nontrivial generalization of Logistic Regression.
The question arises: Is it possible to combine a Random Forest
with a graph neural network? One simple idea is to augment the
node features with the embeddings computed from GCN before
running Random Forest. This idea helps only marginally according
to prior experimentation. Another idea, as proposed by [13], is to
parameterize every node in the decision tree(s) by using a feed-
forward neural network. This idea organically combines Random
Forest with neural networks, but it does not suggest how graph in-
formation can be incorporated. One possible approach is to replace
the Logistic Regression output layer in GCN by this differentiable
version of the decision tree, so that end-to-end training is enabled.
We leave the execution of this idea as future investigation.
6 GRAPH VISUALIZATION
Lastly, in support of analysis and explainability, which are impor-
tant for AML compliance, we have created a visualization prototype
called Chronograph. Visualizing a high-dimensional graph imposes
a layer of complexity on top of plain feature vectors with respect to
explaining model performance. Chronograph aims to address this
by supporting the human analyst with an integrated representation
of the model.
6.1 Visual Investigation of the Elliptic Data Set
In Chronograph, transactions are visualized as nodes of a graph
with edges representing the flow of BTC from one transaction to
the next. Node coordinates are computed simultaneously across all
time steps using the projection technique UMAP [15]. This global
computation makes layouts comparable across time. The time step
slider control at the top of the interface allows the user to navigate
through time by rendering only nodes in the selected time step.
Illicit transactions are dyed red; licit ones are blue. Unclassified
transactions are not colored.
When clicking a transaction node, or entering a transaction ID
in the control on the left (filters as substring) the visualization
highlights the selected transaction(s) in orange, and all neighboring
transactions (in-or-out-flowing) in green. On the left of the interface,
the user can see general statistics on the graph and a table about
transfer numbers between different transaction classes.
In this simple prototype, Chronograph enables simple explo-
ration scenarios to visually inspect clusters and their existence
over time, observe conspicuous transfer patterns, or detect other
deviations like single outliers. As a more involved use case we addi-
tionally facilitate the degree of freedom of the input to the UMAP
computation: raw transaction feature data (Figure 4a), as well as
neuron activations of the last layer of the network (Figure 4b) seem
to be two interesting alternatives; similar approaches have been
proposed for general neural networks Rauber et al. [20]. Differences
in the resulting visualizations would then hint towards peculiarities
of the model, i.e. we postulate shifts in similarities among the data
can be indicative to explain which underlying features matter to
the model.
Figure 4 shows the results from the two alternative inputs for
a single time step, with raw feature data in the top and model
activations in the bottom row. We further dye the nodes using
actual labels in the left column, and GCN-predicted labels in the
right column, and obtain a total of 4 network visualizations.
In the model-based layout illicit nodes are less scattered but
more concentrated, which seems to be a desirable property: illicit
nodes should share some important characteristics, and similarity
of nodes yields closer proximity in the layout. However, since they
are not perfectly collapsing in one location it is quite plausible
there are qualitative differences within the set of illicit nodes. The
visualizations further reveals where exactly the model is unable to
detect illicit nodes. In case of multiple erroneous predictions in a
nearby area this could further hint to a systemic underperformance
of the the model. Studying the characteristics of such transactions
in detail could inspire the discussion from new angles and lead to
further model improvements.
a) Projection of raw transaction feature vectors
b) Projection of last GCN layer activations
Figure 3: Two alternative inputs to UMAP projection. Left:
colored by input labels; right: colored by GCN prediction.
7 SUMMARY
In summary, we have set forth cryptocurrency forensics, and specif-
ically Bitcoin, as a unique ecosystem for crowdsourcing the develop-
ment of new methods to fight criminal activity. We have contributed
a large, labelled transaction data set to the AML community, the
likes of which has never before been publicly available. We have
Anti-Money Laundering in Bitcoin
KDD '19 Workshop on Anomaly Detection in Finance, August 2019, Anchorage, AK, USA
[10] Martin Harrigan and Christoph Fretter. 2016. The unreasonable effectiveness
of address clustering. In 2016 Intl IEEE Conferences on Ubiquitous Intelligence &
Computing, Advanced and Trusted Computing, Scalable Computing and Commu-
nications, Cloud and Big Data Computing, Internet of People, and Smart World
Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld). IEEE, 368 -- 373.
[11] Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with
Graph Convolutional Networks. In ICLR.
[12] Knomad and World Bank Group. 2019. Migration and Remittances: Recent
Developments and Outlook. Migration and Development Brief 31.
[13] Peter Kontschieder, Madalina Fiterau, Antonio Criminisi, and Samuel Rota Bulo.
2015. Deep Neural Decision Forests. In ICCV.
[14] Yujia Li, Daniel Tarlow, Marc Brockschmidt, and Richard Zemel. 2016. Gated
Graph Sequence Neural Networks. In ICLR.
[15] Leland McInnes, John Healy, and James Melville. 2018. Umap: Uniform man-
ifold approximation and projection for dimension reduction. arXiv preprint
arXiv:1802.03426 (2018).
[16] Daniel J. Mitchell. 2012. World Bank Study Shows How Anti-Money Laundering
Rules Hurt the Poor. Forbes.
[17] Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).
[18] Financial Crimes Enforcement Network. 2019. Application of FinCENâĂŹs
Regulations to Certain Business Models Involving Convertible Virtual Currencies.
FIN-2019-G001 (May 2019).
[19] Aldo Pareja, Giacomo Domeniconi, Jie Chen, Tengfei Ma, Toyotaro Suzumura, Hi-
roki Kanezashi, Tim Kaler, and Charles E. Leiserson. 2019. EvolveGCN: Evolving
Graph Convolutional Networks for Dynamic Graphs. Preprint arXiv:1902.10191.
[20] Paulo E Rauber, Samuel G Fadel, Alexandre X Falcao, and Alexandru C Telea. 2016.
Visualizing the hidden activity of artificial neural networks. IEEE transactions on
visualization and computer graphics 23, 1 (2016), 101 -- 110.
[21] Mark Weber, Jie Chen, Toyotaro Suzumura, Aldo Pareja, Tengfei Ma, Hiroki
Kanezashi, Tim Kaler, Charles E. Leiserson, and Tao B. Schardl. 2018. Scalable
Graph Learning for Anti-Money Laundering: A First Look. CoRR abs/1812.00076
(2018). arXiv:1812.00076 http://arxiv.org/abs/1812.00076
[22] Wikipedia. [n. d.]. 1Malaysia Development Berhad scandal.
[23] Wikipedia. [n. d.]. Danske Bank money laundering scandal.
[24] Rex Ying, Ruining He, Kaifeng Chen, Pong Eksombatchai, William L. Hamilton,
and Jure Leskovec. 2018. Graph Convolutional Neural Networks for Web-Scale
Recommender Systems. In KDD.
Figure 4: Chronograph User Interface: User can navigate
through time-sliced transaction data and observe transac-
tion patterns and patterns of change. Illicit transactions are
dyed red. Further statistics are displayed on the left.
shared early experimental results using a variety of methods includ-
ing Graph Convolutional Networks, and discussed possible next
steps for algorithmic advances. We have provided a prototype for
visualization of such data and models for augmenting human anal-
ysis and explainability. Most important, we hope to have inspired
others to work on this societally important challenge of making
our financial systems safer and more inclusive.
ACKNOWLEDGMENTS
This work was funded by the MIT-IBM Watson AI Lab (mitibm.mit.edu),
a joint research initiative between the Massachusetts Institute of
Technology and IBM Research. Data and domain expertise were
provided by Elliptic (www.elliptic.co).
REFERENCES
[1] Christopher Bishop. 2006. Pattern Recognition and Machine Learning. Springer-
Verlag.
[2] Leo Breiman. 2001. Random forests. Machine learning 45, 1 (2001), 5 -- 32.
[3] Joan Bruna, Wojciech Zaremba, Arthur Szlam, and Yann LeCun. 2014. Spectral
Networks and Locally Connected Networks on Graphs. In ICLR.
[4] Lars Buitinck, Gilles Louppe, Mathieu Blondel, Fabian Pedregosa, Andreas
Mueller, Olivier Grisel, Vlad Niculae, Peter Prettenhofer, Alexandre Gramfort,
Jaques Grobler, Robert Layton, Jake VanderPlas, Arnaud Joly, Brian Holt, and Gaël
Varoquaux. 2013. API design for machine learning software: experiences from
the scikit-learn project. In ECML PKDD Workshop: Languages for Data Mining
and Machine Learning. 108 -- 122.
[5] Jie Chen, Tengfei Ma, and Cao Xiao. 2018. FastGCN: Fast Learning with Graph
Convolutional Networks via Importance Sampling. In ICLR.
[6] Michaël Defferrard, Xavier Bresson, and Pierre Vandergheynst. 2016. Convo-
lutional Neural Networks on Graphs with Fast Localized Spectral Filtering. In
NIPS.
[7] Demirguc-Kunt, Leora Klapper, Dorothe Singer, Sinya Ansar, and Jake Hess. 2017.
The Global Findex Database 2017: Measuring Financial Inclusion and the Fintech
Revolution.
[8] Justin Gilmer, Samuel S. Schoenholz, Patrick F. Riley, Oriol Vinyals, and George E.
Dahl. 2017. Neural Message Passing for Quantum Chemistry. In ICML.
[9] William L. Hamilton, Rex Ying, and Jure Leskovec. 2017. Inductive Representation
Learning on Large Graphs. In NIPS.
|
1807.09561 | 1 | 1807 | 2018-07-25T12:56:25 | Enhancing keyword correlation for event detection in social networks using SVD and k-means: Twitter case study | [
"cs.SI",
"cs.CL",
"cs.LG"
] | Extracting textual features from tweets is a challenging process due to the noisy nature of the content and the weak signal of most of the words used. In this paper, we propose using singular value decomposition (SVD) with clustering to enhance the signals of the textual features in the tweets to improve the correlation with events. The proposed technique applies SVD to the time series vector for each feature to factorize the matrix of feature/day counts, in order to ensure the independence of the feature vectors. Afterwards, the k-means clustering is applied to build a look-up table that maps members of each cluster to the cluster-centroid. The lookup table is used to map each feature in the original data to the centroid of its cluster, then we calculate the sum of the term frequency vectors of all features in each cluster to the term-frequency-vector of the cluster centroid. To test the technique we calculated the correlations of the cluster centroids with the golden standard record (GSR) vector before and after summing the vectors of the cluster members to the centroid-vector. The proposed method is applied to multiple correlation techniques including the Pearson, Spearman, distance correlation and Kendal Tao. The experiments have also considered the different word forms and lengths of the features including keywords, n-grams, skip-grams and bags-of-words. The correlation results are enhanced significantly as the highest correlation scores have increased from 0.3 to 0.6, and the average correlation scores have increased from 0.3 to 0.4. | cs.SI | cs | Noname manuscript No.
(will be inserted by the editor)
Enhancing Keyword Correlation for Event Detection in Social
Networks using SVD and K-Means: Twitter Case Study
Ahmad Hany Hossny · Terry Moschou · Grant
Osborne · Lewis Mitchell · Nick Lothian ·
8
1
0
2
l
u
J
5
2
]
I
S
.
s
c
[
1
v
1
6
5
9
0
.
7
0
8
1
:
v
i
X
r
a
Received: date / Accepted: date
Abstract Extracting textual features from tweets is a challenging process due to the noisy nature of
the content and the weak signal of most of the words used. In this paper, we propose using singular value
decomposition (SVD) with clustering to enhance the signals of the textual features in the tweets to improve
the correlation with events. The proposed technique applies SVD to the time series vector for each feature
to factorize the matrix of feature/day counts, in order to ensure the independence of the feature vectors.
Afterwards, the K-means clustering is applied to build a look-up table that maps members of each cluster
to the cluster-centroid. The lookup table is used to map each feature in the original data to the centroid
of its cluster, then we calculate the sum of the term frequency vectors of all features in each cluster to
the term-frequency-vector of the cluster centroid. To test the technique we calculated the correlations of
the cluster centroids with the golden standard record (GSR) vector before and after summing the vectors
of the cluster members to the centroid-vector. The proposed method is applied to multiple correlation
techniques including the Pearson, Spearman, distance correlation and Kendal Tao. The experiments have
also considered the different word forms and lengths of the features including keywords, n-grams, skip-grams
and bags-of-words. The correlation results are enhanced significantly as the highest correlation scores have
increased from 0.3 to 0.6, and the average correlation scores have increased from 0.3 to 0.4.
Keywords Social Network · Event Detection · Feature Extraction · Correlation · SVD
1 Introduction
Social networks such as Twitter and Facebook are frequently used to organize protests, rallies, and revolu-
tions. Social events such as protests can be organized through the follower-followee scheme or through the
spontaneous propagation scheme [16, 28]. The follower-followee scheme has a leader that calls his followers
to a specific protest at a specific place and time. This pattern is easy to detect by tracking the effective
leaders, those with a large number of followers, assuming their identities are known in advance. On the other
hand, the spontaneous propagation scheme is initiated by multiple standard users with limited followers
and impact, who speak out for their cause. The initial messages are propagated through close friends and
followers to spread the word at an exponentially growing rate [43, 2, 44]. Identifying these events requires
tracking the growth in usage rate for one or more keywords that are sufficiently associated with protests
and rallies.
Using Twitter text as features is challenging for multiple reasons such as the limited length of each
tweet, the informal nature of the tweets and the multilingual nature of Twitter [14, 33, 34]. Tackling twitter
A. Hossny
School of Mathematical Sciences, Univeristy of Adelaide, Australia
E-mail: [email protected]
T. Moschou, G. Osborne, N. Lothian
Data to Decisions Cooperative Research Centre (D2D CRC), Adelaide, Australia
E-mail: [email protected], [email protected], [email protected]
L. Mitchell
School of Mathematical Sciences, Univeristy of Adelaide, Australia
D2D CRC Stream Lead
E-mail: [email protected]
Fig. 1 The count vector for each word of 'protest', 'rally', 'strike' and 'march' shows few spikes matching the days of the
events (vertical dashed lines). The summed signal of the four words can match the event days with spikes more than any
of the individual words, and also has fewer mismatching spikes than any of the individual words
challenges can be performed via NLP preprocessing steps such as lemmatization, stemming, lexical analysis,
morphological analysis, syntactic analysis and Parts-Of-Speech tagging[19]. These tasks can be performed
using rule-based techniques or machine learning techniques such as Inductive logic programming or deep
neural networks depending on the amount of data to be processed[20, 3]. The main challenges affecting text
mining in twitter are listed below:
-- The tweet length of 140 characters makes topic modelling and sentiment analysis very challenging for
individual tweets.
-- The frequent usage of acronyms, misspelled words and non-standard abbreviations make many words
difficult to detect.
-- Using Roman script to write non-English language distorts the feature signals due to similar words from
other languages (e.g. the term "boss" means "look" in Arabic, while in English it means "manager")
-- Semantic ambiguity: Many words have multiple meanings (e.g. "strike" may refer to a protest, a lightning
strike or a football strike).
-- Synonyms: Conversely, the same meaning can be expressed by multiple words (e.g. the terms "protest"
and "rally" are used interchangeably).
The correlation between the social events vector and the time series of the keyword frequency is affected
by three factors. The first factor is the word-form, whether single words, n-grams, skip-grams or bags-of-
words (BOWs) [13]. The second factor is the number of words used as a feature in the n-gram, skip-gram and
the BOWs [29, 32]. The third factor is the correlation technique used, such as Pearson, Spearman, distance-
correlation, or mutual information [12, 37]. The combination of word-forms, word-counts and correlation
techniques selects different sets of words as the best features to identify civil unrest events. In this paper,
we apply the proposed technique in experiments involving all of the mentioned word forms, word counts
and correlation techniques. Correlation scores were improved for most of the experiments with different
ratios.
This research aims to improve the correlation between textual features and events by calculating the
sum of the time series vectors of multiple features having similar meanings, to form a single feature that
represents all of its constituent time series vectors. This representative feature is selected by clustering
the features and finding the one with the minimum distance to all others, which is known as the cluster
centroid. So, we transform the features using SVD and cluster the transformed features to build the lookup
table mapping the features labels (e.g. Bags-of-Words) to the centroid feature label. Then we use the lookup
table to know which vectors of time series raw counts (not-transformed) should be summed up. Adding the
related features to the centroid feature improves the correlation score for the centroid feature significantly
without affecting the correlation score of the other features within the cluster.
Enhancing the correlation will give us more informative features with stronger signals that will allow
us to perform live detection of ongoing events as soon as it occurs. In this paper, we use civil unrest
2
events in Melbourne as a case study for correlating keywords with social events, then use these keywords
to detect protest immideatley as soon it occur, once the keywords of interest occur more than a specific
threshold. Here, we consider the golden standard records as a count vector describing how many civil unrest
events happened in a specific day within the time-frame, which manually curated from news article along the
timeframe of the experiment. We also consider the features as the vectors describing the daily counts of each
of keywords, n-grams, skip-grams or bags-of-words(BOWs) along the time-frame. In the proposed method,
we aim to combine the vectors of related BOWs having similar meaning in the context of event (civil
unrest) such as the BOWs of ("Melbourne" , "protest"), ("Melbourne","rally"), ("Melbourne","strike")
and ("Melbourne","march"), as each of them has a relatively weak signal, which means a small magnitude
for the daily counts within each vector . Then, Combine the signals of the four BOWs into one BOw gives
a stronger signal that has the same meaning and higher matching scores with events, as indicated in Figure
1.
The proposed technique is to use singular value decomposition (SVD) to factorize the feature/day matrix
into a feature matrix, the daily event matrix and the singular matrix mapping the features to the events
[15, 24, 27]. SVD is important to ensure that features' locations in the space are mapped to orthogonal
dimensions, as K-means uses Euclidean distance and requires an orthogonal relation among the features.
This orthogonality is not guaranteed in the original matrix, as the textual features are not guaranteed to
be independent of each other and neither are the days. Once the SVD is applied, the resulting matrices
are guaranteed to represent the features (BOWs) as orthogonal vectors in the features matrix and the days
are represented as orthogonal vectors in the observation matrix. After decomposition, the feature matrix
is clustered using k-means and the centroids of the clusters are used as the master feature for correlation
with the event vector.
In section 2 we describe the most recognized feature extraction techniques. Section 3 explains the
proposed technique including the SVD and how it is applied to our problem. Section 4 will explain the
experiments and the results. Section 5 will state our conclusion and directions for future work.
2 Feature Extraction Techniques
Feature extraction is the process of preparing the features selected from data to be used for training the
learning model. Feature extraction aims to reduce computational complexity, eliminate misleading features
and strengthen weak signals. Computational complexity is reduced through dimensionality reduction. Mis-
leading features can be eliminated through filtration according to the frequency range, the variance or the
signal-to-noise-ratio. Weak signals are improved by combining multiple features into one via clustering. The
feature extraction process can be performed in geometric space using PCA or SVD by transforming the
feature vectors into orthogonal vectors that can be projected, eliminated or clustered as needed. Latent
Semantic Indexing (LSI) is an example of feature reduction via projection [10], and K-SVD is an example of
improving the signal via clustering [23]. Many techniques have been proposed for feature reduction includ-
ing Principal Component Analysis (PCA), Singular-Value-Decomposition (SVD), Independent Component
Analysis (ICA), Common-Spatial-Patterns (CSP), and Latent Dirichlet Allocation (LDA). We will describe
these briefly in the following subsections.
2.1 Principal Component Analysis
Principal Component Analysis (PCA) is the process of finding the best linear subspace, where the first
component is a straight line with smallest orthogonal distance to all points. PCA ranks the features ac-
cording to their variance in descending order, where the new components are orthogonal to each other. PCA
is performed using eigenvalue decomposition of the covariance matrix for the feature/observation matrix.
This process results in two matrices, the first is the set of eigenvectors and the other matrix is diagonal
with eigenvalues λi in decreasing order along the diagonal [47, 1].
The goal of PCA is to ensure that each of the feature vectors (eigenvectors in the first matrix) is
independent and orthogonal to the other features. This makes the process of projecting higher dimensions
onto lower dimensions applicable. Meanwhile, sorting eigenvalues in the second matrix in a descending order
simplifies the feature reduction process, as the smallest eigenvalues indicate the least significant features,
which can be eliminated. PCA is also described as rotation, scaling, and projection of the original matrix
to match the reduced matrix where all the vectors are orthogonal [39].
The applicability of PCA is limited by the assumption of linearity, as it simplifies the problem by limiting
the basis and by formalizing the continuity assumption. This assumption limits PCA to representing the
3
data as a linear combination of its features [41]. PCA has been used frequently to enhance signals or to
increase the signal to noise ratio in fields such as image processing [35], medical imaging (fMRI and XRAY)
[40, 6], control theory [17], remote sensing [25] and neuro-computing [48, 42].
2.2 Singular Value Decomposition
Singular value decomposition is the process of factorizing the feature/document matrix into three matrices.
The first matrix represents the features, the third matrix represents the documents and the matrix in
between is a diagonal matrix that maps the features to the documents [11, 15]. The two matrices resulting
from the SVD consist of orthonormal vectors, which makes distance measurement between vectors in
the same matrix possible using Euclidean distance or cosine similarity. This concept is applied in Latent
Semantic Indexing (LSI) that is used in recommender systems, and we apply the same concept to clustering
as well. SVD is considered an extended version of PCA, as the feature matrix resulting from SVD is exactly
the same eigenvector matrix that results from PCA, enabling SVD to be used for feature reduction similarly
to PCA [45].
2.3 Latent Semantic Indexing
Latent Semantic Indexing (LSI) or Latent Semantic Analysis (LSA) is a method to analyze the relationships
between documents and their word contents using a set of mapping concepts. LSA assumes that text follows
the distributional hypothesis, where words with similar meanings will appear in similar contexts with similar
distribution [26]. So, LSA formulates the term frequency per document as a matrix with rows representing
words and columns representing documents. LSI uses SVD to decompose the term-frequency matrix into
the orthonormal term matrix, the orthonormal document matrix and the concept-mapping matrix. LSA
can be used to reduce the number of terms used as features in the first matrix [9], or to evaluate two
documents' similarity by calculating the cosine similarity of any two vectors in the document matrix.
2.4 Indepenedent Component Analysis
Independent Component Analysis (ICA) is a statistical technique that utilizes a mix of PCA and factor
analysis to find the latent variables controlling a set of observations. This technique assumes the observations
are linear mixtures of non-Gaussian and mutually independent latent variables [21], and finds statistically
independent features regardless of their influence on the response variable [22]. ICA transforms the feature
space linearly into a new feature space, where each of the new features is statistically independent of any
other transformed features. This transformation makes the mutual information of any two vectors equal to
zero and the mutual information of the two-feature matrix as high as possible [7].
2.5 Common Spatial Pattern
Common spatial pattern (CSP) is a feature extraction technique that learns spatial filters from the data by
maximizing the variance of filtered signals in the first class and minimizing the variance of the other class
[36, 4]. CSP is similar to ICA as it decomposes the multivariate signal into multiple additive sub-signals
with maximum differences in variance between two classes [31]. CSP is usually used in binary classification,
and it can be extended for multiple classifications by following the one-vs-rest scheme. CSP is sensitive to
noise and can overfit easily with small sets of training data. The objective of CSP is to achieve the optimal
classification for the signal using the band power features [8].
2.6 Latent Dirichlet allocation
Latent Dirichlet Allocation (LDA) is a generative probabilistic model that is used frequently in topic
modelling. It represents the documents as a random mix of latent topics [5], with each topic identified by
the distribution of the used words. LDA is formulated as a Bayesian model of three levels, where each
document is modelled as a mix of underlying topics and each topic is also modelled as a mix of underlying
probabilities of words [18]. LDA is used frequently for feature extraction, as [46] used it to reduce the
4
Fig. 2 The pipeline to extract the textual features, correlate them with events then use SVD and K-means to enhance
the correlation by merging the related weak features.
features for crime prediction using twitter. It has also been used for tracking user interests in Twitter by
[38].
3 The Proposed Technique: Decompose-Cluster-Map
The proposed model extracts words, n-grams, skip-grams or bags-of-words of each tweet and uses them as
features to determine whether an event will occur on a specific day. The features are counted on a daily basis
into vectors representing the times series of the keyword volume. The feature-vectors are then correlated
with the vector of daily events.
The total number of words extracted as features exceeds 10 million per day, rendering most data
processing techniques computationally infeasible. To solve this issue, the features are filtered to exclude
those with very low correlations, which comprise the majority of the features processed. We retain only
the 10,000 features with the highest correlations for further processing. The challenge in dealing with
the remaining data is that individual features have relatively low correlation scores, which implies a low
association between features and events.
Enhancing the correlation between the textual features and the events requires finding new features
with time-series highly associated with the event-time-series. To accomplish this, we propose grouping
semantically similar features into a combined feature, and calculate the sum of the similar features' vectors
into a single vector representing them all. Here we use the idea of matrix factorization that is used in LSI,
but for the purpose of clustering rather than finding the most similar documents (or days in this case). We
analyze the relation between events (i.e. protests) and the features used (words, BOWs, etc) on each day
to produce a set of concepts relating the features used to the events of the day.
We assume that words with similar meaning are more likely to occur in similar contexts (i.e. days) with
similar variability according to the distributional hypothesis. So, we formulate the feature-count-per-day
relation as a matrix, where features are represented as rows and days are represented as columns. Then,
we use singular value decomposition (SVD) to decompose the matrix into a features matrix, a day matrix
and a singular matrix mapping the two matrices to each other. After decomposition, instead of measuring
the distance with the daily vectors to cope with LSI, we will cluster the feature matrix to create a look-up
table mapping the features within each cluster to its centroid.
The proposed technique consists of five steps to be applied after the initial selection of features. The
first step is ensuring feature independence using singular value decomposition (SVD). SVD factorizes the
feature/day matrix into a feature matrix (U ) and observation matrix (V ) and a singular matrix mapping
the features to observations according to the equation 1
X = U ΣV T
(1)
where,
-- m is the number of features and n is the number of days.
5
-- A is an m × n matrix representing the feature/day vectors.
-- U is an m × m matrix representing the feature vectors. This matrix is unitary and orthogonal.
-- Σ is a diagonal m n matrix of non-negative real numbers.
-- V T is the transpose of the n × n unitary matrix (V ), representing the days.
The values of the diagonal matrix Σ are the singular values of the original matrix A. These singular
σi values are usually listed in a descending order. The singular values determine the strength of its related
vector in U as a feature, as formulated in equation 2.
x1,1 . . . x1,n
...
...
xm,1 . . . xm,n
. . .
=
u1
. . .
um
σ1,1 . . .
0
...
...
0 . . . σm,n
. . .
(cid:2)
(cid:2)
v1
...
vn
(cid:3)
(cid:3)
(2)
Since U and V T are unitary, the columns of each of them form a set of orthogonal vectors, which can be
considered as basis dimensions. The matrix Σ maps the basis dimensions of vi to the vector ui after being
stretched using σi. Since U , U T , V are unitary matrices and their columns are orthogonal, we can measure
the distance between any two features using Euclidean distance. This measures the similarity between any
two words considering the context of the original matrix.
The second step is to cluster the independent features using k-means in order to partition the orthog-
onalized features into a set of clusters S = {S1, S2, S3, . . . , Sk}, with size k. The objective is to minimize
the pairwise distance of points within the same cluster, by minimizing the sum of squares in each cluster.
The objective function is formulated by equation 3:
k(cid:88)
(cid:88)
i=1
u∈S
arg min
S
k(cid:88)
S
i=1
u − µ2 = arg min
SiV arSi
(3)
where S is the set of k clusters and µi is the mean of points in Si. The clusters are initialized using multiple
random partitioning and the distance between any two points is calculated using the Euclidean distance.
The Lloyd algorithm is used for k-means, consisting of the two steps for assignment and update as described
below.
Assignment step: To assign each data item to the cluster that has the closest mean value.
i = { up :
S(t)
up − m(t)
i
2
< up − m(t)
j 2 ∀ j, 1 < j < k }
(4)
Update step: To find the new cluster centroid that achieves the minimum distance with all other data
items within the cluster.
m(t+1)
i
=
1
S(t)
i
(cid:88)
uj∈S(t)
i
uj
(5)
Although the algorithm achieves relatively good clustering results, it does not guarantee to achieve the
optimum solution, as it is an NP-Hard problem.
The clusters resulting from the k-means are used to build a look-up table mapping the features in each
cluster to the cluster centroid that represents the contents of the whole cluster. The third step is to apply
this mapping to the original data, where all the signals of all the words in each cluster are summed to the
cluster centroid using equation 6.
ci =
xj,1...n
(6)
(cid:88)
xj∈Ci
where i ∈ {1, . . . k} and Ci is the set of the original raw non-orthogonal vectors associated with the keywords
that belong to the cluster Si resulting from k-means, and ci is the sum of all vectors in Ci.
The last step is to recalculate the correlation scores after the aforementioned summation. This process
increases the correlation scores for the cluster centroids, which promises better results for classification or
prediction purposes.
6
4 Experiment and Results
The experiments are designed to calculate the correlations between the term frequency vector of the features
and the frequency vector of the civil unrest events within a specific time-frame. In our experiments, we
will consider words of different forms and counts as our features and the count of the civil unrest events
as our golden standard record (GSR). Afterwards, the proposed technique is applied by decomposing the
feature/day matrix X to extract the feature matrix U . The feature matrix U is clustered using k-means to
build the lookup table. The look-up table is used to merge the features within each cluster by adding the
sum of the vectors of all features within a cluster to the vector of the centroid BOW of the cluster.
The data used in this experiment consist of the tweets used as a predictor for the future events and
the news used as a descriptor for the events already happened along the same timeframe. The tweets are
collected from Twitter using the GNIP service where we bought all the tweets issued by any user within
Australia for the studied time frame. These tweets are furtherly processed to extract the most informative
features that can be used to classify the day as event/non-event days. The news articles reporting the events
occurred are automatically collected using RSS feeds and manually labelled using a set of field experts from
police and intelligence that identified the civil unrest events of interest. This news are used as our golden
truth to compare our classification results with. The collected data can be described as follows:
-- The time frame is 640 days of tweets that are mapped to 640 days of news articles reporting civil unrest
events
-- Each day has 3 million tweets on average in Melbourne, 3.5 million tweets in Sydney, 2 million tweets
in Brisbane, 1 million tweets in Perth and 500 thousands tweets in Adelaide.
-- Each tweet has 10 words on average, which forms 90 BOWs per tweet, which form 270 million BOWs
per day in Melbourne
-- Aggregating similar BOWs by summing the counts of similar bows will reduce the total number of
BOWs to less than 50
-- Filtering out all Bows with small counts can eliminate more than 90% of the BOWs according to the
filter threshold, in our experiment we eliminate any bow occurred for less than 5 times per day.
-- The resulting total number of BOWs is to be used as features is around 10 million BOWs per day.
-- The total number of BOWs used along the whole time frame is 6400 million BOW.
The experiment has been performed on a time frame of 640 days within the geographical area of
Melbourne. The location of the tweets is determined using (1) tweet location, (2) the longitude and latitude,
(3) the time zone and (4) the profile location. The first step is preprocessing, where we clean and prepare
the data and extract the BOWs for correlation. Data preparation is a multi-step process that includes data
cleaning, NLP analysis, word counts and GSR preparation. Example 1 shows how the tweet is cleaned,
prepared and vectorized to be used in correlation. These steps are explained as follows:
1. The data is cleaned by excluding all tweets in any language other than English and all tweets with
any URLs; and removing non-Latin characters, hashtags, HTML tags, punctuation, and stopping words
(using the NLTK list [30]) from the remainder.
2. Each tweet is split into a list of features with different lengths varying between one and three as follows:
(a) Keywords: Each individual word within the tweet .
(b) N-Grams: Any N contiguous words in the tweet.
(c) Skip-Grams: Any N non-contiguous words within the same tweet in the same order (e.g. ["march",
"melbourne"] is a different feature than ["melbourne","march"]).
(d) Bags-of-Words: Any non-contiguous N words within the same tweet irrespective of order (e.g.
3. All words in each BOW are lemmatized using the NLTK lemmatizer in order to return each word to
["march", "melbourne"] is exactly the same feature as ["melbourne","march"]).
its origin, to avoid grammatical effects on the word shape (e.g. "Went" → "Go").
return similar words to their dictionary origin (e.g. "Australian" → "Austral").
4. After lemmatization, all words in each BOW are stemmed using the Lancaster stemmer in order to
5. Each BOW is counted in the tweets of Melbourne for each day to prepare the term frequency vectors.
6. Load the press events as GSR and count them per day for the whole time-frame.
Example 1:
Tweet: Highlight sign from #KeepSydneyOpen march:"My Friends Have Gone To Melbourne"
Tweet after cleaning and stemming: highlight sign march friend go melbourn
7
Table 1 The correlation scores of the top correlated word before and after applying the proposed technique for each of
the five correlation techniques.
Pearson
Spearman
Kendal Tao
before
0.302
0.314
0.284
0.308
0.308
0.310
0.327
after
0.751
0.714
0.648
0.645
0.632
0.669
0.515
before
0.215
0.241
0.214
0.241
0.224
0.260
0.274
after
0.425
0.464
0.381
0.650
0.580
0.621
0.720
before
0.205
0.231
0.205
0.231
0.214
0.244
0.261
after
0.376
0.425
0.346
0.542
0.541
0.525
0.683
UniGram
Bi-gram
Tri-gram
Skip-gram-2
Skip-gram-3
BOW-2
BOW-3
after
Distance correlation
before
0.264
0.291
0.252
0.286
0.258
0.299
0.284
0.808
0.723
0.691
0.744
0.707
0.759
0.814
Mutual Info
after
0.863
0.827
0.723
0.854
0.873
0.851
0.850
before
0.811
0.533
0.512
0.705
0.551
0.702
0.699
Table 2 The average correlation scores of the top 100 correlated words before and after applying the proposed technique
for each of the five correlation techniques.
Pearson
Spearman
Kendal Tao
before
0.228
0.244
0.230
0.269
0.268
0.270
0.286
after
0.221
0.285
0.188
0.433
0.374
0.434
0.457
before
0.182
0.183
0.172
0.206
0.200
0.210
0.219
after
0.207
0.310
0.246
0.437
0.439
0.414
0.593
before
0.173
0.175
0.164
0.197
0.192
0.200
0.209
after
0.189
0.292
0.221
0.411
0.411
0.394
0.563
UniGram
Bi-gram
Tri-gram
Skip-gram-2
Skip-gram-3
BOW-2
BOW-3
after
Distance correlation
before
0.1993
0.205
0.197
0.228
0.223
0.231
0.247
0.213
0.383
0.269
0.537
0.425
0.520
0.590
Mutual Info
after
0.732
0.420
0.249
0.620
0.293
0.659
0.643
before
0.687
0.314
0.178
0.445
0.496
0.472
0.490
List of BOWs: [highlight, sign], [highlight, march], [highlight, all],
], [highlight, go], [highlight, melbourn],[sign, march], [sign, all],
[highlight, friend
[sign, friend],
[sign, go], [sign, melbourn],
[march, all],
[march, friend], [march, go], [march,
melbourn],
], [go, melbourn]
[all, friend], [all, go], [all, melbourn], [friend, go], [friend, melbourn
[x2,1,x2,2,x2,3,. . .,x2,640]
[x3,1,x3,2,x3,3,. . .,x3,640]
[highlight, sign]: [x1,1,x1,2,x1,3,. . .,x1,640]
[highlight, march]:
[highlight, all]:
.
.
.
[sign, march]: [x4,1,x4,2,x4,3,. . .,x4,640]
[sign, all]: [x5,1,x5,2,x5,3,. . .,x5,640]
[sign, friend]: [x6,1,x6,2,x6,3,. . .,x6,640]
[sign, go]: [x7,1,x7,2,x7,3,. . .,x7,640]
GSR (Event Count per day) : [e1,e2,e3,. . .,e640]
The second step is to correlate the vectors of each word with the GSR vector and select the 10,000 words
with highest correlation. The correlation process is described in equation 7, where v is the term frequency
for a specific word in a specific feature, e is the number of civil unrest events that took place in a single
day, and c are the correlation scores between each word's frequency row and the vector of the event count.
The top 10,000 words are selected to reduce the computational complexity of the matrix decomposition in
the next step.
x1,1 . . . x1,n
...
...
xm,1 . . . xm,n
. . .
⊗
e1
...
en
=
c1
...
cn
(7)
where x is the feature count per day. Rows represent the features and columns represent the day. e is
the number of civil unrest events that happened in each day, c is the correlation between each word and
event vector, and ⊗ is the correlation method used in each experiment, such as the Pearson or Spearman
correlation.
After selecting the top correlated words from the correlation step, we will decompose the matrix of the
selected words/days using SVD and use the feature representation matrix U from equation 1 for clustering
in the next step. Although SVD is usually used for feature reduction we will use all the features in the
clustering step to build a mapping table. Then we apply the k-means to find 1000 clusters, which gathers
8
each word with 10 other words. A smaller cluster makes the resulting signal weaker, while a larger cluster
makes the signal noisy as it will include unrelated component signals that will corrupt each other.
The clustering process set the target number of clusters (k) to 2000 in order to have 5 words per cluster
on average, though the cluster size is not guaranteed in k-means. The centroids are seeded to the algorithm
using random numbers for 50 runs. The maximum number of iterations per each run is set to 35 as most of
the runs saturate before the 25th iteration. This technique increased the maximum correlation scores for the
selected centroids of the 2000 clusters from an average of 0.3 to 0.65 for Pearson correlation, from 0.23 to
0.54 for Spearman correlation, from 0.22 to 0.49 for Kendal Tao correlation, from 0.27 to 0.74 for distance
correlation and from 0.64 to 0.83 for mutual info. The maximum correlation scores for each combination
of the correlation-method, word-form and word-count before and after applying the proposed method are
stated in table 1. The average correlation scores for the same combinations before and after applying the
method are stated in table 2.
The same experiment is applied to five cities in Australia, and the correlations are enhanced with various
margins, where Sydney achieved the highest marginal in the correlation scores and Adelaide achieved the
least enhancement in the correlation scores, we also applied the same experiment using the Indonesian
language in the city of Jakarta and the correlation scores are enhanced as well, even though we did not
use any Indonesian lemmatizer or stemmer. The top correlated BOWs for the civil unrest are listed below,
where the words are lemmatized and stemmed using Lancaster stemmer. Most of the top correlated BOWs
are related to protests in Melbourne, or related to some political figure or some cause. But, some other
BOWs are not related to civil unrest as they got accidental spurious correlation with the events days
because of some statistical bias. For example, Most protesters prefer to act on Mondays, while some TV
show is displayed each Monday, this will lead to spurious correlation and fake association.
List of top 25 BOWS associated with the civil unrest events in Melbourne
['newsmelb', 'protest'], ['ral', 'tram'], ['park', 'permit'], ['middl', 'typ'], ['fuck', '
jfc'], ['connect', 'wom'], ['bib', 'kam'], ['caulfield', 'look'], ['ral', 'rout'], ['
pettifl', 'son'], ['keynot', 'lik'], ['awkward', 'quest'], ['forget', 'land'], ['afl',
'strong'], ['limit', 'step'], ['hono', 'lif'], ['newsmelbourn', 'protest'], ['felt',
'weekend'], ['detail', 'seem'], ['joel', 'say'], ['afraid', 'ground'], ['nya', 'resel
'], ['revolv', 'watch'], ['navbl', 'rwy'], ['energy', 'kil']
5 Discussion
The correlation scores for single words as features were too low and were not expressive. The single word
data is noisy and misused frequently within the different contexts. Additionally, many words had relatively
high correlations due to coincidence.
The n-grams produced slightly higher correlations without effective significance. The n-gram vectors had
a high number of zeros because of the low probability of the same word-sequence being repeated multiple
times with the same pattern. The higher number of n-grams led to a lower probability of re-occurrence,
higher frequency of zeros and lower counts per vector. The signal was too weak to use the n-gram as a
feature.
The skip-gram produced slightly higher correlations than keywords and n-grams. The main advantage
is to maintain the context of the word by pairing it with its co-occurring words in the same context.
The number of zeros was lower than that of the n-gram method and higher than the keyword method.
The counts per day were slightly higher as well, which strengthened the signal without increasing noise.
The best correlation scores are achieved for 2-word skip-grams due to the highest counts (resulting in the
strongest signal). Increasing the number of words per skip-gram leads to a higher number of zeros and lower
counts, which weakens the signal significantly.
Bags-of-words are the best contentbased feature so far as they produce the highest correlation scores
as well as the highest number of correlated BOWs. The bags-of-words have limited zeros and high counts,
which imply a signal stronger than the other word forms. BOWs also consider the words' co-occurrences
per tweet, which preserves the contextual meaning of each word. The size of the BOW affects the strength
signal as well, where 2-words BOWs achieved higher correlation, stronger signal and lower noise.
3-word and 4-word bags of words are too limited in their data set to be used as predictors or to be
correlated with the GSR events. The vector of counts for each BOW has too many zeros and small values.
It is highly improbable to have the same exact four words in multiple tweets unless considering retweets
and embedded tweets. This causes the daily counts of a 4-word BOW to be low enough that accidental
9
text and spurious data are significant factors. Filtering the data to avoid spurious BOWs leads to filtering
most other BOWs as well, causing aggressive limitation of the number of potential predictors. Although it
is recommended to use 5-word BOWs in topic modelling problems, it is not practical for Twitter due to
the limited number of characters per tweet, as 140 characters make around 16 words after excluding URLs,
hash-tags and mentions.
6 Conclusion
In this paper, we proposed to enhance the correlation of textual features gathered from Twitter with civil
unrest events by combining related features into one. This combination is implemented by finding the sum
of the vectors of the related features element-wise. In order to identify which features are related to each
other, we proposed to decompose the feature/event matrix using SVD then cluster the feature matrix using
k-means. The importance of SVD is that it guarantees the features' locations in the space are mapped to
orthogonal dimensions, which isn't always the case in the original matrix as neither the features nor the
days are guaranteed to form orthogonal dimensions. As k-means uses Euclidean distance and cannot work
without orthogonal dimensions, this is necessary. Each cluster will be represented using one feature that
has the minimum distance to all other features within the same cluster. The cluster is used to build a
look-up table mapping each feature to the centroid feature of its cluster. This look-up table will be used to
determine which vectors to sum together using the raw (not-decomposed) vectors.
The experiments and results showed that the proposed technique increased the correlation scores for
the centroid of the clusters significantly, with an average increase in correlation score of 0.3. This technique
has been tested for multiple correlation techniques including Pearson, Spearman, Kendal Tao, distance
correlation and mutual information, and increased correlation scores for all five.
The future work is to try a clustering technique that guarantees equally sized clusters, and to try to
eliminate any unrelated keywords within the cluster that may have appeared because of the spurious nature
of the data. This method can also be tested on other feature selection and data association techniques such
as the maximal information coefficient, cosine similarity index and Jaccard similarity index.
References
1. Abdi, H., Williams, L.J.: Principal component analysis. Wiley interdisciplinary reviews: computational statistics 2(4),
433 -- 459 (2010)
2. Anduiza, E., Cristancho, C., Sabucedo, J.M.: Mobilization through online social networks: the political protest of the
indignados in spain. Information, Communication & Society 17(6), 750 -- 764 (2014)
3. Azzam, A., Tazi, N., Hossny, A.: A question routing technique using deep neural network for communities of question
answering. In: International Conference on Database Systems for Advanced Applications, pp. 35 -- 49. Springer (2017)
4. Blankertz, B., Tomioka, R., Lemm, S., Kawanabe, M., Muller, K.R.: Optimizing spatial filters for robust eeg single-trial
analysis. IEEE Signal processing magazine 25(1), 41 -- 56 (2008)
5. Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. Journal of machine Learning research 3(Jan), 993 -- 1022
(2003)
6. Chen, Z.P., Morris, J., Martin, E., Hammond, R.B., Lai, X., Ma, C., Purba, E., Roberts, K.J., Bytheway, R.: Enhancing
the signal-to-noise ratio of x-ray diffraction profiles by smoothed principal component analysis. Analytical chemistry
77(20), 6563 -- 6570 (2005)
7. Comon, P.: Independent component analysis, a new concept? Signal processing 36(3), 287 -- 314 (1994)
8. Diggle, P.J.: Statistical analysis of spatial and spatio-temporal point patterns. CRC Press (2013)
9. Dumais, S.T.: Latent semantic analysis. Annual review of information science and technology 38(1), 188 -- 230 (2004)
10. Evangelopoulos, N.E.: Latent semantic analysis. Wiley Interdisciplinary Reviews: Cognitive Science 4(6), 683 -- 692
(2013)
11. Ewerbring, L., Luk, F.T.: Canonical correlations and generalized svd: Applications and new algorithms. Journal of
Computational and Applied Mathematics 27(1), 37 -- 52 (1989). DOI http://dx.doi.org/10.1016/0377-0427(89)90360-9.
URL http://www.sciencedirect.com/science/article/pii/0377042789903609. Special Issue on Parallel Algorithms
for Numerical Linear Algebra
12. Eysenbach, G.: Can tweets predict citations? metrics of social impact based on twitter and correlation with traditional
metrics of scientific impact. J Med Internet Res 13(4), e123 (2011). DOI 10.2196/jmir.2012. URL http://www.jmir.
org/2011/4/e123/
13. Fern´andez, J., Guti´errez, Y., G´omez, J.M., Martınez-Barco, P.: Gplsi: Supervised sentiment analysis in twitter using
In: Proceedings of the 8th International Workshop on Semantic Evaluation (SemEval 2014), number
skipgrams.
SemEval, pp. 294 -- 299 (2014)
14. Fung, G.P.C., Yu, J.X., Yu, P.S., Lu, H.: Parameter free bursty events detection in text streams. In: Proceedings of
the 31st International Conference on Very Large Data Bases, VLDB '05, pp. 181 -- 192. VLDB Endowment (2005). URL
http://dl.acm.org/citation.cfm?id=1083592.1083616
15. Golub, G.H., Reinsch, C.: Singular value decomposition and least squares solutions. Numerische mathematik 14(5),
403 -- 420 (1970)
10
16. Gonzlez-Bailn, S., Wang, N.: Networked discontent: The anatomy of protest campaigns in social media. Social Net-
works 44, 95 -- 104 (2016). DOI https://doi.org/10.1016/j.socnet.2015.07.003. URL http://www.sciencedirect.com/
science/article/pii/S0378873315000659
17. Hamadache, M., Lee, D.: Principal component analysis based signal-to-noise ratio improvement for inchoate faulty
signals: Application to ball bearing fault detection. International Journal of Control, Automation and Systems 15(2),
506 -- 517 (2017)
18. Hoffman, M., Bach, F.R., Blei, D.M.: Online learning for latent dirichlet allocation. In: advances in neural information
processing systems, pp. 856 -- 864 (2010)
19. Hossny, A., Shaalan, K., Fahmy, A.: Automatic morphological rule induction for arabic. In: Proceedings of the LREC08
workshop on HLT & NLP within the Arabic world: Arabic Language and local languages processing: Status Updates
and Prospects, pp. 97 -- 101 (2008)
20. Hossny, A., Shaalan, K., Fahmy, A.: Machine translation model using inductive logic programming.
In: Natural
Language Processing and Knowledge Engineering, 2009. NLP-KE 2009. International Conference on, pp. 1 -- 8. IEEE
(2009)
21. Hyvarinen, A., Karhunen, J., Oja, E.: Independent component analysis, vol. 46. John Wiley & Sons (2004)
22. Hyvarinen, A., Oja, E.: Independent component analysis: algorithms and applications. Neural networks 13(4), 411 -- 430
(2000)
23. Jiang, Z., Lin, Z., Davis, L.S.: Label consistent k-svd: Learning a discriminative dictionary for recognition.
IEEE
Transactions on Pattern Analysis and Machine Intelligence 35(11), 2651 -- 2664 (2013)
24. Klema, V., Laub, A.: The singular value decomposition: Its computation and some applications. IEEE transactions on
automatic control 25(2), 164 -- 176 (1980)
25. Koutsias, N., Mallinis, G., Karteris, M.: A forward/backward principal component analysis of landsat-7 etm+ data to
enhance the spectral signal of burnt surfaces. ISPRS Journal of Photogrammetry and Remote Sensing 64(1), 37 -- 46
(2009)
26. Landauer, T.K.: Latent semantic analysis. Wiley Online Library (2006)
27. Lange, K.: Singular value decomposition. Numerical Analysis for Statisticians pp. 129 -- 142 (2010)
28. Lee, F.L., Chan, J.M.: Digital media use and participation leadership in social protests: The case of tiananmen com-
memoration in hong kong. Telematics and Informatics 32(4), 879 -- 889 (2015). DOI https://doi.org/10.1016/j.tele.
2015.04.013. URL http://www.sciencedirect.com/science/article/pii/S0736585315000441
29. Li, C., Sun, A., Datta, A.: Twevent: segment-based event detection from tweets. In: Proceedings of the 21st ACM
international conference on Information and knowledge management, pp. 155 -- 164. ACM (2012)
30. Loper, E., Bird, S.: Nltk: The natural language toolkit. In: Proceedings of the ACL-02 Workshop on Effective Tools and
Methodologies for Teaching Natural Language Processing and Computational Linguistics - Volume 1, ETMTNLP '02,
pp. 63 -- 70. Association for Computational Linguistics, Stroudsburg, PA, USA (2002). DOI 10.3115/1118108.1118117.
URL http://dx.doi.org/10.3115/1118108.1118117
31. Lotte, F., Guan, C.: Regularizing common spatial patterns to improve bci designs: unified theory and new algorithms.
IEEE Transactions on biomedical Engineering 58(2), 355 -- 362 (2011)
32. Martınez-C´amara, E., Guti´errez-V´azquez, Y., Fern´andez, J., Montejo-R´aez, A., Munoz-Guillena, R.: Ensemble classifier
for twitter sentiment analysis (2015)
33. Mathioudakis, M., Koudas, N.: Twittermonitor: Trend detection over the twitter stream. In: Proceedings of the 2010
ACM SIGMOD International Conference on Management of Data, SIGMOD '10, pp. 1155 -- 1158. ACM, New York,
NY, USA (2010). DOI 10.1145/1807167.1807306. URL http://doi.acm.org/10.1145/1807167.1807306
34. Petrovi´c, S., Osborne, M., Lavrenko, V.: Streaming first story detection with application to twitter. In: Human Language
Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational
Linguistics, HLT '10, pp. 181 -- 189. Association for Computational Linguistics, Stroudsburg, PA, USA (2010). URL
http://dl.acm.org/citation.cfm?id=1857999.1858020
35. Potapov, P., Longo, P., Okunishi, E.: Enhancement of noisy edx hrstem spectrum-images by combination of filtering
and pca. Micron 96, 29 -- 37 (2017)
36. Ramoser, H., Muller-Gerking, J., Pfurtscheller, G.: Optimal spatial filtering of single trial eeg during imagined hand
movement. IEEE transactions on rehabilitation engineering 8(4), 441 -- 446 (2000)
37. Riquelme, F., Gonzlez-Cantergiani, P.: Measuring user influence on twitter: A survey. Information Processing & Man-
agement 52(5), 949 -- 975 (2016). DOI https://doi.org/10.1016/j.ipm.2016.04.003. URL http://www.sciencedirect.
com/science/article/pii/S0306457316300589
38. Sasaki, K., Yoshikawa, T., Furuhashi, T.: Online topic model for twitter considering dynamics of user interests and
topic trends. In: EMNLP, pp. 1977 -- 1985 (2014)
39. Shlens, J.: A tutorial on principal component analysis. arXiv preprint arXiv:1404.1100 (2014)
40. Soltysik, D.A., Thomasson, D., Rajan, S., Biassou, N.: Improving the use of principal component analysis to reduce
physiological noise and motion artifacts to increase the sensitivity of task-based fmri. Journal of Neuroscience Methods
241, 18 -- 29 (2015). DOI https://doi.org/10.1016/j.jneumeth.2014.11.015. URL http://www.sciencedirect.com/
science/article/pii/S0165027014004130
41. Spiegelberg, J., Rusz, J.: Can we use {PCA} to detect small signals in noisy data? Ultramicroscopy 172, 40 -- 46
(2017). DOI https://doi.org/10.1016/j.ultramic.2016.10.008. URL http://www.sciencedirect.com/science/article/
pii/S0304399116302480
42. Sun, S., Zhang, C., Lu, Y.: The random electrode selection ensemble for eeg signal classification. Pattern recognition
41(5), 1663 -- 1675 (2008)
43. Tufekci, Z., Wilson, C.: Social media and the decision to participate in political protest: Observations from tahrir
square. Journal of Communication 62(2), 363 -- 379 (2012)
44. Valenzuela, S.: Unpacking the use of social media for protest behavior: The roles of information, opinion expression,
and activism. American Behavioral Scientist 57(7), 920 -- 942 (2013)
45. Wall, M.E., Rechtsteiner, A., Rocha, L.M.: Singular Value Decomposition and Principal Component Analysis, pp.
91 -- 109. Springer US, Boston, MA (2003)
11
46. Wang, X., Gerber, M.S., Brown, D.E.: Automatic crime prediction using events extracted from twitter posts.
In:
International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction, pp. 231 -- 238. Springer
(2012)
47. Wold, S., Esbensen, K., Geladi, P.: Principal component analysis. Chemometrics and intelligent laboratory systems
2(1-3), 37 -- 52 (1987)
48. Yu, X., Chum, P., Sim, K.B.: Analysis the effect of pca for feature reduction in non-stationary eeg based motor imagery
of bci system. Optik-International Journal for Light and Electron Optics 125(3), 1498 -- 1502 (2014)
12
|
1606.03386 | 1 | 1606 | 2016-06-10T16:28:52 | A Generalized Bass Model for Product Growth in Networks | [
"cs.SI",
"physics.soc-ph"
] | Many products and innovations become well-known and widely adopted through the social interactions of individuals in a population. The Bass diffusion model has been widely used to model the temporal evolution of adoption in such social systems. In the model, the likelihood of a new adoption is proportional to the number of previous adopters, implicitly assuming a global (or homogeneous) interaction among all individuals in the network. Such global interactions do not exist in many large social networks, however. Instead, individuals typically interact with a small part of the larger population. To quantify the growth rate (or equivalently the adoption timing) in networks with limited interactions, we study a stochastic adoption process where the likelihood that each individual adopts is proportional to the number of adopters among the small group of persons he/she interacts with (and not the entire population of adopters). When the underlying network of interactions is a random $k$-regular graph, we compute the sample path limit of the fraction of adopters. We show the limit coincides with the solution of a differential equation which can viewed as a generalization of the Bass diffusion model. When the degree $k$ is bounded, we show the adoption curve differs significantly from the one corresponds to the Bass diffusion model. In particular, the adoption grows more slowly than what the Bass model projects. In addition, the adoption curve is asymmetric, unlike that of the Bass diffusion model. Such asymmetry has important consequences for the estimation of market potential. Finally, we calculate the timing of early adoptions at finer scales, e.g., logarithmic in the population size. | cs.SI | cs |
A Generalized Bass Model for Product Growth in Networks
Vahideh H. Manshadi
∗
Sidhant Misra
†
July 9, 2018
Abstract
Many products and innovations become well-known and widely adopted through the social
interactions of individuals in a population. The Bass diffusion model has been widely used to
model the temporal evolution of adoption in such social systems. In the model, the likelihood of
a new adoption is proportional to the number of previous adopters, implicitly assuming a global
(or homogeneous) interaction among all individuals in the network. Such global interactions do
not exist in many large social networks, however. Instead, individuals typically interact with a
small part of the larger population. To quantify the growth rate (or equivalently the adoption
timing) in networks with limited interactions, we study a stochastic adoption process where
the likelihood that each individual adopts is proportional to the number of adopters among the
small group of persons he/she interacts with (and not the entire population of adopters). When
the underlying network of interactions is a random k-regular graph, we compute the sample path
limit of the fraction of adopters. We show the limit coincides with the solution of a differential
equation which can viewed as a generalization of the Bass diffusion model. When the degree
k is bounded, we show the adoption curve differs significantly from the one corresponds to the
Bass diffusion model. In particular, the adoption grows more slowly than what the Bass model
projects. In addition, the adoption curve is asymmetric, unlike that of the Bass diffusion model.
Such asymmetry has important consequences for the estimation of market potential. Finally, we
calculate the timing of early adoptions at finer scales, e.g., logarithmic in the population size.
1
Introduction
The diffusion of innovations and products via social interactions has long been observed in various
social systems Rogers (2003). In this process, a few pioneers adopt an innovation and influence
those persons in contact with them. These people, in turn, adopt the innovation and influence their
contacts, and the innovation spreads through the network as a result of these social interactions.
The impact of social interactions on the spread of innovation has intensified with the rapid growth
and popularity of online social interactions. Smartphone applications are a good example of a
product whose popularity rests on the social interactions (and word-of-mouth communication) of
the users.
Understanding the growth rate of the diffusion of a product/innovation in a population is
imperative for both marketing and managerial decisions, such as inventory management and pricing.
Bass first studied the timing of product adoption using a simple differential equation later known
as the Bass diffusion model Bass (1969). In this model, at any time, the growth rate is proportional
∗
†
Yale School of Management, CT 06511. Email: [email protected].
Los Alamos National Laboratory, Los Alamos, NM 87545. Email: [email protected].
1
to the fraction of the population who has adopted it so far. This implicitly relies on the assumption
that the population is homogeneously mixing, and thus, a non-adopter can be influenced by all
adopters. Such global interactions do not exist in many modern social networks, however. Although
the size of an online social network may be massive, each person on that network is usually in
contact with a small group of friends and he/she is influenced only by those persons. This raises
the following question: How does product adoption evolve in networks with limited interactions?
In this paper, we develop a machinery for characterizing product growth in a large population
where the structure of the underlying network of interactions belongs to a large class of random
graphs. When the underlying network of interactions is a k-regular random graph, we provide a
generalization to the Bass model and contrast its adoption curve with the one corresponds to the
Bass model.
The Bass diffusion model is often presented in the following differential form: ∂s
∂t
∝ s (1 − s),
where s(t) is the fraction of adopters at time t. 1We show that when the underlying network is a
random k-regular graph, the adoption process grows at the following rate
∝(cid:104)
∂s
∂t
(cid:105)
1 − (1 − s)1− 2
k
(1 − s)
(1)
The above differential equation implies, fixing the fraction of non-adopters (1 − s), the growth
rate depends sub-linearly on the fraction of adopters (as opposed to linearly in the Bass model).
This difference stems from the limited interactions in the network. However, as the degree k grows,
converges to s. Thus, the Bass diffusion model can be seen as a special
the factor
case of differential equation (1).
(cid:104)
1 − (1 − s)1− 2
k
(cid:105)
Comparing the adoption curve resulted from these two differential equations, we show: (i) the
adoption grows more slowly than what the Bass model projects, therefore, using the Bass model
will over-estimate the adoption growth. (ii) unlike the adoption curve corresponding to the Bass
model, the true adoption curve is asymmetric. In particular, the adoption spreads faster in the
second half (i.e., after reaching half the population) than the first half (see Figure 1 and Figure 2).
Such asymmetry can result in misestimating the future demand based on observations early in the
adoption process.
In order to establish the above result (and a few others), we study a natural stochastic adoption
process which works as follows. Agents are nodes on a graph, and an edge between two nodes
means these agents interact which each other.
Initially, one random node adopts the product.
Later, each node contacts a randomly selected neighbor at an independent Poisson process (with
a given rate). If the contacting node is an adopter and the contacted neighbor is not, the latter
adopts the product with a given probability.
Like Bass (1969), we are mainly concerned with the timing of the adoption in the regime that a
fraction of the population has already adopted. We denote this phase the major adoption regime,
and we analyze the time it takes to increase the fraction of adopters by a constant (independent
of the population size). This is in the same spirit as fluid limits in queueing theory; Whitt (2002);
Chen and Yao (2001) 2. In particular, we show that the sample paths of the scaled adoption process
(i.e., number of adopters divided by the population size) almost surely converges to a deterministic
1Note that this is a special case of the Bass model where the coefficient of innovation is zero.
2Note here we do not need to scale time, because the contact rate grows proportionally with the number of
adopters.
2
function. First, as a sanity check, we find the limit for the complete network (which corresponds to
the homogenously mixing population) and confirm the limit of our adoption process coincides with
the Bass model (see Theorem 2.1 and Remark 2.2). Next, and far more importantly, we establish
the limit for random k-regular graphs (where k is a constant independent of the population size)
and show it equates with the solution of (1) (see Theorem 2.5 and Remark 2.6).
We note that for similar stochastic diffusion processes, a differential equation approximation
(particularly Kurtzs theorem Kurtz (1970)) has been used to re-derive the Bass model when the
underlying graph is assumed to be complete (e.g., Massoulie and Draief (2010)). However, such
an approach cannot be directly applied to other network structures. In fact, analyzing the scaled
sample path of the diffusion process for general graphs is prohibitively difficult. Recent work
has used concepts from mean field theory to approximate the growth rate for a certain class of
random graphs Jackson and Rogers (2007); Shakkottai and Johari (2010); Dover et al. (2012).
The basic idea of these models is to approximate the fraction of adopter neighbors of each agent
by the fraction of adopters in the whole population. 3 However, our analysis shows that when
the degree is bounded, an adopter is more likely to be connected to adopters. Therefore, the
fraction of his adopter neighbors will be higher than the fraction of adopters in the population.
Accordingly, the aforementioned method of approximation tends to over-estimate the growth rate
in random regular graphs, even though it does improve upon the Bass model.
In order to exactly
characterize the growth rate, we develop a new technique to incorporate the effect of network
structure in the evolution of the adoption process for random regular graphs.
In Section 4, we
describe how to generalize our analysis to compute the limits for random graphs with more general
degree distributions (under certain conditions for the distribution). We also explain how to modify
our analysis to accommodate a more general Bass model with innovators and an SIR epidemic
model. 4
In addition to finding the limits in the major adoption regime, we find the limit of timing in
the early adoption regime which refers to the phase when the number of adopters is logarithmic in
the population size. In this regime, we show that the time needed to acquire a logarithmic number
of adopters scales double logarithmically in the population size. We also show that compared to
complete graphs, the adoption process grows more slowly in random k-regular graphs by a factor
of
k
k−2 (see Theorem 2.8).
Besides marketing decisions, several managerial questions arise in the presence of product dif-
fusion (sometimes called social learning or word-of-mouth effects), for example, how to manage
demand when the supply is constrained Ho et al. (2002); Kumar and Swaminathan (2003); Shen
et al. (2011), how to price optimally Shen et al. (2014), 5 and how to facilitate diffusion for the adop-
tion of green technologies Alizamir et al. (2014)Diaz-Rainey and Tzavara (2012). The Bass model
has been extensively used to study these problems, but in situations where each agent can only
influence a limited number of others, it tends to misestimate the adoption growth. Accordingly, our
proposed technique for exactly characterizing the product growth can prove useful in developing
more accurate managerial insights for product diffusion in networks with limited interactions.
3When dealing with random graphs with general degree distribution, some of these methods approximate the
fraction of adopter neighbors with a given degree d by the fraction of adopters with degree d in the whole population.
4These terminologies are used in infectious diseases; S stands for susceptible, I for infectious and R for removed,
i.e. immune or dead.
5For pricing in presence of externalities or word-of-mouth effect in social networks, see also Campbell (2013);
Ajorlou et al. (2014); Ifrach et al. (2012); Candogan et al. (2012); Cohen and Harsha (2016).
3
1.1 Related Work
The adoption model we study in this paper has counterparts in many other areas, ranging from
epidemiology to economics. It is a stochastic version of the SI (Susceptible Infected) model used
in epidemiology Kermack and McKendrick (1927); Durrett (2006).
It is also closely linked to
the gossip algorithms used in data aggregation and distributed computing in sensor and peer-to-
peer networks Shah (2008); Mosk-Aoyama and Shah (2008), and to the learning models studied in
social and economic networks Jackson (2008). Our work complements the earlier studies of epidemic
processes by focusing on timing in the major adoption regime (i.e., when a fraction of the population
has already adopted). Several papers have shown the growth of epidemics is related to the spectral
radius and expansion properties of the underlying graphs Mosk-Aoyama and Shah (2008); Jackson
(2008) (for more general epidemic models, see Draief et al. (2008); Ganesh et al. (2005); Banerjee
et al. (2014)). It is well known that because random graphs have large expansion factors Kahale
(1992); Gkantsidis et al. (2003), epidemics spread fast on them. However, the functional form of
the growth has not previously been calculated, nor has the time needed to grow the fraction of
nodes in epidemics from a constant α to another constant γ been analyzed.
As mentioned above, several papers use approximation methods to develop tractable frameworks
to analyze the adoption/epidemic process in networks with a given degree distribution. Jackson
and Rogers (2007) use a mean field approach to study an SIS (Susceptible Infected Susceptible)
model and relate stochastic dominance properties of the degree distribution to the infection rate.
Shakkottai and Johari (2010) employ a mean field approximation to model the temporal evolution
of demand for stored content on the Internet. Using this demand model, they examine the delay
performance of several content distribution mechanisms. Even though such a mean field approx-
imation method provides a tractable framework, our analysis show that it tends to over-estimate
the demand growth by neglecting the phenomenon that an adopter is more likely to be connected
to adopters and such correlation evolves over time.
Several papers in the area of marketing are concerned with adoption processes and the flow
of information in networks (see Dover et al. (2012) and references therein). Closest to our work
are Dover et al. (2012) who study an adoption process similar to ours on a random graph with
a given degree distribution. They use an approximation method similar to that of Shakkottai
and Johari (2010) to show the adoption growth rate depends on the mean and variance of the
degree distribution. They use this model to uncover the degree distribution based on the observed
adoption data. Further, they show when the network degree is significantly skewed, the adoption
curve is asymmetrical. This has important consequences for the estimation of market potential.
Interestingly, our rigorous analysis also shows the adoption curve is asymmetric, even on random
k-regular graphs.
From a technical perspective, our work brings the literature on processes on random graphs
together with that on stochastic differential equations and fluid limits. To analyze the adoption
process on random graphs, we couple the (continuous) adoption process with the (discrete) graph
generation process based on a configuration model Wormald (1999b). Abstracting from time, our
adoption process spreads on random graphs in the same way as the exploration process defined in
Molloy and Reed (1995). The latter process was introduced to find the size of the largest connected
component in a random graph with given degree distributions. We use ideas similar to Wormald
(1995) to approximate the evolution of the adoption process. When coupling with time, we build
on these results Wormald (1995); Molloy and Reed (1995) for random graphs to compute the limit
of timing of the adoption process.
4
2 Model and Main Results
We represent the social network by graph Gn = (V, E), where V = n. Each node v ∈ V represents
an agent in the system; nodes v and u are neighbors if (v, u) ∈ E. At time 0, a randomly selected
node adopts a new product Z. The new product spreads through the local contacts between the
neighbors. In particular, each node v ∈ V, contacts a randomly selected neighbor at an independent
Poisson process with rate β. Suppose node v adopts Z at time t; at any contact after t, if node
v contacts a neighbor u that has not yet adopted Z, u will adopt the product with probability p.
Given the thinning property of the Poisson process, WLOG, we assume p = 1.
graph is connected, after a finite time, all agents will adopt the new product. For any 1 ≤ x ≤ n,
let Tn(x) denote the minimum time needed to have x adopted individuals. Our goal is to analyze
limits of Tn(x) for different scales of x. In particular, we define two main regimes: an early adoption
regime in which x = O(log n) and a major adoption regime where x = Θ(n).
In this adoption process, the number of adopters can only increase over time. If the underlying
We analyze the adoption process on two classes of graphs: complete graphs and random k-regular
graphs where k is a constant. The former class represents a network with global (or homogeneous)
interactions, and the latter serves as a model of limited interactions among individuals.
In the next section, we focus on the major adoption regime and give almost sure results on how
long it takes to grow the fraction of adopters from α to γ, where 0 < α ≤ γ < 1.
2.1 Timing in Major Adoption Regime
In the major adoption regime, we assume a constant fraction of the population has already adopted
the product, and we are concerned with the time needed to add Θ(n) more adopters. More precisely,
for any 0 < α ≤ γ < 1, let ∆n(αn, γn) be Tn(γn) − Tn(αn). In this subsection, we compute the limit
of ∆n(αn, γn). We start by analyzing the timing in major adoption when the underlying graph is a
complete graph and show that:
Theorem 2.1 (Major adoption in a complete graph). Suppose for all n > 1, the underlying graph
Gn is the complete graph. Then, for any 0 < α ≤ γ < 1:
∆n(αn, γn) a.s.→ θ(γ) − θ(α),
(2)
where θ(s) = 1
β log s
1−s , for 0 < s < 1.
First note that function θ(s) is centered such that θ(1/2) = 0. Also, note that function θ(s) is
1+eβt , logistic equation
a.s.→ s(t),
strictly increasing, and, thus, it is an injective function. Its inverse is s(t) = eβt
that is a special case of the Bass model.
Remark 2.2. Let Sn(t) be the number of adopters at time t. Theorem 2.1 implies that Sn(t)
n
where s(t) is the solution of the following differential equation:
= βs(1 − s)
∂s
∂t
5
(3)
Thus, the limit of the scaled sample paths of our probabilistic adoption process coincides with
the deterministic logistic function. Further, note that function θ(s) has the following symmetry
for any 0 < s < 1, θ(s) = −θ(1 − s). The time it takes to grow the fraction of the
property:
adopters from α to 1/2 is the same as the time it takes to grow the fraction from 1/2 to 1 − α
where 0 < α < 1/2. This symmetry results from having a complete graph (a homogenously mixing
population) and is intuitively explained as follows: at any time, the subgraph including the adopters
is a complete graph, and so is the subgraph consisting of nodes who have not yet adopted. Now,
we can look at the process in a backward way; if node u is a non-adopter, and it contacts node
v who is an adopter, then node v will abandon product Z; the abandonment of the product will
spread through the network in this way. Because the processes of adoption and discard spread in
exactly the same way, the time needed to grow the set of non-adopters from 1− s to 1/2 will be the
same as the time required to grow the set of adopters from s to 1/2.
The limit result (3) can be proven directly by using stochastic differential equations and Kurtzs
theorem (for instance, see Massoulie and Draief (2010), Section 1.3.1). Here, we present an alter-
native proof that analyzes the random times between any two consecutive adoptions and directly
establishes the time limit (2).
i + 1. First note that ∆n(γn, αn) =(cid:80)γn−1
Proof. For any 1 ≤ i ≤ n − 1, let τi be the time it takes to grow the number of adoptions from i to
τi. Further, note that conditioned on the set of adopted
nodes, τi's are independent exponential random variables. Let λi be the rate of τi. For the complete
graph, we compute the rate λi as follows: there are i adopter nodes who can contact non-adopters.
When any adopter node v makes a contact, it contacts a neighbor who has not adopted yet with
probability (n − i)/(n − 1). Thus, using the thinning property of the Poisson processes, we have:
i=αn
λi = βi(n − i)
n − 1
.
(4)
First, to prove the theorem, we make the following claim:
Claim 2.3. E(cid:2)∆n(γn, αn)(cid:3) → θ(γ) − θ(α).
−δn,
(5)
The claim is proven in Appendix A. Next, we establish the concentration bounds shown in the
second claim, given as:
Claim 2.4. Suppose is a fixed small positive number,
where δ is a small positive number given in Equation (27).
The second claim is proven in Appendix A as well. This implies that
P(cid:0)∆n(γn, αn) − E(cid:2)∆n(γn, αn)(cid:3) ≥ (cid:1) ≤ e
∞(cid:88)
P(cid:0)∆n(γn, αn) − E(cid:2)∆n(γn, αn)(cid:3) ≥ (cid:1) < ∞.
Now, applying the Borel-Cantelli lemma, we have: ∆n(αn, γn) a.s.→ E(cid:2)∆n(αn, γn)(cid:3) which completes
n=1
the proof.
(cid:3)
6
Next, we analyze the adoption process on random k-regular graphs, where k is a constant. To
ensure all nodes eventually adopt, we limit the sample space of the graphs to only include connected
ones.
Theorem 2.5 (Major adoption in random k-regular graphs). Suppose for all n > 1, the underlying
graph Gn is sampled uniformly at random from the set of all connected k-regular graphs with n
nodes, where k ≥ 3 is bounded. For any 0 < α ≤ γ < 1, the following limit holds:
(cid:16)
(cid:104)
log
1 − (1 − s) 2
k
where θ(s) = k
β(k−2)
∆n(γn, αn) a.s.→ θ(γ) − θ(α),
(cid:17)(cid:105)
.
1 − 21− 2
k
(cid:16)
−1(cid:17) − log
= β(cid:104)
∂s
∂t
(6)
a.s.→ s(t),
Sn(t)
n
(7)
Remark 2.6. Let Sn(t) be the number of adopters at time t. Theorem 2.5 implies
where s(t) is the solution of the following differential equation:
(1 − s)
1 − (1 − s)1− 2
(cid:105)
k
Figure 1 compares the solution of differential equations (3) and (7) for initial value s(0) = 0.01,
and k = 5. As we can see, the adoption grows much more slowly on a random 5-regular graph
than on a complete graph. The same can be observed in the left plot of Figure 2 which basically
shows the inverse function. (Note: the left plot of Figure 2 shows the limit results of the time it
takes to grow the fraction of adopters from 0.01 to s ∈ [0.01, 0.99] on the complete graph and the
random 5-regular graph.) The high level intuition behind this observation is as follows: suppose we
reach the time that i nodes have already adopted, where i = Θ(n); the rate of contact of adopters
is βi regardless of the underlying graph. However, the probability that an adopter contacts a non-
adopter is higher on a complete graph for two reasons. First, on a k-regular graph, the subgraph
induced by the adopters is connected; therefore, each adopter has k − 1 neighbors who are likely
to be non-adopters. Second, those k − 1 neighbors are not uniform samples among the remaining
n − 2 nodes. In fact, we show it is more likely that the neighbor of an adopter belongs to the set
of adopters itself. This is a result of the connectivity properties of the subgraph induced by the
adopters.
To further highlight the effect of connectivity among the adopters, let us compute the rate of
τi on a random graph using a mean field approximation (in the same spirit of approximation as
Jackson and Rogers (2007); Shakkottai and Johari (2010); Dover et al. (2012)). We denote this
approximate rate as λM
i . As explained above, the rate of contact by adopters is βi; each adopter
has at least one adopter neighbor with probability 1. For adopter node v, let v
be the neighbor
(cid:48)
who adopted before v and was the first adopter who contacted v. Clearly, if v contacts node v
,
this will not result in a new adoption. Now suppose node v selects a random neighbor other than
; this happens with probability (k − 1)/k. In a mean field approximation, we assume the rest of
(cid:48)
v
the neighbors of v are uniformly sampled among the other n− 2 nodes. Thus, the probability node
v will contact a non-adopter is n−i
(cid:48)
n−2 . This implies
λM
i
=
i(n − i)
n − 2
.
β(k − 1)
k
7
(8)
Figure 1: Evolution of the fraction of adopters (s(t)); comparing a complete and a 5-regular random
graph. Time is normalized such that at time 0 the fraction of adopters is 0.01.
The approximation rate of (8) has the same form as (4) and is only scaled by (k − 1)/k. The
time limit resulting from this mean field approximation is plotted in Figure 2. As we can see, it
significantly differs from the actual limit, and, in particular, it underestimates the adoption time.
Further, on the right plot of Figure 2, we observe that unlike the complete graph, the normalized
process for the random regular graph (such that θ(1/2) = 0) is not symmetric around 1/2, and the
time it takes to grow the process from α < 1/2 to 1/2 is larger than the time it take to grow it from
1/2 to 1 − α. This is again related to the connectivity properties of random graphs. If we look at
the backward process, we see the subgraph of non-adopters is not necessarily connected; thus, the
backward process grows faster.
Proof sketch of Theorem 2.5:
Similar to the proof for the complete graph, we compute the rate of the exponential time
between any two consecutive adoptions. Recall that we denote the time it takes to grow the
number of adoptions from i to i + 1 as τi and its rate by λi. Unlike the complete graph, we cannot
compute the rate λi only based on the number of adopters: suppose node v is an adopter, and it
samples one of its k neighbors to contact. Knowing only i, we cannot determine how many of v's
neighbors have not yet adopted. To overcome this problem, we first note that the random graph can
be generated using an iterative pairing process called the configuration model Wormald (1999b). A
configuration model works as follows: we start with n isolated nodes. Each node has k clones (or
half edges). At each step, a new edge is formed by pairing two randomly chosen clones; the process
ends after nk/2 steps, when all the clones are paired.
Given this observation, we couple the graph generation and the adoption process in the following
manner.: We assume the graph has not been realized before the adoption process. Thus, at time
0, we have n isolated nodes, each with k unpaired clones. Any time an adopter makes a contact,
it chooses one of its clones uniformly at random. If the clone has already been paired, this means
8
Figure 2: Left: The time it takes to grow the fraction of adopters from 0.01 to s ∈ [0.01, 0.99]
(functions θ(s)− θ(0.01), θ(s)− θ(0.01), and k/(k− 1) (θ(s) − θ(0.01)) for s ∈ [0.01, 0.99]). Right: The
normalized timing functions in major adoption regime (functions θ(s) and θ(s) for s ∈ [0.01, 0.99]).
both ends of this edge have already adopted. In this case, neither the adoption process nor the
set of formed edges will grow.
If the clone has not been paired, we perform a new iteration of
the configuration model and form a new edge by sampling a clone at random among all unpaired
ones. If the sampled clone belongs to a non-adopter node, then the adoption process grows by one;
otherwise, the adoption set remains the same.
Abstracting away from the time, we first analyze the evolution of the number of adopted nodes
and their unpaired clones in terms of the number of iterations (which are discrete time random
processes). For the analysis, we use the differential equation method proposed by Wormald (1999a,
1995) to approximate discrete random processes using a deterministic function. The same approach
has been used to find the size of the giant connected components in random graphs by Molloy and
Reed (1995, 1998).
the result, we compute E(cid:2)∆n(γn, αn)(cid:3). At the end, similar to the proof of Theorem 2.1, we use
Next, we compute the exponential times between any two consecutive iterations, and based on
some concentration bound and the Borel-Cantelli lemma to establish almost sure convergence.
The proof also deals with some technical subtleties; for example, it obtains a bound in a de-
terministic approximation stronger than the bound established in Wormald (1999a, 1995). It also
confirms the concentration results hold when we limit the sample space to simple and connected
graphs (rather than all possible pairings of the clones.).
The detailed proof of Theorem 2.5 is presented in Section 3. In Section 4, we explain how to
generalize the above proof ideas to analyze the adoption process on a random graph with more
general degree distributions. We also describe how to modify our analysis to more general Bass
model with innovators and an SIR (Susceptible-Infected-Remove) epidemic model.
Finally, note that for k = 2, the only connected regular graph is a cycle of length n. The
9
following proposition asserts the different time scalings of the major adoption regimes for such
graphs:
Proposition 2.7. For all n > 1, let the underlying graph be a cycle of length n. Then, for any
0 < α ≤ γ < 1,
∆n(γn, αn)
n
a.s.→ γ − α
β
.
Proof. For any i ≥ 1, the set of adopters forms a path of length i. For any 1 < i < n, there are only
two nodes at the two ends of the path that can contact non-adopters. Suppose node v is an end
point, and it makes a contact. With probability 1/2, it contacts a non-adopter neighbor. Thus,
λi = β for any 1 < i < n, implying that τi's are i.i.d. By the strong law of large numbers, the above
limit holds.
(cid:3)
2.2 Timing in Early Adoption Regime
In a major adoption regime, the rate of contacts grows linearly with n; 6 therefore, the adoption
process spreads very quickly. Further, as Theorem 2.1 and 2.5 assert, the time to grow from fraction
α to fraction γ is constant. However, in the early adoption regime, the growth rate is much slower,
as there are only a few adopters. In this section, we analyze the timing in this slower regime; more
specifically, we find the limit of the time it takes to get Θ(log n) adopters. We establish the limit
for both the complete graphs and the random k-regular graphs. For both graphs, we establish that
the time needed to have Θ(log n) adopter scales as log log n. Further, we show the process grows
faster on the complete graph (compared to the random k-regular graph).
Theorem 2.8 (Early adoption). For any constant C > 0 the following hold:
(a) If for all n > 1, graph Gn is a complete graph, then:
Tn(C log n)
log log n
p→ 1
β
.
(9)
(b) If for all n > 1, graph Gn is a uniformly random sample from the set of all connected k-regular
graphs, where k ≥ 3 is bounded, then:
Tn(C log n)
log log n
p→ k
β(k − 2)
.
(10)
The proof of part (a) follows the same line of the proof of Theorem 2.1; note that the rate
given by (4) holds for any 1 ≤ i < n. Using this rate, we first show that
β , and then
Tn(C log n)
log log n converges to its mean (in probability) by proving its variance converges to zero. The
E[Tn(C log n)]
log log n
→ 1
show
details are given in Appendix B.
6Except for the special case of a single cycle.
10
Proof sketch of part (b)
As in the previous proofs, we aim to compute λi, for 1 ≤ i ≤ C log n. First note that we can
view the adoption process as the following: each edge (v, u) makes contacts at an independent
Poisson rate β/k from v to u and similarly from u to v. Given i adopters, the total number of
contacts (along edges) that can result in a new adoption is the total number of edges between the
set of adopters and non-adopters. Observe that in our coupled process (defined in proof sketch of
Theorem 2.5), at each iteration, the sub-graph of the adopters formed so far is connected; thus, the
total number of edges that can result in a new adoption is, at most, (k−2)i+2. To compute the exact
number of these edges, we use the locally tree-like property of random k-regular graphs Dembo and
Montanari (2010) which confirms that, with high probability, on the final realized graph (i.e., after
the formation of all edges), the subgraph containing these i nodes is a tree and does not contain a
cycle. Thus, the remaining (k − 2)i + 2 edges are all between an adopter node and a non-adopter
one. This implies that with high probability, λi ≈ β/k[(k − 2)i] for 1 ≤ i ≤ C log n. Once we have
the rates, the rest of the proof handles the convergence of random variable Tn(C log n) to its mean.
The detailed proof is given in Appendix B.
The locally tree-like property of the random graph carries over to a subgraph of size o(
thus, we can use similar techniques to prove the following:
Remark 2.9. Similar limit results hold for Tn(σ(n))
log σ(n) for any σ(n) = o(
√
n).
√
n);
3 Proof of Theorem 2.5
In this section we formally prove Theorem 2.5. For the sake of brevity, the proof of all technical
lemmas of this section is deferred to Appendix C. As explained in the proof sketch, we first study
the (edge formation) iteration process and analyze the evolution of the number of adopters in terms
of the iterations. Similar to Molloy and Reed (1995, 1998), we call this the exploration process. In
this process every node is associated with k clones. For clone c of node v, all other clones belonging
to node v are considered as c's siblings. We start at iteration j = 0. At any iteration j in the
exploration process, there are three kinds of clones:
'sleeping' clones, 'active' clones, and 'dead'
clones. At the beginning, all clones are sleeping. If all clones of a node are sleeping the node is
said to be a sleeping node; if all its clones are dead, the node is considered dead; otherwise, it is
considered active. Given this terminology, the exploration process works as follows.
Exploration Process
1. Initialization: Pick a node uniformly at random from the set of all sleeping nodes and set the
status of all its clones to active.
2. Repeat the following two steps as long as there are active clones:
(a). Sample a clone c uniformly at random from the set of active clones and kill it.
(cid:48)
(b). Pair the clone c with clone c
that is chosen uniformly at random from the set of all
(cid:48)
remaining unpaired (active or sleeping) clones. Kill c
and make all its siblings active.
The set of active clones at iteration j is denoted by A(j). The union of the set of sleeping and
active clones is denoted by L(j); they are called 'living' clones. Finally, we denote the number of
sleeping nodes by N(j).
11
3.1 Evolution of Exploration Process
In a second paper, Molloy and Reed (1998) used results by Wormald (1995) to track the evolution of
the exploration process. We employ a similar technique, but do not directly use Wormald's result.
Instead, we use insights from the proof technique and tighten the probability of error needed to
get almost sure convergence. When coupling with the adoption process, we introduce an additional
variable which tracks the (random) re-scaled time in the adoption process.
At every iteration of the exploration process, the number of living clones reduces by two; i.e.,
we have L(j + 1) = L(j)− 2. Hence we have L(j) = nk− 2j. At each iteration, the number of sleeping
nodes, N(j), reduces by one, if in step 2(b) of the exploration process, the clone neighbor chosen
(cid:48)
(c
) is a sleeping one. Otherwise, N(j) remains the same.
After initialization, all nodes are sleeping except the one we have awakened for the initiation
(note that when coupling with the adoption process, this will be the first node to adopt the product).
Therefore, at j = 0, we have A(0) = k.
At every iteration, the evolution of the number of sleeping nodes and the number of active
clones is as follows:
1. With probability
kN(j)
kn−2j , we have
(cid:16)
1 − kN(j)
kn−2j
(cid:17)
2. With probability
N(j + 1) = N(j) − 1
A(j + 1) = A(j) + (k − 2).
, we have
N(j + 1) = N(j)
A(j + 1) = A(j) − 2.
(11)
(12)
(13)
(14)
Note that the above equations (for the evolution of sleeping nodes and active clones) only hold
when the graph is connected. Later, in Lemma 3.7, we show a random k-regular graph is connected
with probability 1−Θ(n
−2). We further show that our limit result holds when conditioning on being
connected. For now, we assume the graph is connected and find the limits of the scaled random
variables, N(j)/n and A(j)/n, evolving according to (11)-(14).
At any iteration j in the exploration process, we have A(j) = L(j) − kN(j) = k[n − N(j)] − 2j. So
it suffices to characterize the evolution of only one of these parameters, e.g., N(j). Let H(j) denote
the history of the exploration process until iteration j. By the equations (11) - (14), we have
E(cid:2)N(j + 1) − N(j)H(j)(cid:3) = − kN(j)
kn − 2j
= −kN(j)/n
k − jt/n
.
(15)
From the above, using Wormald's result (Theorem 1 in Wormald (1995)), it follows that for
any 0 < j < (k − 0)n/2, with high probability
N(j) = n f (j/n) + o(n),
(16)
uniformly over j, where
12
(cid:18)
1 − 2x
k
(cid:19) k
2 ,
f (x) =
which is the unique solution to the differential equation
(cid:48)
(x) = − k f (x)
k − 2x
,
f
with initial condition f (0) = 1. Here 0 > 0 is a fixed constant.
(17)
(18)
The result in Wormald (1995) is for a fairly general setting, but the bound given for the proba-
bility of convergence is not strong enough for us to prove a.s. convergence. Thus, in the following
lemma, we specialize the result of Wormald (Theorem 1 in Wormald (1995)) to our case so we can
obtain a stronger bound on the probability of event (16).
Lemma 3.1. Fix a constant 0 > 0. For any iteration 0 ≤ j < (k/2−0)n, with probability 1−o(n
−3),
N(j) − n f (j/n) ≤ δ1(n),
uniformly over j, where the function f (x) is defined in (17) and δ1(n) = o(n).
Next we find an approximation for A(j): define g(x) (cid:44) k(1 − f (x)) − 2x. The following corollary
is an immediate corollary of Lemma 3.1.
Corollary 3.2. With probability 1 − o(n
−3), for any 0 < j < (k − 0)n/2, we have
A(j) − ng(j/n) ≤ δ2(n),
(19)
uniformly over j, for some δ2(n) = o(n).
We now find an approximation for the number of iterations needed to have αn active or dead
nodes. Note that when coupled with the adoption process, these are the adopter nodes. Let
δ(n) = max{δ1(n), δ2(n)} for δ1(n) and δ2(n), as defined in Lemma 3.1 and Corollary 3.2. Let
A (cid:44) (A(j), 0 ≤ j ≤ (k − 0)n/2) be the vector of the random number of active clones and let a be
a particular realization of this random vector. Also, let S (cid:44) {a : a(j) − ng(j/n) ≤ δ(n)}. In the
next auxiliary lemma, we show the number of iterations needed to have αn active or dead nodes,
denoted by Jα, is close to f
−1(1 − α).
Lemma 3.3. Let jα (cid:44) f
−1(1 − α) and c = f
(cid:17). If A ∈ S, for any α
(cid:48)(cid:16) k−0
Jα − njα ≤ 2
c
2
δ(n).
3.2 Coupling Exploration and Adoption Processes
We now couple the exploration and adoption processes. At any time, the set of active and dead
nodes correspond to the set of adopters. At a random time, one of these nodes "times-out" and
decides to use one of its outgoing edges (or one of its clones, say clone c) to contact a neighbor at
the other end of this outgoing edge. Then, one of the following happens:
13
(cid:48)
Case 1: Clone c has already been paired with clone c
.
(cid:48)
(a) Clones c and c
(cid:48)
(b) The node to which clone c
are dead clones.
belongs has already adopted.
(cid:48)
Case 2: Clone c has not been paired yet. It chooses clone c
uniformly at random among all living
clones.
(a) Clone c is an active clone.
(cid:48)
(b) If clone c
(cid:48)
is a sleeping clone, the node to which it belongs will adopt; if clone c
is an
active clone, the node to which it belongs has adopted before this contact.
This implies only contacts made through active clones will ensure the exploration process pro-
ceeds. Further, only these contacts may result in the growth of the adoption set. As mentioned,
we can view the adoption process in the following way: each clone (or half edge) makes contact at
an independent Poisson process at rate β/k. Therefore, at any iteration j, the time it takes to add
β
k A(j). We denote this
one edge (go to iteration (j+1)) is an exponential random variable with rate
random variable by τ(j). Using the notation defined in Section 2 and in the previous subsection, it
follows that
Jγ(cid:88)
∆n(αn, γn) =
τ(j).
Remark 3.4. Conditioned on {A = a}, the random variables τ(j) for 0 < j < (k − 0)n/2 are
First, we compute E(cid:2)∆n(αn, γn)A = a ∈ S(cid:3) . By Lemma 3.3, for a ∈ S, we have ∆ ≤ ∆n(αn, γn) ≤
independent exponentially distributed random variables with mean
k
βA(j) .
j=Jα
∆, where
∆ (cid:44)
δ(n)(cid:88)
c
njγ− 2
njα+ 2
c
δ(n)
τ(j),
and ∆ (cid:44)
δ(n)(cid:88)
njγ+ 2
c
njα− 2
c
δ(n)
τ(j)
Next, we compute
E[∆A = a ∈ S] =
δ(n)(cid:88)
(cid:90) jγ
δ(n)
c
njγ+ 2
c
njα− 2
= k
β
1
g(x)
jα
δ(n)(cid:88)
njγ+ 2
c
1
k
βA(t)
≥ k
β
njα− 2
ng(t/n) + δ(n)
dx + o(1) = θ(γ) − θ(α) + o(1),
δ(n)
c
where the inequality holds by Corollary 3.2. In a similar way, we can prove an upper bound for
E[∆A = a ∈ S]. These bounds prove that
E[∆A = a ∈ S] → θ(γ) − θ(α).
(20)
14
Now, we are in a position to prove Theorem 2.5. Let E (cid:44) ∆ − E
(cid:104)
∆
(cid:105)
. Fix > 0. We start with
P(E ≥ ) ≤(cid:88)
a∈S
P(E ≥ A = a)P(A = a) + P(A (cid:60) S)
−3). To bound the first term, we first notice that for any
(21)
By Corollary 3.2, the second term is o(n
0n ≤ j ≤ kn/2 − 0n and any p > 0, conditioned on a ∈ S, we have:
−p,
τ(j) ≥ kp log n
(cid:12)(cid:12)(cid:12)(cid:12)A = a
≤ n
P
βgn
(22)
2n minx∈[0,k/2−0] g(x), and we use the following remark:
where g (cid:44) 1
Remark 3.5. If A ∈ S, then A(j) ≥ n minx∈[0,k/2−0] g(x) + o(n) ≥ 1
(cid:26)
0n ≤ j ≤ (k/2 − 0)n and large enough n.
τ(j) ≤ kp log n
2n minx∈[0,k/2−0] g(x), for all
for all 0n ≤ j ≤ kn/2 − 0n and conditioned on a ∈ S.
Let B be the event that
(cid:27)
βgn
By (22) and the union bound, we have P (B) ≥ 1 − n1−p, or equivalently, P
to bounding the first term of (21), for any a ∈ S it follows that
(cid:16)
(cid:17) ≤ n1−p. Going back
B
P(E ≥ A = a) ≤ P(E ≥ A = a, B) + n1−p.
Applying the Hoeffding bounding to the first term, we get
P(E ≥ A = a) ≤ 2 exp
− 2n
log n
+ O(n1−p).
Using (20), for a large enough n, we have:
P(∆ − [ θ(γ) − θ(α)] ≥ 2A = a) ≤ 2 exp
2β2g2
k2p2
− 2n
log n
+ O(n1−p).
2β2g2
k2p2
We can prove a similar bound for ∆ − [ θ(γ) − θ(α)]. Since ∆ ≤ ∆n(αn, γn) ≤ ∆, the same bound
holds for ∆n(αn, γn) − [ θ(γ) − θ(α)]. Let p = 4. So far we have proved that
P(∆n(αn, γn) − [ θ(γ) − θ(α)] ≥ 2) = O(n
−3).
(23)
The last step of the proof is to show that when conditioning on the event that the graph obtained
as a result of matching random clones is a simple and connected graph, the same order of error
−3)) holds. Let G denote the graph eventually obtained after nk/2 iterations.
probability (i.e., O(n
Conditioned on being connected and simple, G is a k-regular graph sampled uniformly among all
connected simple k-regular graphs. It follows from inequality (23) that
(cid:16)(cid:110)∆n(αn, γn) − [ θ(γ) − θ(α)] ≥ 2(cid:111) ∩ {{G is connected} ∩ {G is simple}}(cid:17)
P
To prove that conditioned on {{G is connected} ∩ {G is simple}}, the error probability is O(n
−3),
it suffices to show P({Gis connected}∩{G is simple}) = O(1). This follows from the next two lemmas.
= O(n
−3).
(24)
15
Lemma 3.6. P(G is simple) = Θ(1).
The above lemma is a well-known result (see for example Wormald (1999b), Bender and Canfield
(1978)). It allows us to carry over properties which hold with high probability from the configuration
model to the subset of simple random graphs. The next lemma shows a uniform sample among
simple graphs is connected with probability 1 − O(n
Lemma 3.7. P({G is not connected} ∩ {G is simple}) = O(n
−2):
−2).
Putting (24) and Lemmas 3.6 and 3.7 together implies that for any graph Gn sampled uniformly
at random from the set of all connected k-regular graphs with n nodes and a large enough n,
(cid:16)∆n(αn, γn) − [ θ(γ) − θ(α)] ≥ 2(cid:17)
= O(n
−3) < n
−2.
(25)
−2 < ∞, the theorem (the limit (6)) follows by applying the
Since is arbitrary, and (cid:80)∞
P
n=1 n
Borrel-Cantelli lemma.
4 Discussions
The techniques developed here to analyze the adoption process for random k-regular graphs can be
generalized to the following settings.
Random graphs with given degree distributions: We can analyze the adoption process
defined in Section 2 for a more general class of random graphs with a given degree distribution.
For these random graphs, we couple the adoption process and the configuration model. We first
analyze the exploration process. Let D be the set of all degrees with a nonzero probability in the
degree distribution. Let Nd(j) and Ad(j) to be the number of sleeping nodes of degree d and the
number of active clones belonging to a node of degree d. We can write equations similar to (11)-(14)
for the evolution of the vectors(cid:0)Nd(j), d ∈ D(cid:1) and(cid:0)Ad(j), d ∈ D(cid:1). Again, we prove an approximation
for 1/n(cid:0)Nd(j), d ∈ D(cid:1) using Wormald's result Wormald (1995). We connect the exploration process
to the adoption process in the same way as in Subsection 3.2.
For comparative purposes, see Figure 3. The figure shows simulation results comparing the
process on three different random graphs with mean degree 5. The theoretical curve derived in this
paper is included for reference and matches very well with the simulation results. Interestingly,
when there is more heterogeneity in the degree distribution in the network, the process proceeds
more or less at the same rate in the beginning, but slows down towards the end for those with
higher disparity. Arguably, towards the end of the process, most of the higher degree nodes have
already adopted, and the rate of spread is limited by the remaining lower degree nodes.
Adoption process with innovators: We extend our analysis to include "innovators", the
agents who adopt without being contacted by an adopter. In particular, suppose each non-adopter
adopts at an independent Poisson process with rate β(cid:48)
. To include an innovator in the set of
adopters, we modify our analysis in the following way.
In the exploration process, at iteration
j, with probability
β(cid:48)N(j)+βA(j)/k , a sleeping node wakes up and all of its k clones become active.
Note this is the probability of a non-adopter becoming an innovator before one of the adopters
makes a contact through one of its active half-edges. If this event does not occur (with probability
β(cid:48)N(j)+βA(j)/k ), steps (a) and (b) are performed as described. All of the analysis for the evolution
1−
N(j)
N(j)
β(cid:48)
β(cid:48)
16
Figure 3: Simulated evolution of the fraction of adopters for 5-regular, 4-6 and 3-7 random graphs.
Time is normalized such that at time 0 the fraction of adopters is 0.01 for all graphs.
of the exploration process and the coupling exploration and adoption process can be modified
accordingly.
SIR model on random graphs: As mentioned in the introduction, the adoption process
studied here is a special case of adoption processes used to describe the transmission of commu-
nicable diseases by individuals or the spread of computer viruses in a network, known as the SI
(Susceptible-Infected) model. We can use the same ideas to analyze a more general model called
SIR that works as follows. The process of infection is the same as that shown in the SI model. Each
infected node is removed (they can be interpreted as either dead or immune) at a certain rate. A
removed node cannot infect its neighbors. Suppose each infected node is removed at a independent
Poisson process with rate β(cid:48) < β. To extend our framework to this model, in the exploration model,
we need to keep track of the nodes that are awake (or, equivalently, are infected) but have been
removed as well.
References
Ajorlou, A., A. Jadbabaie, and A. Kakhbod (2014). Dynamic pricing in social networks: The word
of mouth effect. Working paper .
Alizamir, S., F. de V´ericourt, and P. Sun (2014). Efficient feed-in-tariff policies for renewable energy
technologies. Working paper .
Banerjee, S., A. Gopalan, A. K. Das, and S. Shakkottai (2014). Epidemic spreading with external
agents. IEEE Trans. Information Theory 60 (7), 4125–4138.
Bass, F. M. (1969, January). A new product growth for model consumer durables. Management
Science 15 (5), 215–227.
17
Bender, E. A. and E. R. Canfield (1978). The asymptotic number of labeled graphs with given
degree sequences. Journal of Combinatorial Theory, Series A 24 (3), 296 – 307.
Campbell, A. (2013). Word of mouth and percolation in social networks. American Economic
Review 103 (6), 2466–2498.
Candogan, O., K. Bimpikis, and A. Ozdaglar (2012). Optimal pricing in networks with externalities.
Operations Research 60 (4), 883–905.
Chen, H. and D. D. Yao (2001). Fundamentals of queueing networks : performance, asymptotics,
and optimization. Applications of mathematics. New York: Springer.
Cohen, M. C. and P. Harsha (2016). Designing price incentives in a network with social interactions.
Working paper .
Dembo, A. and A. Montanari (2010). Ising models on locally tree-like graphs. Annals of Applied
Probability 20 (2), 565–592.
Diaz-Rainey, I. and D. Tzavara (2012). Financing the decarbonized energy system through green
electricity tariffs: A diffusion model of an induced consumer environmental market. Technological
Forecasting & Social Change, 1693–1704.
Dover, Y., J. Goldenberg, and D. Shapira (2012). Network traces on penetration: Uncovering
degree distribution from adoption data. Marketing Science 31 (4), 689–712.
Draief, M., A. Ganeshand, and L. Massouli (2008, 04). Thresholds for virus spread on networks.
Ann. Appl. Probab. 18 (2), 359–378.
Durrett, R. (2006). Random Graph Dynamics (Cambridge Series in Statistical and Probabilistic
Mathematics). New York, NY, USA: Cambridge University Press.
Ganesh, A., L. Massouli, and D. Towsley (2005). The effect of network topology on the spread of
epidemics. In IEEE INFOCOM, pp. 1455–1466.
Gkantsidis, C., M. Mihail, and A. Saberi (2003). Throughput and congestion in power-law graphs.
In SIGMETRICS, pp. 148–159.
Ho, T., S. Savin, and C. Terwiesch (2002). Managing demand and sales dynamics in new product
diffusion under supply constraint. Management Science 48 (2), 187–206.
Ifrach, B., C. Maglaras, and M. Scarsini (2012). Monopoly pricing in the presence of social learning.
Working paper .
Jackson, M. O. (2008). Social and Economic Networks. Princeton, NJ, USA: Princeton University
Press.
Jackson, M. O. and B. W. Rogers (2007). Relating network structure to diffusion properties
through stochastic dominance. B. E. Journal of Theoretical Economics: Advances in Theoretical
Economics 7 (1), 1–13.
Kahale, N. (1992). On the second eigenvalue and linear expansion of regular graphs. In FOCS, pp.
296–303. IEEE Computer Society.
18
Kermack, W. O. and A. G. McKendrick (1927). A Contribution to the Mathematical Theory
of Epidemics. Proceedings of the Royal Society of London. Series A, Containing Papers of a
Mathematical and Physical Character 115 (772), 700–721.
Kumar, S. and J. M. Swaminathan (2003). Diffusion of innovations under supply constraints.
Operations Research 51 (6), 866–879.
Kurtz, T. (1970). Solutions of ordinary differential equations as limits of pure markov jump pro-
cesses. J. Appl. Probab. 7, 49–58.
Massoulie, L. and M. Draief (2010). Networks and epidemics.
Molloy, M. and B. Reed (1995). A critical point for random graphs with a given degree sequence.
Random Structures and Algorithms 6, 161–180.
Molloy, M. and B. Reed (1998). The size of the largest component of a random graph on a fixed
degree sequence. Combinatorics, Probability and Computing 7, 295–306.
Mosk-Aoyama, D. and D. Shah (2008). Fast distributed algorithms for computing separable func-
tions. IEEE Trans. Inform. Theory, 2997–3007.
Rogers, E. M. (2003, August). Diffusion of Innovations, 5th Edition (5th ed.). Free Press.
Shah, D. (2008). Gossip algorithms. Foundations and Trends in Networking 3 (1), 1–125.
Shakkottai, S. and R. Johari (2010, April). Demand-aware content distribution on the internet.
IEEE/ACM Trans. Netw. 18 (2), 476–489.
Shen, W., I. Duenyas, and R. Kapuscinski (2011). New product diffusion decisions under supply
constraints. Management Science 57 (10), 1802–1810.
Shen, W., I. Duenyas, and R. Kapuscinski (2014). Optimal pricing, production, and inventory for
new product diffusion under supply constraints. Manufacturing & Service Operations Manage-
ment, 28–45.
Whitt, W. (2002). Stochastic-Process Limits : An Introduction to Stochastic-Process Limits and
Their Application to Queues. Springer.
Wormald, N. (1995). Differential equations for random processes and random graphs. Annals of
Applied Probability 5, 1217–1235.
Wormald, N. (1999a). The differential equation method for random graph processes and greedy
algorithms. In Lectures on Approximation and Randomized Algorithms (eds. M. Karonski and
H.J. Proemel), pp. 73–155. PWN.
Wormald, N. C. (1999b). Models of random regular graphs.
In Surveys in combinatorics, pp.
239–298. Cambridge University Press.
19
APPENDIX
A Missing proofs of Theorem 2.1
Proof of Claim 2.3. The proof of this claim is mainly algebraic and is given for the sake of com-
pleteness.
E(cid:2)∆n(γn, αn)(cid:3) =
(cid:19)
(cid:35)
+ 1
n − i
dx + En
+ E(cid:48)
i
(cid:35)
1
1 − x
i=αn
i=αn
(cid:18)1
γn−1(cid:88)
(cid:90) γ
= n − 1
(cid:34)(cid:90) γ
βn
1
x
1 − γ
γn−1(cid:88)
1
λi
= n − 1
(cid:34)
βn
xdx. Further,(cid:80)γn−1
dx +
− log
(cid:82) γ
= 1
β
log
α
γ
α
α
where En and E(cid:48)
n,
n represent the error terms. We are left to show that E(cid:48)
1 − α
n → 0. Note that(cid:80)γn−1
1
1
i
1
i+1 gives an lower-bound for it. Now
gives an upper-bound for the integral
the difference between these two sums is Θ(1/n). Similarly we can show the error contribution of
(cid:3)
the second sum is also order Θ(1/n) which completes the proof.
Proof of Claim 2.4. In the following proof, to simplify the notation, we present ∆n(γn, αn) by ∆n.
By the Chernoff's bound, for any s ≥ 0:
P (∆n − E [∆n] ≥ ) ≤ e
−s(+E[∆n])E
(cid:105) .
es∆n
= e
i=αn
i=αn
(cid:104)
(cid:104)
α
(26)
Note that ∆n is sum of independent exponential random variables, thus we can compute E
follows:
es(∆n−E[∆n])(cid:105)
−sE
(cid:18)
γn−1(cid:89)
For any real number z, we have (1 + z) ≤ ez. Therefore,
(cid:105) ≤ e
(cid:80)γn−1
es∆n
i=αn
(cid:105)
(cid:104)
(cid:104)
i=αn
E
=
E
s
1 + s
λi − s
(cid:110)λαn, λγn−1
(cid:111)
, and define s
es∆n
∗ =
λ∗
2E[∆n]
1+
2E[∆n]
λi−s
. Because for any αn ≤ i ≤ γn − 1, λi ≥ λ∗
,
(cid:104)
(cid:105)
es∆n
as
(cid:19)
.
(cid:33)
.
Let λ∗
be min
it follows that:
∗
Setting s to be s
(cid:32)
1
λi − s∗ ≤ 1
λi
1 +
2E [∆n]
in the Chernoff's bound, we have:
P (∆n − E [∆n] ≥ ) ≤ e
∗
− s
2
20
Similarly, we can show that:
Define
P (−(∆n − E [∆n]) ≥ ) ≤ e
∗
− s
2 .
δ =
2
2E[∆n]
1 +
2E[∆n]
λ∗/n.
Note that λ∗/n is a constant bounded away from zero. More precisely,
(cid:41)
, (γn − 1)(n − γn + 1)
(cid:40)
αn − αn
n − 1
Thus the inequality (5) holds with the above δ.
λ∗/n = min
n(n − 1)
B Proof of Theorem 2.8
(27)
(cid:3)
.
Proof of part (a). To prove this part, we show that
Thus the statement follows by applying Chebyshev's inequality. Using (4), we have:
log log n
β and Var(Tn(C log n)) is bounded.
E[Tn(C log n)]
→ 1
E(cid:2)Tn(C log n)(cid:3) = 1
β
C log n(cid:88)
i=1
n − 1
i(n − i)
= 1
β log log n + o(log log n).
The steps of the above calculation are similar to the ones presented in (26), thus we remove
the details. Further, note that Tn(C log n) is the sum of independent exponential random variables,
thus:
C log n(cid:88)
i=1
= 1
β2
1
λ2
i
(cid:32) n − 1
i(n − i)
(cid:33)2 ≤ 1
β2
C log n(cid:88)
i=1
(cid:32) n − 1
i(n − i)
(cid:33)2 ≤ M,
∞(cid:88)
i=1
Var(Tn(C log n)) =
for some constant M. This completes the proof.
(cid:3)
E[Tn(C log n)]
→ k
β(k−2) and Var(Tn(C log n)) is
Proof of part (b). Similar to part (a), we show that
bounded. Following the proof sketch, we use the known fact that, w.h.p., a random k-regular graph
is locally tree like (for instance see Dembo and Montanari (2010)). For the sake of completeness,
in the following lemma, we state this using the terminology for the exploration process described
in Section 3.
Lemma B.1. For j = O(log n), w.h.p., the component of the configuration model revealed until j
iterations is a tree. 7
log log n
7Note that the result in the literature is stronger than this statement, and it asserts that even after forming the
whole graph, the subgraph formed by these nodes is a tree w.h.p.
21
Proof of Lemma B.1. For iteration j ≤ C log n in the exploration process, the number of active
clones satisfies A(j) ≤ kC log n. Thus the probability that there are no cycles in the multigraph
= 1 − o(1). This implies
(cid:3)
formed so far by the configuration model is at least
that w.h.p., the mutli-graph formed so far, is a tree.
1 − kC log n
k(n−C log n)
(cid:17)C log n
(cid:16)
Lemma B.1 implies that in this early adoption regime, at each step of the exploration process,
one sleeping node is awakened and using our coupling with the adoption process, this means one
extra node adopts Z. Also, at any time step j ≤ C log n, the number of active clones is given by
A(j) = k + j(k − 2). This gives
E(cid:2)Tn(C log n)(cid:3) = k
β
C log n(cid:88)
Var(Tn(C log n)) = k2
β2
1
i=1
k + i(k − 2)
(cid:32)
C log n(cid:88)
1
k + i(k − 2)
i=1
Similar to part (a), the variance of Tn(C log n) can be calculated as:
= 1
β
k
k − 2
log log n + o(log log n).
(cid:33)2 ≤ k2
β2
(cid:32)
∞(cid:88)
i=1
1
k + i(k − 2)
(cid:33)2 ≤ M,
for some constant M. Part (b) of Theorem 2.8 then follows by using the Chebyshev's inequality. (cid:3)
C Missing proofs of Section 3
Proof of Lemma 3.1. The proof is a simple modification of Wormald's original proof, where the
modification is mainly in how we choose the various asymptotic functions involved in the proof.
Let F(x, y) = ky
k−2x defined for 0 ≤ x ≤ k/2 − 0 and 0 ≤ y ≤ 1. Then
+ k
20
2ky
(k − 2x)2
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ∂F
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ∂F
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) =
k
k − 2x
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) +
∂y
∂x
+
≤ k
22
0
(cid:44) Φ.
So, F is Lipschitz with Lipschitz constant Φ. Also note that for any 0 < j < n, we have
F(j/n, N(j)/n) = f
(j/n) (defined in (18)). Let λ =
log n . We first show that:
(log n)2 and δ = 1
(cid:48)
n
Claim C.1.
P(N(j + λ) − N(j) − λF(j/n, N(j)/n) ≥ 4δλ) ≤ 2e
− δ2λ
2 .
(28)
Proof of Claim C.1. For each 0 ≤ l ≤ λ, we have
E[N(j + l + 1) − N(j + l)H(j + l)] = F((j + l)/n, N((j + l)/n)) ≤ F(j/n, N(j)/n) + Φλ/n.
Thus there exists a function ∆(n) = Φλ/n such that conditional on H(j), the sequence
Z(l) = N(j + l) − N(j) − lF(j/n, N(j)/n) − l∆(n)
for 0 ≤ l ≤ λ is a supermartingale w.r.t. the sigma fields generated by H(j), H(j + 1), . . . , H(j + λ).
Further Z(l), 0 ≤ l ≤ λ has bounded increment:
Z(l + 1) − Z(l) ≤ N(j + l + 1) − N(j + l) +
22
F(j/n, N(j)/n) + ∆(n) ≤ 3. Thus using concentration results for supermartingales from Wormald
(1999a) (Lemma 4.2), we have
P(N(j + λ) − N(j) − λF(j/n, N(j)/n) ≥ λ∆(n) + 3δλ) ≤ e
− δ2λ
2 .
(29)
The following two observations complete the proof: (i) λ∆(n) ≤ δλ (ii) A similar inequality can be
obtained for the lower tail of Z(λ).
(cid:3)
(cid:20)
Next, for i = 0, 1, ..., (k/2 − 0)n/λ, by induction we prove that:
Claim C.2. P(N(iλ) − f (iλ/n) ≥ i) ≤ ie
2 , where i = 5δλ
− δ2λ
(1+∆(n))i−1
∆(n)
(cid:21)
.
(cid:48)
We have
Proof of Claim C.2. The base case follows from Claim C.1 (inequality (28)), and the fact that
f (λ) − λ f
(0) ≤ δλ. Assuming that the claim holds for 1, 2, . . . , i, we now prove it for case i + 1.
N((i + 1)λ) − n f ((i + 1)λ/n) ≤ N(iλ) − n f (iλ/n) + N((i + 1)λ) − N(iλ) + n f (iλ/n) − n f ((i + 1)λ/n).
2 , we have N(iλ) − n f (iλ/n) ≤ i. Further, we
By induction hypothesis, with probability 1 − ie
− δ2λ
N((i + 1)λ) − N(iλ) + n f (iλ/n) − n f ((i + 1)λ/n) ≤ N((i + 1)λ) − N(iλ) − λF(iλ/n, N(iλ)/n)
write:
From (28), we have with probability 1− e
+ λF(iλ/n, N(iλ)/n) + n f (iλ/n) − n f ((i + 1)λ/n).
2 , N((i + 1)λ)− N(iλ)− λF(iλ/n, N(iλ)/n) ≤ 4δλ. Also,
− δ2λ
n f (iλ/n) − n f ((i + 1)λ/n) = −λ f
(cid:48)
(iλ/n) + O(λ2/n)
= −λF(iλ/n, f (iλ/n)) + O(λ2/n).
Hence,
λF(iλ/n, N(iλ)/n) + n f (iλ/n) − n f ((i + 1)λ/n) ≤ λF(iλ/n, N(iλ)/n) − λF(iλ/n, f (iλ/n)) + O(λ2/n)
≤ ∆(n)i + O(λ2/n).
where in the inequality holds because F(x, y) is Lipschitz. Note that λ2/n = o(δλ). Putting all these
together, we have with probability at least 1 − (i + 1)e
− δ2λ
2 ,
N((i + 1)λ) − n f ((i + 1)λ/n) ≤ (1 + ∆(n))i + 5δλ = i+1.
This complete the induction and the proof.
(cid:3)
To complete the proof of the Lemma, first note that i = O(n/λ), so i = O(nδ) = o(n). Now for
∗λ is the nearest integer to j among all λi's, i = 0, 1, . . . , (k/2−0)n/w.
such that i
∗
any general j, find i
We have:
N(j) − n f (j/n) ≤ N(j) − N(i
∗λ) + N(i
∗λ) − n f (i
∗λ/n) + n f (i
= N(i
∗λ) − n f (i
∗λ/n) + O(λ).
Noting that n
λe
2 = o(n
− δ2λ
−3) completes the proof.
∗λ/n) − f (j/n)
(cid:3)
23
Proof of Lemma 3.3. First note that for any 0 ≤ x ≤ k−0
the mean value theorem we have: n f (jα + 2
c
N(njα + 2
N(Tα) = n(1− α), and N(·) is decreasing in the number if iterations. Thus, Jα ≤ njα + 2
c
a similar argument, we can prove Jα ≥ njα − 2
δ(n)/n) ≤ n f (jα) + 2δ(n). From Lemma 3.1, we have
δ(n)/n) + δ(n) ≤ n f (tα) − δ(n) = n(1 − α) − δ(n). By definition,
δ(n). Using
δ(n) and the proof is complete.
δ(n)) ≤ n f (jα + 2
2 , we have f
(cid:48)
(x) ≤ − f
2
c
c
c
(cid:48)(cid:16) k−0
(cid:17) = −c. Using
(cid:3)
Proof of Lemma 3.7. Let E be the event that the configuration model is not connected and let Es
be the event that there exists a subgraph H of size s which is isolated in the configuration model.
For any positive even integer m, the number of possible pairings of m clones is
(m/2)!2(m/2) . Using
this fact we can bound the probability of Es by simply counting the number of pairings as follows.
m!
(cid:33)(cid:0)nk/2
(cid:1)
(cid:0)nk
(cid:1) .
sk/2
(cid:32)n
s
sk
P(Es) ≤
The above bound is asymptotically largest when s is a constant with respect to n. See Wormald
(1999b) for similar proof techniques. In this case for any 1 > 0, we can obtain:
P(E) = O(n
−s(k/2−1)+1).
(30)
Since k ≥ 3, when G is simple, it cannot have an isolated component of size less than 4 nodes. The
(cid:3)
worst case in (30) is when k = 3 and s = 4 which gives the required bound.
24
|
1804.07354 | 1 | 1804 | 2018-04-19T19:56:38 | The Aftermath of Disbanding an Online Hateful Community | [
"cs.SI"
] | Harassing and hateful speech in online spaces has become a common problem for platform maintainers and their users. The toxicity created by such content can discourage user participation and engagement. Therefore, it is crucial for and a common goal of platform managers to diminish hateful and harmful content. Over the last year, Reddit, a major online platform, enacted a policy of banning sub-communities (subreddits) that they deem harassing, with the goal of diminishing such activities. We studied the effects of banning the largest hateful subreddit (r/fatpeoplehate or FPH) on the users and other subreddits that were associated with it. We found that, while a number of outcomes were possible --- in this case the subreddit ban led to a sustained reduced interaction of its members (FPH users) with the Reddit platform. We also found that the many counter-actions taken by FPH users were short-lived and promptly neutralized by both Reddit administrators and the admins of individual subreddits. Our findings show that forum-banning can be an effective means by which to diminish objectionable content. Moreover, our detailed analysis of the post-banning behavior of FPH users highlights a number of the behavioral patterns that banning can create. | cs.SI | cs | The Aftermath of Disbanding an Online Hateful Community
Haji Mohammad Saleem and Derek Ruths
[email protected] and [email protected]
School of Computer Science
McGill University
Montreal, Canada
8
1
0
2
r
p
A
9
1
]
I
S
.
s
c
[
1
v
4
5
3
7
0
.
4
0
8
1
:
v
i
X
r
a
Abstract
Harassing and hateful speech in online spaces has become a
common problem for platform maintainers and their users.
The toxicity created by such content can discourage user par-
ticipation and engagement. Therefore, it is crucial for and a
common goal of platform managers to diminish hateful and
harmful content. Over the last year, Reddit, a major online
platform, enacted a policy of banning sub-communities (sub-
reddits) that they deem harassing, with the goal of dimin-
ishing such activities. We studied the effects of banning the
largest hateful subreddit (r/fatpeoplehate or FPH) on the users
and other subreddits that were associated with it. We found
that, while a number of outcomes were possible - in this
case the subreddit ban led to a sustained reduced interaction
of its members (FPH users) with the Reddit platform. We also
found that the many counter-actions taken by FPH users were
short-lived and promptly neutralized by both Reddit admin-
istrators and the admins of individual subreddits. Our find-
ings show that forum-banning can be an effective means by
which to diminish objectionable content. Moreover, our de-
tailed analysis of the post-banning behavior of FPH users
highlights a number of the behavioral patterns that banning
can create.
Introduction
Hate speech, generally defined as disparaging speech against
minorities based on their race, ethnicity, sexual orientation,
gender and religion (Mendel 2012), has become endemic
to online platforms with user-generated content(Bartlett et
al. 2014). Comprehensively, hate speech is an "expression
of hatred against a person based on their group identity"
(Saleem et al. 2016). Online hate speech can take sev-
eral forms: for example, a microblog that verbally abuses
a black actor based on her race(Woolf 2016), comments
under news articles(Hughey and Daniels 2013) or in-game
chat rooms of major MMOGs (Massively Multiplayer On-
line Games)(Powers 2003).
From the perspective of platform managers, hateful
speech creates negative user experiences, which can im-
pact the civility of their platform(Santana 2014)(Newell et
al. 2016). At the user level, the effects of online hateful
speech can extend far beyond the virtual world, causing
serious psychological distress(Boeckmann 2002)(Leets and
Giles 1997). In extreme cases, hate speech can lead to phys-
ical harm through violence incited against the targets of the
hate(Museum 2010). As a result, diminishing hateful speech
in online social spaces has become a major objective of both
platform maintainers and many of the users who use them.
To combat such objectionable content, platforms employ
several strategies ranging from community-based flagging to
platform-level banning (Grimmelmann 2015)(Chancellor et
al. 2016). Despite the widespread use of such techniques, lit-
tle is known about the implications of these policies: in other
words, even though platforms routinely deploy countermea-
sures against hate speech and their producers, very little is
known about the direct and indirect effects of such actions
- on the hateful content and on the communities affected by
it.
In this study, we aim to understand one common practice
among online forums: community banning. We specifically
consider this in the context of Reddit and its policy, enacted
in 2015, of banning "subreddits that allow their communities
to use the subreddit as a platform to harass individuals when
moderators don't take action"(u/reddit 2015).
Reddit is a social media content aggregation and discus-
sion website, which works on the model of multiple sub-
communities called "subreddits". Subreddits cover a wide
variety of topics, and users can subscribe to the subreddits
that interest them or create their own subreddits to person-
alize their Reddit experience. Up until the summer of 2015,
Reddit allowed users to create subreddits dedicated to hate-
ful themes. r/fatpeoplehate (FPH), for example, was one
such subreddit that focused on body shaming.
The FPH subreddit was highly popular, with approxi-
mately 150,000 subscribers at its peak (Figure 1). In 2015,
Reddit introduced a new policy to ban harassing subreddits.
r/fatpeopelhate was the most prominent subreddit
banned under this policy. This study investigates the after-
effects of banning this large self-identifying hateful subred-
dit on the users that participated in it (FPH users) and other
subreddits that are related to it. Our analysis is restricted to
FPH since it was the only example of a large-scale active
subreddit disbanded by the policy update.
A priori banning a subreddit hardly guarantees that the
kind of hateful content produced by the community will go
away. Several outcomes are possible. One outcome involves
the community simply creating a new subreddit under a dif-
ferent name. Another outcome can be that hateful speakers
post their content in other subreddits, making the hateful
content much harder to expunge and possibly directly ex-
posing target users to the hateful content.
Our work in this study produced strong evidence that all
of these negative outcomes happened - but were very short-
lived. Ultimately, we found that the banning of the FPH
subreddit reduced the engagement of active FPH contrib-
utors with the Reddit platform and dramatically decreased
the volume of their overall comments. Not only did the FPH
users comment less after the ban, a larger portion of the users
stopped their commenting activity entirely. Furthermore, the
initial response of the banned users (creating new subred-
dits and posting their hateful content to other platforms) was
quickly neutralized (within 1-2 days) by the combined ac-
tions of Reddit administrators and the moderators of specific
subreddits. The fact that FPH users were denied the oppor-
tunity to create a new community and were not welcomed,
en mass, into existing communities, can explain their disen-
gagement with the platform.
It is not possible to definitively conclude that banning
of the subreddit reduced the presence of body-shaming re-
lated hateful content on Reddit. However, our overall find-
ings strongly suggest that banning of an objectionable com-
munity significantly decreased the future participation of the
active members of the community with the Reddit platform.
Notably, achieving this end involves swift, independent, and
decisive action on the part of both administrators and mod-
erators.
Background
Hate speech
At the outset, establishing precisely what constitutes hate
speech is an unsolved and important problem. In order to ad-
dress often-contested definitions of hate speech and remove
ambiguity, Saleem et al.(Saleem et al. 2016) introduced
the term "hateful speech" which they define as "speech
which contains an expression of hatred on the part of the
speaker/author, against a person or people, based on their
group identity". This definition removes the ambiguity in the
term "hate" itself, which might refer to the speaker/author's
hatred, or his/her desire to make the targets of the speech
feel hated, or their desire to make others hate the target(s),
or the apparent capacity of their speech to increase hatred.
Therefore, in this article we use the term "hate speech" in a
general sense and the term "hateful speech" specifically as
defined above. Furthermore, body-shaming speech adheres
to the definition of hateful speech as it constitutes disparag-
ing a group of people based on their appearance.
The harmful effects of body-shaming speech
Like other forms of hate speech, body shaming can have
severe adverse effects on its victims. In adolescents, body-
shaming was associated with lower body satisfaction, lower
self-esteem, higher depressive symptoms, and thinking
about and attempting suicide, even after controlling for ac-
tual body weight(Eisenberg, Neumark-Sztainer, and Story
2003). Furthermore, it was found that over-weight women
significantly increase their calorie intake on exposure to
weight-related stigma(Schvey, Puhl, and Brownell 2011),
causing stress, reducing self-control and ultimately resulting
in further weight gain(Major et al. 2014)(Tomiyama 2014).
Therefore, body-shaming can lead to significant negative ef-
fect on the physical and mental well-being of plus-sized in-
dividuals.
Banning of /r/FatPeopleHate
/r/FatPeopleHate (FPH) was a subreddit created to
mock and denigrate plus-sized people. The users would of-
ten post pictures of plus-sized individuals and ridicule them
along with the usage of slurs, such as "hamplanet", "land-
whale", "beetus". One of the rules for contributing to the
subreddit included having "absolutely no fat sympathy".
While the community admitted that it may seem that "all we
do is aimlessly bully and ridicule people", they maintained
that their actions have a deeper meaning. They go on to state
that obesity is a choice that indicates selfishness, lack of dis-
cipline and causes disproportionate burdens on health care
systems.
The subreddit grew to become very popular and had al-
most 150,000 subscribers at its peak. A screen shot of the
subreddit is provided in Figure 1, obtained through Way-
Back Machine1. On June 10, 2015, Reddit admins an-
nounced that they were going to remove harassing subred-
dits (u/reddit 2015). They clarified that "we will ban subred-
dits that allow their communities to use the subreddit as a
platform to harass individuals when moderators don't take
action. We're banning behavior, not ideas.". This announce-
ment marked the implementation of new community policy
that allowed Reddit to ban or quarantine objectionable sub-
reddits. While some people supported the decision, others
saw it as against free speech.
In this paper, we present the reaction of the users affected
by this ban and try to gauge the success of Reddit's com-
munity policy in controlling FPH-specific hateful speech on
their platform.
Data
Reddit user Jason Baumgartner, under the Reddit user name
Stuck In the Matrix2, has made available large data
dumps that contain a majority of the content (posts and com-
ments) generated on Reddit3. The data dumps, collected us-
ing the Reddit API, are organized by month and year dating
back to 2006. This resource is regularly updated with new
monthly content. For our research, we focused on June 10,
2015 as the pivot point since it was on this day that Red-
dit announced the banning of harassing subreddits, the most
prominent of which was /r/fatpeoplehate. Since we
were interested in understanding the effects of banning such
1https://web.archive.org/web/
20150607141552/http://www.reddit.com/r/
fatpeoplehate/
2https://www.reddit.com/user/Stuck_In_the_
Matrix/
3http://files.pushshift.io/reddit/
Figure 1: A screen shot of /r/fatpeoplehate obtained through WayBack Machine dated June 7, 2015. It shows how
users would link images of plus-sized individuals accompanied with mocking titles. It also shows the number of subscribers at
that moment: 149,504.
a large community, we studied the activity of users primar-
ily associated with the FPH subreddit, over a four-month pe-
riod, two months before and two months after it was banned.
Thus, we restricted our analysis to the time period between
the days of April 10, 2015 and August 10, 2015. An im-
portant note, the data dumps miss about 0.03% of the pub-
lic comments due to data crawling errors. Our analysis of
macro-level trends should remain unaffected by the data-
loss.
FPH users. For this time period, we collected all users
that commented in /r/fatpeoplehate. This provided
us with a list of 42,354 users. From this list we removed
common bot accounts, such as /u/AutoModerator,
/u/autotldr, /u/Mentioned Videos, etc. When
users delete their accounts or the moderators remove com-
ments, the authors of such comments would be displayed as
[deleted]. We removed these from our list as well, since
there is no way to link such comments to their original au-
thors. In addition, this initial sample presumably included
some (small) population of users who do not condone the
FPH community's views but still comment in the subreddit
for the sake of discussion or argument. In order to remove
such accounts, we only considered users who had FPH as
their most commented subreddit. This left us with 13,916
users, whom we refer to as "FPH users" in this paper. For
each FPH user, we collected all the comments associated
with them in the period of interest and call it the "FPH sam-
ple".
Random users. We sought to compare the activity of FPH
users with an equal-sized systematic random sample of Red-
dit users. To this end, we curated a list of all the Reddit users
that posted a comment during the period of interest. After re-
moving the major bot accounts and FPH participants, we had
a list of 4,677,759 users. To obtain an equally sized subset
Sample
FPH
Random
loseit
fatlogic
fatpeoplestories
# of users
13,916
13,916
-
-
-
# of comments
878,276
585,632
159,250
266,456
45,484
Table 1: Details on each of our data sample. Note that the
three communities we investigate also differ in size, which
can induce different behaviours.
we perform systematic sampling. To do so, we first sort our
list of users by the number of comments they made during
this period. We selected an initial user randomly from the
list and the remaining users at regular interval from the last
one, to obtain a sample of 13,916 users ("random users").
Again, for each random user, we collected all the associated
comments in the relevant time period and call it the "ran-
dom sample". The details on the two samples are provided
in Table 1.
Subreddit-specific comments. We were also interested in
studying the effects of the ban on other communities, espe-
cially the ones with themes related to the banned commu-
nity. Accordingly, we collected all the comments generated
in:
r/loseit: a subreddit that supports people who want to
lose weight.
r/fatlogic: a subreddit that presents itself as against
the "fat way" of thinking and not being a hate sub. They
add "r/fatpeoplehate is the place for that."
r/fatpeoplestories: a subreddit to share the stories
about fat people. They clarify that "We are NOT FatPeo-
pleHate".
Further details are provided in Table 1.
Study Design
At a high-level, we sought to characterize the effects of ban-
ning a prominent community on Reddit in two ways:
1. at the user level, we wish to study the effects on the active
members of the banned community, and
2. at the community level, we want to study if the ban cre-
ated any counter effects on other communities, specifi-
cally those that operate in a similar sphere as the banned
community.
Banning and users. We analyzed multiple aspects of FPH
user population behavior, contrasting it with behavior exhib-
ited by the random user group:
1. the difference in overall commenting behaviour between
the two samples over our period of analysis;
2. the difference in the commenting behaviour of the two
user groups before and after the ban;
3. the retention of users by the platform after the banning of
the subreddit;
4. the effect on bad user behaviour in the form of downvoted
content;
5. the change in user exploration patterns of new subreddits;
and
6. the search for a an alternative subreddit for the disbanded
community.
to the topic of
Banning and other communities. We also studied the
the ban on other communities that
direct effects of
are relevant
the banned subreddit.
Specifically, we studied r/loseit, r/fatlogic and
r/fatpeoplestories. For each of these subreddits, we
studied the downvoted comment volume, the deleted com-
ment volume, and the overall comment volume during our
four-month period of interest. As will be discussed later,
these metrics were chosen as proxies for the presence of
FPH-specific negative content in other subreddits before and
after the ban.
Results
The overall commenting behaviour of the FPH sample
is significantly different from that of the random sam-
ple. Figure 2 presents the difference in overall comment-
ing behaviour between the two samples during the period of
analysis. The two samples follow each other very closely,
which is backed by the Pearson's correlation coefficient of
0.97. Comparing the two distributions by the Kolmogorov-
Smirnov goodness-of-fit test returns a p-value of ¡0.0001.
This indicates that the null hypothesis that the two indepen-
dent samples are drawn from the same continuous distribu-
tion can be rejected, and that there is a significant difference
in the overall behaviour of users in our two samples.
The comment activity of the FPH users declined after
the ban, when compared to the random users. Figure 3
presents the effect of the community ban on the two samples
individually through scatter plots and their respective regres-
sion lines. Figure 3c presents the regression lines together to
emphasize the difference in the proportion of comment ac-
tivity before and after the ban between the two user groups.
From this figure we can infer that the FPH users commented
more before the ban, than after, when compared to the ran-
dom users. This shows that the ban caused a decrease in the
Reddit interaction of FPH users.
To check the significance of this claim, we compare the
difference in activity of the two samples. The distribution
of the difference in depicted in Figure 4. Since the distribu-
tion is normal, we can perform a paired t-test. For the ran-
dom sample, the t-test returns a p-value of 0.7, and we fail
to reject the null hypothesis that the two samples (pre-ban
and post-ban comment activity) are similar. However, for the
FPH sample, the paired t-test returns a p-value of 8.7e-197,
suggesting that we can reject the null hypothesis and that
there is a significant difference in the comment activity be-
fore and after the ban for FPH users.
A higher proportion of FPH users completely stopped
comment engagement in the post-ban period. Figure 5
shows the overall trend of Reddit comment activity in the
two samples after the ban. We can clearly observe that al-
most 1.75 times more FPH users became inactive after the
banning of the subreddit, when compared to the random
sample. Therefore, banning of the subreddit led to higher
than average number of accounts with no direct comment
engagement.
To delve deeper into this result, we can study the user-
engagement of the FPH sample in their subreddit. In Fig-
ure 6, we present the distribution of overall engagement
in r/fatpeoplehate by the FPH sample. It is the dis-
tribution of users with x% of their overall comments hav-
Figure 2: Z-normalized comment activity of the two sam-
ples. FPH and random users are ranked based on their total
comment activity. Then the Z-normalized comment activity
is plotted at each rank with FPH users indicated in blue and
random users in orange. This figure contains the first 12,000
users for a clearer representation.
(a)
(b)
(c)
Figure 3: The comment activity of FPH and random users before and after the ban. Scatter plots of pre-ban vs post-ban
comment activity of the two user groups with a linear model regression line. A 45 degree regression line indicates equal activity
before and after the ban.
Figure 4: Distributions of differences in user comment ac-
tivity before and after the ban. Notice the normal-shape of
the distribution. The yaxis has been limited to 5,000 for clear
depiction of smaller values.
ing been generated in r/fatpeoplehate. From the cu-
mulative distribution, we can assert that more than half
the user base made at least half of their comments in
r/fatpeoplehate. This shows that our sample of FPH
users were highly engaged in r/fatpeoplehate before
the ban. Consequently, the ban led to a negative feedback
towards this engagement. Hence, we see a steeper decline
in the FPH user group, with more FPH users showing no
comment engagement than random users.
This effect is also presented in Figure 3b. Many FPH users
have high pre-ban comment activity and almost null post-
ban activity. The scattered data points at the bottom of the
Figure 5: Percentage of total comment activity after the
ban. FPH and random users are ranked based on their total
comment activity after the ban. At each rank the percentage
of post-ban comment activity account out of the total activ-
ity is depicted. FPH users are indicated in blue and random
users in orange.
y-axis and along the length of the x-axis are reflective of the
portion of high-activity FPH users who stopped commenting
after the ban. Notice a lack of similar pattern of data points
in Figure 3a.
A smaller portion of FPH users exhibited negative user
behaviour. Before we present these results, let us preface
this by understanding negative user behaviour in context of
FatPeopleHate. In this subreddit, users indulged in mocking
plus-sized people. While malicious, this behaviour was ap-
Figure 7 depicts a histogram of downvoted user activity
by FPH users, before and after the ban. It represents that y%
of the users had x% of their comments downvoted by others.
We can make two meaningful observations from this plot:
1. For a vast majority of the FPH users, only a small portion
of their comments are downvoted.
2. After the ban, the portion of users with less than 5% of
downvoted comments further increases.
Assuming that had the FPH users exhibited similar be-
haviour outside of the community, their comments would
have been downvoted, the first observation suggests that ma-
jority of the FPH users indulged in fat-shaming behaviour,
largely within the FPH subreddit. Therefore, we can assert
that the r/fatpeoplehate was rather self-contained.
The second observation may stem from the fact that a de-
crease in user comment activity after the ban would also
reduce the number of downvoted comments and, therefore,
increase the portion of users with low downvoted comment
percentage.
Since downvoted comments do not directly suggest ha-
rassing / hateful speech, we manually labelled 100 down-
voted FPH user comments from before and after the ban.
100 FPH users were randomly selected for this purpose.
We found that while 13 of the 100 comments exhibited
FatPeopleHate-like behaviour before the ban, the number
rose to 25 after the ban. It should be noted that both
samples contained comments from subreddits other than
r/fatpeoplehate and were manually labelled by an ex-
pert.
Therefore, while the overall negative behaviour declined,
the hateful behaviour of FPH users was spilling more in
other subreddits after the ban.
Reddit users explored other subreddits more post-ban,
compared to the random sample. As we have dis-
cussed users in the FPH sample were highly engaged
in r/fatpeoplehate. This high level of engagement
brings with it a high level of association with the subred-
dit. Banning of the subreddit breaks this association, which
can cause users to look for other venues to continue being
engaged with the theme of the subreddit. It can also cause
users to completely disengage if the subreddit was one of
the primary reasons for their use of the platform or continue
the engagement with the rest of the platform as before, if
they are still interested in rest of the content.
We wanted to study if the ban on their primary subred-
dit affected multi-subreddit participation of FPH users. Fig-
ure 8 presents how many subreddits users participated in,
before and after banning of r/fatpeoplehate, for both
samples. The general trends in the form of linear regression
lines are presented together in Figure 8c. The behaviour for
the two samples is quite similar. Therefore, the banning of
r/fatpeoplehate did not produce a major difference in
how many subreddits FPH users participated in.
While the FPH users continued to participate in an aver-
age number of subreddits, we investigated if they were ex-
ploring Reddit by participating in subreddits they were not
participating in, before the ban, or were they less likely to
participate in newer subreddits due to the loss of a subred-
Figure 6: Distribution of user engagement in FPH. Both
individual and cumulative distributions are provided.
preciated and promoted within the subreddit. However, same
behaviour would be considered negative outside of the sub-
reddit.
Reddit introduced the banning of the subreddits, on the
grounds of user harassment, to control such negative be-
haviour. While we do not have a measure for gauging hate
speech across the entire platform, we can however, study the
users that engaged in the harassing subreddit and observe if
they continued their actions in other subreddits.
For this experiment, we use a Reddit feature called 'down-
vote'. Reddit is community-centric and the content gen-
erated in the community is monitored by the community
as well. Positive user-behaviour is upvoted by the mem-
bers while negative user behaviour is downvoted. Unfortu-
nately, the downvotes are not reserved solely for harassing
behaviour, but can also contain irrelevant or wrong content.
Because it is difficult to separate these sub-categories, we in-
evitably study the overall negative behaviour by FPH users.
Figure 7: Distribution of proportion of downvoted com-
ments in the FPH sample. It represents that y% of the users
had x% of their comments downvoted by others.
(a)
(b)
(c)
Figure 8: User subreddit participation. The number of subreddits that users commented in before and after the ban. A liner
fit is also generated. A 45 degree line indicates equal number of subreddits before and after the ban.
dit they strongly associated with. In Figure 9, we observe
that 80% of FPH users were now participating in at least
50% new subreddits after the ban, as compared to 40% for
the random sample. Further more, the FPH sample had a
larger portion of users with high subreddit exploration than
the random sample. Therefore, FPH users were participating
in more new subreddits after the ban.
Pre-ban
fatpeoplehate
WTF
AdviceAnimals
fatlogic
TalesofFatHate
TumblrInAction
pcmasterrace
BlackPeopleTwitter
trashy
trees
ImGoingToHellForThis
cringepics
4chan
fatpeoplestories
punchablefaces
thebutton
FitshionVSFatshion
atheism
AdiposeAmigos
relationships
Post-ban
AdviceAnimals
WTF
fatlogic
TumblrInAction
pcmasterrace
BlackPeopleTwitter
trashy
punchablefaces
trees
technology
ImGoingToHellForThis
cringepics
KotakuInAction
relationships
fatpeoplestories
4chan
politics
conspiracy
SubredditDrama
Tinder
Figure 9: Cumulative new subreddit exploration. The plot
shows the percentage of users with atmost x% of new sub-
reddits after the ban.
FPH sample continued to be interested in the subred-
dits it was previously active in. In Table 2, we present the
subreddits that were popular amongst the users of FPH user
sample. From the two lists, we can ascertain that FPH users
were still highly interested in the subreddits they used to fre-
quent before. So, even through they were exploring new sub-
reddits, the group as a whole was still actively participating
in the subreddits they used to frequent before the ban. How-
ever, it is important to adress the fact that these subreddits
are popular across Reddit and therefore remain popular after
Table 2: Popular subreddits amongst the FPH users be-
fore and after the ban. The subreddits that are shared by
the two lists are in bold font.
the ban as well.
FPH users tried to actively create alternative subred-
dits for their banned community. The FatPeopleHate
community did not readily accept the banning of their
subreddit. They actively tried to circumvent the banning
by creating new subreddits to act as an alternative to
r/fatpeoplehate. We were able to find 99 such subred-
dits created in the wake of the ban. Due to limited space we
can only provide a few examples: r/FatpeoplehateX,
r/CandidDietPolice, r/ObesePeopleDislike,
etc. Reddit admins were able to control this surge and
banned a majority of these alternatives as well. The ones
that were not banned did not get much traffic, most likely
due to not being known to the community. Therefore, while
FatePeopleHate community reacted by creating a multitude
of alternatives, Reddit administration was comprehensive in
their policy and banned a majority of them. It is important
to note that it is likely that other alternatives were also cre-
ated and are not present in the list. In case it did happen, the
created subreddit is not common knowledge.
Effect on weight-related communities
From the list of subreddits popular with FPH users,
we notice r/fatlogic and r/fatpeoplestories
to have themes similar to r/fatpeoplehate. While
both subreddits make it clear that they are not associated
with r/fatpeoplehate, both of them have content that
mocks plus-sized individuals.
For each subreddit, we study the volume of downvoted
comments, deleted/removed comments and all comments,
made in the respective subreddits during the period of anal-
ysis.
For r/fatlogic (Figure 10), we notice zero activity
following the ban of r/fatpeoplehate. On further in-
vestigation, we found that moderators of the subreddit made
it private (u/maybesaydie 2015). In a post made by the mod-
erators, they explain how in wake of the banning, the subred-
dit was flooded with FatPeopleHate. Being overwhelmed by
the traffic, and not wanting to be banned if mistakenly per-
ceived as the new home for FatPeopleHate, the mods tem-
porarily made the subreddit inaccessible. An excerpt from
the post is provided below:
surged
post-ban,
FPH users
"And then, on the morning of June 10, 2015,
/r/fatpeoplehate was banned by reddit, We were given
no warning and we immediately were overcome with
posts from indignant fph subscribers, posts worrying if
we were next and it became way too much work for a
our small mod team to handle so we went private for a
few days. "
Therefore,
into
r/fatlogic, who were able to check this migration
by using their moderator privileges to private the subreddit.
r/fatpeoplestories (Figure 11), however, kept
their subreddit public. Although, we do witness a spike in
the total number of comments posted on the subreddit, fol-
lowing the ban, it is short-lived and normal traffic patterns
resume soon after. We see a spike in both the number of
downvoted comments and the number of deleted comments.
We can assert that the community actively checked the surge
in traffic by downvoting more than usual. Similarly, moder-
ators also actively kept the migration in check by deleting
comments that went against the subreddit.
Finally, we also study a subreddit, which while being
about weight, is on the other end of the spectrum as FPH.
r/loseit is a supportive subreddit for users who want
to lose weight. In Figure 12 we observe that a higher than
normal number of comments were posted on the subreddit
following the FPH ban. However, since the demographic of
the community is plus-sized people, these comments also in-
clude the discussion on the banning of a subreddit that was
abusive to them. Nonetheless, we also notice that a higher
than average number of comments were deleted and that
there is a major spike in the volume of downvoted com-
ments. Therefore, we can say that r/loseit did face in-
creased negative user behaviour following the ban of Fat-
PeopleHate. Yet, in this case too, the community and the
moderators were actively checking for such behaviour and
soon after, normal characteristics resumed.
Discussion
In this project, we studied the after-effects of banning of the
Reddit community r/FatPeopleHate on (1) its active mem-
bers and (2) other relevant subreddits. We discovered that
the banning had an adverse effect on the members of the
FPH community. Not only did we observe a significant de-
crease in the user comment activity from FPH users after
the ban, we also found that a larger portion of the users
had completely ceased commenting on Reddit in any way.
It is important to note that while Reddit was able to sus-
tain this disengagement, it is not necessarily a positive out-
come in every scenario. For new platforms or niche plat-
forms with limited user base, user disengagement, if in large
enough numbers, can lead to the demise of the platform.
While we cannot directly state whether the overall FPH-
related hate speech decreased after the ban, we can say that
the members of the FPH community were less active on
Reddit following the ban The FPH community did try to
actively counteract the ban by creating alternative subred-
dits for their disbanded community. However, Reddit ad-
ministration was persistent and banned many these subred-
dits offshoots. Even though some of these alternatives man-
aged to escape the ban, they failed to grow. Therefore, FPH
users were unable to recreate their confined space of FPH-
replated activities. Furthermore, we observed that apart from
continued interest in major subreddits, in the days follow-
ing the ban, FPH users started visiting r/fatlogic. Pre-
sumably this happened because, among active subreddits
it is most closely related to the theme of FatPeopleHate.
However, the moderators of fatlogic were not keen on this
surge and made the subreddit private. Other relevant sub-
reddits, namely r/fatpeopelstories and r/loseit
also witnessed a spike in former FPH user activity after the
ban was enacted. This spike was accompanied with spikes in
the number of comments that were downvoted by the com-
munity and the number of comments that were deleted, in
part, by moderators. In short, FPH users, unable to recre-
ate their community, were also unable to co-opt established
communities. Their surge in such communities was miti-
gated by a combined action by other users and moderators.
For the users that were still engaged, fewer of their post-
ban comments were downvoted by other members of the
platform. However, a higher portion of the downvoted com-
ments contained FPH-related content. In other words, while
fewer comments by the FPH members were getting down-
voted, more of these comments contained hateful speech.
Overall, our findings strongly suggest that banning a com-
munity to counter generation of hateful content can succeed
in situations where such content is mostly confined within
(a)
(b)
(c)
Figure 10: Analysis of fatlogic. There is a dip in volume right after the ban.
(a)
(b)
(c)
Figure 11: Analysis of fatpeoplestories. The volume parameters resume normal values after the surge.
(a)
(b)
(c)
Figure 12: Analysis of loseit. There is a higher than usual count of downvoted and deleted comments right after the ban.
that community and other communities are appropriately
empowered with means to curate their content and member-
ship. Of course, the story might be quite different for harass-
ing communities whose negative behavior has already infil-
trated other communities. The latter can prove more difficult
to curb at the administrative level but might be restrained at
the user/moderator level through regular action, in view to
the fact that other subreddits demonstrated a remarkable re-
sistance to the incursion of FPH content. This suggests a
banning strategy needs to be accompanied by strong mod-
eration of other communities and negative reinforcement of
hateful-content by other users for it to be a success.
Conclusion
In this article, we studied the outcome of a common practice
among online forums of banning unsavory activities. While
it is more common for group moderators to ban unwanted
users, we specifically studied the banning on a larger scale,
that of an entire sub-community. Banning of a large and pop-
ular sub-group is not a risk-free endeavor. A priori banning
hardly guarantees that the content produced by the commu-
nity will go away. Nevertheless, in this case, we found that
Reddit employed a strategy in combination with a suite of
user and administrator moderation and curation tools that
made the banning effort successful. We observed that ban-
ning discouraged users from interacting with the platform,
especially when accompanied with appropriate measures are
to persist negative reinforcement. Presumably, banning of a
community removes an association that users had with the
platform, leading to future dis-engagement. We believe that
this suggests a concrete approach which could help other
platform maintainers build and manage civil and construc-
tive online spaces.
In this case, Reddit was successful in banning FatPeople-
Hate. However, there are factors that other platform main-
tainers should be mindful of before enacting similar poli-
cies. Notably, the resulting user disengagement can prove
to be critical to the platform itself. Furthermore, depend-
ing on the scale of the platform, it is going to be harder for
the platform maintainers to control the creation of offspring
sub-communities. For example, Facebook deals with a much
larger user base and banning a popular page would result in
the creation of many more alternative pages. It would also
be harder to control groups that have off-platform / real-life
connections since they can persist. Nevertheless, banning the
community can provide significant control to platform main-
tainers.
References
[Bartlett et al. 2014] Bartlett, J.; Reffin, J.; Rumball, N.; and
Williamson, S. 2014. Anti-social media. Demos 1–51.
[Boeckmann 2002] Boeckmann, Robert J & Liew, J. 2002.
Hate speech: Asian american students justice judgments and
psychological responses. Journal of Social Issues.
[Chancellor et al. 2016] Chancellor, S.; Pater, J. A.; Clear, T.;
Gilbert, E.; and De Choudhury, M. 2016. # thyghgapp:
Instagram content moderation and lexical variation in pro-
In Proceedings of the 19th
eating disorder communities.
CSCW, 1201–1213. ACM.
[Eisenberg, Neumark-Sztainer, and Story 2003] Eisenberg,
M. E.; Neumark-Sztainer, D.; and Story, M. 2003. Asso-
ciations of weight-based teasing and emotional well-being
among adolescents. Archives of pediatrics & adolescent
medicine 157(8):733–738.
[Grimmelmann 2015] Grimmelmann, J. 2015. Virtues of
moderation, the. Yale JL & Tech. 17:42.
[Hughey and Daniels 2013] Hughey, M. W., and Daniels, J.
2013. Racist comments at online news sites: a methodologi-
cal dilemma for discourse analysis. Media, Culture & Soci-
ety 35(3):332–347.
[Leets and Giles 1997] Leets, L., and Giles, H. 1997. Words
as weaponswhen do they wound? investigations of harmful
speech. Human Communication Research 24(2):260–301.
[Major et al. 2014] Major, B.; Hunger, J. M.; Bunyan, D. P.;
and Miller, C. T. 2014. The ironic effects of weight stigma.
Journal of Experimental Social Psychology 51:74–80.
[Mendel 2012] Mendel, T. 2012. Does international law pro-
vide for consistent rules on hate speech? The content and
context of hate speech: Rethinking regulation and responses.
[Museum 2010] Museum, U. S. H. M. 2010. Hate speech
and group-targeted violence the role of speech in violent
conflicts. USHMM: Washington DC.
[Newell et al. 2016] Newell, E.; Jurgens, D.; Saleem, H. M.;
Vala, H.; Sassine, J.; Armstrong, C.; and Ruths, D. 2016.
User migration in online social networks: A case study on
reddit during a period of community unrest. In 10th ICWSM.
[Powers 2003] Powers, T. M. 2003. Real wrongs in virtual
communities. Ethics & information technology 5(4).
[Saleem et al. 2016] Saleem, H. M.; Dillon, K. P.; Benesch,
S.; and Ruths, D. 2016. A web of hate: Tackling hateful
In First Workshop on Text
speech in online social spaces.
Analytics for Cybersecurity and Online Safety, LREC 2016.
[Santana 2014] Santana, A. D. 2014. Virtuous or vitriolic:
The effect of anonymity on civility in online newspaper
reader comment boards. Journalism Practice 8(1):18–33.
[Schvey, Puhl, and Brownell 2011] Schvey, N. A.; Puhl,
R. M.; and Brownell, K. D. 2011. The impact of weight
stigma on caloric consumption. Obesity 19(10):1957–1962.
[Tomiyama 2014] Tomiyama, A. J. 2014. Weight stigma is
stressful. a review of evidence for the cyclic obesity/weight-
based stigma model. Appetite 82:8–15.
[u/maybesaydie 2015] u/maybesaydie. 2015. A very belated
introduction to the entire /t/fatlogic mod team. Reddit. Ac-
cessed 13-Jan-2017; https://redd.it/3mt2w4.
[u/reddit 2015] u/reddit. 2015. Removing harassing subred-
dits. Reddit. Accessed 13-Jan-2017; https://redd.
it/39bpam.
Leslie jones bom-
[Woolf 2016] Woolf, N.
the-
barded with racist tweets after ghostbusters opens.
guardian.com. Accessed 13-Jan-2017; https://www.
theguardian.com/culture/2016/jul/18/
leslie-jones-racist-tweets-ghostbusters.
2016.
|
1810.00132 | 1 | 1810 | 2018-09-29T01:33:02 | A Framework to Support the Trust Process in News and Social Media | [
"cs.SI"
] | Current society is heavily influenced by the spread of online information, containing all sorts of claims, commonly found in news stories, tweets, and social media postings. Depending on the user, they may be considered "true" or "false", according to the agent's trust on the claim. In this paper, we discuss the concept of content trust and trust process, and propose a framework to describe the trust process, which can support various possible models of content trust. | cs.SI | cs | A Framework to Support the Trust Process
in News and Social Media
Carlos Laufer1[+552135271500] and Daniel Schwabe1 [+552135271500]
1 Dept. of Informatics, PUC-Rio
R. M. de S. Vicente, 225, Rio de Janeiro, RJ 22453-900, Brazil
[email protected], [email protected]
Abstract. Current society is heavily influenced by the spread of online infor-
mation, containing all sorts of claims, commonly found in news stories, tweets,
and social media postings. Depending on each user, they may be considered
"true" or "false", depending on the agent's trust on the claim. In this paper, we
discuss the concept of content trust and trust process, and propose a framework
to describe the trust process, which can support various possible models of con-
tent trust..
Keywords: trust, provenance, linked data, social networks, news.
1
Introduction
The issue of trust has been present in the Internet shortly after its popularization in the early
90s (see [13] for a survey). The focus has been on lower level of the Internet Architecture, with
an emphasis on authentication. More recently, with the advent of the Web and social networks,
the cybersphere, and society as a whole, has become heavily influenced by information (and
misinformation) that flows in news sites and social networks in the Internet. There are many
studies carried out in several disciplines attempting to characterize and understand the spread of
information in the cybersphere, and how this affects society (see [18] for an overview). A more
visible aspect has been the spread of "fake news", actually a term used to refer to several different
misuses of information, as postulated by Wardle in [24]. This has also been the focus of much
research and many initiatives (e.g. [8, 9, 3]).
The advent of user-contributed data has raised the issue of "data quality", as evidenced for
example in case of online reviews and social media, often with direct effects on commercial
success (e.g. [4]). This highlights the fact that data, in reality, expresses a belief or opinion of
some agent.
The original vision for the Semantic Web included a "Trust" layer, although its emphasis
was more on authentication and validation, and static trust measures for data. There have been
many efforts towards representing trust, including computational models - a general survey can
be found in [20]; [5] presents an excellent earlier survey for the Semantic Web; and [23] surveys
trust in social networks. In the Linked Data world, it is clear that facts on the Semantic Web
should be regarded as claims rather than hard facts (e.g., [6]).
Most if not all research surveyed in [20], present what Gerck calls "Trust Models", as op-
posed to "Models of Trust" [10], i.e. a model of what is the trust process that is being adopted or
assumed, where the former presumes the latter. In this paper, we propose a framework to describe
2
the trust process, which can incorporate various alternative models of content trust (using the
terminology proposed in [11]).
From a more global perspective, the ability to support a trust process over the information
available in the cybersphere is directly related to at least two of the UN's Sustainable Develop-
ment Goals1 -- Peace, Justice and Strong Institutions, and Reduced Inequalities. At the very least,
a well-supported trust process can improve Transparency with respect to the actions undertaken
by political agents, by allowing members of society to rely on information about these actions to
make decisions and eventually take further actions in response.
The remainder of this paper is organized as follows. Section 2 discusses the concept of trust;
Section 3 presents a model of the trust process; Section 4 discusses trust regarding information
flow in news media and social networks.
2
The Concept of Trust
Whereas there are many definitions of trust (e.g. [19]), we base ourselves in the work of
Gerck [10] and Castelfranchi et al. [7], taking the view that trust is "knowledge-based reliance
on received information", that is, an agent decides to trust (or not) based solely on his knowledge,
and the decision to trust implies the decision to rely on the truth of received or known information
to perform some action.
Castelfranchi et al. define trust in the context of multi-agent systems, where agents have goals,
asserting that trust is "a mental state, a complex attitude of an agent x towards another agent y
about the behavior/action relevant for the result (goal) g. This attitude leads the agent x to the
decision of relying on y having the behavior/action, in order to achieve the goal g".
Gerck presents a definition of trust as "what an observer knows about an entity and can rely upon
to a qualified extent". The two definitions have close parallels: the observer is the agent who
trusts; the entity is the trusted agent; the qualified extent is the behavior/action. Both associate
trust with reliance. However, the former definition mentions explicitly the goal-oriented nature
of trust.
From both definitions, we observe that trust implies reliance: when an agent trusts something, it
relies on its truth to achieve some goal without further analysis -- even if it is running the risk of
taking an inappropriate or even damaging action if the object of trust is false.
3
A Framework for the Trust Process
Given the considerations above, we present a model for the trust process that underlies the
use or consumption of data/information on the web, represented diagrammatically in Figure 1.2
We focus here on the cases where an Agent needs to act, i.e., do some computation, to de-
cide, or take some Action. The agent must act based on some Data/Information items which,
clearly, it must trust -- the Trusted Data. The Data/Information items to be used by the agent may
come from several sources, and it is not always clear (to the Agent) what is the quality of this
Data, or the trustworthiness of the Information it contains. Therefore, the Agent must apply a
Trust Process to filter the incoming Data/Information items and extract the Trusted Data items
to be used by the Action. From this point of view, an item is considered as the smallest indivisible
element that can be used in the Trust Process and may have an internal structure when used by
the Action.
1 https://www.un.org/sustainabledevelopment/sustainable-development-goals/
2 This section has been extracted with some adaptation from [16]
3
This Trust Process can be based on a multitude of different signals, some of which we have
singled out in the diagram in Figure 1, namely, the Metadata which describes various properties
of the Data/Information items, and the Context in which the Action will take place. The criteria
used in the Trust Process are expressed by Policies determined by the Agent. Notice that in this
framework, the Context contains any arbitrary information items used by the Policies, in addition
to Metadata and the Data/Information items themselves.
Data/Information
Metadata
Context
Policies
Trust
Process
Trusted Data
Agent
Action
Figure 1 -- A Framework of the Trust Process. Continuous lines represent "consume/produce";
dashed lines represent "executes".
Many, if not most, of the trust models discussed in the surveys mentioned in Section 1 [5,
23] can be regarded as providing models or representations for one or more of the elements of
this trust framework, such as different representations for the metadata, or specification language
for the policies, or particular types of context information that can be added to the data. Regard-
less of these models, it should be clear that, as far as the Action is concerned, the whole process
is binary: An incoming Data/Information item is either accepted and added to the Trusted Data,
or it is not -- there are no "half filters". In other words, when time comes to Act, either the Agent
uses that Data/Information item, or it does not, it cannot "use it partially" -- an element is con-
sidered indivisible from the point of view of the Trust Process [2].
Thus, the actual trusting process ("Model of Trust") should not be confused with models
which may attribute non-discrete or continuous values to the trustworthiness assigned to data/in-
formation items that are used to determine if the incoming data/information items should be fil-
tered or not ("Trust Models").
To further illustrate this difference, the earlier approaches such as [12, 21] propose to com-
pute measures of trust by treating the RDF graph of the statements about the relations between
resources a social network graph. The trust process is implicit in the subset of RDF properties
(relations) considered. For instance, in [12], for trust between persons, an additional relation in-
dicating the trust level of one person on another person, for a given "subject" (topic). Given one
such graph, it is possible to extract a sub-graph with respect to a subject of interest, and then
compute the proposed measures over this graph. This model does not explicitly deal with the
notion of claims and how the "trusted graph" is actually built. Furthermore, it does not discuss
how trust policies, including automated ones, could be integrated, and does not directly identify
who the trusting agent is.
The work reported in [6] introduces the notion of information filtering, in the broader con-
text of information quality, one of which is trustworthiness. In this respect, it is similar to the
general schema proposed here, but does not directly identify the specific components to enable
4
trust, as outlined here. Within this view of a filtering process, trust policies can be expressed in
suitable languages, such as the ones proposed in [2, 15], which would be consistent with our
proposed approach, but requiring extensions to represent the elements of the model proposed
here, such as the trusting agent and the action to be performed.
Another point to notice is that, in this framework, only the Agent determines the policies it
wishes to apply to incoming Data/Information. The metadata associated with the incoming
Data/Information may contain Data/Information about the publisher or provider of a Data/Infor-
mation item, and the Policies may take this into account in the filtering process.
In contrast, privacy issues would require adding a similar set of metadata and policies to the
published Data/Information that will be consumed by the Agent, which would act as an additional
filter, applied before the Data/Information is made available to the Agent. The privacy Policies
of a Publisher may use information about the (requesting) Agent, the Action and the Context.
In this work, we will focus on specific types of Data/Information -- those pertaining to Po-
litical Systems, and one specific type of metadata, Provenance, in the context of news media. In
the next section, we discuss the trust process in this context, and propose a model for information
and metadata to support it.
4
News Media, Social Networks and Provenance
The nature of information in news and social media must, necessarily, be seen as containing
claims made by someone about some "fact" (or "statement"), i.e., someone (an agent, i.e. a person
or organization) claims a certain fact to be true. It is up to the reader to accept the truth of these
claimed facts.
For an agent A to accept the truth of a certain claim about a hitherto unknown fact F entails
either establishing the truth of F through direct observation3, (or a chain of interdependent obser-
vations), or trusting the source S of the claim. The trust towards S then implies that one expects
the claim to be true because S has been consistently (predictably and expectedly) correct in the
past.
If, however, S is not trusted, one may require some evidence to serve as the basis to establish
the truth of the claim. Such evidence is, in turn, another (possibly a set of) fact(s) F1 in a claim
made by some third-party SS, which S believes is more trusted by A than itself (S). In this fashion,
a chain of interdependent claims is established, such that the truth of F relies on the trust towards
the agent at the end of the chain (SS in this example).
In most societies, certain public agents (e.g., Vital Record Office, Notary Public) have, by
convention and mutual agreement among its members, the so-called "public faith", meaning that
whatever they claim (about specific kinds of facts) is deemed "true". For instance, Obama's na-
tionality was determined by a birth certificate which "proved" as far as the law is concerned that
he is indeed a US citizen.
From the discussion above, it is safe to say that provenance data about information published
in the cybersphere is crucial to enable agents to consume this information -- i.e., accept it as true
and eventually act based on this. This has been clearly recognized by many researchers and schol-
ars studying the "fake news" phenomenon, at least with respect to "fabricated content" as out-
lined in [24].
We have been involved with an initiative to publish a database about Political Agents in
Brazil in the form of Linked Data, named "Se Liga na Politica"4 (SLNP). The data in this database
3 It is of common sense that a person normally trusts her/himself as a source of information,
although s/he may defer on this perception if someone s/he believes to be wiser (with respect to
this particular subject matter) contradicts her/him. Furthermore, current technology can success-
fully trick human perception. (e.g. Google Duplex - https://goo.gl/mG4E9h).
5
is obtained from several sources, in both automated and non-automated ways. Most of the auto-
mated extraction is made from official sources, such as the open data published by the House of
Deputies and by the Senate. In addition to such sources, data may also be contributed by individ-
uals, in crowdsourced fashion. One of the main usages for this database is to provide context
information for news stories, to allow readers to establish trust in the claimed facts based on their
own criteria. We present here the rationale and design decisions for the underlying ontologies
used in this database, starting first with our motivations.
We regard a Political System as sets of agents and organizations that govern a society. Our
goal in the SNLP project is to help make the existing relationships between political agents in a
Political System explicit and thus subject to analysis. We do so by providing a Linked Data da-
tabase where such relationships appear as data items. Given the multiplicity of sources, and the
nature of the subject matter, this database is designed so that facts are seen as claims made by
some agent, and therefore provenance information becomes a "first class citizen" of the domain.
The SLNP database represents claims based on the nanopublication model [14], where a
claim, represented by a set of statements, is recorded as a group of three named graphs:
•
assertion graph - containing the set of statements that compose the claim, using the
POLARE family of ontologies [17];
publication info - containing statements that give provenance information about the claim
publication activity, using the provHeart PROV-O pattern [16];
provenance - containing statements that give provenance information about the claim itself,
using the provHeart pattern.
Further details on how Provenance can be used to support the trust process can be found in [16].
•
•
5
Conclusions
In this paper we have presented and explicit model of the trust process which can be seen as
an evolution of a collection of previous work by several authors. It makes explicit the elements
of the trust process -- Trusting Agent, Action, Information, Meta-Information, Context and Poli-
cies. We have also outlined how this model is well suited to support the use of news and social
media information, by representing this information as claims and recording provenance.
Ongoing and future work will examine suitable policy languages; how to mine implicit pol-
icies employed by humans when consuming online information; how appropriate narratives can
be constructed and to better convey trusted information to human beings, and how this can be
effectively communicated in human-computer interfaces.
6
References
1. Allcot, H.; Gentskow, M.; Social Media and Fake News in the 2016 Election. Journal of Economic
Perspectives 31(2),Spring 2017, pp 211 -- 236
2. Almendra, V. D. S., & Schwabe, D. (2006). Trust policies for semantic web repositories. In Proceedings
of 2nd International Semantic Web Policy Workshop (SWPW'06), at the 5th International Semantic
Web Conference (ISWC 2006) (pp. 17-31).
3. Ananny, M., The partnership press: Lessons for platform-publisher collaborations as Facebook and
news outlets team to fight misinformation, Columbia Journalism Review, https://www.cjr.org/tow_cen-
ter_reports/partnership-press-facebook-news-outlets-team-fight-misinformation.php
4. Angella J. ;Kim, K; K.P. Johnson, Power of consumers using social media: Examining the influences
of brand-related user-generated content on Facebook, Computers in Human Behavior, Volume 58,
2016, Pages 98-108, ISSN 0747-5632, http://dx.doi.org/10.1016/j.chb.2015.12.047. (http://www.sci-
encedirect.com/science/article/pii/S0747563215303186)
6
5. Artz, D; Gil, Y.; A survey of trust in computer science and the Semantic Web, Web Semantics: Science,
Services and Agents on the World Wide Web, Volume 5, Issue 2, 2007, Pages 58-71, ISSN 1570-8268,
http://dx.doi.org/10.1016/j.websem.2007.03.002.(http://www.sciencedirect.com/science/arti-
cle/pii/S1570826807000133)
6. Bizer, C. ; Cyganiak, R.. Quality-Driven Information Filtering Using the WIQA Policy Framework.
Web Semantics: Science, Services and Agents on the World Wide Web. 7. 1-10. 10.1016/j.web-
sem.2008.02.005. (2009) - http://www.websemanticsjournal.org/index.php/ps/article/view/157/155
7. Castelfranchi, C., Falcone, R. Social Trust: A Cognitive Approach. In: Castelfranchi, C.; Yao-Hua Tan
(Eds.): Trust and Deception in Virtual Societies. Springer-Verlag (2001).
8. Ciampaglia, G. L.; Shiralkar, P.; Rocha, L. M.; Bollen, J.; Menczer, F.; Flammini, A.; "Computational
e0128193. 2015.
from Knowledge Networks", PLoS ONE, 10(6):
Fact Checking
http://doi.org/10.1371/journal.pone.0128193
9. Conroy, N. J., Rubin, V. L. and Chen, Y. (2015), Automatic deception detection: Methods for finding
fake news. Proc. Assoc. Info. Sci. Tech., 52: 1 -- 4. doi:10.1002/pra2.2015.145052010082
10. Gerck, E.; Toward Real-World Models of Trust: Reliance on Received Information. Report MCWG-
Jan22-1998, DOI: 10.13140/RG.2.1.2913.6727. http://www.safevote.com/papers/trustdef.htm.
11. Gil, Y.; Artz, D.; Towards content trust of web resources. Web Semant. 5, 4 (December 2007), 227-239.
DOI:http://dx.doi.org/10.1016/j.websem.2007.09.005
12. Golbeck J., Parsia B., Hendler J. (2003) Trust Networks on the Semantic Web. In: Klusch M., Omicini
A., Ossowski S., Laamanen H. (eds) Cooperative Information Agents VII. CIA 2003. Lecture Notes in
Computer Science, vol 2782. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45217-
1_18
13. Grandison, T., & Sloman, M. (2000). A survey of trust in internet applications. IEEE Communications
14. Groth, Paul, Andrew Gibson, and Jan Velterop. "The anatomy of a nanopublication." Information Ser-
Surveys & Tutorials, 3(4), 2-16.
vices & Use 30.1-2 (2010): 51-56.
15. Jacobi I., Kagal L., Khandelwal A. (2011) Rule-Based Trust Assessment on the Semantic Web. In:
Bassiliades N., Governatori G., Paschke A. (eds) Rule-Based Reasoning, Programming, and Applica-
tions. RuleML 2011. Lecture Notes in Computer Science, vol 6826. Springer, Berlin, Heidelberg.
https://doi.org/10.1007/978-3-642-22546-8_18
16. Laufer, C. ; Schwabe, D. . On Modeling Political Systems to Support the Trust Process. In: Privacy
Online 2017, 2017, Viena. Proceedings of the 5th Workshop on Society, Privacy and the Semantic Web
- Policy and Technology (PrivOn2017). Aachen: CEUR-WS.org, 2017. v. 1951. p. 1-16.
17. Laufer, C.; Schwabe, D.; Busson, A.; Ontologies for Representing Relations among Political Agents,
https://arxiv.org/abs/1804.06015v1
18. Marwick, A., Lewis, R.. "Media Manipulation and Disinformation Online." Data & Society Research
- https://datasociety.net/pubs/oh/DataAndSociety_MediaManipula-
Institute, New York, 2017
tionAndDisinformationOnline.pdf
19. McKnight, D. H., & Chervany, N. L. (2001). Trust and distrust definitions: One bite at a time. In Trust
in Cyber-societies (pp. 27-54). Springer Berlin Heidelberg.
20. Pinyol, I.; Sabater-Mir, J.; Computational trust and reputation models for open multi-agent systems: a
review. Artificial Intelligence Review 40:1 -- 25 DOI 10.1007/s10462-011-9277-z (2013)
21. Richardson M., Agrawal R., Domingos P. (2003) Trust Management for the Semantic Web. In: Fensel
D., Sycara K., Mylopoulos J. (eds) The Semantic Web - ISWC 2003. ISWC 2003. Lecture Notes in
Computer Science, vol 2870. Springer, Berlin, Heidelberg - https://doi.org/10.1007/978-3-540-39718-
2_23
22. Ruchansky, N., Seo, S., & Liu, Y. (2017). CSI: A Hybrid Deep Model for Fake News. arXiv preprint
arXiv:1703.06959.
23. Sherchan, W., Nepal, S., and Paris, C. 2013. A Survey of trust in social networks. ACM Comput. Surv.
45, 4, Article 47 (August 2013), 33 pages.
DOI: http://dx.doi.org/10.1145/2501654.2501661
24. Wardle, C., "Fake News. It's Complicated", FirstDraft News, https://firstdraftnews.com/fake-news-
complicated/, accessed on May 12, 2017.
|
1708.05690 | 3 | 1708 | 2017-11-15T21:04:24 | Modeling Spread of Preferences in Social Networks for Sampling-based Preference Aggregation | [
"cs.SI",
"physics.soc-ph"
] | Given a large population, it is an intensive task to gather individual preferences over a set of alternatives and arrive at an aggregate or collective preference of the population. We show that social network underlying the population can be harnessed to accomplish this task effectively, by sampling preferences of a small subset of representative nodes. We first develop a Facebook app to create a dataset consisting of preferences of nodes and the underlying social network, using which, we develop models that capture how preferences are distributed among nodes in a typical social network. We hence propose an appropriate objective function for the problem of selecting best representative nodes. We devise two algorithms, namely, Greedy-min which provides a performance guarantee for a wide class of popular voting rules, and Greedy-sum which exhibits excellent performance in practice. We compare the performance of these proposed algorithms against random-polling and popular centrality measures, and provide a detailed analysis of the obtained results. Our analysis suggests that selecting representatives using social network information is advantageous for aggregating preferences related to personal topics (e.g., lifestyle), while random polling with a reasonable sample size is good enough for aggregating preferences related to social topics (e.g., government policies). | cs.SI | cs | Modeling Spread of Preferences in Social Networks
for Sampling-based Preference Aggregation
Swapnil Dhamal, Rohith D. Vallam, and Y. Narahari
1
7
1
0
2
v
o
N
5
1
]
I
S
.
s
c
[
3
v
0
9
6
5
0
.
8
0
7
1
:
v
i
X
r
a
Abstract-Given a large population,
it is an intensive task
to gather individual preferences over a set of alternatives and
arrive at an aggregate or collective preference of the population.
We show that social network underlying the population can
be harnessed to accomplish this task effectively, by sampling
preferences of a small subset of representative nodes. We first
develop a Facebook app to create a dataset consisting of
preferences of nodes and the underlying social network, using
which, we develop models that capture how preferences are
distributed among nodes in a typical social network. We hence
propose an appropriate objective function for the problem of
selecting best representative nodes. We devise two algorithms,
namely, Greedy-min which provides a performance guarantee
for a wide class of popular voting rules, and Greedy-sum
which exhibits excellent performance in practice. We compare
the performance of these proposed algorithms against random-
polling and popular centrality measures, and provide a detailed
analysis of the obtained results. Our analysis suggests that
selecting representatives using social network information is
advantageous for aggregating preferences related to personal
topics (e.g., lifestyle), while random polling with a reasonable
sample size is good enough for aggregating preferences related
to social topics (e.g., government policies).
Index Terms-Social networks, preference aggregation, repre-
sentatives selection, sampling, elections.
I. INTRODUCTION
There are several scenarios such as elections, opinion polls,
initiatives, funding decisions, etc., where a
public project
population (society) faces a number of alternatives. In such
scenarios, the population's collective preference over the given
alternatives is of importance. Ideally, one would want to obtain
the preferences of all the individuals in the population and
aggregate them so as to represent the population's preference.
These individuals can be termed as 'voters' in this context.
This process of computing an aggregate preference over a set
of alternatives, given individual preferences, is termed prefer-
ence aggregation (a well-studied topic in social choice theory).
It is generally assumed that the preferences of all the voters are
known. In real-world scenarios, however, it may not be feasible
to gather the individual preferences of all the voters owing
to factors such as their lack of interest to provide prompt,
The original version of this paper is accepted for publication in IEEE
Transactions on Network Science and Engineering. The copyright for this
article belongs to IEEE. DOI 10.1109/TNSE.2017.2772878
Contact author: Swapnil Dhamal ([email protected]). S. Dhamal
and R. D. Vallam were with the Department of Computer Science and
Automation, Indian Institute of Science, Bangalore, when most of the work
was done. A part of the work was done when S. Dhamal was with T´el´ecom
SudParis, CNRS, Universit´e Paris-Saclay, France, and R. D. Vallam was with
IBM India Research Labs, Bangalore. Y. Narahari is with the Department of
Computer Science and Automation, Indian Institute of Science, Bangalore.
truthful, well-informed, and well-thought out preferences over
the given alternatives. As an immediate example, consider
a company desiring to launch a future product based on its
customer feedback. However, very few customers might be
willing to devote the needed effort to promptly provide a useful
feedback. Further, even if we manage to gather preferences of
all the voters, obtaining an aggregate preference may not be
feasible owing to computational issues.
Owing to the difficulty involved in obtaining individual
preferences of an entire population and in computing the
aggregate preference, an attractive approach would be to select
a subset of voters whose preferences reflect the population's
preferences, and hence incentivize only those voters to report
their preferences. We refer to these voters as representatives.
To determine such representatives, this work proposes ideas for
harnessing additional information regarding the population of
voters: the underlying social network. It has been established
based on a large number of empirical evidences over the years
that, there is a significant correlation between the preferences
of voters and the underlying social network;
this can be
attributed to the homophily phenomenon [1]. There have been
several efforts for modeling homophily and strength of ties in
social networks [2], [3]. The social network and the involved
tie strengths (similarities among nodes) could thus give addi-
tional information regarding the individual preferences.
In the context of social networks, we use 'nodes' to repre-
sent voters and 'neighbors' to represent their connections.
A. Overview of the Problem and Solution Approach
We now informally describe the problem addressed in this
paper. Given a population and a topic (such as political party)
for which alternatives need to be ranked, let pA be the col-
lective (or aggregate) preference of the population computed
using a certain voting (or aggregation) rule. Note that unless
we have the preferences of the nodes in the population, pA
is indeterminate. Suppose instead of obtaining preferences of
all the nodes, we obtain preferences of only a subset of nodes
and compute their collective preference, say pB. The problem
we study is to find a subset of a certain cardinality k such
that pB is as close as possible to pA. For determining how
close pB is to pA, it is required that we deduce pA (since it
is unknown to us). To do this, we need an underlying model
for deducing the preferences of nodes, with which we can
compute an estimate of pA using the voting rule. Motivated
by the correlation that exists between the preferences of nodes
and the underlying social network, we propose a model that
captures how preferences are distributed in the network. Such
a model would enable us to deduce the individual preferences
of all the nodes, with the knowledge of preferences of a subset
of nodes. With such a model in place, we would be able to
estimate how close pB is to pA, and also find a subset of nodes
for which this 'closeness' is optimal.
The problem of determining the best representatives can
thus be classified into two subproblems: (a) deducing how
preferences are distributed in the population and (b) finding a
subset of nodes whose collective preference closely resembles
or approximates the collective preference of the population.
This paper addresses these two subproblems.
B. Preliminaries
We now provide some preliminaries on preference aggrega-
tion, required throughout the paper. Given a set of alternatives,
we refer to a ranked list of alternatives as a preference
and the multiset consisting of the individual preferences as
preference profile. For example, if the set of alternatives is
{X, Y, Z} and node i prefers Y the most and X the least,
i's preference is written as (Y, Z, X)i. Suppose node j's
preference is (X, Y, Z)j, then the preference profile of the
population {i, j} is {(Y, Z, X), (X, Y, Z)}. A widely used
measure of dissimilarity between two preferences is Kendall-
Tau distance which counts the number of pairwise inversions
with respect
the
normalized Kendall-Tau distance can be obtained by dividing
(cid:17), the maximum distance between any two
this distance by (cid:16)r
to the alternatives. Given r alternatives,
2
2
preferences on r alternatives. For example, the Kendall-Tau
distance between preferences (X, Y, Z) and (Y, Z, X) is 2,
since two pairs, {X, Y } and {X, Z}, are inverted between
them. The normalized Kendall-Tau distance is 2/
(cid:16)3
(cid:17).
An aggregation rule takes a preference profile as input and
outputs the aggregate preference, which aims to reflect the
collective opinion of all the nodes. We do not assume any
tie-breaking rule in order to avoid bias towards any particular
alternative while determining the aggregate preference. So an
aggregation rule may output multiple aggregate preferences
(that is, aggregation rule is a correspondence). A survey of
voting rules and their extensions to aggregation rules, can be
found in [4]. We consider several aggregation rules for our
study, namely, Bucklin, Smith set, Borda, Veto, Minmax (pair-
wise opposition), Dictatorship, Random Dictatorship, Schulze,
Plurality, Kemeny, and Copeland.
C. Relevant Work
This work is at the interface of social network analysis
and voting theory. Specifically, we adapt a model of opinion
dynamics in social networks, so as to model how preferences
are distributed in a network. Using the adapted model, we
sample a subset of nodes which could act as representatives
of the network. The research topics of relevance to our work
are thus, relation between social networks and voting, models
of opinion dynamics, and network sampling. We now present
the relevant literature and position our work.
1) Social networks and voting: The pioneering Columbia
and Michigan political voting research [5] emphasizes on
the importance of the underlying social network. It has been
2
observed that the social network has higher impact on one's
political party choice than background attributes like class or
ethnicity [6] as well as religion, education, and social sta-
tus [7]. It has been argued that interactions in social networks
have a strong, though often overlooked, influence on voting,
since interactions allow an individual to gather information
beyond personal resource constraints [8], [9]. The impact of
social networks has also been compared with that of mass
media communication with respect to voting choices, where it
is observed that social discussions outweigh the media effect
[10], and that both the effects should be studied together [11].
On the other hand, it has also been argued via a maximum
likelihood approach to political voting, that it is optimal to
ignore the network structure [12]. It is also not uncommon to
observe highly accurate predictions about election outcomes
by soliciting opinions of randomly chosen voters.
There are supporting arguments for both views (regarding
whether or not social network plays a role in voting); so
one of the goals of this work is to identify conditions under
which social network visibly plays a role. As we will see,
our work suggests that social network and homophily indeed
play a critical role in voting related to personal topics (such as
lifestyle). However, for voting related to social topics (such as
government policies), factors which are external to the network
and common to all nodes (such as mass media channels) could
play a strong role, which would allow ignoring social network
if the sample size is reasonable.
2) Models of opinion dynamics: Opinion dynamics is the
process of development of opinions in a population over
time, primarily owing to the information exchanged through
interactions. Several models of opinion dynamics in networks
have been studied in the literature [1], [13], [14], such
as DeGroot, Friedkin-Johnsen, Independent Cascade, Linear
Threshold, etc. Since opinions and networks are key factors
in opinion dynamics as well as our setting, it is natural to
consider the applicability of opinion dynamics techniques to
our setting.
One of the primary factors that distinguishes our setting
from opinion dynamics is that, the edge weights in opinion dy-
namics represent influence weights or probabilities, while the
edge weights in our setting represent probability distributions
over similarity values (homophilic tie strengths). So if one
intends to use the models of opinion dynamics for the problem
under consideration, they need to be appropriately adapted.
In this paper, we propose an adaptation of the Independent
Cascade model; instead of deducing the probability of a node
getting influenced (given edge probabilities and a subset of
nodes which are already influenced), we deduce the preference
of a node (given homophilic tie strengths and the preferences
of a subset of nodes).
3) Network sampling: A taxonomy of different graph sam-
pling objectives and approaches is provided in [15]. Problems
in developing a general theory of network sampling are dis-
cussed in [16]. A discussion on which sampling method to use
and how small the sample size can be, is provided in [17]; there
it is also experimentally observed that simple uniform random
node selection performs surprisingly well. The problem of
finding a subset of users to statistically represent the original
social network has also been studied [18], [19].
Our setting principally deviates from the existing literature
in that, as stated earlier, we consider edges having probability
distributions over similarity values (instead of weights or prob-
abilities). Moreover, we address the problem of sampling best
representative nodes based on a ranked list of alternatives, and
undertake a study to determine the performance of sampling-
based approach for preference aggregation with respect to a
number of voting rules.
Furthermore, the problem of node selection based on ranked
list of alternatives has been studied by utilizing the attributes of
voters and alternatives [20], however, the underlying network
is ignored.
D. Our Contributions
Our specific contributions are as follows.
• We develop a Facebook app to create a dataset consisting
of the preferences of nodes over a variety of topics and
the underlying social network. With this dataset, we pro-
pose and validate a number of simple yet faithful models
with the aim of capturing how preferences are distributed
among nodes in a social network, while having probabilistic
information regarding tie similarities.
• We formulate an objective function for the problem of
determining best representative nodes in a social network,
and hence propose a robustness property for aggregation
rules to justify appropriateness of two surrogate objective
functions for computational purpose.
• We provide a guarantee on the performance of one of the
algorithms (Greedy-min), and study desirable properties of
a second algorithm (Greedy-sum) which exhibits excellent
performance in practice. We compare these algorithms
with the popular random polling method and well-known
centrality measures over a number of voting rules, and
analyze the results.
• We present insights on the effectiveness of our approach
with respect to personal and social topics.
We believe the results in this paper offer a rigorous model
for capturing spread of preferences in a social network, and
present effective methods for sampling-based preference ag-
gregation using social networks.
II. MODELING SPREAD OF PREFERENCES IN A
SOCIAL NETWORK
In this section, we first introduce the idea of modeling the
spread of preferences in a social network, with an analogy
to modeling opinion dynamics. We then describe the dataset
created through our Facebook app and hence develop a number
of simple and intuitive yet faithful models for deducing the
spread of preferences across the nodes in a social network.
Here we use the term 'spread' to indicate distribution, not
diffusion (we do not use the term 'distribution' of preferences
3
since we frequently use it in the context of probability distribu-
tions). We treat an edge as representing similarity (tie strength
with respect to homophily) between two connected nodes,
and not as influence weights or probabilities as in opinion
dynamics models. The preferences of the nodes could have
resulted owing to opinion dynamics over the network, along
with external influences such as mass media channels. Our
goal here is to model the spread of these preferences while
knowing the edge weights indicating similarities.
A. Dataset for Modeling Spread of Preferences in a Social
Network
We presented a connection between the opinion dynamics
setting and our setting in Section I-C2. It is assumed while
studying opinion dynamics that the edge influence weights or
probabilities are given, using which, a model (such as Indepen-
dent Cascade and Linear Threshold) predicts the probability
with which each node would get influenced starting with a
given seed set. Alternatively, models such as DeGroot would
predict the final opinion of each node, based on the edge
influence weights which are assumed to be given. On similar
lines, for our proposed models in Section II-C, we assume
the edge similarity parameters to be given, using which we
deduce the preference of each node. It can also be viewed that,
given the edge parameters indicating homophilic tie strengths,
we aim to find preferences of all nodes such that they are
consistent with the given parameters for all edges, that is, how
preferences are distributed or spread across the nodes in the
network. These edge parameters, however, would need to be
inferred from some available data. This, again, is on similar
lines as opinion dynamics models, where the influence weights
or probabilities would be required to be inferred from some
past data.
In order to develop models for achieving the aforementioned
objectives, there was a need of a dataset that consists of
(a) preferences of nodes for a range of topics and (b) the
underlying social network. With this underlying goal, we
developed a Facebook app titled The Perfect Representer,
which asked the app users to report their preferences for 8
topics, over 5 alternatives for each topic. The topics (broadly
classified into personal and social types), their alternatives, the
network of app users, and details about dataset preprocessing,
are provided in Appendix A. Table I provides some statistics
of this dataset. Table II presents the notation used throughout
the paper.
TABLE I
STATISTICS OF THE FACEBOOK DATASET
number of nodes
number of edges
average clustering coefficient
number of triangles
fraction of closed triangles
diameter
90-percentile effective diameter
power law exponent
844
6129
0.5890
33216
0.4542
13
4.9
2.12
TABLE II
NOTATION USED IN THE PAPER
N
E
n
m
r
P
d(x, y)
f
i, j
d(i, j)
c(i, j)
k
M
Φ(M, i)
Q
Q(cid:48)
∆
set of nodes in the network
set of edges in the network
number of nodes in the network
number of edges in the network
number of alternatives
preference profile of N
distance between preferences x and y
preference aggregation rule
typical nodes in the network
expected distance between preferences of i and j
1 − d(i, j)
desired cardinality of the representative set
set of representatives who report their preferences
representative of node i in set M
profile containing unweighted preferences of M
profile containing weighted preferences of M
error operator between aggregate preferences
B. Modeling Distance between Preferences of Nodes
In order to study the homophilic tie strength or similarity
between two nodes with respect
to their preferences, we
use the measure of normalized Kendall-Tau distance. The
histogram of distance between preferences of most pairs of
nodes (connected as well as unconnected), over the considered
topics, followed a bell curve (most distances were clubbed
together, with few of them spread apart). As a preliminary
fit to the data, we consider Gaussian distribution since it is
a natural and most commonly observed distribution in real-
world applications. Since the range of values taken by the
distance is bounded between 0 and 1, we consider Truncated
Gaussian distribution. Furthermore, as the range of values is
discrete, we consider a discrete version of truncated Gaussian
distribution; denote it by D. The discretization can be done
in the following way. We know that when the number of
alternatives is r, the distance between consecutive discrete
values is 1/
r(r−1). Let F be the cumulative distribution
function of the continuous truncated Gaussian distribution; the
value of the probability mass function of D at x can be shown
(cid:27)(cid:19)
(cid:18)
to be
(cid:27)(cid:19)
= 2
(cid:26)
(cid:16)r
(cid:17)
(cid:26)
(cid:18)
2
F
min
x +
1
r(r − 1)
, 1
− F
max
x −
1
r(r − 1)
, 0
.
So for a pair of nodes {i, j}, there is an associated histogram
of normalized Kendall-Tau distances over different topics. To
this histogram, we attempt to fit distribution D using MLE,
and infer the corresponding parameters (µij and σij of the
original Gaussian distribution from which D is derived). We
use KL divergence to find the fitting error between the true
histogram obtained from the data and the fitted distribution
D. This process is run for all pairs of nodes; the resulting
histogram of KL divergences over all pairs is presented in
Figure 1. The root mean square (RMS) KL divergence for
connected as well as unconnected pairs was observed to be
0.25 with more than 90% pairs having KL divergence less
than 0.6.
4
Fig. 1. Histogram of KL divergence between the normalized histograms and
the distribution D obtained using MLE for all pairs of nodes
Let
the expected distance between nodes i and j with
respect to their preferences, be denoted by d(i, j). Let distance
matrix be a matrix whose cell (i, j) is d(i, j) and similarity
matrix be a matrix whose cell (i, j) is c(i, j) = 1 − d(i, j).
Following are certain statistics about d(i, j)'s over all pairs
of nodes in the obtained Facebook app data. The means (=
avg {i,j} d(i, j)) for personal, social, and both types of topics
are respectively 0.40, 0.30, 0.35, while the standard deviations
are respectively 0.12, 0.08, 0.09. (Our focus throughout this
paper will be on aggregating preferences across all topics
or issues; we provide a preliminary analysis by considering
different types of topics separately, in Section IV-E).
C. Modeling Spread of Preferences in Social Network
Recollect that the primary objective of modeling the spread
of preferences in a social network is to identify best set of
representative nodes for the entire social network. In order to
do this, we need not only the distribution of distances between
connected nodes, but also that between unconnected nodes. As
an analogy to modeling opinion dynamics as per models such
as Independent Cascade, in order to identify best set of seed
nodes for maximizing opinion diffusion, we need the influence
of a candidate set, not only on its neighbors but also on distant
nodes.
Given the preferences of a set of nodes (call it initializing
set), our models aim to deduce the possible preferences of
all the nodes in the social network. If this model is run for
several iterations, say T, with a randomized initializing set
in each iteration, we would have deduced the preferences of
nodes for these T generated (or simulated) topics (and hence
T preference profiles). This would then enable us to deduce
the distribution of distances between unconnected nodes as
well. We address each of our models as a Random Preferences
Model (RPM) since the deduced preferences and hence the
distances are randomized.
The models that we propose work iteratively (similar to
the Independent Cascade model wherein iterations correspond
to time steps). In each iteration, we partition the nodes into
two sets, namely, (1) assigned nodes which are assigned a
00.30.60.91.20123456x 104KL divergenceNumber of pairsAlgorithm 1: A generic model for spread of preferences
in a social network
Input: Connected graph G with parameters µ, σ on its
edges, Number of generated (simulated) topics T
Output: Preference profiles for T generated topics
for t ← 1 to T do
Randomly choose an initializing set of certain size s;
Assign preferences to nodes in this initializing set;
for i ← 1 to n − s do
Choose an unassigned node u uniformly at random
from the set of potentially next nodes;
Assign a preference to u based on:
(i) the model under consideration and
(ii) either (a) preferences of assigned neighbors
or (b) preference of one of its assigned
neighbors chosen based on a certain criterion;
preference, and (2) unassigned nodes which are not assigned a
preference as yet. Let potentially next nodes in a given iteration
be the subset of unassigned nodes, which have at least one
neighbor in the set of assigned nodes. Starting with the nodes
in the initializing set as the only assigned nodes, a node is
chosen uniformly at random from the set of potentially next
nodes in each iteration, and is assigned a preference based on
the preferences of its assigned neighbors (neighbors belonging
to the set of assigned nodes). Algorithm 1 presents a generic
model on these lines.
Note that the preference profiles are obtained by considering
independently sampled initializing sets across iterations (ver-
sus considering the same set in models such as Independent
Cascade). Also, social networks are known to have a core-
periphery structure. Considering a random core node and a
random periphery node, the latter is more likely to deduce its
preference due to the preference of the former, than the other
way around; this is captured over iterations in Algorithm 1.
We now present a number of models as its special cases.
1) Independent Conditioning (RPM-IC): Let Pj be the
random preference to be assigned to a node j and Aj be the set
of assigned neighbors of node j. So given the preferences of
its assigned neighbors, the probability of node j being assigned
a preference pj is
(cid:1)
P(cid:0)Pj = pj(Pi = pi)i∈Aj
P(cid:0)(Pi = pi)i∈AjPj = pj
P(cid:0)(Pi = pi)i∈AjPj = pj
(cid:80)
∝ P(cid:0)(Pi = pi)i∈AjPj = pj
(cid:1)
=
pj
(cid:1) P(Pj = pj)
(cid:1) P(Pj = pj)
(Bayes' rule)
The proportionality results since the denominator is com-
mon, and P(Pj = pj) = 1
r! for all pj's (assuming no prior
bias). Now we make a simplifying assumption of mutual
independence among the preferences of assigned neighbors of
node j, given its own preference. So the above proportionality
results in
P(cid:0)Pj = pj(Pi = pi)i∈Aj
(cid:1) ∝ (cid:89)
i∈Aj
P(Pi = piPj = pj)
(1)
5
The right hand term consists of factors P(Pi = piPj = pj)
for each i ∈ Aj. P(Pi = piPj = pj) says, given we have
assigned preference pj to j, what is the probability that i had
preference pi? We now show how to compute it. Let Dij be the
random variable corresponding to the distance between i and j
(so Dij has distribution D with values of µ, σ corresponding to
pair {i, j}). Let d(pi, pj) be the distance between preferences
pi and pj. So,
(cid:17)
(cid:17)
P (Pi = piPj = pj )
= P(cid:16)
= P(cid:16)
= P(cid:16)
Here, P(cid:16)
other, P(cid:16)
Pi = pi, Dij = d(pi, pj )Pj = pj
Dij = d(pi, pj )Pj = pj
Dij = d(pi, pj )
(cid:17) P(cid:16)
(cid:17) P(cid:16)
(∵ given Pj , Pi ∩ Dij = Pi)
Pi = piDij = d(pi, pj ), Pj = pj
(2)
(∵ Dij is independent of Pj )
(cid:17)
Pi = piDij = d(pi, pj ), Pj = pj
(cid:17)
(cid:17)
Dij = d(pi, pj)
Pi = piDij = d(pi, pj), Pj = pj
can be readily obtained by look-
ing at the distribution D corresponding to {i, j}. Also, as
we assume that no preference has higher priority than any
is precisely the
reciprocal of the number of preferences which are at dis-
tance d(pi, pj) from a given preference. This value can be
expressed in terms of distance d(pi, pj) and the number of
alternatives. As an example for the case of 5 alternatives, the
number of preferences which are at a normalized Kendall-
Tau distance of 0.1 (or Kendall-Tau distance of 1) from any
given preference is 4; for example, if the given preference
is (A, B, C, D, E),
the 4 preferences are (B, A, C, D, E),
(A, C, B, D, E), (A, B, D, C, E), (A, B, C, E, D). It is clear
that this count is independent of the given preference.
The initializing set for this model is a singleton set chosen
uniformly at random, and is assigned a preference chosen
uniformly at random from the set of all preferences. For each
unassigned node, this model computes probabilities for each of
the r! possible preferences, by looking at the preferences of its
assigned neighbors, and hence chooses exactly one preference
based on the computed probabilities (multinomial sampling).
So the time complexity of this model for assigning preferences
i∈N deg(i))T) = O(r!mT), where
deg(i) is the degree of node i. Note that the initializing set
is taken to be singleton, since an initializing set consisting of
multiple nodes may lead to conflict in preferences, and hence
inconsistencies with the distributions.
for T topics is O(r!((cid:80)
2) Sampling (RPM-S): For assigning preference to an unas-
signed node j, we first choose one of its assigned neighbors i;
say its assigned preference is pi. Then we sample a value from
the discretized truncated Gaussian distribution D having the
parameters (µij, σij); say the sampled value is dij. Following
this, we choose a preference pj such that the Kendall Tau
distance between pi and pj, that is d(pi, pj), is dij (in case of
multiple possibilities, choose pj uniformly at random from
among these possibilities). The assigned neighbor i ∈ Aj
could be selected in multiple ways; we enlist three natural
ways which we consider in our study:
a) Random: A node is selected uniformly at random from Aj.
This is a natural way and is immune to overfitting.
b) µ-based: A node i is selected from Aj with probability
proportional to 1 − µij (multinomial sampling). This is
consistent with the empirical belief that a node's preference
depends more on its more similar neighbors.
c) σ-based: A node i is selected from Aj with probability
proportional to 1/σij (multinomial sampling). This is sta-
tistically a good choice because, giving lower priority to
distributions with low standard deviations may result in
extremely large errors.
Like RPM-IC, the initializing set for this model also is a
singleton set chosen uniformly at random, and is assigned a
preference chosen uniformly at random from the set of all
preferences. For each unassigned node, this model selects an
assigned neighbor in one of the above ways, samples a distance
value from the corresponding distribution, and chooses a
preference uniformly at random from the set of preferences
which are at that distance from the preference of the selected
assigned neighbor. So the time complexity of this model for
i∈N deg(i))T) =
assigning preferences for T topics is O(r!((cid:80)
O(r!mT).
3) Duplicating (RPM-D): In this model, node j is assigned
a preference by duplicating the preference of its most similar
assigned neighbor. This model pushes the similarity between
a node and its most similar assigned neighbor to the extreme
extent that, the preference to be assigned to the former is not
just similar to the latter, but is exactly its copy due to imitation.
Here, if the initializing set is a singleton, all nodes would
have the same preference (since the graph is assumed to be
connected). A small-sized initializing set also would lead to
very few distinct preferences. So as a heuristic, the initializing
set for this model is a connected set of certain size s which
is obtained using the following iterative approach: start with
a node chosen uniformly at random and then continue adding
a new node to the set uniformly at random, from among
the nodes that are connected to at
least one node in the
set. In our experiments, we choose s itself to be uniformly
n(cid:101)} (similar to the information
n(cid:101) is usually a good heuristic upper
bound for the size of the seed set). The nodes in this initializing
set are assigned preferences based on RPM-IC. The time
complexity of this model for assigning preferences for T topics
at random from {1, . . . ,(cid:100)√
diffusion setting where (cid:100)√
is O(((cid:80)
i∈N deg(i))T) = O(mT).
4) Random (RPM-R): In this model, preferences are as-
signed randomly to all
the nodes without considering the
distribution of distances from their neighbors, that is, without
taking the social network effect into account. This model
can be refined based on some known bias in preferences,
for instance, there may be a prior distribution on preferences
owing to common external effects such as mass media. Its
time complexity for assigning the preferences for T topics is
O(nT).
5) Mean Similarity Model - Shortest Path Based
(MSM-SP): Unlike the models discussed so far, this model
does not deduce the spread of preferences in a social network.
6
TABLE III
A PARTIAL VIEW OF TABLE T5
0.00
0.00
0.10
0.10
0.17
0.20
0.20
0.26
0.32
0.30
0.30
0.33
0.37
0.40
0.40
0.40
0.42
0.43
0.45
0.47
0.50
dx
dy
0.50
0.50
0.50
0.50
0.50
0.50
0.00
0.10
0.20
0.30
0.40
0.50
Instead, it deduces the mean similarity between any pair of
nodes, given the mean similarities of connected nodes.
Recall that cell (i, j) of a distance matrix contains d(i, j),
the expected distance between preferences of nodes i and j.
We initialize all values in this matrix to 0 for i = j and
to 1 (the upper bound on distance) for any unconnected pair
{i, j}. In the case of a connected pair {i, j}, the value d(i, j) is
initialized to the actual observed expected distance (this value
is known from the edge parameters indicating homophilic tie
strength). Following the initialization of the distance matrix,
the next step is to update it.
Consider nodes (i, v, j) where we know the expected dis-
tances d(v, i) and d(v, j), and we wish to find d(i, j) via
node v. Given the preference of node v and dx = d(v, i),
let the preference of node i be chosen uniformly at random
from the set of preferences that are at a distance η from the
preference of node v, where η is drawn from distribution D
with mean dx (and some standard deviation). Similarly, given
dy = d(v, j), let the preference of node j be obtained. Using
this procedure, the distance between the obtained preferences
of nodes i and j via v over several iterations and varying
values of standard deviations, was observed to follow a bell
curve; so we again approximate this distribution by D. Let the
corresponding expected distance constitute the cell (dx, dy) of
a table, say Tr, where r is the number of alternatives (for the
purpose of forming a table, we consider only finite number of
values of dx, dy). It is clear that this distance is independent
of the actual preference of node v.
r (cid:54)= r(cid:48). Following are the general properties of Tr:
We empirically observe that Tr is different from Tr(cid:48) for
• Tr(dy, dx) = Tr(dx, dy)
• Tr(1 − dx, dy) = Tr(dx, 1 − dy) = 1 − Tr(dx, dy)
• Tr(1 − dx, 1 − dy) = Tr(dx, dy)
As the topics of our app had 5 alternatives, we obtain the
table T5 for any pair {dx, dy}. In order to consider finite
number of values of dx, dy for forming the table, we only
account for values that are multiples of 0.01 (and also round
every entry in Tr to the nearest multiple of 0.01). Table III
presents a partial view of T5 which can be completed using
the general properties of Tr enlisted above; we present dx, dy
in multiples of 0.10 for brevity. Now the next question is to
find d(i, j) for any pair {i, j}. In order to provide a fit to the
distances obtained from the dataset, we initialize the distance
matrix as explained in the beginning of this subsection (while
rounding every value to the nearest multiple of 0.01) and
update it based on the all pairs shortest path algorithm [21]
with the following update rule:
if d(v, i) +(cid:13)r d(v, j) < d(i, j) then d(i, j) = d(v, i) +(cid:13)r d(v, j),
where we define operator +(cid:13)r as follows:
(cid:40)
dx +(cid:13)r dy =
Tr(dx, dy),
max{dx, dy},
if dx ≤ 0.5 and dy ≤ 0.5
if dx > 0.5 or dy > 0.5
The corresponding similarity matrix is obtained by assigning
1 − d(i, j) to its cell (i, j). The two cases while defining +(cid:13)r
ensure that d(i, j) via v is assigned a value which is at least
max{d(v, i), d(v, j)}. This is to guarantee the convergence of
the adapted all pairs shortest path algorithm.
The time complexity of deducing the mean distances be-
tween all pairs of nodes using MSM-SP is dominated by the
all pairs shortest path algorithm, O(n2 log n + nm) using Di-
jkstra's algorithm over all source nodes, where m is generally
small owing to sparsity of social networks.
Remark 1. We have already seen the time complexities of the
models (other than MSM-SP) for assigning preferences for T
topics; the time complexity of deducing the mean distances
between all pairs of nodes after that, is O(Grn2T), where
Gr is the time complexity of computing the distance between
two preferences (for instance, Gr is O(r2) for Kendall-Tau
distance, O(r) for Spearman Footrule distance).
D. Validating the Models
To validate a given model, we generated the preferences of
all the nodes for T = 104 simulated topics. Following this, we
could get the distances between preferences of every pair of
nodes in terms of normalized Kendall-Tau distance. In order to
measure the error err({i, j}) of this deduced model distribution
against the distribution D with the actual values of µij and σij
for a particular pair of nodes {i, j}, we used the following
methods:
1) Kullback-Leibler (KL) divergence, a standard way of mea-
suring error between actual and model distributions,
2) Earth Mover's distance (EMD), another measure of the
distance between two probability distributions,
3) Absolute difference between the means of these two dis-
tributions, since some of our algorithms would be working
with the distribution means,
4) Chi-Square Goodness of Fit Test, a non-parametric test
to compare the obtained distribution with the expected
probability distribution (we use significance level 0.05).
(cid:113)
For methods 1-3, we measured the total error over all
pairs of nodes as the root mean square (RMS) error, that
avg {i,j}[err({i, j})]2. Figure 2 provides a comparison
is,
among the models under study, with respect to their errors
and running times. (Note that RMS KL divergence and EMD
are not applicable for MSM-SP). RPM-IC gave the least errors
but at the cost of extremely high running time. RPM-D and
RPM-R ran fast but their errors were in a higher range. RPM-
S showed a good balance between the errors and running
time; the way of choosing the assigned neighbor (µ-based,
σ-based, or random) did not show significant effect on its
results. MSM-SP was observed to be the best model when
7
Fig. 2. Comparison among the considered models when run for 104 iterations
(or simulated topics)
FRACTION OF PAIRS FAILING CHI-SQUARE GOODNESS OF FIT TEST
TABLE IV
RPM-IC
0.001
RPM-S
RPM-D
RPM-R MSM-SP
0.02
0.96
0.99
NA
our objective was to deduce the mean distances between all
pairs of nodes, and not the preferences themselves. With 5
alternatives, the normalized Kendall-Tau distances can take 11
possible values {0, 0.1, . . . , 0.9, 1}. The upper critical value
of chi-square distribution with 10 degrees of freedom for
significance level 0.05 is 18.307. The test is failed if the chi-
square test statistic exceeds this value.
The chi-square statistic is high (punishes heavily) if the
deduced distribution allots non-negligible probability to values
which are allotted negligible probability by the actual distri-
bution. This was the case for a large fraction of pairs when
using RPM-D and for over 99% of pairs when using RPM-R,
thus leading to high fractions of failures.
Remark 2. Owing to a good balance between accuracy and
efficiency, RPM-S can be justified to be used for deducing the
preferences of nodes in a social network, with the knowledge of
preferences of a subset of nodes. However, if we need only the
deduced edge similarities for all pairs of nodes without having
to deduce the actual preferences, MSM-SP is a promising
model.
As explained in Section I-A, a model that could deduce the
preferences of all the nodes, would allow us to deduce the
actual aggregate preference of the network. This would hence
allow us to estimate how closely the aggregate preference
obtained using a set of representative nodes resembles the
actual aggregate preference. With an estimate of closeness
associated with every candidate representative set, it would
now be possible to determine a representative set with the
closest resemblance. The focus of the following sections will
be on formulating an objective function that quantifies this
closeness, and hence developing algorithms for determining
the best representative set.
RPM−ICRPM−S RPM−D RPM−R MSM−SP00.20.40.60.8NANAModelsRMS error RPM−ICRPM−S RPM−D RPM−R MSM−SP050100150200Running time (hours)RMS KL divergenceRMS EMDRMS error in meanRunning TimeIII. THE SAMPLING-BASED PREFERENCE
AGGREGATION PROBLEM
Given a network with a set of nodes N and an aggregation
rule f, our objective is to choose a set of representative nodes
M ⊆ N of certain cardinality k, and aggregate their prefer-
ences to arrive at an aggregate preference that is 'close enough'
to the aggregate preference of N using f, in expectation
(in expectation, owing to the stochastic nature of the edge
similarities). We now formalize this problem.
Let the expected distance between a set S ⊆ N and a node
i ∈ N be
d(S, i) = min
j∈S
d(j, i)
(3)
We call d(S, i) as the 'expected' distance since d(j, i) is the
expected distance between nodes j and i with respect to their
preferences. Since d(i, i) = 0,∀i ∈ N, we have d(S, j) =
0,∀j ∈ S. Let
Φ(S, i) ∼U arg min
j∈S
d(j, i)
(4)
be a node chosen uniformly at random from the set of nodes
in S that are closest in expectation to node i in terms of
preferences. We say that Φ(S, i) represents node i in set S. In
other words, Φ(S, i) is the unique representative of i in S.
A. Aggregating Preferences of Representative Nodes
Recall that preference profile is a multiset containing prefer-
ences of the nodes. Let the preference profile of the population
N be P and that of the selected representative set M be
Q. Suppose M = {i, j} where j represents, say ten nodes
including itself, while i represents one node (only itself). If
the preferences are aggregated by feeding Q to aggregation
rule f, the aggregate preference f (Q) so obtained may not
reflect the preferences of the population, in general, owing
to the asymmetry in importance of the selected nodes. So to
capture this asymmetry, their preferences must be weighted.
In our approach, the weight given to the preference of a node
is precisely the number of nodes that it represents.
Let Q(cid:48) be the preference profile obtained by replacing every
node's preference in P by its uniquely chosen representative's
preference. So, k = M = Q ≤ Q(cid:48) = P = N = n.
In our approach, the weight of a representative implies the
number of nodes it represents or equivalently, the number of
times its preference appears in the new preference profile.
the new profile Q(cid:48) consists of
So in the above example,
ten preferences of j and one of i. Thus we aggregate the
preferences of selected nodes using f (Q(cid:48)).
So the problem under consideration can be viewed as a
setting where given certain nodes representing a population,
every node in the population is asked to choose one among
them as its representative; now the representatives vote on
behalf of the nodes who chose them.
B. A Measure of 'Close Enough'
Now given k, our objective is to select a set of nodes
M such that M = k, who report their preferences such
that, in expectation, the error incurred in using the aggregate
preference, say f (R), obtained by aggregating the preferences
8
of the nodes in M (in an unweighted manner if R = Q or in
a weighted manner if R = Q(cid:48)) instead of f (P ) obtained by
aggregating the preferences of the nodes in N, is minimized.
Note that an aggregation rule f may not output a unique
aggregate preference, that is, f is a correspondence. So the
aggregation rule f on the preferences of the entire population
outputs f (P ) which is a set of preferences.
If f (R) is a set of multiple preferences, we need to have a
way to determine how close it is to f (P ). For this purpose,
we propose an extension of Kendall-Tau distance for sets of
preferences. Now, since f (P ) is generally not known and all
preferences in f (R) are equivalent in our view, we choose a
preference from f (R) uniformly at random and see how far
we are from the actual aggregate preference, in expectation.
In order to claim that a chosen preference in f (R) is a good
approximation, it suffices to show that it is close to at least
one preference in f (P ). Also, as any preference y in f (R) is
chosen uniformly at random, we define the error incurred in
using f (R) instead of f (P ) as
(cid:20)
(cid:21)
f (P ) ∆ f (R) = Ey∼U f (R)
min
x∈f (P )
d(x, y)
(5)
where d(x, y) is the distance between preferences x and y
in terms of the same distance measure as d(·,·) (normalized
Kendall-Tau distance in our case). Notice that in general,
f (P ) ∆ f (R) (cid:54)= f (R) ∆ f (P ). For instance,
if f (P ) =
{pA, pB}, f (R) = {pA}, the error is zero since we have ob-
tained an aggregate preference that is among the actual aggre-
gate preferences. On the other hand, if f (P ) = {pA}, f (R) =
{pA, pB}, there is a half probability of choosing pA which is
consistent with the actual aggregate preference, however, there
is a half probability of choosing pB which is inconsistent; this
d(pB, pA). Note that ∆ can be
results in f (P ) ∆ f (R) = 1
2
defined in several other ways depending on the application or
the case we are interested in (worst, best, average, etc.). In this
paper, we use the definition of ∆ as given in Equation (5).
Recall that the distance between a pair of nodes is drawn
from distribution D with the corresponding parameters, so
the realized values for different topics would be different in
general. The value f (P ) ∆ f (R) can be obtained for every
topic and hence the expected error E[f (P ) ∆ f (R)] can be
computed by averaging the values over all topics. It can be
easily seen that E[f (P ) ∆ f (R)] ∈ [0, 1]. Now our objective
is to find a set M such that E[f (P ) ∆ f (R)] is minimized.
C. An Abstraction of the Problem
For aggregation rule f, we define the objective function
to be F(M ) = 1 − E[f (P ) ∆ f (R)] with the objective of
finding a set M that maximizes this value. However, even if
M is given, computing F(M ) is computationally intensive
for several aggregation rules and furthermore, hard for rules
such as Kemeny. It can be seen that F(·) is not monotone
for non-dictatorial aggregation rules (the reader is referred
to Figure 3 for the non-monotonic plots of Greedy-sum and
Degree-cen algorithms since in a run of these algorithms, a
set of certain cardinality is a superset of any set having a
smaller cardinality). It can also be checked empirically that
F(·) is neither submodular nor supermodular. Even for simple
non-dictatorial aggregation rules, it is not clear if one could
efficiently find a set M that maximizes F(·), within any
constant approximation factor. This motivates us to propose
an approach that finds set M agnostic to the aggregation rule
being used. To this end, we propose a property for preference
aggregation rules, weak insensitivity.
Definition 1 (weak insensitivity property). A preference ag-
gregation rule satisfies weak insensitivity property under a
distance measure and an error operator between aggregate
preferences ∆, if and only if for any d, a change of ηi ≤ d
in the preferences of all i, results in a change of at most d
in the aggregate preference. That is, ∀d,
ηi ≤ d , ∀i ∈ N =⇒ f (P ) ∆ f (P (cid:48)) ≤ d
where P (cid:48) is the preference profile of voters after deviations.
We call it 'weak' insensitivity property because it allows
'limited' change in the aggregate preference (strong insensi-
tivity can be thought of as a property that allows no change).
This is potentially an important property that an aggregation
rule should satisfy as it is a measure of its robustness in some
sense. It is clear that under normalized Kendall-Tau distance
measure and ∆ as defined in Equation (5), an aggregation
rule that outputs a random preference does not satisfy weak
insensitivity property as it fails the criterion for any d < 1,
whereas dictatorship rule that outputs the preference of a
single voter satisfies the property trivially. For our purpose,
we propose a weaker form of this property, which we call
expected weak insensitivity.
Definition 2 (expected weak insensitivity property). A pref-
erence aggregation rule satisfies expected weak insensitivity
property under a distribution, a distance measure, and an error
operator between aggregate preferences ∆, if and only if for
any µd, a change of ηi in the preferences of all i, where
ηi is drawn from the distribution with mean δi ≤ µd and
any permissible standard deviation σd, results in an expected
change of at most µd in the aggregate preference. That is,
∀µd, ∀ permissible σd,
δi ≤ µd , ∀i ∈ N =⇒ E[f (P ) ∆ f (P (cid:48))] ≤ µd
(6)
where P (cid:48) is the preference profile of voters after deviations.
Note that in E[f (P ) ∆ f (P (cid:48))], the expectation is over the
varying modified preferences of the voters (since ηi's vary
across instances and also, there are multiple preferences at a
distance of ηi from any given preference, in general). In this
paper, we study expected weak insensitivity property under
distribution D, normalized Kendall-Tau distance, and ∆ as
defined in Equation (5). For distribution D with µd ∈ [0, 1],
the permissible range of σd depends on µd. This range is wider
for intermediate values of µd and shortens as we move towards
the extremes. In any case, the permissible range for σd cannot
≈ 0.28 (value at which the truncated Gaussian
exceed
becomes a Uniform distribution), while for µd ∈ {0, 1}, the
permissible σd = 0 (since a Gaussian distribution truncated in
[0, 1] with any non-zero standard deviation cannot have 0 or
1 as the mean).
1√
12
9
TYPICAL FRACTIONS OF SIMULATION RUNS IN WHICH THE CRITERION
TABLE V
FOR EXPECTED WEAK INSENSITIVITY WAS SATISFIED BY VARIOUS
AGGREGATION RULES UNDER DISTRIBUTION D, NORMALIZED
KENDALL-TAU DISTANCE, AND ∆ AS DEFINED
Dictatorship
Copeland
Minmax
.87
1.00
.97
Kemeny
Smith set
Plurality
.85
.998
.95
Bucklin
Schulze
Borda
.82
Veto
.997
.92
.69
2
(cid:16)r
(cid:17) (the finest resolution for the given r), and discrete
Remark 3. We conducted extensive simulations for inves-
tigating empirical satisfaction of the expected weak insen-
sitivity property by the considered aggregation rules under
distribution D, normalized Kendall-Tau distance, and ∆ as
defined in Equation (5). The simulations considered values of
r = 3, . . . , 7, n = 100, 200, . . . , 1000, different distributions
on the voter preferences, discrete values of µd separated by
1/
values of σd separated by 10% of the maximum permissible
value for the corresponding µd. For any fixed preference
profile, Table V presents typical fractions of simulation runs
in which Criterion (6) was satisfied, by various aggregation
rules. Dictatorship rule always satisfied the criterion, whereas
Smith set and Schulze rules satisfied it almost always. It was,
however, violated by Veto rule for a large fraction of simulation
runs. For all other considered rules, if (6) was violated, it
was usually for the lowest values of µd. Furthermore, in most
cases, the extent of violation was not very significant. So if µd
is not very small, these rules could be assumed to satisfy the
expected weak insensitivity property for practical purposes.
Lemma 1. Given a distance measure and a ∆, with a pref-
erence aggregation rule satisfying expected weak insensitivity
property under distribution D, if the expected distance between
every node and the representative set M is at most d ∈ [0, 1],
then the expected error incurred in using f (Q(cid:48)) instead of
f (P ) is at most d. That is, for d ∈ [0, 1],
d(M, i) ≤ d , ∀i ∈ N =⇒ E[f (P ) ∆ f (Q(cid:48))] ≤ d
Proof. In the preference profile P of all nodes, the preference
of any node i ∈ N is replaced by the preference of its repre-
sentative node p = Φ(M, i) to obtain Q(cid:48). From Equations (3),
(4), and the hypothesis, we have d(p, i) ≤ d.
Since in P , preference of every i is replaced by that of the
corresponding p to obtain Q(cid:48), and distance between i and p is
distributed according to distribution D with mean d(p, i) and
some standard deviation σd, the above is equivalent to node i
deviating its preference by some value which is drawn from
distribution D with mean d(p, i) = d(M, i). So we can map
these variables to the corresponding variables in Equation (6)
as follows: δi = d(M, i) ∀i, µd = d, and P (cid:48) = Q(cid:48). Also,
recall that in E[f (P ) ∆ f (P (cid:48))], the expectation is over varying
modified preferences of the nodes, while in E[f (P ) ∆ f (Q(cid:48))],
the expectation is over varying preferences of the nodes'
representatives in M with respect to different topics (and hence
preferences) of the nodes. These are equivalent given P (cid:48) = Q(cid:48).
As this argument is valid for any permissible σd, the result
follows.
So under the proposed model and for aggregation rules
satisfying the expected weak insensitivity property, Lemma 1
establishes a relation between (a) the closeness of the chosen
representative set
to the population in terms of expected
distance and (b) the error incurred in the aggregate preference
if that set is chosen as the representative set. We now return
to our goal of abstracting the problem of determining a
representative set, by proposing an approach that is agnostic
to the aggregation rule being used.
D. Objective Functions in the Abstracted Problem
Recall that c(·,·) = 1− d(·,·). Our objective is now to find
a set of critical nodes M that maximizes a certain objective
function, with the hope of minimizing E[f (P ) ∆ f (R)] where
R = Q(cid:48) in our case. As the aggregation rule is anonymous,
in order to ensure that the approach works well, even for
rules such as random dictatorship, the worst-case objective
function for the problem under consideration, representing
least expected similarity, is
c(S, i)
ρ(S) = min
i∈N
(7)
The above is equivalent to: maxi∈N d(S, i) = 1 − ρ(S). Thus
d = 1 − ρ(S) in Lemma 1, and so this objective function
offers a guarantee on E[f (P ) ∆ f (Q(cid:48))] for aggregation rules
satisfying the expected weak insensitivity property. We will
provide a detailed analysis for the performance guarantee of
an algorithm that aims to maximize ρ(S), in Section IV-B.
Now the above worst-case objective function ensures that
our approach works well even for aggregation rules such
as random dictatorship. However, such extreme aggregation
rules are seldom used in real-world scenarios; hence, another
surrogate objective function, representing average expected
similarity, or equivalently sum of expected similarities, is
(cid:88)
i∈N
ψ(S) =
c(S, i)
(8)
We will look into the desirable properties of an algorithm that
aims to maximize ψ(S), in Section IV-C.
We now turn towards the problem of maximizing the above
two surrogate objective functions.
Proposition 1. Given constants χ and ω,
(a) it is NP-hard to determine whether there exists a set M
consisting of k nodes such that ρ(M ) ≥ χ, and
(b) it is NP-hard to determine whether there exists a set M
consisting of k nodes such that ψ(M ) ≥ ω.
We provide a proof of Proposition 1 in Appendix B. A
function h(·) is said to be submodular if, for all v ∈ N \ T
and for all S, T such that S ⊂ T ⊂ N,
h(S ∪ {v}) − h(S) ≥ h(T ∪ {v}) − h(T )
Proposition 2. The objective functions ρ(·) and ψ(·) are non-
negative, monotone increasing, and submodular.
We provide a proof of Proposition 2 in Appendix C. For
a non-negative, monotone increasing, and submodular func-
tion, the greedy hill-climbing algorithm (selecting elements
10
one at a time, each time choosing an element that provides
the largest marginal increase in the function value), gives a
e ) ≈ 0.63-approximation to the optimal solution [22].
(1 − 1
As the considered objective functions in Equations (7) and
(8) satisfy these properties, we use the greedy hill-climbing
algorithm to obtain a good approximation to the optimal
solution. Moreover, as desired, the functions are agnostic to
the aggregation rule being used.
We next devise algorithms for finding a representative set,
present their performance with the aid of extensive experimen-
tation, and provide detailed analysis of the results.
IV. SELECTION OF THE REPRESENTATIVE SET:
ALGORITHMS AND PERFORMANCE
Recall that the preference profile of N is P , that of M is
Q, and that obtained by replacing every node's preference in
P by that of its uniquely chosen representative in M, is Q(cid:48).
Given the number of nodes to be selected k, our objective is to
find a set M of size k such that E[f (P ) ∆ f (R)] is minimized,
where R = Q(cid:48) or Q depending on the algorithm.
A. Algorithms for Finding Representatives
We now describe the algorithms we consider in our study.
• Greedy-orig (Greedy hill-climbing for maximizing 1 −
E[f (P ) ∆ f (Q(cid:48))]): Initialize M to {}. Until M = k,
choose a node j ∈ N \M that minimizes the expected error
or equivalently, maximizes 1 − E[f (P ) ∆ f (Q(cid:48)
M )], where
Q(cid:48)
M is the preference profile obtained by replacing every
node's preference in P by the preference of its uniquely
chosen representative in M. Note that the optimal set would
depend on the aggregation rule f. Its time complexity for
obtaining M and hence R is O(knTf ), where Tf is the time
complexity of obtaining an aggregate preference using the
aggregation rule f. For instance, Tf is O(rn) for plurality,
O(1) for dictatorship.
• Greedy-sum (Greedy hill-climbing for maximizing ψ(·)):
Initialize M to {}. Until M = k, choose a node j ∈ N\M
that maximizes ψ(M ∪{j})− ψ(M ). Then obtain f (R) =
f (Q(cid:48)). If the similarity matrix is known, its time complexity
for obtaining M and hence R is O(kn2). If the similarity
matrix is unknown, the time complexity for deriving it is
largely decided by the model used for deducing the mean
distances between all pairs of nodes.
• Greedy-min (Greedy hill-climbing for maximizing ρ(·)):
Similar to Greedy-sum, with ρ(·) instead of ψ(·).
• Between-cen (Betweenness centrality heuristic): Choose k
nodes having the maximum values of Freeman's between-
ness centrality (edge weights being dissimilarities). Then
obtain f (R) = f (Q). Its time complexity for obtaining M
is O(nm + n2 log n).
• Degree-cen (Degree centrality heuristic): Choose k nodes
having the maximum weighted degrees (edge weights being
similarities). Then obtain f (R) = f (Q). Its time complex-
ity for obtaining M is O(nk + n log n).
• Random-poll (Random polling): Choose k nodes uniformly
at random. Then obtain f (R) = f (Q). It is an important
baseline, since it is the most employed method in practice.
Also, it has been claimed in the literature that it is optimal
to ignore the social network [12] and that random node
selection performs well in practice [17].
• Other centrality measures (PageRank, Katz, eigenvector):
In a weighted network like the one under study, the sum of
weights of edges adjacent on a node could exceed 1. So the
edge weights are required to be attenuated for computing
these measures. For instance, while employing PageRank,
the edges need to be converted to directed edges [23]
(perhaps by adding self loops as well) and reweighed so
that the outgoing edge weights from any node, sum to 1.
Katz centrality involves a parameter α which is required to
be less than the reciprocal of the largest eigenvalue of the
weighted adjacency matrix, thus effectively reweighing the
weights of the walks.
In all algorithms, the time complexity of computing f (R)
depends on the aggregation rule f. For dictatorship, if the
dictator is not in M, Random-poll outputs the preference of
a node in M chosen uniformly at random, else it outputs the
dictator's preference; other algorithms output the preference of
the dictator's representative in M. We now present desirable
properties of Greedy-min and Greedy-sum algorithms.
B. Performance Guarantee for Greedy-min Algorithm
Here, we show the performance guarantee of Greedy-min.
Theorem 1. For an aggregation rule satisfying expected
weak insensitivity, the error incurred in using the aggregate
preference given by the Greedy-min algorithm instead of the
actual aggregate preference,
where ρ∗ = maxS⊆N,S≤k ρ(S).
Proof. Let SG be a set obtained using greedy hill-climbing
algorithm for maximizing ρ(·). Since greedy hill-climbing
(cid:1) ρ∗(cid:1),
(cid:1)-approximation to the optimal solution, we
is at most (cid:0)1 −(cid:0)1 − 1
provides a(cid:0)1 − 1
e
e
have
(cid:18)
(cid:19)
∗
ρ
c(SG, i) ≥
ρ(SG) = min
i∈N
d(SG, i) ≥
=⇒ 1 − max
i∈N
d(SG, i) ≤ 1 −
=⇒ max
i∈N
=⇒ d(SG, i) ≤ 1 −
(cid:18)
1 − 1
e
∗
ρ
(cid:19)
(cid:19)
∗
ρ
(cid:18)
(cid:18)
1 − 1
e
1 − 1
e
∗
(cid:19)
ρ
1 − 1
e
, ∀i ∈ N
For an aggregation rule satisfying expected weak insensi-
tivity property, from Lemma 1, when the representative set
M = SG, we have E[f (P ) ∆ f (Q(cid:48))] ≤ 1 −(cid:0)1 − 1
(cid:1) ρ∗.
e
It is to be noted that, though the approximation ratio given
by the greedy algorithm is modest in theory, it has been
observed in several domains that its performance is close to
optimal in practice when it comes to optimizing non-negative,
monotone increasing, submodular functions.
C. A Cooperative Game Theoretic Viewpoint of Greedy-sum
Algorithm
11
to maximize the objective function ψ(S) = (cid:80)
i∈N c(i, j) or equivalently(cid:80)
that maximizes(cid:80)
(cid:80)
function ν(S) = (cid:80)
Shapley value is known to act as a good measure for
node selection problems in social networks, particularly that
of influence maximization [24], [25]. We have seen that,
i∈N c(S, i),
the greedy hill-climbing algorithm first chooses a node j
i∈N,i(cid:54)=j c(i, j)
(since c(j, j) = 1,∀j). It has been shown in [26] that
i∈N,i(cid:54)=j c(i, j) is the Shapley value of player j, in a convex
Transferable Utility (TU) game (N, ν) with the characteristic
i,j∈S,i(cid:54)=j c(i, j). This characteristic func-
tion can be viewed as an indication of how tightly knit a group
is, or how similar the members of a set S are to each other.
Let φ(ν), N u(ν), Gv(ν), τ (ν) be Shapley value, Nucleolus,
Gately point, τ-value of the TU game (N, ν).
Theorem 2. For
the TU game defined by ν(S) =
i,j∈S,i(cid:54)=j c(i, j), φ(ν) = N u(ν) = Gv(ν) = τ (ν).
We provide a proof of Theorem 2 in Appendix D. So
the Greedy-sum algorithm aims to maximize a term that is
unanimously suggested by several solution concepts for a TU
game capturing the similarities within a set. In other words,
the solution concepts unanimously suggest that the first node
chosen by the Greedy-sum algorithm, is on average most
similar to different subsets of the population.
(cid:80)
D. Experimental Observations
After obtaining the representative set using the aforemen-
tioned algorithms, we tested their performance on T = 104
topics or preference profiles generated using the RPM-S model
(with the assigned neighbor chosen in a random way) on
our Facebook data. Owing to the nature of the Random-poll
algorithm, we ran it sufficient number of times to get an
independent representative set each time, and then defined the
performance as the average over all the runs. The values of
E[f (P ) ∆ f (R)] were computed using extensive simulations
with the considered aggregation rules.
We observed that for any node i, in all algorithms except
Random-poll, the candidate set arg minj∈S d(j, i) (see Equa-
tion (4)) was a singleton for low values of k. For higher values
of k (higher than 7), the number of candidates were usually
less than or equal to 4, with a maximum of 10 for k = 50
in one instance. We thus ran the experiments several times;
we observed that changes in the error plots were not very
significant. Also, the aggregate preferences f (P ) and f (R)
both consisted of one preference in almost all the runs, so the
error E[f (P ) ∆ f (R)] was equivalent to Kendall-Tau distance
between the actual aggregate preference and the obtained
aggregate preference (see Equation (5)).
Figure 4(a) shows the plots for the worst case of Random
Dictatorship, that is, when the randomly chosen dictator is the
most dissimilar to the chosen representative set. Greedy-min
performed the best owing to it ensuring that no node in the
network is very dissimilar to the chosen representative set. The
error for Greedy-orig could not be plotted since the objective
function cannot be computed in this case.
12
unacceptable. The variance was acceptable for higher values
of k. One reason for its performance being not very bad on
average could be the low standard deviation of the mean
distances (see Section II-B).
• Performance of Between-cen. Between-cen lagged behind
Greedy-sum when the size of the representative set was
small. However, it performed at par with or at times better
when the size of the representative set was moderate to high.
Both Between-cen and Greedy-sum are based on the idea
of shortest paths, albeit with different additive operators
(simple addition in case of Between-cen versus MSM-SP in
case of Greedy-sum) and with the difference that Between-
cen concerns intermediary nodes and Greedy-sum concerns
end nodes.
• Performance of Degree-cen. Degree-cen showed a per-
fect balance between performance and running time. This
demonstrates that high degree nodes indeed serve as good
representatives of the population.
• Performance of other centrality measures. Centrality
included in the plots) such as Katz and
measures (not
eigenvector (belonging to the Bonanich family) as well
as PageRank performed almost at par with Between-cen
for most values of k. Katz and eigenvector centralities,
in particular, selected representative nodes which often
were neighbors of each other; this is intuitively undesirable
for the problem of sampling representatives which should
ideally represent different parts of the network. Also, as
discussed earlier, these measures reweigh edges, which may
be detrimental to their performance.
• Non-monotonicity of error plots. The error plot need not
be monotone decreasing with the representative set, that
is, adding a node to a representative set need not reduce
the error. For example, let s1 be the selected representative
node for k = 1, and s2 be the node added when k = 2.
If we aggregate preferences of the representative nodes in
an unweighted way, it is clear that if s1 is truly a good
representative of almost the entire population and s2 is a
good representative of only a section of the population,
weighing their preferences equally (R = Q) would lead
to more error than considering s1 alone (with k = 1).
This is precisely the reason why we employed the method
of weighing their preferences differently while aggregating
their preferences. Weighing their preferences proportional
to the number of nodes they represent (R = Q(cid:48)) based on
the deduced similarity matrix, was used as only a heuristic
and so does not guarantee that the error would reduce with
an increasing k.
• Role of social network. We observe that algorithms which
consider the underlying social network perform better than
random polling, implying that the network plays a role and
should be considered while determining representatives. We
next provide a more detailed insight.
Fig. 3. Comparison among algorithms for Plurality aggregation rule
The plots for all non-dictatorial aggregation rules were
similar (albeit with different scaling) to the ones plotted in
Figure 3. Our key observations are as follows:
• Performance of Greedy-orig. Greedy-orig performed the
best throughout, however it had unacceptably high running
time (order of days) even for computationally fast aggrega-
tion rules such as plurality; so it is practically infeasible to
run this algorithm for computationally intensive rules, for
example, Kemeny.
• Performance of Greedy-sum. Greedy-sum performed very
well; but its plots displayed non-monotonicity especially in
the lower range of k, and so a higher k might not always
lead to a better result. Greedy-sum, with MSM-SP as a
precursor, attempts to find nodes which are closest to other
nodes on average, where closeness is based on the similarity
deduced using adaptation of the shortest path algorithm
(as described in Section II-C5). This is on similar lines as
finding influential nodes for diffusing information, which
would lead to other nodes being influenced with maximum
probabilities on average.
• Performance of Greedy-min. Greedy-min performed bet-
ter than Random-poll for low values of k; this difference
in performance decreased for higher values of k. The effect
of satisfaction or otherwise of expected weak insensitivity
was not very prominent, because the property is not violated
by an appreciable enough margin for any aggregation rule.
Nonetheless, the expected weak insensitivity property does
provide a guarantee on the performance of Greedy-min for
an aggregation rule.
• Performance of Random-poll. As mentioned earlier, the
performance of Random-poll is based on an average over
several runs; the variance in performance was very high
for low values of k, and the worst case performance was
110203040500.30.350.40.450.5Number of representative nodes (k) E[ f(P) ∆ f(R)] Greedy−origGreedy−sumGreedy−minBetween−cenDegree−cenRandom−poll13
(a) Random Dictatorship (worst case)
(b) Plurality (Personal topics)
(c) Plurality (Social topics)
Fig. 4. Comparison among algorithms under other settings
E. Personal versus Social Topics
We have focused on aggregating preferences across all
topics, without classifying them into different types. Now, we
provide a preliminary analysis of personal versus social type
of topics. It is to be noted that the model fitting (as discussed
in Section II-B) was employed based on only four topics of
each type that were available from our Facebook data. So
the obtained results (Figures 4(b-c)) are provided with low
confidence, but have qualitative implications.
All the algorithms showed relatively low errors for social
topics. Random-poll performed very well on average for
sufficiently high values of k. This could be attributed to a
lower average mean distance for social topics (0.30), resulting
in nodes being more similar to each other; so nodes chosen
at random are likely to be more similar to most other nodes.
However, it performed badly while aggregating preferences
with respect to personal topics, which has a higher standard
deviation (0.12) and also a higher average mean distance
(0.40). Also, the variance in performance of Random-poll was
unacceptably high for lower values of k, but acceptable for
higher values. So though the usage of Random-poll seems
undesirable in general, it is justified for social topics with a
reasonable sample size.
A high level of similarity between unconnected nodes with
respect to social topics could be attributed to the impact of
news and other common channels. It may also be justified
by a theory of political communication [27] which stresses
the importance of citizen discussion beyond the boundaries of
cohesive groups for the dissemination of public opinion.
V. CONCLUSION
This paper focused on two subproblems with respect to
preference aggregation in social networks, namely, (a) how
preferences are spread and (b) how to determine the best
set of representative nodes. We started by motivating both
these problems. Based on our Facebook dataset, we developed
a number of simple and natural models, of which RPM-S
showed a good balance between accuracy and running time;
while MSM-SP was observed to be the best model when our
objective was to deduce the mean distances between all pairs
of nodes, and not the preferences themselves.
We formulated an objective function for representative-set
selection and followed it up with two surrogate objective
functions for practical usage. We then proposed algorithms
for selecting best representatives, wherein we provided a
guarantee on the performance of the Greedy-min algorithm,
subject to the aggregation rule satisfying the expected weak
insensitivity property; we also studied the desirable properties
of the Greedy-sum algorithm. We also observed that degree
centrality heuristic performed very well, thus showing the
ability of high-degree nodes to serve as good representatives
of the population. Our preliminary analysis also suggested that
selecting representatives based on social network is advanta-
geous for aggregating preferences related to personal topics,
while random polling with a reasonable sample size is good
enough for aggregating preferences related to social topics.
A. Future Work
It is intuitive that the network structure would affect the ease
of sampling best representatives and how well they represent
the population. For instance, a tightly-knit network would
likely consist of nodes with similar preferences, thus requiring
a small number of representatives, while a sparse network
would require a higher number. A network with a larger
diameter also would require a higher number of representatives
distributed across the network. For a network in which there
exist natural communities, we could have representatives from
each community and the number of representatives from a
community would depend on the size of the community. In
general, a good representative set would consist of nodes
distributed over the network, so that they represent different
sections of the network. Hence it would be interesting to study
how the network structure influences the ease of determining
representative set and its effectiveness.
Network compression techniques could be considered for
solving the studied problem;
the preferences with respect
to a number of topics over their sets of alternatives, could
be viewed as constituting the state of a node. Some of the
relevant
techniques that could be useful are efficient data
representations for large high-dimensional data [28] using
spectral graph theory and graph Laplacian [29], multiple
transforms for data indexed by graphs [30], etc. Furthermore,
with the emergence of online social networks, it is possible to
110203040500.30.40.50.60.70.8Number of representative nodes (k) E[ f(P) ∆ f(R)] Greedy−sumGreedy−minBetween−cenDegree−cenRandom−poll110203040500.350.40.450.50.550.60.65Number of representative nodes (k) E[ f(P) ∆ f(R)] Greedy−origGreedy−sumGreedy−minBetween−cenDegree−cenRandom−poll110203040500.20.250.30.35Number of representative nodes (k) E[ f(P) ∆ f(R)] Greedy−origGreedy−sumGreedy−minBetween−cenDegree−cenRandom−pollobtain detailed attributes and interests of a node based on its
public profile, liked pages, followed events and personalities,
shared posts, etc. Network compression techniques could be
used for arriving at a concise set of attributes and nodes, for
representing network data.
We believe the expected weak insensitivity property intro-
duced in this paper, could be of interest to the social choice
theory community and has a scope of further study. It will also
be interesting to study how one should weigh the preferences
of the nodes in a representative set, so that the error is a
monotone decreasing function of the set. One could consider
the scenario when nodes are strategic while reporting their
preferences. Alternative models for the spread of preferences
in a network, given the edge similarities, could be studied.
Considering the attributes of nodes and alternatives [20] in
addition to the underlying social network for determining the
best representatives, is another direction worth exploring.
ACKNOWLEDGMENTS
The original version of this paper is accepted for publication
in IEEE Transactions on Network Science and Engineering
(DOI 10.1109/TNSE.2017.2772878). A previous version of
this paper is published in First AAAI Conference on Human
Computation and Crowdsourcing [31]. This research was in
part supported by an unrestricted research grant from Adobe
Labs, Bangalore. We thank Balaji Srinivasan and his team for
helpful discussions. The first author was supported by IBM
Doctoral Fellowship when most of this work was done. Thanks
to Akanksha Meghlan, Nilam Tathawadekar, Cressida Hamlet,
Marilyn George, Aiswarya S., and Chandana Dasari, Mani
Doraisamy, Tharun Niranjan, and Srinidhi Karthik B. S., for
helping us with the Facebook app. Thanks to Prabuchandran
K. J. for useful discussions. Many thanks to Google India,
Bangalore (in particular, Ashwani Sharma) for providing us
free credits for hosting our app on Google App Engine. Also
thanks to several of our colleagues for their useful feedback
on the app. We thank the anonymous reviewers for their useful
and insightful comments, which led to improvements across
all sections of the paper.
REFERENCES
[1] D. Easley and J. Kleinberg, Networks, Crowds, and Markets: Reasoning
About a Highly Connected World. Cambridge Univ Press, 2010.
[2] M. McPherson, L. Smith-Lovin, and J. M. Cook, "Birds of a feather:
Homophily in social networks," Annual Review of Sociology, vol. 27,
no. 1, pp. 415–444, 2001.
[3] R. Xiang, J. Neville, and M. Rogati, "Modeling relationship strength
in online social networks," in 19th International Conference on World
Wide Web (WWW). ACM, 2010, pp. 981–990.
[4] F. Brandt, V. Conitzer, and U. Endriss, "Computational social choice,"
www.cs.duke.edu/~conitzer/comsocchapter.pdf, 2013.
[5] C. A. Sheingold, "Social networks and voting: the resurrection of a
research agenda," American Sociological Review, vol. 38, no. 6, pp.
712–720, 1973.
[6] P. Burstein, "Social networks and voting: Some Israeli data," Social
Forces, vol. 54, no. 4, pp. 833–847, 1976.
[7] P. Nieuwbeerta and H. Flap, "Crosscutting social circles and political
choice: Effects of personal network composition on voting behavior in
The Netherlands," Social Networks, vol. 22, no. 4, pp. 313–335, 2000.
[8] S. D. McClurg, "The electoral relevance of political talk: Examining
disagreement and expertise effects in social networks on political par-
ticipation," American Journal of Political Science, vol. 50, no. 3, pp.
737–754, 2006.
14
[9] A. S. Zuckerman, The Social Logic of Politics: Personal Networks as
Contexts for Political Behavior. Temple University Press, 2005.
[10] P. A. Beck, R. J. Dalton, S. Greene, and R. Huckfeldt, "The social
calculus of voting: Interpersonal, media, and organizational influences
on presidential choices," American Political Science Review, vol. 96,
no. 1, pp. 57–73, 2002.
[11] D. Campus, G. Pasquino, and C. Vaccari, "Social networks, political
discussion, and voting in Italy: A study of the 2006 election," Political
Communication, vol. 25, no. 4, pp. 423–444, 2008.
[12] V. Conitzer, "Should social network structure be taken into account in
elections?" Mathematical Social Sciences, vol. 64, no. 1, pp. 100–102,
2012.
[13] D. Acemoglu and A. Ozdaglar, "Opinion dynamics and learning in social
networks," Dynamic Games and Applications, vol. 1, no. 1, pp. 3–49,
2011.
[14] J. Lorenz, "Continuous opinion dynamics under bounded confidence: A
survey," International Journal of Modern Physics C, vol. 18, no. 12, pp.
1819–1838, 2007.
[15] P. Hu and W. C. Lau, "A survey and taxonomy of graph sampling,"
arXiv preprint arXiv:1308.5865, 2013.
[16] M. Granovetter, "Network sampling: Some first steps," American Jour-
nal of Sociology, vol. 81, no. 6, pp. 1287–1303, 1976.
[17] J. Leskovec and C. Faloutsos, "Sampling from large graphs," in 12th
ACM International Conference on Knowledge Discovery and Data
Mining (SIGKDD). ACM, 2006, pp. 631–636.
[18] J. Tang, C. Zhang, K. Cai, L. Zhang, and Z. Su, "Sampling representative
users from large social networks," in Twenty Ninth AAAI Conference on
Artificial Intelligence. AAAI, 2015, pp. 304–310.
[19] K. Sun, D. Morrison, E. Bruno, and S. Marchand-Maillet, "Learning
representative nodes in social networks," in Pacific-Asia Conference on
Knowledge Discovery and Data Mining. Springer, 2013, pp. 25–36.
[20] H. A. Soufiani, D. C. Parkes, and L. Xia, "Preference elicitation for
general random utility models," in 29th Conference on Uncertainty In
Artificial Intelligence (UAI). AUAI Press, 2013, pp. 596–605.
[21] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction
to Algorithms. MIT press, 2009.
[22] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher, "An analysis of ap-
proximations for maximizing submodular set functions-I," Mathematical
Programming, vol. 14, no. 1, pp. 265–294, 1978.
[23] W. Chen, C. Wang, and Y. Wang, "Scalable influence maximization for
prevalent viral marketing in large-scale social networks," in 16th ACM
SIGKDD international conference on Knowledge discovery and data
mining. ACM, 2010, pp. 1029–1038.
[24] R. Narayanam and Y. Narahari, "A shapley value-based approach to
discover influential nodes in social networks," IEEE Transactions on
Automation Science and Engineering, vol. 8, no. 1, pp. 130–147, 2011.
[25] T. P. Michalak, K. V. Aadithya, P. L. Szczepanski, B. Ravindran, and
N. R. Jennings, "Efficient computation of the Shapley value for game-
theoretic network centrality," Journal of Artificial Intelligence Research,
vol. 46, pp. 607–650, 2013.
[26] V. K. Garg, Y. Narahari, and M. Narasimha Murty, "Novel biobjective
clustering (BiGC) based on cooperative game theory," IEEE Transac-
tions on Knowledge and Data Engineering, vol. 25, no. 5, pp. 1070–
1082, 2013.
[27] R. Huckfeldt, P. A. Beck, R. J. Dalton, and J. Levine, "Political
environments, cohesive social groups, and the communication of public
opinion," American Journal of Political Science, vol. 39, no. 4, pp. 1025–
1054, 1995.
[28] M. Belkin and P. Niyogi, "Laplacian eigenmaps for dimensionality
reduction and data representation," Neural computation, vol. 15, no. 6,
pp. 1373–1396, 2003.
[29] F. R. Chung, Spectral graph theory. American Mathematical Soc.,
1997, vol. 92.
[30] A. Sandryhaila and J. M. Moura, "Discrete signal processing on graphs,"
IEEE Transactions on Signal Processing, vol. 61, no. 7, pp. 1644–1656,
2013.
[31] S. Dhamal and Y. Narahari, "Scalable preference aggregation in social
networks," in First Conference on Human Computation & Crowdsourc-
ing (HCOMP). AAAI, 2013, pp. 42–50.
[32] P. Diaconis and R. L. Graham, "Spearman's footrule as a measure of
disarray," Journal of the Royal Statistical Society. Series B (Methodolog-
ical), pp. 262–268, 1977.
[33] Y. Chun and T. Hokari, "On the coincidence of the Shapley value and the
nucleolus in queueing problems," Seoul Journal of Economics, vol. 20,
no. 2, pp. 223–238, 2007.
[34] P. D. Straffin, Game Theory and Strategy. Mathematical Association
of America, 1993, vol. 36.
APPENDIX A
DESCRIPTION OF THE FACEBOOK APP
A. Overview
Online social networking sites such as Facebook, Twitter,
and Google+ are highly popular in the current age; for
instance, Facebook has over 2 billion monthly active users
as of 2017. Using such online social networking sites for data
collection has become a trend in several research domains.
When given permission by a user, it is easy to obtain access to
the user's friend list, birthday, public profile, and other relevant
information using Facebook APIs. Furthermore, Facebook
provides a facility to its users to invite their friends to use any
particular application, and hence propagate it. Owing to these
reasons, in order to obtain the data for our purpose, we de-
veloped a Facebook application titled The Perfect Representer
for eliciting the preferences of users over a set of alternatives
for a wide range of topics, as well as to obtain the underlying
social network. Once a user logged into the app, the welcome
page as shown in Figure 5 was presented, which described to
the user what was to be expected from the app.
First, the user would have to give his/her preferences over
5 alternatives for 8 topics, using a drag'n'drop interface as
shown in Figure 6. The user was given the option of skipping
any particular topic if he/she wished to. The topics, which
were broadly classified into personal and social types, and their
alternatives are listed in Table VI (the ordering of alternatives
from top to bottom is based on the aggregate preference
computed from our data as per the Borda count aggregation
rule). From a user's viewpoint, the app gave the user a social
centrality score out of 10, telling how well the user represents
the society or how well the user's opinions are aligned with
that of the society with respect to the provided preferences.
The score was dynamic and kept on updating as more users
used the app (since the aggregate preference itself kept on
updating); this score could be posted on the user's timeline.
The user also had an option of viewing how similar his/her
preferences were to his/her selected friends. Explicit incentives
were provided for users to propagate the app either by inviting
their friends or sharing on their timelines as well as messaging
through emails and popular websites (Figure 7).
To host our application, we used Google App Engine, which
provides a Cloud platform for facilitating large number of hits
at any given time as well as large and fast storage.
B. The Scores
Let A be the set of alternatives and r = A. Let c(p, q)
be the similarity between preferences p and q. In our app, we
implement c(p, q) to be the normalized Footrule similarity as
a computationally efficient approximation [32] to normalized
Kendall-Tau similarity (which is used throughout our study)
for scoring the users in real-time; the normalized Kendall-Tau
a denote the position
similarities are computed offline. Let wp
of alternative a in preference p. The Footrule distance between
a∈A wp
a−wq
a. With r being
the number of alternatives, it can be shown that the maximum
2(cid:99). So the normalized
2(cid:101)(cid:98) r
possible Footrule distance is 2(cid:100) r
preferences p and q is given by(cid:80)
15
Fig. 5. Screenshot of the welcome page
Fig. 6. Screenshot of a page with topics and their alternatives
Footrule distance between preferences p and q can be given
by
(cid:80)
a − wq
a∈A wp
a
2(cid:100) r
2(cid:101)(cid:98) r
2(cid:99)
d(p, q) =
and normalized Footrule similarity by c(p, q) = 1 − d(p, q).
For example, the normalized Footrule similarity between
preferences p = (A, B, C, D, E) and q = (B, E, C, A, D) is
c(p, q) =
1 − 1−4+2−1+3−3+4−5+5−2
(cid:16)
(cid:17)
3.
= 1
2(cid:100) 5
2(cid:101)(cid:98) 5
2(cid:99)
1) Social Centrality Score - How Perfectly you Represent
the Society?: Let pit be the preference of node i for topic
t, and pAt be the aggregate preference of the population for
topic t. For the purpose of our app's implementation, we
obtain the aggregate preference using the Borda count rule.
For computing the social centrality, we give each topic t, a
weight proportional to nt (the number of users who have given
their responses for that topic). So the fractional score of user
i is given by(cid:80)
(cid:17)
(cid:16) nt(cid:80)
t
t nt
c(pit, pAt).
16
TOPICS AND ALTERNATIVES IN THE FACEBOOK APP
TABLE VI
Hangout
Place
Friend's place
Adventure Park
Trekking
Mall
Historical Place
Personal
Chatting
App
WhatsApp
Facebook
Hangouts
SMS
Skype
Facebook
Activity
Viewing Posts
Chatting
Posting
Games/Apps
Marketing
Lifestyle
Intellectual
Exercising
Social activist
Lavish
Smoking
Website
visited
Google
Facebook
Youtube
Wikipedia
Amazon
Government
Investment
Education
Agriculture
Infrastructure
Military
Space explore
Social
Serious
Crime
Rape
Terrorism
Murder
Corruption
Extortion
Leader
N. Modi (India)
B. Obama (USA)
D. Cameron (UK)
V. Putin (Russia)
X. Jinping (China)
C. The Incentive Scheme
A typical active Facebook user uses several apps in a given
span of time, and invites his/her friends to use it depending
on the nature of the app and the benefits involved. In order to
ensure a larger reach, it was important to highlight the benefits
of propagating our app. We achieved this by designing a
simple yet effective incentive scheme for encouraging users to
propagate the app by sharing it on their timelines and inviting
their friends to use it.
We incorporated a points system in our app, where suitable
points were awarded on a daily, weekly, as well as on an
overall basis, for spreading the word about the app through
shares, invites, likes, etc. Bonus points were awarded when a
referred friend used the app through the link shared by the
user. To ensure competitiveness in sharing and inviting, the
daily and weekly 'top 10' point collectors were updated in
real-time and the winners were declared at 12 noon GMT
(daily) and Mondays 12 noon GMT (weekly). A cutoff was
set on the number of points to be eligible to get a prize. Users
were also given a chance to win a big prize through daily,
weekly, and bumper lucky draws, if they crossed a certain
amount of points, so that users with less number of friends
could also put their effort even though they did not have a
chance to make it into the 'top 10'. Prizes were awarded in
the form of gift coupons so that getting the prize was in itself,
quick as well as hassle-free for the users.
The points structure as well as the links to invite, like, and
share were provided on the scoring page (Figure 7), giving
the users a clear picture of how to earn points and win prizes.
The lists of daily and weekly winners were displayed on the
welcome page and the scoring page.
D. Preprocessing of the Obtained Dataset
The obtained dataset consisted of 1006 nodes and 7112
edges. Figure 8 shows the network of app users and Table
VII shows some user statistics. It was necessary to preprocess
the data before using it for model-fitting. For instance, we
eliminated nodes which provided responses to fewer than 6
topics so as to consider only those nodes which responded to
sufficient number of topics. Further, in order to observe the
network effect, it was necessary that all nodes belonged to the
same component; so we considered only the giant component
which consisted of 844 nodes and 6129 edges.
The obtained network is a subgraph of nodes who have
used the Facebook app to give their preferences for the asked
topics. The users had the option of inviting their friends to
Fig. 7. Screenshot of the sharing and scoring page
A primary drawback of standard measures such as Kendall-
Tau or Footrule distance is the way distances between prefer-
ences themselves are distributed. For instance, there are several
preferences which are at a distance of, say 0.5, from a given
preference as compared to those at a distance of, say 0.3,
which leads to a bias in distances to be concentrated in the in-
termediate range. Since the distance between two preferences
(here, user preference and the aggregate preference) for most
topics would be concentrated in the intermediate range, a user
would seldom get a very high or a very low score. A mediocre
score would, in some sense, act as a hurdle in the way of user
sharing the post on his/her timeline. So to promote posting
their scores, we used a simple boosting rule (square root) and
then enhanced it to the nearest multiple of 0.5, resulting in the
final score of
(cid:39)
(cid:38)
1
2
20
(cid:115)(cid:88)
(cid:18) nt(cid:80)
t
t nt
(cid:19)
c(pit, pAt)
(out of 10).
2) How Perfectly you Represent your Friends?: Once a
user selected a list of friends to see how similar they are to
the user, the app would give the similarity for each friend in
terms of percentage. This similarity was also a function of
the number of common questions they responded to. So the
similarity between nodes i and j in terms of percentage was
given by
(cid:18)(cid:80)
(cid:19)
(cid:80)
t 1
t c(pit, pjt)
100
where c(pit, pjt) = 0 if either i or j or both did not respond
to topic t.
17
APPENDIX B
PROOF OF PROPOSITION 1
Proposition 1. Given constants χ and ω,
(a) it is NP-hard to determine whether there exists a set M
consisting of k nodes such that ρ(M ) ≥ χ, and
(b) it is NP-hard to determine whether there exists a set M
consisting of k nodes such that ψ(M ) ≥ ω.
Proof. We reduce an NP-hard Dominating Set problem in-
stance to the problem under consideration. Given a graph G of
n vertices, the dominating set problem is to determine whether
there exists a set D of k vertices such that every vertex not
in D, is adjacent to at least one vertex in D.
Given a dominating set problem instance, we can construct
a weighted undirected complete graph H consisting of the
same set of vertices as G such that, the weight c(i, j) of an
edge (i, j) in H is some high value (say 0.9) if there is edge
(i, j) in G, else it is some low value (say 0.6).
Now there exists a set D of k vertices in G such that the
distance between any vertex in G and any vertex in D is at
most one, if and only if there exists a set M of k vertices in
H such that ρ(M ) ≥ 0.9 or ψ(M ) ≥ k + 0.9(n − k). Here
χ = 0.9 and ω = k + 0.9(n − k). This shows that the NP-
hard dominating set problem is a special case of the problems
under consideration, hence the result.
Fig. 8. Network of the app users
TABLE VII
APP USER STATISTICS
Attribute
Age
Location
Gender
Value
13-18
19-21
22-24
25-28
29-32
33-40
41-50
51-70
Indeterminate
North America
Europe
Middle east
India
East Asia
Australia
Indeterminate
Male
Female
Indeterminate
Count
25
120
291
272
58
37
14
12
15
44
18
12
749
8
5
8
565
269
10
use the app and sharing their app social centrality scores on
their timelines, and were provided incentives for the same.
It is well known that users generally use an app suggested
by their close friends and also invite their close friends to
use an app. Similarly, the social centrality posts shared by
users are more likely to be viewed and clicked on by their
close friends. We observed that connected nodes had mean
dissimilarity (= avg (i,j)∈E d(i, j)) of 0.24 and unconnected
nodes had mean dissimilarity of 0.37. Due to the way that the
app usage is propagated, it is likely for most nodes to have
their close friends included in the network. This is an intuition
behind the observed homophily in the obtained network.
APPENDIX C
PROOF OF PROPOSITION 2
Proposition 2. The objective functions ρ(·) and ψ(·) are non-
negative, monotone, and submodular.
Proof. We prove the properties in detail for ψ(·). The proof
for ρ(·) is similar.
Consider sets S, T such that S ⊂ T ⊂ N and a node
v ∈ N \ T . It is clear that ψ(·) is non-negative. Let xi =
c(S, i), yi = c(T, i), ¯xi = c(S ∪ {v}, i), ¯yi = c(T ∪ {v}, i).
For any i ∈ N,
c(S, i) = max
j∈S⊆T
c(j, i) ≤ max
j∈T
=⇒ xi ≤ yi
c(j, i) = c(T, i)
(9)
That is, ψ(·) is monotone. Similarly, it can be shown that
¯xi ≤ ¯yi ; xi ≤ ¯xi ;
Now, yi < ¯yi =⇒ k /∈ arg max
j∈T∪{v}
=⇒ k /∈ arg max
j∈S∪{v}
=⇒ xi < ¯xi
(10)
yi ≤ ¯yi
c(j, i) ∀k ∈ T
(11)
c(j, i) ∀k ∈ S ⊆ T (12)
(13)
The contrapositive of the above, from Inequalities (10) is
xi = ¯xi =⇒ yi = ¯yi
(14)
Also, from Implications (11) and (12),
yi < ¯yi =⇒ {v} = arg max
j∈T∪{v}
=⇒ ¯xi = ¯yi
c(j, i) = arg max
j∈S∪{v}
c(j, i)
(15)
18
Let M (ν) = (Mi(ν))i∈N and m(ν) = (mi(ν))i∈N , where
Mi(ν) = ν(N )−ν(N\{i}) and mi(ν) = ν({i}). For a convex
game, τ (ν) = λM (ν) + (1 − λ)m(ν), where λ ∈ [0, 1] is
chosen such that [33],(cid:88)
(cid:88)
S⊆NS=2
From (17), Mi(ν) =
i∈N
[λMi(ν) + (1 − λ)mi(ν)] = ν(N )
ν(S) − (cid:88)
(19)
ν(S)
This, with Equation (19) and the fact that for our game, for
all i, mi(ν) = ν({i}) = 0,
Mi(ν) = λ
ν(N ) = λ
(cid:88)
(cid:88)
ν(S) = 2λ
ν(S)
i∈N
i∈N
(cid:88)
S⊆N
i∈SS=2
(cid:88)
S⊆NS=2
ν(S) =
S⊆N\{i}
S=2
(cid:88)
S⊆N
i∈SS=2
2. So we have
(cid:88)
S⊆N
i∈SS=2
Using Equation (17), we get λ = 1
τi(ν) =
1
2
Mi(ν) +
1
2
mi(ν) =
1
2
ν(S)
This, with Equation (18), gives φ(ν) = τ (ν)
Now from Inequalities (10), depending on node i, four cases
arise that relate the values of ¯xi − xi and ¯yi − yi.
Case 1: xi = ¯xi and yi = ¯yi:
In case of such an i, we have ¯xi − xi = ¯yi − yi
Case 2:xi = ¯xi and yi < ¯yi:
Case 3:xi < ¯xi and yi = ¯yi:
By Implication (14), there does not exist such an i.
In case of such an i, we have ¯xi − xi > ¯yi − yi
Case 4:xi < ¯xi and yi < ¯yi: For such an i,
(from (13) and (15))
(from Inequality (9))
¯xi − xi = ¯yi − xi
≥ ¯yi − yi
From the above cases, we have
=⇒ (cid:88)
=⇒ (cid:88)
¯xi − xi ≥ ¯yi − yi, ∀i ∈ N
( ¯yi − yi)
( ¯xi − xi) ≥(cid:88)
¯xi −(cid:88)
xi ≥(cid:88)
¯yi −(cid:88)
i∈N
i∈N
i∈N
i∈N
i∈N
=⇒ ψ(S ∪ {v}) − ψ(S) ≥ ψ(T ∪ {v}) − ψ(T )
As the proof is valid for any v ∈ N \ T and for any S, T
such that S ⊂ T ⊂ N, the result is proved.
yi
i∈N
APPENDIX D
Theorem 2. For
PROOF OF THEOREM 2
(cid:80)
Proof. The characteristic function ν(S) = (cid:80)
c(i, j), φ(ν) = N u(ν) = Gv(ν) = τ (ν).
i,j∈S
i(cid:54)=j
the TU game defined by ν(S) =
when S = 2 where S = {i, j},
c(i, j),
i,j∈S
i(cid:54)=j
(16)
(17)
ν({i, j}) = c(i, j)
∴ ν(S) =
ν(T )
(cid:88)
T⊆NT=2
From Equation (16), the Shapley value can be rewritten as
φj(ν) =
1
2
c(i, j) =
1
2
ν({i, j}) =
1
2
ν(S) (18)
(cid:88)
i∈N
i(cid:54)=j
(cid:88)
i∈N
i(cid:54)=j
(cid:88)
S⊆N
j∈SS=2
The proof for φ(ν) = N u(ν) follows from [33]. Fur-
thermore, it has been shown in [33] that, for the TU game
satisfying Equation (18), for each S ⊆ N,
ν(S) −(cid:88)
φi(ν) = ν(N\S) − (cid:88)
φi(ν)
∴ ν({i}) − φi(ν) = ν(N\{i}) −(cid:88)
i∈S
i∈N\S
φj(ν) , for S = {i}
j∈N
j(cid:54)=i
So, the propensity to disrupt for player i [34] for the Shapley
value allocation is
(cid:80)
j∈N,j(cid:54)=i φj(ν) − ν(N\{i})
di(φ(ν)) =
φi(ν) − ν({i})
= 1
As the propensity to disrupt is equal for all the players (= 1),
this allocation is the Gately point [34], that is, φ(ν) = Gv(ν).
|
1311.0680 | 2 | 1311 | 2013-12-28T13:40:30 | Geo-located Twitter as the proxy for global mobility patterns | [
"cs.SI",
"physics.soc-ph"
] | In the advent of a pervasive presence of location sharing services researchers gained an unprecedented access to the direct records of human activity in space and time. This paper analyses geo-located Twitter messages in order to uncover global patterns of human mobility. Based on a dataset of almost a billion tweets recorded in 2012 we estimate volumes of international travelers in respect to their country of residence. We examine mobility profiles of different nations looking at the characteristics such as mobility rate, radius of gyration, diversity of destinations and a balance of the inflows and outflows. The temporal patterns disclose the universal seasons of increased international mobility and the peculiar national nature of overseen travels. Our analysis of the community structure of the Twitter mobility network, obtained with the iterative network partitioning, reveals spatially cohesive regions that follow the regional division of the world. Finally, we validate our result with the global tourism statistics and mobility models provided by other authors, and argue that Twitter is a viable source to understand and quantify global mobility patterns. | cs.SI | cs | Geo-located Twitter as the proxy for global mobility patterns
Bartosz Hawelkaa,b,*, Izabela Sitkoa,b, Euro Beinata, Stanislav Sobolevskyb,
Pavlos Kazakopoulosa and Carlo Rattib
a GISscience Doctoral College, Department of Geoinformatics – Z_GIS, University of Salzburg, Austria
b SENSEable City Laboratory, Massachusetts Institute of Technology, Cambridge, USA
* Corresponding author: [email protected]
In the advent of a pervasive presence of location sharing services researchers gained an unprecedented
access to the direct records of human activity in space and time. This paper analyses geo-located Twitter
messages in order to uncover global patterns of human mobility. Based on a dataset of almost a billion
tweets recorded in 2012 we estimate volumes of international travelers in respect to their country of
residence. We examine mobility profiles of different nations looking at the characteristics such as
mobility rate, radius of gyration, diversity of destinations and a balance of the inflows and outflows. The
temporal patterns disclose the universal seasons of increased international mobility and the particular
national nature of overseas travels. Our analysis of the community structure of the Twitter mobility
network, obtained with the iterative network partitioning, reveals spatially cohesive regions that follow
the regional division of the world. Finally, we validate our result with the global tourism statistics and
mobility models provided by other authors, and argue that Twitter is a viable source to understand and
quantify global mobility patterns.
Keywords: geo-located Twitter; global mobility patterns; community detection; collective sensing
Introduction
Reliable and effective monitoring of the worldwide mobility patterns plays an important
role in studies exploring migration flows (Castles and Mill 1998; Greenwood 1985; Sassen
1999), touristic activity (Miguéns and Mendes 2008) but also the spread of diseases and
epidemic modeling (Bajardi et al. 2011; Balcan et al. 2009). Traditionally, those studies relied
either on the aggregated and temporally-sparse official statistics or on the selective small-
scale observations and surveys. In a more recent approach, international mobility was
approximated with the air traffic volumes (Barrat et al. 2004), i.e. the dataset with the
potentially global coverage but biased toward just one mode of transportation and in many
cases difficult to obtain. However, in the advent of a pervasive presence of location sharing
services researchers have gained an unprecedented access to the direct records of human
activity. Each day, millions of individuals leave behind their digital traces by using services
such as mobile phones, credit cards or social media. Most of those traces can be located in
space and time, and thus constitute a valuable source for human mobility studies.
Out of several types of collectively sensed data, the one that was the most intensively
explored for analysis of human mobility has undoubtedly been cellular phone records. With
truly pervasive character they provided a basis to formulate important findings on the nature
of a collective movement in urban (Calabrese et al. 2010; Kang et al. 2012), regional (Sagl et
al. 2012; Calabrese et al. 2013) and country-wide scales (Krings et al. 2009; Simini et al.
2012). Nevertheless, a high fragmentation of the mobile telecom market actually excludes the
availability of any worldwide dataset. In this case, a good alternative is offered by social
media data. Despite its lower penetration and a potential bias towards a younger part of the
population, social media constantly gains in popularity and representativeness (Gesenhues
2013) and in most cases are global by design.
1
In this study we attempt to uncover global mobility patterns, as well as to compare
mobility characteristics of different nations. Our work is based on the data from Twitter – one
of the most popular social media platforms, with over 500 million users registered by mid-
2013 (Twitter Statistics 2013). Initially established in the USA, the service has quickly spread
to other countries (Java et al. 2007; Leetaru et al. 2013; Mocanu et al. 2013), becoming a
worldwide phenomenon. By design Twitter is an open and public medium, which practically
limits privacy consideration, especially in studies such as ours, which seek for collective
rather than individual patterns of human behavior. In particular, we take advantage of the
portion of tweets augmented with explicit geographic coordinates, as measured either by GPS
embedded in a mobile device, or located to the nearest address based on the IP location of a
computer. We call these tweets geo-located tweets. They are still a limited sample of all
tweets and account for around 1% of the total feed (Morstatter et al. 2013). However, thanks
to the increasing penetration of smart devices and mobile applications, the volume of the geo-
located Twitter is constantly growing (Figure 1) and progressively becoming a valuable
register of human traces in space and time. The absolute volume of 3.5M geo-located tweets
per day (authors’ calculation for December 2012) appears as a promising base for carrying
out the worldwide mobility analysis, which as such is also the subject of our exploration.
Figure 1. Number of geo-located tweets (blue line) and users (orange line) per month in 2012.
Because of the richness yet simplicity of the medium, Twitter has already been the subject
of many studies for a variety of applications. First explorations focused on the properties of
Twitter as a social network, already proving its global character and scientific potential one
year after the launch of the service (Java et al. 2007; Kwak et al. 2010; Huberman et al.
2008). Another line of research examined a content of tweets to assess a mood of society
(Golder and Macy 2011; Bollen et al. 2011; Pak and Paroubek 2010), recently also with the
geographic perspective based on a geo-located stream (Frank et al. 2013, Mitchell et al.
2013). The next area that has received much attention was crisis management (MacEachren et
al. 2011; Thom et al. 2012; Sakaki et al. 2010), where the emphasis was placed on the
detection of anomalous activity, as well as on the potential of a locally generated content to
inform emergency services. Geo-located Twitter data were also considered as a support in
urban management and planning (Wakamiya et al. 2011; Frias-Martinez et al. 2012), as well
as in public health assessment (Ghosh and Guha 2013). All the aforementioned works were
spatially selective, focusing on specific study areas. The global perspective was introduced in
the study of Kamath et al. (2012), with the analysis of the geographic spread of hashtags.
Furthermore, Leetaru et al. (2013) attempted to describe the geography of Twitter based on a
one-month sample of global geo-located tweets, while Mocanu et al. (2013) described the
global distribution of different languages used while tweeting.
Given the well acknowledged role of location information registered within social
networking services, the attempts to translate it into mobility characteristics remain relatively
sparse. The most important foundations were provided by Cheng et al. (2011), who analyzed
2
different aspects of mobility based on Twitter check-ins, at that point dominated by the feed
from another location sharing service i.e. Foursquare. The study had an extensive scope, but
was limited by the time data availability. Other explorations were given e.g. by Cho et al.
(2011), who modeled the influence of human mobility on social ties in Gowalla and
Brightkite services, or by Noulas et al. (2012), who focused on intra-urban mobility
approximated with Foursquare check-ins.
In this paper, we present a global study of mobility. We focus on the worldwide patterns
that emerge from the analysis of Twitter data, as well as on the mobility characteristics of
different nations. Furthermore, we seek to discover spatial patterns and clusters of regional
mobility. Finally, we attempt to validate the representativeness of geo-located Twitter as a
global source for mobility data. The paper is organized as follows. First of all, we describe
the dataset and illustrate a method to assign users to a country of residence, hence allowing
the determination of home users and foreign visitors. Next, we present and compare mobility
profiles of various countries, as well as the temporal patterns of inflows and outflows
dynamics. Further, we explore a country-to-country network of the flows of travelers, and
perform a community detection delineating global regions of mobility. Finally, we validate
the results in two ways: (i) comparing against the worldwide tourism statistics and (ii)
comparing Twitter data against commonly used models of human mobility.
Data preparation and pre-processing
Our study relies on one full year of geo-located tweets, which were posted by users all
over the world from January 1st until December 31st 2012. By geo-located we mean the
messages with explicit geographic coordinates attached to each message. The database
consists of 944M records generated by a total of 13M users. The stream was gathered through
the Twitter Streaming API1. Although the service sets a limit on the accessible volume to less
than 1% of the total Twitter stream, the total geo-located content was found not to exceed this
restriction (Morstatter et al. 2013). Therefore we believe that we successfully collected the
complete picture of global geo-located activity within 2012.
Before the actual analysis, the database had to be cleaned from evident errors and artificial
tweeting noise, which could pollute mobility statistics. First we examined all the consecutive
locations of a single user, and excluded those that implied a user relocating with a speed over
1000km/h, i.e. faster than a passenger plane. Further, we filtered out non-human Twitter
activity such as web advertising (e.g. tweetmyjob), web gaming (e.g. map-game) or web
reporting (e.g. sandaysoft). Those services can generate significant volumes of data, which
does not reflect any sort of human physical presence in the reported place and time. To
correct for this noise we checked the popularity of a message’s source, assuming that those
with only few users can probably be classified as an artificial activity. As the threshold we
used a cumulative popularity among 95% of users, constructing the ranking separately for
each country. All tweeting sources falling below the threshold were discarded from further
analysis. In total, the refinement procedure preserved 98% of users and 95% of tweets from
the initial database.
1
https://dev.twitter.com/docs/streaming-‐apis
3
Definition of a country of the user’s residence
An essential first step in our cross-country mobility analysis was an explicit assignment of
each user to a country of residence. This made our work different from most of the other
Twitter studies, which usually did not attempt to uncover users’ origin and characterized a
study area using only the total volume of tweets observed in this area (e.g. Mocanu et al.
2013). While for certain research problems this approach is suitable, from the perspective of a
global mobility study the differentiation between residents and visitors is crucial. It enables a
clear definition of origin and destination of travels and reveals which nation is traveling
where and when. Taking advantage of the history of tweeting records of every user, we
defined her country of residence as the country where the user has issued most of the tweets.
Once the country of residence was identified, the user’s activity in any other region of the
world was considered as traveling behavior, and the user was counted as a visitor to that
country.
We use the country definitions of the Global Administrative Areas spatial database
(Global Administrative Areas 2012), which divides the world into 253 territories. Twitter
“residents” were identified in 243 of them, with the number of users greatly varying among
different countries. The unquestionable leader is USA with over 3.8M users, followed by the
United Kingdom, Indonesia, Brazil, Japan and Spain with over 500K users each. There are
also countries and territories with only few or no Twitter users assigned.
To evaluate the representativeness of Twitter in a given area, a more illustrative metric is
the penetration rate, defined as the ratio between the number of Twitter users and the
population of a country. As expected, this ratio does not distribute uniformly across the globe
and scales superlinearily with the level of a country’s economic development approximated
by a GDP per capita (Figure 2A and B). While this property has already been described e.g.
by Mocanu et al. (2013) the goodness of a fit of a power law approximation increased when
considering penetration of only residents rather than all Twitter users appearing in a country.
In the analysis we exclude all countries with a penetration rate below 0.05% (we also exclude
countries with the number of resident users smaller than 10,000).
Figure 2. Twitter penetration rate across countries of the world. (A) Spatial distribution of the index. (B)
Superlinear scaling of the penetration rate with per capita GDP of a country. R2 coefficient equals 0.70.
Mobility profiles of countries
Human mobility can be analyzed at different levels of granularity. In this study we
considered a user as being ‘mobile’ if over the whole year the user had been tweeting from at
least one country other than her country of residence. In total, this applied to 1M users,
4
around 8% of all those who used geo-located Twitter in 2012. Figure 3 shows the percentage
of mobile users per country and the (geo-located) Twitter penetration in that country in 2012.
Most of the top mobile countries, e.g. Belgium, Austria, were characterized by only moderate
levels of Twitter adoption. On the other hand users of geo-located Twitter from the USA, the
country with the highest penetration rate, revealed a surprisingly small tendency to travel.
The only two countries with a high mobility and penetration rates were Singapore and
Kuwait. In general, while an increased popularity of Twitter can be treated as a sign of a more
active society, it did not immediately imply higher mobility of its users.
Figure 3. Top countries with the highest rates of users’ travel activity.
Next, we examined how spatially spread or concentrated the mobility of users is in a
certain nation. This was captured through the average radius of gyration of the users. The
radius of gyration measures the spread of user’s locations around her usual location. Here, we
defined a usual location as the center of mass rather than a home location, as the latter is
𝑟! =
𝑎! − 𝑎!" !
defined broadly - only with the assignment to a particular country. For each user, the radius
!!
!!!!
of gyration was computed according to the equation:
where n is the number of tweeting locations, āi represents the location of a particular tweet (a
pair of xy coordinates), and ācm is a user’s center of mass. Low values of the radius indicate a
tendency to travel locally, while bigger values indicate more long-distance travels. The
average values computed for users from different countries are shown in Figure 4. A first
observation indicated an obviously important role played by the geographical location of a
country. Isolated countries such as New Zealand or Australia had an average radius of
gyration of over 700km. There was also a positive correlation between the average distance
travelled by residents of a country and the mobility rate of its Twitter population, as well as
the number of visited countries (Figures 4A and 4B). In any case, the drivers for increased
mobility are connected with the economic prosperity of a country, as all received rankings
were led by highly developed countries.
(1)
5
Figure 4. Average radius of gyration of users from different countries compared to (A) percentage of mobile
Twitter users and (B) number of countries visited.
The mobility profile of each country can be analyzed from two perspectives: a country
being the origin or the destination of international travels. By building the directional
country-to-country network of the human flows, we were able to quantify both the inflow and
outflow of visitors. Figure 5 shows the analysis for each country based on Twitter users and
on total number of Twitter travelers normalized by the Twitter penetration rate in this
country, used as an estimation of a total mobility flux. Figures 5A and 5B show the number
of Twitter users originating from a country and traveling to another (5A) and users visiting
this particular country (5B). Figures 5C and 5D present number of Twitter travelers
normalized by the Twitter penetration rate in the country of a user’s origin. In case of
international arrivals, both the raw number of Twitter users and the estimated population of
visitors unveiled the most visited countries to be USA, UK, Spain and France. On the other
hand, the ranking of travelers’ nationality seemed highly influenced by Twitter’s penetration
rate, with the biggest groups coming from the countries of high Twitter popularity.
Furthermore, low penetration indices leaded to an overestimation of the actual travelers’
volume, which may explain the values estimated for Russia or Germany. Figure 5E presents
the yearly balance between the estimated inflow and outflow of travelers revealing different
countries to be either the origin or destination of international trips.
Figure 5. Number of visitors coming from or arriving in a country. Number of Twitter travelers (A and B),
number of Twitter travelers normalized by the Twitter penetration rate in the country of origin of the visitor (C
and D) and the overall balance of travelers (E).
6
Temporal patterns of mobility
Human mobility is always subject to temporal variations. In order to uncover patterns
occurring at the global, as well as at the country level, we measured how many Twitter users
were active outside of their country of residence for each day of 2012. The first pattern that
emerged from the analysis was the weekly scheme of check-ins abroad (Figure 6). The
tendency of increased mobility over weekends seemed to be universal across the globe.
Moreover, there were two obvious seasons of higher mobility: the summer months of July
and August, and the end of the year, connected to Christmas and New Year’s Eve holidays.
Figure 6. Global temporal pattern of users who traveled abroad.
Looking at the specific countries we discovered a variety of deviations from the
aforementioned global pattern. Several of them were easy to interpret and shared by more
than one country. For instance, there was a substantial group of European nations with the
biggest peak over one of the summer months and a few smaller ones, most probably
connected to extended weekends e.g. at the beginning of May (examples are shown in Figure
7A). Another group exhibited a similar pattern, however with the summer mobility increase
stretched between June and September (Figure 7B). An interesting example of the mobility
behavior influenced by the social and cultural features of a country was observed in the group
of Arabic countries (Figure 7C). The period of Ramadan corresponded to a major decrease in
the amount of travels abroad, while the time of the Mecca pilgrimage marked a sharp peak at
the end of October. In all cases, the end of the year corresponded to a time of increased
international mobility.
Figure 7. Normalized temporal patterns of mobility, from the perspective of the country of origin. The values for
each country are scaled between 0 and 100% of the maximum daily number of travelers being abroad during
2012.
7
The temporal variations of the inflow of visitors were much more stable than the outflow
patterns. Visual inspection of those patterns indicated three main groups. The first group
included countries without any specific seasonality of international visits (with the exception
of the end of the year period). The second group covered popular summer touristic
destinations such as Spain, Italy, Croatia or Greece (Figure 8), with a significant increase in
arrivals over the months of July and August. Finally, in the third group we included countries
where increased international visits were connected to special events such as Euro 2012 in
Poland or the 2012 Olympics in United Kingdom.
Figure 8. Examples of summer destinations of touristic activity marked by the increased inflow of international
Twitter users over summer. The values for each country are scaled between 0 and 100% of the maximum daily
number of international visitors during 2012.
Country-to-country network & partitioning
In the next step, we analyzed the topology of the country-to-country mobility network
created by travelers estimated through the Twitter community. As it has already been proven
by many studies, partitioning of a raw network of human communicational interactions e.g.
based on mobile phone data (Ratti et al. 2010; Blondel et al. 2010; Blondel 2011; Sobolevsky
et al. 2013a), as well as partitioning of human mobility (Amini et al. 2013, Kang et al. 2013),
can lead to the delineation of spatially cohesive communities, aligning surprisingly well with
the existing socio-economic borders of the underlying geographies. Our aim was to test if this
finding holds true for the Twitter-based mobility network, and if so, which distinctive
mobility clusters emerge in different parts of the world.
Taking advantage of our methodology of assigning a user to their country of residence and
focusing on the mobile users, we built the worldwide country-to-country network of Twitter
flows. Each country was considered as a node of the network, and the edges were weighted
with the number of Twitter users travelling between a pair of nodes. The network was
directional, as the connections were built from the country of residence to each other country
where a user appeared as a visitor. To deal with the sparseness of the network and different
levels of Twitter representativeness, we filtered out all countries with the outgoing population
smaller than 500 Twitter users, as well as those countries where the Twitter penetration was
below 0.05%. Furthermore, the flows were normalized by the Twitter penetration rate in the
country of a user’ origin in order to estimate the real mobility flux rather than just a number
of Twitter users. The top 30 flows between different countries are presented in Figure 9.
8
Figure 9. Top 30 country-to-country estimated flows of visitors. Colors of the ribbons correspond to the
destination of a trip, while the country of origin is marked with the thin stripe at the end of a ribbon
(visualization method based on Krzywinski et al. 2009).
The network partitioning procedure was based on the well-known modularity optimization
approach (Newman 2006) using a highly-efficient optimization algorithm recently proposed
by Sobolevsky et al. (2013b). In general terms, the procedure assesses the relative strength of
particular links versus the estimations of the homogenous null model preserving the strength
of each network node. It optimizes the overall modularity score of a network partitioning,
which quantifies the strength of intra-cluster connections (in the “ideal” partitioning case
they should be as strong as possible) and the weakness of outer ties (supposed to be as weak
as possible).
After obtaining the initial split of the network, the partitioning procedure was applied in
the iterative manner to the sub-networks inside each community, similarly as in Sobolevsky
et al. (2013a). As the result, the Twitter network was split into mobility clusters on three
hierarchical levels, each level being a sub-partitioning of the previous one. The initial level
(Figure 10A) uncovered four groups of countries that closely agreed with the continental
division of the world. In this sense, travel connections e.g. within both Americas were
stronger than between America and Europe, while the Europeans traveled more within
Europe and Asia than to the other continents. Further sub-divisions followed the same type of
common logic, all clusters tend to be spatially connected and well aligned with expected
socio-geographical regions. For instance, on level 2 we observed a split into Western,
Central, Eastern and Northern Europe (Figure 10B), and on level 3 Central Europe was
further divided into the more continental northern part and the Balkans (Table 1). In general,
received clusters uncovered
that people keep
traveling more within
their direct
‘neighborhoods’ rather than connect to further destinations. Furthermore, the fact that clusters
were spatially continuous and reflected common regions of the world is in line with the
findings of previous studies based on the mobile phone data (Ratti et al. 2010; Blondel et al.
2010; Blondel 2011; Sobolevsky et al. 2013a). It also extends the validity of network-based
community detection form a country to global scale. Additionally, we see that the partitioning
of mobility networks possess similar regularities compared to human communication
networks and might also be used for regional delineation purposes.
9
2
Figure 10. Mobility regions uncovered by the partitioning of country-to-country network of Twitter users flows.
Regions distinguished at the first (A) and second (B) level of partitioning. Grey color indicates no data.
Table 1. Countries assigned to different regions of mobility.
Level 1 Level 2 Level 3
1
1
1
2
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
Assigned countries
Bahamas, Canada, Dominican Rep., Jamaica, Mexico, Puerto Rico, United States
Colombia, Ecuador, Panama, Trinidad and Tobago, Venezuela
Costa Rica, El Salvador, Guatemala, Honduras,
Bolivia, Chile, Peru,
Argentina, Brazil, Paraguay, Uruguay
France, Ireland, Malta, Martinique, Morocco, Portugal, Spain, Tunisia, United Kingdom
Belgium, Germany, Iceland, Italy, Luxembourg, Netherlands, Switzerland
Denmark, Norway, Sweden
Austria, Czech Republic, Hungary, Poland, Romania, Slovakia
Bosnia and Herzegovina, Croatia, Kosovo, Macedonia, Serbia, Slovenia
Azerbaijan, Bulgaria, Cyprus, Greece, Israel, Kazakhstan, Latvia, Lithuania, Russia, Ukraine
Belarus, Estonia, Finland, Turkey
Ghana, Nigeria
Kenya, South Africa
Bahrain, Egypt, Jordan, Kuwait, Lebanon, Saudi Arabia
Oman, Qatar, United Arab Emirates
Maldives, Sri Lanka
Japan, South Korea, Taiwan
Philippines
Brunei, Indonesia, Malaysia, Singapore
Cambodia, Thailand, Vietnam
Australia, New Zealand
12
13
14
9
10
11
3
4
5
6
7
8
3
4
10
Validation of the results
In case of global mobility, it is difficult to find the appropriate dataset for the direct
validation of results obtained with Twitter, especially one being considerably bias-free in
respected to the way it captures human mobility. An interesting comparison could be held for
example with the register of flight connections, though possibly hampered by partially
disaggregated character of direct connections, often being just a segment of an indirect travel
rather than a valid indication of an origin and a destination. In practice such a comparison is
also obviously prevented by the difficult accessibility criterion. In this study, we relied on the
tourism statistics as provided by the report of the WEF (World Economic Forum 2013) at the
country level. We used two of those statistics: international tourist arrivals (thousands, 2011)
and international tourism receipts (US$, millions, 2011) and compared them to arrivals
estimated with the Twitter data (Figure 11A and 10B). In both cases we found a strong linear
correlation (respectively with the R2 of 0.69 and 0.88), which is the confirmation of the
validity of received mobility estimations.
Figure 11. International arrivals estimated with Twitter data versus the arrivals (A) and nominal value of
touristic receipts (expenditures by international inbound visitors, B) provided by WEF (2013). Correlation
measured with the R2 statistic equals 0.69 and 0.88 respectively.
We further validated the results indirectly by demonstrating that mobility measures
derived with Twitter exhibit similar statistical properties as those received on the basis of
other datasets. Firstly, we computed the distance between each pair of consecutive user’s
locations (tweets) and plotted the frequencies of computed displacement on a log-log scale.
𝑃(∆𝑟) = ∆𝑟!!
Similarly to other mobility studies, we found that the distribution is well approximated by the
where Δr is a displacement of certain length and β = 1.62. Importantly, the received exponent
power law (Figure 11A):
(2)
stays in the similar range as the results obtained with other mobility datasets such as mobile
phone data (González et al. 2008, β = 1.75), bank note dispersal (Brockmann et al. 2006, β =
1.59) and Foursquare check-ins (Cheng et al. 2011, β = 1.88). We also plotted the frequency
of previously computed users’ radiuses of gyration. As expected, it also followed a power law
with an exponent of 1.25.
11
Figure 12. Probability of displacement (A) and frequency of radius of gyration (B).
(3)
Considering a limited access to global mobility data suitable for a direct comparison with
Twitter-based human flows, we further tested our data against a commonly accepted mobility
model, i.e. the classic gravity approach, as yet another way of indirect verification of
uncovered patterns. Many studies proved the gravity law to provide a good basis for
modelling the intensity of interactions between locations depending on their weights and
distance, not only in the context of mobility (e.g. Zipf 1946, Jung et al. 2008, Balcan et al.
2009) but also human interaction networks (Krings et al. 2009, Expert et al. 2011). We
assume that if the Twitter data are to be claimed suitable for a description of human mobility,
they should follow a similar law and distance dependence as it was proven for other data
types e.g. railway connections, airline traffic, mobile telecom records. Furthermore, we tested
how much the gravity law holds on a global scale, especially in times when the influence of
𝐹!" = 𝐴 !!!!!!!!"!
distance as a friction for mobility is often considered to decrease in importance. We used the
gravity model in the form:
where Fij represents a flow of people between a pair of countries, pi is the population in the
country of origin, and pj the population of the destination, rij is the distance measured between
the capitals and A is a constant. To compensate for the limitation of our definition of country-
to-country distance we restricted the connections to the countries that are at least 100 km
apart. The model was fitted to the two versions of our network. First, the flows were defined
as a raw number of Twitter users traveling between two countries, and the population of each
country was equal to the number of Twitter residents (Figure 13A). In this case we received
the exponents of α = 0.81, β = 0.63 and γ = 1.02, and an R2 coefficient of 0.79. The second
variation of the model (Figure 13B) used the flows estimated based on the Twitter penetration
rate (again with the threshold of 0.05%), and the population as provided by the Central
Intelligence Agency (2012). Received exponents were fairly similar to the previous results: α
= 0.89, β = 0.69 and γ = 1.1 with only a slight decrease of the R2 coefficient to 0.71.
Received population exponents indicate an underlinear influence of a country’s size on the
growth of a human flow, both in case of origin and destination, but the influence of the
population in a country of origin is obviously bigger. These underlinear relations can be
explained with two conjectures. On the one hand, it is plausible that residents of a country do
not take part in mobility in an equal manner, instead it is rather a domain of the most active
ones. On the other hand, the visitors are never attracted by the whole country but rather only
by certain places. On average the number of active users and attractive places among
countries may grow slower comparing to their respective total population.
12
The gamma exponents suggest, as expected, a decrease of interaction intensity with
distance (Figure 13A and 13B), however at a slower rate than often pre-assumed, e.g. by Jung
et al. (2008) or Krings et al. (2009), r2 decay relationship. This difference can be interpreted
through the scale of analysis. In a global scale, where most of the trips are happening by air,
increase of a distance comes with relatively smaller effort or cost than in a country or local
levels where substantial part of mobility is taking place by land. But even in the world of this
subjective ‘shrinkage’ of distances, certain level of dependency is still preserved. As the
reason we suppose social ties, which remain stronger in a local than in a global scale
(Takhteyev et al. 2012). In other words, people may simply have more reasons to travel
shorter distances, which also correlates well with the results received during network
partitioning.
Visually, both variations models seem to be well fitted (Figure 13A and B), with the
slopes well reflecting the average tendency in the observed data and the distant decay
functions remaining within the standard errors across the whole distance range. The similarity
of both models suggests that Twitter data may not only provide a valid picture of mobility of
its direct users, but can further be used for the estimation of real human flows.
(A piαpjβ) on the distance in comparison to a distance decay function (r-γ) modeled with the gravity law. (A)
Figure 13. Dependence of human flow (Fij) normalized with populations in countries of origin and destination
Network defined based on raw Twitter flows (B) Network of total population flows estimated with the Twitter
penetration rate in the country of origin (B).
Conclusions
Geo-located Twitter is one of the first free and easily available global data sources that
store millions of digital and fully objective records of human activity located in space and
time. With our study we demonstrated that, despite the unequal distribution over the different
parts of the world and possible bias toward a certain part of the population, in many cases
geo-located Twitter can and should be considered as a valuable proxy for human mobility,
especially at the level of country-to-country flows. Our approach proposed to capture
mobility respective to the nationality of travelers based on the simple yet effective method of
assigning each user to her country of residence. In this way, we were able to compare
mobility profiles of countries, considering each of them both as a potential origin as well as a
destination of international travels. Received results showed that increased mobility measured
in terms of probability, diversity of destinations, and geographical spread of travels, is
characteristic of more developed countries such as the West-European ones. The travelling
distance was additionally affected by the geographic isolation of a country as in the case of
Australia or New Zealand. The analysis of temporal patterns indicated the existence of
13
globally universal season of increased mobility at the end of the year, clearly visible
regardless of the nationality of travelers. Although the summer mobility was increased for a
wide range of countries, it varied in terms of intensity and duration, and in some cases was
not visible at all. Additionally, we discovered specific patterns driven either by cultural
conditionings or special events occurring in a given country. However in many cases the
results just confirmed the common logic expectations, this agreement should be treated as an
indicator of the legitimacy of Twitter as a global and objective register of human mobility.
Furthermore, we demonstrated that community detection performed using the Twitter
mobility network resulted in spatially cohesive regions that followed the regional division of
the world. This finding is important from several stand points. First of all, it is in agreement
with the results obtained by other authors (Ratti et al. 2010; Blondel et al. 2010; Sobolevsky
et al. 2013a) based on the different types of networks i.e. mobile phone interactions.
Furthermore, it extends the spatial validity of the community detection approach from a
previously examined country scale to the global one. Finally, it shows that even in the era of
globalization and seeming decrease of the influence of distance, people still tend to travel
locally, visiting immediate neighboring countries more often than those further away.
As our final contribution we validated, to a certain extent, geo-located Twitter as a proxy
of global mobility behavior. First of all, we demonstrated that volumes of visitors estimated
for different countries based on Twitter data are in line with the official statistics on
international tourism. The correlation (R2 around 0.7) shows a fairly good correspondence
given the wider scope of mobility captured through Twitter, as well as significantly different
character of data acquisition. Secondly, we confirmed that Twitter data exhibits similar
statistical properties as other mobility datasets. For instance, the measures such as a radius of
gyration and the probability of displacement are well approximated with the power law
distribution, similarly as in Brockmann et al. (2006) or Cheng et al. (2011), and the network
of the estimated flows of travelers can be well approximated with the classic model of a
mobility i.e. the gravity model. Altogether, we believe that our analysis proved the potential
of geo-located Twitter as a fully objective, and freely accessible source for global mobility
studies. Further research will focus on the exploration how far this potential can be translated
to finer spatial scales.
Acknowledgements
This research was funded by the Austrian Science Fund (FWF) through the Doctoral College GIScience (DK W
1237-N23), Department of Geoinformatics - Z_GIS, University of Salzburg, Austria. We would like to thank
Sebastian Grauwin and Karolina Stanislawska for their support. We further thank the MIT SMART Program,
the Center for Complex Engineering Systems (CCES) at KACST and MIT CCES program, the National Science
Foundation, the MIT Portugal Program, the AT&T Foundation, Audi Volkswagen, BBVA, The Coca Cola
Company, Ericsson, Expo 2015, Ferrovial, GE and all the members of the MIT Senseable City Lab Consortium
for supporting the research.
14
References:
Amini, A., K. Kung, C. Kang, S. Sobolevsky, and C. Ratti. 2013. “The Differing Tribal and Infrastructural
Influences on Mobility in Developing and Industrialized Regions”. In Proceedings of 3rd Int.
Conference on the Analysis of Mobile Phone Data (NetMob 2013): 330-339.
Bajardi, P., C. Poletto, J. J. Ramasco, M. Tizzoni, V. Colizza, and A. Vespignani. 2011. “Human Mobility
Networks, Travel Restrictions, and the Global Spread of 2009 H1N1 Pandemic.” PLoS ONE 6 (1):
e16591.
Balcan, D., V. Colizza, B. Gonçalves, H. Hu, J. J. Ramasco, and A. Vespignani. 2009. “Multiscale Mobility
Networks and the spatial spreading of infectious diseases.” Proceedings of National Academy of
Science 106 (51): 21484-21489.
Barrat, A., M. Barthélemy, R. Pastor-Satorras, and A. Vespignani. 2004. “The Architecture of Complex
Weighted Networks.” Proceedings of the National Academy of Sciences of the United States of
America 101 (11): 3747–3752.
Blondel, V. 2011. “Voice on the Border: Do Cellphones Redraw the Maps?” Open Access publications from
Université catholique de Louvain info: hdl:2078.1/108639.
Blondel, V., G. Krings, and I. Thomas. 2010. “Regions and Borders of Mobile Telephony in Belgium and in
the Brussels Metropolitan Zone.” Brussels Studies 42(4).
Bollen, J., A. Pepe, and H. Mao. 2011. “Modeling Public Mood and Emotion: Twitter Sentiment and Socio-
economic Phenomena.” In Proceedings of the Fifth International AAAI Conference on Weblogs and
Social Media: 450–453.
http://www.aaai.org/ocs/index.php/ICWSM/ICWSM11/paper/viewFile/2826/3237.
Brockmann, D., L. Hufnagel, and T. Geisel. 2006. “The Scaling Laws of Human Travel.” Nature 439 (7075):
462–465.
Calabrese, F., M. Diao, G. Di Lorenzo, J. Ferreira Jr., and C. Ratti. 2013. “Understanding Individual Mobility
Patterns from Urban Sensing Data: A Mobile Phone Trace Example.” Transportation Research Part C:
Emerging Technologies 26: 301–313.
Calabrese, F., F. C. Pereira, G. Di Lorenzo, L. Liu, and C. Ratti. 2010. “The Geography of Taste: Analyzing
Cell-Phone Mobility and Social Events.” In Pervasive Computing. Lecture Notes in Computer Science
6030: 22–37.
Castles, S., and M. J. Miller. 1998. The Age of Migration: International Population Movements in the Modern
World. New York–London. Guildford Press.
Central Intelligence Agency (CIA). 2012. “The World Factbook”. Available at:
https://www.cia.gov/library/publications/the-world-factbook/. Accessed on 27-09-2013.
Cheng, Z., J. Caverlee, K. Lee, and D. Z. Sui. 2011. “Exploring Millions of Footprints in Location Sharing
Services.” AAAI ICWSM: 81-88.
Cho, E., S. A. Myers, and J. Leskovec. 2011. “Friendship and Mobility: User Movement in Location-based
Social Networks.” In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining: 1082–1090.
Expert, P., T. S. Evans, V. D. Blondel, and R. Lambiotte. 2011. “Uncovering Space-independent Communities
in Spatial Networks.” Proceedings of the National Academy of Sciences 108 (19): 7663–7668.
Frias-Martinez, V., V. Soto, H. Hohwald, and E. Frias-Martinez. 2012. “Characterizing Urban Landscapes
Using Geolocated Tweets.” In Privacy, Security, Risk and Trust (PASSSAT), 2012 Int. Conference on
Social Computing (SocialCom), 239-248.
Frank, M. R., L. Mitchell, P. S. Dodds, and C. M. Danforth. 2013. “Happiness and the Patterns of Life: A Study
of Geolocated Tweets.” Scientific Reports 3.
Gesenhues, A. 2013. “Study: Mobile Users & Older Generations are Driving Social Media Growth around the
world”. Marketing Land publication service. Third Doors Media, Inc. Available at:
http://marketingland.com/study-social-network-growth-across-the-globe-driven-by-mobile-users-older-
generations-41982. Accessed on 27-09-2013.
Ghosh, D., and R. Guha. 2013. “What Are We ‘tweeting’ About Obesity? Mapping Tweets with Topic
Modeling and Geographic Information System.” Cartography and Geographic Information Science 40
(2): 90–102.
“Global Administrative Areas”. 2012. GADM database of Global Administrative Areas. Available at:
http://www.gadm.org/. Accessed on 15-08-2013.
15
Golder, S. A., and M. W. Macy. 2011. “Diurnal and Seasonal Mood Vary with Work, Sleep, and Daylength
Across Diverse Cultures.” Science 333 (6051): 1878–1881.
González, M. C., C. A. Hidalgo, and A. L. Barabási. 2008. “Understanding Individual Human Mobility
Patterns.” Nature 453 (7196): 779–782.
Greenwood, M. J. 1985. “Human Migration: Theory, Models, and Empirical Studies.” Journal of Regional
Science 25 (4): 521–544.
Huberman, B. A., D. M. Romero, and F. Wu. 2008. “Social Networks That Matter: Twitter Under the
Microscope”. SSRN Scholarly Paper ID 1313405. http://papers.ssrn.com/abstract=1313405.
Java, A., X. Song, T. Finin, and B. Tseng. 2007. “Why We Twitter: Understanding Microblogging Usage and
Communities.” In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Mining
and Social Network Analysis: 56–65.
Jung, W-S., F. Wang, and H. E. Stanley. 2008. “Gravity Model in the Korean Highway.” Europhysics Letters
81(4): 48005.
Kamath, K. Y., J. Caverlee, Z. Cheng, and D. Z. Sui. 2012. “Spatial Influence Vs. Community Influence:
Modeling the Global Spread of Social Media.” In Proceedings of the 21st ACM international
conference on Information and knowledge management: 962-971.
Kang, C., X. Ma, D. Tong, and Y. Liu. 2012. “Intra-urban Human Mobility Patterns: An Urban Morphology
Perspective.” Physica A: Statistical Mechanics and Its Applications 391 (4): 1702–1717.
Kang, C., S. Sobolevsky, Y. Liu and C. Ratti. 2013. “Exploring human movements in Singapore: a comparative
analysis based on mobile phone and taxicab usages”. In UrbComp’13 Proceedings of the 3rd ACM
SIGKDD International Workshop on Urban Computing: 330-339.
Krings, G., F. Calabrese, C. Ratti, and V. D. Blondel. 2009. “Urban Gravity: a Model for Inter-city
Telecommunication Flows.” Journal of Statistical Mechanics: Theory and Experiment 2009 (07):
L07003.
Krzywinski, M., J. Schein, I. Birol, J. Connors, R. Gascoyne, D. Horsman, S. J. Jones, and M. A. Marra. 2009.
“Circos: An Information Aesthetic for Comparative Genomics.” Genome Research 19 (9): 1639–1645.
Kwak, H., C. Lee, H. Park, and S. Moon. 2010. “What Is Twitter, a Social Network or a News Media?” In
Proceedings of the 19th International Conference on World Wide Web: 591–600.
Leetaru, K., S. Wang, A. Padmanabhan, and E. Shook. 2013. “Mapping the Global Twitter Heartbeat: The
Geography of Twitter.” First Monday 18 (5).
MacEachren, A. M., A. C. Robinson, A. Jaiswal, S. Pezanowski, A. Savelyev, J. Blanford, and P. Mitra. 2011.
“Geo-Twitter Analytics: Applications in Crisis Management.” In Proceedings, 25th International
Cartographic Conference, Paris, France.
Miguéns, J.I.L., and J.F.F. Mendes. 2008. “Travel and Tourism: Into a Complex Network.” Physica A:
Statistical Mechanics and Its Applications 387 (12): 2963–2971.
Mitchell, L., K. D. Harris, M. R. Frank, P. S. Dodds, and C. M. Danforth. 2013. “The Geography of Happ iness:
Connecting Twitter Sentiment and Expression, Demographics, and Objective Characteristics of Place.”
ArXiv e-print arXiv: 1302.3299.
Mocanu, D., A. Baronchelli, N. Perra, B. Gonçalves, Q. Zhang, and A. Vespignani. 2013. “The Twitter of
Babel: Mapping World Languages through Microblogging Platforms.” PLoS ONE 8 (4): e61981.
Morstatter, F., J. Pfeffer, H. Liu, and K. M. Carley. 2013. “Is the Sample Good Enough? Comparing Data from
Twitter’s Streaming Api with Twitter’s Firehose.” Proceedings of ICWSM.
Newman, M. E. J. 2006. “Modularity and Community Structure in Networks.” Proceedings of the National
Academy of Sciences 103 (23): 8577–8582.
Noulas, A., S. Scellato, R. Lambiotte, M. Pontil, and Cecilia Mascolo. 2012. “A Tale of Many Cities: Universal
Patterns in Human Urban Mobility.” PLoS ONE 7 (5): e37027.
Pak, A., and P. Paroubek. 2010. “Twitter as a Corpus for Sentiment Analysis and Opinion Mining.” In
Proceedings of LREC: 436-439.
Ratti, C., S. Sobolevsky, F. Calabrese, C. Andris, J. Reades, M. Martino, R. Claxton, and S. H. Strogatz. 2010.
“Redrawing the Map of Great Britain from a Network of Human Interactions.” PLoS ONE 5 (12):
e14248.
Sagl, G., B. Resch, B. Hawelka, and E. Beinat. 2012. “From Social Sensor Data to Collective Human Behaviour
Patterns: Analysing and Visualising Spatio-Temporal Dynamics in Urban Environments.” In
Proceedings of the GI-Forum 2012: Geovisualization, Society and Learning: 54–63.
16
Sakaki, T., M. Okazaki, and Y. Matsuo. 2010. “Earthquake Shakes Twitter Users: Real-time Event Detection by
Social Sensors.” In Proceedings of the 19th International Conference on World Wide Web: 851–860.
Sassen, S. 1999. Globalization and Its Discontents: Essays on the New Mobility of People and Money. New
York: The New Press. ISBN: 1565845188.
Simini, F., M. C. González, A. Maritan, and A. L. Barabási. 2012. “A Universal Model for Mobility and
Migration Patterns.” Nature 484 (7392): 96–100.
Sobolevsky, S., M. Szell, R. Campari, T. Couronné, Z. Smoreda, and C. Ratti. 2013a. “Delineating
Geographical Regions with Networks of Human Interactions in an Extensive Set of Countries.”
PlosONE 8(12): e81707.
Sobolevsky, S., R. Campari, A. Belyi, and C. Ratti. 2013b. “A General Optimization Technique for High
Quality Community Detection in Complex Networks.” ArXiv e-print arXiv: 1308.3508.
Takhteyev, Y., A. Gruzd, and B. Wellman. 2012. “Geography of Twitter Networks.” Social Networks 34 (1):
73–81.
Thom, D., H. Bosch, S. Koch, M. Worner, and T. Ertl. 2012. “Spatiotemporal Anomaly Detection through
Visual Analysis of Geolocated Twitter Messages.” In Pacific Visualization Symposium (PacificVis),
2012 IEEE: 41–48.
“Twitter Statistics”. 2013. Statistic Brain Research Institute, publishing as Statistic Brain. Available at:
http://www.statisticbrain.com/twitter-statistics. Accessed on 27-09-2013.
Wakamiya, S., R. Lee, and K. Sumiya. 2011. “Urban Area Characterization Based on Semantics of Crowd
Activities in Twitter.” GeoSpatial Semantics: 108–123.
World Economic Forum. 2013. “The Travel & Tourism Competitiveness Report 2013”. Available at:
http://www.weforum.org/reports/travel-tourism-competitiveness-report-2013.
Zipf, G. K. 1946. “The P1P2/D hypothesis: on the intercity movement of persons.” Aerican. Sociological
Review 11: 677–686
17
|
1807.05540 | 1 | 1807 | 2018-07-15T12:42:28 | A Survey on Expert Recommendation in Community Question Answering | [
"cs.SI",
"cs.IR"
] | Community question answering (CQA) represents the type of Web applications where people can exchange knowledge via asking and answering questions. One significant challenge of most real-world CQA systems is the lack of effective matching between questions and the potential good answerers, which adversely affects the efficient knowledge acquisition and circulation. On the one hand, a requester might experience many low-quality answers without receiving a quality response in a brief time, on the other hand, an answerer might face numerous new questions without being able to identify their questions of interest quickly. Under this situation, expert recommendation emerges as a promising technique to address the above issues. Instead of passively waiting for users to browse and find their questions of interest, an expert recommendation method raises the attention of users to the appropriate questions actively and promptly. The past few years have witnessed considerable efforts that address the expert recommendation problem from different perspectives. These methods all have their issues that need to be resolved before the advantages of expert recommendation can be fully embraced. In this survey, we first present an overview of the research efforts and state-of-the-art techniques for the expert recommendation in CQA. We next summarize and compare the existing methods concerning their advantages and shortcomings, followed by discussing the open issues and future research directions. | cs.SI | cs |
Wang X, Huang C, Yao L et al. A survey on expert recommendation in community question answering. JOURNAL OF
COMPUTER SCIENCE AND TECHNOLOGY 33(1): 1–29 January 2018. DOI 10.1007/s11390-015-0000-0
A Survey on Expert Recommendation in Community Question
Answering
Xianzhi Wang1, Member, ACM, IEEE, Chaoran Huang2, Lina Yao2, Member, ACM, IEEE,
Boualem Benatallah2, Member, IEEE, and Manqing Dong2, Student Member, ACM, IEEE
1 School of Software, University of Technology Sydney, NSW 2007, Australia
2 School of Computer Science and Engineering, University of New South Wales, Sydney, 2052 NSW, Australia
E-mail: [email protected], {chaoran.huang, lina.yao, b.benatallah, manqing.dong}@unsw.edu.au
Received July 15, 2018; revised October 14, 2018.
Abstract
Community question answering (CQA) represents the type of Web applications where people can exchange
knowledge via asking and answering questions. One significant challenge of most real-world CQA systems is the lack of
effective matching between questions and the potential good answerers, which adversely affects the efficient knowledge
acquisition and circulation. On the one hand, a requester might experience many low-quality answers without receiving a
quality response in a brief time; on the other hand, an answerer might face numerous new questions without being able to
identify their questions of interest quickly. Under this situation, expert recommendation emerges as a promising technique
to address the above issues. Instead of passively waiting for users to browse and find their questions of interest, an expert
recommendation method raises the attention of users to the appropriate questions actively and promptly. The past few
years have witnessed considerable efforts that address the expert recommendation problem from different perspectives.
These methods all have their issues that need to be resolved before the advantages of expert recommendation can be
fully embraced. In this survey, we first present an overview of the research efforts and state-of-the-art techniques for the
expert recommendation in CQA. We next summarize and compare the existing methods concerning their advantages and
shortcomings, followed by discussing the open issues and future research directions.
Keywords
community question answering, expert recommendation, challenges, solutions, future directions
1 Introduction
The prosperity of crowdsourcing and web 2.0 has
fostered numerous online communities featuring ques-
tion answering (Q&A) activities. Such communities ex-
ist in various forms such as dedicated websites, online
forums, and discussion boards. They provide a venue
for people to share and obtain knowledge by asking
and answering questions, known as community ques-
tion answering (CQA) [1]. While traditional online in-
formation seeking approaches (e.g., search engines) re-
trieve information from existing information reposito-
ries based on keywords, they face several challenges.
First, answers to some questions may not exist in the
previously answered questions [2] and thus cannot be re-
trieved from existing repositories directly. Second, most
real-world questions are written in complicated natu-
ral languages that require certain human intelligence
to be understood. Third, some questions inherently
seek people's opinions and can only be answered by hu-
mans. While machines find difficult to handle the above
cases, CQA can leverage the "wisdom of crowds" and
obtain answers from multiple people simultaneously.
Typical Q&A websites include Yahoo! Answers (an-
swers.yahoo.com), Quora (www.quora.com), and Stack
Overflow (stackoverflow.com). The first two websites
cover a wide range of topics, while the last only focuses
on the topic of computer programming.
Though advantages over the traditional information
seeking approaches, CQA faces several unique chal-
lenges. First, a CQA website may have tens of thou-
sands of questions posed every day, let alone the mil-
lions of questions that already exist on the website. The
huge volume of questions makes it difficult for a gen-
Survey
©2018 Springer Science + Business Media, LLC & Science Press, China
2
J. Comput. Sci. & Technol., January 2018, Vol.33, No.1
eral answerer to find the appropriate questions to an-
swer [3]. Second, answerers usually have varying inter-
est and expertise in different topics and knowledge do-
mains. Thus, they may give answers of varying quality
to different questions. The time required for preparing
answers [4] and the intention of answering also affect the
quality of their responses. An extreme case is that an-
swerers may give irrelevant answers that distract other
users [5] without serious thinking. All the above situa-
tions cause additional efforts of an information seeker
in obtaining good answers. Third, instead of receiving
an answer instantly, users in CQA may need to wait a
long time until a satisfactory answer appears. Previ-
ous studies [6] show that many questions on real-world
CQA websites cannot be resolved adequately, meaning
the requesters recognize no best answers to their ques-
tions within 24 hours.
Fortunately, several studies [7–9] have shown that
some core answerers are the primary drivers of answer
production in the many communities. Recent work
on Stack Overflow and Quora [10] further indicates that
these sites consist of a set of highly dedicated domain
experts who aim at satisfying requesters' query but
more importantly at providing answers with high last-
ing value to a broader audience. All these studies sug-
gest the needs for recommending a small group of most
competent answerers, or experts to answer the new
questions.
In fact, the long-tail phenomena in many
real-world communities, from the statistic perspective,
lays the ground of the rationale of expert recommenda-
tion in CQA [11], as most answers and knowledge in the
communities come from only a minority of users [11;12].
As an effective means of addressing the practical chal-
lenges of traditional information seeking approaches,
expert recommendation methods bring up the attention
of only a small number of experts, i.e., the users who
are most likely to provide high-quality answers, to an-
swer a given question [13]. Since expert recommendation
inherently encourages fast acquisition of higher-quality
answers, it potentially increases the participation rates
of users, improves the visibility of experts, as well as
fosters stronger communities in CQA.
Given the advantages of expert recommendation
and related topics such as question routing [6;14] and
question recommendation [15] in the domains of Natu-
ral Language Processing (NLP) and Information Re-
trieval (IR), we aim to present a comprehensive survey
on the expert recommendation in CQA. On the one
hand, considerable efforts have been conducted on the
expert recommendation and have delivered fruitful re-
sults. Therefore, it is necessary to review the related
methods and techniques to gain a timely and better
understanding of state of the art. On the other hand,
despite the active research in CQA, expert recommen-
dation remains a challenging task. For example, the
sparsity of historical question and answer records, low
participation rates of users, lack of personalization in
recommendation results, the migration of users in or
out of communities, and lack of comprehensive consid-
eration of different clues in modeling users expertise are
all regarded as challenging issues in literature. Given
the diverse existing methods, it is crucial to develop a
general framework to evaluate these methods and ana-
lyze their shortcomings, as well as to point out promis-
ing future research directions.
To the best of our knowledge, this is the first com-
prehensive survey that focuses on the expert recommen-
dation issue in CQA. The remainder of the article is or-
ganized as follows. We overview the expert recommen-
dation problem in Section 2 and its current applications
in CQA in Section 3. In Section 4, we present the clas-
sification and introduction of state of the art expert rec-
ommendation methods. In Section 5, we compare the
investigated expert recommendation methods on vari-
ous aspects and discuss their advantages and pitfalls.
In Section 6, we highlight several promising research
directions. Finally, we offer some concluding remarks
in Section 7.
2 Expert Recommendation Problem
The expert recommendation issue is also known as
the question routing or expert finding problem. The
basic inputs of an expert recommendation problem in-
clude users (i.e., requesters and answerers) and user-
generated content (i.e., the questions raised by re-
questers and the answers provided by answerers). More
inputs might be available depending on the applica-
tion scenarios. Typically, they include user profiles
(e.g., badges, reputation scores, and links to external
resources such as Web pages), users' feedback on ques-
tions and answers (e.g., textual comments and votings),
and question details (e.g., the categories of questions
and duplication relations among questions). The rela-
tionship among the different types of inputs of an ex-
pert recommendation problem is described in the class
diagram shown in Fig. 1.
Question answering websites usually organize infor-
mation in the form of threads. Each thread is led by a
single question, which is replied to with none, one, or
Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA
3
Fig.1. Elements of expert recommendation in CQA.
multiple answers. Each question or answer is provided
by a single user, called a requester or an answerer, re-
spectively. A requester may ask multiple questions, and
each answerer may answer various questions. A user
can be either a requester or an answerer, or both at the
same time in the same CQA website, and all users are
free to provide different types of feedback on the posted
questions and answers. For example, in Stack Overflow,
any registered user can comment and vote (by giving
a thumb up or thumb down) on an answer posted for
any question, and the requester has the authority to
mark one from the posted answers as the best answer.
In case that the requester has not designated the best
answer within a specified period, the system will auto-
matically mark the response that received the highest
voting score as the best answer.
The objective of the expert recommendation prob-
lem is to raise the attention of experts, i.e., a small num-
ber of users who are most likely to provide high-quality
answers, to the given question based on the above prob-
lem inputs. Despite the various possible types of inputs,
only a subset of them might be available in a specific
application scenario. Therefore, researchers may define
the expert recommendation problem differently accord-
ing to the inputs. Besides, researchers may take into
account different concerns and expect different types
of outputs from their methods. Generally, topical rel-
evance and expertise are the two most considered as-
pects of concerns by the existing research. While some
researchers develop methods to find a group of high-
quality answerers, other researchers aim to deliver a
ranked list, where the users are ranked according to
their potential to provide the best answer. We will
elaborate the variations in the problem definition in
Section 5.
Generally, it is only necessary to recommend experts
when the new question is significantly different from
any previous questions with best answers, meaning that
no satisfactory answers are readily available within the
archive of best answers to the earlier questions. Expert
recommendation generally brings about the following
advantages to CQA: i) users usually prefer answers from
experts, who are supposed to have sufficient motiva-
tion and knowledge to answer the given questions and
therefore more likely to provide high-quality answers
promptly; ii) expert recommendations can potentially
reduce the waiting time of requesters in finding satis-
factory answers as well as the time of experts in find-
ing their questions of interests; iii) by bridging the gap
between requesters and answerers, expert recommenda-
tions can potentially promote their participation rates
and thus foster stronger communities. Since experts
are recommended with questions that fit their exper-
tise, their visibility is expected to be improved as well.
3 Current Applications in CQA
Currently, there exist various Q&A websites where
expert recommendation techniques are applied or can
be potentially applied. Due to the large number of
Q&A websites that exist nowadays, we selectively list
some typical Q&A websites by launch year in Table 1.
In the following subsections, we will categorize and give
further illustrations of several typical websites of each
category.
3.1 Early CQA Services
Most early-stage Q&A services (e.g., the first four
websites in Table 1) meet a requesters' information
needs by resorting to the opinions of experts rather than
the crowd. These experts are acknowledged by either
the websites or third-party authorities and are often
limited in number. They usually have rich knowledge
and experience in some domains but require a payment
for the answers they provide. We introduce two of these
websites as examples as follows:
4
J. Comput. Sci. & Technol., January 2018, Vol.33, No.1
Community
MedHelp
Mad Scientist Netwok
WebMD
Google Answers
Naver KiN
WikiAnswers
Answerbag
IAsk
Baidu Knows
Live QnA
TurboTax Live Community
Sogou Wenwen
Stack Overflow
Quora
Seasoned Advice
Table 1. Some Popular Question Answering Communities
Language
Specialized Domain
Launch Year
Still Active
Quality Guarantee
English
English
English
Multiple
Korean
English
English
Chinses
Chinese
English
English
Chinese
English
English
English
Medical
Various
Medical
Various
Various
Various
Various
Various
Various
Various
Tax
Various
Programming
Various
Cooking
1994
1995
1996
2002
2002
2002
2003
2005
2005
2006
2007
2007
2008
2010
2010
Y
Y
Y
N
Y
Y
Y
Y
Y
N
Y
Y
Y
Y
Y
Y
Y
Y
Y
N
N
N
N
N
N
N
N
N
N
N
Mad Scientist Network 1 : a famous ask-a-scientist
web service where people ask questions by filling forms
and moderators are responsible for reviewing the ques-
tions and sending them to the appropriate members for
answers. The moderators will also review the answers
before making them public.
Google Answers 2 : a knowledge market service de-
signed as an extension to Google's search service. There
were a group of answerers called Google Answers Re-
searchers who are officially approved to answer ques-
tions through an application process. Instead of pas-
sively waiting for other people to moderate or answer
their questions, people can actively find the potential
answerers by themselves and pay the answerers.
3.2 General-purpose CQA Websites
The Q&A services that emerge in the past two
decades are increasingly leveraging the "wisdom of the
crowd" rather than a small number of experts to give
answers. Websites following this philosophy allow any
users to voluntarily answer any questions on their free
will and most of them serve as general purpose plat-
forms for knowledge sharing rather then domain fo-
cused ones. We overview some typical general purpose
websites as follows:
Quora: one of the largest existing Q&A website
where users can ask and answer questions, rate and
edit the answers posted by others.
Zhihu 3 : a Chinese Q&A website similar to Quora.
It allows users to create and edit questions and answers,
rate system, and tag questions. Also, users may also
post blogs in Zhihu for sharing while others can view
and comment on such posts.
Naver KiN 4 : a Korean CQA community, one of
the earlier cases of expansion of search service using
user-generated content.
WikiAnswers 5 : a wiki service that allows people
to raise and answer questions, as well as edit existing
answers to questions. It uses a so-called "alternates sys-
tem" to automatically merge similar questions. Since
an answer may be associated with multiple questions,
duplicated entries can be avoided to some extent.
Answerbag 6 : a CQA community where users can
ask and answer questions, give comments to answers,
rate questions, rate answers, and suggest new cate-
gories.
Live QnA 7 : also known as MSN QnA, was part of
Microsoft MSN group services.
In this system, users
can ask and answer questions, tag them to specific top-
ics, and gain points and reputations by answering ques-
1 http://www.madsci.org/, May 2018.
2 http://answers.google.com/, May 2018.
3 http://www.zhihu.com/, May 2018.
4 http://kin.naver.com/, May 2018.
5 http://www.wikianswers.com/, May 2018.
6 http://www.answerbag.com/, May 2018.
7 http://qna.live.com/, May 2018.
Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA
5
tions.
4 Expert Recommendation Methods
3.3 Domain-focused CQA Websites
Compared with those general purpose websites,
each domain-focused Q&A website only covers limited
topics or knowledge domains. The Stack Exchange net-
works are probably the largest host of domain-focused
Q&A websites nowadays. Some typical websites hosted
by it include the following:
MathOverflow 8 : a Q&A website focused on math-
ematical problems.
AskUbuntu 9 : a website supporting Q&A activities
related to Ubuntu operation Systems.
StackOverflow : a Q&A website focused on com-
puter programming.
All these websites follow similar sets of styles and
functions. Apart from the basic question answering
features, they commonly use badges to recognize the
achievement of answerers and grant badges to users
based on their reputation points. Users can also un-
lock more privileges with higher reputation points.
3.4 Summary
In summary, despite the prevalence of diverse types
of Q&A websites, few of them have incorporated any
effective expert recommendation techniques to bridge
requesters and answers. To the best of our knowledge,
currently, the only implementation of the idea of rout-
ing questions to the appropriate users in Q&A is called
"Aardvark" [16]. However, the primary purpose of this
system is to serve as an enhanced search engine, and
the expert recommendation techniques it employs are
still at a preliminary stage. Recently, Bayati et al. [17]
design a framework for recommending security experts
for software engineering projects. This framework offers
more strength to facilitate expert recommendation by
considering multiple aspects of users such as program-
ming language, location, and social profiles on domi-
nant programming Q&A websites like StackOverflow.
Since the Q&A systems can be regarded as a type of
crowdsourcing systems [18], the expert recommendation
methods for a Q&A system can potentially be gener-
alized and applied to general crowdsourcing systems as
well.
8 http://mathoverflow.net/, May 2018.
9 http://askubuntu.com/, May 2018.
As the major technique to facilitate effective CQA,
considerable efforts have been contributed to the ex-
pert recommendation research from the information re-
trieval (IR), machine learning, and social computing
perspectives, and have delivered fruitful results. We
classify the state of the art expert recommendation
methods into eight categories and review the methods
by category in the following subsections.
4.1 Simple Methods
One of the most critical tasks of expert recommen-
dation is to evaluate users. Given a new question to
be answered, some methods use simple metrics such
as counts of positive/negative votes, proportions of
best answers, and the similarity between the new ques-
tion and users' previous answered questions to evaluate
users' fitness to answer the questions. In the following,
we introduce the methods that use the three metrics,
respectively. For any of these methods, a higher score
indicates a better answerer.
Votes: the method evaluates a user by the number
of affirmative votes minus the number of negative votes,
combined with the total percentage of affirmative votes
that the user receives from other users averaged over
all the answers the user have attempted.
Best answer proportion: this method ranks users by
the fraction of best answers among all the answers at-
tempted by an answerer. The best answers are either
awarded by the requester of questions or by the ques-
tion answering platform when requesters designate no
best answers.
Textual similarity:
the most famous method for
measuring textual similarity is to compute the cosine
similarity based on the term frequency-inverse docu-
ment frequency (TF-IDF) model, a classic vector space
model (VSM) [19] borrowed from the information re-
trieval domain. VSM is readily applicable to computing
the similarity of an answerer's profile to a given ques-
tion. Therefore, it can be directly used for the expert
recommendation by relating a new question to the an-
swerers who have previously answered the most relevant
questions to the given question.
6
J. Comput. Sci. & Technol., January 2018, Vol.33, No.1
4.2 Language Models
Despite the simplicity, VSM adopts the "bag-of-
words" assumption and thus brings the high-dimension
document representation issue.
In contrast, language
models use a generative approach to compute the word-
based relevance of a user's previous activities to the
given question, and in turn, to predict the possibility
of a user answering the question. Such models can,
to some extent alleviate the high dimension issue. In a
language model, the users whose profiles are most likely
to generate the given question are believed to have to
highest probability to answer the given question. The
model finally returns a ranked list of users according to
their likelihood of answering the given question.
The language model-based methods include profile-
based methods and document-based methods. The for-
mer [20] models the knowledge of each user with the as-
sociated documents and ranks the candidate experts
for a given topic based on the relevance scores between
their profiles and the given question. The latter [20]
finds related documents for a given topic and ranks
candidates based on mentions of the candidates in the
related documents.
4.2.1 QLL and Basic Variants
Among the methods of this category, query likeli-
hood language (QLL) model [21] is the most popular
technique. QLL calculates a probability that user pro-
files will generate terms of the routed question. The
traditional language models often suffer the mismatch
between the question and user profiles caused by the
co-occurrence of random words in user profiles or ques-
tions resulting from data sparseness. Translation mod-
els [22] overcomes data sparseness by employing statis-
tical machine translation and can differentiate between
exact matched words and translated semantically re-
lated ones. A typical work [23] using this method views
the problem as an IR problem.
It considers the new
question as a query and the expert profiles as docu-
ments.
It next estimates an answerer's expertise by
combining its previously answered questions, and re-
gards experts as the users who have answered the most
similar questions in the past.
Besides the basic models, many variants of QLL
have also emerged as alternatives or enhancements. For
example, Liu et al. propose two variants of the ba-
sic language model, namely relevance-based language
model [24] and cluster-based language model [25] to rank
user profiles. Petkova and Croft [26] propose a hierarchi-
cal language model which uses a finer-grained approach
with a linear combination of the language models built
on subcollections of documents.
4.2.2 Category-sensitive QLL
Considering the availability of categories in many
Q&A websites, Li et al. [27] propose a category-sensitive
QLL model to exploit the hierarchical category infor-
mation presented with questions in Yahoo! Answers.
Once a question gets categorized, the task is to find the
users who are most likely to answer that question within
its category. Their experiments over the Yahoo! An-
swers dataset show that taking categories into account
improves the recommendation performance. A limita-
tion of the category-sensitive model is that categories
need to be well predefined and some questions might
be closely related to multiple categories due to the ex-
istence of similar categories that share the same con-
texts. A possible solution to address this limitation is
the transferred category-sensitive QLL model [27], which
additionally builds and considers the relevance between
categories.
4.2.3 Expertise-aware QLL
Zheng et al. [28] linearly combine two aspects, user
relevance (computed based on the QLL) and answer
quality (estimated using a maximum entropy model),
using the simple weighted sum method to represent
user expertise on a given question. Besides the rele-
vance and quality aspects, Li et al. [6] further consider
the availability of users and use the weighted sum of
the three aspects to represent user expertise on a given
question. In particular, the relevance is estimated us-
ing the QLL model, the answer quality is estimated as
the weighted average of previous answer quality incor-
porated with the Jelinek-Mercer smoothing [29] method,
and users' availability to answer a given question during
a given period is predicted by an autoregressive model.
Compared with most existing methods, this method ex-
ploits not only time series availability information of
users but also multiple metadata features such as an-
swer length, question-answer length, number of answers
for this question, the answerer's total points, and the
answerer's best answer ratio. These features have rarely
been used by the existing research.
4.3 Topic Models
Since language models are based on exact word
matching, they are most effective when they are used
within the same topic. Besides, they are not able to
Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA
7
capture more advanced semantics and solve the prob-
lem of the lexical gap between a question and user pro-
files. In contrast, topic models do not require the word
to appear in the user profile, as it measures their re-
lationship in the topic space rather than in the word
space. It can, therefore, alleviate the lexical gap prob-
lem and previous experimental evaluations have con-
firmed the better performance of many topic models
over language models [30;31]. Here, we focus on review-
ing two most widely used topic models, Probabilistic
Latent Semantic Analysis (PLSA) and Latent Dirichlet
Allocation (LDA), as well as their variants and a few
other models.
4.3.1 PLSA and Its Variants
Probabilistic Latent Semantic
Probabilistic Latent Semantic Analysis (PLSA)
a.k.a.
Indexing
(PLSI) [32] is developed based on Latent Semantic In-
dexing (LSI) [33], which uses Singular Value Decomposi-
tion to represent a document in a low-dimension space.
Compared with LSI, which lacks semantic explanation,
PLSA uses latent topics to represent documents and
model the data generation process as a Bayesian net-
work. In this way, it can leverage the semantic between
words in documents to reduce the document representa-
tion space dimension. There are generally two classes of
PLSA-based methods that model users directly and in-
directly, respectively. We briefly review the two classes
of methods as follows:
Direct User Model by PLSA. Methods of this class
treat all the questions that a user accesses as one docu-
ment. Then, PLSA is used directly to derive the topic
information of the user using word distributions. A typ-
ical method of this class [15] would identify the under-
lying topics of questions to match users' interest and
thereby help the capable users locate the right ques-
tions to answer. The Expectation Maximization (EM)
algorithm is generally used to find a local maximum of
the log-likelihood of the question collection and to learn
model parameters.
Indirect User Model by PLSA. A typical method of
this class is proposed in [34]. This work presents an
incremental automatic expert recommendation frame-
work based on PLSA. It considers both users' interests
and feedback and takes questions as documents. It fur-
ther uses PLSA to model the question to gain its distri-
bution on topics, followed by representing users as the
average of topic distributions of all the questions that
he accesses to facilitate recommendation.
A most important variant of PLSA is probably the
Dual Role Model (DRM) proposed by Xu et al. [35].
Instead of combining the consideration of a user as
a requester and an answerer, DRM separately mod-
els users' roles as requesters and as answerers and de-
rive the corresponding probabilistic models based on
PLSA. Depending on the modeling approach of user's
role, DRM diverges into independent DRM, a type of
method modeling user role indirectly, and dependent
DRM, a method which learns the role model directly.
In particular, the independent DRM assumes all users
are independent of each other and models each user
individually.
In contrast, dependent DRM considers
the dependence between users. Besides modeling users'
topic distribution as requesters and answerers, it addi-
tionally models the relationship between answerers and
requesters for better performance.
4.3.2 LDA and Its Variants
The Latent Dirichlet Allocation (LDA) model [36] is
probably the most widely used topic model among all
existing topic models developed.
In LDA, the topic
mixture is drawn from a conjugate Dirichlet prior that
remains the same for all users. More specifically, LDA
assumes a certain generative process for data. To gener-
ate a user profile, LDA assumes that for each user pro-
file a distribution over topics is sampled from a Dirich-
let distribution. In the next step, for each word in the
user profile, a single topic is chosen according to this
topic distribution. Finally, each word is sampled from
a multinomial distribution over words specific to the
sampled topic. Here, we briefly review two important
classes of LDA variants that have been applied for the
expert recommendation in CQA:
Segmented Topic Model (STM) [37]. This is a topic
model that discovers the hierarchical structure of top-
ics by using the two-parameter Poisson Dirichlet pro-
cess [38]. As a four-level probabilistic model, STM con-
tains two levels of topic proportions and shows supe-
riority over traditional models. Instead of grouping all
the questions of a user under a single topic distribution,
it allows each question to have a different and separate
distribution over the topics. A user profile is considered
a document that contains questions (segments). The
above distributions cover the expertise set of a user,
the topics of each question in the profile, as well as the
correlation between each profile and its questions.
TagLDA [39]. This method uses only tag informa-
tion to infer users' topical interest. It is more efficiently,
8
J. Comput. Sci. & Technol., January 2018, Vol.33, No.1
but the effectiveness is dependent on the accuracy and
availability of tags.
4.3.3 Expertise-aware LDA
The work in [40] considers both the topical interest
and expertise of a user relevant to the topics of the
given question. It also uses LDA to identify topical in-
terest from previous answers of the user, but additional
compute the expertise level of users using collaborative
voting mechanism. Sahu et al. [39] incorporate question
tags and related voting information in LDA to compute
user expertise, where user expertise is computed based
on both the topical distribution of users and voting in-
formation under the same question tags.
4.3.4 Other Topic Models
Besides the famous QLL and LDA models, Zhou
et al. [14] propose a method that groups threads (i.e.,
a question and related answers) of similar content into
clusters to build a cluster-based thread for each user.
Each cluster represents a coherent topic and is associ-
ated with users to indicate the relevance relationship.
The ranking score for a user is then computed based
on the aggregation of the relevance of the user to all
clusters given a new question. Guo [3] proposes a user-
centric and category-sensitive generative model for dis-
covering topics, named User-Question-Answer (UQA).
The work incorporates topics discovered by UQA model
with term-level matching methods to recommend ex-
perts and increase the participation rate of users in
CQA. In this model, each user is considered as a pseudo-
document which is a combination of all the questions
the user has asked and all the answers the user has pro-
vided in reply to other users' questions. More methods
can be derived based on this model as well as the com-
binations of these methods.
4.4 Network-based Methods
The network-based methods evaluate users' author-
itativeness in a user-user network formed by their
asking-answering relations and recommend the most
authoritative users as experts for a new question. The
simplest network-based method uses Indegree [41] to
rank and recommend users.
In particular, an inde-
gree score equals the number of other users a user has
helped by answering their questions, represented by an
arrow from the requester to the answerer in the user-
user network. Since frequent posters tend to have a
significant interest in the topic and a larger degree of a
node usually correlates with answer quality [41;42], this
method regards the users with higher degrees as better
answerers for the recommendation. The mainstream of
this category include three families of methods based
on PageRank [43], HITS [44], and ExpertiseRank [41], re-
spectively. We will also briefly introduce several other
network-based methods to gain a comprehensive view
of the related techniques.
4.4.1 PageRank and Its Variants
PageRank [45;46] uses nodes to represent users, and a
directed edge to indicate one user (i.e., the source node)
answers the questions of another user (i.e., the destina-
tion node). It estimates the likelihood that a random
walk following links (and occasional random jumps) will
visit a node. Each edge is associated with an affinity
weight that measures the times that the answerer has
replied to the requesters' questions. Two users are con-
nected if their affinity weight is greater than 0, and
the transition probabilities between nodes are obtained
by normalizing the affinity weights. Now, the algorithm
has been extended to bias the jump probability for par-
ticular topics [47] and many others static web ranking
tasks. Choetkiertikul et al. [48] also use PageRank, but
they measure the weights differently, i.e., evaluating the
number of users' tags and activity times in common as
weights between the users who have asking-answering
relations.
The main variants of PageRank include SALSA [49],
EntityRank [50], TwitterRank [51], and AuthorRank [52].
They differ from the above PageRank-based methods
in focusing on some specific application domains. How-
ever, they still have the potential to be generalized to
broader scenarios.
4.4.2 HITS and Its Variants
Different from PageRank, which does not distin-
guish between hub and authority nodes, the HITS al-
gorithm is based on the observation that there are two
types of nodes: (1) hubs, which links to authoritative
nodes; (2) authorities, which provide useful information
on the given topics. HITS assigns each node two scores:
hub score and authority score. A hub score represents
the quality of outgoing links from the nodes while au-
thority represents the quality of information located on
that nodes. A typical work based on HITS is proposed
by Jurczyk et al. [45;46]. Instead of the times of the an-
swerer replying to the requester's questions, this work
models the weights of edges to indicate answer quality
in HITS, based on users' explicit feedback, e.g., thumb
Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA
9
up/down from users, and whether the answer is the best
answer. The results show that the HITS algorithm out-
performs the methods based on simple graph measures
such as in-degree.
An important variant of HITS is proposed by
Shahriari et al. [53].
Instead of considering the entire
user-user network as a single community, this method
regards the network as the combination of multiple
user communities. Thereby,
it detects overlapping
communities [54] and differentiate the impact of intra-
community and inter-community users to other users
in the user-user network.
4.4.3 Expertise-aware Network-based Methods
Zhang et al. [41] propose ExpertiseRank based on
the intuition that an answerer whore replies to a ques-
tion usually has superior expertise than the requester
on the specific topic. Their experimental results indi-
cate that for a closed domain such as the Java devel-
oper forum, ExpertiseRank performs better than gen-
eral graph-based algorithms like PageRank and HITS.
ExpertiseRank considers not only how many other users
a user has helped but also which other users the user
has helped. It propagates the expertise scores of users
through the question-answer relationship in a user-user
network. The intuition behind ExpertiseRank is that
one should get more credit for answering the questions
of a user with higher expertise rather than the questions
of a user with lower expertise.
The ExpertiseRank computation finally derives a
score for each user, called z-score, based on which
to quantify their authoritativeness. Z-score [41] com-
bines users' asking and replying patterns to measure
how many standard deviations above or below the ex-
pected 'random' value a user lies. The more questions
a user has answered and the fewer questions the user
has asked, the higher the Z-score of this user. There-
fore, this method recommends users with the highest z-
scores as experts. The experts obtained by this method
should answer many questions and ask very few ques-
tions.
Besides ExpertiseRank, Jurczyk et al. [45] incorpo-
rate users' authoritativeness on a given question (esti-
mated by the tags of users' posts) and users' answer
quality (predicted based on their past answer activi-
ties); the method in [55] differs in determining user qual-
ity by the number of best answers they provide. Zhou
et al. [14] use the post content of users to compute user
expertise and reply frequencies of users computed by
PageRank to re-rank users. They further use inverted
indexes and threshold algorithm [56] to store and re-
trieve pre-computed intermediate scores to accelerate
the computation. The final score of a user takes the
product of the results of language model and the re-
sults of PageRank.
4.4.4 Other Network-based Methods
Here, we review some typical enhancement or ex-
tension of the traditional link analysis methods as fol-
lows: Zhu et al. [57;58] additionally consider the cate-
gory relevance of questions and rank user authority in
an extended category link graph; Liu et al. [59] compre-
hensively utilize multiple types of relationships between
requesters and answerers, and between the best answer-
ers and other answerers to find expert users; rather
than leveraging the asking-answering interactions, Lai
et al. [60] employ the endorsement relationship among
users to form user reputation graphs, based on which
to recommend experts. Similarly, Lin et al. [61]compute
user reputation based on their trust relationship in a
user-user network. By assuming each question has a
known category and theme, they cluster users based
on their reputation scores on each question theme and
evaluate users based on their theme-specific reputation.
Liu et al. [62] incorporate user-subject relevance (com-
puted by cosine similarity) and user reputation with
users' category-specific authoritativeness obtained from
link analysis for the expert recommendation.
The latest network-based method is proposed by Liu
et al. [63]. This work routs questions to potential an-
swerers from the viewpoint of knowledge graph embed-
ding and integrates topic representations with network
structure into a unified question routing framework.
The framework takes into account various types of re-
lationships among users and questions.
It is demon-
strated to increase the answer rates of questions by us-
ing the recommended experts.
4.5 Classification Methods
When regarding experts as a particular class of users
among all users, the problem of identifying the experts
can be easily transformed into a classification problem
that aims to distinguish such a particular class of expert
users from the other users. Compared with the other
methods, classification methods can easily apply multi-
ple aspects of features from the user, question, answer,
or user-user interaction's perspectives, to the expert
recommendation problem. For example, Pal et al. [64]
use three classes of features and train a binary classifier
10
J. Comput. Sci. & Technol., January 2018, Vol.33, No.1
to distinguish experts from ordinary users. These fea-
tures include question features (e.g., question length,
word n-gram), user features (e.g., number of answers
and number of best answers provided by a user), and
user feedback on answers (e.g., user votes and com-
ments to the answers),
Support Vector Machine (SVM) is the most used
classification method for distinguishing expert from
those non-experts. Beside diverse methods, the clas-
sification methods have used different features besides
the basic question and user features, such as part-of-
speech features, graph features to trains their models.
For example, Pal et al. [65] extract features by model-
ing users' motivation and ability to help others and use
SVM and C4.5 decision tree separately for expert detec-
tion. Zhou et al. [66] also use SVM but they define both
local and global features on questions, user history, and
question-user relationship and additional consider KL-
divergence as a new feature. Ji et al. [67] additionally
use text similarities as features to train SVM and one
of its variant, RankingSVM.
Besides, more methods such as random forests
(RF) [48] and Naive Bayes [68] are used by existing stud-
ies. Some typical work includes: Le et al. [69] con-
sider more new features such as community features
(e.g., average score of posts, average number of com-
ments, average favorites marked), temporal features
(e.g., time gaps between posts), and consistent fea-
tures (e.g., scores of the posts, time gap between re-
cent posts). They also try some new methods like lo-
gistic regression and adaptive boosting in addition to
decision trees and random forest for the classification.
As an enhancement to decision trees, Dror et al. [70]
propose a representation model based on multi-channel
vector space model, where users and questions are rep-
resented as vectors consisting of multi-dimensional fea-
tures. Then, the matching degree between a user and
a question is learned from their respective features us-
ing a binary classifier called Gradient Boosted Decision
Trees (GBDT).
Instead of the conventional features used for iden-
tifying experts, Pal et al. [64] use a different crite-
rion, question selection bias, for recommending experts,
based on the assumption that experts prefer answering
questions to which they bear a higher chance of mak-
ing a valuable contribution. o They use the probability
of answering questions of different value as the feature
vector and employ two methods, logistic regression and
Gaussian Mixture Model, to solve the binary classifica-
tion problem. In a later version, Pal et al. [71] use differ-
ent equations to estimate the value of existing questions
and to model the selection probabilities of questions by
users. The method shows better performance of the
Bagging metaclassifier over several single-version clas-
sification algorithms The work also partially confirms
that experts have some bias on question selection based
on the existing value of answers to the questions.
Given the advantages of ranked recommendation re-
sults over unranked results, Ji et al. [67] propose Rank-
ingSVM, a ranking model based on SVM, for the ex-
pert recommendation. Burel et al. [72] extract pat-
terns from the question-selection behaviors of users in
a Q&A community and then use Learning to Rank
(LTR) models to identify the most relevant question
to a user at any given time. They further employ Ran-
dom Forests, LambdaRank [73], and ListNet [74] to de-
rive a pointwise method, a pairwise method, and a list-
wise method, respectively, to gain ranked expert list
along with the classification process. Similarly, Cheng
et al. [75] also formalize expert finding as a learning-to-
rank task. However, they leverage users' voting infor-
mation on answers as the "relevance" labels and utilize
LambdaMART to learn ranking models which directly
optimizes a rank-based evaluation metric, normalized
discounted cumulative gain (nDCG). Logistic regres-
sion [76] has also been used recently to facilitate both
ranking and classification.
4.6 Expertise Probabilistic Models
Dom et al. [77] propose the only probabilistic model
that focuses on user expertise for the expert recom-
mendation in CQA. They use a Bayesian probabilis-
tic model to obtain a posterior estimate of user credi-
bility thereby recommending experts for a given ques-
tion. This work assumes user expertise conforms to the
Bernoulli distribution (or the mixture of two beta distri-
butions) and uses Maximum A Posteriori (MAP) esti-
mation to make predictions. It then ranks users accord-
ing to their probabilities of providing the best answer to
the given question, characterized by the probability of
each user to be awarded the best answer on a question
given the user's question-answering history. The work
also discovered that Bayesian smoothing performs bet-
ter than several other smoothing methods such as max-
imum a priori estimation, maximum likelihood (ML)
estimation, and Laplace smoothing.
Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA
11
4.7 Collaborative Filtering Methods
Given the advantages such as flexibility and scala-
bility of collaborative filtering (CF) methods, esp., the
matrix factorization techniques [78] in the recommenda-
tion domain, some researchers seek to use CF for the
expert recommendation in CQA. For example, Cho et
al. [79] consider that case that only one expert will be
designated to answer each question. They then cap-
ture users' behavioral features as potential answerers
by matrix factorization [80]. Regularization terms are
incorporated to represent user interest, user similarity,
and users' probability to answer for better performance.
Instead of the basic matrix factorization model,
Yang et al. [81] employ probabilistic matrix factorization
(PMF), which combines generative probabilistic model
and matrix factorization, to address the expert recom-
mendation problem. In particular, PMF learns the la-
tent feature space of both users and tags to build a
user-tag matrix [82], which is then used to recommend
experts given a new question.
4.8 Hybrid Methods
To comprehensively take into account multiple as-
pects of clues, some researchers propose hybrid methods
that combine different aspects of concerns techniques
and different techniques for better recommendation re-
sults. Here, we review the typical hybrid methods as
follows.
4.8.1 Language Model + Topic Model
Liu et al. [30] combine QLL and LDA and show the
hybrid approach outperforms either of the original mod-
els.
4.8.2 Topic Model + Network-based Method
Zhou et al. [83] identify authoritative users by con-
sidering both the link structure and topic information
about users. They first apply LDA to obtain user-topic
matrix and topic-word matrix, and then use PageR-
ank and Topical PageRank for the expert recommen-
dation. Liu et al. [84] propose a topic-sensitive proba-
bilistic model to estimate the user authority ranking
for each question. The model is based on PageRank
incorporate with topical similarities between users and
questions. A very similar method named topic-sensitive
link analysis is proposed by Yang et al. [85]. Recently,
Rao et al. [86] propose a similar approach that recom-
mends experts based on users' topical relevance and
authoritativeness given a new question. They also use
LDA to discover topics but measure users' authorita-
tiveness for each topic based on the 'like' relationship
among users in a social network.
Zhao et al. [87] use the TEL model to generate topic
information, based on which to model experts over top-
ics. TEL is based on LDA and is a unified model
combining both graph-based link analysis and content-
based semantic analysis for expert modeling in CQA.
Instead of using a fixed user-answering graph to influ-
ence the prior of expert modeling, TEL highlights the
causal relationship between topics and experts by using
both user-user matrix and question-user matrix to rep-
resent a user's contribution to another user or a ques-
tion, with best answers given higher weights. It is com-
pared with two baseline topic modeling methods, one
recommending experts based on requester-answerer in-
teractions and the other recommending experts based
on question-answerer interactions, which show its bet-
ter performance.
Zhou et al. [88] extend PageRank with the topic-
sensitive probabilistic model by considering topical
similarity.
In particular, the method improves the
PageRank-based expert recommendation methods by
running PageRank for each topic separately, with each
topic-specific PageRank prefers those users with high
relevance to the corresponding topic. As a further
step, Yang et al. [89] jointly model topics and exper-
tise to find experts with both similar topical preference
and superior topical expertise on the given question.
The method integrates textual content model (GMM)
and link structure analysis and leverages both tagging
and voting information.
It linearly incorporates the
estimated user topical expertise score into the recur-
sive PageRank score computation formula and extends
PageRank to make the final recommendation.
4.8.3 Language+Topic+Network-based Model
Liu et al. [30] assume that more authoritative an-
swerers may give more accurate answers, and more ac-
tive answerers may be more willing to answer new ques-
tions. They linearly combine QLL and LDA models to
compute relevance, and additionally consider both user
activity and authority information for the recommen-
dation.
4.8.4 Topic Model + Classification Method
RankingSVM [67] employs LDA to calculate text
similarity and use this similarity as a feature in a
classification method for the expert recommendation.
12
J. Comput. Sci. & Technol., January 2018, Vol.33, No.1
The experimental results show the resulting method
achieves better performance than SVM.
4.8.5 Topic Model +Collaborative Filtering
Yan et al. [90] combine topic model and tensor fac-
torization for the expert recommendation. They train
an LDA via Gibbs Sampling with a manually defined
topic number, followed by performing tensor factoriza-
tion (TF) based on "requester-topic-answerer " triples
via gradient descent to compute the recommendation
scores of users.
4.8.6 Network-based Method + Clustering
Following the similar idea of geo-social community
discovery [91] in Point of Interest (POI) recommenda-
tion, Bouguessa et al. [55] incorporate clustering meth-
ods with network-based measures for the expert recom-
mendation. In particular, they consider the number of
best answers as an indicator of authoritativeness of a
user in a user-user network, where users are connected
via directed edge from requesters to best answerer, with
the edges weighted by the number of best answers in-
between. In particular, they model the authority scores
of users as a mixture of gamma distribution and use the
Fuzzy C-Means algorithm to partition users into differ-
ent numbers of clusters. They further use Bayesian
Information Criteria (BIC) to estimate the appropri-
ate number of mixtures. Finally, the users are classi-
fied into to classes, one representing authoritative users
with high in-degrees and the other non-authoritative
users with low in-degrees. In this way, the method can
automatically surface the number of experts in a com-
munity rather than producing a ranked list of users.
5 Comparison and Discussion
To gain a better understanding of state of the art,
we first summarize the existing expert recommendation
methods concerning the used dataset, the required in-
put & output, and the evaluation metric. We further
compare and discuss the methods from three perspec-
tives: the covered aspects of concern, reliance on suffi-
cient data, and complexity, to identify their strengths
and pitfalls. The three perspectives reflect the methods'
capability in the recommendation power, applicability
(robustness to cold start or sparse data), and easiness
of usage (implementation difficulty), respectively.
5.1 Datasets
In this section, we list the most used datasets by ex-
isting expert recommendation research. These datasets
include both the real-world and synthetic ones, as well
as those that do not belong to but are readily applicable
to evaluating the methods for the expert recommenda-
tion in CQA. Among the real-world datasets, only the
first two represent the dominant datasets used by most
existing research while all the others are less used.
5.1.1 Yahoo! Answers
Yahoo! Answers [3;6;27;35;45;66;83;87;90;92] is perhaps
the most popular and most studied datasets in Q&A
related research. The characteristics of Yahoo! An-
swers, such as the diversity of questions and answers,
the breadth of answering, and the quality of those an-
swers, are first investigated by Adamic et al. [11] in 2008.
In particular, they use user entropy to indicate a user's
concentration or focus on the different categories of top-
ics. They further cluster questions and answers based
on the content to understand users' activity on different
topics in CQA. The results showed that the majority of
users participated in a small number of topics. These
features set the practical foundation for predicting an-
swer quality by the amount of work and activities of
users. Since each question has at most one best answer,
the amount of ground truth might be sparse when only
a part of the entire dataset is used in experiments. For
this reason, some researchers set up their own criteria
to determine whether an answer is a "good" answers or
not, to expand the training and test set for their meth-
ods. For example, Li et al. [6] label an answer a "good"
answer either when it is selected as the best answer or
when it obtains more than 50% of up-votes for all the
answers of the question. Meanwhile, one answer is la-
beled as a "bad" answer if it receives more than 50% of
rate-downs for all answers of the question.
5.1.2 Stack Overflow
Stack Overflow [31;37;39;48;64;69;71;75;93;94]
involves
over five million users and content about 11,053,469
questions, among which only 73% have received answers
and closed and 55%, i.e., over six million questions,
have accepted best answers (as of 10 March 2016). Like
the Yahoo! Answers dataset, the records in the Stack
Overflow dataset is massive, and most existing research
sample a subset of the entire dataset for study. For ex-
ample, Pal et al. [71] sample a small dataset of 100 users
and employ two expert coders to label the 100 users
Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA
13
Sogou Wenwen [90]:
formerly known as Tencent
Wenwen or Soso Wenwen, is similar to Quora and also
run with credit points and reputation points. Users can
obtain points by asking or answering questions and use
them as bounty.
Iask 13 [30]: a leading web 2.0 site in China. The
working mechanism is similar to Baidu Knows, while
in Iask, a requester can increase bounty to extend 15
days before question closed due to a previously accepted
answer.
Other datasets on Stack Exchange: such as com-
puter science 14 , fitness 15 [53], and cooking 16 . There are
total 133 communities for knowledge sharing and ques-
tion answering, covering enormous topics on Stack Ex-
change.
Estonian Nature forum [53]: a Q&A website popular
in Estonia.
MedHelp 17 [79]: a website which partners with doc-
tors from hospitals and research facilities to provide on-
line discussion and to satisfy users' medical information
needs.
5.1.4 Synthetic Dataset
Generally, no single method outperforms all the oth-
ers on all the datasets for two main reasons: first, online
communities usually have different structural charac-
teristics and lead to differences in the performance of
methods [41]; second, the same users may behave differ-
ently in different communities due to various reasons
such as the subjectivity and rewarding mechanism of a
Q&A system. Given the lack of benchmarks to evaluate
the different methods, it has become a common prac-
tice to conduct controlled experiments with simulated
datasets to test how a method performs under differ-
ent scenarios. We will not give more introduction to
the synthetic datasets due to the significant variances
in the assumptions and conditions to generating these
datasets.
5.1.5 Non-CQA Datasets
There are plenty of datasets do not belong to the
Q&A domain but are readily applicable to or have been
as either experts or non-experts. It turns out that the
inter-rater agreement between the expert coders is 0.72
(Fleiss kappa with 95%CI, p ∼ 0), indicating the high
agreement between the raters is not accidental. Out
of the 100 users, 22 are labeled as experts and rest as
non-experts.
5.1.3 Other CQA Datasets
TurboTax Live Community (TurboTax) 10 [64;65;71]:
this is a Q&A service related to preparation of tax re-
turns. TurboTax has employees that manually evaluate
an expert candidate on factors, such as correctness and
completeness of answers, politeness in responses, lan-
guage and choice of words used. They also have some
labeled experts.
Quara [95;96]: a general and probably the world'
largest Q& A website that covers various topics.
Java Developer Forum [41]: an online community
where people come to ask questions about Java. It has
87 sub-forums that focus on various topics concerning
Java programming. There is a broad diversity of users,
ranging from students learning Java to the top Java ex-
perts. A typical sub-forum, e.g., "Java Forum", a place
for people to ask general Java programming questions,
has a total of 333,314 messages in 49,888 threads as of
as early as 2007.
the
largest
Naver KnowledgeCiN :
question-
answering online community in South Korea. Nam
et al. [97] analyze the characteristics of knowledge gen-
eration and user participation behavior in this website
and finds that altruism, learning, and competency are
often the motivations for top answerers to participate.
Baidu Knows 11 : a Chinese language CQA service,
where a member can put questions with bounty to pro-
mote others answering it. Once the answer is accepted,
it turns into search result of relevant questions.
Tripadvisor forums 12 [14]: a travel-related websites
with user-generated content focusing on accommoda-
tion bookings. The service is free to users, who provide
feedback and reviews to hotels, accommodation facili-
ties, and other traveling related issues.
10 http://ttlc.intuit.com/, May 2018.
11 http://zhidao.baidu.com/, May 2018.
12 http://www.tripadvisor.com/, May 2018.
13 http://iask.sina.com.cn/, May 2018.
14 http://cs.stackexchange.com/, May 2018.
15 http://fitness.stackexchange.com/, May 2018.
16 http://cooking.stackexchange.com/, May 2018.
17 http://www.medhelp.org/, May 2018.
14
J. Comput. Sci. & Technol., January 2018, Vol.33, No.1
used for the study of expert recommendation methods
for the CQA. A slight difference of the methods devel-
oped based on studying these datasets is that they most
aim to rank and find the most best-skilled or authorita-
tive users given an existing domain or topic instead of
a new question. These datasets include co-authorship
network [52;98;99] such as DBLP [100–102], social net-
works [16;103;104], microblogs [105–107]
such as Twit-
ter [51], Email network [108–110],
Internet forums [41],
log data [111], e-Learning platform [112], Usenet news-
groups [7;8], Google Groups [9], general documents [113],
and enterprise documents [20;26;114] such as Enterprise
track of TREC [115–117].
5.2
Input and Output
To ease illustration, we first summarize the typical
inputs and outputs of existing expert recommendation
methods in Table 2. Here, we list five categories of com-
monly used inputs for expert recommendation methods.
These inputs are either textual, numerical, or relational
information, while the outputs, i.e., the recommended
experts, are either ranked or unranked, depending on
the methods adopted.
Based on the input/output list, we further present a
comparison of the representative methods with respect
to their inputs and outputs in Table 3. Some methods
may use derived features from the original inputs as
additional inputs. For example, a classification method
may use the length of questions (implied by question
content), total question number of users (implied by
users' question history), and total answer number of
users (implied by users' answer history) as additional
features to train their models.
5.3 Evaluation Metrics
We summarize three categories of metrics used to
evaluate expert recommendation methods for CQA,
namely the basic, rank-based, and human-judgment-
based metrics. The following subsections introduce the
metrics of each category, respectively, where each met-
ric is computed as (the mean of) the average of the
metric values over a set of query questions or top-
ics [14;27;53;79;83;90].
5.3.1 Basic Metrics
recommended by a method.
Recall [53;64–66;118]: the fraction of users who are rec-
ommended by a method and meanwhile turn out to be
the real experts, among all the real experts to the given
questions.
F1-score [64–66;68;69;118]: the harmonious average of
the Precision and Recall.
Accuracy [66;69;70;118]: the fraction of users who are
correctly identified as either an expert or an non-expert
by a method. The metric integrates the precision of the
method in identifying the experts and non-experts.
5.3.2 Rank-based Metrics
Precision at top n (P@n) [14;27;79;83;87;90;92;93;119]:
the percentage of the top-N candidate answers retrieved
that are correct. It is also known as Precision at top
n (P@n) [87;90;93;119] or Success at top N (S@N) [37]. A
special case is Precision@1 [95;96] when n = 1.
Recall at top N (R@N) [90;92;93;96], a natural expan-
sion of the basic recall to rank-based scenario, similar
to P@n.
Accuracy by Rank [96]: the ranking percentage of the
best answerer among all answers. A similar metric us-
ing the best answerer's rank is proposed in [15] and [35].
Mean Reciprocal Rank (MRR) [6;14;27;53;72;83;84;90;94]:
the mean of the reciprocal ranks of the first correct ex-
perts over a set of questions, measuring gives us an idea
of how far down we must look in a ranked list in order
to find a correct answer.
Matching Set Count (MSC) @n [93;94]: the average
number of the questions that were replied by any user
ranked within top n recommended users.
Normalized
Discounted
Cumulative
Gain
(nDCG) [53;95]: a number between 0 and 1, measuring
the performance of a recommendation system based
on the graded relevance of the recommended items. A
variant is nDCG@k, the division of the raw DCG by
the ideal DCG, where k is the maximum number of
items to be recommended.
Pearson Correlation Coefficient [45;120;121]: the cor-
relation degree between the estimated ranking with the
ranks of users according to the scores derived from the
user feedback.
Area Under ROC Curve (AUC) [70]: the probability
that an expert is scored higher than a non-expert.
There are four set-based metrics to evaluate an ex-
5.3.3 Human Judgment-based Metrics
pert recommendation method:
Precision [64–66;118]: the fraction of users who are
true experts to the given questions, among all the users
Correctness percentage: human judgment is nec-
essary in the case where the ground truth is unavail-
able or hard to be determined automatically. In such
Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA
15
Table 2. Typical Inputs and Outputs of Expert Recommendation Methods
Type
Category
Question profile
User profile
Input
Historical
questions & answers
Social profile
Network profile
Recommended
experts
Output
Id
I0
I1
I2
I3
I4
I5
I6
I7
I8
I9
IA
IB
IC
O1
O2
Input/output name
Input/output type
content (and category) of the given question
textual
users' question history
users' answer history
user-question mapping
user-answer mapping
users' historical viewing and answering activity
multiple user-question mapping
timestamps of users' answering activity
numerical
question content
question category info
question tags
answer content
best answer info
voting info
user reputation
textual
textual
textual
textual
answer–{0,1} mapping
numerical
numerical
question-answer relations among users
directed user-user mapping
an unranked group of experts
a ranked list of experts
set
list
Table 3. A Comparison of Inputs and Outputs of Representative Expert Recommendation Methods
√
√
√
√ √
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√ √ √
√
√
I0 I1 I2 I3 I4 I5 I6 I7 I8 I9 IA IB IC O1 O2
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√ √
√
√
√
√
√
√ √
√
√
√ √ √
√
√
√
√
√
√
√
√
√
Category
Simple
methods
Language
models
Topic
models
Network-based
methods
Classification
methods
Expertise probability
model
Collaborative
Filtering
Hybrid
methods
Representative method
Votes
Best answer proportion
Consine similarity based on TF-IDF [19]
QLL [23–25]
Category-sensitive QLL [27;27]
Expertise-aware QLL [6;28]
PLSA [15;34], LDA [36], STM [37], UQA [3]
DRM [35]
TagLDA [39]
Indegree [41], PageRank [47;48], HITS [46;53]
z-score [41], Expertise-aware methods [14;41;45;55;56]
Reputation-aware methods [60;61]
Category-sensitive methods [57;58]
Graph embedding method [63]
SVM [65;66], C4.5 [65], RF [48], GBDT [70]
LTR [72]
Bernoulli MAP model [77]
MF [79]
Tag-based PMF [81]
QLL+LDA [30], Topical PageRank [83],
TEL [87],LDA+TF [90]
Topical PageRank+Expertise [89]
QLL+LDA+userActivity+Indegree [30]
Indegree+Clustering [55]
√ √
√ √
√
√ √
√ √
√
√
√
√
√
√
√
√
√
√
√ √ √ √ √
√ √ √ √
√
√
√
√
√ √
√
√
√
√
√
√
√
√ √
√
√
√
√
√
√
√
cases, humans usually give either Yes/No answers [3]
or ratings [41] to the recommended users. Then, the
system calculates the percentage of correctly recom-
mended users by investigating the agreement between
the judgments made by different people [55;83;118].
5.4 Covered Aspects of Concern
To study the covered aspects of concern of differ-
ent methods, we summarize the main aspects of con-
cern and their indicators in an expert recommendation
problem in Table 4. The inputs taken by each method
16
J. Comput. Sci. & Technol., January 2018, Vol.33, No.1
directly reflect the method's covered aspects of con-
cern. For example, to take user expertise into account,
a method needs to consider at least one of the three as-
pects: user reputation, voting information to answers,
and best answer flags of answers. An indicator either
belongs to or originates from the inputs. It falls into
at least one of the two aspects: answer probability and
expertise level of users.
The inputs and outputs only give some intuitive
clues of how powerful each method might be. In fact, it
is not only the inputs but also the ways of using these
inputs and the underlying techniques that determine
a method's capability in adequately addressing the ex-
pert recommendation problem.
In the following, we
elaborate each aspect of concern and make a compar-
ative discussion of the investigated methods according
to their covered aspects of concern.
5.4.1 Answer Probability
A large body of the research on the expert recom-
mendation in CQA focuses merely on ranking the rel-
evance of the given question with users' previously an-
swered questions. The underlying assumption is that
users are more likely to answer those questions that are
similar to their previously answered ones. This type
covers all the methods that consider users' answer prob-
ability yet not users' expertise level in Table 4 and range
from the simple Cosine similarity method to QLL, LDA,
MF, and further to hybrid methods that combine the
above techniques like TEL.
Similar to the general recommendation approach,
it is reasonable to assume a user prefers to answer the
questions that are similar to her already-answered ques-
tions. On the other hand, there is no evidence to show
that the stronger relevance of a user to a given ques-
tion also indicates a higher expertise level of the user
in answering that question. Therefore, such methods
may not be able to distinguish users' different levels of
expertise in either a question or a topic, and the rec-
ommended experts may not provide quality answers to
the given question.
Other issues with this type of methods are related
to the consideration of categories or topics. While con-
sidering the category or topic information enables a
method to provide personalized recommendations cus-
tomized to the given question, it raises additional issues
to the method. First, the category-sensitive methods
highly rely on the availability and proper definition of
categories. For example, suppose a user has answered
a lot of questions about 'c++' covered by the category
of 'Programming,' and is deemed a potential answerer
for questions of this category. Given a question related
to another programming language like 'Python,' which
is also covered by the category of 'Programming,' rec-
ommending this user as an expert may not be appro-
priate as the user may not be familiar with 'Python' as
well. The topic-sensitive approach is more reasonable as
topics are usually not predefined but dynamically con-
structed by algorithms, and therefore they can adapt
to the ever increasing questions and answers in a Q&A
community.
Second, an inevitable issue with considering cate-
gories or topics is that a user may have an expertise
in multiple categories or topics. For category-sensitive
methods, although the correlation among categories
can be incorporated explicitly, it could be difficult to
designate a question to a single category when the ques-
tion is related to multiple categories. For the topic-
sensitive methods, they mostly discover topics based on
probabilistic models such as LDA. Since the probabilis-
tic models distribute the total probability of 1 among all
the topics for each user, having a higher probability on
one topic will discount the probability on other topics.
However, the fact is, a user could be more relevant to
multiple topics than another user simultaneously. This
situation has not been sufficiently taken into account
by the existing research.
5.4.2 User Expertise
There are a few methods that take into account
user expertise while neglecting to consider the answer
probability of users in the expert recommendation in
CQA. These methods typically include simple tech-
niques (e.g., votes, best answer proportion) and the ex-
pertise probabilistic model in Table 4. A limitation of
these methods is that they only consider the probabil-
ity of a user giving the best answer under the condition
that the user has decided to answer the given question.
The fact is, a user with the appropriate expertise may
not answer the question in the first place due to var-
ious reasons such as lack of interest or unavailability.
Therefore, as far as answer probability is concerned,
the recommended experts may not have a good chance
of giving a quality answer.
Another issue with the methods of this type is that
they commonly compute a global expertise score for
each user while neglecting the fact that user expertise
may also be topic-sensitive, similar to answer proba-
bility. Consequently, the recommendation results inde-
pendent of to the specific problem scenario: given a new
Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA
17
Table 4. Aspects of Concern and Their Indicators Covered by Representative Expert Recommendation Methods
Representative method
Answer probability
Expertise level
Votes
Best answer proportion
Consine similarity of TF-IDF [19]
QLL [23–25]
Category-sensitive QLL [27;27]
Expertise-aware QLL [6;28]
PLSA [15;34], LDA [36], STM [37], UQA [3]
DRM [35]
TagLDA [39]
Indegree [41]
PageRank [47;48], HITS [46;53]
z-score [41]
textual relevance
textual relevance
question category
textual relevance
textual relevance
topical relevance
topical relevance
topical relevance of tags
a# of users
a# & q# of users
a# & q# of users
Expertise-aware methods [14;41;45;55;56]
a# & q# of users
Category
Simple
methods
Language
models
Topic
models
Network-based
methods
Classification
methods
Expertise prob.
model
Collaborative
Filtering
Hybrid
methods
vote counts of answers
best answer ratio
best answer ratio
a# & q# of users
a# & q# of users,
best answer number
a# & q# of users,
best answer number
a# & q# of users,
user reputation
a# & q# of users
a# & q# of users,
best answer number
best answer number
best answer ratio
best answer number
a# & q# of users
a# & q# of users,
best answer number
best answer number
Reputation-aware methods [60;61]
Category-sensitive methods [57;58]
Graph embedding method [63]
SVM [65;66], C4.5 [65], RF [48],
GBDT [70], LTR [72]
Bernoulli MAP model [77]
MF [79]
Tag-based PMF [81]
QLL+LDA [30], TEL [87]
LDA+TF [90]
Indegree+Clustering [55]
Topical PageRank [83]
Topical PageRank+Expertise [89]
a# & q# of users
a# & q# of users,
category relevance
a# & q# of users,
textual relevance
textual relevance,
question features,
user features (e.g., a#),
metrics (e.g., z-score)
textual & topical relevance
textual & topical relevance
a# & q# of users
topical relevance,
a# & q# of users
topical relevance,
a# & q# of users
textual relevance
textual relevance of tags
best answer ratio
QLL+LDA+userActivity+Indegree [30]
textual/topical relevance,
a#, q#, active time of users
Note: q# and a# denote the number of questions asked and answered by a user, respectively.
question, the recommended experts may perform gener-
ally well but unfortunately perform poorly on the given
question. The global expertise model is most suitable
for scenarios where the same topic covers all questions.
5.4.3 Both Aspects
Given the importance of both aspects of concern,
many existing methods, especially the latest ones, com-
bine the two above aspects for the better expert recom-
mendation. These methods typically include expertise-
aware QLL models, all variants of PageRank/HITS,
classification methods, collaborative filtering methods,
and hybrid methods that combine two or more of the
above methods. The straightforward way of integrat-
ing the two aspects is to compute a score for each as-
pect separately and then combine the two scores into a
weighted sum, which would be used as the criterion for
ranking users and deriving the recommendation results.
The other methods, including network-based methods,
classification methods, and collaborative filtering meth-
ods, combine the two aspects of consideration more nat-
urally.
For example, the network-based methods natu-
rally incorporate the two aspects to compute a sin-
18
J. Comput. Sci. & Technol., January 2018, Vol.33, No.1
gle criterion, user authoritativeness,
for the expert
recommendation-the users who have provided many
questions yet asked few questions are considered au-
thoritative; such users are generally believed to have
both higher probabilities to answer and better exper-
tise in a user-user network. An alternative is to use the
related user number to replace question number in the
above computation. This replacement slight changes
the computation method but does not affect the author-
itativeness definition. Instead of using a single metric
such as authoritativeness to recommend experts, the
classification methods directly take various factors as
features, without explicitly distinguishing the two as-
pects, to train a classification model. A limitation with
classification methods is that they generally deliver a
set of users as experts without further differentiating
them. Therefore, they lack the flexibility to decide how
many users to recommend as experts on the fly.
To explicitly utilize the best answer information in
a network-based method, a simple approach is to re-
place the 'requester-answerer' relationship in a user-
user network into the 'requester-best answerer' relation-
ship among users. In this case, a link is drawn from one
user to another user only when the second user has pro-
vided the best answer to the first users' questions. The
indegrees and other metrics (e.g., authoritativeness) of
users derived from the modified model can directly be
used to recommend users who are both active and have
the right expertise. In this way, the recommended ex-
perts are those who have provided best answers to the
largest numbers of other users and have been answered
by the fewest other users on their raised questions.
Currently, almost all the hybrid methods that cover
both aspects involves network-based methods as a com-
ponent. These methods therefore still share some draw-
backs of the basic network-based methods. First, the
experts recommended by such methods are specific to
a user-user network rather than a particular topic or a
question. Intuitively, both the transitivity of users' au-
thoritativeness and the effectiveness of network-based
methods depend on the condition that the interactions
between users concern only one topic. Second, although
the link structure can, to some extent, implies the corre-
lation among users and questions, the user-user network
is not directly related to a user's topical preference. To
recommended experts for a given problem, they still
need some approach to connect the question to users or
their historical questions to make a personalized recom-
mendation. The more recent expertise-aware network-
based methods often hybridize with relevance models
(e.g., language models and topic models) to overcome
the above deficiencies.
Another possible issue with the hybridization of
network-based methods with other methods is that au-
thoritativeness is a vague concept, which already, to
some extent, implies the interest and expertise of users.
Therefore, the combination of techniques may cause the
hybrid methods to consider multiple times of the same
aspects. The rationale and effect of such hybridization
are yet to be examined.
5.5 Reliance on Sufficient Data
The cold start or data sparsity problem concerns
both the ground truth or numbers of users' activity
records, and it turns out to be a common challenge for
all the investigated expert recommendation methods.
For the amount of ground truth, the rule of thumb is
that the more straightforward methods tend to be less
affected by the small ground truth size, as the more
complicated methods usually require a larger train set.
For example, the classification methods generally per-
form better under high-dimensional features given suffi-
cient training data. When the training data is limited,
these methods need to restrain the dimensionality to
avoid over-fitting.
In contrast, the voting-base tech-
niques require no training and thus unaffected by the
size of training data.
The effect of the historical record numbers of users
on the recommendation methods is closely related to
the early detection of experts, i.e., promoting the par-
ticipation rate of new experts or rising stars, i.e., the
low profile users who have strong potential to con-
tribute to the community later after short observations
in CQA [69]. The lack of sufficient information in the
user profile is, in fact, the primary obstacle towards
identifying such early-career experts. Previous stud-
ies [22] show that only 15.67% of all users in Yahoo! An-
swers answered more than four questions. This obser-
vation indicates that all these approaches involve only
a small portion of highly active users and therefore can-
not recommend new questions to the rest of the com-
munity. If the recommendation method can also involve
the good users with few activity records, these users can
become motivated to take more intensive participation
in a community or even develop into highly active ex-
perts.
Despite the significance of early expert detection is-
sue, the markers that reflect the expertise of an or-
dinary user (e.g., number of answers and number of
Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA
19
best answers) are not that strong for a newly joined
user. Therefore, not much prior work has researched on
finding potential experts in early-stage in CQA [64;65;71].
Many existing methods bypass the cold start and data
sparsity issues due to their reliance on sufficient data
from CQA systems. For example, some approaches con-
sider only those users who previously provided more
than 5 [40], 10 [3] or even 20 answers [122]. Other meth-
ods take only users with a significant number of best
answers into consideration (e.g., more than 10 [30] or 20
best answers [31]).
Among the existing methods, we identify two
promising categories of methods that can potentially
better detect experts early. One is semi-supervised
Learning methods (e.g., [68]), which regard users who
provide above average-best-answers on a topic tag as
topical experts. They apply a data-driven approach to
predict whether a user will become an expert in the
long term. The other is expertise propagation meth-
ods (e.g., [123]), which infer or consolidate the expertise
of low-profile users by propagating the expertise of old
users through their shared activities in a community.
5.6 Method Complexity
Generally, the more aspects considered, the better a
method can potentially perform, and the more compli-
cated the method could be. The expertise-aware tech-
niques based on QLL usually combine the two aspects
linearly using the simple weight sum method. The pri-
mary issue with these methods is the difficulty in allo-
cating the weights wisely among the two aspects. Usu-
ally, they need to resort to human experience or re-
peated trials in real applications to determine the opti-
mal weights.
Though applicable to the expert recommendation
problem, recommendation techniques face severe chal-
lenges besides the fundamental issues like the cold start
problem. For example, considering multiple aspects of
concerns could make a recommendation technique com-
plex and challenging to optimize. More recently recom-
mendation methods such as factorization machines may
help resolve the problem but have not yet been applied
to the expert recommendation in CQA.
Despite the ability to incorporate multiple aspects
of concern, there is a lack of universal principle regard-
ing which features to use for the classification methods.
Consequently, the performance of classification meth-
ods largely depends on the features used and whether
the technique and features fit the size of the labeled
data.
6 Future Directions
After reviewing the state of the art methods, we
identify several challenging yet promising issues for
the future research. We summarize them as realistic
user modeling, recommending experts as a collabora-
tive group, coping with dynamicity, utilization of ex-
ternal data, and comprehensive expert recommenda-
tion solutions.
In the following, we review the lim-
ited related studies to the above challenges, highlight
the significance of and new opportunities for address-
ing these challenges, and finally, outlook the promising
directions for future research. We hope this discussion
could provide novel viewpoints to the existing studies
and encourage more future contributions to this promis-
ing field of research.
6.1 Realistic User Modeling
Expert recommendation relies on effective user
modeling. Intuitively, there exist three aspects of con-
cerns that affect whether a user gives a high-quality
answer to a question in a real Q&A scenario as follows:
The chance of a user noticing the question. Since
a user may not have an opportunity to see a question,
the user may not be an answerer to this question even
though the user is an expert. The expert recommen-
dation problem in CQA, however, is based on a dif-
ferent assumption from the real-world scenarios, i.e.,
how likely a user would answer a question and mean-
while provide a high-quality answer to the question if
the user is invited to answer the question. Due to the
above difference, when using the real-world labeled data
to train the recommendation models, the recommenda-
tion methods should better take into account the pos-
sibility that a user may not have answered a question
just because the user does not have the chance to no-
tice the question. The likelihood that a user would see
a question in real-world scenarios depends on various
factors such as user availability (e.g., how often a user
is online and available to answer questions), user be-
haviors (e.g., whether the user looks for new questions
to answer actively), and other users' activities related
to the question (e.g., how widespread the question is
among users).
User's willingness to answer the question. Even if
a user has noticed a question, the user may choose not
to answer it. A user's willingness to answer a question
also depends on various factors such as how well the
question fits the user's interest, user's self-confidence
20
J. Comput. Sci. & Technol., January 2018, Vol.33, No.1
on the quality of answers, and user's expected gains
from answering the question.
User's expertise level on the question. Even if a user
has noticed a question and is willing to answer it, the
user may not have the adequate knowledge to give a
high-quality answer. That is the first and foremost rea-
son that we need an expert recommendation approach
in CQA.
Besides identifying the different aspects, we need to
find a reasonable way to combine them to recommend
real experts more comprehensively given a new ques-
tion. Unfortunately, the existing expert recommenda-
tion methods usually consider only the second, the last,
or both the above aspects. For example, most language
models and topic models focus on recommending users
who are most likely to answer the given question. How-
ever, a high possibility of a user answering a question
does not necessarily mean the user would be able to pro-
vide a high-quality answer. Many link analysis meth-
ods identify experts as the most authoritative users in
a user-user network, where authoritativeness is a dif-
ferent concept from either relevance and user expertise.
Therefore, the most authoritative users are not guar-
anteed to be willing to answer a question nor being
able to give a high-quality answer. Besides, some clas-
sification methods merely rely on the previous answer
quality and some metadata features without consider-
ing users' topical distributions. For this reason, a rec-
ommended expert by such methods may not want to
answer a question even if the user is a good answerer in
general. Worse still, to the best of our knowledge, the
first aspect has not been considered by any previous
research efforts. A promising research direction is to
incorporate expert recommendation method with mod-
els that could effectively predict user behaviors, just
like the prediction of check-ins in a Point of Interest
recommendation problem [124].
6.2 Coping with Dynamicity
Currently, the vast majority of research efforts con-
sider the expert recommendation problem in a static
context, where they use a snapshot of users' previously
asked or answered questions for the expert recommen-
dation. However, the real-world question answering
websites are dynamic, with new users joining and leav-
ing, users' interest changing, users' roles transforming,
users' mutual interactions evolving, and the content on
the website never stopping updating [125]. Therefore, it
is especially promising to develop methods that lever-
age the temporal information to make the expert rec-
ommendation methods adaptive in a dynamic context
in a real-time fashion.
Currently, user availability is the most commonly
consider dynamic aspect for the expert recommenda-
tion problem. Several studies used temporal features to
estimate the availability of users for a given day [6;93;123]
or for a specific time of the day [93;126]. For example,
Sung et al. [123] use all replies of users to train a sigmoid
function and Chang et al. [93] build binary classifiers us-
ing all responses of users within a fixed time frame (pre-
vious day). Differs from the above work, Yeniterzi et
al. [94] use only the particular question-related replies to
estimate availability.
Besides user availability, we identify two promising
directions to cope with the dynamicity in CQA:
User interest drifts. Similar to general recommen-
dation systems, the expert recommendation problem
for CQA also faces the user interest drift issue [127]. A
straightforward solution is to include a decaying fac-
tor to suppress questions answered in remote history
and focus on users' recent interest (reflected by their
shifting answering behavior) [128]. Although the topic
drift issue has been studied in multiple areas such as
social networks and mobile crowdsourcing [129], it is al-
most an unexplored topic in the CQA context. More
factors such as fluctuations in user behaviors and more
sophisticated time series prediction methods could be
employed to gain better results.
Dynamic user expertise. Generally, users' expertise
may not be consistent as well, as users' skills may im-
prove over time and the quality of their answers may
depend on various factors such as the users' status and
other users' behaviors on a given question, not men-
tioning the impact from the evolution of the Q&A com-
munity. Pal et al. [130] analyze the evaluation of experts
over time and show that estimating expertise using tem-
poral data outperforms using static snapshots of the
data. In a very recent work [94], Yeniterzi et al. incor-
porate temporal information to model dynamic user ex-
pertise and apply two models, namely exponential and
hyperbolic discounting models, to discount the effect
of older records in calculating z-scores. This method
is still rather straightforward being equivalent to us-
ing a decaying factor.
In particular, the z-scores are
calculated for each time interval and then discounted
according to its temporal distance from the question's
hosting interval. In the field of answer quality predic-
tion, Szpektor [131] use a more advanced set of temporal
features calculated between the time at which a ques-
Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA
21
tion and its replies are posted to improve prediction
results. The similar method applies o the expert rec-
ommendation problem.
In summary, all the above dynamic aspects are sug-
gesting an expert recommendation method suitable to
self-evolve in an online fashion [132]. However, none of
the above methods is designed to be online-friendly, and
it could take tremendous time to retrain the new model
when new information becomes available, which is un-
acceptable in practice as most Q&A systems in the
real-world involves a massive amount of data overall.
Therefore, a promising research direction is to intro-
duce novel methods that are capable of incrementally
learning about users and continuously adapting their
recommendation behaviors over time effectively and ef-
ficiently. Besides the short of related work, we believe
the dynamicity-related research for CQA is still at a
preliminary stage, as most of the methods used are rel-
atively simple and predict different aspects of considera-
tion, such as user availability, user interest, and user ex-
pertise, separately. Moreover, they have not considered
the possible correlations among these aspects. There-
fore, another potential point of research is to predict
different aspects of features simultaneous using a single,
comprehensive model for better results. As an exam-
ple, Tensor Factorization (TF) [133] may model the cor-
relations among high-dimensional features better than
Matrix Factorization (MF).
6.3 Recommending Experts as a Collaborative
Group
Since a single user may not be able to well or fully
address a given question, most methods would recom-
mend either a ranked list or an unranked group of users
instead of one user. The recommended user group is
expected to address the question better than a single
user, and their answers are supposed to be better than
most, or ideally all the other possible user groups that
contain the same number of members when considered
as a whole. An ideal expert group should satisfy the
following conditions. First, the question must appeal
to all group members so that they are likely to answer
the question. Second, the group members should be
compatible with one another, so that the existence of
one user in the group would not discourage another
user to answer the question. Third, it is desirable for
the group members to complement one another in the
knowledge domains required to address the question,
given that users may have different sets of skills and
differed level of expertise on different skill aspects [134].
Another benefit of group recommendation is the poten-
tial to make the recommending technique adaptive to
specific scenarios and reduce the generation of redun-
dant information in Q&A communities. For example,
by capturing a global insight into an expert group, a
method can automatically adjust the number of experts
to recommend. In this way, the difficult questions may
get more answers than easier ones.
To better answer a question, it is necessary to eval-
uate and select a competitive combination of poten-
tial answerers as a collaborative group. Unfortunately,
there is rarely any studies on this topic, and the group
recommendation methods for traditional recommender
system assume known user groups before making a rec-
ommendation [135–137]. For example, Pal et al. propose
an expert group recommendation for the CQA [138],
aiming to find the experts from predefined communi-
ties to provide an answer. Given a new question, the
authors compute its similarity with the three aspects of
features of each community, namely question features,
user features, and community features. Then, they use
the two k-NN algorithms over the similarity metrics to
build a vector of community scores for each community.
Finally, they use linear regression, Borda Count, SVM
Ranking, as well as the combinations of the above three
methods to train a binary classifier for distinguishing
the desired from the non-desired communities for the
given question. The issue with this method, as well
as the traditional group recommendation methods, is
that the users are evaluated separately and later put
together to form a group. Consequently, the workers'
answers may not collectively better address the ques-
tion from the requester's perspective as the second and
third conditions above may not be well met.
Intuitively, the users who have frequently answers
the similar question are likely to be compatible with
one another [139]. A possible solution following this in-
sight is to propose an expert recommendation scheme
that aims at selecting the best subset (e.g. of a size of k )
of collaborative users by learning their co-occurrence in
the same thread and topical expertise simultaneously.
The selection of a group of collaborative users could also
borrow ideas from two closely related topics, namely
optimal task decomposition [140] and user group evalu-
ation. Task decomposition is the opposite approach
of group formation, which aims to break the knowl-
edge requirement into sub-requirements and find a user
for every sub-requirement to compose the final group.
User group evaluation aims to set better heuristics to
22
J. Comput. Sci. & Technol., January 2018, Vol.33, No.1
promote better recommendation results and answers to
the given question. On this aspect, Chang et al. [93]
hypothesize that valuable question-answer threads are
those where several people collaborate. A natural ap-
plication of this hypothesis in group expert recommen-
dation is that, instead of aiming to maximize the re-
quester's satisfaction on the given question, we could
select the group of collaborative users in such a way
that maximizes the long-term value to a broader audi-
ence of the thread.
6.4 Leveraging External Information
To address the cold start problem and the sparsity
of data, especially, users with the low level of activ-
ity, it is crucial to leverage external data to facilitate
the better expert recommendation in CQA. The types
of non-CQA data may vary depending on the exter-
nal services and platforms. Typically, they include the
"about me" description, homepage, blogs, micro-blogs,
or social networking sites. For example, many users
make their GitHub homepages public in Stack Over-
flow, which could be an external source of information
to estimate the users' expertise.
Until now, existing expert recommendation research
information in a nar-
for CQA only uses external
row scope in a relatively simplistic manner. They
mostly focus on users' social attributes including inter-
relationship in social networks (either within or out-
side the Q&A system) [141], and they either obtain user
attributes through heuristic statistics outside of the
model or combine users' social attributes with the orig-
inal expert recommendation model by linear interpola-
tion. The limited related work includes: Srba et al. [119]
use non-CQA sources of data in topic-model-based ap-
proaches as a supplement for Q&A activities in exper-
tise estimation; Zhao et al. [96] consider both topical in-
terests and the "following relations" between the users
to build a user-to-user graph. The graph is then used in
combination with past question-answering activities of
users to evaluate and rank users. Instead of using social
attributes as heuristics to estimate user expertise, both
Liu et al. [142] and Luo et al. [143] directly use users' so-
cial characteristics as additional features in addition to
user expertise for the expert recommendation in CQA;
Zhao et al. [95] combine heuristics from two different so-
cial networks, i.e., social following and social friendship
on Twitter and Quora for ranking answerers.
Besides the explicit links to external information
sources for the users in a Q&A system, we identify
two promising fields of research that could avail the
detection and use of external information by an expert
recommendation method. The first is account linkage
techniques, which aim to identify and link to accounts
of the same users on different systems such as web-
sites. By automatically detecting the linked account of
a user in CQA, the external information for this user
could be efficiently extracted and utilized. The second
is cross-domain learning, represented by transfer learn-
ing techniques, which aims to utilize the information in
the related or similar domains to help learn user models
for a targeted domain. Though great potentials in the
Q&A domain, both techniques have not yet currently
introduced to the CQA.
6.5 More Comprehensive Solutions
Despite hybrid methods have considered multiple
aspects of concern comprehensively, the research in this
area is still at a preliminary stage as many of those
methods simple combine the calculation results on dif-
ferent aspects as a weighted sum. Considering this de-
ficiency, it is beneficial to develop more comprehensive
methods. To this end, we advocate several approaches
beyond the existing techniques for the expert recom-
mendation in CQA: factorization machines, ensemble
learning, graph embedding, and deep learning models.
We will briefly discuss them in the following.
Factorization machines (FM) [144] is a matrix factor-
ization based machine learning models similar to linear
regression models. It represents a generic approach that
combines the generality of feature engineering with the
superiority of factorization models in estimating inter-
actions between the massive variables in a vast domain.
FM model has the advantages of embedded variable
interactions, reliable estimation of a linear number of
parameters under high sparsity, and applicability to a
variety of prediction tasks including regression, binary
classification, and ranking. All these advantages make
FM a better replacement of traditional recommenda-
tion methods such as matrix factorization and tensor
factorization for the expert recommendation in CQA.
Ensemble learning [145] is a method of using multiple
learning algorithms to obtain better performance than
that obtainable by any of individual learning algorithm
alone.
It generally includes parallel and the sequen-
tial ensemble learning and applies to various problems
such as classification, regression, feature selection, and
anomaly detection. Therefore, it could be potentially
used to recommend experts in CQA. Following the se-
quential or parallel ensemble paradigms, the candidate
Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA
23
experts are either filtered by one learning algorithm af-
ter another or obtained by merging the recommended
lists of experts by different algorithms. Gradient tree
boosting [146], represented by XGBoost [147], is another
class of ensemble models that shines in many applica-
tions in recent years. It is also promising yet unexplored
in the context of CQA.
Graph embedding [148]
is an effective and efficient
way to solve the various graph analytics problems such
as node classification, node recommendation, and link
prediction while well overcoming the high computa-
tion and space cost issues of traditional graph analytics
methods.
It converts the graph data into a low di-
mensional space which maximally preserves the graph's
properties and structural information. In fact, graphs
is an ideal form to represent the complicated interac-
tions among various aspects of users, questions, and
answers in CQA, especially when considering multiple
aspects of concern and numerous information sources.
A benefit of applying the graph embedding approach is
that various approximation algorithms and probabilis-
tic solutions are readily available to address complex
problems.
Deep learning [149] has proven successful in many ap-
plications, and various deep learning models such as
those based on autoencoders and neural autoregressive
models have been applied to recommender systems [150].
Deep learning models have the advantage of utilizing
multimodal heterogeneous features and thus has the po-
tential of solving complex problems such as the expert
recommendation problem on a large scale. Convolu-
tional neural network (CNN) is the only a deep learn-
ing model we are aware of that combines user feature
representations with question feature representations to
recommend experts for a given question in CQA [151].
A closely related topic to the expert recommen-
dation in CQA is question answering, which aims to
find or generate answers to a given question auto-
matically. This topic is more classic and also heavily
researched in the Q&A research domain. Other re-
lated research topics include question retrieval, answer
quality/probability prediction, and expert finding in
broader contexts. In fact, though rare adoption for the
expert recommendation problem, deep learning models
have been widely applied for question answering in the
domain of CQA. Therefore, it could be a good idea to
borrow and adapt the various sophisticated methods in
these related domains to address the expert recommen-
dation problem in CQA.
7 Conclusions
In this survey, we focus on the expert recommen-
dation problem, one of the most significant issues in
Community question answering (CQA), and review the
main techniques and state-of-the-art efforts on address-
ing the problem. We have summarized and compared
the existing methods in various aspects, including the
datasets, input and output, evaluation metric, the cov-
ered aspects of concern, robustness over data distribu-
tions, and complexity, followed by discussing the advan-
tages and shortcomings of these methods and pointing
out the open issues and promising future research di-
rections. We hope this survey can help readers gain a
quick and comprehensive understanding of the state of
the art research in the expert recommendation in CQA
and inspire more future research in this area.
References
[1] Srba I, Bielikova M. A comprehensive survey and classi-
fication of approaches for community question answering.
ACM Transactions on the Web, 2016, 10(3): Article No.
18.
[2] Liu Q, Agichtein E, Dror G, Maarek Y, Szpektor I. When
web search fails, searchers become askers: Understanding
the transition. In Proc. the 35th International ACM SIGIR
Conference on Research and Development in Information
Retrieval, Aug. 2012, pp. 801–810.
[3] Guo J, Xu S, Bao S, Yu Y. Tapping on the potential of q&a
community by recommending answer providers. In Proc.
the 17th ACM International Conference on Information
and Knowledge Management, Oct. 2008, pp. 921–930.
[4] Su Q, Pavlov D, Chow J H, Baker W C.
Internet-scale
collection of human-reviewed data. In Proc. the 16th In-
ternational Conference on World Wide Web, May 2007,
pp. 231–240.
[5] Agichtein E, Castillo C, Donato D, Gionis A, Mishne G.
Finding high-quality content in social media. In Proc. In-
ternational Conference on Web Search and Data Mining,
May 2008, pp. 183–194.
[6] Li B, King I. Routing questions to appropriate answerers
in community question answering services.
In Proc. the
19th ACM International Conference on Information and
Knowledge Management, Oct. 2010, pp. 1585–1588.
[7] Fisher D, Smith M, Welser H T. You are who you talk to:
Detecting roles in usenet newsgroups. In Proc. the 39th An-
nual Hawaii International Conference on System Sciences,
volume 3, Jan. 2006, pp. 59b–59b.
[8] Vi´egas F B, Smith M. Newsgroup crowds and authorlines:
Visualizing the activity of individuals in conversational cy-
berspaces. In Proc. the 37th Annual Hawaii International
Conference on System Sciences, Jan. 2004, pp. 10–pp.
[9] Welser H T, Gleave E, Fisher D, Smith M. Visualizing
the signatures of social roles in online discussion groups.
Journal of Social Structure, 2007, 8(2):1–32.
24
J. Comput. Sci. & Technol., January 2018, Vol.33, No.1
[10] Anderson A, Huttenlocher D, Kleinberg J, Leskovec J. Dis-
covering value from community activity on focused ques-
tion answering sites: A case study of stack overflow.
In
Proc. the 18th ACM SIGKDD International Conference
on Knowledge Discovery and Data Mining, Aug. 2012, pp.
850–858.
[11] Adamic L A, Zhang J, Bakshy E, Ackerman M S. Knowl-
edge sharing and yahoo answers: Everyone knows some-
thing. In Proc. the 17th International Conference on World
Wide Web, May 2008, pp. 665–674.
[12] Movshovitz-Attias D, Movshovitz-Attias Y, Steenkiste P,
Faloutsos C. Analysis of the reputation system and user
contributions on a question answering website: Stackover-
flow.
In Proc. IEEE/ACM International Conference on
Advances in Social Networks Analysis and Mining, Aug.
2013, pp. 886–893.
[13] Yimam-Seid D, Kobsa A. Expert-finding systems for or-
ganizations: Problem and domain analysis and the demoir
approach. Journal of Organizational Computing and Elec-
tronic Commerce, 2003, 13(1):1–24.
[14] Zhou Y, Cong G, Cui B, Jensen C S, Yao J. Routing ques-
tions to the right users in online communities. In Proc. the
IEEE 25th International Conference on Data Engineering,
Apr. 2009, pp. 700–711.
[15] Qu M, Qiu G, He X, Zhang C, Wu H, Bu J, Chen C. Prob-
abilistic question recommendation for question answering
communities. In Proc. the 18th International Conference
on World Wide Web, May 2009, pp. 1229–1230.
[16] Horowitz D, Kamvar S D. The anatomy of a large-scale
social search engine. In Proc. the 19th International Con-
ference on World wide web, Apr. 2010, pp. 431–440.
[17] Bayati S. Security expert recommender in software engi-
neering.
In Proc. the 38th International Conference on
Software Engineering Companion, May 2016, pp. 719–721.
[18] Rjab A B, Kharoune M, Miklos Z, Martin A. Character-
ization of experts in crowdsourcing platforms.
In Proc.
International Conference on Belief Functions, Sept. 2016,
pp. 97–104.
[19] Baeza-Yates R, Ribeiro-Neto B et al. Modern Information
Retrieval, volume 463. ACM press, New York, 1st edition,
1999.
[20] Balog K, Azzopardi L, De Rijke M. Formal models for
expert finding in enterprise corpora. In Proc. the 29th An-
nual International ACM SIGIR Conference on Research
and Development in Information Retrieval, Jul. 2006, pp.
43–50.
[21] Miller D R, Leek T, Schwartz R M. A hidden markov
model information retrieval system. In Proc. the 22nd An-
nual International ACM SIGIR Conference on Research
and Development in Information Retrieval, Aug. 1999, pp.
214–221.
[22] Zhou G, Liu K, Zhao J. Joint relevance and answer quality
In Proc.
learning for question routing in community qa.
the 21st ACM International Conference on Information
and Knowledge Management, Oct. 2012, pp. 1492–1496.
[23] Liu X, Croft W B, Koll M. Finding experts in community-
based question-answering services. In Proc. the 14th ACM
International Conference on Information and Knowledge
Management, Oct. 2005, pp. 315–316.
[24] Lavrenko V, Croft W B. Relevance based language mod-
els. In Proc. the 24th Annual International ACM SIGIR
Conference on Research and Development in Information
Retrieval, Aug. 2001, pp. 120–127.
[25] Liu X, Croft W B. Cluster-based retrieval using language
models. In Proc. the 27th Annual International ACM SI-
GIR Conference on Research and Development in Infor-
mation Retrieval, Aug. 2004, pp. 186–193.
[26] Petkova D, Croft W B. Hierarchical language models for
expert finding in enterprise corpora. International Journal
on Artificial Intelligence Tools, 2008, 17(01):5–18.
[27] Li B, King I, Lyu M R. Question routing in community
question answering: Putting category in its place. In Proc.
the 20th ACM International Conference on Information
and Knowledge Management, Oct. 2011, pp. 2041–2044.
[28] Zheng X, Hu Z, Xu A, Chen D, Liu K, Li B. Algorithm
for recommending answer providers in community-based
question answering. Journal of Information Science, 2012,
38(1):3–14.
[29] Zhai C, Lafferty J. A study of smoothing methods for lan-
guage models applied to information retrieval. ACM Trans-
actions on Information Systems, 2004, 22(2):179–214.
[30] Liu M, Liu Y, Yang Q. Predicting best answerers for new
questions in community question answering. In Proc. In-
ternational Conference on Web-Age Information Manage-
ment, Jun. 2010, pp. 127–138.
[31] Riahi F, Zolaktaf Z, Shafiei M, Milios E. Finding expert
users in community question answering. In Proc. the 21st
International Conference on World Wide Web, May 2012,
pp. 791–798.
[32] Hofmann T. Probabilistic latent semantic indexing. In roc.
the 22nd Annual International ACM SIGIR Conference on
Research and Development in Information Retrieval, Apr.
1999, pp. 50–57.
[33] Deerwester S, Dumais S T, Furnas G W, Landauer T K,
Harshman R. Indexing by latent semantic analysis. Jour-
nal of the American Society for Information Science, 1990,
41(6):391–407.
[34] Wu H, Wang Y, Cheng X. Incremental probabilistic latent
semantic analysis for automatic question recommendation.
In Proc. ACM Conference on Recommender Systems, Oct.
2008, pp. 99–106.
[35] Xu F, Ji Z, Wang B. Dual role model for question recom-
mendation in community question answering. In Proc. the
35th International ACM SIGIR Conference on Research
and Development in Information Retrieval, Apr. 2012, pp.
771–780.
[36] Blei D M, Ng A Y, Jordan M I. Latent dirichlet allocation.
Journal of Machine Learning Research, 2003, 3(Jan):993–
1022.
[37] Du L, Buntine W, Jin H. A segmented topic model based
on the two-parameter poisson-dirichlet process. Machine
Learning, 2010, 81(1):5–19.
[38] Pitman J, Yor M. The two-parameter poisson-dirichlet dis-
tribution derived from a stable subordinator. The Annals
of Probability, 1997, pp. 855–900.
[39] Sahu T P, Nagwani N K, Verma S. Taglda based user
persona model to identify topical experts for newly posted
questions in community question answering sites.
Inter-
Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA
25
national Journal of Applied Engineering Research, 2016,
11(10):7072–7078.
International Conference on World Wide Web, May 2015,
pp. 1369–1374.
[40] Tian Y, Kochhar P S, Lim E P, Zhu F, Lo D. Predicting
best answerers for new questions: An approach leveraging
topic modeling and collaborative voting. In Workshops at
the International Conference on Social Informatics, Sept.
2013, pp. 55–68.
[41] Zhang J, Ackerman M S, Adamic L. Expertise networks
in online communities: Structure and algorithms. In Proc.
the 16th International Conference on World Wide Web,
May 2007, pp. 221–230.
[42] Jeon J, Croft W B, Lee J H, Park S. A framework to predict
the quality of answers with non-textual features. In Proc.
the 29th annual International ACM SIGIR Conference on
Research anDevelopment in Information Retrieval, Apr.
2006, pp. 228–235.
[43] Borodin A, Roberts G O, Rosenthal J S, Tsaparas P.
Link analysis ranking: Algorithms, theory, and experi-
ments. ACM Transactions on Internet Technology, 2005,
5(1):231–297.
[44] Kleinberg J M. Authoritative sources in a hyperlinked en-
vironment. Journal of the ACM, 1999, 46(5):604–632.
[45] Jurczyk P, Agichtein E. Discovering authorities in ques-
tion answer communities by using link analysis. In Proc.
the 16th ACM Conference on Information and Knowledge
Management, Oct. 2007, pp. 919–922.
[46] Jurczyk P, Agichtein E. Hits on question answer portals:
Exploration of link analysis for author ranking. In Proc.
the 30th Annual International ACM SIGIR Conference on
Research and Development in Information Retrieval, Apr.
2007, pp. 845–846.
[47] Haveliwala T H. Topic-sensitive pagerank.
In Proc. the
11th International Conference on World Wide Web, Apr.
2002, pp. 517–526.
[48] Choetkiertikul M, Avery D, Dam H K, Tran T, Ghose A.
Who will answer my question on stack overflow? In Proc.
24th Australasian Software Engineering Conference, Sept.
2015, pp. 155–164.
[49] Lempel R, Moran S. Salsa: The stochastic approach for
link-structure analysis. ACM Transactions on Information
Systems, 2001, 19(2):131–160.
[50] Cheng T, Yan X, Chang K C C. Entityrank: Searching
entities directly and holistically. In Proc. the 33rd Interna-
tional Conference on Very Large Data Bases, Sept. 2007,
pp. 387–398.
[51] Weng J, Lim E P, Jiang J, He Q. Twitterrank: Finding
topic-sensitive influential twitterers. In Proc. the 3rd ACM
International Conference on Web Search and Data Min-
ing, Feb. 2010, pp. 261–270.
[52] Liu X, Bollen J, Nelson M L, Sompel H. Co-authorship
networks in the digital library research community. Infor-
mation Processing & Management, 2005, 41(6):1462–1480.
[53] Shahriari M, Parekodi S, Klamma R. Community-aware
ranking algorithms for expert identification in question-
answer forums.
In Proc. the 15th International Confer-
ence on Knowledge Technologies and Data-driven Busi-
ness, Oct. 2015, p. 8.
[54] Shahriari M, Krott S, Klamma R. Disassortative degree
mixing and information diffusion for overlapping commu-
nity detection in social networks (dmid). In Proc. the 24th
[55] Bouguessa M, Dumoulin B, Wang S. Identifying author-
itative actors in question-answering forums: The case of
yahoo! answers.
In Proc. the 14th ACM SIGKDD In-
ternational Conference on Knowledge Discovery and Data
Mining, Aug. 2008, pp. 866–874.
[56] Fagin R, Lotem A, Naor M. Optimal aggregation algo-
rithms for middleware. Journal of Computer and System
Sciences, 2003, 66(4):614–656.
[57] Zhu H, Cao H, Xiong H, Chen E, Tian J. Towards expert
finding by leveraging relevant categories in authority rank-
ing. In Proc. the 20th ACM International Conference on
Information and Knowledge Management, Oct. 2011, pp.
2221–2224.
[58] Zhu H, Chen E, Xiong H, Cao H, Tian J. Ranking user au-
thority with relevant knowledge categories for expert find-
ing. World Wide Web, 2014, 17(5):1081–1107.
[59] Liu J, Song Y I, Lin C Y. Competition-based user ex-
pertise score estimation.
In Proc. the 34th International
ACM SIGIR Conference on Research and Development in
Information Retrieval, Apr. 2011, pp. 425–434.
[60] Lai L C, Kao H Y. Question routing by modeling user
expertise and activity in cqa services.
In Proc. the 26th
Annual Conference of the Japanese Society for Artificial
Intelligence, Jun. 2012, pp. 1–10.
[61] Lin Y, Shen H.
system for
Smartq:
swer
worthy answers.
doi:10.1109/TBDATA.2017.2735442. (preprint).
A question and an-
supplying high-quality and trust-
IEEE Transactions on Big Data.
[62] Liu D R, Chen Y H, Kao W C, Wang H W. Integrating ex-
pert profile, reputation and link analysis for expert finding
in question-answering websites. Information Processing &
Management, 2013, 49(1):312–329.
[63] Liu Z, Li K, Qu D. Knowledge graph based question routing
for community question answering. In Proc. International
Conference on Neural Information Processing, Nov. 2017,
pp. 721–730.
[64] Pal A, Konstan J A. Expert identification in community
question answering: Exploring question selection bias. In
Proc. the 19th ACM International Conference on Informa-
tion and Knowledge Management, 2010, pp. 1505–1508.
[65] Pal A, Farzan R, Konstan J A, Kraut R E. Early detection
of potential experts in question answering communities. In
Proc. International Conference on User Modeling, Adap-
tation, and Personalization, Jul. 2011, pp. 231–242.
[66] Zhou T C, Lyu M R, King I. A classification-based ap-
proach to question routing in community question answer-
ing. In Proc. the 21st International Conference on World
Wide Web, May 2012, pp. 783–790.
[67] Ji Z, Wang B. Learning to rank for question routing in com-
munity question answering. In Proc. the 22nd ACM Inter-
national Conference on Information & Knowledge Man-
agement, Oct. 2013, pp. 2363–2368.
[68] Dijk D, Tsagkias M, Rijke M. Early detection of topical
expertise in community question answering. In Proc. the
38th International ACM SIGIR Conference on Research
and Development in Information Retrieval, Apr. 2015, pp.
995–998.
26
J. Comput. Sci. & Technol., January 2018, Vol.33, No.1
[69] Le L T, Shah C. Retrieving rising stars in focused com-
munity question-answering. In Proc. Asian Conference on
Intelligent Information and Database Systems, Mar. 2016,
pp. 25–36.
[70] Dror G, Koren Y, Maarek Y, Szpektor I. I want to answer,
who has a question? yahoo! answers recommender system.
In Proc. the 17th ACM SIGKDD International Conference
on Knowledge Discovery and Data Mining, Aug. 2011, pp.
1109–1117.
[71] Pal A, Harper F M, Konstan J A. Exploring question se-
lection bias to identify experts and potential experts in
community question answering. ACM Transactions on In-
formation Systems, 2012, 30(2): Artical No. 10.
[72] Burel G, Mulholland P, He Y, Alani H. Predicting answer-
ing behaviour in online question answering communities.
In Proc. the 26th ACM Conference on Hypertext & Social
Media, Sept. 2015, pp. 201–210.
[73] Burges C J, Ragno R, Le Q V. Learning to rank with
nonsmooth cost functions.
In Proc. Advances in Neural
Information Processing Systems, Dec. 2007, pp. 193–200.
[74] Cao Z, Qin T, Liu T Y, Tsai M F, Li H. Learning to rank:
From pairwise approach to listwise approach. In Proc. the
24th International Conference on Machine Learning, Jun.
2007, pp. 129–136.
[75] Cheng X, Zhu S, Chen G, Su S. Exploiting user feedback for
expert finding in community question answering. In IEEE
International Conference on Data Mining Workshop, Nov.
2015, pp. 295–302.
[76] Wang N, Abel M H, Barth`es J P, Negre E. An answerer
recommender system exploiting collaboration in cqa ser-
vices.
In Proc. IEEE 20th International Conference on
Computer Supported Cooperative Work in Design, May
2016, pp. 198–203.
[77] Dom B, Paranjpe D. A bayesian technique for estimat-
ing the credibility of question answerers. In Proc. SIAM
International Conference on Data Mining, May 2008, pp.
399–409.
[78] Koren Y, Bell R, Volinsky C. Matrix factorization
techniques for recommender systems. Computer, 2009,
42(8):42–49.
[79] Cho J H, Li Y, Girju R, Zhai C. Recommending forum
posts to designated experts. In Proc. IEEE International
Conference on Big Data, Oct. 2015, pp. 659–666.
[80] Singh A P, Gordon G J. Relational learning via collective
matrix factorization. In Proc. the 14th ACM SIGKDD In-
ternationalConference on Knowledge Discovery and Data
Mining, Aug. 2008, pp. 650–658.
[81] Yang B, Manandhar S. Tag-based expert recommendation
in community question answering.
In Proc. IEEE/ACM
International Conference on Advances in Social Networks
Analysis and Mining, Aug. 2014, pp. 960–963.
[82] Mnih A, Salakhutdinov R R. Probabilistic matrix factoriza-
tion. In Proc. Advances in Neural Information Processing
Systems, Dec. 2008, pp. 1257–1264.
[83] Zhou G, Liu K, Zhao J. Topical authority identification in
community question answering. In Proc. Chinese Confer-
ence on Pattern Recognition, Nov. 2012, pp. 622–629.
answering websites. In Proc. International Conference on
Web-Based Learning, Aug. 2015, pp. 165–173.
[85] Yang J, Peng S, Wang L, Wu B. Finding experts in commu-
nity question answering based on topic-sensitive link anal-
ysis. In Proc. IEEE International Conference on Data Sci-
ence in Cyberspace, Jun. 2016, pp. 54–60.
[86] Rao Y, Xie H, Liu X, Li Q, Wang F L, Wong T L. User au-
thority ranking models for community question answering.
Journal of Intelligent & Fuzzy Systems, 2016, 31(5):2533–
2542.
[87] Zhao T, Bian N, Li C, Li M. Topic-level expert modeling
in community question answering. In Proc. SIAM Interna-
tional Conference on Data Mining, volume 13, May 2013,
pp. 776–784.
[88] Zhou G, Lai S, Liu K, Zhao J. Topic-sensitive probabilis-
tic model for expert finding in question answer communi-
ties. In Proc. the 21st ACM International Conference on
Information and Knowledge Management, Oct. 2012, pp.
1662–1666.
[89] Yang L, Qiu M, Gottipati S, Zhu F, Jiang J, Sun H, Chen
Z. Cqarank: Jointly model topics and expertise in commu-
nity question answering. In Proc. the 22nd ACM Interna-
tional Conference on Information & Knowledge Manage-
ment, Oct. 2013, pp. 99–108.
[90] Yan Z, Zhou J. A new approach to answerer recommen-
dation in community question answering services. In Proc.
European Conference on Information Retrieval, Apr. 2012,
pp. 121–132.
[91] Yin H, Hu Z, Zhou X, Wang H, Zheng K, Nguyen Q V H,
Sadiq S. Discovering interpretable geo-social communities
for user behavior prediction. In Proc. IEEE 32nd Inter-
national Conference on Data Engineering, May 2016, pp.
942–953.
[92] Suryanto M A, Lim E P, Sun A, Chiang R H. Quality-aware
collaborative question answering: Methods and evaluation.
In Proc. the 2nd ACM International Conference on Web
Search and Data Mining, Feb. 2009, pp. 142–151.
[93] Chang S, Pal A. Routing questions for collaborative
answering in community question answering.
In Proc.
IEEE/ACM International Conference on Advances in So-
cial Networks Analysis and Mining, Aug. 2013, pp. 494–
501.
[94] Yeniterzi R, Callan J. Moving from static to dynamic mod-
eling of expertise for question routing in cqa sites. In Proc.
9th International AAAI Conference on Web and Social
Media, Jun. 2015, pp. 702–705.
[95] Zhao Z, Zhang L, He X, Ng W. Expert finding for question
answering via graph regularized matrix completion. IEEE
Transactions on Knowledge and Data Engineering, 2015,
27(4):993–1004.
[96] Zhao Z, Wei F, Zhou M, Ng W. Cold-start expert finding
in community question answering via graph regularization.
In Proc. International Conference on Database Systems for
Advanced Applications, May 2015, pp. 21–38.
[97] Nam K K, Ackerman M S, Adamic L A. Questions in,
knowledge in?: A study of naver's question answering com-
munity. In Proc. SIGCHI Conference on Human Factors
in Computing Systems, Apr. 2009, pp. 779–788.
[84] Liu X, Ye S, Li X, Luo Y, Rao Y. Zhihurank: A topic-
sensitive expert finding algorithm in community question
[98] Li X L, Foo C S, Tew K L, Ng S K. Searching for rising stars
in bibliography networks. In Proc. International Confer-
Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA
27
ence on Database Systems for Advanced Applications, Apr.
2009, pp. 288–292.
[99] Daud A, Abbasi R, Muhammad F. Finding rising stars
in social networks. In Proc. International Conference on
Database Systems for Advanced Applications, Apr. 2013,
pp. 13–24.
[100] Deng H, King I, Lyu M R. Formal models for expert finding
on dblp bibliography data. In Proc. 8th IEEE International
Conference on Data Mining, Nov. 2008, pp. 163–172.
[101] Hashemi S H, Neshati M, Beigy H. Expertise retrieval
in bibliographic network: A topic dominance learning ap-
proach. In Proc. the 22nd ACM International Conference
on Information & Knowledge Management, Oct. 2013, pp.
1117–1126.
[102] Mimno D, McCallum A. Expertise modeling for matching
papers with reviewers. In Proc. the 13th ACM SIGKDD In-
ternational Conference on Knowledge Discovery and Data
Mining, Aug. 2007, pp. 500–509.
[103] Bagdouri M. Cross-platform question routing for better
question answering. In Proc. the 38th International ACM
SIGIR Conference on Research and Development in Infor-
mation Retrieval, Feb. 2015, pp. 1053–1053.
[104] Richardson M, White R W. Supporting synchronous social
q&a throughout the question lifecycle. In Proc. the 20th
international conference on World wide web, Apr. 2011,
pp. 755–764.
[105] Java A, Kolari P, Finin T, Oates T. Modeling the spread
of influence on the blogosphere. In Proc. the 15th Interna-
tional World Wide Web Conference, Oct. 2006, pp. 22–26.
[106] Kempe D, Kleinberg J, Tardos ´E. Maximizing the spread of
influence through a social network. In Proc. the 9th ACM
SIGKDD International Conference on Knowledge Discov-
ery and Data Mining, May 2003, pp. 137–146.
[107] Pal A, Counts S.
Identifying topical authorities in mi-
croblogs. In Proc. the 4th ACM international Conference
on Web Search and Data Mining, Oct. 2011, pp. 45–54.
[108] Campbell C S, Maglio P P, Cozzi A, Dom B. Expertise
identification using email communications.
In Proc. the
12th International Conference on Information and Knowl-
edge Management, Oct. 2003, pp. 528–531.
[109] Dom B, Eiron I, Cozzi A, Zhang Y. Graph-based rank-
ing algorithms for e-mail expertise analysis. In Proc. the
8th ACM SIGMOD Workshop on Research Issues in Data
Mining and Knowledge Discovery, Jun. 2003, pp. 42–48.
[110] Shetty J, Adibi J. Discovering important nodes through
graph entropy the case of enron email database. In Proc.
the 3rd International Workshop on Link Discovery, Aug.
2005, pp. 74–81.
[111] Mockus A, Herbsleb J D. Expertise browser: A quantita-
tive approach to identifying expertise.
In Proc. the 24th
International Conference on Software Engineering, Jun.
2002, pp. 503–512.
[112] Wei W, Lee J, King I. Measuring credibility of users in an e-
learning environment. In Proc. the 16th International Con-
ference on World Wide Web, May 2007, pp. 1279–1280.
[113] Fu Y, Xiang R, Liu Y, Zhang M, Ma S. A cdd-based formal
model for expert finding. In Proc. the 16th ACM Confer-
ence on Conference on Information and Knowledge Man-
agement, Oct. 2007, pp. 881–884.
[114] Balog K, Bogers T, Azzopardi L, De Rijke M, Van
Den Bosch A. Broad expertise retrieval in sparse data en-
vironments. In Proc. the 30th annual International ACM
SIGIR Conference on Research and Development in Infor-
mation Retrieval, Aug. 2007, pp. 551–558.
[115] Pasca M A, Harabagiu S M. High performance ques-
tion/answering.
In roc. the 24th Annual International
ACM SIGIR Conference on Research and Development in
Information Retrieval, Apr. 2001, pp. 366–374.
[116] Fang H, Zhai C. Probabilistic models for expert finding.
In Proc. European Conference on Information Retrieval,
Apr. 2007, pp. 418–430.
[117] Macdonald C, Ounis I. Voting for candidates: Adapting
data fusion techniques for an expert search task. In Proc.
the 15th ACM International Conference on Information
and Knowledge Management, Oct. 2006, pp. 387–396.
[118] Liu Y, Bian J, Agichtein E. Predicting information seeker
satisfaction in community question answering. In Proc. the
31st International ACM SIGIR Conference on Research
and Development in Information Retrieval, Apr. 2008, pp.
483–490.
[119] Srba I, Grznar M, Bielikova M. Utilizing non-qa data to
improve questions routing for users with low qa activity in
cqa. In Proc. the IEEE/ACM International Conference on
Advances in Social Networks Analysis and Mining, Aug.
2015, pp. 129–136.
[120] Fagin R, Kumar R, Sivakumar D. Comparing top k lists.
SIAM Journal on Discrete Mathematics, 2003, 17(1):134–
160.
[121] Herlocker J L, Konstan J A, Terveen L G, Riedl J T. Eval-
uating collaborative filtering recommender systems. ACM
Transactions on Information Systems, 2004, 22(1):5–53.
[122] Fang L, Huang M, Zhu X. Question routing in community
based qa: Incorporating answer quality and answer con-
tent.
In Proc. the ACM SIGKDD Workshop on Mining
Data Semantics, Aug. 2012, p. 5.
[123] Sung J, Lee J G, Lee U. Booming up the long tails: Dis-
covering potentially contributive users in community-based
question answering services. In Proc. International AAAI
Conference on Weblogs and Social Media, Jul. 2013, pp.
602–610.
[124] Yin H, Zhou X, Shao Y, Wang H, Sadiq S. Joint modeling of
user check-in behaviors for point-of-interest recommenda-
tion. In Proc. the 24th ACM International on Conference
on Information and Knowledge Management, Oct. 2015,
pp. 1631–1640.
[125] Yin H, Cui B. Spatio-temporal Recommendation in Social
Media. Springer, Berlin, 1st edition, 2016.
[126] Liu Q, Agichtein E. Modeling answerer behavior in col-
laborative question answering systems. In Proc. European
Conference on Information Retrieval, Apr. 2011, pp. 67–
79.
[127] Yin H, Zhou X, Cui B, Wang H, Zheng K, Nguyen Q V H.
Adapting to user interest drift for poi recommendation.
IEEE Transactions on Knowledge and Data Engineering,
2016, 28(10):2566–2581.
[128] Szpektor I, Maarek Y, Pelleg D. When relevance is not
enough: Promoting diversity and freshness in personal-
ized question recommendation.
In Proc. the 22nd Inter-
28
J. Comput. Sci. & Technol., January 2018, Vol.33, No.1
national Conference on World Wide Web, May 2013, pp.
1249–1260.
Conference on Intelligent User Interfaces, Oct. 2014, pp.
7–16.
[129] Tong Y, Cao C C, Chen L. Tcs: Efficient topic discovery
over crowd-oriented service data. In Proc. the 20th ACM
SIGKDD International Conference on Knowledge Discov-
ery and Data Mining, Aug. 2014, pp. 861–870.
[130] Pal A, Chang S, Konstan J A. Evolution of experts in
question answering communities. In Proc. the 6th Inter-
national AAAI Conference on Weblogs and Social Media,
Jun. 2012, pp. 274–281.
[131] Cai Y, Chakravarthy S. Improving answer quality predic-
tion in q/a social networks by leveraging temporal feature.
Proc. International Journal of Next-Generation Comput-
ing, 2013, 4(1):1–27.
[132] Tong Y, She J, Ding B, Wang L, Chen L. Online mobile
micro-task allocation in spatial crowdsourcing.
In Proc.
IEEE 32nd International Conference on Data Engineer-
ing, Apr. 2016, pp. 49–60.
[133] Yin H, Chen H, Sun X, Wang H, Wang Y, Nguyen Q V H.
Sptf: A scalable probabilistic tensor factorization model
for semantic-aware behavior prediction. In Proc. IEEE In-
ternational Conference on Data Mining, Nov. 2017, pp.
585–594.
[134] Yin H, Cui B, Huang Y. Finding a wise group of experts
in social networks. In Proc. International Conference on
Advanced Data Mining and Applications, Nov. 2011, pp.
381–394.
[135] O'connor M, Cosley D, Konstan J A, Riedl J. Polylens:
A recommender system for groups of users.
In Proc.
European Conference on Computer-Supported Cooperative
Work, Sept. 2001, pp. 199–218.
[136] Ye M, Liu X, Lee W C. Exploring social influence for rec-
ommendation: A generative model approach. In Proc. the
35th International ACM SIGIR Conference on Research
and Development in Information Retrieval, Aug. 2012, pp.
671–680.
[137] Gorla J, Lathia N, Robertson S, Wang J. Probabilistic
group recommendation via information matching. In Proc.
the 22nd International Conference on World Wide Web,
May 2013, pp. 495–504.
[138] Pal A. Metrics and algorithms for routing questions to user
communities. ACM Transactions on Information Systems,
2015, 33(3):14.
[139] Feng W, Zhu Q, Zhuang J, Yu S.
An expert
recommendation algorithm based on pearson correla-
tion coefficient and fp-growth.
Cluster Computing.
doi:https://doi.org/10.1007/s10586-017-1576-y. (preprint).
[140] Tong Y, Chen L, Zhou Z, Jagadish H V, Shou L, Lv W.
Slade: A smart large-scale task decomposer in crowdsourc-
ing. IEEE Transactions on Knowledge and Data Engineer-
ing. doi:10.1109/TKDE.2018.2797962. (preprint).
[141] Atkinson J, Maurelia A. Redundancy-based trust in
question-answering systems. Computer, 2017, 50(1):58–65.
[142] Liu Z, Jansen B J. Predicting potential responders in social
q&a based on non-qa features. In Proc. ACM CHI Confer-
ence on Human Factors in Computing Systems, Apr. 2014,
pp. 2131–2136.
[143] Luo L, Wang F, Zhou M X, Pan Y, Chen H. Who have
got answers?: Growing the pool of answerers in a smart en-
terprise social qa system. In Proc. the 19th International
[144] Rendle S. Factorization machines. In Proc. the 10th IEEE
International Conference on Data Mining, Dec. 2010, pp.
995–1000.
[145] Zhou Z H. Ensemble Methods: Foundations and Algo-
rithms. CRC press, Boca Raton, 1st edition, 2012.
[146] Friedman J H. Greedy function approximation: A gradient
boosting machine. Annals of Statistics, 2001, 29(5):1189–
1232.
[147] Chen T, Guestrin C. Xgboost: A scalable tree boosting sys-
tem. In Proc. the 22nd ACM SIGKDD International Con-
ference on Knowledge Discovery and Data Mining, Aug.
Aug. 2016, pp. 785–794.
[148] Yan S, Xu D, Zhang B, Zhang H J, Yang Q, Lin S. Graph
embedding and extensions: A general framework for dimen-
sionality reduction. IEEE transactions on Pattern Analysis
and Machine Intelligence, 2007, 29(1):40–51.
[149] Yin H, Wang W, Wang H, Chen L, Zhou X. Spatial-aware
hierarchical collaborative deep learning for poi recommen-
dation. IEEE Transactions on Knowledge and Data Engi-
neering, 2017, 29(11):2537–2551.
[150] Lin S, Hong W, Wang D, Li T. A survey on expert finding
techniques. Journal of Intelligent Information Systems,
2017, 49(2):255–279.
[151] Zheng C, Zhai S, Zhang Z.
expert
for
communities.
proach
swering
https://arxiv.org/abs/1711.05350, Jun. 2018.
identification
A deep learning ap-
an-
2017.
question
in
arXiv:1711.05350,
Xianzhi Wang is a research fellow
with School of Information Systems,
Singapore Management University,
Singapore.
He received his B.E.
degree from Xi'an Jiaotong Univer-
sity, Xi'an, M.E. and Ph.D. degrees
from Harbin Institute of Technology,
Harbin, all
in computer science in
2007, 2009, and 2014. His research interests include
Internet of Things, data management, machine learning,
and services computing. He received ARC Discovery Early
Career Researcher Award (DECRA) in 2017 and IBM
Ph.D. Fellowship Award in 2013.
Chaoran Huang is
currently
a Ph.D.
candidate at School of
Computer Science and Engineering,
University of New South Wales,
Sydney. He received his B.E. degree
from Tianjin Polytechnic University,
Tianjin, in 2014. His research inter-
ests include data mining, Internet of
Things, and service-oriented computing.
Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA
29
She received her Ph.D.
Lina Yao is a lecturer at School of
Computer Science and Engineering,
University of New South Wales,
Sydney.
in
computer science from University of
Adelaide, Adelaide,
Her
research interests include data mining
learning applications
and machine
with the focuses on Internet of Things, recommender
systems, human activity recognition, and Brain Computer
Interface. She is the recipient of ARC Discovery Early
Career Researcher Award (DECRA) and Inaugural Vice
Chancellor's Women's Research Excellence Award in 2015.
in 2014.
Boualem Benatallah is a sci-
entia professor and research group
leader at University of New South
He received his
Wales, Sydney.
Ph.D.
from
Grenoble University, Grenoble. His
research interests include Web ser-
vices composition, quality control in
crowdsourcing services, crowdsourcing for vulnerability
discovery, data curation, cognitive services engineering,
and cloud services orchestration.
in computer
science
is
Manqing Dong
currently
a Ph.D.
candidate at School of
Computer Science and Engineering,
University of New South Wales, Syd-
ney. She received her BE degree from
Jilin University, Jilin, and her MSc
in the City University of Hong Kong,
Her research interests
Hongkong.
include anomaly detection, data mining, deep learning,
statistical
learning, and probabilistic graphical models.
She is a student member of IEEE and ACM.
|
1802.09808 | 3 | 1802 | 2018-05-17T01:35:13 | #DebateNight: The Role and Influence of Socialbots on Twitter During the 1st 2016 U.S. Presidential Debate | [
"cs.SI"
] | Serious concerns have been raised about the role of 'socialbots' in manipulating public opinion and influencing the outcome of elections by retweeting partisan content to increase its reach. Here we analyze the role and influence of socialbots on Twitter by determining how they contribute to retweet diffusions. We collect a large dataset of tweets during the 1st U.S. Presidential Debate in 2016 (#DebateNight) and we analyze its 1.5 million users from three perspectives: user influence, political behavior (partisanship and engagement) and botness. First, we define a measure of user influence based on the user's active contributions to information diffusions, i.e. their tweets and retweets. Given that Twitter does not expose the retweet structure - it associates all retweets with the original tweet - we model the latent diffusion structure using only tweet time and user features, and we implement a scalable novel approach to estimate influence over all possible unfoldings. Next, we use partisan hashtag analysis to quantify user political polarization and engagement. Finally, we use the BotOrNot API to measure user botness (the likelihood of being a bot). We build a two-dimensional "polarization map" that allows for a nuanced analysis of the interplay between botness, partisanship and influence. We find that not only social bots are more active on Twitter - starting more retweet cascades and retweeting more -- but they are 2.5 times more influential than humans, and more politically engaged. Moreover, pro-Republican bots are both more influential and more politically engaged than their pro-Democrat counterparts. However we caution against blanket statements that software designed to appear human dominates political debates. We find that many highly influential Twitter users are in fact pro-Democrat and that most pro-Republican users are mid-influential and likely to be human (low botness). | cs.SI | cs | #DEBATENIGHT: The Role and Influence of Socialbots on Twitter
During the 1st 2016 U.S. Presidential Debate
Marian-Andrei Rizoiu12 and Timothy Graham1 and Rui Zhang12
and Yifei Zhang12 and Robert Ackland1 and Lexing Xie12
1The Australian National University, 2Data61 CSIRO, Canberra, Australia.
8
1
0
2
y
a
M
7
1
]
I
S
.
s
c
[
3
v
8
0
8
9
0
.
2
0
8
1
:
v
i
X
r
a
Abstract
Serious concerns have been raised about the role of 'so-
cialbots' in manipulating public opinion and influencing the
outcome of elections by retweeting partisan content to in-
crease its reach. Here we analyze the role and influence of
socialbots on Twitter by determining how they contribute to
retweet diffusions. We collect a large dataset of tweets during
the 1st U.S. presidential debate in 2016 and we analyze its
1.5 million users from three perspectives: user influence, po-
litical behavior (partisanship and engagement) and botness.
First, we define a measure of user influence based on the
user's active contributions to information diffusions, i.e. their
tweets and retweets. Given that Twitter does not expose the
retweet structure – it associates all retweets with the origi-
nal tweet – we model the latent diffusion structure using only
tweet time and user features, and we implement a scalable
novel approach to estimate influence over all possible un-
foldings. Next, we use partisan hashtag analysis to quantify
user political polarization and engagement. Finally, we use
the BotOrNot API to measure user botness (the likelihood of
being a bot). We build a two-dimensional "polarization map"
that allows for a nuanced analysis of the interplay between
botness, partisanship and influence. We find that not only are
socialbots more active on Twitter – starting more retweet cas-
cades and retweeting more – but they are 2.5 times more influ-
ential than humans, and more politically engaged. Moreover,
pro-Republican bots are both more influential and more po-
litically engaged than their pro-Democrat counterparts. How-
ever we caution against blanket statements that software de-
signed to appear human dominates politics-related activity on
Twitter. Firstly, it is known that accounts controlled by teams
of humans (e.g. organizational accounts) are often identified
as bots. Secondly, we find that many highly influential Twitter
users are in fact pro-Democrat and that most pro-Republican
users are mid-influential and likely to be human (low bot-
ness).
1
Introduction
Socialbots are broadly defined as "software processes that
are programmed to appear to be human-generated within
the context of social networking sites such as Facebook and
Twitter" (Gehl and Bakardjieva 2016, p.2). They have re-
cently attracted much attention and controversy, with con-
cerns that they infiltrated political discourse during the 2016
Copyright c(cid:13) 2018, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
U.S. presidential election and manipulated public opinion
at scale. Concerns were heightened with the discovery that
an influential conservative commentator (@Jenn_Abrams,
70,000 followers) and a user claiming to belong to the Ten-
nessee Republican Party (@TEN_GOP, 136,000 followers)
– both retweeted by high-profile political figures and celebri-
ties – were in fact Russian-controlled bots operated by the
Internet Research Agency in St. Petersburg (Collins and Cox
2017; Timberg, Dwoskin, and Entous 2017).
There are several challenges that arise when conducting
large-scale empirical analysis of political influence of bots
on Twitter. The first challenge concerns estimating user in-
fluence from retweet diffusions, where the retweet relations
are unobserved – the Twitter API assigns every retweet to
the original tweet in the diffusion. Current state-of-the-art
influence estimation methods such as ConTinEst (Du et al.
2013) operate on a static snapshot of the diffusion graph,
which needs to be inferred from retweet diffusions using ap-
proaches like NetRate (Rodriguez, Balduzzi, and Schölkopf
2011). This workflow suffers from two major drawbacks:
first, the algorithms for uncovering the diffusion graph do
not scale to millions of users like in our application; second,
operating on the diffusion graph estimates the "potential of
being influential", but it loses information about user activ-
ity – e.g. a less well connected user can still be influential
if they tweet a lot. The question is how to estimate at scale
the influence of millions of users from diffusion in which
the retweet relation is not observed? The second challenge
lies in determining at scale whether a user is a bot and also
her political behavior, as manually labeling millions of users
is infeasible. The question is therefore how to leverage au-
tomated bot detection approaches to measure the botness
of millions of users? and how to analyze political behav-
ior (partisanship and engagement) at scale?
This paper addresses the above challenges using a large
dataset (hereafter referred to as #DEBATENIGHT) of 6.5
million tweets authored by 1.5 million users that was col-
lected on 26 September 2016 during the 1st U.S. presidential
debate.
To address the first challenge, we introduce, evaluate, and
apply a novel algorithm to estimate user influence based on
retweet diffusions. We model the latent diffusion structure
using only time and user features by introducing the diffu-
sion scenario – a possible unfolding of a diffusion – and its
likelihood. We implement a scalable algorithm to estimate
user influence over all possible diffusion scenarios associ-
ated with a diffusion. We demonstrate that our algorithm can
accurately recover the ground truth on a synthetic dataset.
We also show that, unlike simpler alternative measures–such
as the number of followers, or the mean size of initiated
cascades–our influence measure ϕ assigns high scores to
both highly-connected users who never start diffusions and
to active retweeters with little followership.
We address the second challenge by proposing three new
measures (political polarization P, political engagement E
and botness ζ) and by computing them for each user in #DE-
BATENIGHT. We manually compile a list of partisan hash-
tags and we estimate political engagement based on the ten-
dency to use these hashtags and political polarization based
on whether pro-Democrat or pro-Republican hashtags were
predominantly used. We use the BotOrNot API to evalu-
ate botness and to construct four reference populations –
Human, Protected, Suspended and Bot. We build a
two-dimensional visualization – the polarization map – that
enables a nuanced analysis of the interplay between botness,
partisanship and influence. We make several new and impor-
tant findings: (1) bots are more likely to be pro-Republican;
(2) bots are more engaged than humans, and pro-Republican
bots are more engaged than pro-Democrat bots; (3) the aver-
age pro-Republican bot is twice as influential as the average
pro-Democrat bot; (4) very highly influential users are more
likely to be pro-Democrat; and (5) highly influential bots are
mostly pro-Republican.
• We introduce a scalable algorithm to estimate user in-
fluence over all possible unfoldings of retweet diffusions
where the cascade structure is not observed; the code is
publicly accessible in a Github repository1;
• We develop two new measures of political polarization
and engagement based on usage of partisan hashtags; the
list of partisan hashtags is also available in the repository;
• We measure the botness of a very large population of
users engaged in Twitter activity relating to an important
political event – the 2016 U.S presidential debates;
• We propose the polarization map – a novel visualization
of political polarization as a function of user influence and
botness – and we use it to gain insights into the influence
of bots on the information landscape around the U.S. pres-
idential election.
The main contributions of this work include:
2 Related work
We structure the discussion of previous work into two cat-
egories: related work on the estimation of user influence and
work concerning bot presence and behavior on Twitter.
Estimating user influence on Twitter. Aggregate mea-
sures such as the follower count, the number of retweets
and the number of mentions have been shown to be in-
dicative of user influence on Twitter (Cha et al. 2010;
1Code
and partisan hashtag list
is publicly available
https://github.com/computationalmedia/
at
cascade-influence
Kwak et al. 2010). More sophisticated estimates of user in-
fluence use eigenvector centrality to account for the con-
nectivity of followers or retweeters; for example, TwitteR-
ank (Weng et al. 2010) extends PageRank (Page et al. 1999)
by taking into account topical similarity between users and
network structure. Other extensions like Temporal PageR-
ank (Rozenshtein and Gionis 2016) explicitly incorporate
time into ranking to account for a time-evolving network.
However, one limitation of PageRank-based methods is that
they require a complete mapping of the social networks.
More fundamentally, network centrality has the drawback
of evaluating only the potential of a user to be influential
in spreading ideas or content, and it does not account for
the actions of the user (e.g. tweeting on a particular subject).
Our influence estimation approach proposed in Sec. 3 is built
starting from the user Twitter activity and it does not require
knowledge of the social network.
Recent work (Yates, Joselow, and Goharian 2016;
Chikhaoui et al. 2017) has focused on estimating user in-
fluence as the contribution to information diffusion. For ex-
ample, ConTinEst (Du et al. 2013) requires a complete dif-
fusion graph and employs a random sampling algorithm to
approximate user influence with scalable complexity. How-
ever, constructing the complete diffusion graph might prove
problematic, as current state-of-the-art methods for uncov-
ering the diffusion structure (e.g. (Rodriguez, Balduzzi, and
Schölkopf 2011; Simma and Jordan 2010; Cho et al. 2013;
Li and Zha 2013; Linderman and Adams 2014)) do not
scale to the number of users in our dataset. This is because
these methods assume that a large number of cascades oc-
cur in a rather small social neighborhood, whereas in #DE-
BATENIGHT cascades occur during a short period of time in
a very large population of users. Our proposed algorithm es-
timates influence directly from retweet cascades, without the
need to reconstruct the retweet graph, and it scales cubically
with the number of users.
Bot presence and behavior on Twitter. The 'BotOrNot'
Twitter bot detection API uses a Random Forest supervised
machine learning classifier to calculate the likelihood of a
given Twitter user being a bot, based on more than 1,000
features extracted from meta-data, patterns of activity, and
tweet content (grouped into six main classes: user-based;
friends; network; temporal; content and language; and senti-
ment) (Davis et al. 2016; Varol et al. 2017)2. The bot scores
are in the range [0, 1], where 0 (1) means the user is very
unlikely (likely) to be a bot. BotOrNot was used to exam-
ine how socialbots affected political discussions on Twitter
during the 2016 U.S. presidential election (Bessi and Ferrara
2016). They found that bots accounted for approximately 15
% (400,000 accounts) of the Twitter population involved in
election-related activity, and authored about 3.8 million (19
%) tweets. However, Bessi and Ferrara (2016) sampled the
most active accounts, which could bias upwards their esti-
mate of the presence of bots as activity volume is one of
the features that is used by BotOrNot. They found that bots
were just as effective as humans at attracting retweets from
humans. Woolley and Guilbeault (2017) used BotOrNot to
2See: https://botometer.iuni.iu.edu/#!/
(a)
(b)
(c)
Figure 1: Modeling latent diffusions. (a) The schema of a retweet cascade as provided by the Twitter API, in which all retweets
are attributed to the original tweet. (b) Four diffusion scenarios (out of 120 possible scenarios), associated with the retweet
cascade in (a). (c) Intuition of the independent conditional model. A new node v5 appears conditioned on one diffusion scenario
G. Four new diffusion scenarios are generated as v5 can attach to any of the existing nodes.
test 157,504 users randomly sampled from 1,798,127 Twit-
ter users participating in election-related activity and found
that over 10% were bots. Here we use BotOrNot to classify
all 1.5 million users in our dataset to obtain a less biased
approximation of their numbers and impact.
Previous work has studied the political partisanship of
Twitter bots. Kollanyi, Howard, and Woolley (2016) ana-
lyzed candidate-oriented hashtag use during the 1st U.S.
presidential debate and found that highly automated ac-
counts (self-identified bots and/or accounts that post at least
50 times a day) were disproportionately pro-Trump. Bessi
and Ferrara (2016) also studied political partisanship by
identifying five pro-Trump and four pro-Clinton hashtags
and assigning users to a particular political faction. The re-
sults suggested that both humans and bots were more pro-
Trump in terms of hashtag partisanship. However, the above
findings are limited to a comparison between humans and
bots of frequency counts of tweets authored and retweets re-
ceived, and they provide no insight into the importance of
users in retweet diffusions. We overcome this limitation by
modeling the latent structure of retweet diffusions and com-
puting user influence over all possible scenarios.
3 Estimating influence in retweet cascades
An information cascade V of size n is defined as a series
of messages vi sent by user ui at time ti, i.e. V = {vi =
(ui, ti)}i=1:n. Here v1 = (u1, t1) is the initial message,
and v1, . . . , vn with t1 < . . . < tn are subsequent reposts
or relays of the initial message. In the context of Twitter,
the initial message is an original tweet and the subsequent
messages are retweets of that original tweet (which by def-
inition, are also tweets). A latent retweet diffusion graph
G = (V, E) has the set of tweets as its vertexes V , and
additional edges E = {(vi, vj)} that represent that the jth
tweet is a retweet of the ith tweet, and respects the tempo-
ral precedence ti < tj. Web data sources such as the Twit-
ter API provide cascades, but not the diffusion edges. Such
missing data makes it challenging to measure a given user's
contribution to the diffusion process.
3.1 Modeling latent diffusions
Diffusion scenarios. We focus on tree-structured diffusion
graphs, i.e. each node vj has only one incoming link (vi, vj),
i < j. Denote the set of trees that are consistent with the
temporal order in cascade C as G, we call each diffusion
tree a diffusion scenario G ∈ G. Fig. 1a contains a cascade
visualized as a star graph, attributing subsequent tweets to
the first tweet at t1. Fig. 1b shows four example diffusion
scenarios consistent with this cascade. The main challenge
here is to estimate the influence of each user in the cascade,
taking into account all possible diffusion trees.
Probability of retweeting. For each tweet vj, we model the
probability of it being a direct descendant of each previous
tweet in the same cascade as a weighted softmax function,
defined by two main factors: firstly, users retweet fresh con-
tent (Wu and Huberman 2007). We assume that the probabil-
ity of retweeting decays exponentially with the time differ-
ence tj−ti; secondly, users prefer to retweet locally influen-
tial users, known as preferential attachment (Barabási 2005;
Rizoiu et al. 2017). We measure the local influence mi of
a user ui using her number of followers (Kwak et al. 2010;
Cha et al. 2010). We quantify the probability that vj is a di-
rect retweet of vi as:
(cid:80)j−1
mie−r(tj−ti)
k=1 mke−r(tj−tk)
pij =
(1)
where r is a hyper-parameter controlling the temporal de-
cay. It is set to r = 6.8 × 10−4, tuned using linear search on
a sample of 20 real retweet cascades (details in the supple-
ment (sup 2018, annex D)).
3.2 Tweet influence in a retweet cascade
We additionally assume retweets follow independent con-
ditional diffusions within a cascade. This is to say that con-
ditioned on an existing partial cascade of j − 1 retweets
denoted as V (j−1) = {vk}j−1
k=1 whose underlying diffusion
scenario is G(j−1), the jth retweet is attributed to any of the
k = 1, . . . , j−1 prior tweets according to Eq. 1, and is inde-
pendent of the diffusion scenario G(j−1). For example, the
5th tweet in the cascade will incur four valid diffusion trees
for each of the diffusion scenarios for 4 tweets – this is illus-
trated in Fig. 1c. This simplifying assumption is reasonable,
as it indicates that each user j makes up his/her own mind
about whom to retweet, and that the history of retweets is
available to user j (as is true in the current user interface
of Twitter). It is easy to see that under this model, the to-
tal number of valid diffusion trees for a 5-tweet cascade is
1 · 2 · 3 · 4 = 24, and that for a cascade with n tweets is
(n − 1)!.
The goal for influence estimation for each cascade is to
compute the contribution ϕ(vi) of each tweet vi averaging
over all independent conditional diffusion trees consistent
with cascade V and with edge probabilities prescribed by
Eq. 1. Enumerating all valid trees and averaging is clearly
computationally intractable, but the illustration in Fig. 1c
lends itself to a recursive algorithm.
Tractable tweet influence computation We introduce
the pair-wise influence score mij which measures the in-
fluence of vi over vj. vi can influence vj both directly when
vj is a retweet of vi, and indirectly when a path exists from
vi to vj in the underlying diffusion scenario. Let vk be a
tweet on the path from vi to vj (i < k < j) so that vj is
a direct retweet of vk. mik can be computed at the kth re-
cursion step and it measures the influence of vi over vk over
all possible paths starting with vi and ending with vk. Given
the above independent diffusions assumption, the mij can
be computed using mik to which we add the edge (vk, vj).
User uj can chose to retweet any of the previous tweets with
probability pkj, k < j, therefore we further weight the con-
tribution through vk using pij. We consider that a tweet has
a unit influence over itself (mii = 1). Finally, we obtain that:
(cid:80)j−1
1
0
k=i mikp2
kj
mij =
, i < j
, i = j
, i > j.
(2)
Naturally, ϕ(vi) the total influence of node vi is the sum
of mij, j > i the pair-wise influence score of vi over all sub-
sequent nodes vj. The recursive algorithm has three steps.
1. Initialization. mij = 0 for i, j = 1, . . . , n, j (cid:54)= i, and
mii = 1 for i = 1, . . . , n;
2. Recursion. For j = 2, . . . , n;
(a) For k = 1, . . . , j − 1, compute pkj using Eq. (1);
(b) For i = 1, . . . , j − 1, mij =(cid:80)j−1
3. Termination. Output ϕ(vi) = (cid:80)n
k=i mikp2
kj;
k=i+1 mik, for i =
1, . . . , n.
We exemplify this algorithm on a 3-tweet toy example.
Consider the cascade {v1, v2, v3}. When the first tweet v1
arrives, we have m11 = 1 by definition (see Eq. (2)). After
the arrival of the second tweet, which must be retweeting
the first, we have m12 = m11p2
12 = 1, and m22 = 1 by
definition. The third tweet can be a retweet of the first or the
second, therefore we obtain:
m13 =m11p2
m23 =m22p2
m33 =1 .
13 + m12p2
23 ;
23 ;
The second term of m13 accounts for the indirect influence
of v1 over v3 through v2. This is the final step for a 3-node
cascade.
The computational complexity of this algorithm is O(n3).
There are n recursion steps, and calculating pij at sub-step
(a) needs O(n) units of computation, and sub-step (b) takes
O(n2) steps. In real cascades containing 1000 tweets, the
above algorithm finishes in 34 seconds on a PC. For more
details and examples, see the online supplement (sup 2018,
annex B).
3.3 Computing influence of a user
Given T (u) – the set of tweets authored by user u –, we
define the user influence of u as the mean tweet influence of
tweets v ∈ T (u):
(cid:80)
ϕ(u) =
v∈T (u) ϕ(v)
T (u)
,T (u) = {vuv = u}
(3)
To account for the skewed distribution of user influence, we
mostly use the normalization – percentiles with a value of 1
for the most influential user our dataset and 0 for the least
influential – denoted ϕ(u)% .
4 Dataset and measures of political behavior
In this section, we first describe the #DEBATENIGHT
dataset that we collected during the 1st U.S. presidential de-
bate. Next, we introduce three measures for analyzing the
political behavior of users who were active on Twitter dur-
ing the debate. In Sec. 4.1, we introduce political polariza-
tion P and political engagement E. In Sec. 4.2 we introduce
the botness score ζ and we describe how we construct the
reference bot and human populations.
The #DEBATENIGHT dataset contains Twitter discus-
sions that occurred during the 1st 2016 U.S presiden-
tial debate between Hillary Clinton and Donald Trump.
Using the Twitter Firehose API3, we collected all
the
tweets (including retweets)
that were authored during
the two hour period from 8.45pm to 10.45pm EDT,
on 26 September 2016, and which contain at
least
one of the hashtags: #DebateNight, #Debates2016,
#election2016, #HillaryClinton, #Debates,
#Hillary2016, #DonaldTrump and #Trump2016.
The time range includes the 90 minutes of the presidential
debate, as well as 15 minutes before and 15 minutes after
the debate. The resulting dataset contains 6,498,818 tweets,
emitted by 1,451,388 twitter users. For each user, the Twit-
ter API provides aggregate information such as the number
of followers, the total number (over the lifetime of the user)
of emitted tweets, authored retweets, and favorites. For in-
dividual tweets, the API provides the timestamp and, if it is
3Via the Uberlink Twitter Analytics Service.
lyzed within context, our content analysis methodology fo-
cussed on three units of analysis (following the approach de-
veloped by Small (2011)). The first is hashtags, comprised
of a set of the 1000 most frequently occurring hashtags
over all tweets in our dataset. The second unit of analysis
was individual tweets that contained these hashtags. In or-
der to gain a more nuanced and 'situated' interpretation of
hashtag usage, for each hashtag we referred to a small ran-
dom sample of tweets in our dataset that contained each
given hashtag. In some instances the polarity (or neutral-
ity) was clear and/or already determined from previous stud-
ies, which helped to speed up the analysis of tweets. The
third unit of analysis was user profiles, which we referred
to in situations where the polarity or neutrality of a given
hashtag was unclear from the context of tweet analysis. For
example, #partyoflincoln was used by both Republican and
Democrat Twitter users, but an analysis of both tweets and
user profiles indicated that this hashtag was predominantly
used by Pro-Trump supporters to positively align the Re-
publican Party with the renowned historical figure of Pres-
ident Abraham Lincoln, who was a Republican. The con-
tent analysis resulted in a subset of 93 pro-Democrat and 86
pro-Republican hashtags (see the wordcloud visualization in
Fig. 2), whilst the remaining 'neutral' hashtags were subse-
quently excluded from further analysis. The resulting parti-
san hashtag list contains hashtags indicating either strong
support for a candidate (e.g., #imwithher for Clinton
and #trump2016 for Trump), or opposition and/or antag-
onism (e.g., #nevertrump and #crookedhillary).
The complete list of partisan hashtags is publicly available
in the Github repository.
Two measures of political behavior. We identify 65,031
tweets in #DEBATENIGHT that contain at least one partisan
hashtag (i.e., one of hashtags in the reference set of parti-
san hashtags constructed earlier). 1,917 tweets contain par-
tisan hashtags with both polarities: these are mostly negative
tweets towards both candidates (e.g., "Let's Get READY
TO RUMBLE AND TELL LIES. #nevertrump #neverhillary
#Obama") or hashtag spam. We count the number of occur-
rences of partisan hashtags for each user, and we detect a set
of 46,906 politically engaged users that have used at least
one partisan hashtag. Each politically engaged user ui has
two counts: demi the number of Democrat hashtags that ui
used, and repi the number of Republican hashtags. We mea-
sure the political polarization as the normalized difference
between the number of Republican and Democrat hashtags
used:
.
(4)
P(ui) takes values between −1 (if ui emitted only Demo-
crat partisan hashtags) and 1 (ui emitted only Republican
hashtags). We threshold the political polarization to con-
struct a population of Democrat users with P(u) ≤ −0.4
and Republican users with P(u) ≥ 0.4. In the set of po-
litically engaged users, there are 21,711 Democrat users,
22,644 Republican users and 2,551 users with no polariza-
tion (P(u) ∈ (−0.4, 0.4)). We measure the political engage-
ment of users using the total volume of partisan hashtags in-
cluded in their tweets E(ui) = repi + demi.
P(ui) =
repi − demi
repi + demi
Figure 2: Wordclouds of partisan hashtags in #DE-
BATENIGHT: Democrat (top) and Republican (bottom).
Hashtags sizes are scaled by their frequency.
a retweet, the original tweet that started the retweet cascade.
The #DEBATENIGHT dataset contains 200,191 retweet dif-
fusions of size 3 and larger.
4.1 Political polarization P and engagement E
Protocol. Content analysis (Kim and Kuljis 2010) was
used to code the 1000 most frequently occurring hashtags
according to their political polarity. More specifically, we
used Directed Content Analysis (Hsieh and Shannon 2005)
to contextually analyse hashtags and code them according to
their political polarity (or not, denoted as 'neutral' and sub-
sequently excluded from analysis). This approach has been
used in previous work to study hashtags on Twitter in a man-
ner that is valid, reliable and replicable (Small 2011). There
were two previous studies of Twitter activity during the
2016 U.S. presidential election that informed the develop-
ment of our coding schema. Firstly, Bessi and Ferrara (2016)
devised a binary classification scheme that attributed po-
litical partisanship to a small set of key hashtags as ei-
ther 'Trump-supporting' (#donaldtrump, #trump2016, #nev-
erhillary, #trumppence16, #trump) or 'Clinton-supporting'
(#hillaryclinton, #imwithher, #nevertrump, #hillary). Sec-
ondly, in studying Twitter activity during the 1st U.S. pres-
idential debate, Kollanyi, Howard, and Woolley (2016) de-
veloped a coding schema that categorized tweets into seven
categories based on the hashtags that occurred within the
tweet. However, the authors found that three 'exclusive'
categories ('Pro-Trump', 'Pro-Clinton', and 'Neutral') ac-
counted for the majority (88.5%) of observations.
Given the findings of previous research, we developed
a code book with three categories: 'Pro-Trump', 'Pro-
Clinton', and 'Neutral'. To ensure that hashtags were ana-
Table 1: Tabulating population volumes and percent-
ages of politically polarized users over four populations:
Protected, Human, Suspended and Bot.
All Prot. Human Susp.
10,162
265
111
154
Bot
17,561
All 1,451,388
435
44,299
185
21,676
22,623
250
48.93% 46.99% 44.90% 41.89% 42.53%
51.07% 53.01% 55.10% 58.11% 57.47%
45,316 499,822
1,245
11,972
5,376
585
660
6,596
Polarized
Democrat
Republican
Dem. %
Rep. %
4.2 Botness score ζ and bot detection
Detecting automated bots. We use the BotOrNot (Davis
et al. 2016) API to measure the likelihood of a user be-
ing a bot for each of the 1,451,388 users in the #DE-
BATENIGHT dataset. Given a user u, the API returns the
botness score ζ(u) ∈ [0, 1] (with 0 being likely human,
and 1 likely non-human). Previous work (Varol et al. 2017;
Bessi and Ferrara 2016; Woolley and Guilbeault 2017) use
a botness threshold of 0.5 to detect socialbots. However,
we manually checked a random sample of 100 users with
ζ(u) > 0.5 and we found several human accounts be-
ing classified as bots. A threshold of 0.6 decreases mis-
classification by 3%. It has been previously reported by
Varol et al. (2017) that organizational accounts have high
botness scores. This however is not a concern in this work,
as we aim to detect 'highly automated' accounts that behave
in a non-human way. We chose to use a threshold of 0.6 to
construct the Bot population in light of the more encom-
passing notion of account automation.
Four reference populations. In addition to the Bot pop-
ulation, we construct three additional reference populations:
Human ζ(u) ≤ 0.2 contains users with a high likelihood
of being regular Twitter users. Protected are the users
whose profile has the access restricted to their followers
and friends (the BotOrNot system cannot return the botness
score); we consider these users to be regular Twitter users,
since we assume that no organization or broadcasting bot
would restrict access to their profile. Suspended are those
users which have been suspended by Twitter between the
date of the tweet collection (26 September 2016) and the
date of retrieving the botness score (July 2017); this popu-
lation has a high likelihood of containing bots. Table 1 tab-
ulates the size of each population, split over political polar-
ization.
5 Evaluation of user influence estimation
In this section, we evaluate our proposed algorithm and
measure of user influence. In Sec 5.1, we evaluate on syn-
thetic data against a known ground truth. In Sec. 5.2, we
compare the ϕ(u) measure (defined in Sec. 3.3) against two
alternatives: the number of followers and the mean size of
initiated cascades.
(a)
(b)
(c)
Figure 3: Evaluation of the user influence measure. (a) 2D
density plot (shades of blue) and scatter-plot (gray circles)
of user influence against the ground truth on a synthetic
dataset. (b)(c) Hexbin plot of user influence percentile (x-
axis) against mean cascade size percentile (b) and the num-
ber of followers (c) (y-axis) on #DEBATENIGHT. The color
intensity indicates the number of users in each hex bin. 1D
histograms of each axis are shown using gray bars. Note
72.3% of all users that initiate cascades are never retweeted.
5.1 Evaluation of user influence
Evaluating user influence on real data presents two ma-
jor hurdles. The first is the lack of ground truth, as user in-
fluence is not directly observed. The second hurdle is that
the diffusion graph is unknown, which renders impossible
comparing to state-of-the-art methods which require this in-
formation (e.g. ConTinEst (Du et al. 2013)). In this section,
evaluate our algorithm against a known ground truth on a
synthetic dataset, using the same evaluation approach used
for ConTinEst.
Evaluation on synthetic data. We evaluate on synthetic
data using the protocol previously employed in (Du et al.
2013). We use the simulator in (Du et al. 2013) to generate
an artificial social network with 1000 users. We then simu-
late 1000 cascades through this social network, starting from
the same initial user. The generation of the synthetic social
network and of the cascades is detailed in the online supple-
ment (sup 2018, annex C). Similar to the retweet cascades in
#DEBATENIGHT, each event in the synthetic cascades has a
timestamp and an associated user. Unlike the real retweet
cascades, we know the real diffusion structure behind each
0.50.70.90.250.500.751.00User influence %Mean cascade size %User influence vs. mean cascade size1204038103162754count0.000.250.500.751.000.250.500.751.00Number of followers %User influence vs. no. of followerscount8103403201User influence %(a)
(b)
(c)
(d)
(e)
Figure 4: Profiling behavior of the Protected, Human, Suspended and Bot populations in the #DEBATENIGHT dataset.
The numbers in parentheses in the legend are mean values. (a) CCDF of the number of Twitter diffusion cascades started. (b)
CCDF of the number of retweets. (c)(d) CCDF (c) and boxplots (d) of the number of followers. (e) Number of items favorited.
synthetic cascade. For each user u, we count the number of
nodes reachable from u in the diffusion tree of each cascade.
We compute the influence of u as the mean influence over
all cascades. ConTinEst (Du et al. 2013) has been shown to
asymptotically approximate this synthetic user influence.
We use our algorithm introduced in Sec. 3.2 on the syn-
thetic data, to compute the measure ϕ(u) defined in Eq. 3.
We plot in Fig. 3a the 2D scatter-plot and the density plot of
the synthetic users, with our influence measure ϕ on the y-
axis and the ground truth on the x-axis (both in percentiles).
Visibly, there is a high agreement between the two measures,
particularly for the most influential and the least influential
users. The Spearman correlation coefficient of the raw val-
ues is 0.88. This shows that our method can output reliable
user influence estimates in the absence of any information
about the structure of the diffusions.
5.2 Comparison with other influence metrics
We compare the influence measure ϕ(u) against two al-
ternatives that can be computed on #DEBATENIGHT.
Mean size of initiated cascades (of a user u) is the av-
erage number of users reached by original content authored
by u. It should be noted that this measure does not capture
u's role in diffusing content authored by someone else. In
the context of Twitter, mean size of initiated cascades is the
average number of users who retweeted an original tweet
authored by u: we compute this for every user in the #DE-
BATENIGHT dataset, and we plot it against ϕ(u) in Fig. 3b.
Few users have a meaningful value for mean cascade size:
55% of users never start a cascades (and they are not ac-
counted for in Fig. 3b); out of the ones that start cascades
72.3% are never retweeted and they are all positioned at the
lowest percentile (shown by the 1D histograms in the plot). It
is apparent that the mean cascade size metric detects the in-
fluential users that start cascades, and it correlates with ϕ(u).
However, it misses highly influential users who never initi-
ate cascades, but who participate by retweeting. Examples
are user @SethMacFarlane (the actor and filmmaker Seth
MacFarlane, 10.8 million followers) or user @michaelian-
black (comedian Michael Ian Black, 2.1 million followers),
both with ϕ in the top 0.01% most influential users.
Number of followers is one of the simplest measures
of direct influence used in literature (Mishra, Rizoiu, and
Xie 2016; Zhao et al. 2015). While being loosely correlated
with ϕ(u) (visible in Fig. 3c, Pearson r = 0.42), it has
the drawback of not accounting for any of the user actions,
such as an active participation in discussions or generating
large retweet cascades. For example, user @PoliticJames
(alt-right and pro-Trump, 2 followers) emitted one tweet in
#DEBATENIGHT, which was retweeted 18 times and placing
him in the top 1% most influential users. Similarly, user @ti-
wtter1tr4_tv (now suspended, 0 followers) initiated a cas-
cade of size 58 (top 1% most influential). Interestingly, half
of the accounts scoring on the bottom 1% by number of fol-
lowers and top 1% by influence are now suspended or have
very high botness scores.
6 Results and findings
In this section, we present an analysis of the interplay be-
tween botness, political behavior (polarization and engage-
ment) and influence. In Sec. 6.1, we first profile the activity
of users in the four reference populations; next, we analyze
the political polarization and engagement, and their relation
with the botness measure. Finally, in Sec. 6.2 we tabulate
user influence against polarization and botness, and we con-
struct the polarization map.
6.1 Political behavior of humans and bots
Twitter activity across four populations. We measure
the behavior of users in the four reference populations de-
fined in Sec. 4.1 using several measures computed from the
Twiter API. The number of cascades started (i.e., number
of original tweets) and the number of posted retweets are
simple measures of activity on Twitter, and they are known
to be long-tail distributed (Cha et al. 2010). Fig. 4a and 4b
respectively plot the log-log plot of the empirical Comple-
mentary Cumulative Distribution Function (CCDF) for each
of the two measures. It is apparent that users in the Bot
and Suspended populations exhibit higher levels of ac-
tivity than the general population, whereas the Human and
Protected populations exhibit lower level. Fig. 4c and 4d
plot the number of followers and present a more nuanced
story: the average bot user has 10 times more followers than
the average human user; however, bots have a median of
190 followers, less than the median 253 followers of human
users. In other words, some bots are very highly followed,
0501001502002501e−061e−041e−02Number of cascades startedNumber of cascades startedEmpirical CCDFAll (1.7)protected (1.1)human (1.5)suspended (2.3)bot (2)1e+000501001502002503003501e−061e−041e−021e+00Number of retweetsNumber of retweetsEmpirical CCDFAll (2.9)protected (2.7)human (2.1)suspended (3.8)bot (2.6)1e+021e+041e+061e+081e−061e−041e−021e+00Number of followersNumber of followersEmpirical CCDFAll (2,610)protected (786)human (414)suspended (2,581)bot (20,572)0100020003000400050006000Number of followersNumber of followersAll (2,610)protected (786)human (414)suspended (2,582)bot (20,572)Allprotectedsuspendedbothuman05000100001500020000Number of favoritedNumber of favorited itemsAll (5,096)protected (5,614)human (4,449)suspended (8,343)bot (4,594)Allprotectedsuspendedbothuman(a)
(b)
(c)
(d)
which will be greatly enhanced in the context of a politi-
cal debate. Fig. 5b presents the log-log plot of the CCDF of
the political engagement, which shows that the political en-
gagement score is long-tail distributed, with pro-Democrats
slightly more engaged than pro-Republicans overall (t-test
significant, p-val = 0.0012).
Botness and political polarization. The distribution of
botness ζ exhibits a large peak around [0.1, 0.4] and a long
tail (Fig. 5c). The dashed gray vertical lines show the thresh-
holds used in Sec. 4.2 for constructing the reference Human
(ζ ∈ [0, 0.2]) and Bot (ζ ∈ [0.6, 1]) populations. Fig. 5d
shows the conditional density of polarization conditioned on
botness. For both high botness scores (i.e., bots) and low bot-
ness scores (humans) the likelihood of being pro-Republican
is consistently higher than that of being pro-Democrat, while
users with mid-range botness are more likely to be pro-
Democrat. In other words, socialbots accounts are more
likely to be pro-Republican than to be pro-Democrat.
Political engagement of bots. Fig. 5e shows the CCDF
of political engagement of the four reference populations,
and it is apparent that the Bot and Suspended popula-
tions exhibit consistently higher political engagement than
the Human and Protected populations. Fig. 5f shows the
CCDF of political engagement by the political partisanship
of bots and we find that pro-Republican Bot accounts are
more politically engaged than their pro-Democrat counter-
parts. In summary, socialbots are more engaged than hu-
mans (p-val = 8.55 × 10−5), and pro-Republican bots are
more engaged than their pro-Democrat counterparts (p-val
= 0.1228).
6.2 User influence and polarization map
(e)
(f)
Figure 5: Political polarization, engagement and botness.
(a) The density distribution of political polarization P. (b)
Log-log plot of the CCDF of political engagement E for the
Democrat and Republican populations. (c) The density dis-
tribution of botness ζ for the entire population (solid line)
and the politically polarized population (dashed line). (d)
The conditional density of polarization conditioned on bot-
ness. The top panel shows the volumes of politically polar-
ized users in 30 bins. (e)(f) CCDF of political engagement
for the reference populations (e) and for the polarized Bot
populations (f).
but most are simply ignored. Finally, Fig. 4e shows that bots
favorite less than humans, indicating that their activity pat-
terns differ from those of humans.
Political polarization and engagement. The density
distribution of political polarization (Fig. 5a) shows two
peaks at -1 and 1, corresponding to strongly pro-Democrat
and strongly pro-Republican respectively. The shape of
the density plot is consistent with the sizes of Republican
and Democrat populations (Sec. 4.1), and the extreme bi-
modality can be explained by the clear partisan nature of the
chosen hashtags and by the known political polarization of
users on Twitter (Conover et al. 2011; Barberá et al. 2015),
User influence across four populations. First, we study
the distribution of user influence across the four reference
populations constructed in Sec. 4.2. We plot the CCDF
in Fig. 6a and we summarize user influence as boxplots
in Fig. 6b for each population. User influence ϕ is long-
tail distributed (shown in Fig. 6a) and it is higher for
Bot and Suspended populations, than for Human and
Protected (shown in Fig 6b). There is a large discrepancy
between the influence of Human and Bot (p-val = 0.0025),
with the average bot having 2.5 times more influence than
the average human. We further break down users in the
Bot population based on their political polarization. Fig. 6d
aggregates as boxplots the influence of pro-Democrat and
pro-Republican bots (note: not all bots are politically polar-
ized). Notably, on a per-bot basis, pro-Republican bots are
more influential than their pro-Democrat counterparts (p-val
= 0.0096) – the average pro-Republican bot is twice as in-
fluential as the average pro-Democrat bot.
Political polarization and user influence. Next, we ana-
lyze the relation between influence and polarization. Fig. 6c
plots the probability distribution of political polarization,
conditioned on user influence ϕ%. While for mid-range in-
fluential users (ϕ% ∈ [0.4, 0.8]) the likelihood of being Re-
publican is higher than being Democrat, we observe the in-
verse situation on the higher end of the influence scale. Very
highly influential users (ϕ% > 0.8]) are more likely to be
pro-Democrat, and this is consistent with the fact that many
−1.0−0.50.00.51.001234Density distribution of political polarizationPolitical polarizationDensityDemocratRepublican1251020501005e−051e−045e−041e−035e−031e−025e−021e−01Political engagement vs. political polarizationEmpirical CCDFAll Democrat Republican Political engagement0.00.20.40.60.81.00123Botness densityDensityAll usersPoliticallypolarizedBotsHumansBotnessPolitical polarizationconditioned on botnessPolitical polarization0.00.20.40.60.8DemocratRepublican0.00.20.40.60.81.00200040006000Botness1251020501005e−051e−045e−041e−035e−031e−025e−021e−01Political engagement (4 populations)Empirical CCDFAllprotectedhumansuspendedbotPolitical engagement1251020500.0020.0050.0100.0200.0500.1000.200Political engagement vs. political polarization of botsEmpirical CCDFAll botsDemocrat botsRepublican botsPolitical engagement(a)
(b)
(c)
(d)
Figure 6: Profiling influence, and linking to botness and political behavior. (a)(b) User influence ϕ(u) for the reference popula-
tions, shown as log-log CCDF plot (a) and boxplots (b). (c) Probability distribution of polarization, conditional on ϕ(u)%. (d)
Boxplots of user influence for the pro-Democrat and pro-Republican Bot users. Numbers in parenthesis show mean values.
high botness scores. We compute the 2D density estimates
for the pro-Democrat and pro-Republican users (shown in
the online supplement (sup 2018, annex E)). For each point
in the space (ϕ%, ζ) we compute a score as the log of the
ratio between the density of the Republican users and that
of the pro-Democrats, which is then renormalized so that
values range from -1 (mostly Democrat) to +1 (mostly Re-
publican). The resulting map – dubbed the polarization map
– is shown in Fig. 7 and it provides a number of insights.
Three areas of interest (A, B and C) are shown on Fig. 7.
Area A is a pro-Democrat area corresponding to highly in-
fluential users (already shown in Fig. 6c) that spans across
most of the range of botness values. Area B is the largest
predominantly pro-Republican area and it corresponds to
mid-range influence (also shown in Fig. 6c) and concentrates
around small botness values – this indicates the presence of
a large pro-Republican population of mainly human users
with regular user influence. Lastly, we observe that the top-
right area C (high botness and high influence) is predomi-
nantly red: In other words highly influential bots are mostly
pro-Republican.
7 Discussion
In this paper, we study the influence and the political be-
havior of socialbots. We introduce a novel algorithm for es-
timating user influence from retweet cascades in which the
diffusion structure is not observed. We propose four mea-
sures to analyze the role and user influence of bots versus
humans on Twitter during the 1st U.S. presidential debate
of 2016. The first is the user influence, computed over all
possible unfoldings of each cascade. Second, we use the
BotOrNot API to retrieve the botness score for a large num-
ber of Twitter users. Lastly, by examining the 1000 most
frequently-used hashtags we measure political polarization
and engagement. We analyze the interplay of influence, bot-
ness and political polarization using a two-dimensional map
– the polarization map. We make several novel findings, for
example: bots are more likely to be pro-Republican; the av-
erage pro-Republican bot is twice as influential as its pro-
Democrat counterpart; very highly influential users are more
likely to be pro-Democrat; and highly influential bots are
Figure 7: Political polarization by user influence ϕ(u)% (x-
axis) and bot score ζ (y-axis). The gray dashed horizontal
line shows the threshold of 0.6 above which a user is con-
sidered a bot. The color in the map shows political polariza-
tion: areas colored in bright blue (red) are areas where the
Democrats (Republicans) have considerably higher density
than Republicans (Democrats). Areas where the two popu-
lations have similar densities are colored white. Three areas
of interest are shown by the letter A, B and C.
public figures were supportive of the Democrat candidate
during the presidential campaign.
The polarization map. Finally, we create a visualiza-
tion that allows us to jointly account for botness and user
influence when studying political partisanship. We project
each politically polarized user in #DEBATENIGHT onto the
two-dimensional space of user influence ϕ% (x-axis) and
botness ζ (y-axis). The y-axis is re-scaled so that an equal
length interval around any botness value contains the same
amount of users, This allows to zoom in into denser areas
like ζ ∈ [0.2, 0.4], and to deal with data sparsity around
1101001000100001e−061e−041e−021e+00AllprotectedhumansuspendedbotEmpirical CCDFUser influenceUser influenceAllprotectedsuspendedbot1.001.011.021.031.041.051.06User influenceAll (1.25)protected (1.08)human (1.08)suspended (1.47)bot (2.71)humanUser influencePolitical polarizationconditioned on user influence0.30.40.50.60.70.80.90.00.20.40.60.81.0Political polarizationDemocratRepublicanUser influence %AllDemocratRepublican1.01.21.41.61.82.0Bot influence over political biasAll bots (2.71)Democrat bots(1.43)Republican bots (3.53)User influence0.30.40.50.60.70.80.91.0Polarizationmap100020001000200030004000−1.0−0.50.00.51.0DemocratRepublican0.110.150.180.210.240.270.300.340.411.000.6BotnessUser influence %ACBmostly pro-Republican.
Validity of analysis with respect to BotOrNot. The
BotOrNot algorithm uses tweet content and user activity pat-
terns to predict botness. However, this does not confound
the conclusions presented in Sec. 6. First, political behav-
ior (polarization and engagement) is computed from a list of
hashtags specific to #DEBATENIGHT, while the BotOrNot
predictor was trained before the elections took place and it
has no knowledge of the hashtags used during the debate.
Second, a loose relation between political engagement and
activity patterns could be made, however we argue that en-
gagement is the number of used partisan hashtags, not tweets
– i.e. users can have a high political engagement score after
emitting few very polarized tweets.
Assumptions, limitations and future work. This work
makes a number of simplifying assumptions, some of which
can be addressed in future work. First, the delay between
the tweet crawling (Sept 2016) and computing botness (July
2017) means that a significant number of users were sus-
pended or deleted. A future application could see simul-
taneous tweets and botscore crawling. Second, our binary
hashtag partisanship characterization does not account for
independent voters or other spectra of democratic participa-
tion, and future work could evaluate our approach against
a clustering approach using follower ties to political actors
(Barberá et al. 2015). Last, this work computes the expected
influence of users in a particular population, but it does not
account for the aggregate influence of the population as a
whole. Future work could generalize our approach to entire
populations, which would allow answers to questions like
"Overall, were the Republican bots more influential than the
Democrat humans?".
Acknowledgments. This research is sponsored in part by
the Air Force Research Laboratory, under agreement number
FA2386-15-1-4018.
References
[Barabási 2005] Barabási, A.-L. 2005. The origin of bursts and
heavy tails in human dynamics. Nature 435(7039):207–11.
[Barberá et al. 2015] Barberá, P.; Jost, J. T.; Nagler, J.; Tucker,
J. A.; and Bonneau, R. 2015. Tweeting from left to right: Is online
political communication more than an echo chamber? Psychologi-
cal Science 26(10):1531–1542.
[Bessi and Ferrara 2016] Bessi, A., and Ferrara, E. 2016. Social
bots distort the 2016 u.s. presidential election online discussion.
First Monday 21(11).
[Cha et al. 2010] Cha, M.; Haddadi, H.; Benevenuto, F.; and Gum-
madi, K. P. 2010. Measuring User Influence in Twitter: The Million
Follower Fallacy. In ICWSM '10, volume 10, 10–17.
[Chikhaoui et al. 2017] Chikhaoui, B.; Chiazzaro, M.; Wang, S.;
and Sotir, M. 2017. Detecting communities of authority and an-
alyzing their influence in dynamic social networks. ACM Trans.
Intell. Syst. Technol. 8(6):82:1–82:28.
[Cho et al. 2013] Cho, Y.-S.; Galstyan, A.; Brantingham, P. J.; and
Tita, G. 2013. Latent self-exciting point process model for spatial-
temporal networks. Disc. and Cont. Dynamic Syst. Series B.
Jenna
[Collins and Cox 2017] Collins, B., and Cox, J.
abrams, russia's clown troll princess, duped the mainstream media
and the world. Dailybeast.com.
2017.
[Conover et al. 2011] Conover, M. D.; Ratkiewicz, J.; Francisco,
M.; Goncalves, B.; Menczer, F.; and Flammini, A. 2011. Politi-
cal polarization on Twitter. In ICWSM'11, 89–96. AAAI.
[Davis et al. 2016] Davis, C. A.; Varol, O.; Ferrara, E.; Flammini,
A.; and Menczer, F. 2016. Botornot: A system to evaluate social
bots. In WWW Companion, 273–274. ACM.
[Du et al. 2013] Du, N.; Song, L.; Gomez-Rodriguez, M.; and Zha,
H. 2013. Scalable Influence Estimation in Continuous-Time Dif-
fusion Networks. In NIPS'13, 3147–3155.
[Gehl and Bakardjieva 2016] Gehl, R., and Bakardjieva, M. 2016.
Socialbots and Their Friends: Digital Media and the Automation
of Sociality.
[Hsieh and Shannon 2005] Hsieh, H.-F., and Shannon, S. E. 2005.
Three approaches to qualitative content analysis. Qualitative
Health Research 15(9):1277–1288.
[Kim and Kuljis 2010] Kim, I., and Kuljis, J. 2010. Applying con-
tent analysis to web-based content. Jour. of Comp. and Inf. Tech.
18(4):369–375.
[Kollanyi, Howard, and Woolley 2016] Kollanyi,
B.; Howard,
P. N.; and Woolley, S. C. 2016. Bots and automation over Twitter
during the first U.S. presidential debate: Comprop data memo
2016.1. Oxford, UK.
[Kwak et al. 2010] Kwak, H.; Lee, C.; Park, H.; and Moon, S. 2010.
What is Twitter, a social network or a news media? In WWW'10,
591–600.
[Li and Zha 2013] Li, L., and Zha, H. 2013. Dyadic event attri-
bution in social networks with mixtures of hawkes processes. In
CIKM'13, 1667–1672. ACM.
[Linderman and Adams 2014] Linderman, S., and Adams, R. 2014.
Discovering latent network structure in point process data.
In
ICML'14, 1413–1421.
[Mishra, Rizoiu, and Xie 2016] Mishra, S.; Rizoiu, M.-A.; and Xie,
L. 2016. Feature driven and point process approaches for popular-
ity prediction. In CIKM'16, 1069–1078.
[Page et al. 1999] Page, L.; Brin, S.; Motwani, R.; and Winograd,
T. 1999. The pagerank citation ranking: Bringing order to the web.
Technical report, Stanford InfoLab.
[Rizoiu et al. 2017] Rizoiu, M.-A.; Xie, L.; Sanner, S.; Cebrian, M.;
Yu, H.; and Van Hentenryck, P. 2017. Expecting to be HIP: Hawkes
Intensity Processes for Social Media Popularity. In WWW'17, 735–
744.
[Rodriguez, Balduzzi, and Schölkopf 2011] Rodriguez, M. G.; Bal-
duzzi, D.; and Schölkopf, B. 2011. Uncovering the Temporal Dy-
namics of Diffusion Networks. In ICML'11, 561–568.
[Rozenshtein and Gionis 2016] Rozenshtein, P., and Gionis, A.
In ECML-PKDD'16, 674–689.
2016.
Springer.
[Simma and Jordan 2010] Simma, A., and Jordan, M. I.
Modeling events with cascades of poisson processes. UAI'10.
[Small 2011] Small, T. A. 2011. WHAT THE HASHTAG? A con-
tent analysis of Canadian politics on Twitter. Information, Commu-
nication & Society 14(6):872–895.
[sup 2018] 2018. Appendix: #DebateNight: The role and influ-
ence of socialbots on Twitter during the 1st 2016 U.S. presi-
dential debate. https://arxiv.org/pdf/1802.09808.
pdf#page=11.
[Timberg, Dwoskin, and Entous 2017] Timberg, C.; Dwoskin, E.;
and Entous, A. 2017. Russian Twitter account pretending to be
tennessee gop fools celebrities, politicians. Chicagotribune.
com.
Temporal pagerank.
2010.
[Varol et al. 2017] Varol, O.; Ferrara, E.; Davis, C. A.; Menczer, F.;
and Flammini, A. 2017. Online human-bot interactions: Detection,
estimation, and characterization. In ICWSM'17, 280–289. AAAI.
[Weng et al. 2010] Weng, J.; Lim, E.-P.; Jiang, J.; and He, Q.
2010. Twitterrank: finding topic-sensitive influential twitterers. In
WSDM'10, 261–270. ACM.
[Woolley and Guilbeault 2017] Woolley, S. C., and Guilbeault, D.
2017. Computational propaganda in the united states of america:
Manufacturing consensus online: Working paper 2017.5.
[Wu and Huberman 2007] Wu, F., and Huberman, B. A. 2007. Nov-
elty and collective attention. PNAS 104(45):17599–601.
[Yates, Joselow, and Goharian 2016] Yates, A.; Joselow, J.; and Go-
harian, N. 2016. The news cycle's influence on social media activ-
ity. In ICWSM'16.
[Zhao et al. 2015] Zhao, Q.; Erdogdu, M. A.; He, H. Y.; Rajaraman,
A.; and Leskovec, J. 2015. SEISMIC: A Self-Exciting Point Pro-
cess Model for Predicting Tweet Popularity. In KDD'15.
Contents (Appendix)
A Derivation of the influence formula
A.1 Diffusion scenarios . .
. . . . . . . . .
A.2 Computing tweet influence . . . . . . .
.
.
.
.
B Efficient tweet influence computation
B.1 Complete derivation of the recursive influ-
.
.
. . . . . .
B.2 Tweet influence algorithm . . . . . . .
ence formula
. . .
. . . . .
.
.
C Generation of synthetic data
C.1 Generation of random graphs . . . . . .
C.2 Sampling synthetic cascades . . . . . .
.
.
.
.
D Choosing the temporal decay parameter
E Additional 2D densities plots
11
11
12
13
13
14
14
14
16
16
16
A Derivation of the influence formula
In this section, we detail the calculation of the tweet in-
fluence ϕ(v), proposed in Sec. 3. In Sec. A.1, we define the
notion of diffusion scenario, and we compute its likelihood
given an observed retweet cascade. In Sec. A.2, we compute
the formula for tweet influence over all possible diffusion
scenarios associated with the given cascade.
A.1 Diffusion scenarios
Diffusion trees. We can represent an online diffusion us-
ing a directed tree G(V, E), in which each node has a single
parent and the direction of the edges indicates the flow of the
information. For retweet cascades, the nodes v ∈ V are in-
dividual tweets and each directed edge e ∈ E, e = {va, vb}
(showing the direction va −→ vb) indicates that vb is a direct
retweet of va. A direct retweet means that ub – the user that
emitted the tweet vb – clicked on the "Retweet" option under
tweet va. The top panel of Fig. 8a shows an example of such
a diffusion tree. Note that each node v has associated a time
of arrival tv and that the diffusion tree respects the order of
the times of arrival – i.e. given the edge e = {va, vb}, then
ta < tb. The bottom panel of Fig. 8a shows the incremental
construction of the diffusion tree shown in top panel: node
v1 is the root of the tree and the source of the information
diffusion; at each time ti, node vi attaches to the previous
tree constructed at time ti−1.
Diffusion scenarios for retweet cascades. The diffusion
tree is not observed for real Twitter retweet cascades, since
the Twitter API does not expose the direct retweet relation-
ships. Instead, it assigns every retweet in the cascade to the
original tweet. Every retweet cascades constructed based on
raw retweet information from the Twitter API resembles the
graph in Fig. 1a. Due to this particular shape, we denote
retweet cascades as stars. However, the API exposes the
time of arrival of the retweets ti. We denote as a diffusion
scenario any valid diffusion tree that could be associated
with the observed retweet star – i.e., the edges in the dif-
fusion tree respects the order of arrival of retweets. Fig. 1b
(a)
(b)
Figure 8: (a) An example of a diffusion tree (top) and its corresponding incremental diffusion process (bottom). (b) Enumera-
tion of all possible diffusion scenarios: each retweet vk arrives at time tk, and it can attach to any of the previous nodes, in any
of the diffusion scenario constructed at time tk−1. At time tk there are (k − 1)! diffusion scenarios, each with k nodes.
shows four examples of diffusion scenarios associated with
the star in Fig. 1a.
Constructing diffusion scenarios. Fig. 8b exemplifies a
straight-forward method to enumerate all diffusion scenarios
associated with the star in Fig. 1a. The node v1 is the root
node and it is published at time t1; tweet v2 occurs at time
t2 and it is undoubtedly a direct retweet of v1 – a directed
edge is drawn from v1 to v2. Tweet v3 observed at t3 can be
a direct retweet of either tweet v1 or tweet v2. Therefore, at
time t3 there are two possible diffusion scenarios: G1 with
the edge set E = {{v1, v2},{v1, v3}} and G2 with the edge
set E = {{v1, v2},{v2, v3}}. Similarly, v4 can be a direct
retweet of v1, v2 or v3, in either G1 or G2. Consequently,
at time t4 there are 6 possible diffusion scenarios. The pro-
cess continues until all nodes have been attached. For an ob-
served star of size k, there are (k − 1)! associated diffusion
scenarios.
Probability of a diffusion scenario. Given that in retweet
cascades individual edges are not observed, we define the
probability of an edge P({va, vb}) as the likelihood that ub
emitted tweet vb as a direct retweet of va. We model two
factors in the likelihood of retweeting: firstly, users retweet
Table 2: Summary of notations.
Notation
G(V, E)
v ∈ V
Interpretation
diffusion tree. In case the tree is unob-
served, G is a diffusion scenario.
node in the diffusion tree (i.e. retweets).
e = {va, vb} ∈ E directed edge in the diffusion tree, tweet vb
tv
uv
mv
is a direct retweet of va.
time of arrival of node v (timestamp of the
tweet).
user that has emitted tweet v.
local influence (i.e. number of followers) of
user uv.
fresh content (Wu and Huberman 2007). The probability of
the edge e decays exponentially with the time difference tb−
ta; secondly, users prefer to retweet locally influential users,
also known as preferential attachment (Barabási 2005). We
measure the local influence of a user using his number of
followers (Kwak et al. 2010; Cha et al. 2010; Rizoiu et al.
2017). We quantify the probability of an edge as:
P({va, vb}) = mae−r(tb−ta)
(5)
where ma is the number of followers of the user of ua and r
controls the temporal decay of the probability.
Under the assumption that retweeting events (i.e. edges)
occur independently one from another, we obtain the proba-
bility of a diffusion scenario as:
P(G) =
{va,vb}∈E
P({va, vb})
(6)
(cid:89)
Note that
the above assumption of independence of
retweet events is a strong assumption. Current state-of-the-
art approaches (Mishra, Rizoiu, and Xie 2016; Zhao et al.
2015) for modeling retweet cascades employ self-exciting
point processes, in which the arrival of one event increases
the probability of future events. However, for our applica-
tion of estimating the probability of a diffusion scenario it is
the simplest assumption. Additional arguments in its favor
are also that we are studying networks of events (in which
each event is identified with unique user), not networks of
users. The interdependence often observed in socially gen-
erated networks (like triadic closure) can be ignored in edge
formation within a particular retweet cascade.
A.2 Computing tweet influence
(Du et al. 2013) define user influence of a user u as the
average number of users in the social network who get in
contact with the content emitted by u. For retweet cascades
the diffusion tree is not observed; it is impossible to directly
measure user influence, apart from the root user. We define
the tweet influence over a retweet cascade as the expected
number of time it is retweeted – direct retweets or descen-
dants in a diffusion scenario –, over all possible diffusion
scenarios associated with the given star. Finally, we com-
pute the influence of user u as the sum of the influences of
the tweets that u authored. We see that the definition in (Du
et al. 2013) is a special case of our definition, in which the
diffusion tree is observed.
influence over one diffusion scenario. Let
z(vi, vk) ∈ G be a path in the diffusion scenario G – i.e
a sequence of nodes which starts with vi and ends with
vk. P(z(vi, vk)) is the probability of reaching vk from vi.
ϕ(viG) is the influence of vi and it is computed as the ex-
pected number of users reached from vi using a model of
independent binomials to decide whether or not to take each
hop in each path that starts with vi. Formally:
Tweet
ϕ(viG) = E
1{z(vi, vkG)}
(cid:21)
E
1{z(vi, vkG)}
P(z(vi, vkG))
(cid:89)
P(cid:0){va, vb}(cid:1)
(7)
(8)
vk∈V (G)
(cid:20)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
vk∈V (G)
vk∈V (G)
=
=
=
vk∈V (G)
{va,vb}∈z(vi,vk)
where 1{z(vi, vkG)} is a function that takes the value 1
when the path from vi to vk exists in G.
Tweet influence over a retweet cascade. We compute
the influence of tweet vi over V G – all possible diffusion
scenarios associated with a retweet cascade – as:
(cid:88)
(cid:88)
G∈V G
P(G)ϕ(viG)
(cid:88)
P(G)
G∈V G
vk∈V (G)
ϕ(vi) =
=
P(cid:0)z(vi, vkG)(cid:1)
(9)
It is intractable to directly evaluate Eq. (9), plugged in with
Eq. (6) and (8), particularly due to the factorial number of
diffusion scenarios in V G. For example, there are 10156 dif-
fusion scenarios for a cascade of 100 retweet. We develop,
in the next section, an efficient linear time algorithm to com-
pute the influence of all tweets in a retweet cascade.
B Efficient tweet influence computation
The key observation is that each tweet vk is added simul-
taneously at time tk to all diffusion scenarios constructed at
time tk−1. vk contributes only once to the tweet influence
of each tweet that is found on the branch it attached to. This
process is exemplified in Fig. 1c. Node v5 is added to a given
diffusion scenario, generating 4 new diffusion scenarios at
time t5. We color in red the nodes whose influence increases
as a result of adding node v5. This allows to compute the
tweet influence incrementally, by updating ϕ(vi), i < k at
each time tk. We denote by ϕk(vi) the value of tweet influ-
ence of vi after adding node vk. As a result, we only keep
track of how tweet influence increases over time steps and
we do not require to construct all diffusion scenarios.
B.1 Complete derivation of the recursive
influence formula
Incremental construction of diffusion scenarios. Let
G− ∈ V Gk−1 be a diffusion scenario constructed at time
tk−1, with the set of nodes V − = {v1, v2,··· , vk−1}. When
vk arrives, it can attach to any node in V −, generating k − 1
j = V − ∪ vk and
new diffusion scenarios G+
j = E−∪{vj, vk}. This process is exemplified in Fig. 1c.
E+
We can write the set of scenarios at time tk as:
j = G− ∪ {vj, vk}(cid:12)(cid:12)∀j < k,∀G− ∈ V Gk−1(cid:9)
V Gk =(cid:8)G+
j , with V +
(10)
We write the tweet influence of vi at time k as:
P(G+)ϕ(viG+)
ϕk(vi) =
(cid:88)
(cid:88)
G+∈V Gk
k−1(cid:88)
cf. (10) =
G−∈V Gk−1
j=1
P(G+
j )ϕ(viG+
j )
(11)
Note that in Eq. (11) we explicitly make use of how diffusion
scenarios at time k are constructed based on the diffusion
scenarios at time k − 1.
Attach a new node vk. We concentrate on the right-most
factor in Eq. (11) – the tweet influence in scenario G+
j . We
observe that the terms in Eq. (7) can be divided into two: the
paths from vi to all other nodes except vk and the path from
z(vi, vk). We obtain:
ϕ(viG+
j )) + P(z(vi, vkG+
P(z(vi, vlG+
(cid:88)
j ) =
j )).
vl∈G+
l>i,l(cid:54)=k
j
Note that a path that does not involve vk has the same prob-
ability in G+
j and in its parent scenario G−:
P(z(vi, vlG+
we obtain:
ϕ(viG+
j ) =
j )) = P(z(vi, vlG−)), for l > i, l (cid:54)= k
(cid:88)
P(z(vi, vlG−)) + P(z(vi, vkG+
j ))
cf. (7) = ϕ(viG−) + P(z(vi, vkG+
j ))
Combining Eq. (11) and (12), we obtain:
vl∈G−
l>i
k−1(cid:88)
j=1
∈V Gk−1
G−
(cid:88)
(cid:88)
(cid:88)
(cid:124)
(cid:124)
G−∈V Gk−1
G−∈V Gk−1
ϕk(vi) =
=
+
(12)
(cid:21)
(cid:20)
k−1(cid:88)
P(G+
j )
ϕ(viG−) + P(z(vi, vkG+
j ))
ϕ(viG−)
(cid:123)(cid:122)
A
k−1(cid:88)
j=1
j=1
P(G+
j )
(cid:125)
j )P(z(vi, vkG+
(cid:123)(cid:122)
j ))
(cid:125)
P(G+
Mik
.
(13)
Tweet influence at previous time step tk−1. Given the
definition of G+
j ) =
j
P(G−)P({vj, vk}). Consequently, part A in Eq. (13) can
be written as:
in Eq. (10), we obtain that P(G+
ϕ(viG−)
P(G−)P({vj, vk})
(cid:88)
(cid:88)
(cid:88)
G−∈V Gk−1
G−∈V Gk−1
A =
=
=
k−1(cid:88)
k−1(cid:88)
j=1
j=1
ϕ(viG−)P(G−)
P(G−)ϕ(viG−)
P({vj, vk})
G−∈V Gk−1
cf. (9) = ϕk−1(vi)
time step tk−1. Note that(cid:80)k−1
(14)
Consequently, A is the tweet influence of vi at the previous
P({vj, vk}) = 1 because vk
is necessarily the direct retweet of one of the previous nodes
vj, j < k of the retweet cascade.
Contribution of vk. With A being the influence of vi at
the previous time step, intuitively Mik is the contribution of
vk to the influence of vi. Knowing that:
j=1
j ))P({vj, vk})
= P(z(vi, vjG−))P({vj, vk})
j ) = P(G−)P({vj, vk}) and
j )} = P(z(vi, vjG+
k−1(cid:88)
P(G−)P2({vj, vk})P(z(vi, vjG−))
P(G+
P{z(vi, vkG+
G−∈V Gk−1
j=1
we write Mik as:
(cid:88)
k−1(cid:88)
k−1(cid:88)
j=1
j=1
Mik =
=
=
P2({vj, vk})Mij
P2({vj, vk})
P(G−)P(z(vi, vjG−))
(cid:88)
(cid:124)
G−∈V Gk−1
(cid:123)(cid:122)
Mij
(cid:125)
(15)
An alternative interpretation for Mik is the influence of vi
over vk. Eq. (15) can be intuitively understood as the ex-
pected influence of vi over a newly attached node vk is pro-
portional to the influence of vi over each already attached
node vj multiplied with the likelihood that vk attached itself
to vj. We obtain the formula of the the expected influence of
a node vi over another node vk as:
(cid:80)k−1
j=1 MijP2({vj, vk})
Mik =
, i < k
, i = k
, i > k.
influence. Using
Eq (13) and (14), we can recursively compute the influence
of vi at time tk as:
Recursive computation of
tweet
(16)
1
0
ϕk(vi) = ϕk−1(vi) + Mik
= ϕk−2(vi) + Mi(k−1) + Mik
=
Mij.
(17)
k(cid:88)
j=1
with Mij as defined in Eq. (16). Intuitively, the influence of
vi at time tk is the sum of the expected influence over each
of the nodes in the diffusion scenario.
B.2 Tweet influence algorithm
We define two matrices: matrix P = [Pij], with Pij =
P2({vi, vj}). Element Pij of the matrix P is the square
probability that tweet vj is a direct retweet of tweet vi; ma-
trix M = [Mij], with Mij defined in Eq. (16). Element Mij
of matrix M is the contribution of vj to the influence of vi.
Alternatively, Mij can be interpreted as the influence of vi
on vj.
From Eq. (16) follows the formula for computing itera-
tively the columns of matrix M:
M[1..j−1,1..j−1] × P[1:j−1,j]
1
0
0
...
0
M·j =
(18)
with the value 1 occurring on line j. For each column j,
we compute the first j − 1 elements by multiplying the sub-
matrix M[1..j−1,1..j−1] with the first j − 1 elements on the
jth column of matrix P . The computation of matrix M fin-
ishes in linear time, after n steps, where n is the total number
of retweets in the retweet cascade. Fig. 9 demonstrated the
computation of the first four columns in M. Algorithm ??
gives an overview of the efficient influence computation al-
gorithm.
C Generation of synthetic data
This section completes and details the results concern-
ing the evaluation on synthetic data, presented in the main
text Sec. 5.1. This section details the construction of a syn-
thetic random social graph (Sec. C.1) and the sampling of
synthetic cascades (Sec. C.2). The purpose is to construct
a synthetic dataset of cascades, in which the user influence
ground truth is known. Both the graph and cascade gener-
ators described here below reproduce closely the synthetic
experimental setup described in (Du et al. 2013).
C.1 Generation of random graphs
In this section, we describe the construction of a synthetic
social graph, with n nodes, specified by its adjacency matrix
M. Each node corresponds to a synthetic user, and the edges
correspond to synthetic follow relations. We follow the be-
low steps:
• Given the number of nodes n in the graph (here 1000),
create an null (all zero) adjacency matrix M of size n×n;
• Randomly choose the number of edges E, between n/2
• Randomly choose i and j between 1 to n and set Mij to
1. Iterate this step until E different edges are generated.
• The adjacency matrix M defines the final random graph.
to n2.
(cid:124)
1 M12 M13 M14
1 M23 M24
0
1 M34
0
0
0
0
0
...
...
...
...
1
0
0
0
0
(cid:123)(cid:122)
M
··· M1n
··· M2n
··· M3n
··· M4n
...
...
···
1
(cid:125)
(cid:124)
M11 = 1
M12 = P12M11
M13 = P13M11 + P23M12
M23 = P13M21 + P23M22
(cid:41)
M14 = P14M11 + P24M12 + P34M13
M24 = P14M21 + P24M22 + P34M23
M34 = P14M31 + P24M32 + P34M33
k = 1
k = 2
(cid:41)
k = 3
k = 4
··· P1n
··· P2n
··· P3n
··· P4n
...
...
···
1
1
0
0
1 P12 P13 P14
P23 P24
0
P34
0
1
1
0
0
...
...
...
...
0
0
P
0
0
(cid:125)
(cid:123)(cid:122)
(cid:20)1 M12
(cid:21)(cid:20)P13
(cid:20)M13
(cid:21)
(cid:21)
(cid:35)(cid:34)P14
(cid:34)1 M12 M13
(cid:35)
[P12] [M11] = [M12]
M23
P23
=
0
1
0
0
1 M23
0
1
=
P24
P34
(cid:34)M14
(cid:35)
M24
M34
Figure 9: Exemplification of the efficient computation of the first four columns of matrix M. Each kth column vector of matrix
M is colored correspondingly with the column vector in P used in the multiplication.
(a)
(b)
(c)
Figure 10: 2D density plots for all politically polarized users in #DEBATENIGHT (a), for Democrat users (b) and for Republican
users (c).
01000200030004000countl0.000.250.500.751.000.20.40.60.81.0User influence %Bot score %010002000count2D density for all politically polarized users0.000.250.500.751.000.20.40.60.81.0User influence %Bot score %123density2D density for pro−democrat users0.000.250.500.751.000.20.40.60.81.0User influence %Bot score %123density2D density for pro−republican users6.2 × 10−4 maximizes the mean of AUC and it is chosen as
r value in the experiments in Sec. 5 and 6.
E Additional 2D densities plots
We show in Fig. 10 the additional 2D density plots men-
tioned in the main text Sec. 6.2.
C.2 Sampling synthetic cascades
In this section we describe how to construct synthetic cas-
cades, given a synthetic social graph G constructed as shown
in Sec. C.1. To generate one cascades, to each edge in G we
associate an exponentially distributed waiting time and we
construct a shortest path tree. We detail this procedure in the
following steps:
• Similar to previous work (ConTinEst (Du et al. 2013)),
for each edge {vi, vj} ∈ G draw a transmission rate rij
from a Weibull distribution of shape k = 2.
• Given the transmission rate rij, we draw an Exponentially
distributed waiting time τij using the inverse transform
sampling:
τij = − ln(s)
rij
where s is draw uniformly from U (0, 1).
tree from vs to all the other nodes in G;
• Set τij as the weight of edge {vi, vj}.
• Starting from a source node vs, construct the shortest path
• For each node vk compute two measures: tk – its time of
occurrence as the total waiting time along the path from
vs to vk – and ck – the number of reachable nodes from
vk in the shortest path tree;
• The generated cascade is {t1, t2, t3 ··· tn} where (t1 <
t2 < t3 < ··· tn);
• The ground truth influence of node vk is the mean ck over
multiple random graphs (here 100).
D Choosing the temporal decay parameter
The temporal decay parameter r shown in Eq. (1) is de-
termined by linear search. Eq. (1) measures the probabilities
of edges in the retweeting (diffusion) network, however the
real diffusions are not observed. We make the assumption
that diffusions occur along edges in the underlying social
graph (follower relation). We measure the fitness of edge
probability by the likelihood of uncovering the ground truth
follower graph. In other words, if the edge {vi, vj} exists
in the follower graph (i.e. vj is a follower of vi) then the
edge {vi, vj} has the highest probability in the diffusion tree
than the edge {vl, vj} which does not exist in the following
graph. In other words, we are using the retweeting probabil-
ity to predict the existence of edges in the social graph. We
randomly select 20 cascades, and we crawl the following list
of every user appearing the the diffusions (the following list
for a user uj consists of users ui followed by uj). We use
this information as ground truth for the following prediction
exercise: given a user uj who emitted tweet vj in a particu-
lar cascade, we want to predict which among the users in the
set {u1, u2, . . . , uj−1} are followed by uj. Considering that
P({vl, vj}).∀l < j, j ≥ 2 are real numbers and the predic-
tion target is binary, we use the AUC (are under ROC curve)
the measure the prediction performance of a particular prob-
ability scoring function. For each value of r in Eq. (1) we
compute the mean AUC over all predictions. We perform a
linear search for the optimal r between 10−8 to 3. Finally,
|
1609.08768 | 1 | 1609 | 2016-09-28T04:49:12 | Ignoring Extreme Opinions in Complex Networks: The Impact of Heterogeneous Thresholds | [
"cs.SI",
"cs.DM",
"physics.soc-ph"
] | We consider a class of opinion dynamics on networks where at each time-step, each node in the network disregards the opinions of a certain number of its most extreme neighbors and updates its own opinion as a weighted average of the remaining opinions. When all nodes disregard the same number of extreme neighbors, previous work has shown that consensus will be reached if and only if the network satisfies certain topological properties. In this paper, we consider the implications of allowing each node to have a personal threshold for the number of extreme neighbors to ignore. We provide graph conditions under which consensus is guaranteed for such dynamics. We then study random networks where each node's threshold is drawn from a certain distribution, and provide conditions on that distribution, together with conditions on the edge formation probability, that guarantee that consensus will be reached asymptotically almost surely. | cs.SI | cs |
Ignoring Extreme Opinions in Complex Networks:
The Impact of Heterogeneous Thresholds
Shreyas Sundaram∗
Abstract
We consider a class of opinion dynamics on networks where at each time-step, each node
in the network disregards the opinions of a certain number of its most extreme neighbors and
updates its own opinion as a weighted average of the remaining opinions. When all nodes
disregard the same number of extreme neighbors, previous work has shown that consensus will
be reached if and only if the network satisfies certain topological properties. In this paper, we
consider the implications of allowing each node to have a personal threshold for the number of
extreme neighbors to ignore. We provide graph conditions under which consensus is guaranteed
for such dynamics. We then study random networks where each node's threshold is drawn from
a certain distribution, and provide conditions on that distribution, together with conditions on
the edge formation probability, that guarantee that consensus will be reached asymptotically
almost surely.
1
Introduction
The study of how opinions, fads, and ideas spread through populations has received significant
attention over the past several decades, spanning diverse disciplines including sociology, mathe-
matics, physics, computer science and engineering. This body of work has shown that complex
global phenomena can arise as a result of relatively simple interaction rules for the individuals in
the population. In particular, there is a tight coupling between the structure of the interactions
(i.e., who talks to whom) and the dynamics of these interactions (i.e., what happens when they
talk).
An early investigation of opinion dynamics in networks was initiated by DeGroot [DeGroot,
1974], who proposed that individuals repeatedly update their personal (real-valued) opinions as
a weighted average of their neighbors' opinions. Such dynamics lead to consensus under mild
assumptions on the underlying network topology, and there has been substantial effort devoted to
extending such averaging rules to settings involving time-varying graph topologies, higher-order
dynamics, and stubborn or malicious individuals [Acemoglu et al., 2013, Friedkin, 2015, Jadbabaie
et al., 2003, Moreau, 2005, Pirani and Sundaram, 2016, Ren and Beard, 2005, Sundaram and
Hadjicostis, 2011]. A modification of the classical DeGroot model is the bounded confidence model
of Hegselmann and Krause (and separately, Weisbuch and Deffuant), where an individual only
averages the opinions of those neighbors whose opinions are close (according to some metric) to
their own [Amblard and Deffuant, 2004, Blondel et al., 2009, Etesami et al., 2013, Hegselmann
and Krause, 2002, Weisbuch et al., 2002]. In such cases, the opinions in the network settle down
to a stratified set of values (i.e., not necessarily in consensus), depending on the initial spread of
opinions.
∗The author is with the School of Electrical and Computer Engineering at Purdue University. E-mail:
[email protected].
In addition to the above studies of real-valued opinions, researchers have also investigated the
diffusion of binary valued information; this models, for instance, the adoption of a certain innova-
tion, or deciding whether to participate in an activity (such as a riot) [Granovetter, 1978, Masuda,
2015, Morris, 2000, Schelling, 2006, Sood and Redner, 2005, Watts, 2002, Yildiz et al., 2013]. The
dynamics in such cases are often manifested as threshold-based rules, where an individual adopts the
action if a certain number or fraction of their neighbors have done so. In particular, heterogeneous
thresholds play an important role in such dynamics, as they lead to cascades whereby individuals
with low thresholds initiate the adoption process, and individuals with increasingly higher thresh-
olds subsequently join the cascade [Gladwell, 2006, Goldenberg et al., 2001, Granovetter, 1978,
Watts, 2002].
In this paper, we study a generalization of DeGroot opinion dynamics by introducing a threshold-
based filtering rule into the averaging dynamics. Specifically, instead of each node averaging all of
its neighbors opinions (as in DeGroot), we consider the scenario where each individual disregards
the most extreme opinions in its neighborhood and averages only the opinions of its moderate neigh-
bors. This rule differs from the bounded confidence models of Hegselmann and Krause in that each
individual discards only a certain number of most extreme values in its neighborhood under our
dynamics, as opposed to any number of values that differ significantly from its own opinion. This
type of filtering rule has been recently studied in the context of resilient consensus dynamics (where
some nodes can be faulty or malicious), and all non-adversarial nodes use the same threshold (i.e.,
they all disregard the same number of extreme neighbors) [LeBlanc et al., 2013, Vaidya et al., 2012].
These previous works have established graph-theoretic conditions that are required for such rules to
guarantee consensus among the non-adversarial nodes, regardless of the actions of the adversaries.
In this paper we do not consider adversarial behavior, but instead study the impact of heterogene-
ity in the filtering thresholds (motivated by the study of such heterogeneous thresholds in binary
diffusion dynamics, as highlighted above). Our contributions are as follows. We first extend the
graph-theoretic characterizations from [LeBlanc et al., 2013] to the case of heterogeneous thresholds
and provide necessary and sufficient conditions on the network topology (in terms of the thresholds)
for consensus to be guaranteed regardless of the initial opinions. We then study such dynamics
in random graph models for complex networks, where each node's opinion filtering threshold is
chosen independently and randomly from a certain distribution. We characterize properties of this
distribution such that with high probability, the resulting network guarantees consensus; we study
Erdos-R´enyi random graphs (where each edge is placed independently with the same probability),
random interdependent networks (consisting of various subnetworks or communities with arbitrary
topologies), and random graphs with heterogeneous edge probabilities.
Notation and Definitions
A graph (or network) is denoted by G = {V, E}, where V = {v1, . . . , vn} is a set of nodes (or vertices
or individuals) and E ⊆ V × V is a set of edges. An edge (vj , vi) indicates that node vi can receive
information from node vj. The set of neighbors of node vi is defined as Ni = {vj ∈ V (vj , vi) ∈ E}.
Correspondingly, the degree of node vi is given by di = Ni, and the minimum degree of the network
is minvi∈V di. A path from node vj to vi is a sequence of nodes vi1 , vi2 , . . . , vik such that vi1 = vj,
vik = vi and (vil , vil+1) ∈ E for l = 1, 2, . . . , k − 1. The graph is said to be strongly connected if
there is a path from every node to every other node. The connectivity of a graph is the smallest
number of nodes that have to be removed in order to cause the remaining network to not be strongly
connected.
In our derivations, we use Z to denote the set of integers, N to denote the set of nonnegative
integers, and R to denote the set of real numbers. We add subscripts to these quantities to denote
restrictions of the sets to appropriate values. For two functions f : N → R and g : N → R, we say
f (n) = O(g(n)) if there exist constants c > 0 and n0 such that f (n) ≤ cg(n) for all n ≥ n0. We
say f (n) = o(g(n)) if f (n)
g(n) → 0 as n → ∞.
2 Filtering-Based Opinion Dynamics
Consider a population of individuals modeled by the directed network G = {V, E}. Each individual
(node) vi has an initial opinion xi[0] ∈ R. We assume that time progresses in a sequence of quantized
increments, referred to as time-steps. At each time-step k ∈ N, each node receives the opinions of
its neighbors, and updates its opinion as a function of those received values.
In this paper, we define a filtering threshold ti ∈ {0, 1, . . . , n − 1} for each node vi ∈ V. Based
on this threshold, we consider the following class of opinion dynamics.
1. At each time-step k, each node vi gathers the opinions of its neighbors, i.e., {xj[k] vj ∈ Ni}.
2. Each node vi removes the ti largest opinions in its neighborhood that are higher than its own
opinion (if there are fewer than ti such opinions, node vi only disregards those opinions). Each
node vi also removes the ti smallest opinions in its neighborhood that are smaller than its
own opinion (if there are fewer than ti such opinions, node vi only disregards those opinions).
Ties in opinions are broken arbitrarily. Let Mi[k] ⊂ Ni denote the set of moderate neighbors
of vi at time-step k (i.e., those nodes whose opinions were not discarded).
3. Each node vi updates its own opinion as
xi[k + 1] = wii[k]xi[k] + Xvj ∈Mi[k]
wij[k]xj[k],
(1)
where the weights wii[k] and wij[k], vj ∈ Mi[k] are nonnegative, lower bounded by some
positive constant η, and sum to 1.
Note that the set Mi[k] can be empty if node vi has fewer than 2ti neighbors. In particular,
if ti = di for some vi, that node disregards all of its neighbors and thus becomes a stubborn node.
When ti = 0 for all vi ∈ V, the above dynamics reduce to classical DeGroot dynamics. In this
case, all nodes will reach consensus as long as the graph is strongly connected (or more generally,
contains a spanning tree rooted at some node) [DeGroot, 1974, Ren and Beard, 2005]. However,
when the nodes have nonzero filtering thresholds, simply having a strongly connected graph is no
longer sufficient to ensure consensus. To illustrate, consider the network shown in Fig. 1 where
every node has filtering threshold 1. This network consists of two complete subgraphs on node
sets S1 and S2. Each node in S1 has exactly one neighbor in the opposite set. This network is
strongly connected; in fact, it has connectivity n
2 . However suppose that
each node in S1 has initial opinion 0 and each node in S2 has initial opinion 1. Under the filtering
dynamics described above, each node in each community removes the opinion of its neighbor from
the opposite community, and thus no node ever changes its opinion. Thus, consensus is not reached
in this network even when each node disregards only a single highest and lowest opinion in its
neighborhood at each time-step.
2 and minimum degree n
In [LeBlanc et al., 2013], we considered the above class of filtering dynamics for the case where
the thresholds for each node are the same (i.e., ti = tj for all vi, vj ∈ V), but where certain
nodes in the network were allowed to be malicious and deviate from the dynamics in arbitrary
ways. We established graph-theoretic properties that will ensure consensus of the non-malicious
nodes under these conditions. In the next section, we will generalize these conditions to the case
of heterogeneous thresholds, and establish necessary and sufficient graph conditions for consensus
under the filtering dynamics (1). Subsequently, we will use these graph conditions to study this
class of opinion dynamics in random graph models for complex networks, with randomly chosen
filtering thresholds for each node.
3 Graph-Theoretic Conditions to Ensure Consensus Under Filtering-
based Opinion Dynamics with Heterogeneous Thresholds
Given a network G = {V, E} with n nodes, let T = {t1, t2, . . . , tn} be the set of filtering thresholds.
We define the following notions.
Definition 1. We say that a set S ⊂ V is (T + 1)-reachable if there exists a node vi ∈ S that
has at least ti + 1 neighbors outside S, i.e., Ni \ S ≥ ti + 1.
Definition 2. We say that network G is (T + 1)-robust if for every pair of disjoint nonempty
subsets S1, S2 ⊂ V, either S1 or S2 is (T + 1)-reachable.
Note that when ti = 0 for all vi ∈ V, then the network being (T + 1)-robust is equivalent to it
having a spanning tree rooted at some node. The above definitions are a relatively straightforward
extension of the notions of robust networks given in [LeBlanc et al., 2013, Zhang et al., 2015],
where each node had the same threshold. The intuition behind the definition of a (T + 1)-robust
graph follows from examining the failure of consensus in Fig. 1: that network contained two subsets
of nodes where each node in each subset filtered away the only information it received from the
opposite subset.
In order to ensure consensus, we would like to avoid such situations. This is
captured by the following theorem.
Theorem 1. Consider a network G = {V, E} with a set of filtering thresholds T . Then consensus
is guaranteed under the filtering-based opinion dynamics (1) regardless of the initial opinions if and
only if the network is (T + 1)-robust.
Proof. For the proof of necessity, suppose the network is not (T + 1)-robust. Then there exist two
disjoint nonempty subsets S1 and S2 of nodes such that neither set is (T + 1)-reachable. Let the
initial opinions of the nodes in set S1 be 0, and let the initial opinions of the nodes in set S2 be
1. Let the initial opinions of all nodes in set V \ {S1 ∪ S2} be 0.5. Now, since each node vi ∈ S1
has at most ti neighbors outside S1, each node will remove all of those opinions when it updates
its opinion, and thus its opinion will stay at 0. The same reasoning holds for the set S2, and thus
consensus will never be reached.
The proof of sufficiency follows from a straightforward generalization of the proof of sufficiency
under homogeneous thresholds given in [LeBlanc et al., 2013], and thus we omit it here.
.....
.....
.....
S1
S2
Figure 1: Example of a network where consensus is not guaranteed when each node ignores the
single highest and single lowest opinion in its neighborhood at each time-step.
Armed with the above characterization of conditions under which the opinion dynamics (1) lead
to consensus, we now study such dynamics in random graph models for large-scale networks.
4 Opinion Dynamics in Erdos-R´enyi Random Graphs
We start by considering the outcome of the opinion dynamics (1) in Erdos-R´enyi random graphs,
defined as follows.
Definition 3. For n ∈ Z≥1, let Ωn be the set of all undirected graphs on n nodes, and define
p(n) ∈ [0, 1]. Define the probability space (Ωn, Fn, Pn), where the σ-algebra Fn is the power set of
Ωn, and Pn is a probability measure that assigns the probability
Pn(G) = p(n)m(1 − p(n))(n
2)−m
to each graph G with m edges. Then, a graph drawn from Ωn according to the above probability
distribution is called an Erdos-R´enyi (ER) random graph, and denoted Gn,p. Equivalently, an ER
graph is obtained by placing each edge in the graph independently with probability p(n).
Definition 4. Let R be a graph property, and let GR
n ⊆ Ωn be the set of graphs on n nodes that
have that property. We say an ER graph has property R asymptotically almost surely (a.a.s.)
if limn→∞ Pn(GR
n ) = 1.
An important feature of Gn,p is that the model displays 'phase transitions' for certain properties.
Loosely speaking, if the probability of adding an edge is 'larger' than a certain value (which could
be a function of n) then the ER graph will have a certain property a.a.s., and if the edge probability
is 'smaller' than that value, then the graph will a.a.s. not have that property. We make this more
precise for the following properties.
Definition 5. For any r ∈ Z≥1, let Dr be the property of having minimum-degree r and let Kr be
the property of having connectivity r.
Lemma 1 ([Erdos and Renyi, 1961]). For any constant r ∈ Z≥1, let the edge probability be given
by
p(n) =
ln n + (r − 1) ln ln n + c(n)
n
,
where c(n) is some function of n. If c(n) → ∞ as n → ∞, the ER graph has properties Dr and Kr
a.a.s. If c(n) → −∞ as n → ∞, then the ER graph a.a.s. does not have either of the properties
Dr or Kr.
Based on the above result, we see that the ER graph requires p(n) = ln n+c(n)
with c(n) → ∞
in order to be connected a.a.s. (as this corresponds to the property K1). This is the regime that we
will focus on here, as consensus under generic initial opinions cannot be obtained in disconnected
networks, regardless of the filtering thresholds at the nodes. In particular, in our proofs, we will
take r ∈ Z≥1 to be the largest integer such that p(n) ≥ ln n+(r−1) ln ln n+c(n)
where c(n) → ∞; this
r is then the minimum degree of the graph. If this is true for all r ∈ N, then our analysis holds for
any positive integer r.
n
n
As we are interested in the effects of heterogeneous filtering thresholds, we will consider the
case where the threshold for each node is drawn independently from a given distribution q(·) with
support [0, ¯r], where ¯r ∈ Z≥1. Specifically, the probability that node vi has filtering threshold t is
given by q(t). There are a few subtle details underlying this analysis. First, note that if a node has
a filtering threshold that is larger than its degree, then consensus will not be guaranteed in general
(e.g., if that node has the largest opinion in the network, it will disregard all of its neighbors, and all
other nodes with nonzero thresholds will disregard the extreme opinion of that node). On the other
hand, even if the filtering thresholds are much smaller than the node degrees, the graph may not be
(T + 1)-robust; for example, in the network shown in Fig. 1, all nodes have degree n
2 and filtering
threshold 1, but the graph is not (T + 1)-robust. Thus, the filtering threshold distribution must be
such that these events occur with vanishing probability. We provide such a characterization below.
Theorem 2. Consider an ER graph with edge probability
p(n) =
ln n + (r − 1) ln ln n + c(n)
n
,
(2)
where c(n) = o(ln ln n) and goes to ∞ with n. Suppose the filtering threshold distribution has
support [0, ¯r] for some ¯r ∈ N, and satisfies
q(t) = O(cid:18)
1
(ln n)t−r+1(cid:19)
(3)
for t ≥ r. Then the ER random graph with filtering thresholds drawn from q(·) will facilitate
consensus under the local-filtering opinion dynamics a.a.s.
Proof. We will show that the ER graph is (T +1)-robust a.a.s. under the conditions in the theorem,1
where T is the vector of filtering thresholds, each drawn independently from the distribution q(·).
To do this, we will show that every subset of vertices of cardinality up to αn is (T + 1)-reachable,
where α ∈ (0, 1) is some function of n that goes to 1. This will be sufficient to prove (T + 1)-
robustness of the network, since if we take any two disjoint nonempty sets, at least one of them
will have size at most n
2 ≤ αn, and thus will be (T + 1)-reachable.
To this end, consider any subset S ⊂ V of nodes with cardinality m ∈ {1, 2, . . . , αn}. Consider
some node vi ∈ S. The probability that vi has less than ti + 1 neighbors outside S (where ti is
randomly chosen from the distribution q(·)) is given by
which is upper bounded by
q(t)
¯r
Xt=0
¯r
t
Xj=0(cid:18)n − m
Xj=0(cid:18)n
t
q(t)
Xt=0
j (cid:19)pj(1 − p)n−m−j,
j(cid:19)pj(1 − p)n−m−j.
Thus, the probability PS that all nodes vi in set S have fewer than ti + 1 neighbors outside S is
upper bounded by
¯r
PS ≤
Xt=0
j(cid:1)pj(1 − p)n−m−j. We have
bj
bj−1
=
Let bj ,(cid:0)n
m
q(t)
t
Xj=0(cid:18)n
j(cid:19)pj(1 − p)n−m−j
n − j + 1
p
j
1 − p
≥
n − t
p
t
1 − p
(4)
.
(5)
1The choice of c(n) = o(ln ln n) in the theorem is for technical reasons, but is not restrictive; as we argue later in
Section 6, any probability larger than the one given in this theorem will also suffice for the result to hold.
for j ≤ t, which goes to ∞ for t = o(np). Thus, for any β > 1, we have
large n. This yields
bj
bj−1
> β for sufficiently
t
Xj=0(cid:18)n
j(cid:19)pj(1 − p)n−m−j ≤
t
Xj=0
1
βt−j bt ≤ bt
1
βj = C1bt
∞
Xj=0
for some positive constant C1. Substituting this back into (5), we have
PS ≤ C1
¯r
Xt=0
q(t)(cid:18)n
t(cid:19)pt(1 − p)n−m−t!m
.
Using the fact that (cid:0)n
t(cid:1) ≤ nt and 1 − p ≤ e−p, we have
¯r
PS ≤ C1
Xt=0
q(t)(np)te−npep(m+t)!m
.
Substituting the expression for p from the theorem, we have
PS ≤ C1
¯r
Xt=0
q(t)
(ln n + (r − 1) ln ln n + c)t
n(ln n)r−1
e−cep(m+t)!m
.
Using condition (3) on the filtering threshold distribution given in the theorem, we have
q(t)(ln n + (r − 1) ln ln n + c)t
1
(ln n)r−1 = O(1).
Thus, we have
PS ≤ C2
for some positive constants C2 and C3.
1
n
e−cep(m+t)!m
≤(cid:18)C3
1
n
e−cepm(cid:19)m
¯r
Xt=0
Let Pm be the probability that there is some set S ⊂ V of size m such that all nodes vi ∈ S
have fewer than ti + 1 neighbors outside S. By the union bound, we have
Pm ≤(cid:18) n
where we used the fact that (cid:0) n
epm
m ≤ max{ep, 1
theorem, we see that
m(cid:19)PS ≤(cid:18)C3
m(cid:1) ≤ (cid:0) ne
αn eαnp} for 1 ≤ m ≤ αn. For the edge probability p of the form given in the
m(cid:1)m. It was shown in [Zhang et al., 2015] that the function
ne
m
1
n
e−cepm(cid:19)m
m (cid:19)m
=(cid:18)C3e1−c epm
,
1
αn
eαnp =
1
α
eαnp−ln n =
1
α
e−(1−α) ln n+α(r−1) ln ln n+αc(n) = o(1)
whenever ln ln n = o((1 − α) ln n). Let α be such that this holds. Then we have epm
m ≤ ep ≤ e for
sufficiently large n. Thus, we have Pm ≤ (C4e−c)m for some constant C4. Finally, the probability
that some set of size between 1 and αn is not (T + 1)-reachable is upper bounded by
⌊αn⌋
Xm=1
Pm ≤
⌊αn⌋
∞
Xm=1(cid:0)C4e−c(cid:1)m ≤
Xm=1(cid:0)C4e−c(cid:1)m =
C4e−c
1 − C4e−c .
Since c → ∞, we see that this probability goes to zero asymptotically, and thus the graph will be
(T + 1)-robust asymptotically almost surely.
Note that the filtering threshold distribution in the above theorem is allowed to have support
that extends past the minimum degree r of the network. The key is to ensure that the probability
that a node gets assigned a threshold above its degree goes to zero. The above result characterizes
a condition on the distribution (given by (3)) to ensure this. This result generalizes the result on
ER graphs given in [Zhang et al., 2015], which focused on the case of all nodes having the same
threshold (below the minimum degree of the graph). A byproduct of the above proof is that all
subsets of vertices of size up to αn are guaranteed to be (T + 1)-reachable a.a.s., where α is such
that ln ln n = o((1 − α) ln n). For instance, α = 1 − 1
(ln n)ǫ for ǫ ∈ (0, 1) satisfies this condition.
5 Opinion Dynamics in Random Graphs with Arbitrary Commu-
nity Structure
In the previous section, we considered local-filtering based opinion dynamics in Erdos-R´enyi graphs,
where every possible edge appears independently with the same probability. In this section, we
extend our discussion to random graphs that consist of a set of communities (or subnetworks),
where only the edges between communities appear independently with a certain probability p. We
will remain agnostic about the intra-community topologies.
Definition 6. A random interdependent network consists of k subnetworks Gi = {Vi, Ei},
i = 1, . . . , k, along with a set of inter-network edges
{Vi × Vj} .
EI ⊆ [i6=j
Specifically, EI is obtained by placing each edge in Si6=j {Vi × Vj} independently with a probability
p (which can be a function of the number of nodes in the network).
In the rest of this section, we will assume that Vi = n for i = 1, . . . , k, so that the random
interdependent network has nk nodes in total. Note that an Erdos-R´enyi graph on nk nodes is a
special case of the above definition, where each edge within each subnetwork is also placed with
probability p. When the subnetwork edges are placed independently with a probability ¯p that is
different from p, such networks are known as stochastic block models [Decelle et al., 2011, Lelarge
et al., 2015]. We will make no such assumptions on the intra-network topology here, however.
Recent work has studied various structural properties of random interdependent networks, in-
cluding algebraic connectivity and robustness [Shahrivar et al., 2015]. Here, as in the previous
section, we consider the case where each node in the network has a personal opinion threshold,
drawn from a distribution q (i.e., q(t) is the probability of a given node having threshold t). We
have the following result.
Theorem 3. Fix k ∈ Z≥2, and consider a random interdependent network on nk nodes where each
inter-network edge is placed independently with probability
p(n) =
ln n + (r − 1) ln ln n + c(n)
(k − 1)n
,
(6)
where c(n) → ∞ and c(n) = o(ln ln n). Suppose the opinion threshold distribution has support [0, ¯r]
for some ¯r ∈ N and satisfies
for t ≥ r. Then the random interdependent network with opinion thresholds drawn from q(·) will
facilitate consensus under the local-filtering opinion dynamics a.a.s.
q(t) = O(cid:18)
1
(ln n)t−r+1(cid:19)
Proof. The proof follows in a similar manner to that for Erdos-R´enyi graphs, although additional
care must be taken to handle the fact that we are only placing edges between the subnetworks.
To this end, consider a set S ⊂ ∪k
i=1Vi consisting of m nodes, where 1 ≤ m ≤ αnk (for some
function α that goes to 1). Denote S ∩ Vi = mi. Consider some node v ∈ S, and suppose
v ∈ Vi. There are n(k − 1) − (m − mi) nodes that are not in set S or Vi for v to connect to. Thus,
the probability that v has fewer than t + 1 neighbors outside S ∪ Vi (where t is drawn from the
distribution q(·)) is given by
q(t)
¯r
Xt=0
This is upper bounded by
t
Xj=0(cid:18)n(k − 1) − (m − mi)
j
(cid:19)pj(1 − p)n(k−1)−(m−mi)−j .
q(t)
¯r
Xt=0
t
Xj=0(cid:18)n(k − 1)
j
(cid:19)pj(1 − p)n(k−1)−m−j .
Note that this is now in the same form as the probability of a given node having fewer than t + 1
neighbors outside its set in ER graphs (given by (4)) with the only exception being that n in (4) is
replaced by n(k − 1). Thus, the rest of the proof follows in the same manner as that proof (with the
substitution of n by n(k − 1)), and thus the result for the random interdependent network follows
by replacing n by n(k − 1) in the probability p(n) for ER graphs.
Comparing the edge probability for the random interdependent network in (6) to that for the
ER network in (2), we see that the price paid for being agnostic about the subnetwork topology is
k
k−1 in the edge formation probabilities in the former case (after scaling
an increase by a factor of
(2) to pertain to an ER graph on nk nodes).
6 Opinion Dynamics in Random Graphs with Heterogeneous De-
gree Distributions
The graphs that we considered in the previous two sections were homogeneous, in the sense that
each of the randomly chosen edges was placed with the same probability p (although the random
interdependent networks were allowed to have arbitrary topologies inside the subnetworks). In this
section, we discuss the extension of the results in the previous sections to random graphs with
potentially different probabilities on each edge (e.g., as in the expected degree random graph
model [Chung and Lu, 2006]).
Theorem 4. Consider the undirected random graph where each edge (vi, vj) is present indepen-
dently with probability pij(n). Suppose that
pij(n) ≥
ln n + (r − 1) ln ln n + c(n)
n
for all vi, vj ∈ V (with vi 6= vj) and that c(n) = o(ln ln n) with c(n) → ∞. Suppose the opinion
threshold distribution has support [0, ¯r] for some ¯r ∈ N and satisfies
q(t) = O(cid:18)
1
(ln n)t−r+1(cid:19)
for t ≥ r. Then the resulting network facilitates consensus under the local-filtering opinion dynamics
a.a.s.
Proof. The proof follows a standard coupling argument, relying on the monotonicity of the (T +
1)-robustness property (i.e., adding additional edges to a (T + 1)-robust graph maintains that
property).
Let p(n) be as in (2), and note that pij(n) ≥ p(n) for all vi, vj ∈ V. We create two networks
G1 and G2 as follows. For each edge (vi, vj), we flip a coin that lands heads with probability p(n).
If the coin lands heads, we place the edge (vi, vj) in both G1 and G2. If the coin lands tails, we do
not place the edge in G1. We then flip another coin that lands heads with probability pij(n)−p(n)
.
If this coin lands heads, we place the edge in graph G2, and do not place the edge otherwise. We
do this for all edges in the two graphs.
1−p(n)
It is easy to see that graph G1 is an Erdos-R´enyi graph with edge probability p(n), and that
each edge in graph G2 appears with probability pij(n). Furthermore, G1 is a subgraph of G2. Draw
the filtering thresholds for graph G1 from the distribution q(t), and let the filtering thresholds for
graph G2 be the same as the ones in G1. By Theorem 2, graph G1 will be (T + 1)-robust a.a.s., and
thus graph G2 will be (T + 1)-robust a.a.s. This concludes the proof.
7 Summary and Future Work
We studied a class of opinion dynamics where each node ignores the most extreme opinions in
its neighborhood at each time-step. We allowed each node to have a personal threshold for the
number of neighbors that it ignores, and provided necessary and sufficient conditions on the network
topology that guarantee consensus under such dynamics. We then studied random graph models
where each node has a random threshold that is drawn from a certain distribution. We characterized
properties of that distribution (in terms of the edge probabilities of the underlying network) that led
to the network satisfying the required conditions for consensus. Our analysis encompassed classical
Erdos-R´enyi networks, as well as networks with arbitrary community structure and networks with
heterogeneous edge probabilities.
There are a variety of interesting directions for future research, including a study of other
classes of random graphs (and threshold distributions), along with tightness characterizations of
the conditions that we have provided on the threshold distribution.
References
Daron Acemoglu, Giacomo Como, Fabio Fagnani, and Asuman Ozdaglar. Opinion fluctuations and disagreement in
social networks. Mathematics of Operations Research, 38(1):1 -- 27, 2013.
Fr´ed´eric Amblard and Guillaume Deffuant. The role of network topology on extremism propagation with the relative
agreement opinion dynamics. Physica A: Statistical Mechanics and its Applications, 343:725 -- 738, 2004.
V. D. Blondel, J. M. Hendrickx, and J. N. Tsitsiklis. On Krause's multi-agent consensus model with state-dependent
connectivity. IEEE Transactions on Automatic Control, 54(11):2586 -- 2597, November 2009.
Fan RK Chung and Linyuan Lu. Complex graphs and networks, volume 107. American mathematical society
Providence, 2006.
Aurelien Decelle, Florent Krzakala, Cristopher Moore, and Lenka Zdeborov´a. Asymptotic analysis of the stochastic
block model for modular networks and its algorithmic applications. Physical Review E, 84(6):066106, 2011.
M. H. DeGroot. Reaching a consensus. Journal of the American Statistical Association, 69(345):118 -- 121, Mar. 1974.
P. Erdos and A. Renyi. On the strength of connectedness of a random graph. Acta Math. Acad. Sci. Hungar., 12:
261 -- 267, 1961.
Seyed Rasoul Etesami, Tamer Basar, Angelia Nedic, and Behrouz Touri. Termination time of multidimensional
Hegselmann-Krause opinion dynamics. In American Control Conference (ACC), pages 1255 -- 1260, 2013.
Noah E Friedkin. The problem of social control and coordination of complex systems in sociology: A look at the
community cleavage problem. IEEE Control Systems, 35(3):40 -- 51, 2015.
Malcolm Gladwell. The tipping point: How little things can make a big difference. Little, Brown, 2006.
J. Goldenberg, B. Libai, and E. Muller. Talk of the network: A complex systems look at the underlying process of
word-of-mouth. Marketing Letters, 12(3):211 -- 223, 2001.
M. Granovetter. Threshold models of collective behavior. American Journal of Sociology, 83(6):1420 -- 1443, 1978.
Rainer Hegselmann and Ulrich Krause. Opinion dynamics and bounded confidence: models, analysis and simulation.
Journal of Artificial Societies and Social Simulation, 5(3):1 -- 24, 2002.
A. Jadbabaie, J. Lin, and A. S. Morse. Coordination of groups of mobile autonomous agents using nearest neighbor
rules. IEEE Transactions on Automatic Control, 48(6):988 -- 1001, June 2003.
H. J. LeBlanc, H. Zhang, X. Koutsoukos, and S. Sundaram. Resilient asymptotic consensus in robust networks. IEEE
Journal on Selected Areas in Communications, 31(4):766 -- 781, April 2013.
M. Lelarge, L. Massoulie, and Jiaming Xu. Reconstruction in the labelled stochastic block model. IEEE Transactions
on Network Science and Engineering, 2(4):152 -- 163, Oct 2015.
Naoki Masuda. Opinion control in complex networks. New Journal of Physics, 17(3):033031, 2015.
Luc Moreau. Stability of multiagent systems with time-dependent communication links.
IEEE Transactions on
Automatic Control, 50(2):169 -- 181, Feb. 2005.
Stephen Morris. Contagion. The Review of Economic Studies, 67(1):57 -- 78, 2000.
Mohammad Pirani and Shreyas Sundaram. On the smallest eigenvalue of grounded Laplacian matrices.
IEEE
Transactions on Automatic Control, 61(2):509 -- 514, 2016.
W. Ren and R. W. Beard. Consensus seeking in multiagent systems under dynamically changing interation topologies.
IEEE Transactions on Automatic Control, 50(5):655 -- 661, May 2005.
Thomas C Schelling. Micromotives and macrobehavior. WW Norton & Company, 2006.
Ebrahim Moradi Shahrivar, Mohammad Pirani, and Shreyas Sundaram. Robustness and algebraic connectivity
In Proceedings of the 5th IFAC Workshop on Estimation and Control in
of random interdependent networks.
Networked Systems, volume 48, pages 252 -- 257, 2015.
Vishal Sood and Sidney Redner. Voter model on heterogeneous graphs. Physical Review Letters, 94(17):178701, 2005.
S. Sundaram and C. N. Hadjicostis. Distributed function calculation via linear iterative strategies in the presence of
malicious agents. IEEE Transactions on Automatic Control, 56(7):1495 -- 1508, 2011.
N. Vaidya, L. Tseng, and G. Liang. Iterative approximate Byzantine consensus in arbitrary directed graphs. In ACM
Symposium on Principles of Distributed Computing, pages 365 -- 374, 2012.
Duncan J Watts. A simple model of global cascades on random networks. Proceedings of the National Academy of
Sciences, 99(9):5766 -- 5771, 2002.
G´erard Weisbuch, Guillaume Deffuant, Fr´ed´eric Amblard, and Jean-Pierre Nadal. Meet, discuss, and segregate!
Complexity, 7(3):55 -- 63, 2002.
Ercan Yildiz, Asuman Ozdaglar, Daron Acemoglu, Amin Saberi, and Anna Scaglione. Binary opinion dynamics with
stubborn agents. ACM Transactions on Economics and Computation, 1(4):19, 2013.
Haotian Zhang, Elaheh Fata, and Shreyas Sundaram. A notion of robustness in complex networks. IEEE Transactions
on Control of Network Systems, 2(3):310 -- 320, 2015.
|
1806.00127 | 1 | 1806 | 2018-05-31T23:02:50 | Damping Effect on PageRank Distribution | [
"cs.SI"
] | This work extends the personalized PageRank model invented by Brin and Page to a family of PageRank models with various damping schemes. The goal with increased model variety is to capture or recognize a larger number of types of network activities, phenomena and propagation patterns. The response in PageRank distribution to variation in damping mechanism is then characterized analytically, and further estimated quantitatively on 6 large real-world link graphs. The study leads to new observation and empirical findings. It is found that the difference in the pattern of PageRank vector responding to parameter variation by each model among the 6 graphs is relatively smaller than the difference among 3 particular models used in the study on each of the graphs. This suggests the utility of model variety for differentiating network activities and propagation patterns. The quantitative analysis of the damping mechanisms over multiple damping models and parameters is facilitated by a highly efficient algorithm, which calculates all PageRank vectors at once via a commonly shared, spectrally invariant subspace. The spectral space is found to be of low dimension for each of the real-world graphs. | cs.SI | cs | Damping Effect on PageRank Distribution
Tiancheng Liu, Yuchen Qian, Xi Chen, and Xiaobai Sun
Department of Computer Science, Duke University, Durham, NC 27708, USA
8
1
0
2
y
a
M
1
3
]
I
S
.
s
c
[
1
v
7
2
1
0
0
.
6
0
8
1
:
v
i
X
r
a
Abstract-This work extends the personalized PageRank model
invented by Brin and Page to a family of PageRank models
with various damping schemes. The goal with increased model
variety is to capture or recognize a larger number of types
of network activities, phenomenons and propagation patterns.
The response in PageRank distribution to variation in damp-
ing mechanism is then characterized analytically, and further
estimated quantitatively on 6 large real-world link graphs. The
study leads to new observation and empirical findings. It is found
that the difference in the pattern of PageRank vector responding
to parameter variation by each model among the 6 graphs is
relatively smaller than the difference among 3 particular models
used in the study on each of the graphs. This suggests the
utility of model variety for differentiating network activities and
propagation patterns. The quantitative analysis of the damping
mechanisms over multiple damping models and parameters is
facilitated by a highly efficient algorithm, which calculates all
PageRank vectors at once via a commonly shared, spectrally
invariant subspace. The spectral space is found to be of low
dimension for each of the real-world graphs.
I. INTRODUCTION
Personalized PageRank, invented by Brin and Page [1], [2],
revolutionized the way we model any particular type of activ-
ities on a large information network. It is also intended to be
used as a mechanism to counteract malicious manipulation of
the network [1]–[3]. PageRank has underlain Google's search
architecture, algorithms, adaptation strategies and ranked page
listing upon query. It has influenced the development of other
search engines and recommendation systems, such as topic-
sensitive PageRank [4]. Its impact reaches far beyond digital
and social networks. For example, GeneRank is used for
generating prioritized gene lists [5], [6]. The seminal paper [1]
itself is directly cited more than ten thousands times as of
today. As surveyed in [7], [8], a lot of efforts were made to
accelerate the calculation of personalized PageRank vectors, in
part or in whole [9], [10]. Certain investigation were carried
out to assess the variation in PageRank vector in response
to varying damping parameter [11], [12]. Most efforts on
PageRank study, however, are ad hoc to the Brin-Page model.
Chung made a departure by introducing a diffusion-based
PageRank model and applied it to graph cuts [13], [14].
In this paper we follow Brin and Page in the modeling
aspect that warrants more attention as the variety of networks
and activities on the networks increases incessantly. We extend
the model scope to capture more network activities in a
probabilistic sense. We study the damping effect on PageRank
distribution. We consider the holistic distribution because it
serves as the statistical reference for inferring conditional
page ranking upon query. Our study has three intellectual
merits with practical impact. (1) A family of damping models,
which includes and connects the Brin-Page model and Chung's
model. The family admits more probabilistic descriptions of
network activities. (2) A unified analysis of damping effect on
personalized PageRank distribution, with parameter variation
in each model and comparison across models. The analysis
provides a new insight into the solution space and solution
methods. (3) A highly efficient method for calculating the
solutions to all models under consideration at once, particular
to a network and a personalized vector. Our quantitative
analysis of 6 real-world network graphs leads to new findings
about the models and networks under study, which we present
and discuss in Sections III and V. Our modeling and analysis
methods can be potentially used for recognizing and estimating
activity or propagation patterns on a network, provided with
monitored data.
II. PAGERANK MODELS
We first review briefly two precursor models and then
introduce a family of PageRank models.
A. Brin-Page model
Brin and Page describe a network of webpages as a link
graph, which is represented by a stochastic matrix 𝑃 [1].
We adopt the convention that 𝑃 is stochastic columnwise.
Every webpage is a node with (outgoing) links, i.e., edges, to
some other webpages and with incoming edges or backlinks as
citations to the page. If page 𝑗 has 𝑛𝑗 > 0 outgoing links, then
in column 𝑗 of 𝑃 , 𝑃𝑖,𝑗 = 1/𝑛𝑗 if page 𝑗 has a link to page 𝑖;
𝑃𝑖,𝑗 = 0, otherwise. In row 𝑖 of 𝑃 , every nonzero element 𝑃𝑖,𝑗
corresponds to a backlink from 𝑗 to 𝑖. In the Brin-Page model,
the web user behavior is described as a random walk on a
personalized Markov chain (i.e., a discrete-time Markov chain)
associated with the following probability transition matrix
𝑀𝛼(𝑣) = 𝛼𝑃 + (1 − 𝛼)𝑣𝑒T, 𝛼 ∈ (0, 1),
(1)
where 𝑣 ≥ 0 is a personalized or customized distribu-
tion/vector, 𝑒 denotes the vector with all elements equal to
1, and the damping factor 𝛼 describes a Bernoulli decision
process. At each step, with probability 𝛼, the web user follows
an outlink; or with probability (1 − 𝛼), the user jumps to
any page by the personalized distribution 𝑣. The personalized
transportation term is innovative. It customizes the Markov
chain with respect to a particular type of relevance. In this
paper we assume that
the personalized vector 𝑣 is given
and fixed, and focus on investigating the damping effect. In
particular, with Brin-Page model, we focus on the role of 𝛼.
The notation for the Markov chain may thus be simplified to
𝑀𝛼, or 𝑀 when 𝛼 is clear from the context.
𝑒T𝑣 = 1,
∞∑︁
Page ranking upon a search query depends on the stationary
PageRank distribution, denoted by 𝑥 = 𝑥(𝛼), of the Markov
chain:
𝑀𝛼 𝑥 = 𝑥,
𝑒T𝑥 = 1.
(2)
Arasu et al [15] recast the eigenvector equation (2) to a linear
system to solve for 𝑥,
(𝐼 − 𝛼𝑃 )𝑥 = (1 − 𝛼)𝑣,
(3)
where 𝐼 is the identity matrix. Because 𝛼‖𝑃‖1 < 1, the
solution can be expressed via the Neumann series for the
inverse of (𝐼 − 𝛼𝑃 ),
𝑥(𝛼) = (1 − 𝛼)
𝛼𝑘𝑃 𝑘𝑣.
(4)
𝑘=0
The weights (1− 𝛼)𝛼𝑘 decrease by the factor 𝛼 from one step
to the next. In [1], Brin and Page set 𝛼 to 0.85.
In (4), the solution to Brin-Page model with 𝛼 ∈ (0, 1) is
not the stationary distribution of network 𝑃 . It is analyzed
in terms of steps on 𝑃 . Term 𝑘 represents the probabilistic
accumulation of the Bernoulli decision process at each step
by (1) to step 𝑘, 𝑘 ≥ 0. Every step has its print in distribution
𝑥(𝛼).
B. Chung's model
Chung introduced a PageRank model [13] in the form of a
heat or diffusion equation, with 𝑣 as the initial distribution,
𝜕𝑥
𝜕𝛽
= −(𝐼 − 𝑃 )𝑥,
𝑥(0) = 𝑣,
(5)
where (𝐼−𝑃 ) is the Laplacian of the link graph, and we use 𝛽
to denote the time variable. From the viewpoint of probabilistic
theory, model (5) is underlined by the Kolmogorov's backward
equation system for a continuous-time Markov chain with
−(𝐼 − 𝑃 ) as the transition rate matrix and with the identity
matrix 𝐼 as the initial transition matrix. The solution to (5) is
𝑥(𝛽) = 𝑒−𝛽(𝐼−𝑃 )𝑣 = 𝑒−𝛽
𝛽𝑘
𝑘!
𝑃 𝑘𝑣.
(6)
C. A model family
𝑘=0
We introduce a family of PageRank models. Each member
model is characterized by a scalar damping variable 𝜌 and
a discrete probability mass function (pmf) 𝑤(𝜌) = {𝑤𝑘 =
𝑤𝑘(𝜌), 𝑘 ∈ N𝑤}. The support N𝑤 ⊂ N may be finite or
infinite. There are a few equivalent expressions to describe our
models. We start by defining the model with a kernel function
𝑓 (𝜆, 𝜌),
𝑓 (𝜆, 𝜌) =
𝑤𝑘(𝜌) 𝜆𝑘,
𝜆 ≤ 1.
(7)
∑︁
𝑘∈𝑁𝑤
The solution specific to network graph 𝑃 and personalized
vector 𝑣 is,
∞∑︁
)︃
(︃∑︁
𝑘∈𝑁𝑤
𝑥𝑓 (𝜌) = 𝑓 (𝑃 )𝑣 =
𝑤𝑘(𝜌) 𝑃 𝑘
𝑣.
(8)
The matrix function 𝑓 (𝑃 ) is stochastic. The rank distribution
vector 𝑥𝑓 is the superposition of step terms with probabilis-
tic weights 𝑤𝑘. The step term 𝑘 describes the probabilistic
propagation of 𝑣 at step 𝑘. For a specific case, the damping
variable may have a designated label, with a specific range, and
the pmf may have a specific support and additional parameters.
For convenience, we assume N as the support. Over the infinite
support, the damping weights must decay after certain number
of steps and vanish as 𝑘 goes to infinity. In theory, every
discrete pmf can be used as a model kernel in (8). In practice,
each describes a particular type of activity or propagation.
The family includes Brin-Page model and Chung's model.
For the former, the damping variable is denoted by 𝛼, the
damping weights (1 − 𝛼)𝛼𝑘, 𝑘 ≥ 0, follow the geometric
distribution with the expected value 𝛼(1 − 𝛼)−1. The kernel
function is (1− 𝛼)(1− 𝛼𝜆)−1. For Chung's model, we denote
the damping variable by 𝛽, 𝛽 > 0. The damping weights
𝑒−𝛽𝛽𝑘/𝑘!, 𝑘 ≥ 0, follow the Poisson distribution with the
expected value 𝛽. The model's kernel function is 𝑒−𝛽(1−𝜆).
We describe a few other models, among many, in the family.
In fact, the precursor models are two special cases of the
model associated with the Conway-Maxwell-Poisson (CMP)
distribution, which has an additional parameter 𝜈 to the pmf,
𝑤𝑘(𝜌, 𝜈) =
𝜌𝑘
(𝑘!)𝜈 𝑍
,
𝜈 > 0,
where 𝑍 is the normalization scalar, and 𝜈 is the decay rate
parameter. The case with 𝜈 = 0 is the geometric distribution;
the case with 𝜈 = 1 is the Poisson distribution. If the value of
𝜌 is fixed, the weights decay faster with a larger value of 𝜈.
The negative binomial distribution, or the Pascal distribution,
also includes the geometric distribution as a special case. It
includes other cases that render damping weights with slower
decay rates.
In the rest of the paper, for the purpose of including and
illustrating new models, we use the model associated with the
logarithmic distribution, for 𝛾 ∈ (0, 1),
(𝛾𝜆)𝑘
−1
∞∑︁
ln(1 − 𝛾𝜆)
ln(1 − 𝛾)
.
=
(9)
𝑓 (𝜆, 𝛾) =
ln(1 − 𝛾)
𝑘
𝑘=1
The weights decrease slightly faster than the geometrically
distributed ones, but not in the CMP distribution class.
We now present the system of linear equations with 𝑥(𝜌)
in (8) as the solution,
𝐴(𝑃 )𝑥 = 𝑣, 𝐴(𝑃 ) = 𝑓−1(𝑃 ).
(10)
The matrix 𝐴 is an 𝑀 matrix. In particular, 𝐴 = (1−𝛼)−1(𝐼−
𝛼𝑃 ) for Brin-Page model, 𝐴 = 𝑒𝛽(𝐼−𝑃 ) for Chung's model
and 𝐴 = ln(1 − 𝛾) ln
−1(𝐼 − 𝛾𝑃 ) for the log-𝛾 model (9).
The algebraic model expression (10) will be used next for the
model expression in a differential equation.
III. RESPONSE TO VARIATION IN DAMPING
We provide a unified analysis of the response in PageRank
distribution to the variation in the damping parameter value
as well as to the change, or connection, from one model to
another.
A. Intra-model damping variation
By (8), we obtain the trajectory of the PageRank vector
𝑥(𝜌) with the change in the damping variable 𝜌,
𝑑𝑥(𝜌)
𝜕
𝜕𝜌
(11)
𝑥(𝜌) =
=
𝑓 (𝑃 )𝑣 = 𝑄(𝑃 ) 𝑥(𝜌),
𝑑𝜌
𝜕𝜌 𝑓 (𝑃 )𝑓−1(𝑃 ) by (10), which we may
where 𝑄(𝑃 ) = 𝜕
refer to as the 𝜌-transition matrix. Equation (11) generalizes
Chung's diffusion model (5), in which the 𝛽-transition matrix
𝑄 = −(𝐼 − 𝑃 ) is independent of 𝛽. For the Brin-Page model
with damping variable 𝛼,
𝑄(𝛼) =[︀𝑃 (𝐼 − 𝛼𝑃 )−1 − (1 − 𝛼)−1𝐼]︀.
(12)
For the log-𝛾 model (9),
𝑄(𝛾) =
(1 − 𝛾)−1
ln(1 − 𝛾)
𝐼 − 𝑃 (𝐼 − 𝛾𝑃 )−1(ln(𝐼 − 𝛾𝑃 ))−1.
(13)
For each model, 𝑒T𝑄 = 0.
In addition to the element-wise response in the rank vector,
we would also like to have an aggregated measure of the
response to variation in 𝜌. Let 𝑥(𝜌𝑜) be a reference PageR-
ank vector. We may use Kullback-Leibler divergence [16] to
measure the discrepancy of 𝑥(𝜌) from 𝑥(𝜌𝑜),
𝐾𝐿(𝑥(𝜌), 𝑥(𝜌𝑜)) =
𝑥𝑖(𝜌) log
𝑥𝑖(𝜌)
𝑥𝑖(𝜌𝑜)
.
(14)
∑︁
𝑖
When 𝜌 = 𝜌𝑜, 𝐾𝐿(𝑥(𝜌), 𝑥(𝜌𝑜)) = 0. We have the rate of
change in KL divergence with the variation in 𝜌,
𝐾𝐿(𝑥(𝜌), 𝑥(𝜌𝑜)) = 𝑥(𝜌)T(log 𝑥(𝜌) − log 𝑥(𝜌𝑜) + 𝑒)
𝑑
𝑑𝜌
(15)
We will describe in Section IV efficient algorithms for calcu-
lating the vectors and measures above.
B. Inter-model correspondence
Each model has its own damping form and parameter. The
expected value of the step weight distribution is,
𝜇(𝑤(𝜌)) =
𝑘 · 𝑤𝑘(𝜌).
(16)
∑︁
𝑘∈N𝑤
We may explain this as the expected value of walking steps.
We establish the point of correspondence between models by
their expected values. That is, for any two models, we set their
expected values equal to each other. Without loss of generality,
we let the expected values for the Brin-Page model serve as the
reference. In particular, we have the correspondence equalities
(︂ 𝛾
)︂ −1
1 − 𝛾
ln(1 − 𝛾)
(17)
𝛼
1 − 𝛼
= 𝛽,
𝛼
1 − 𝛼
=
for Chung's model and for the log-𝛾 model, respectively.
We will show the comparisons in PageRank vectors at such
correspondence points in Section V.
IV. EFFICIENT ALGORITHMS FOR BATCH RANKING
We introduce novel algorithms for efficient quantitative
analysis of damping effect on PageRank distribution. Provided
with a network graph 𝑃 and a personalized distribution vector
𝑣, the algorithms can be used in one batch of computation
across multiple models as well as over a range of damping
parameter value per model.
A. Reduction to irreducible subnetworks
Information networks in real world applications are not
necessarily irreducible and aperiodic as assumed by many
existing iterative solutions for guaranteed convergence. To
meet such convergence conditions, some heuristics were used
to perturb or twist
the network structure with artificially
introduced links [17], [18]. Instead, we decompose the net-
work into strongly connected sub-networks by applying the
Dulmage-Mendelsohn (DM) decomposition algorithm [19] to
the Laplacian matrix 𝐼 − 𝑃 . The DM algorithm is highly
efficient when diagonal elements are non-zero. It renders the
matrix in block upper triangular form. See Figure 1 for the
Google link graph released by Google in 2002 [20]. Each
diagonal block 𝐵𝑖𝑖 corresponds to a subnetwork. A square
diagonal block corresponds to an irreducible subnetwork. A
non-zero off-diagonal block 𝐵𝑖𝑗 in the upper part, 𝑖 < 𝑗,
represents the links from cluster 𝑗 to cluster 𝑖. The top block is
associated with a sink cluster without outgoing links to other
cluster; the bottom block is associated with a source cluster
without incoming edges from other clusters. The solution for
the entire network can be obtained by the solutions to the
subnetworks and successive back substitution.
(a) original link graph
(b) link graph after DM permutation
Fig. 1: The 1:1000 sparsity map of adjacency matrix of Google link graph
[20] with 875,713 page nodes in (a) the provided ordering and (b) the ordering
rendered by the DM decomposition, depicted by imagesc in matlab. Each
point shows the number of non-zeros, in log scale, in the corresponding
1000×1000 block. The subnetwork in the middle of (b) is strongly connected
with 434,818 nodes.
B. Cascade of iterations
Several iterative methods exist for computing the PageRank
vector by the Brin-Page model. They include the power
method by the eigenvector equation (2), and the Jacobi, Gauss-
Seidel, and SOR methods by equation (3). There are various
acceleration techniques used for calculating the PageRank
vector, or a small part of the vector, or even a single pair
of nodes between the personalized vector and the PageRank
vector [10], [21]–[23]. For the Brin-Page model, the iterative
10020030040050060070080010020030040050060070080000.511.510020030040050060070080010020030040050060070080000.511.522.533.5methods converge slower as 𝛼 increases and gets closer to 1.
We developed a cascading initialization scheme. The solution
to the model with 𝛼 is used as the initial guess to the iteration
for the solution to the model with 𝛼 + 𝛿𝛼, 𝛿𝛼 > 0. Although
it has accelerated the computation with successively increased
𝛼 values, this technique is limited to sequential computation
and ad hoc to the Brin-Page model. We introduce next a novel
algorithm without these limitations.
C. Shared invariant Krylov space
Our new algorithm for batch calculation of PageRank vec-
tors with multiple models and parameter values is based on
the very fact that the solutions to the models in Section II all
reside in the same Krylov space,
.
(18)
i.e.,
𝒦(𝑃, 𝑣) = {𝑣, 𝑃 𝑣, 𝑃 2𝑣,··· , 𝑃 𝑘𝑣,···},
𝑣 ≥ 0
𝑒T𝑣 = 1
The space has the property 𝑃𝒦(𝑃, 𝑣) = 𝒦(𝑃, 𝑣),
it
is a spectrally invariant subspace. In PageRank terminology,
𝒦(𝑃, 𝑣) is a personalized invariant subspace. We have the
remarkable fact about the model family in Section II.
Theorem 1. Any model solution (8), at any particular damp-
ing parameter value, and its trajectory (11) are functions in
the Krylov space 𝒦(𝑃, 𝑣).
Theorem 2. Let 𝑚 = dimension(𝒦). Denote by 𝐾 the matrix
composed of the Krylov vectors. Let 𝐾 = 𝑄𝑅 be the QR
factorization of 𝐾. Then, 𝑄𝑒1 = 𝑣 and 𝑃 𝑄 = 𝑄𝐻, where
𝐻 is an 𝑚 × 𝑚 upper Hessenberg matrix, and 𝑒1 is the first
column of the identity matrix 𝐼.
A few remarks. Matrix 𝐻 in Theorem 2 is the representation
of matrix 𝑃 under basis 𝑄 in the Krylov space. In numerical
computation, we use a rank-revealing version of the QR
factorization with 𝑄𝑒1 = 𝑣. In theory, the dimension 𝑚 is
equal to the number of spectrally invariant components of 𝑃
that present in 𝑣. In the extreme case, 𝑚 = 1 when 𝑣 is the
Perron vector of 𝑃 . In general, by the condition 𝑒T𝑣 = 1,
𝑣 is not deficient in Perror component. In our study on real-
world graphs, which we will detail shortly in Section V, the
numerical dimension is low, matrix 𝐻 is therefore small. We
may view this as a manifest of the smallness of the real-world
graphs under study. We exploit these theoretical and practical
facts.
Corollary 3. For any function 𝑔 in the Krylov space (18), we
have 𝑔(𝑃 )𝑣 = 𝑄𝑔(𝐻)𝑒1.
When dimension 𝑚 is modest, we translate by Corollary
3 the calculation of 𝑥𝑔 = 𝑔(𝑃 )𝑣 with 𝑁 × 𝑁 matrix 𝑃 on
vectors to the calculation of ^𝑥𝑔 = 𝑔(𝐻)𝑒1 with 𝑚× 𝑚 matrix
𝐻 on vectors, followed by a matrix-vector product 𝑄^𝑥𝑔. The
vector ^𝑥𝑔 is the spectral representation of 𝑥𝑔 in the Krylov
space. In the model family, solutions 𝑥𝑓 (8) differ from one
to another in their spectral representations ^𝑥𝑓 , they share the
same basis matrix 𝑄 in the ambient network space.
Our algorithm consists of the following major steps. Let
𝒢 = {𝑔} be a set of functions under study. (1) Calculu-
ate Krylov vectors to form matrix 𝐾 in Theorem 2, apply
rank-revealing 𝑄𝑅 factorization to 𝐾, and find numerical
dimension 𝑚; 1 (2) Construct the matrix 𝐻, by Theorem 2,
from 𝑅 and the permutation matrix Π rendered by the rank-
revealing 𝑄𝑅; (3) Calculate ^𝑥𝑓 = 𝑔(𝐻)𝑒1 for all functions
in 𝒢; (4) Transform ^𝑥𝑓 from the Krylov-spectral space to the
ambient network space by the same basis matrix 𝑄, based on
Corollary 3.
V. EXPERIMENTS ON REAL-WORLD LINK GRAPHS
We show in numerical values how PageRank vector re-
sponses to variation in damping variable with each model and
across models, on 6 real-world link graphs.
A. Experiment setup: data and models
The 6 link graphs we used for our experiments are publicly
available at the Koblenz Network Collection [24]. The basic
information of the graphs is summarized in Table 1, where
max(𝑑𝑜𝑢𝑡) is the maximum out-degree (the number of cita-
tions) of graph nodes, max(𝑑𝑖𝑛) is the maximum in-degree
(the number of backlinks), 𝜇(𝑑𝑜𝑢𝑡) = 𝜇(𝑑𝑖𝑛) is the average
out-degree, which equals to the average in-degree, and LSCC
stands for the largest strongly connected component(s) of the
graph. The Google graph of today is reportedly containing
hundreds of trillions of nodes, substantially larger than the
snapshot size used here.
TABLE 1: Dataset Description
Total #nodes
#nodes in LSCC
[max(𝑑𝑜𝑢𝑡), 𝜇(𝑑𝑜𝑢𝑡), max(𝑑𝑖𝑛)]
Google [20]
Wikilink [24]
DBpedia [25]
Twitter(www) [26]
Twitter(mpi) [27]
friendster [28]
875,713
12,150,976
18,268,992
41,652,230
52,579,682
68,349,466
434,818
7,283,915
3,796,073
33,479,734
40,012,384
48,928,140
[4209, 8.86, 382]
[7527, 50.48, 920207]
[8104, 26.76, 414924]
[2936232, 42.65, 768552]
[778191, 47.57, 3438929]
[3124, 32.76, 3124]
For variation analysis of each graph in Table 1, the as-
sociated link matrix 𝑃 is well specified. We use the same
personalized or customized distribution vector 𝑣, which we
get by drawing elements from standard Gaussian distribution
𝒩 (0, 1), followed by normalization 𝑣T𝑒 = 1. We report
variation analysis results with three particular models : Brin-
Page model (3) with damping variable 𝛼, Chung's model (5)
with variable 𝛽, and the log-𝛾 model (9). The last is used as
an illustration of new models in the family (8).
B. Variation in PageRank vector
In order to show the quantitative response in PageRank vec-
tor 𝑥𝑓 over 𝑁 nodes with the variation in damping variable 𝜌,
we display the histogram of 𝑁·𝑥𝑓 (𝜌) for model 𝑓 at parameter
value 𝜌. In Figure 2 we show the histograms associated with
1These substeps are integrated in pratical computation in order to deter-
mine quickly a sufficient number of Krylov vectors.
(a) 𝑥(𝜌) of Google link graph
(b) 𝑥(𝜌) of Twitter(www) link graph
Fig. 2: Inter-model comparison of histograms of 𝑁 · 𝑥𝑓 (𝜌) among the
three models with corresponding parameter values 𝛼𝑜, 𝛽𝑜 and 𝛾𝑜 so that the
expected value of walking steps for each model is 𝛼𝑜/(1 − 𝛼𝑜) = 5. 6 with
𝛼𝑜 = 0.85, see the model correspondence equalities (17). (a) comparison on
Google link graph; (b) comparison on Twitter(www) link graph.
three models on Google network. The parameter for Brin-
Page model is set to the value 𝛼𝑜 = 0.85. The parameter
for the other two models are set by (17). We observe that
the histogram with Brin-Page model has higher and narrower
peaks than Chung's model. The histogram of log-𝛾 model is in
between. This is expected by the relationships in the damping
weights among the three models, as discussed in Section III-B.
(a) Brin-Page model
(b) log-𝛾 model
(c) Chung's model
(d) Brin-Page model
(e) log-𝛾 model
(f) Chung's model
Fig. 4: Comparison in histogram of 𝑁 · 𝑥𝑓 (𝜌) on the Twitter graph over a
range of dampling value, in the same settings as in Figure 3.
tion become less centralized. Log-𝛾 model, specifically, is less
sensitive to 𝛾(𝛼) range with 𝛼 ∈ [0.7, 0.97].
C. Relative variation measured by KL divergence
(a) Brin-Page model
(b) log-𝛾 model
(c) Chung's model
(a) 𝛼𝑜 = 0.85
(b) 𝛾𝑜 = 0.94146
(c) 𝛽𝑜 = 5. 6
(d) Brin-Page model
(e) log-𝛾 model
(f) Chung's model
Fig. 3: Comparison in histograms of 𝑁·𝑥𝑓 (𝜌) on the Google link graph over
a range of damping variable value. Left column: Brin-Page model, Middle
column: log-𝛾 model, Right column: Chung's model. Top row: 2D display
of 6 histograms associated with 6 parameter values shown in the respective
legends. The histogram in black with Brin-Page model is associated with the
value 𝛼 = 0.85. The corresponding parameter values with Chung's model and
log-𝛾 model are set by (17), the associated histograms are color coded by the
corresponding parameter values. Bottom row: a stack of multiple histograms
shown in 3D space over the range 𝛼 ∈ [0.7, 0.97] with Brin-Page model,
𝛽 ∈ [2. 6, 32. 3] with Chung's model, and 𝛾 ∈ [0.7787, 0.994] with log-𝛾
model. The histograms with Chung's model have flattened peaks at larger
values (toward the back end). The log-𝛾 model is nearly insensitive to 𝛾
change in the range above.
Figure 3 and Figure 4 show the variation in the histograms
over a range of the damping variable per model as well as
the comparison side by side between the three models on two
datasets. The models have similar behaviors on the other 4
graphs in Table 1. Supplementary material can be found in
[29]. With larger damping factors in the models, the distribu-
(d) 𝛼𝑜 = 0.95
(e) 𝛾𝑜 = 0.98831
(f) 𝛽𝑜 = 19
Fig. 5: Intra-model relative variation as defined in (14) in PgeRank distribu-
tion, on the Google graph, with respect to two reference distribution at 𝛼𝑜 ∈
{0.85, 0.95} with Brin-Page model (left column), 𝛾𝑜 ∈ {0.94146, 0.98831}
with log-𝛾 model (middle column), and 𝛽𝑜 ∈ {5. 6, 19} with Chung's
model (right column). Blue curves: the KL score 𝐾𝐿(𝑥𝑓 (𝜌)𝑥𝑓 (𝜌𝑜)) with
numerically computed distribution vectors; Red curves: the derivative of the
KL score (𝑑/𝑑𝜌)𝐾𝐿(𝑥𝑓 (𝜌)𝑥𝑓 (𝜌𝑜)). The red curves with · marker and ◇
marker are obtained empirically from numerical distribution vectors, with step
size Δ𝜌 = (0.002, 0.008) respectively. The red curves with × marker are
obtained analytically by (15). Remarks. With Brin-Page model and log-𝛾
model, the distribution changes gently from the reference distribution in the
neighborhood of the reference value 𝛼𝑜 = 0.85, by the KL curve and the
KL derivative curve. In sharp contrast, the distribution with Chung's model
deviates rapidly from the reference distribution.
We show the relative variation in PageRank vector with
respect to a reference vector by (14). For Brin-Page model,
we consider two particular reference vectors: one is associated
with 𝛼 = 0.85 as chosen originally by Brin and Page, the other
is at 𝛼 = 0.95, much closer to the extreme case 𝛼 = 1, in
which the walks follow the links only. For Chung's model and
log-𝛾 model, we use the corresponding parameter values by
10-610-410-210010201234567# of nodes (bin counts)10410-510010501234567# of nodes (bin counts)10610-610-410-210010201234567# of nodes (bin counts)10410-610-410-210010201234567# of nodes (bin counts)10410-610-410-210010201234567# of nodes (bin counts)10410.950.9010-50.8524104Bin counts0.8100610.950.9 00.8510-524104Bin counts0.8100630252001510-52104104Bin counts5100610-510010501234567# of nodes (bin counts)10610-510010501234567# of nodes (bin counts)10610-510010501234567# of nodes (bin counts)10610.950.90110-50.85234106Bin counts0.810051056710.950.9 010.85210-534Bin counts1060.8100561057302520150121010-534Bin counts10651005610570.70.750.80.850.90.95100.020.040.060.080.10.120.140.160.180.202468101214KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.0020.750.80.850.90.95100.010.020.030.040.050.060.0702468101214161820KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.002010203040-0.3-0.2-0.100.10.20.3-0.15-0.1-0.0500.050.10.15KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.0020.70.750.80.850.90.951-0.1-0.0500.050.10.150.20.250.30.35-2-1012345KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.0020.750.80.850.90.951-0.0200.020.040.060.080.10.12-101234567KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.002010203040-0.6-0.4-0.200.20.40.6-0.3-0.2-0.100.10.20.3KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.002(17). We show the differences between the three models on
the Google graph in Figure 5 at the corresponding reference
values, respectively, and on the twitter graph in Figure 6.
(a) 𝛼𝑜 = 0.85
(b) 𝛾𝑜 = 0.94146
(c) 𝛽𝑜 = 5. 6
(d) 𝛼𝑜 = 0.95
(e) 𝛾𝑜 = 0.98831
(f) 𝛽𝑜 = 19
Fig. 6: Intra-model relative variation in PageRank distribution by (14), on
the Twitter graph. The rest is in the same setting as in Figure 5.
D. Batch calculation: efficiency and accuracy
We show first that the Krylov space dimension is numeri-
cally low for each of the 6 real world link graphs. Figure 7
gives the diagonal elements of each upper-triangular matrix 𝑅
obtained by a rank-revealing QR factorization. The elements
below 10−17 are not shown. The numerical dimension ranges
from 19 with DBpedia link graph to 62 with Google link
graph. The low numerical dimension makes our algorithm
in Section IV highly efficient. In addition, we exploited the
sparsity of matrix 𝑃 in the Krylov vector calculation, see
details in [30].
(a) Google
(b) Twitter(www)
(c) Wikipedia
(d) DBpedia
(e) Twitter(mpi)
(f) Friendster
Fig. 7: The diagonal elements of each upper-triangular matrix 𝑅
obtained by a rank-revealing QR factorization for the 6 datasets in
Table 1. Google link graph has the highest numerical dimension 62
among the 6 datasets, and the DBpedia link graph has the lowest
numerical dimension 19.
The accuracy of our batch algorithm is evaluated in two
ways. One is by 𝑒𝑟𝑟 = ‖(𝑥Krylov − 𝑥G-S)./𝑥G-S‖∞,
the
maximum element-wise relative difference in the PageRank
vectors of Brin-Page model between the Gauss-Seidel method
and our Krylov subspace method. In our experiments, the
relative errors for all 6 datasets are below 10−10. In the other
way, we show in Figure 5 and Figure 6 that the empirical rate
of change agrees well with analytical prediction (15).
VI. CONCLUDING REMARKS
Our model extension, connection, unified analysis and nu-
merical algorithm for quantitative estimation in batch are
original, to our knowledge. Our study leads to new observation
and several findings. (a) In network propagation pattern in
response to variation in the damping mechanism, the inter-
model difference among the 3 models is much more significant
than the inter-dataset difference among the 6 datasets. This
suggests the utility of model variety for differentiating network
activities or propagation patterns. (b) The model solutions
reside in the same customized, spectrally invariant subspace.
On each of the 6 real-world graphs, the space dimension
is low, which is a small-world phenomenon. (c) The shared
computation is not limited to one personalized distribution.
The Krylov space associated with a particular vector 𝑣 contains
certainly many other distribution vectors. In fact, every Krylov
vector is a distribution vector. This finding may lead to a
much more efficient way to represent and compute PageRank
distributions across multiple personalized vectors. (d) The
low spectral dimension, estimated once for a particular graph
𝑃 and a personalized/customized vector 𝑣, may serve as a
reasonable upper bound on the number of iterations by any
competitive algorithm, with one matrix-vector product per
iteration, for Brin-Page model, at any 𝛼 value in (0, 1), or
any other model in the family (8). The power method and
the Gauss-Seidel iteration take more iterations to reach the
same error level on the larger real-world graphs among the
studied, and take many more iterations when 𝛼 gets closer to
1. In brief conclusion, estimating PageRank distribution under
various damping conditions is valuable and easily affordable.
REFERENCES
[1] L. Page, S. Brin, R. Motwani, and T. Winograd, "The PageRank citation
ranking: Bringing order to the web." Stanford InfoLab, Tech. Rep., 1999.
[2] S. Brin and L. Page, "The anatomy of a large-scale hypertextual web
search engine," Computer networks and ISDN systems, vol. 30, no. 1-7,
pp. 107–117, 1998.
[3] D. Sheldon, "Manipulation of PageRank and Collective Hidden Markov
Models," Ph.D. dissertation, Cornell University, Ithaca, NY, USA, 2010.
[4] T. H. Haveliwala, "Topic-sensitive PageRank: A context-sensitive rank-
ing algorithm for web search," IEEE Transactions on Knowledge and
Data Engineering, vol. 15, no. 4, pp. 784–796, 2003.
[5] J. L. Morrison, R. Breitling, D. J. Higham, and D. R. Gilbert, "Gen-
erank: using search engine technology for the analysis of microarray
experiments," BMC bioinformatics, vol. 6, no. 1, p. 233, 2005.
[6] G. Wu, Y. Zhang, and Y. Wei, "Krylov subspace algorithms for com-
puting generank for the analysis of microarray data mining," Journal of
Computational Biology, vol. 17, no. 4, pp. 631–646, 2010.
[7] A. N. Langville and C. D. Meyer, "Deeper inside PageRank," Internet
Mathematics, vol. 1, no. 3, pp. 335–380, 2004.
[8] P. Berkhin, "A survey on PageRank computing," Internet Mathematics,
vol. 2, no. 1, pp. 73–120, 2005.
[9] T. Haveliwala, S. Kamvar, and G. Jeh, "An analytical comparison of
approaches to personalizing PageRank," Stanford InfoLab, Technical
Report 2003-35, June 2003.
0.70.750.80.850.90.95100.050.10.150.2-1012345678KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.0020.750.80.850.90.95100.010.020.030.040.050.06024681012KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.00205101520253035-0.3-0.2-0.100.10.20.3-0.4-0.3-0.2-0.100.10.20.30.4KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.0020.70.750.80.850.90.951-0.8-0.6-0.4-0.200.20.4-3-2-1012KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.0020.750.80.850.90.951-0.0500.050.10.150.2-1-0.500.511.522.53KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.00205101520253035-1-0.8-0.6-0.4-0.200.20.40.60.81-0.6-0.4-0.200.20.40.6KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.00201020304050607080-16-14-12-10-8-6-4-2001020304050607080-16-14-12-10-8-6-4-2001020304050607080-16-14-12-10-8-6-4-2001020304050607080-16-14-12-10-8-6-4-2001020304050607080-16-14-12-10-8-6-4-2001020304050607080-16-14-12-10-8-6-4-20[36] F. Chung and W. Zhao, "PageRank and random walks on graphs," in
Springer, 2010, pp.
Fete of Combinatorics and Computer Science.
43–62.
[10] S. Kamvar, T. Haveliwala, C. Manning, and G. Golub, "Exploiting the
block structure of the web for computing PageRank," Stanford InfoLab,
Technical Report 2003-17, 2003.
[11] P. Boldi, M. Santini, and S. Vigna, "PageRank as a function of the
damping factor," in Proceedings of the 14th International Conference
on World Wide Web. ACM, 2005, pp. 557–566.
[12] M. Bressan and E. Peserico, "Choose the damping, choose the ranking?"
Journal of Discrete Algorithms, vol. 8, no. 2, pp. 199–213, 2010.
[13] F. Chung, "The heat kernel as the PageRank of a graph," Proceedings of
the National Academy of Sciences, vol. 104, no. 50, pp. 19 735–19 740,
2007.
[14] --, "A local graph partitioning algorithm using heat kernel PageRank,"
Internet Mathematics, vol. 6, no. 3, pp. 315–330, 2009.
[15] A. Arasu, J. Novak, A. Tomkins, and J. Tomlin, "PageRank computation
and the structure of the web: Experiments and algorithms," in Proceed-
ings of the 11th International Conference on World Wide Web, 2002,
pp. 107–117.
[16] S. Kullback and R. A. Leibler, "On information and sufficiency," The
Annals of Mathematical Statistics, vol. 22, no. 1, pp. 79–86, 1951.
[17] C. P.-C. Lee, G. H. Golub, and S. A. Zenios, "A fast two-stage algorithm
for computing PageRank and its extensions," Scientific Computation and
Computational Mathematics, vol. 1, no. 1, pp. 1–9, 2003.
[18] A. N. Langville and C. D. Meyer, "A reordering for the PageRank
problem," SIAM Journal on Scientific Computing, vol. 27, no. 6, pp.
2112–2120, 2006.
[19] A. L. Dulmage and N. S. Mendelsohn, "Coverings of bipartite graphs,"
Canadian Journal of Mathematics, vol. 10, no. 4, pp. 516–534, 1958.
http://www.google.com/
[20] Google,
programming
contest,"
"Google
programming-contest/, 2002.
[21] S. D. Kamvar, T. H. Haveliwala, C. D. Manning, and G. H. Golub,
"Extrapolation methods for accelerating PageRank computations," in
Proceedings of the 12th International Conference on World Wide Web.
ACM, 2003, pp. 261–270.
[22] S. Kamvar, T. Haveliwala, and G. Golub, "Adaptive methods for the
computation of PageRank," Linear Algebra and its Applications, vol.
386, pp. 51–65, 2004.
[23] P. A. Lofgren, S. Banerjee, A. Goel, and C. Seshadhri, "FAST-PPR:
scaling personalized pagerank estimation for large graphs," in Proceed-
ings of the 20th ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining. ACM, 2014, pp. 1436–1445.
[24] J. Kunegis, "KONECT–the koblenz network collection," in Proceedings
of the 22nd International Conference on World Wide Web. ACM, 2013,
pp. 1343–1350.
[25] S. Auer, C. Bizer, G. Kobilarov, J. Lehmann, R. Cyganiak, and Z. Ives,
"DBpedia: A nucleus for a web of open data," in The Semantic Web.
Springer, 2007, pp. 722–735.
[26] H. Kwak, C. Lee, H. Park, and S. Moon, "What is Twitter, a social
network or a news media?" in Proceedings of the 19th International
Conference on World Wide Web. New York, NY, USA: ACM, 2010,
pp. 591–600.
[27] M. Cha, H. Haddadi, F. Benevenuto, and K. P. Gummadi, "Measuring
User Influence in Twitter: The Million Follower Fallacy," in Proceedings
of the 4th International AAAI Conference on Weblogs and Social Media
(ICWSM), Washington DC, USA, May 2010.
[28] J. Yang and J. Leskovec, "Defining and evaluating network communities
based on ground-truth," Knowledge and Information Systems, vol. 42,
no. 1, pp. 181–213, 2015.
[29] Y. Qian, "Variable damping effect on network propagation," Master's
thesis, Duke University, Durham, NC, USA, May 2018.
[30] X. Chen, "Exploiting common structures across multiple network prop-
agation schemes," Master's thesis, Duke University, Durham, NC, USA,
May 2018.
[31] T. Haveliwala and S. Kamvar, "The second eigenvalue of the google
matrix," Stanford InfoLab, Technical Report 2003-20, 2003.
[32] M. Richardson and P. Domingos, "The intelligent surfer: Probabilistic
combination of link and content information in PageRank," in Advances
in Neural Information Processing Systems, 2002, pp. 1441–1448.
[33] T. Haveliwala, "Efficient computation of PageRank," Stanford, Tech.
Rep., 1999.
[34] A. N. Langville and C. D. Meyer, Google's PageRank and beyond: The
science of search engine rankings. Princeton University Press, 2011.
[35] G. Jeh and J. Widom, "Scaling personalized web search," in Proceedings
of the 12th International Conference on World Wide Web. ACM, 2003,
pp. 271–279.
|
1806.02155 | 1 | 1806 | 2018-06-06T13:04:25 | Understanding News Outlets' Audience-Targeting Patterns | [
"cs.SI"
] | The power of the press to shape the informational landscape of a population is unparalleled, even now in the era of democratic access to all information outlets. However, it is known that news outlets (particularly more traditional ones) tend to discriminate who they want to reach, and who to leave aside. In this work, we attempt to shed some light on the audience targeting patterns of newspapers, using the Chilean media ecosystem. First, we use the gravity model to analyze geography as a factor in explaining audience reachability. This shows that some newspapers are indeed driven by geographical factors (mostly local news outlets) but some others are not (national-distribution outlets). For those which are not, we use a regression model to study the influence of socioeconomic and political characteristics in news outlets adoption. We conclude that indeed larger, national-distribution news outlets target populations based on these factors, rather than on geography or immediacy. | cs.SI | cs | Elejalde et al.
RESEARCH
Understanding News Outlets' Audience-Targeting
Patterns
Erick Elejalde1*, Leo Ferres2,3 and Rossano Schifanella4
*Correspondence:
[email protected]
1Department of Computer
Science, University of Concepcion,
Concecpci´on, Chile
Full list of author information is
available at the end of the article
8
1
0
2
n
u
J
6
]
I
S
.
s
c
[
1
v
5
5
1
2
0
.
6
0
8
1
:
v
i
X
r
a
Abstract
The power of the press to shape the informational landscape of a population is
unparalleled, even now in the era of democratic access to all information outlets.
However, it is known that news outlets (particularly more traditional ones) tend
to discriminate who they want to reach, and who to leave aside. In this work, we
attempt to shed some light on the audience targeting patterns of newspapers,
using the Chilean media ecosystem. First, we use the gravity model to analyze
geography as a factor in explaining audience reachability. This shows that some
newspapers are indeed driven by geographical factors (mostly local news outlets)
but some others are not (national-distribution outlets). For those which are not,
we use a regression model to study the influence of socioeconomic and political
characteristics in news outlets adoption. We conclude that indeed larger,
national-distribution news outlets target populations based on these factors,
rather than on geography or immediacy.
Keywords: Media ecosystem; Propaganda model; Gravity model; News spreading
1 Introduction
The mass media is one of the social forces with the strongest transformative power.
However, news reach people unequally, in part because news outlets target con-
tent to certain audiences. According to Herman and Chomsky's Propaganda Model
(PM) [1], there are many factors that shape the distribution and influence of news
media coverage. Two of the most important factors are the geographic reach of
newspapers (national versus regional newspapers), and the direct targeting of spe-
cific sectors of the population and/or the political ideology of the media outlet
itself. The PM states that each linguistic account of an event must pass through
five filters that define what is newsworthy. One such filter, the advertising filter
(number two in the PM) predicts that most news outlets will try to reach a specific
audience (segments of the population) with the objective of maximizing profit, in-
stead of actually informing. In other words, outlets will try to cater to the target
demographic's expectations, rather than being fair in their treatment of what is
news. For instance, some advertisers will prefer to take their businesses to outlets
with target audiences of high purchasing power, which will eventually marginalize
working-class audiences; or by political reasons, with advertisers declining to do
business with outlets perceived as ideological enemies or indeed any media unfavor-
able to their private interests.
Prat and Stromberg [2] provide another model (henceforth PS) that seems to bet-
ter define the same concept of a media system entirely driven by profit-maximization
Elejalde et al.
Page 2 of 19
(PM's second filter). The authors identify the characteristics that a certain audi-
ence needs to have for an outlet to create content that is relevant to that audience
(Proposition 4 in [2]). To make Proposition 4 more concrete, Prat and Stromberg [2]
suggest that the main factors that influence the mass media coverage of an event
are: (a) if the matter is of interest for a large group of people (a group may be
characterized by a political stand, geographic location, ethnicity, etc.), (b) if it has
a significant advertising potential (e.g., it may attract readers with a higher pur-
chasing power), (c) if it is newsworthy to a group within easy reach (i.e., it is cheap
to distribute news to that group). Thus, in a media system driven by profit, areas of
low population density, minorities, and low-income classes will be relatively under-
served and underrepresented in mainstream news coverage. This creates a loop that
ends up neglecting (policy-wise) the most vulnerable segments of society just for
having limited access to the media.
To date, there has been comparatively little large-scale, quantitative research on
the relationship between the quality and diversity of the contents the media gener-
ate, and the socioeconomic indices of a particular area of coverage. In this paper,
we try to find whether or not an outlet's coverage deviates from the purely geo-
graphic influence to a more sophisticated behavior involving the weight of political
and socioeconomic interests for example, as operationalized by Prat and Stromberg.
We examine the degree to which different geographic locations in the same country
are covered by existing news outlets using Chilean social media data. We quan-
tify how much of this coverage can be explained by a natural geographic targeting
(e.g., local newspapers will give more importance to local news), and how much can
be attributed to the politic/socioeconomic profile of the areas they serve. To find
these coverage effects as predicted by the PM and PS models, we look for empir-
ical evidence in the massive adoption of social networks. More specifically, we use
statistical models that show how much of the distribution of Twitter followers can
be explained based on the geographic, political and socioeconomic features of the
different areas.
2 Related Work
In this section we give a short account of these targeting strategies: geographic,
socioeconomic, and political. We use the concepts in the PM, and the operational-
ization of PS to identify them.
2.1 Geographic targeting
According to Zipf's Gravity Model [3, 4], as we move farther away from the source
of a piece of news, the interest/relevance of a story drops. Given that news outlets
tend to cover stories where reporters can get quickly and easily (again, to minimize
the cost of the piece of news), their followers are expected to be predominantly from
populations that are closer to them. Also, the size of a population at a particular
place may influence how newspapers cover events originating in that area. News-
papers work on an economy of scale with a considerable first copy cost. According
to the Gravity Model, we could predict the flow of information in the news media
system and hence, indirectly, the proportional distribution of followers a target area
will have for a given news outlet.
Elejalde et al.
Page 3 of 19
Distance and population size are also essential magnitudes to describe profit in
the model proposed by Prat and Stromberg (Equation 5 in [2]). News outlets will
favor in their coverage issues that may draw the attention of larger groups (e.g., big
cities) and to which it is cheaper to deliver the news (e.g., at a shorter distance).
2.2 Socioeconomic targeting
Another factor that influences the news coverage is the socioeconomic profile of an
area. As we mentioned earlier, a strategy that the news outlets could implement
to increase advertising revenue is to target sectors of the population with a higher
purchasing power. Herman and Chomsky point out in the second filter of the PM
that advertising, being a fundamental source of income for news outlets, plays an
important role to maintain the hegemony of the top news companies in the free
market. News outlets that can secure good advertising contracts may afford lower
sell prices and become more competitive. This business model breaks the natural
market rules that give the final buyer's choice the power to decide. In this case,
the advertisers' contracts have a significant impact on the media growth or even
their survival. So, outlets are forced to comply and demonstrate to the announcer
how their content may serve to its needs. The audience of a newspaper becomes its
product, which can then be "sold" to the sponsors.
The second filter of the PM is in line with the predictions in the Proposition
4(b) in [2]. This filter suggests that in their effort to align their content with the
advertisers' interests, the media have shifted to a lighter and less controversial
programming (e.g., lifestyle, fashion, sports, etc.) [5, 6]. In [7], the author presents
some evidence on the same direction, showing, for example, media preference for
"soft news" content that is favored by advertisers as it targets a demographic of
female and young people. A more recent and direct example on how advertisers
may influence the content of the media is the evolution from product placements to
Native Ads [8], which makes it difficult to the reader to differentiate between news
and advertisement. This type of pseudo-content provides a significant part of the
outlets' revenue [9].
Being able to detect this kind of behavior in the media is of utmost importance.
For example, a socioeconomic bias in the media system can be very damaging as
it may exacerbate the gap between rich and poor areas. A population with limited
access to the news is less informed and, consequently, less likely to hold authorities
responsible for public expenditure and providing broad public welfare [10, 11]. In
turn, this motivates the incumbent to prioritize and divert resources to places where
they will receive more media coverage and not necessarily where they are most
needed. According to Chomsky and Herman [1], these characteristics make the
news media system comparable to a political scheme where votes are weighted by
income.
Other aspects of a community and their links to different socioeconomic conditions
have been studied. For example, the diversity in the individuals' relationships [12]
or patterns in the urban mobility [13] have shown to be useful indicators for the
deprivation levels of a region. However, there has been comparatively little large-
scale quantitative research on the relationship between the media coverage, and the
socioeconomic indices of a particular area.
Elejalde et al.
Page 4 of 19
2.3 Political targeting
Political bias is probably the most studied type of bias in the mass media [14, 15, 16,
17]. In previous work [18], we analyze the nature of bias through a political quiz.
Our study shows that even the political bias could have some economic factors.
Extra evidence of this is given in [15]. The authors estimate the bias in newspapers
according to how similar their language is compared to that used by congressmen
for which a right/left stand is known. They do not find a direct relationship between
the "slant" of a newspaper and the political preference of the owners (cf. our own
work on the topic [19]). Instead, bias in the news is found to be more correlated to
the political inclinations of the readers, showing a tendency in these news outlets to
align themselves with the political preferences of their target audience and hence,
maximizing selling profits. We think this is an important result because, although
outlets may seem to take a political stand in their editorial line, evidence suggests
that this may be another strategy to generate revenue by targeting a specific group
of people. For example, governmental offices at various levels assign a considerable
part of their budgets to advertising. Newspapers sympathizers of the government
policies may benefit from lucrative advertising contracts with the incumbent. So,
outlets discrimination can be also influenced by political reasons, with advertisers
declining to do business with media that are perceived as ideological enemies or
generally unfavorable to their interests.
2.4 Online news dynamics, coverage, bias
In an interview with Mullen [20], Herman and Chomsky express their confidence
in the applicability of the PM to forms of media other than newspapers, especially
the Internet, where traditional news outlets compete with new digital media and
advertising is more relevant than ever before. If anything, the "old" news industry
has evolved and has adapted to the new environment.
More recently, Robinson [21] evaluates if the introduction of new communication
technologies and the Internet have affected the influence of the economic structure
over the news media system. He argues that even though there has been a shift
from the printed news to the digital media (newspaper website audiences grew by
7.4% in 2012 [22]), the news cycle is still controlled by the big news corporations.
The three most significant outlets in U.S. (i.e., Wall Street Journal, USA Today and
New York Times) had a circulation of over 5 million users (which include digital
subscribers); any of them counting at least one order of magnitude more readers
than the next closest competitor [22]. With regards to advertising on Internet, the
author concludes that news outlets had to rely even harder on this source of income:
on-line subscription revenue does not cover the previous earnings made from selling
print newspapers. So, the content has became more profit driven with a shift to
soft-news and corporate-friendly reports [22].
On the same note, Pew Research Center reported that nowadays up to 93% of
U.S. adults consume some news online [23], and to do so they use official news orga-
nizations websites and social media in equal shares (36% vs. 35% respectively) [24].
However, regardless of the path they use to get to news, readers overwhelmingly
favor professional news organizations to get their news (76%) [25]. With the increas-
ingly important role of social media in the news system, news outlets have again
Elejalde et al.
Page 5 of 19
adapted by embracing the new platform and now they are able to create original
content for them (i.e., Facebook's instant articles[1] allows any publisher to create a
piece of news directly in the Facebook platform). This move is also deeply motivated
by the market and the task to increase advertising revenue. In 2016 digital adver-
tising constituted approximatively 37% of all advertising revenue (not just news
outlets), and Facebook along comprises for 35% of digital advertising revenue [23].
More specifically, in [26], the authors analyze the dynamics of news and journalism
on the Twitter platform. They found that 0.8% of the tweets are news media related.
This gives an idea of how significant are news media to Twitter. They also report,
confirming the results of Robinson [21], that the traditional notion of gatekeeping
and news production have not changed, and large news organizations still control
what is newsworthy. Moreover, they show that news entities do not use the social
media to engage with their audience but rather as a way for content dissemination
(mostly by redirecting users to their own websites). Also, they find difference in
interest (topic-wise) between Twitter users and news outlets. This difference of
focus gives some evidence to the agenda-setting behavior of the news industry,
reinforcing the hypothesis of a profit-driven system, instead of an informative one.
3 Data
To create our database of news outlets, we used different sources, with Poderopedia's
"influence" database [27] and Wikepedia [28] as our baseline, manually adding other
news outlets in Chile. Our database contains 403 active accounts. An account is
considered active if it tweets at least once a month. We enriched the profile of each
outlet by adding relevant information such as geographic location, scope, Twitter
account, and number of Twitter followers.
The Twitter's API allows to automatically access the flow of tweets and query the
system for user profiles, followers and tweeting history. This data availability makes
it possible to explore the behavior and interactions of personal and institutional
accounts, developing and testing social theories at a scale that was unfeasible few
years ago. This is the closest thing we have to a record of the every-day life of over
300 million people (Twitter reported 328 million monthly active users in the first
quarter of 2017 [29]).
Chile ranks among the top-10 countries regarding the average number of Twitter
users per 1000 individuals [30]. Because of the massive adoption of Twitter and the
strong presence of the news media on the social networks, we use the Twitter follow-
ers as a proxy for the actual audience of a news outlet. For our analysis, we download
the user's profile on Twitter for each follower of the outlets in our database. We
collected the profile of 4,943,351 unique users. Each user may simultaneously follow
more than one news outlet.
We decided to use the commune as our location unit given that this is the smaller
political division in Chile, but at the same time, it is big enough to create both a
statistical and popularly perceived socioeconomic profile at the population level.
We obtained the total population of each commune and other demographic indices
from the National Institute of Statistics (INE) [31]. The demographic indices were
already aggregated by commune. We also needed information on the socioeconomic
[1]https://instantarticles.fb.com/
Elejalde et al.
Page 6 of 19
development of each zone. This kind of information is harder to obtain. The most
reliable source is the national census. The problem is that censuses are very expen-
sive and therefore are performed very infrequently (sometimes more than a decade
apart - last completed valid census performed in Chile was in 2002)[2]. Instead, we
use the data from the National Socio-Economic Characterization Survey (CASEN)
from 2013[3] [33]. This study is conducted by the Ministry of Social Development
in Chile. From the CASEN survey, we obtain the socioeconomic indicator at the
level of a commune using the available expansion factor to calculate the weighted
average income per household.
Our last dimension has to do with the political leaning of the communes. To
measure the political tendencies of each geographical area, we use the results from
the presidential election. The Chilean Electoral Service [34] provides detailed infor-
mation district-wise on the Chilean presidential elections since 1989 (that is, since
Chile's return to democracy after the dictatorship of Augusto Pinochet).
To help understand the collected data, we represent in Figure 1 the geographic
distribution of each dimension for the most populated region of the country (i.e.,
Santiago). Note that most of the news outlets are located in the city center (Figure
1b) and surrounded by very densely populated areas (Figure 1a). Also, Figure 1c
shows a difference in the income level between communes from East to West (which
coincides with the popular perception). Finally, more populated and urbanized areas
show a right-leaning political predominance. While areas farther from the city center
and mostly rural show the opposite tendency (see Figure 1d).
4 Methods
4.1 Geographic targeting
We first use the Gravity Model to identify how much of news coverage can be
explained by the geographic factors of distance and population. For this we use
the population and location of both the source of the medium and the target area.
Equation 1 represents this relation.
F j
i =
Pi ∗ Pj
Dij
(1)
Here Pi is the population of the commune i, and Pj is the population of the
commune in which outlet j is located. Dij represents the distance between the two
communes. Then, F j
i should give us a value that represents the expected number
of followers that outlet j will have in the commune i.
We run the model for each news outlet so we can analyze the geographic targeting
behaviour for different types of media.
For this study, we manually locate each news outlets in its source commune. The
location may be determined by the intended audience if the name of the commune
is in the name of the outlets (e.g., soyConcepcion is assigned to Concepcion city)
[2]There was another census in 2012, but it was methodologically flawed, with prob-
lems in coverage, and a supposed manipulation of some of the key indices [32].
[3]There is a CASEN survey from 2015 but the expansion factor for the communes
is not complete (not even for the communes in Santiago)
Elejalde et al.
Page 7 of 19
or by the location of its headquarters. At the intra-country level, big news media
companies may have more than one headquarter, however in most cases they either
work under a different name (with a more "local" name) or report directly to the
central headquarters which ultimately define the editorial line. For example, Soy
Concepcion is owned by the El Mercurio Group, which is also the group that owns
one of the largest newspapers of the capital region (also called El Mercurio).
Finally, for every pair of communes we use their estimated populations (obtained
from the INE [31]) and GPS coordinates. We calculate the direct distance between
them using the Haversine formula. We represent each outlet j as a vector F j. The
elements of F j are the predicted proportion of followers in each commune for outlet
j obtained from the Gravity Model. We also create a vector T j for each outlet
with the actual number of Twitter followers on each commune i obtained from
our ground-truth (see Section 4.1.1 below). Using the two vectors that represents
each outlet we calculate the Pearson product-moment correlation coefficients. This
coefficient will give us, for each news outlet, an idea of how much of the distribution
of readers can be attributed to the geographic dimension.
4.1.1 Geolocation of the followers
Regarding the location of the Twitter followers, there is an extensive body of work
that focuses on geo-tagging Twitter users [35, 36, 37]. Most of this work can be
divided into two groups according to their approach: content-based and network-
based. Methods based on content can be further subdivided into those that use a
gazetteer [38], as in our case, to find direct references to geographic places and those
based on Language Models that try to learn a probabilistic text model [39]. The
performance of the former depends heavily on the quality of the used dictionary.
The latter may achieve high precision for the geo-localization of users at a country
level, or even within country regions or cities [40, 41]. However, to achieve a good
performance at a finer grain classification, such as commune/neighborhood level,
massive corpora of social media annotation is required [37]. On the other hand,
the geo-localization of users based on their network (based on the assumption that
users are more likely to interact with other users that are geographically closer to
them) are more accurate at a finer level [42, 43]. The problem is that crawling the
connections of several million users and dealing with the corresponding graph is
time consuming and computationally intensive.
In this paper we decided to test our hypothesis using only the users that we were
able to geolocate based on their profile's location field. We use these as a sample
of the population. The cumulative number of followers per commune in our sample
is highly correlated with the actual population distribution (r(343) = .61, p < .01).
So, we will use this information to model news outlets coverage in our database.
To find the accounts that are following more than one outlet we use the identifier
from each user's profile on Twitter. We use only those profiles that have a non-
empty location field, which brings our list down to 1,579,068 accounts (31% of the
initial amount).
In [44] the authors analyze the nature of the location field in the Twitter profile.
Given that this is an open text field, users not always enter a valid (or even geo-
graphic) information. So, a pre-processing of these data is in order if we are making
any study involving geolocation of the users based on this field.
Elejalde et al.
Page 8 of 19
In our remaining 31%, some of the users have GPS coordinates, and others have
a text description of their location. Since the text description is a free text entered
by the user, it ranges from an exact postal address to a completely useless text
(e.g., "The milky way"). Using a gazetteer, we could extract 996,326 users with a
recognizable location, which represents the 20% of the initial amount. We tried to
assign each user to a commune with a given level of confidence. For the users with a
pair of GPS coordinates, we used a shape-file [45] of the communes of Chile to find
the one that enclosed the point. Only 4,829 of the users had GPS coordinates. The
users with a text description making explicit mention of a commune were assigned
to that commune. For those who mentioned only a province or a region, we could
allocate them in the city/commune capital of that region. Given that these cities
have the most prominent population density in the area, we would maximize the
chance to be correct when making a guess. Nevertheless, we choose to work only
with users for which we have high confidence in their location, namely: those with
GPS coordinates or explicit mention of a commune. Thus, our final list contains
602,810 users, which is over 12% of the total number of unique followers (Table 1
summarizes the followers).
4.2 Audience-targeting model
According to the PM and PS models, direct targeting of specific sectors of the
population shape the distribution of news. If motivated by a profit-driven model of
the media system, this targeting may be based in socioeconomic and/or political
characteristics of the intended audience.
We use a regression model to study the influence of the different features that
represent the dimensions in our hypothesis, namely the socioeconomic and political
characteristics of the communes that may attract profit-driven media coverage. We
try to model the ranking of communes for each outlet based on the share of followers
from each commune. We include the geographic factor in our model to measure its
influence and to keep a reference. We use as the geographic feature only the distance
from the commune to the news source, given that the actual population is to closely
related to our target variable (a function on the number of followers). We estimate
the socioeconomic level of an area as its expected household income. Meanwhile,
for the political factor, we use the right/left-leaning of the commune (see section
3).
To calculate the political factor per commune, we first aggregated the raw num-
ber of votes receives by each party on each commune in the past three elections.
We manually annotated each political party as left-wing, right-wing or centrist ac-
cording to their self-declared position. Political parallelism on the media system is
seen when the media outlets are popularly perceived as leaned to one broad side
in the political spectrum (not necessarily linked to a political party but rather to a
political range) [46]. So, we aggregated the votes for all parties that have a similar
political ideology. With this, we measure how "left-leaning" or "right-leaning" is a
commune.
The data in all three dimensions was aggregated at the level of communes and
normalized by calculating the z − score of each area on each feature.
Elejalde et al.
Page 9 of 19
For the model we use a random forest regressor [47] (implemented in the module
RandomForestRegressor within the python library scikit-learn). This estima-
tor is based on classifying decision trees. Models based on decision trees are less
susceptible to overfitting, considering that our training sets are relatively small (for
each newspaper we only have as many samples as communes with a valid entry).
We evaluate the model using a random shuffle cross validation that leaves 20%
of the dataset for testing, and trains the regressor in the remaining 80%. Each
experiment is repeated 100 times and the average score and standard deviation are
reported. We measure the quality of the fit with the explained variance.
We also measure the explanatory power of each individual dimension on the media
coverage. For this, we calculate the Kendall-Tau correlation of the corresponding
feature against the number of followers per commune for each news outlet. The
results of these measurements should give information on the marketing strategy of
different outlets.
4.2.1 Chilean national soccer team followers
To validate the results and ensure that they are peculiar to the online media ecosys-
tem and not an artifact of the social media attention dynamics as a whole, we repeat
the same experiment using a different topical dataset. In particular, we gather data
on the Twitter followers for the soccer players that were part of the Chilean national
football[4] team in the "Copa America Centenario 2016" tournament. We expect the
coverage variable in a sport-celebrity fans scenario to be influenced by different as-
pects and, consequently, the link to the investigated features being weaker.
We download the Twitter's profile of 6,568,769 unique users that follow at least
one of the 21 players for which we were able to find an official Twitter account.
From these, only 2,434,183 had a non-empty location field. We followed the same
methodology for the geolocation of these user. We found 540,828 users that match
a valid location in Chile. Out of the valid users, only 2,041 had a GPS set of
coordinates, and 381,166 did explicit reference to a commune. This gave us a total
of 383,207 unique followers that we were able to assign with high confidence to one
of the 346 communes in Chile. This is comparable with the 602,810 users that we
will use as our sample of followers of the news outlets.
In this new dataset, the number of follower per commune is also strongly correlated
with the actual population distribution of Chile (r(344) = .66, p < .01). So, it is
comparable in size to our newspapers-followers dataset (see Table 1) and it is a
representative sample of the actual Chilean population.
5 Results
Our primary task in this work is to approximate the distribution of the audience of
the online media based on the geopolitical and socioeconomic characteristics of an
area. As discussed above, multiple aspects of a given population can become factors
in the news outlets' audience-targeting strategy. To better understand the media
coverage, we first study how this is correlated to geographic elements as predicted
by the Gravity Model. To further improve our predictive and explanatory capability,
in a second step, we fit a regression model that, besides the geographic feature, also
[4]"Soccer", in the US dialect.
Elejalde et al.
Page 10 of 19
takes into account the political leaning and income level of the communes in the
most populated region of the country.
5.1 Gravity Model
With the gravity model we want to characterize the news attention as a function
of population size and distance from the media source. As we mention before, we
model the source as the commune where the headquarter of the news outlet is
located or based on the name of the outlet.
We represent each outlet as a vector F j with the expected number of followers in
each commune obtained from the Gravity Model. We also created a vector T j for
each outlet with the actual number of followers on each commune i obtained for
our ground-truth. Using the two vectors that represents each outlet we calculate
the Pearson correlation coefficients. In Figure 2a we can see the distribution of the
correlation coefficients. We can see that the coverage bias of a big number of outlets
can be almost entirely explained just by the geography. Actually, half the outlets
correlate over 0.7. However, there is an important number of outlets for which the
geographic bias explains very little or none of their observed coverage.
Table 2 shows some stats that help to better describe the characteristics of the
news outlets with the lowest and highest correlation. Not surprisingly, the group
that falls farther from the predicted coverage is dominated by the newspapers in
the capital city (i.e., Santiago) and with a national scope. These are expected to
be the ones with the most prominent political and socioeconomic bias, given that
they are the most influential and the ones that dominate news production. Their
leading position also ensures that they receive the biggest share in the investment
of advertisers. Hence, these outlets are the most exposed to external pressures. On
the other hand, news outlets with a local scope behave as described by the Gravity
Model, at least in average. Figures 2b and 2c show the distribution of the correlation
for the outlets with a local and national scope respectively. The figures illustrate
the behavioral difference of these two classes of outlets.
From the previous results, we can conclude that geographic bias is not enough to
describe the nature of the news media. If we look for example at the communes Lo
Prado [48] and San Miguel [49], they have a similar population and are situated at
a similar distance from the center of Santiago, where an important number of news
outlets (local and national) are located. If we take only these news outlets located
in the center of Santiago, the average difference in the expected number of followers
between the two communes according to the Gravity Model is just over 1%. In
other words, based only on geographic factors these communes should be virtually
indistinguishable. But, if we look at the actual number of followers for the same set of
outlets, the average difference is almost 250%, with an overwhelming dominance of
followers from San Miguel. Moreover, a general query in the Twitter API for tweets
geo-located near "Lo Prado, Chile" during August 2017, gives almost 100,000 unique
users, while the same query for tweets near "San Miguel, Chile" throws only 61,165
unique users. Thus, the difference in news outlets' followers cannot be thought as the
result of a disparity in Twitter penetration. One possible factor that may influence
this striking contrast is the gap in socioeconomic conditions and deprivation levels
between the two communes. Lo Prado, despite being located within the capital city,
Elejalde et al.
Page 11 of 19
is ranked in the top ten of the poorest communes of Chile [50]. On the other hand,
San Miguel, even though it is a predominantly residential commune, it is also an
important economic/industrial pole of the city. In fact, San Miguel ranks in the 40th
position out of 93 communes in the Index of Urban Quality of Life for Chile [50].
Thus, the hypothesis of our theoretical models in the political economy of the mass
medial [1, 2] supports the idea that the socioeconomic characteristics of a sector
can make its population more or less attractive to the media.
5.2 Filtering the data
Given that we are analyzing geographic coverage and its relation to socioeconomic
and political factors, we have to take into account the specific characteristics of
Chile. From every point of view, Chile is a heavily centralized country. The previous
results detailed in Table 2 give evidence of this. According to a study from 2013 [51],
in proportion to its size, population, and economic development, Chile is the most
centralized country in Latin America. The data obtained from the INE [31] gives
us a total estimated population of 17.9 million people for the entire country, out of
which 7.4 million (41%) are located in the Metropolitan Region (where its capital,
Santiago, is located). If we also add that this is the smallest (in area) of the 15
regions that compose Chile, we have a very dense population area. Only for its
geographic and demographic characteristics, Santiago is already a desirable market
for the media based on Proposition 4 of Prat and Stromberg [2]. Now, on the
political side, each region in Chile is headed by an Intendente (equiv. Mayor),
but they are appointed and respond directly to the president. Moreover, members
of the House of Representatives who legislate on behalf of the different districts
of the country reside in Santiago. This organization concentrates almost all the
political power in this one region. In the same way, according to the annual report
published by the Central Bank of Chile for 2016 [52], the Metropolitan Region
participated with 46% of the GDP (5x the next highest contribution). With this
heavily concentrated power in all spheres, and based on our set of hypothesis, the
capital of Chile matches all the conditions needed by a population to receive an
extensive media coverage.
Consequently, based on our results of the Gravity Model, we will focus on the
community of outlets identified as the least influenced by the geographic bias. That
is, we filtered our database to keep only those news outlets (locals and national) with
headquarter in the capital. The centralization of the Chilean population it is also
perceived in our collection of followers: out of 15 regions, 36.9% of our geolocated
followers are in the Metropolitan Region. To minimize the noise in our model, we
decided to limit the study of the coverage only to the communes in Santiago. With 51
communes and a wide range of socioeconomic conditions, the Metropolitan Region
offers a good case of study on its own. To further strengthen the signal, we also
limited the analysis to the 25 news outlets with the highest number of followers.
5.3 Regression Model
To extend our model and study the influence of other factors such as the political
and socioeconomic characteristics in the distribution of news media followers, we
use a regression model. As mention before, our target variable is, given a news
Elejalde et al.
Page 12 of 19
outlet and a commune, the ranking position based on the number of followers of
that communes for that outlet.
We include three features in our model: right-leaning, representing the polit-
ical dimension; income, representing the socioeconomic dimension; and distance,
representing the geographic dimension. In Table 3 we show the Pearson correlation
between our three features (using the filtered data). One thing to notice is the rel-
atively high correlation between the expected income of an average household and
the political leaning of the area where it is located. In Chile (and Latin America in
general), right-conservative political parties are popularly associated with wealthy
people. At least in the last few year, left-leaning parties tend to be more populists.
Using these features, our trained model is able to represent the mass media behav-
ior with high precision. The results of the regression indicate the three predictors
explained on average up to 96.3% (SD = 0.005) of the variance in cross-validation.
Figure 3 shows the learning curve for the selected model.
We were also interested in modeling the coverage behavior of each individual
outlet to see how they fit with respect to these three dimensions. To do this, we
used the selected features to create a regression model for each news outlet. This
model is then used in the same way. That is, we predict their audience-based ranking
of the communes in Santiago but using data related only to the selected outlet. The
results, shown in Figure 4, confirm that with the selected features, the regressors
are able to approximate the distribution of followers (M = 0.82, SD = 0.03).
We also studied the ranking of the communes in relation to each feature. We used
Kendall's Tau (KT) correlations to have an indication of how strong is the influence
of each factor in the prediction. Figures 5a, 5b and 5c show the distribution of the
KT correlation for the top 25 news outlets in Santiago with respect to the communes'
political leaning, expected income and distance to the origin, respectively. Results
are shown regarding their absolute values because the direction of impact is not
important for our model. For example, if a news outlet favors a commune based
on the area being right-leaning, for our model this is as telling as another news
outlet disregarding the commune for the same reason. In both cases, the outlets are
biased based on political factors. The results show that the behavior of news outlets
is very similar in terms of the discriminating influence of these three dimensions in
the news coverage, at least within this group.
In figure 6 we show a comparison of the KT correlation coefficient for all three
dimensions for each of the top 25 news outlets. This comparison can be used as
a characterization/profiling of each outlet's coverage behavior. For example, the
coverage of Radio Cooperativa (cooperativa) [53] seems to be driven by political
and economic factors, with practically no attention to the location of the commune.
This is a radio station with a national scope. According to a survey conducted in
2015, it is the second in audience in the region of Santiago [54] and the first one
among people with the highest income (last quantile). Moreover, its editorial line is
"popularly perceived" to be associated to the Christian Democratic Party [53, 18].
Actually, from the early 70's until the late 90's the radio was directly owned by
this party (currently belongs to El Mercurio Group). This profile coincides with
the characterization reflected by our model. On the other hand, El Quinto Poder
(elquintopoder ) [55] is an online news website/community where any member can
Elejalde et al.
Page 13 of 19
contribute with its column. This newspaper follows the concept of citizen journal-
ism popularized by sites like http://www.ohmynews.com/. Its editorial line and
community rules explicitly prohibit any content that is aimed at a personal or in-
stitutional gain. In the same way, political opinions can only be expressed through
personal profiles (rather than an organization profile). In our model, for this news-
paper the influence from the political and economic factors are equated, but also
the geographic dimensions is the highest within these top 25 outlets.
Just as a comparison, we repeat the analysis, this time filtering the dataset to
keep only the top 25 "newspapers" in Santiago - i.e., excluding radio station, TV
channels, etc. (see figure 7). Here, for example, it is easy to distinguish newspapers
with a local scope, such as portaldemeli or betazeta. For those, the influence of the
geographic factor is higher than that of the economic and even the political features.
Actually, in the case of portaldemeli (a small commune's local digital newspaper),
the economic factor is almost non-existing.
To confirm that the results adhere to the news media ecosystem and do not mimic
a behavior common to the social media sphere as a whole, we repeat the experiments
on a different topical domain, namely the followers of a group of football players
(see section 4.2). We filtered the data to keep only football players that were born,
play or live in Santiago (this condition matched six players). We also kept only the
followers that were geolocated in one of the 51 communes of the capital region.
The regression model trained with the three selected features, on average, is able
to explain only 84% (SD = 0.06) of the variance in cross validation. Although the
model also gives a good fit for this data, it is clearly less explanatory than for the
news outlets (over 10% lost of precision compared to the news outlets). Notice that
it is very difficult, if not impossible, to find a public/popular figure for which the
followers are not influenced by neither of these three factor. So, the results must be
evaluated relative to each other.
Another way to differentiate the two datasets is by comparing the individual
influence of each dimension. We calculated the KT correlation coefficient for all three
dimensions for each of the top 6 players (see figure 8). We found that, compared with
the news outlets, the difference in the average correlation is statically significant for
all three features (right-leaning: t = 8.31, p < .001; income: t = 7.93, p < .001;
distance t = 2.39, p = .03).
We can also see that the profile obtained for each individual player (shown in the
shaded area in figure 6) differs from that of the news outlets. In this case, football
players tend to have a comparatively stronger influence from the geographic factor
and politics plays a lesser role.
The found differences between the two datasets indicate that the distribution
of followers for the news outlets is not entirely determined by the social media
substrate but is defined by the characteristics of the entities.
In general, our results support the idea of a media system entirely motivated by
economic interest as described by the theoretical models that prompted the current
study. This profit-driven media system seems to promote selective coverage that
targets specific segments of the population based on the "quality" of the readership.
Notice that a relationship between these features (geographic, social and economic)
and media reach is, of course, not a direct proof of a causal relation. However,
Elejalde et al.
Page 14 of 19
we assume that there is a natural order of information demand and supply: news
media models usually presume that readers get some value from the news they read
(e.g., entertainment or arguments to decide on a private action) [56, 2, 57]. In other
words, we consider that people following a newspaper account are interested in
the "editorial line" of that newspaper. This means that the news outlet is creating
content that is attractive to a specific audience.
6 Conclusions
This work presents a method to characterize the news outlets in the media system
based on the geographic, socioeconomic and political profile of their audiences.
Under the assumption of a natural order of information demand and supply (i.e.,
readers gets some value from the news [57]), this modeling of the media can imply
a conscious targeting of some specific public by catering to their preferences.
Using data from multiple sources we found that news outlets systematically prefer
followers from densely populated areas with a specific socioeconomic profile. The
political leaning of the commune proved to be the most discriminating feature on the
prediction of the level of readership ratings. These findings support the theoretical
claim that describe the news media outlets as profit-driven companies [1, 2].
Although our model seems to generalize quite well and lends evidence to the
hypotheses, we recognize that the methods have some limitations. First, we are
restricted to users that we are able to geo-locate using the location field from the
Twitter profile. A more sophisticated method of location could increase the number
of valid users and maybe increase the precision of the model for other regions. A
second limitation comes from the fact that the political and economic dimension
seem to be closely related. This prevents us from creating a characterization of
the outlets that better reflect the actual preference for a population with either a
certain political profile or a socioeconomic range, but not both. The entanglement
of these two dimensions may be due to the reality of the studied country.
Besides the limitations in the location of the users, the choice to use Twitter
followers as a proxy for the audience of the news outlet may introduce some bias and
noise to our study. For example, it is difficult to determine the actual demographics
of the population in the social media [58]. An alternative method to effectively
define the actual audience of the news outlets (e.g., monitoring the passive and
active traffic on the selected Twitter accounts or websites) could complement our
method and improve the predictive capability of our model in areas with a weaker
signal (e.g., beyond the Metropolitan Region). This is left for future work.
In summary, the results seem to support the hypothesis that outlets focus on
reaching and acquiring an audience with a higher "quality", that can be latter sell
to advertisers. This type of media system neglect areas of low population (e.g.,
rural communes) and high deprivation levels, causing these to be underserved and
underrepresented in the news coverage. In turn, this creates a full cycle when public
policies and politicians overlook sectors of the population that are less informed and
hence, are less likely to influence the status quo of the political elite.
We often say that outlets are "biased". Thus, it is important to define what it
means for these companies to be biased to: one example, and the assumption of our
work, is that news outlets are businesses, and as such are motivated by economic
Elejalde et al.
Page 15 of 19
interests. If we think of news outlets as a profit-oriented business, we notice that
they are perfectly rational in their effort to select content that generates a greater
return (a generalization of the "sex sells" maxim). It is only when we try to hold on
to the traditional view of news outlets as servers of the common good and advocates
of democracy that the concept of bias becomes relevant again. Whatever the case,
given the influence that news outlets have in society, we should be well aware of
their behavior to be able to appropriately process the information they distribute.
7 Declarations
Availability of data and material
Twitter's term of service do not allow redistribution of Twitter content but query terms used are included in the
manuscript. Using this information, interested researchers can recreate the underlying dataset.
Competing interests
The authors declare that they have no competing interests.
Funding
The authors acknowledge financial support from Movistar - Telef´onica Chile, the Chilean government initiative
CORFO 13CEE2-21592 (2013-21592-1-INNOVA PRODUCCION2013-21592-1), Conicyt PAI Networks
(REDES170151) "Geo - Temporal factors in disease spreading and prevention in Chile" (LF). This work was also
supported in part by the doctoral scholarships of CONICYT-PCHA No. 63130228 (EE).
Author's contributions
All authors contributed equally to this work.
Acknowledgements
Author details
1Department of Computer Science, University of Concepcion, Concecpci´on, Chile. 2Data Science Institute,
Universidad del Desarrollo, Santiago, Chile. 3Telef´onica R&D, Santiago, Chile. 4University of Turin, Turin, Italy.
References
1. Herman, E.S., Chomsky, N.: Manufacturing Consent: the Political Economy of the Mass Media, 2nd. edn.
Pantheon Books, New York, NY (2002). https://books.google.cl/books?id=Up5sAAAAIAAJ
2. Prat, A., Stromberg, D.: The political economy of mass media. In: Acemoglu, D., Arellano, M., Dekel, E. (eds.)
Advances in Economics and Econometrics, pp. 135–187. Cambridge University Press, ??? (2011).
https://doi.org/10.1017/cbo9781139060028.004
3. Zipf, G.K.: Some determinants of the circulation of information. The American Journal of Psychology 59(3),
401–421 (1946)
4. Zipf, G.K.: The P1P2/D hypothesis: on the intercity movement of persons. American Sociological Review
11(6), 677–686 (1946)
5. Pew Research Center for the People & the Press: Too much celebrity news, too little good news. U.S. Politics
& Policy. Pew Research Center (2007). Available from:
http://www.people-press.org/2007/10/12/too-much-celebrity-news-too-little-good-news/
[Accessed 02-Jan-2018]
6. Pew Research Center for the People & the Press: Haiti, snowstorms, economy vie for public's attention. The
State of the News Media. Journalism & Media. Pew Research Center (2010). Available from:
http://www.people-press.org/2010/02/17/haiti-snowstorms-economy-vie-for-publics-attention/
[Accessed 02-Jan-2018]
7. Hamilton, J.T.: All the News That's Fit to Sell: How the Market Transforms Information Into News. Princeton
University Press, Princeton, New Jersey (2004). http://www.jstor.org/stable/j.ctt7smgs
8. Wikipedia: Native Advertising. Wikipedia, The Free Encyclopedia. Available from:
https://en.wikipedia.org/wiki/Native_advertising [Accessed 12-August-2017] (2017)
9. Fletcher, P.: Native advertising will provide a quarter of news media revenue by 2018. Forbes (2017). Available
from:
https://www.forbes.com/sites/paulfletcher/2016/11/30/native-advertising-will-provide-a-quarter-of-news-media-revenue-by-2018/#75950afa2d0c
[Accessed 12-August-2017]
10. Reinikka, R., Svensson, J.: Fighting corruption to improve schooling: Evidence from a newspaper campaign in
uganda. Journal of the European Economic Association 3(2-3), 259–267 (2005)
11. Keefer, P., Khemani, S.: Democracy, public expenditures, and the poor: Understanding political incentives for
providing public services. The World Bank Research Observer 20(1), 1–27 (2005)
12. Eagle, N., Macy, M., Claxton, R.: Network diversity and economic development. Science 328(5981), 1029–1031
(2010)
13. Smith, C., Quercia, D., Capra, L.: Finger on the pulse: Identifying deprivation using transit flow analysis. In:
Proceedings of the 2013 Conference on Computer Supported Cooperative Work. CSCW '13, pp. 683–692.
ACM, New York, NY, USA (2013). http://doi.acm.org/10.1145/2441776.2441852
14. Park, S., Kang, S., Chung, S., Song, J.: A computational framework for media bias mitigation. ACM Trans.
Interact. Intell. Syst. 2(2), 8–1832 (2012)
Elejalde et al.
Page 16 of 19
15. Gentzkow, M., Shapiro, J.M.: What drives media slant? evidence from u.s. daily newspapers. Econometrica
78(1), 35–71 (2010)
16. Zhou, D.X., Resnick, P., Mei, Q.: Classifying the political leaning of news articles and users from user votes. In:
Proceedings of the International AAAI Conference on Web and Social Media (2011).
http://www.aaai.org/ocs/index.php/ICWSM/ICWSM11/paper/view/2782
17. Sudhahar, S., Lansdall-Welfare, T., Flaounas, I., Cristianini, N.: Electionwatch: Detecting patterns in news
coverage of us elections. In: Proceedings of the Demonstrations at the 13th Conference of the European
Chapter of the Association for Computational Linguistics. EACL '12, pp. 82–86. Association for Computational
Linguistics, Stroudsburg, PA, USA (2012). http://dl.acm.org/citation.cfm?id=2380921.2380938
18. Elejalde, E., Ferres, L., Herder, E.: On the nature of real and perceived bias in the mainstream media. PLOS
ONE 13(3), 0193765 (2018)
19. Bahamonde, J., Bollen, J., Elejalde, E., Ferres, L., Poblete, B.: Power Structure in Chilean News Media. ArXiv
e-prints (2017). 1710.06347
20. Mullen, A.: The propaganda model after 20 years: Interview with edward s. herman and noam chomsky.
Westminster Papers in Communication and Culture. 6(2), 12–22 (2009)
21. Robinson, P.: The Propaganda Model: Still Relevant Today?, pp. 77–96. Palgrave Macmillan UK, London
(2015). http://dx.doi.org/10.1007/978-1-137-32021-6 5
22. Edmonds, R., Guskin, E., Rosenstiel, T., Mitchell, A.: Newspapers: Building digital revenues proves painfully
slow. The State of the News Media. Journalism & Media. Pew Research Center (2012). Available from:
http://assets.pewresearch.org/wp-content/uploads/sites/13/2017/05/24141622/State-of-the-News-Media-Report-2012-FINAL.pdf
[Accessed 20-May-2016]
23. Stocking, G.: Digital news fact sheet. The State of the News Media. Journalism & Media. Pew Research Center
(2017). Available from: http://www.journalism.org/fact-sheet/digital-news/ [Accessed
20-January-2018]
24. Mitchell, A., Gottfried, J., Shearer, E., Lu, K.: How americans encounter, recall and act upon digital news.
Analysis. Journalism & Media. Pew Research Center (2017). Available from:
http://www.journalism.org/2017/02/09/how-americans-encounter-recall-and-act-upon-digital-news/
[Accessed 20-January-2018]
25. Mitchell, A., Gottfried, J., Barthel, M., Shearer, E.: Pathways to news. The Modern News Consumer.
Journalism & Media. Pew Research Center (2016). Available from:
http://www.journalism.org/2016/07/07/pathways-to-news/ [Accessed 20-January-2018]
26. Malik, M.M., Pfeffer, J.: A macroscopic analysis of news content in twitter. Digital Journalism 4(8), 955–979
(2016)
27. Poderopedia. Poderomedia Foundation: Mapa de Medios. Available from:
http://apps.poderopedia.org/mapademedios/index/ [Accessed 12-May-2017] (2016)
28. Wikipedia: Medios de comunicaci´on en Chile. Wikipedia, The Free Encyclopedia. Available from:
https://es.wikipedia.org/wiki/Medios_de_comunicaci%C3%B3n_en_Chile [Accessed 12-August-2017]
(2017)
29. Trefis Team: Twitter's surprising user growth bodes well for 2017. Forbes (2017). Available from:
https://www.forbes.com/sites/greatspeculations/2017/04/27/twitters-surprising-user-growth-bodes-well-for-2017/#151668952e11
[Accessed 22-August-2017]
30. Mocanu, D., Baronchelli, A., Perra, N., Gon¸calves, B., Zhang, Q., Vespignani, A.: The twitter of babel:
31.
Mapping world languages through microblogging platforms. PLoS ONE 8(4), 61981 (2013)
INE: Demogr´aficas vitales. Instituto Nacional de Estad´ısticas de Chile (INE). Available from:
http://www.ine.cl/canales/chile_estadistico/familias/demograficas_vitales.php [Accessed
12-December-2017] (2013)
32. Bravo, D., naga, O.L., Mill´an, I., Ruiz, M., Zamorano, F.: Informe final comisi´on externa revisora del censo
2012. Technical report, PNUD, Santiago, Chile (2013). Available from:
http://www.cl.undp.org/content/dam/chile/docs/pobreza/undp_cl_pobreza_informe_censo_2013.pdf?download
[Accessed 18-Feb-2018]
33. Social, O.: Encuesta de Caracterizaci´on Socioecon´omica Nacional (CASEN) 2013. Minesterio de Desarrollo
Social (Gobierno de Chile). Available from:
http://observatorio.ministeriodesarrollosocial.gob.cl/casen-multidimensional/casen/casen_2013.php
[Accessed 12-December-2017] (2015)
34. SERVEL: Elecciones Presidenciales 1989 al 2013 por Circunscripci´on Electoral. Servicio Electoral de Chile.
Available from:
https://www.servel.cl/elecciones-presidenciales-1989-al-2013-por-circunscripcion-electoral/
[Accessed 12-August-2017] (2017)
35. Ozdikis, O., Oguztuzun, H., Karagoz, P.: A survey on location estimation techniques for events detected in
twitter. Knowl. Inf. Syst. 52(2), 291–339 (2017)
36. Ajao, O., Hong, J., Liu, W.: A survey of location inference techniques on twitter. J. Inf. Sci. 41(6), 855–864
(2015)
37. Kordopatis-Zilos, G., Papadopoulos, S., Kompatsiaris, I.: Geotagging text content with language models and
feature mining. Proceedings of the IEEE 105(10), 1971–1986 (2017)
38. Amitay, E., Har'El, N., Sivan, R., Soffer, A.: Web-a-where: Geotagging web content. In: Proceedings of the
27th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval.
SIGIR '04, pp. 273–280. ACM, New York, NY, USA (2004). http://doi.acm.org/10.1145/1008992.1009040
39. Serdyukov, P., Murdock, V., van Zwol, R.: Placing flickr photos on a map. In: Proceedings of the 32Nd
International ACM SIGIR Conference on Research and Development in Information Retrieval. SIGIR '09, pp.
484–491. ACM, New York, NY, USA (2009). http://doi.acm.org/10.1145/1571941.1572025
40. Cheng, Z., Caverlee, J., Lee, K.: You are where you tweet: A content-based approach to geo-locating twitter
users. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management.
Elejalde et al.
Page 17 of 19
(a) Population
(b) Average distance to news outlets
(c) Income
(d) Right-leaning
Figure 1: Summary of four different metrics for Chile. From left to right, top
to bottom: population, distance, income and political-leaning
CIKM '10, pp. 759–768. ACM, New York, NY, USA (2010). http://doi.acm.org/10.1145/1871437.1871535
41. Ryoo, K., Moon, S.: Inferring twitter user locations with 10 km accuracy. In: Proceedings of the 23rd
International Conference on World Wide Web. WWW '14 Companion, pp. 643–648. ACM, New York, NY, USA
(2014). http://doi.acm.org/10.1145/2567948.2579236
42. Backstrom, L., Sun, E., Marlow, C.: Find me if you can: Improving geographical prediction with social and
spatial proximity. In: Proceedings of the 19th International Conference on World Wide Web. WWW '10, pp.
61–70. ACM, New York, NY, USA (2010). http://doi.acm.org/10.1145/1772690.1772698
43. Kong, L., Liu, Z., Huang, Y.: Spot: Locating social media users based on social network context. Proc. VLDB
Endow. 7(13), 1681–1684 (2014)
44. Hecht, B., Hong, L., Suh, B., Chi, E.H.: Tweets from justin bieber's heart: The dynamics of the location field
in user profiles. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI '11,
pp. 237–246. ACM, New York, NY, USA (2011). http://doi.acm.org/10.1145/1978942.1978976
45. Albers, C.: Mapas de las Provincias y Regiones de Chile. Cartograf´ıa Rulamahue. Available from:
http://www.rulamahue.cl/ [Accessed 18-October-2017] (2016)
46. Hallin, D.C., Mancini, P.: Comparing Media Systems: Three Models of Media and Politics. Communication,
Society and Politics. Cambridge University Press, ??? (2004).
https://books.google.it/books?id=954NJChZAGoC
47. Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001)
48. Wikipedia: Lo Prado. Wikipedia, The Free Encyclopedia. Available from:
https://es.wikipedia.org/wiki/Lo_Prado [Accessed 12-August-2017] (2017)
49. Wikipedia: San Miguel (Chile). Wikipedia, The Free Encyclopedia. Available from:
https://es.wikipedia.org/wiki/San_Miguel_(Chile) [Accessed 12-August-2017] (2017)
50. Orellana, A.: Icvu 2017: ´ındice de calidad de vida urbana. comunas y ciudades de chile. Technical report,
Instituto de Estudios Urbanos y Territoriales. Pontificia Universidad Cat´olica de Chile, Santiago, Chile (2017).
Available from: http://fadeu.uc.cl/images/noticias/2017/05.Mayo/Presentacion_ICVU_2017_.pdf
[Accessed 10-January-2018]
51. von Baer, H., Torralbo, F.: Chile descentralizado y desarrollado: Fundamentos y propuestas para construir una
pol´ıtica de estado en descentralizaci´on y desarrollo territorial en chile. 95 propuestas para un Chile mejor
(2013). Available from:
http://95propuestas.cl/site/wp-content/uploads/2013/05/chile-descentralizado-y-desarrollado-heinrich-von-baer-y-felipe-torralbo.pdf
[Accessed 10-January-2018]
52. de Chile, B.C.: Cuentas Nacionales de Chile. PIB Regional 2016. Available from:
http://www.bcentral.cl/documents/20143/32019/CCNNPIB_Regional2016.pdf [Accessed
30-December-2017] (2017)
53. Wikipedia: Radio Cooperativa (Chile). Wikipedia, The Free Encyclopedia. Available from:
54.
https://es.wikipedia.org/wiki/Radio_Cooperativa_(Chile) [Accessed 30-December-2017] (2017)
Ipsos: Ranking General de Audiencia Gran Santiago. Ipsos Radio 2016. Available from:
http://www.ipsos.cl/ipsosradioalaire/pagdos.htm [Accessed 30-December-2017] (2015)
55. Fundaci´on Democracia y Desarrollo: El Quinto Poder. FD+D. Available from:
http://www.elquintopoder.cl/ [Accessed 30-December-2017] (2010)
56. Anderson, S.P., McLaren, J.: Media mergers and media bias with rational consumers. Journal of the European
Economic Association 10(4), 831–859 (2012)
57. Besley, T., Prat, A.: Handcuffs for the grabbing hand? media capture and government accountability. American
Economic Review 96(3), 720–736 (2006)
58. Cesare, N., Grant, C., Nsoesie, E.O.: Detection of user demographics on social media: A review of methods and
recommendations for best practices. CoRR abs/1702.01807 (2017)
Figures
Tables
Elejalde et al.
Page 18 of 19
(a) All news outlets
(b) Local news outlets
(c) National news out-
lets
Figure 2: Distribution of the correlation coefficients (Gravity Model vs.
Ground-Truth). First we show the distribution for all outlets in our database and
them the distribution for two separate classes: Local-scope and National-scope news
outlets
Figure 3: Learning curve of the Random Forest regressor model for the top
25 news outlets in Santiago. Each step represents the average of 100 iterations
of shuffle split cross-validation with 20% of the data for validation.
Table 1: Summary of news outlets and football players followers on Twitter.
Unique users
Users w/ non-empty location
Users w/ useful location
Users w/ GPS coord
Users w/ high confidence location
# Outlets' Followers # Players' Followers
6,568,769 (100%)
2,434,183 (37%)
540,828 (8%)
2,041 (0.03%)
383,207 (6%)
4,943,351 (100%)
1,579,068 (31%)
996,326 (20%)
4,829 (0.1%)
597,981 (12%)
Table 2: Stats about the news outlets' correlation coefficients.
Category
Outlets
w/ nacional scope
w/ local scope
located in Santiago
w/ nacional scope & located in Santiago
Total
402
133
269
156
126
ρ > 0.7
203
23
180
29
18
ρ < 0.2
141
94
47
108
93
Table 3: Correlation between features
Feature
right-leaning
income
distance
right-leaning
1.00
0.59
-0.48
income
0.59
1.00
-0.35
distance
-0.48
-0.35
1.00
Figure 4: Explained variance using the regressor model for the top 25
news outlets in Santiago.
(a) Number of follow-
ers vs. Right-leaning
(b) Number of follow-
ers vs. Avg. Income
(c) Number of follow-
ers vs. Distance
Figure 5: Distribution of the KT correlation for communes in the
Metropolitan Region for the top 25 news outlets.
Figure 6: KT correlation for communes in the Metropolitan Region for
the top 25 news outlets. Each feature is correlated with the number of followers'
ranking
Elejalde et al.
Page 19 of 19
Figure 7: KT correlation for communes in the Metropolitan Region for top
25 newspapers. Each feature is correlated with the number of followers ranking
Figure 8: KT correlation for communes in the Metropolitan Region com-
paring News Outlets and Football players behaviour. Each feature is corre-
lated with the number of followers' ranking of the corresponding dataset.
|
1901.03829 | 1 | 1901 | 2019-01-12T09:05:34 | Predicting Diffusion Reach Probabilities via Representation Learning on Social Networks | [
"cs.SI",
"cs.LG",
"stat.ML"
] | Diffusion reach probability between two nodes on a network is defined as the probability of a cascade originating from one node reaching to another node. An infinite number of cascades would enable calculation of true diffusion reach probabilities between any two nodes. However, there exists only a finite number of cascades and one usually has access only to a small portion of all available cascades. In this work, we addressed the problem of estimating diffusion reach probabilities given only a limited number of cascades and partial information about underlying network structure. Our proposed strategy employs node representation learning to generate and feed node embeddings into machine learning algorithms to create models that predict diffusion reach probabilities. We provide experimental analysis using synthetically generated cascades on two real-world social networks. Results show that proposed method is superior to using values calculated from available cascades when the portion of cascades is small. | cs.SI | cs |
Predicting Diffusion Reach Probabilities via Representation
Learning on Social Networks
Furkan Gursoy
Ahmet Onur Durahim
[email protected]
[email protected]
Dept. of Management Information Systems
Bogaziçi University
Istanbul, Turkey
Abstract
Diffusion reach probability between two nodes on a network is defined as the probability of a cascade
originating from one node reaching to another node. An infinite number of cascades would enable
calculation of true diffusion reach probabilities between any two nodes. However, there exists only a
finite number of cascades and one usually has access only to a small portion of all available cascades.
In this work, we addressed the problem of estimating diffusion reach probabilities given only a limited
number of cascades and partial information about underlying network structure. Our proposed strategy
employs node representation learning to generate and feed node embeddings into machine learning
algorithms to create models that predict diffusion reach probabilities. We provide experimental analysis
using synthetically generated cascades on two real-world social networks. Results show that proposed
method is superior to using values calculated from available cascades when the portion of cascades is
small.
Keywords Social Networks · Information Networks · Representation Learning · Influence Maximization
1 Introduction
Social networks play an increasingly important role in our daily lives, and in the world in general. Politics,
business, and other matters of our lives are significantly shaped by social influence that we are exposed to via the
social networks we are part of. The world has evolved to be a place where information can spread very quickly
and easily through cascades. Information cascades in social networks can be modeled by stochastic models such
as Markov random fields (Domingos & Richardson, 2001), Independent Cascade Model (ICM), Linear Threshold
Model (LTM) (Kempe, Kleinberg, & Tardos, 2003), or deterministic models such as Deterministic LTM (Gursoy
& Gunnec, 2018). In this work, we employ ICM which is one of the most commonly studied diffusion model in
the literature.
Independent Cascade Model (ICM) assumes that diffusion time steps are discrete. At any time, a node can be
either active (i.e., influenced) or inactive. An active node may attempt to activate a neighboring inactive node
only once, and a node cannot become inactive later once it is active (i.e., a progressive model). The process starts
with some initially active nodes which serve as the seed nodes. A node v that is activated at time t tries to activate
Citation: Gursoy, F., & Durahim, A. O. (2018). Predicting Diffusion Reach Probabilities via Representation Learning on Social
Networks. Proceedings of the 5th International Management Information Systems Conference. doi:10.6084/m9.figshare.7565894
1
Figure 1: Independent Cascade Model
its inactive neighbor nodes at time t + 1. The attempt is successful with probability pvu. The process runs until
the time step where no more nodes get activated.
Figure 1 illustrates the diffusion process in ICM. B is selected as the seed node and activated at t = 0. It then
attempts to activate its neighbors. A, C, and E have activation probabilities of pBA, pBC, and pBE respectively.
At t = 1, only A is activated by B; and B cannot activate any of its neighbors anymore. A then proceeds to
activate D in a similar fashion. After D attempts to activate its neighbors and activate G, the diffusion terminates
since there does not remain any active node which can attempt to activate neighbors.
Diffusion reach probability between two nodes can be defined as the probability of the cascade originating
from a node reaching to the other node, by traversing the nodes between them if there are any. An infinite number
of cascades would enable calculation of diffusion reach probabilities, however there exists only a finite number of
cascades, and in general only a limited portion of them are accessible. Predicting such probabilities is, therefore,
a nontrivial problem.
Machine learning might be utilized in such prediction tasks. However, most machine learning algorithms
require input data to be in a tabular form in which rows represent cases and columns represent feature space.
The choice of the feature set has a significant effect on the performance of a machine learning model. Hence, a
considerable amount of effort is actually spent on engineering better features. Representation learning is a way of
automatically discovering important features which replaces the time consuming manual feature engineering.
Representation learning in social networks is concerned about finding learning methods which can embed nodes
to a latent space in a way that the resulting embeddings contain maximum information within a reasonable
dimensionality. These learned latent features then can be used in machine learning tasks.
2 Related Work
Apart from the earlier matrix factorization methods, seminal algorithm of Perozzi, Al-Rfou, & Skiena (2014)
named DeepWalk paved the way for most of the future studies. DeepWalk is a random walk-based method, to
learn latent representations of vertices in a network by optimizing the probability of nodes occurring in the same
random walk using gradient descent. Tang et al. (2015) proposed Large-scale Information Network Embedding
(LINE) which considers first-order proximity (i.e., sharing a tie) in addition to second-order proximity (i.e.,
sharing the neighborhood). This way, LINE improved DeepWalk which only considers second-order proximity.
Improving this line of work even further, Grover & Leskovec (2016) proposed node2vec which generates biased
2
random walks by trading-off between depth-first search and breadth-first search. Hence, node2vec is able to
discover a more diverse neighborhood structure.
There are number of other studies which considers context of links and nodes (Tu, Liu, Liu, & Sun, 2017),
node attributes (Huang, Li, & Hu, 2017); or focuses on developing a meta-strategy (Chen, Perozzi, Hu, & Skiena,
2017). On the other hand, Tu, Zhang, Liu & Sun (2016) and Wang, Cui, & Zhu (2016) develop semi-supervised
representation learning algorithms.
Another line of work in representation learning is concerned specifically with its applications related to
information diffusion in social networks. Works of Bourigault, Lamprier, & Gallinari (2016) and Li, Ma, Guo,
& Mei (2017) are among such studies which aims to predict diffusion probabilities or make use of existing
information diffusion cascades in creating latent representations.
Overall, the use of representation learning for information diffusion in social networks is a promising field.
There is an ample space for development of more sophisticated algorithms, extending the existing problems to
cover different problem settings, and applications of those methods in different fields including interdisciplinary
works.
3 Methodology
The main objective of this study is to predict the probability of a new diffusion cascade, on a given a directed
social network G(V, E), originating from a node u reaching to any other node v given partial information on
underlying network structure, only the connections and directions but not the strengths, and limited number of
cascades on the actual network. Here, the ith cascade, Ci, contains timestep-node pairs (t, Vt) where Vt contains
nodes v ∈ Vt that are activated at time t.
3.1 Dataset Generation
Diffusion cascades are synthetically created under ICM using real-world graph datasets. Email-Eu-core (Leskovec,
Kleinberg, & Faloutsos, 2007) is a directed network generated from internal email data of a large European
research institution. There is an edge (u, v) in the network if person u sent person v an email. Bitcoin Alpha
(Kumar, Spezzano, Subrahmanian, & Faloutsos, 2016) is the who-trusts-whom directed network of people who
trade using Bitcoin on a platform called Bitcoin Alpha. Number of nodes and links for each network is shown in
Table 1.
Diffusion cascades are created in the following way. We assign activation probabilities puv, the probability
that node u activates node v, randomly between 0 and a selected value maxp. Then, for each node v ∈ V , number
r of cascades are initiated by activating v. The diffusion takes place according to the ICM. In this way, total of
V r cascades are generated for each dataset.
Note that, the activation probabilities which are assigned for generating diffusion cascades are assumed to be
unknown in the rest of the study. As far as the rest of the study concerns, the cascades are treated to be generated
by some unknown processes or taken from real-world cascades.
Table 1: Graphs used in the study
Email-Eu-core
Bitcoin Alpha
# of nodes # of links
25,571
24,186
1005
3783
3
Algorithm 1 Actual Diffusion Probability Calculation
Input: C: a cascade list where C[i][j][k] is the kth node activated at time j for the cascade i, x: number of
cascades, y: number of timesteps a particular cascade diffuses for, z: number of nodes a cascade contains at
a particular timestep, r: number of cascades for each node
for j = 1 to y do
for k = 1 to z do
M [C[i][1][1]], [C[i][j][k]]+ = 1
1: M ← a zero matrix to count how many times each node appeared in all cascades for given seed nodes
2: for i = 1 to x do
3:
4:
5:
6:
7:
8: end for
9: for i = 1 to V do
10:
11:
12:
13: end for
Output: A, where A[i, j] is the actual diffusion probability from node i to node j
for j = 1 to V do
A[i, j] = M [i, j]/r
end for
end for
end for
3.2 Proposed Method
Our proposed method aims to predict diffusion probabilities between any two nodes regardless of whether they
are neighbors or not. Thus, to measure accuracy, we need actual and predicted values. The actual diffusion
probability between u and v is assigned as P (vV∗,0 = {u}) that is the probability of v occurring in a cascade
started from u. The algorithm for calculating actual reach probabilities is given in Algorithm 1. Note that,
as r approaches to infinity, our actual values approach to their true values. Therefore, it is important to make
the distinction between true values, actual values, label values, and predicted values. Actual values are indeed
estimations of true values. Since we assume that we can not precisely know the true activation values, computing
the actual values from all generated cascades allows us to obtain some accuracy scores by comparing them with
the predicted values. Label values, on the other hand, are calculated using only a portion of all cascades and used
in training of the model. Label values are calculated in the same way as actual values.
The node embeddings are generated by node2vec algorithm. Given a node embedding ev for node v and node
embedding eu for node u, link embedding evu is created by concatenating ev and eu. Note that, link embeddings
are created for every node pair regardless of whether they are neighbors in the network or not.
Machine learning models from Python's scikit-learn library are then used to train the models. Link embeddings
are used as features and corresponding label probabilities are used as target values. There are as much as
V (V − 1) link embeddings since there is an embedding for each node pair.
The source code and datasets employed in this study are available at furkangursoy.github.io
4 Experimental Results
For each graph, two cascade sets are generated: one with random activation probabilities between 0 and 0.05, and
the other one with probabilities between 0 and 0.1. Therefore, we obtain a total of 4 different cascade sets. Each
cascade set contains V r different cascades where r = 20 for the purposes of our experimental analysis.
For each cascade set, label values are calculated based on portions of all cascades in the given cascade set.
10%, 20%, 40%, and 60% of all cascades are considered. The cascades are selected randomly from all cascades,
resulting in different number of cascades for different seed nodes. This effectively results in 4 different sets of
4
label values (e.g., diffusion probabilities) for each cascade set. The intuition behind this is that; one has access
only to a portion of all information cascades in real life. In total, we obtain 16 datasets to train our machine
learning models.
Parameters of node2vec are set as follows: directed network, 128 dimensions (i.e., number of latent features),
walk length of 20, and window size of 5.
Performance results are measured by Mean Absolute Error (MAE) and presented in Table 2. In the table, BM
is an abbreviation for Benchmark and its value is calculated by comparing label values with actual probabilities.
GrdBst is an abbreviation for Gradient Boosting, MLP is an abbreviation for Multilayer Perceptron. Performances
of GrdBst and MLP is calculated by comparing predicted values with actual probabilities. Since it takes
excessively long time for GrdBst to train, GrdBst experiments are not performed for Bitcoin Alpha.
Table 2: Performance Results (MAE scores)
Activation Prob. Cascade Portion BM GrdBst MLP
(0, 0.05)
(0, 0.1)
10%
20%
40%
60%
10%
20%
40%
60%
Email-Eu-core
Bitcoin Alpha
BM MLP
0.0874 0.0538 0.0592 0.0013 0.0017
0.0667 0.0508 0.0514 0.0012 0.0015
0.0419 0.0498 0.0478 0.0009 0.0012
0.0272 0.0492 0.0460 0.0006 0.0014
0.1860 0.1118 0.1445 0.0210 0.0176
0.1219 0.0992 0.1055 0.0177 0.0164
0.0707 0.0959 0.0850 0.0118 0.0163
0.0459 0.0952 0.0867 0.0076 0.0175
If the portion rate was 100%, Benchmark error would be zero by definition. Accordingly, as the ratio of
available cascades increases, performance of Benchmark gets better. However, when the available portion
of cascades is smaller, machine learning algorithms perform better than the benchmark; which confirms our
hypothesis that information extracted from the underlying network structure helps in predicting the diffusion
reach probabilities in case of having only a portion of all cascades.
In experiments for Email-Eu-core dataset, when 10% of cascades are available, error rate of GrdBst is 38%
to 40% lower than error rate of BM whereas error rate of MLP is 22% to 32% lower. When available cascade
portion is 20%, error rates of GrdBst and MLP are 19% to 24% and 14% to 23% lower than error rate of BM,
respectively. Similar results hold for experiments on Bitcoin Alpha network when activation probabilities are
set between 0 and 0.1. In both networks, when available portion of cascades increases beyond 40%, Benchmark
begins to outperform our strategy. The experiments on Bitcoin Alpha with activation probabilities between 0 and
0.1 seem to be an exception among all experimental results. Therefore, as desired, our strategy works well for the
cases where number of cascades is limited.
When performances of GrdBst and MLP methods are compared in Email-Eu-core experiments, it can be
seen that MLP has a more varying performance compared to GrdBst when available cascade portions change.
Thus, the performance of GrdBst is less dependent on the portion of cascades whereas performance of MLP is
influenced more by it. MLP outperforms GrdBst when there is a larger number of cascades, however; in the cases
where MLP performs better than GrdBst, BM outperforms both.
Experiments are performed on a computer with Intel Xeon CPU @ 2.40 GHz, and 64 GB memory. The
average runtimes for training the learning models is given in Table 3. In addition to differences between the two
algorithms, runtime of MLP is shorter since it works in parallel whereas GrdBst works on a single core. On the
other hand, the large runtime differences between the two graphs are due to the size of the training data. Number
of rows in the training data is proportional to the square of number of nodes. Accordingly, training data from
Bitcoin Alpha has approximately 14 times more rows compared to that of Email-Eu-core.
5
Table 3: Runtime Results
Email-Eu-core
MLP
Bitcoin Alpha
MLP
GrdBst
≈ 2 hours ≈ 10 minutes > 1 day ≈ 2.5 hours
GrdBst
5 Conclusion
In this work, we proposed a strategy which utilizes representation learning for predicting diffusion reach
probabilities between nodes using the available cascade information on the network. Our work is novel in a sense
that it aims to predict diffusion probabilities between any nodes regardless of whether they are neighbors or not, in
comparison to previous literature where probabilities between neighboring nodes are of concern. Also, utilization
of representation learning in diffusion probability prediction is, to the best of our knowledge, a novel strategy.
Experimental analyses showed that MAE of our method is up to 40% lower than that of the benchmark
when available portion of cascades is 10%, and up to 24% lower when portion of cascades is 20%. Hence, our
novel strategy stands out as a promising method in predicting diffusion reach probabilities when only partial
information about cascades and underlying network structure is available.
Once the diffusion probabilities between all nodes are predicted, one can utilize this information to estimate
diffusion cascades and design viral marketing campaigns accordingly. For instance, in deciding which seed set
to hire among the candidate seed sets for an influencer marketing campaign in an online social network, the
marketers can compare the estimated future cascades originated from these different seed sets. This can also be
used in targeted campaigns where the final cascades are compared based on desired characteristics the nodes in
those cascades have.
Furthering the current work, we plan to improve on two aspects of this methodology. First, generation
of link embeddings can be improved in a way that the latent representation contain more and better suiting
information for the problem of diffusion reach probability prediction. Second, created models can be improved
by experimenting with variety of machine learning algorithms as well as by designing a better training data (e.g.,
in terms of imbalance). Moreover, scalable methods should be developed to accommodate larger networks.
6 Acknowledgement
This research was partially supported by Bogazici University Research Fund (BAP), Project Number: 15N03SUP2.
6
References
Bourigault, S., Lamprier, S., & Gallinari, P. (2016). Representation learning for information diffusion through
social networks. Proceedings of the Ninth ACM International Conference on Web Search and Data Mining -
WSDM 16.
Chen, H., Perozzi, B., Hu, Y., & Skiena, S. (2017). HARP: hierarchical representation learning for networks.
arXiv preprint arXiv:1706.07845.
Domingos, P., & Richardson, M. (2001). Mining the network value of customers. Proceedings of the Seventh
ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD 01.
Grover, A., & Leskovec, J. (2016). Node2vec: Scalable feature learning for networks. Proceedings of the 22nd
ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD 16.
Gursoy, F., & Gunnec, D. (2018). Influence maximization in social networks under deterministic linear threshold
model. Knowledge-Based Systems.
Huang, X., Li, J., & Hu, X. (2017). Accelerated attributed network embedding. Proceedings of the 2017 SIAM
International Conference on Data Mining, 633-641.
Kempe, D., Kleinberg, J., & Tardos, É. (2003). Maximizing the spread of influence through a social network.
Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining -
KDD 03.
Kumar, S., Spezzano, F., Subrahmanian, V. S., & Faloutsos, C. (2016). Edge weight prediction in weighted signed
networks. 2016 IEEE 16th International Conference on Data Mining (ICDM).
Leskovec, J., Kleinberg, J., & Faloutsos, C. (2007). Graph evolution: Densification and shrinking diameters.
ACM Transactions on Knowledge Discovery from Data, 1(1).
Li, C., Ma, J., Guo, X., & Mei, Q. (2017). DeepCas: an end-to-end predictor of information cascades. Proceedings
of the 26th International Conference on World Wide Web - WWW 17.
Perozzi, B., Al-Rfou, R., & Skiena, S. (2014). Deepwalk: Online learning of social representation. Proceedings
of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD 14.
Tang, J., Qu, M., Wang, M., Zhang, M., Yan, J., & Mei, Q. (2015). Line: Large-scale information network
embedding. Proceedings of the 24th International Conference on World Wide Web - WWW 15.
Tu, C., Liu, H., Liu, Z., & Sun, M. (2017). CANE: Context-aware network embedding for relation modeling.
Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long
Papers).
Tu, C., Zhang, W., Liu, Z., & Sun, M. (2016, July). Max-Margin DeepWalk: Discriminative learning of network
representation. In IJCAI (pp. 3889-3895).
Wang, D., Cui, P., & Zhu, W. (2016, August). Structural deep network embedding. In Proceedings of the 22nd
ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 1225-1234). ACM.
7
|
1711.05315 | 1 | 1711 | 2017-11-14T21:16:00 | Ranking of nodes of networks taking into account the power function of its weight of connections | [
"cs.SI",
"cs.NI",
"physics.soc-ph"
] | To rank nodes in quasi-hierarchical networks of social nature, it is necessary to carry out a detailed analysis of the network and evaluate the results obtained according to all the given criteria and identify the most influential nodes. Existing ranking algorithms in the overwhelming majority estimate such networks in general, which does not allow to clearly determine the influence of nodes among themselves. In the course of the study, an analysis of the results of known algorithms for ranking the nodes of HITS, PageRank and compares the obtained data with the expert evaluation of the network. For the effective analysis of quasi-hierarchical networks, the basic algorithm of HITS is modified, which allows to evaluate and rank nodes according to the given criteria (the number of input and output links among themselves), which corresponds to the results of expert evaluation. It is shown that the received method in some cases provides results that correspond to the real social relation, and the indexes of the authorship of the nodes - pre-assigned social roles. | cs.SI | cs | Ranking of nodes of networks taking into account the power
function of its weight of connections
Soboliev A.M. 1, Lande D.V. 2
1 Post-graduate student of the Institute for Special Communications and Information Protection
2 Institute for Special Communications and Information Protection of NTUU «KPI named. Igor
of NTUU «KPI named. Igor Sikorsky»
[email protected], [email protected]
Sikorsky»
Abstract. To rank nodes in quasi-hierarchical networks of social nature, it is
necessary to carry out a detailed analysis of the network and evaluate the results
obtained according to all the given criteria and identify the most influential
nodes. Existing ranking algorithms in the overwhelming majority estimate such
networks in general, which does not allow to clearly determine the influence of
nodes among themselves. In the course of the study, an analysis of the results of
known algorithms for ranking the nodes of HITS, PageRank and compares the
obtained data with the expert evaluation of the network. For the effective
analysis of quasi-hierarchical networks, the basic algorithm of HITS is
modified, which allows to evaluate and rank nodes according to the given
criteria (the number of input and output links among themselves), which
corresponds to the results of expert evaluation. It is shown that the received
method in some cases provides results that correspond to the real social
relation, and the indexes of the authorship of the nodes - pre-assigned social
roles.
Keywords: quasi-hierarchical networks of social nature, network subjects,
ranking algorithm, HITS method, PageRank method, nodes ranking, matrix,
F-measure, expert evaluation.
1.
Introduction
At present, when social networks are a component of society and are one of the
mechanisms of influence on it, it is necessary to clearly understand all the possible
risks that arise from it and be prepared for serious consequences in case of careless
attitude to this situation. The expression "social networks" not only relates to social
networks from the Internet, which are used as a means of communication, but also all
communications that occur between people (social entities) for the transmission of
information.
Also, it should be noted that the social network should be understood as a network,
the nodes of which are social subjects (social subject), and contacts - contacts that are
accompanied by the exchange of information between them.
By definition, a quasi-hierarchical network should be considered a network that is
close to the hierarchical network, but its hierarchy is violated by a small number of
additional links.
2.
The purpose of the work
The purpose of this work is to describe and evaluate the effectiveness of the proposed
algorithm for ranking nodes of quasi-hierarchical networks of social nature, based on
the modification of the known HITS algorithm in comparison with other algorithms
for ranking nodes in the networks.
When ranking a social network, one must understand the process of organizing nodes
(social entities) on a specific basis, which allows one to determine the influence of the
given nodes among themselves.
For visual representation, this network is represented in the form of a directed graph,
in which nodes are markers of subjects (social network profiles, telephone numbers,
electronic mailboxes, etc.), and the links are directed to the links that occur between
them.
For a mathematical representation, such a graph is depicted in the form of a matrix of
adjacent nodes and the value in the cell of the matrix reflects the number of directed
bonds.
To determine the impact of the nodes and to demonstrate the use of the Hyperlink-
Induced Topic Search (HITS), consider a conventional hierarchical network of 6
nodes (Figure 1), to which each node will calculate the coefficients of auth and hub.
Fig. 1. Hierarchical network
Let us show the connections between nodes in the form of an adjacency matrix:
,
]
[
After the transposition we obtain the following matrix:
,
]
[
To calculate auth and hub of the basic HITS algorithm for data presented in the form
of matrices, we use the following iterative formulas [Amy N. Langville, Carl D. Meyer,
2006]:
( ) ( )
( ) ( )
,
Where ( ) ( ) - vectors containing coefficients of auth and hub for each
iteration k, over a certain number of repetitions.
We modify the above-mentioned formulas to ensure the ability to count auth and hub
indices independently of each other [Amy N. Langville, Carl D. Meyer, 2006]:
( ) ( )
( ) ( )
For
initialization of
the
formulas under
the
initial matrices
( ) ( )we use single vectors:
]
[
]
[
]
[
]
[
]
[
]
[
( )
( )
]
[
[
]
]
[
[
]
[
]
[
]
From the results of nodes ranking by the basic HITS algorithm we will conclude that
the fifth node contains the most relevant information, and nodes numbered 2 and 4 are
the most portable, that is, they have a link to the node that contains the most useful
information for a given search.
The considered graph consists of a small number of links, and in this case, it is
possible to visualize it and make the assumption that the most influential in this
network is node number 5, since it has the largest number of input and output links.
According to the HITS algorithm, two nodes are calculated for each network node:
mediation indicator (hub);
index of authorship (auth).
The mediation rate of the hub Ai of the node Aj of the network, consisting of n nodes,
is equal to the sum of the values of the authorship of the nodes to which it refers:
∑
The given formulas give a fast convergent iterative algorithm for calculating hub and
auth for all nodes in the network.
At a time when it comes to more complex networks (large-scale networks), where the
number of nodes can be more than 1000 (large organizations, etc.), it is almost
impossible without the special algorithms of the assumptions of the social actors that
act as leaders of different rank [Lande D.V., Nechaev A.O., 2015].
Scale-free networks have the characteristic such as the distribution of nodes, which is
defined as the probability that a node has a degree (the node's degree is the number of
edges associated with that node). It is the networks with the indicative distribution of
node degrees called scale-free, which are most often observed in real-life large
networks.
It should be noted that the number of links in the quasi-hierarchical networks of social
nature is equal to the number of nodes and this statement can be represented in the
following mathematical form:
( )
Where - the number of connections in the network, - the number of nodes in the
network.
If, when considering the quasi-hierarchical networks of social nature, there is a clear
(and also significant) one-way communication, then even there is no question as to
which of the pairs of nodes has a higher rank.
In these networks, there are three general variants of relations for a pair of nodes:
The subordinate leader;
Knots of the same rank;
Nodes of the lower rank have a direct connection with nodes of a higher rank.
In the case where subject A is the head of subject B in the social network it is
proposed to consider as the aggregate weight of factors, one of the criteria of which is
the time indicator.
It should be noted that the head is chaotic with the subordinates, if necessary, the task,
and the subordinate with a certain regular frequency reports on the implementation of
the completed assignment to the head.
In assessing the characteristics of the number of links, there is the fact that the head is
more often associated with subordinates, that is, the weight of the outgoing
communication from the head must exceed the weight of the incoming connection
[Lande D.V., Nechaev A.O., 2015].
It should be noted that only the generalized and most widespread template for
subordinate and manager contacts is considered. In real work, this template can be
supplemented in some cases by other specific characteristics, which will increase the
effectiveness of the weight estimation of pairs of nodes contacts [Liu Y.Y., Jean-
Jacques Slotine J.J., Barabasi A.L., 2012].
Occasionally, when a lower-level employee assists a higher-ranking employee in
work processes, or a higher-ranking manager gives the employee a much lower level
of hierarchy, this leads to the emergence of non-hierarchical links in such a network.
Such cases, as a rule, are not much to consider the network as quasi-hierarchical.
Meanwhile, the use of the basic HITS algorithm for ranking nodes in the above
mentioned network may not provide the desired result, because even a weak and
insignificant connection (if not taking into account its weight) can greatly affect the
portability and authorship of nodes [Bargh JA, Chen M., 1996].
You can use PageRank algorithms to rank nodes in social networks:
( ) ( ) ∑
( )
( )
Where PR(A) - the PageRank weight for page A, d - the attenuation factor PR(Ti)- the
PageRank weight of the page that points to page A, C(Ti)- the number of links from
this page, n - the pages linking to page A.
3.
Presentation of the main results
For the mathematical realization of the iterative principle of ranking nodes in large
quasi-hierarchical networks of social nature should be noted that the most influential
on the network entity is the one who has the largest number of outbound connections
with other network entities.
To demonstrate and determine the effectiveness of nodes ranking, consider the quasi-
hierarchical networks of social nature, which consists of 14 subjects (Figure 2),
between which certain links are known to be distributed, and we use the above-
mentioned algorithms and compare the results obtained with each other.
When ranking the network algorithm HITS in the final result we get two parameters:
auth and hub, which does not allow to reject the network at the same time according
to two criteria. To solve this question, you must use a metric that combines
information about auth and hub of our algorithm. It is by such a metric that we use the
F-measure:
( )
Where ( ) - F-measure of node Aj network, hub Ai - mediation indicator auth Ai -
index of authorship.
Fig. 2. Quasi-hierarchical network of social character
Table 1. Results of ranking of network nodes using PageRank algorithms and the basic HITS
algorithm and expert assessment
Expert
evaluation
(No. node)
No.
node
PageRank
No.
node
1
2
3
9
5
11
4
12
10
13
6
14
7
8
2
11
1
3
9
6
10
13
7
14
12
8
5
4
0.167483
0.106627
0.089799
0.085644
0.076856
0.073306
0.067540
0.066458
0.063547
0.050122
0.042552
0.037723
0.037363
0.034981
2
11
9
3
5
6
12
1
10
13
14
7
4
8
HITS
auth
hub
F
0.153005
0.128415
0.056011
0.092896
0.094262
0.086066
0.050546
0.050546
0.036885
0.043716
0.075136
0.013661
0.087431
0.031421
Having analyzed the obtained results of network ranking (Table 1), it is evident that
the parameters of auth and hub are equal, since in the quasi-hierarchical networks of
social nature basically there are feedback links between nodes and the basic algorithm
of HITS does not provide the necessary result of ranking such networks. Also,
comparing the results of the algorithms of HITS and PageRank with expert
assessment data, it can be argued that in the basic form, the above-mentioned
algorithms are ineffective for ranking nodes in the quasi-hierarchical networks of
social nature.
PageRank takes into account only inbound links and does not distinguish between
such an entity as an intermediary, which has a significant impact on the overall result,
since minor links in the network can radically change it.
To adapt the method, it is proposed to use the modified HITS algorithm and, in
calculating each indicator of the network nodes, take into account the weight of the
ribs. At the same time, the uneven distribution of weight values may affect the
reliability of the result, therefore their value must be reduced by multiplying by some
monotonically increasing function, less steep than linear. Within the framework of the
proposed algorithm, as a function, we use the modified HITS algorithm and modify
the formulas by summing up the weight of the links between the nodes and from this
follows:
∑
∑
Where hub is the mediation rate of the node of the network, auth is the
index of authorship of the node , is the weight of the links between the nodes
and (respectively, between the nodes and )), is the degree.
Table 2. Results of ranking of network nodes with modified PageRank algorithm and expert
Expert
evaluation
(No. node)
No.
node
1
2
3
9
5
11
4
12
1
2
3
9
5
11
4
12
assessment
HITS
auth
hub
F
0.100370
0.787807
0.041181
0.020522
0.014123
0.006428
0.011803
0.007220
0.731910
0.059213
0.111308
0.029625
0.036793
0.022866
0.003188
0.001528
0.176532
0.110147
0.060119
0.024247
0.020411
0.010036
0.005020
0.002522
10
13
6
14
7
8
10
13
6
14
7
8
0.002461
0.001983
0.003320
0.002637
0.000097
0.000048
0.001232
0.001163
0.000620
0.000333
0.000212
0.000008
0.001642
0.001466
0.001044
0.000591
0.000134
0.000014
Having evaluated the results of the modified HITS algorithm at ( ) (Table 2)
with expert assessment data, it can be argued that they coincide with each other and
the modified HITS method is effective in the overall assessment in the quasi-
hierarchical networks of social nature. For a detailed assessment of the network, it is
necessary to analyze the obtained results of auth and hub with experts data, since even
minor relationships can significantly affect the ranking of results and the
identification of the most significant nodes in the network.
Table 3. Results of ranking of network nodes with modified PageRank algorithm and expert
assessment.
Expert
evaluation
(No. node)
No. node
(auth)
No. node
(hub)
1
2
3
9
5
11
4
12
10
13
6
14
7
8
2
1
3
9
5
4
12
11
6
14
10
13
7
8
1
3
2
5
9
11
4
12
10
13
6
14
7
8
After studying the results (Table 3), it can be argued that the numbers of the most
significant redirected nodes according to auth and hub are different from the results of
the expert assessment and require the correction of degree a in the above formula. To
evaluate the network, use the parameter
and carry out a repeated study.
Table 4. Results of ranking of network nodes with modified PageRank algorithms and expert
assessment.
HITS,
HITS,
No. node
No. node
(auth)
(hub)
2
1
3
9
5
11
4
12
6
14
10
13
7
8
1
3
2
5
9
11
4
10
12
13
6
14
7
8
F
1
2
3
9
5
11
4
12
10
13
6
14
7
8
No. node
No. node
(auth)
(hub)
1
2
3
9
5
11
12
4
6
14
13
10
7
8
1
3
2
5
9
11
10
4
13
12
6
14
7
8
F
1
3
2
9
5
11
4
12
10
13
6
14
7
8
Expert
evaluation
(No. node)
1
2
3
9
5
11
4
12
10
13
6
14
7
8
In the process of studying the results obtained in table 4 modified HITS algorithm,
there is a significant difference in the calculated parameters and it is determined that
when using the parameter
, the modified method in a number of cases provides
results that correspond to the real social relation and the auth is sufficiently accurate
to show the hierarchical dependence of the subjects among themselves on the network
.
It should be noted that this modified algorithm with the value of the parameter
was used to study twenty different quasi-hierarchical networks, and the obtained
results of the indices corresponded to the given reality.
Conclusions
The concept of quasi-hierarchical networks of social character is introduced in the
work and the nature of connections in such networks is investigated.
The research of the efficiency of the basic and modified HITS algorithms for ranking
of nodes of quasi-hierarchical networks of social character in comparison with the
PageRank algorithm on the given network was conducted.
In practical application it is shown that the modified algorithm provides in some cases
the results that correspond to the real social relation, and the auth of the nodes - their
hierarchical importance among themselves.
Reference
1.
2.
3.
4.
5.
Lande D.V., Nechaev A.O., Algorithm of ranking of nodes of quasi-hierarchical
networks of social character // Problems of informatization and management: a
collection of scientific works: Vip. 1 (49). - K.: NAU, 2015. - P. 46-50.
Bargh JA, Chen M., Burrows L. Automaticity of Social Behavior: Direct Effects of
Trait Construct and Stereotype Activation on Action // Journal of Personality and
Social Psychology, 1996. - 71. - No. 2. - P. 230- 244
Kleinberg J. Authoritative sources in a hyperlinked environment // Proceedings of the
ACMSIAM Symposium on Discrete Algorithms, Philadelphia, PA, 1998. - P. 668-
677.
Liu Y.Y., Jean-Jacques Slotine J.J., Barabasi A.L. Control centrality and hierarchical
structure in complex networks // PLOS ONE, 2012. - 7. - No. 9. - P. - e44459 (1-7).
Amy N. Langville, Carl D. Meyer, Google's PageRank and Beyond: The Science of
Search Engine Rankings, 2006, - P.115-121.
|
1110.1349 | 1 | 1110 | 2011-10-06T18:47:49 | Supporting the Curation of Twitter User Lists | [
"cs.SI",
"cs.CY",
"physics.soc-ph"
] | Twitter introduced lists in late 2009 as a means of curating tweets into meaningful themes. Lists were quickly adopted by media companies as a means of organising content around news stories. Thus the curation of these lists is important, they should contain the key information gatekeepers and present a balanced perspective on the story. Identifying members to add to a list on an emerging topic is a delicate process. From a network analysis perspective there are a number of views on the Twitter network that can be explored, e.g. followers, retweets mentions etc. We present a process for integrating these views in order to recommend authoritative commentators to include on a list. This process is evaluated on manually curated lists about unrest in Bahrain and the Iowa caucuses for the 2012 US election. | cs.SI | cs | Supporting the Curation of Twitter User Lists
Derek Greene, Fergal Reid
School of Computer Science & Informatics,
University College Dublin, Ireland
[email protected], [email protected]
1
1
0
2
t
c
O
6
]
I
S
.
s
c
[
1
v
9
4
3
1
.
0
1
1
1
:
v
i
X
r
a
Gavin Sheridan
Storyful
Dublin, Ireland
[email protected]
P´adraig Cunningham
School of Computer Science & Informatics,
University College Dublin, Ireland
[email protected]
Abstract
Twitter introduced lists in late 2009 as a means of curating tweets into meaningful
themes. Lists were quickly adopted by media companies as a means of organising
content around news stories. Thus the curation of these lists is important, they
should contain the key information gatekeepers and present a balanced perspective
on the story. Identifying members to add to a list on an emerging topic is a delicate
process. From a network analysis perspective there are a number of views on the
Twitter network that can be explored, e.g. followers, retweets mentions etc. We
present a process for integrating these views in order to recommend authoritative
commentators to include on a list. This process is evaluated on manually curated
lists about unrest in Bahrain and the Iowa caucuses for the 2012 US election.
1
Introduction
Media outlets that leverage the content produced by users of social media sites can now break or
cover stories as they evolve on the ground, in real time (e.g. videos, photographs, tweets). However,
a signicant issue arises when trying to (a) identify content around a breaking news story in a timely
manner (b) monitor the proliferation of content on a certain news event over a period of time, and
(c) ensure that content is reliable and accurate. Storyful1 is a social media news agency established
in 2009 with the aim of filtering news, or newsworthy content, from the vast quantities of noisy data
that streams through social networks. To this end, Storyful invests significant time into the manual
curation of content on social media networks, such as Twitter and YouTube. In some cases this
involves identifying "gatekeepers" who are prolific in their ability to locate, filter and monitor news
from eyewitnesses.
Twitter users can organise the users they follow into Twitter lists. Storyful maintains lists of users
relevant to a given news story, as a means of monitoring breaking news related to that story. Often
these stories generate community-decided hashtags (e.g. #occupywallstreet) -- but even with small
news events, using such hashtags to track the evolution of a story becomes difficult. Spambots
quickly intervene, while users with no proximity (in space, time or expertise) to the news story
itself drown out other voices. Manual curation of lists is one way to overcome this problem, but
is time consuming, and risks incomplete coverage. In order to support the list curation process,
we propose methods for identifying the important users that form the "community" around a news
story on Twitter. Specifically, given a small seed list of users supplied by a domain expert, we are
interested in using network analysis techniques to expand this set to produce a user list that provides
1http://www.storyful.com
1
comprehensive coverage of the story. The motivation is that the members of this list will provide
additional valuable content relating to the story.
A number of authors have considered the related problem of producing personal recommendations
for additional users to follow on Twitter, either by following user links or performing textual analysis
of tweet content. Hannon et al. [3] proposed a set of techniques for producing personal recommen-
dations on users to follow, based on the similarity of the aggregated tweets or "profiles" of users
that are connected to the ego in the Twitter social graph. Such techniques have primarily relied on a
single view of the network to produce suggestions. However, we can view the same Twitter network
from a range of different perspectives. For instance, Conover et al. [2] performed an analysis of
Twitter data based on references to other Twitter screen names in a tweet, while researchers have
also looked at the diffusion of content via retweets to uncover the spread of memes and opinions
on Twitter [2, 6]. The idea is that both mentions and retweets provide us with some insight of the
differing interactions between microblogging users.
In Section 2 we describe a set of recommendation criteria and network exploration methods used
to support user list curation on Twitter. Rather than using a single view of the network to produce
recommendations, we employ a multi-view approach that produces user rankings based on different
graph representations of the Twitter network surrounding a given user list, and combines them using
an SVD-based aggregation approach [10]. Information from multiple views is also used to control
the exploration of the Twitter network -- this is an important consideration due to the limitations sur-
rounding Twitter data access. To verify the accuracy of the resulting recommendations, in Section 3
we describe experiments performed on a previously-curated Twitter list relating to coverage of the
Iowa caucuses in advance of the 2012 US Presidential Election. In Section 4 we investigate whether
a "silo" effect arises in cases where a user list is expanded from an initial seed list with a strong bias
towards a particular perspective on a story. We do this by evaluating the proposed recommendation
techniques on subsets of a previously-curated list covering the current political situation in Bahrain.
This study motivates further work in this area, which is discussed in Section 5.
2 Methods
2.1 Bootstrapping
We now describe our proposed system for supporting user list curation. The initial input to the
system is a seed list of one or more users that have been manually labelled as being relevant to a
particular news story. Once a seed list has been supplied, the first operation of the system involves
a bootstrapping phase, which retrieves follower ego networks around all seed list members. Other
information regarding these users is also retrieved -- such as user list membership information and a
limited number of tweets. The extent of the exploration process can be controlled by setting an upper
limit for the number of links to follow and tweets to retrieve -- these parameters control the trade-off
between network exploration depth and the number of queries required. The latter is an important
consideration, not only in terms of running time, but also due to the fact that Twitter employs a quota
system that limits the number of permitted API queries that can be made per hour.
After the bootstrap phase, the system will have two disjoint lists for the news story. The core set
contains curated Twitter accounts, initially this corresponds to the members of the seed list. The
candidate set contains Twitter accounts that are not in the core set, but exist in the wider network
around the core -- some of these users may potentially be relevant for curation, while others will be
spurious. Initially this will consist of the new non-seed users that were found during the bootstrap
phase.
2.2 Recommending Users
In the subsequent recommendation phase, a ranked list of the r top users from the candidate set is
produced. Firstly, we produce individual rankings using a number of criteria applied to different
graphs, each representing a different view of the same network. The motivation is that each view
potentially captures a different aspect of the relations between Twitter users around a given news
story. We construct four different views:
2
1. Core friend graph: This is a directed graph which contains nodes representing all users in
the core set, along with the non-core users who they follow.
2. Core mention graph: As an alternative network view, we analyse the non-core users men-
tioned by the users in the core set. Specifically, an edge links from a core node A to a
non-core node B if A has mentioned B in at least one tweet -- the weight of the edge corre-
sponds to the number of tweets. The idea here is that this directed, weighted mention graph
is a proxy for the dialogue between these Twitter users.
3. Core retweet graph: We also analyse retweeting activity by core users involving tweets
originally posted by non-core users. This involves the construction of a weighted, directed
graph, where an edge links from core node A to non-core node B if A has retweeted B's
tweets at least once -- the weight of the edge corresponds to the number of retweets.
4. Weighted co-listed graph: Another alternative view, which has not been widely explored in
the literature, is to look at relations based on the aggregation of co-assignments to Twitter
user lists. At an aggregate level, this could be regarded as a form of crowd-sourced curation,
where the assumption is that related pairs of users will be more frequently assigned to the
same list than users who have dissimilar to one another. Based on this idea, we construct
a weighted, undirected graph as follows. For each user list that has been identified, we
measure the overlap w between the list's members and the core set using the Jaccard set
similarity measure [4]. If w > 0 then, for each unique core/non-core pair of users in the
user list, we create an edge between these two users with weight w. If an edge between the
users already exists, we increment the weight on the edge by w.
The criteria that we use on these graphs are as follows:
1. In-degree: A simple approach for directed graphs is to look at the in-degree centrality of
each Twitter user. For weighted graphs, we calculate the sum of the weights on incoming
edges.
2. Normalised in-degree: Using standard in-degree centrality can potentially lead to the se-
lection of high-degree Twitter users who are not specialised in a particular geographic or
topical area. Our solution has been to introduce a normalisation factor to reduce the impact
of high degree nodes. The normalisation approach is similar to standard log-based TF-IDF
term weighting functions that are widely applied in text mining to reduce the influence
of frequently-occurring terms [7]. The normalised follower count value for the user u is
defined as:
nfc(u) = log (seed f ollowers(u)) · log
(cid:18) max f ollowers
(cid:19)
all f ollowers(u)
(1)
where
• seed f ollowers(u) = the number of users in the core set that follow the user u.
• all f ollowers(u) = the total number of all users following the user u on Twitter.
• max f ollowers = a scaling factor, defined to be the largest number of Twitter follow-
ers among any of the core and non-core users.
3. HITS with priors: The HITS algorithm, originally proposed by [5], has been widely used
to assign hub and authority scores to each mode in graph, depending upon its the topology.
We can use the authority scores applied to a Twitter network to identify key users in that
network. Since we wish to focus on authority relative to our pre-curated core list, we use
the variation of HITS proposed by [9], which introduces prior probabilities for each node.
Specifically, each of the m users in the core list is given an initial probability 1/m, while
the other non-core nodes are given an initial probability of 0.
Naturally, certain criteria are only meaningful when applied to certain graphs. For the purpose of
the evaluations described in this paper, we use the following five combinations:
• Normalised degree applied to the core friend graph.
• HITS with priors applied to the core friend graph.
• Weighted in-degree applied to the co-listed, mention, and retweet graphs.
3
Figure 1: Overview of curation support system, illustrating the workflow between the bootstrap,
recommendation, and update phases.
2.2.1 Combining Rankings
The various graph/criterion combinations can potentially produce rankings of users that differ sig-
nificantly. To combine rankings, we use SVD-based aggregation, which has previously been shown
to be effective for this task [10]. We construct a matrix X from the ranks (rather than the raw scores),
with users on the rows and rankings on the columns. We then apply SVD to this matrix and extract
the first left singular vector. The values in this vector provide aggregated scores for the users. By
arranging these values in descending order, we can produce a final ranking of users. We select the
top r users to form our list of user recommendations. Finally, we can also apply additional filtering
of recommendations based on a minimum tweet count filter and a filter to remove users who have
not tweeted within a given time period.
After a set of recommendations has been generated, the ranked list of suggested users would be
presented to a human curator, who could then select a subset to migrate to the core set (i.e. to augment
the existing Twitter user list). The use of a "human in the loop" in the proposed system resembles
the role of the oracle in active learning algorithms for classification [8].
2.3 Network Exploration
Once the core set has been modified, the system enters the update phase, which modifies the current
copy of the network to reflect (a) changes in membership of the core set, and (b) any changes
in the Twitter network since the last update (e.g. addition/removal of follower links, new tweets).
Specifically, the network is explored using a process based both on the follower graph and also on
tweet content:
• For the current core set, retrieve their friend/follower links, user list memberships, and
recent tweets for all set members (i.e. same process as in the bootstrap phase).
• For the last set of recommended users who were not migrated to the core set, retrieve their
friend/follower links, user list memberships, and recent tweets.
• For the set of m users who were most frequently mentioned in tweets posted by the core
set, retrieve their friend/follower links, user list memberships, and recent tweets.
Again the extent of the exploration for each of the above can be controlled by setting maximum
values for the number of links to follow and tweets to retrieve. Once the local copy of the network
has been update, the data then feeds back to the recommendation phase and another iteration of the
recommendation-selection-update process is executed. A visual overview of the complete curation
system process is shown in Fig. 1.
3 Case Study 1: Iowa
3.1 Experimental Setup
First, we evaluated the proposed recommendation system on a Twitter user list previously curated
by Storyful, covering Iowa politics during the 2012 US Presidential Primaries2. At the time of
2http://twitter.com/#!/trailmix12/iowa
4
BootstrapCandidateSetRecommendUpdateRankedListCuratorCoreSet'SeedSetCandidateSet(a) Initial core set
(b) Final core set
Figure 2: Induced subgraph of the follower graph for the core set members in the Iowa dataset #1
after (a) the initial bootstrap phase, (b) six complete iterations. Larger nodes with a more saturated
colour are indicative of nodes with a higher in-degree (i.e. users with more followers within the core
set). Highlighted edges indicate reciprocated follower links between users. Layout positions are
preserved for both figures.
initial data collection -- 16 September 2011 -- this list contained 128 unique users. To evaluate
the robustness of the user recommendation process, we use cross validation, randomly dividing the
complete Iowa user list into four disjoint datasets, each containing 32 users. As an example, the
subgraph induced by the core set on the follower graph of Iowa dataset #1 is shown in Fig. 2(a) --
the positions of nodes were calculated using the force directed layout implementation provided by
Gephi [1].
In our experiments we applied the workflow shown in Fig. 1 to each of the sets individually for
six recommendation-selection-update iterations after the initial bootstrapping phase. Note that no
information was shared between the runs. The extent of network exploration during the update phase
was controlled using the following constraints:
• A maximum of up to 1,000 friend/follower links were retrieved per user at a given iteration.
• A maximum of up to 1,000 user lists were retrieved per user at a given iteration.
• A maximum of up to 1,000 tweets was retrieved per user at a given iteration.
• Very high-degree users > 50, 000 friends and/or 50,000 followers were filtered.
To generate recommendations, we used the views and criteria as described in Section 2. We filtered
the recommendations to remove those users who had not tweeted in the previous two weeks and/or
those who had posted fewer than 25 tweets in total. At each iteration we generated r = 50 recom-
mendations -- by the final iteration, users were selected from a complete candidate set with average
size of ≈ 62k users. At this stage, we had also collected an average ≈ 63k tweets and ≈ 138k
follower links for each dataset. In place of a manual curator, after each complete iteration we auto-
matically selected the top five highest ranked users (based on SVD aggregation) to add to the core
set. The six iterations thus yielded 30 additional core users for each of the four sets. As an example,
the final expanded core set for Iowa dataset #1 is shown in Fig. 2(b). It is interesting to observe that
several high-degree nodes were added to the core set, such as the user @TerryBranstad, the official
account of the Governor of Iowa.
3.2 Discussion
Next, to quantitatively validate the relevance of the recommendations produced by our proposed
techniques, we use two measures that are frequently used in information retrieval tasks: precision
5
RepRodRobertsTimAlbrechtIABethMalickiiowacciBruceBraleyTomLathamJason_SchultzdouglaswburnsIaHouserepubsIACaucus2012JoNBCNewsPaulYeagerITRwatchdogsamanthakampmanKimReynoldsIAcharlotte_ebyOskyNewsJoniScotterOneIowaiowadefenseRadioIowajennjarvisokayhendersonLauraBloomerIowans_Rockwford14275dmrcaucusFayetteIowaGOPIowaCaucusRepRodRobertsSCJBretHChrisHagenowTimAlbrechtIAMcKinleyforIowaDonMcDowellBethMalickiiowacciidavepricedesmoinesdemBruceBraleyKentSorensonwhoradioTomLathammattstrawnJason_SchultzdouglaswburnsIowaPoliticsJenniferJJacobsgrantyoung72JeneaneBeckKObradovichBNortheyIaHouserepubsNickAWagnerIACaucus2012JoNBCNewssmg_lynchJasonClayworthPaulYeagerITRwatchdogsamanthakampmanKimReynoldsIAIowaGOPercharlotte_ebyHouseChiefClerkReneeSchulteTerryBranstadDMRPoliticsOskyNewsIASenateGOPJoniScotterOneIowaiowadefenseRadioIowaSandy_GreinerTheBeanWalkerjennjarvisokayhendersonLauraBloomerIowans_Rockwford14275dmrcaucusFayetteIowaGOPIowaCaucusIteration
1
2
3
4
5
6
Set 1
0.95
0.93
0.94
0.90
0.88
0.82
Set 2
0.97
0.98
0.96
0.94
0.93
0.92
Precision
Set 3
0.97
0.95
0.96
0.96
0.93
0.89
Set 4 Mean
0.97
1.00
0.96
1.00
0.96
0.98
0.94
0.96
0.92
0.95
0.88
0.89
Set 1
0.27
0.30
0.34
0.37
0.39
0.40
Set 2
0.28
0.32
0.35
0.38
0.41
0.45
Recall
Set 3
0.28
0.31
0.35
0.39
0.41
0.43
Set 4 Mean
0.28
0.29
0.32
0.33
0.35
0.36
0.38
0.39
0.41
0.42
0.43
0.43
Table 1: Precision and recall scores for four randomly-selected subsets of the Storyful Iowa user list,
for six complete recommendation-selection-update iterations.
and recall. The results for the four datasets across all six iterations are listed in Table 1. We observe
that, in terms of recall, increasing the user list size by 30 accounts does not lead to a significant fall
in precision -- average precision relative to the complete original list remains at 0.88 by iteration
six. Meanwhile, recall increases steadily in all cases -- the average is 0.43. Note the maximum
achievable recall by iteration six is 0.48 (i.e. 62 out of the 128 users are returned), and is lower in
previous iterations.
In general, we observe that the Iowa user list studied here consists of a relatively homogeneous
group of users pertaining to a story with a relatively narrow focus -- the users are predominantly
Republicans involved in the Iowa caucuses. Therefore, unlike the study in [2] which analysed Twitter
relations across the entire country during 2010 US midterm elections, here a pronounced partisan
divide is not evident.
4 Case Study 2: Bahrain
4.1 Experimental Setup
For our second study, we analyse a dataset with significantly different characteristics. As a seed
list we use a Twitter list covering the current political situation in Bahrain which was also manually
curated by Storyful3. As of 27 September 2011, this list contained 51 users. A small number of
these have a "loyalist" or "pro-government" stance, while the remaining users could be regarded as
being either "non-loyalist", or "neutral" observers with an interest in Bahrain. This natural division
in the seed list raises an interesting question -- does starting with a seed list that takes a particular
stance on a given news story lead to the construction of localised network "silos", which may lead
an automated system to give biased user recommendations?
To investigate this, we generate recommendations based on a seed list Bahrain-L containing a subset
of 14 users that have been putatively labelled as "loyalist". We ran four complete iterations using the
same exploration constraints, filters, and selection mechanism used in the previous evaluation. This
resulted in a core set containing 34 users, a candidate set of 51,114 users, 138,777 follower links,
and 53,450 unique tweets.
4.2 Discussion
Fig. 3(a) shows the subgraph induced by the original complete curated list of 51 users on the follower
graph -- the split between the "loyalist" users and the other users is evident from the positions calcu-
lated by force directed layout. In particular, the latter group of users form a densely connected core,
while most of the "loyalist" nodes are not well-connected with the rest of the subgraph. Fig. 3(b)
shows a subgraph induced by the union of the curated list, with the set of nodes selected based on
the recommendation process using Bahrain-L alone as the seed set. We observe that none of the 37
"non-loyalist" nodes from the curated list were selected during the four iterations. In contrast, we
see that the new users are closely connected with the other "loyalist" users, forming a second dense
core. While we might expect this if recommendations were only generated based on follower links,
recall that rankings based on mentions and retweets are also being aggregated to select new users.
3http://twitter.com/#!/storyfulpro/bahrain
6
(a) Initial core set
(b) Final core set
Figure 3: Follower graph for core set members in the Bahrain dataset after (a) the initial bootstrap
phase, (b) four complete iterations. Blue nodes denote users in the original user list that are puta-
tively labelled as "loyalist", while the remaining members of the user list are coloured green. The
additional nodes that have been selected, based on recommendations using Bahrain-L as a seed list,
are coloured red.
In fact, the addition of these rankings appears to further compound the "silo" effect which is evident
from Fig. 4.2.
Our analysis suggests that there is little interaction on Twitter between users with differing stances
on the political situation in Bahrain. On the one hand, this highlights weakness of the proposed
recommendation techniques in the case of stories that are highly-polarised. Alternative criteria,
which emphasise diversity over homogeneity, may provide a solution -- this is analogous to the
attempts in active learning to identify diverse examples in order to widely cover the sample space
[8]. On the other hand, these results also highlight the continued importance of the role of the
curator in (a) selecting a suitably diverse seed list as a starting point, (b) actioning recommendations
produced by the system.
5 Conclusions
In this paper we have proposed a comprehensive approach for automating aspects of the Twitter list
curation process, based on novel network exploration and multi-view recommendation techniques.
In the evaluation in Section 3, we showed that, using different starting subsets of a manually-curated
list, we can recall the original human annotations while maintaining high precision.
Based on the observations made in Section 4, we suggest that the next major phase of our work will
involve exploring the diffusion patterns of newsworthy multimedia resources (e.g. links to images
and videos) in the network surrounding a user list. For instance, identifying users who are frequently
early in retweet chains for such resources may help diversify user list recommendations in situations
where the "silo" effect is pronounced, such as in the Bahrain case study. In future we also plan to
apply the proposed recommendation and network exploration techniques beyond Twitter, looking at
multiple views across several different social networks. A key issue here will be the generation of a
reliable mapping between users on different networks.
7
Acknowledgments
This work is supported by Science Foundation Ireland Grant No. 08/SRC/I140 (Clique: Graph &
Network Analysis Cluster). The authors thank Storyful for their participation in the evaluations
performed in this paper.
References
[1] M. Bastian, S. Heymann, and M. Jacomy. Gephi: An open source software for exploring and
manipulating networks. In Proc. International AAAI Conference on Weblogs and Social Media
(ICWSM'09), pages 361 -- 362, 2009.
[2] M. D. Conover, J. Ratkiewicz, M. Francisco, B. Gonc¸alves, A. Flammini, and F. Menczer.
Political polarization on twitter. In Proc. 5th Intl. Conference on Weblogs and Social Media
(ICWSM'11), 2011.
[3] J. Hannon, M. Bennett, and B. Smyth. Recommending twitter users to follow using content
and collaborative filtering approaches. In Proc. 4th ACM conference on Recommender systems,
pages 199 -- 206. ACM, 2010.
[4] P. Jaccard. The distribution of flora in the alpine zone. New Phytologist, 11(2):37 -- 50, 1912.
[5] J.M. Kleinberg. Authoritative sources in a hyperlinked environment. Journal of the ACM
(JACM), 46(5):604 -- 632, 1999.
[6] J. Ratkiewicz, M. Conover, M. Meiss, B. Gonc¸alves, A. Flammini, and F. Menczer. Detecting
and tracking political abuse in social media. In Proc. 5th International AAAI Conference on
Weblogs and Social Media (ICWSM'11), 2011.
[7] G. Salton and C. Buckley. Term weighting approaches in automatic text retrieval. Technical
Report 87-881, Department of Computer Science, Cornell University, Ithaca, NY, USA, 1987.
Technical Report 1648, University of
[8] B. Settles. Active Learning Literature Survey.
Wisconsin -- Madison, 2009.
[9] S. White and P. Smyth. Algorithms for estimating relative importance in networks. In Proc.
9th ACM SIGKDD international conference on Knowledge discovery and data mining, pages
266 -- 275. ACM, 2003.
[10] G. Wu, D. Greene, and P. Cunningham. Merging multiple criteria to identify suspicious re-
views. In Proc. 4th ACM Conference on Recommender Systems (RecSys'10), 2010.
8
|
1811.07746 | 2 | 1811 | 2018-11-20T21:37:51 | An Empirical Assessment of the Complexity and Realism of Synthetic Social Contact Networks | [
"cs.SI",
"cs.LG",
"stat.ML"
] | We use multiple measures of graph complexity to evaluate the realism of synthetically-generated networks of human activity, in comparison with several stylized network models as well as a collection of empirical networks from the literature. The synthetic networks are generated by integrating data about human populations from several sources, including the Census, transportation surveys, and geographical data. The resulting networks represent an approximation of daily or weekly human interaction. Our results indicate that the synthetically generated graphs according to our methodology are closer to the real world graphs, as measured across multiple structural measures, than a range of stylized graphs generated using common network models from the literature. | cs.SI | cs | An Empirical Assessment of the Complexity and Realism of Synthetic
Social Contact Networks*
Kiran Karra1, Samarth Swarup2, and Justus Graham1
8
1
0
2
v
o
N
0
2
]
I
S
.
s
c
[
2
v
6
4
7
7
0
.
1
1
8
1
:
v
i
X
r
a
Abstract -- We use multiple measures of graph complexity
to evaluate the realism of synthetically-generated networks of
human activity, in comparison with several stylized network
models as well as a collection of empirical networks from the
literature. The synthetic networks are generated by integrating
data about human populations from several sources, including
the Census, transportation surveys, and geographical data.
The resulting networks represent an approximation of daily
or weekly human interaction. Our results indicate that the
synthetically generated graphs according to our methodology
are closer to the real world graphs, as measured across multiple
structural measures, than a range of stylized graphs generated
using common network models from the literature.
I. INTRODUCTION
Artificially generated graphs benefit from high demand
in several application domains, wherever the phenomena of
interest are driven by interactions between people, including
health and medicine, communications,
the economy, and
national security. Lack of access to appropriate network data
hampers the research community's ability to develop algo-
rithms to analyze and gain insight from these transactional
graph datasets. Due to the access restrictions to real network
data,
there is value in crafting methods of synthetically
generated data which faithfully represent behaviors of real
world processes. As such, many stylized methods for creating
graphs with rigorously understood structural properties have
been established, making collective steady progress towards
better approximating structures of real world processes.
Despite this progress,
these relatively simple stylized
methods aren't universally applicable and suffer from lack of
realism for some applications. We are particularly interested
in creating realistic graphs which represent a complex set
of interrelated processes involving a common subset of
actors (i.e., the coherent alignment of disparate subgraphs
which have many vertices in common and which represent
different types of underlying activity). We are also interested
in the ability to embed various types of synthetic activities
(subgraphs) into these larger "background" graphs to enable
the advancement of subgraph detection algorithms on large
and realistic datasets. This is also relevant to recent work
*Distribution Statement A: Approved for Public Release, Distribution
Unlimited. This work was supported in part by DARPA MAA Contract
FA8750-17-C-0155 (NC082817-VT-GORDIAN); the views, opinions and/or
findings expressed are those of the authors and should not be interpreted
as representing the official views or policies of the Department of Defense
or the U.S. Government; SS is additionally supported in part by DTRA
CNIMS Contract HDTRA1-17-0118 and NIH Grant 1R01GM109718.
1Hume Center, Virginia Tech, Arlington, VA 22203, USA
www.hume.vt.edu
2Biocomplexity Institute, Virginia Tech, Blacksburg, VA 20460, USA
www.bi.vt.edu
on adversarial social network analysis [1], [2], which could
benefit from the application of realistic complex networks.
Lastly, we are interested in graphs with high realism ac-
cording to the particular domain of activity sought to be
modeled by any given graph or collection of graphs. As a
step towards achieving these objectives, we are examining
the use of synthetic populations to generate realistic graphs.
Synthetic population technology is widely used in a num-
ber of domains. It involves developing a highly detailed
and data-driven representation of the entire population of a
region. The synthetic agents are imbued with demograph-
ics, household structure, and activity patterns. The use of
actual location data gives the synthetic populations a spatial
structure that corresponds to the contingent spatial realities
of the region being modeled. This leads to simulations
that can be used to study specific phenomena as well as
understand which aspects of a phenomenon generalize across
regions. Synthetic social contact networks are constructed
from synthetic populations by connecting synthetic agents
who are spatiotemporally collocated in the model [3]. From
initial applications in the transportation domain [4],
this
approach has expanded to studies in economic analysis [5],
[6], epidemiology [7], [8], [9],
land use planning [10],
disaster response [11], and more [12], [13].
This has led to extensive evaluation and validation of
the methodology and the synthetic population data that are
generated [14], [15], [16]. This is also detailed in Section III.
However there has been relatively little evaluation of the
synthetic social contact networks that are generated from
these populations (a few examples are [17], [18], [19], [20]).
The goal of this paper is to evaluate the synthetic pop-
ulation method for its ability to generate graphs that meet
application needs of complexity and realism as described
above. This paper focuses on the ability of this method to
represent the characteristics of real world data as compared
to stylized graph generation methods. We evaluate synthetic
social contact graphs, stylized graphs based on probabilistic
graph generation, and real world data from online network
data repositories according to a robust number of data-
agnostic graph features. Results are provided and suggestions
for future research are outlined, particularly with regard to
comparing against more nuanced datasets which represent
complex behavior across multiple activity domains.
The rest of this paper is organized as follows. Section II
describes measures of graph complexity which were applied
to all graphs to perform our analysis. Section III describes
our synthetic graph generation methodology and resulting
instances of graphs. Section IV describes the reference data
used for comparison,
including stylized graphs (classical
methods) and real world graphs used for the analysis. Sec-
tion V describes the evaluation methodology and analytical
results. Finally, Section VI provides context for the results as
a conclusion as well as several options for further research.
II. MEASURES OF GRAPH COMPLEXITY
N + d(cid:80)
In this section, we discuss the measures of graph complex-
ity that we compute in order to compare graphs generated
by different methods in a data agnostic fashion. We compute
eleven different measures of graph complexity, based on their
efficacy to our problem, as well as their computability with
respect to available open source packages. The features we
compute, and their respective definitions are stated below.
{ejk}
ki(ki−1) : vj, vk ∈
Ni, ejk ∈ E, where ki is the out-degree of vertex-i,
and Ni = {vj : eij ∈ E} is the set of out-neighbors of
vertex-i [21]. The local clustering coefficient of a vertex
is a measure of the tendency of that node to cluster (i.e.
be connected) to other nodes.
• Local Clustering Coefficient ci =
P R(u)
u∈Γ−(v)
s(cid:54)=v(cid:54)=t∈V
• Page Rank P R(v) = 1−d
d+(u) , where
Γ−(v) are the in-neighbors of v, d+(w) is the out-
degree of w, and d is a dampling factor [22]. Page
rank is one measure of the "importance" of a node,
where importance is proportional to the in-degree of
each node.
• Betweenness Centrality CB(v) = (cid:80)
σst(v)
,
where σst is the number of shortest paths from s to t,
and σst(v) is the number of shortest paths from s to
t that pass through v. [23]. Betweenness is a measure
of the centrality of the nodes in the graph; nodes that
are considered to be more between have more shortest
paths that pass through them than less between nodes.
, where dij is the dis-
tance between nodes i and j [24]. Closeness is another
measure of centrality, but differs from betweenness in
that it is proportional to the sum of the shortest paths
between the node of interest and all other nodes in the
graph.
• Closeness Centrality ci = 1(cid:80)
• Vertex In Degree is the number of incoming connec-
j dij
σst
tions into each node of the graph.
• Vertex Out Degree is the number of nodes that this
4 − (cid:80)
node connects to.
1
V
(u,v)∈E
HV N (G) =
D(u, u) =(cid:80)
• Von-Neumann Approximate Graph Entropy -
4dudv , where du =
v∈V A(U, v) [25]. From Information The-
ory, entropy is a measure of randomness, and thus
loosely quantifies the complexity of the graph from a
probabilistic perspective.
• Structure Connectivity C = E − V + 1, where E is
the number of edges and V is the number of vertices
[26]. The structure connectivity is an easily computable
coarse measure of the density of the graph.
V (V −1) × 100,
• Structure Connectedness Conn[%] = 2E
where again E is the number of edges and V is the
number of vertices [26]. The structure connectedness is
also an easily computable coarse measure of the density
of the graph.
(cid:80)V
(cid:80)V
• Average Intersite Distance (cid:104)di(cid:105) = 2W
V , where V is
the number of vertices, and W is the Wiener number
of the network. The Wiener number is defined as the
sum of all distances in the network, and is computed by
i,j=1 dij [26]. The average intersite distance
W = 1
2
is a measure of how easily one vertex can reach another
vertex.
• Vertex
=
:
Alog2A
{N1(a1), N2(a2), . . . , Nk(ak)} and Ni(ai) represents
the number of vertices with vertex degree ai [26]. The
vertex distance information is a normalized measure
of the entropy of the vertex degree distribution, and is
another measure of the complexity of the graph.
Distance
i=1 ailog2ai,
Information
Ir(vd)
ai
where
1
For the clustering coefficient, page rank, betweenness, and
closeness, we compute the defined feature for all nodes in the
graph, and then sample the cumulative distribution function
at probabilities [0.10, 0.25, 0.50, 0.75, 0.90] to capture the
information given by the feature across all nodes in the graph.
For the vertex degree computations, we compute the mean
and standard deviation, and use both as features. This yields
a total of 34 features per graph that are computed to compare
the graphs with each other.
A. Related work
Earlier work on understanding the properties of synthetic
social contact networks has taken two approaches. One is to
develop mathematical approaches to understanding structural
properties as they relate to properties of dynamics on the
networks [18], [19]. The other is to compare the synthetic so-
cial contact networks for different regions to understand the
differences in their structural and dynamic properties [20],
[17].
Barrett et al. [19] showed that
there is a significant
difference in how hard it is to shatter social networks as
compared to infrastructural networks (transportation, power,
and wireless radio networks), by examining the size of the
largest component in the network as nodes are deleted in
order of (residual) degree. Social networks were shown to
be much more robust than the infrastructural networks.
Eubank et al. [18] studied, among other things, the ex-
pansion characteristics of synthetic social contact networks.
They showed that these networks have high expansion rates,
which implies that contagious processes such as infectious
diseases would spread very quickly on these networks.
Xia et al. studied differences in social contact networks
generated according to different methods [20] and the dif-
ferences between the networks generated for two different
cities (Delhi and Los Angeles) [17]. They used both static
and dynamic measures including degree distribution, tem-
poral degree, vulnerability distribution, simulated epidemic
curves, and the efficacy of two different epidemic mitigation
interventions. Vulnerability is the probability that a node
gets infected during an infectious disease outbreak. They
showed significant differences due to the network generation
methodology as well as across the two cities.
Our contribution in this work differs from the earlier work
in that we compute a larger set of structural features for the
networks and do a comparison of synthetic social contact
networks with real networks from the literature and also
common stylized networks which are widely used in the
literature.
Validation: IPF provides a theoretical guarantee about the
inferred joint distribution in a maximum entropy sense [29].
This means that the inferred joint distribution is as close
as possible to the sample This step is further validated
by comparing the distributions of variables in the synthetic
population that were not included in the IPF procedure, with
their corresponding marginal distributions as given by the
ACS.
III. SYNTHETIC NETWORK GENERATION
Activity sequence assignment
A synthetic social contact network is a representation of
the interactions between people in a region due to colloca-
tion. To construct this network, we first generate a synthetic
population for the region by combining data from multiple
sources as described below. The main datasets used are listed
in Table I.
DATA SETS USED FOR GENERATING SYNTHETIC POPULATIONS.
TABLE I
Data set
American Community Survey (ACS)
National Household Travel Survey (NHTS)
HERE (formerly Navteq)
Dun & Bradstreet (DnB)
National Center for
Education Statistics (NCES)
Description
Demographics,
household structure
Daily and weekly
activity patterns
Road networks and
points of interest
Business locations
School locations
The synthetic population generation process involves mul-
tiple steps. Detailed descriptions can be found elsewhere
[27]. We summarize each step below. The process is illus-
trated in Figure 1. We generate the populations at the highest
resolution allowed by publicly-available ACS data, which is
the blockgroup. The Census Bureau does not release data at
the block level publicly.
Base population generation
The American Community Survey provides demographic
data in two forms. One is in the form of distributions over
key demographic variables in a blockgroup, such as house-
holder age, household income, household size, and more.
We henceforth refer to these as the marginal distributions.
The other is an anonymized 5% sample of the ACS records,
known as the Public Use Microdata Sample (PUMS).
To generate a collection of synthetic individuals and
households for the blockgroup whose demographics match
the ACS data, we use a statistical procedure known as Itera-
tive Proportional Fitting (IPF) [28]. IPF creates a joint prob-
ability distribution over the chosen demographic variables by
combining the marginal distributions with the PUMS sample
for the blockgroup. This distribution is then sampled the
needed number of times (equal to the number of households
in the blockgroup) and the corresponding households are
copied over from the PUMS sample to create the synthetic
population.
Once the base population has been generated, every syn-
thetic individual is assigned an activity sequence for every
day of a typical week. This is done using the National
Household Travel Survey (NHTS) dataset.
NHTS provides a set of travel records associated with
demographics, from a nationally-representative sample of
respondents. We group the activity types represented in the
data into five categories: home, work, shopping, other, and
school. The last category also includes college activities.
NHTS travel records are matched with synthetic indi-
viduals using a two-stage fitted values approach [30]. In
the first stage, we calculate multiple summary statistics
from the travel sequences, such as the fraction of the day
spent in various activities (home, work, school, etc.). We
then fit a regression to these summary statistics using the
demographics as the independent variables.
In the second stage, this learned model is used to predict
the same summary statistics for the synthetic households.
We then find the closest NHTS survey household for each
synthetic household and assign the corresponding activity
sequences to the synthetic household. Closeness between
synthetic and survey households is defined using, e.g., Ma-
halanobis distance between the fitted values of the summary
statistics for the survey household and the predicted values
for the synthetic households. The use of fitted values to
evaluate the distance ensures that if two households have
identical demographics, their distance is zero.
We repeat
the method for each day of the week. At
the end of this process, every synthetic individual has a
meaningful weekly activity sequence assigned to it. Since the
NHTS records include household structure, and we match an
NHTS household to a synthetic household, intra-household
correlations between activities are also preserved.
Validation: Validation is done by comparing the aggregate
distributions of time spent in various activities, broken down
by demographics such as age and gender. For instance, the
method reproduces the increasing trend of time spent at home
with age (i.e., older people spend more time at home), as well
as the gender difference between time spent at home (women
spend more time at home on average). See [30] for further
details.
Activity location assignment
The previous step results in a synthetic population with
demographics accurate to the blockgroup level and weekly
activity sequences assigned to each individual. In this step,
we assign geographical locations to each activity. This is
Fig. 1. An illustration of the synthetic population and contact network generation methodology
divided into a procedure for home location assignment and a
procedure for assigning locations for all other activity types.
To construct home locations for the synthetic households,
we combine road network data from HERE with Census
Bureau data on distributions of residential building types in
each blockgroup and the blockgroup shapefiles.
Residence locations are constructed along the sides of
the roads within the blockgroup. The kind of residence
(single-family home, duplex, small or large apartment build-
ing) is chosen based on the road category. For instance,
single-family residence locations are chosen along smaller
roads and larger apartment buildings are chosen alongside
larger roads. Synthetic households are allocated residences
iteratively until all households have been assigned a home
location.
Once home locations have been assigned, locations for
other activity types are assigned using a gravity model [31].
Locations are first assigned for the so-called anchor activities
(work and school). The gravity model chooses locations with
probabilities proportional to their capacities and inversely
proportional
to the square of the distance. To make the
computation tractable, a cutoff of 50 miles is assumed.
taking into account
Then the locations for shopping and other activities are
the locations of the anchor
chosen,
activities both before and after these activities. Thus, if a
synthetic person's activity schedule involves going shopping
between work and home activities, the shopping location is
likely to be chosen inbetween the work and home locations.
Validation: This step has been validated in multiple ways.
The most direct validation has been through estimating trip
counts between traffic analysis zones and comparing with
data [8]. Beckman et al. also validated the mobility model
indirectly by developing a model of cell phone network
traffic and comparing measure of the traffic with data [32].
They also showed that the distribution of distances traveled
is a power law, which matches other estimates in the litera-
ture [33].
Social contact network construction
The synthetic population generation methodology results
in a bipartite person-location network where the edges indi-
cate the locations that the persons visit, annotated with the
start-time and duration of the visit. In what follows below, we
are using a synthetic social contact network for Montgomery
County, VA, USA, which is openly available [34].
From the bipartite network, we extract the induced person-
person social contact network, where two persons might
have an edge between them if they are at the same location
for an overlapping period of time. The resulting network
containing 63129 nodes and 45544774 edges, giving us an
average degree of 1442.92. The degree distribution is shown
in Figure 2.
Fig. 2. Degree distribution of the social contact network, assuming that all
persons who could come into contact with each other based on collocation,
actually do.
We also plot the distribution of durations of contact in this
network, rounded up to half-hour intervals. This is shown in
Figure 3. This shows us that there are two distinct regimes
200040006000800010000Degree110Number of nodesof interaction in this model, with an inflection point at 50
hours of contact per week.
We see that while the contact duration distribution looks
qualitatively similar to the full network, the degree distribu-
tion now exhibits a power-law-like tail (Figure 4 is plotted
on a log-log scale), while the degree distribution for the full
network has an exponential character (Figure 2 is plotted on
a log-linear scale).
Fig. 3. Distribution of contact durations, rounded to the nearest half hour.
However, it is reasonable to assume that not all persons
who visit a given location come into contact with each other.
For example, we tend to interact with a subset of co-workers
within the same building. If we go to a shopping mall, we
actually interact with very few other people who are there.
Therefore, in what follows, we assume that the probability
that two persons come into contact depends on the kind of
activity they are engaged in. We introduce five probabilities,
P HOM E, P W ORK, P SHOP P IN G, P OT HER,
P SCHOOL, corresponding to the probability that an in-
duced edge in the person-person network corresponding
to that activity is kept. We use different values for these
probabilities to generate multiple social contact networks and
examine their structure.
If all probabilities are 1.0, then all the induced edges are
kept, and we obtain the network above. However, if we
assume probabilities to be, e.g., {1.0, 0.01, 0.01, 0.01, 0.1}
(in the order the variables are listed above), we obtain a
network with 2559061 edges, with an average degree of
81.17.
The degree distribution and contact duration distribution
for this network are shown in Figures 4 and 5 below.
Fig. 5. Distribution of contact durations, rounded to the nearest half hour
for the social contact network with contact probabilities {1, 0.01, 0.01, 0.01,
0.1} for home, work, shopping, other, and school activities, respectively.
Thus, by sampling edges representing different activity
types with different probabilities, we can generate multiple
social contact networks that exhibit different structural prop-
erties. Table II lists the networks we have generated using
different sampling probabilities.
In addition to the full induced person-person network, we
create networks which have each activity type in isolation.
We also create networks with reasonable choices of the
probabilities, denoted as G1 − G4 in Table II.
TABLE II
SYNTHETIC SOCIAL CONTACT NETWORKS. PROBABILITIES ARE LISTED
IN THE ORDER HOME, WORK, SHOPPING, OTHER, SCHOOL.
Name
Full
Home
Work
Shopping
Other
School
G1
G2
G3
G4
Probabilities
{1, 1, 1, 1, 1}
{1, 0, 0, 0, 0}
{0, 0.01, 0, 0, 0}
{0, 0, 0.01, 0, 0}
{0, 0, 0, 0.01, 0}
{0, 0, 0, 0, 0.01}
{1, 0.01, 0, 0, 0.01}
{1, 0.01, 0.01, 0, 0.01}
{1, 0.01, 0.01, 0.01, 0.01}
{1, 0.01, 0.01, 0.01, 0.1}
Avg. degree
1442.92
3.7
17.83
7.36
6.28
17.29
26.11
31.02
35.69
81.17
IV. GRAPHS FOR COMPARISON
Three broad groups of network generation methods are
compared: synthetic social contact networks described in
Section III, stylized graphs, and real world networks.
A. Stylized Networks
Fig. 4. Degree distribution of the social contact network, assuming contact
probabilities to be {1, 0.01, 0.01, 0.01, 0.1} for home, work, shopping, other,
and school activities, respectively.
A collection of stylized networks were chosen to exercise
structural variety among the various metrics chosen for eval-
uation. These network types are trivially generated in extant
050100150200250300Half hours of contact / week110102103104105106107Number of edges1101001000Degree110102103Number of nodes050100150200250300Half hours of contact / week110102103104105106Number of edgesgraph analysis software packages such as NetworkX [35]. In
order to provide a meaningful basis for comparison, these
graphs were generated with parameters chosen according
to Table III to ensure that average degree fell within a
similar range to the synthetic social contact networks as
well as the real world data chosen from various domains.
Network size (i.e. node count), n, was chosen to provide
computational
tractability while also providing sufficient
depth to accommodate a range of average degrees found in
comparable real world networks. Of note, while the node
count
in stylized networks is greater than in real world
networks, these sizes were chosen to provide enough data
for robust statistics; node count also would not affect the
metrics under consideration, ceteris paribus. In total, there
are three average degree settings used for the four different
stylized graph generation methods, yielding twelve total
stylized graphs.
TABLE III
STYLIZED NETWORKS GENERATED PARAMETERS.
Avg. Degree
Erdos-R´enyi
Newman-Watts
Random-Regular
Powerlaw-Cluster
n
p
n
k
p
n
d
n
m
p
15
10000
0.0015
10000
10
0.50
10000
10000
7
8
0.50
40
10000
0.0004
10000
27
0.54
10000
20
10000
20
0.50
65
10000
0.0065
10000
43
0.50
10000
32
10000
33
0.50
Erdos-R´enyi graphs are widely used for the study of ran-
dom graphs in the field of graph theory; they are constructed
simply by defining the number of nodes n and assigning
a constant probability p for all node pairs, which defines
the probability of an edge occurring between two randomly
selected nodes. While foundational, Erdos-R´enyi graphs tend
not
to structurally achieve the degree distribution often
found in real world graphs. More specifically, the degree
distribution follows a Poisson, while real world graphs tend
to follow a power law [36]; thus other methods are included
in this analysis.
Newman-Watts graphs modify the nature of
random
chance by mimicking "small world" behaviors found in
real social networks, thereby emphasizing local structure.
Newman-Watts graphs raise the probability of two nodes
being connected in certain locales while suppressing the
probability of two nodes chosen at random being connected
[37]. The parameters defining the Newman-Watts model are
n, the number of nodes in the network, k, the number of
neighbors that each node is connected to in a ring topology,
and p, the probability of adding a new random (or shortcut)
edge for each node.
Random-Regular graphs are bound to the restriction of
being regular, such that each node has the same exact
degree; this differs from the Erdos-Renyi model in which the
distribution follows a Poisson model [36]. The parameters
defining the Random-Regular model are n, the number of
nodes in the network, and d, the degree of each node, under
the constraint that n × d be an even number.
Powerlaw-Cluster graphs are constructed to preserve the
notion found in real world networks regarding the existence
of "hubs", which while rare have enormous degree. The
specific implementation of this graph combines the afore-
mentioned power-law degree distribution (the existence of
high degree hubs) with the local clustering notions from
the Watts model above [38]. The parameters defining the
Powerlaw-Cluster graphs are n, the number of nodes in the
network, m, the number of random edges to add for each
new node, and p, the probability of adding an edge to form
a triangle after adding an initial random edge.
B. Real World Networks
Real world networks fall along two broad categories: so-
cial and other. Given that the synthetic social contact graphs
detailed in Section III are most closely related to social
interaction, it is reasonable to overweight social networks
in selecting real data. Notably, the average degree of these
social networks spans a wide range, from 7 to 209, yet
these social graphs (and others available in the open) tend
to the range from 15 to 75, thus the basis for parameterizing
stylized graphs at the intervals in Table III. The analysis
includes other graphs as well for diversity of analysis based
on type of underlying activity, as well as much larger average
node degree, as can be seen in the economic datasets. A brief
description of the real world networks used in this evaluation
are shown in Table IV.
TABLE IV
REAL WORLD NETWORK PARAMETERS.
D IS THE AVERAGE DEGREE.
Name
econ-beaflw
econ-beause
piston
email-EU-core
p2p-Gnutella08
Type
other
other
other
social
social
Vertices
507
507
2K
1005
6301
Edges D
53K
209
174
44K
96
98K
50
25571
20777
7
V. EVALUATION METHODOLOGY, RESULTS, AND
DISCUSSION
To compare the five empirical graphs,
twelve stylized
graphs, and eight synthetic social contact graphs, we chose
a heuristic set of features which sought to provide robust
characterizations as well as computationally tractability. The
features that were computed on each graph were described
above in Section II, using the graph-tool computational
framework [39]. After computing the features, clustering
was performed in order to examine whether the generated
graphs could be separated based on the computed features of
each graph. K-Means clustering was used, with the number
of clusters equaling the number of graph types that were
generated, in this case, six [40]. The features were then
reduced to two dimensions using PCA as the dimensionality
reduction [41] for visualization purposes. Figure 6 represents
the results of the clustering and PCA. In it, the various colors
represent the K-Means clustering output, while the various
marker shapes represent the true graph type, from a graph
generation perspective.
Fig. 6. We show the 34 dimensional representation of the graph reduced
to two dimensions using PCA, where the marker types represent the true
underlying graph generation mechanism as shown in the associated legend,
and the colors represent the K-Means clusterer's prediction of the type of
graph generation mechanism. It is seen that the clusterer cannot distinguish
between the multichannel Agent-Synthetic graphs, G1 - G4, from real world
network data. All stylized graphs are easily distinguished from the Agent-
Synthetic approach, although they are confused amongst themselves.
The key results indicate that the synthetic population-
based graphs (referred to as Agent-Synthetic in Figure 6)
are generally more similar to the real-world graphs than
the stylized graphs. Within each of the three broad graph
classes, measures of similarity vary: the synthetic graphs
(of both classes) tend to be more broadly distributed while
the real world graphs are narrowly distributed. In fact, the
real-world graphs, despite having an enormous variance of
average degree, are clustered very tightly in Figure 6. Also
of note, while the stylized graphs are pushed away from the
real world graphs almost entirely in the X dimension, the
agent-synthetic graphs gain distance almost entirely in the
Y dimension. We suggest this Y-axis distribution needs to
be accounted for through additional interpretation, but we
can conclude that the agent-synthetic graphs provide a more
advantageous approximation to the real world graphs than
the stylized counterparts.
Additional nuance should be used when evaluating these
results, based on the underlying type of activity that
is
being modeled. Within the agent-synthetic networks, it is
seen that the graphs labelled Work, School, Other, Shopping,
and Home are actually models of only a single type of
underlying transaction. The real world networks also only
model a single type of underlying transaction. G1-G4 graphs
however jointly model the same entities performing different
types of transactions all within the same graph. Moreover, as
one can see from Table II that G1 models the fewest channels
as the third and fourth elements (representing Shopping and
Other, respectively) are zeroed out. As we transition from
G1 to G4 in ascending order, either more elements become
non-zero, or, the value of an element is raised. For example,
from G1 → G2, the third element goes from 0 to 0.01.
From G2 → G3, the fourth element goes from 0 to 0.01.
From G3 → G4, the fifth element goes from 0.01 to 0.1.
These increases correspond to magnitude along the Y axis
in this high dimensional space.
Summarily, when the underlying graph is normalized to
represent only single underlying activity types,
then the
agent-synthetic data provides a better representation of real
data from similar domains (e.g. social network data). As the
agent-synthetic data accumulate greater complexity through
adding additional underlying activity types (i.e. simulate a
combination of resources into a coherent graph), the distance
grows along the Y axis, implying that while the data is less
similar to the real world networks, it is dissimilar in a way
different than the stylized networks.
A final observation is that while the distance between
the real world graphs and G1 - G4 is greater than with
the individual networks Work, School, etc., the clustering
algorithm assigned G1 - G4 into the same cluster as the real
world graphs, as shown in Figure 6.
An outlier worth addressing is that of the Home graph.
Figure 6 shows that in both the two dimensional reduced
space, as well as the clustered space, this graph is closer to
the stylized graphs than the real-world graphs. We note that
this graph is a collection of largely disconnected components
and has low node degree with low degree variance and
therefore appears similar to a regular graph.
VI. CONCLUSION
We have presented a comparison of multiple synthetic
social contact networks with real network data from the liter-
ature as well as multiple stylized graph generation methods,
along several structural measures.
We conclude that the synthetic population-based method
for generating graphs has quantifiable advantages over styl-
ized methods, particularly in its ability to approximate the
characteristics of real world graphs in a limited number
of domains. The reliability of this conclusion is qualified
however by some room for improvement in experimental
design and further research to either corroborate or erode
this conclusion.
To bolster the reliability of these results, future research
should aim to include a larger and more varied assortment
of real world graphs from both the social network domain
as well as others for comparison on the basis of multiple
types of underlying activity. Moreover, future research should
aim to be inclusive of other graph generation methods such
as "Structure-driven Models" (e.g. Kronecker, dK-Graphs)
and Intent-driven Models (e.g. Random Walk and Nearest
Neighbor) [36]. In such research, attention should be given
to scalability of graph feature computation.
The current results are also not completely evaluated: we
have not attempted to define which features most powerfully
cause separation or similarity of the graphs under analysis.
Furthermore, there are additional implementations of mea-
sures of entropy or similarity which may prove useful at
capturing the nature of real world graphs versus synthetic
ones.
Future research should strive to collect and evaluate data
which represents multiple underlying types of activity carried
out by common vertices. As described above, the G1 - G4
graphs are a combination of graphs in which a large majority
of the nodes exist in all subgraphs. Retrieving real world
networks which remain faithful to such a complex set of
data are difficult to acquire, but will be useful for comparing
the utility of G1 - G4 against stylized counterparts for multi-
channel graphs.
This work can also be extended to take into account
dynamical measures, as discussed in the related work section,
such as vulnerability and expansion, which provide insight
into the realism of dynamical processes on networks.
ACKNOWLEDGMENTS
We acknowledge the Hume Center and the Biocomplexity
Institute at Virginia Tech, as well as DARPA for their support
in this research.
REFERENCES
[1] T. P. Michalak, T. Rahwan, and M. Wooldridge, "Strategic social
network analysis," in Proc. AAAI, 2017.
[2] M. Waniek, T. Michalak, T. Rahwan, and M. Wooldridge, "Hiding
individuals and communities in a social network," arXiv:1608.00375v1
[cs.SI], 2016.
[3] S. Eubank, V. S. A. Kumar, M. V. Marathe, A. Srinivasan, and
N. Wang, "Structural and algorithmic properties of massive social
networks," in Proceedings of the 15th ACM-SIAM Symposium on
Discrete Algorithms (SODA), 2004, pp. 718 -- 727.
[4] R. J. Beckman (Ed.), "TRansportation ANalysis SIMulation System
(TRANSIMS): The Dallas-Ft. Worth case study," Los Alamos National
Laboratory, Tech. Rep. LAUR-97-4502, 1997.
[5] R. L. Axtell, "120 million agents self-organize into 6 million firms:
A model of the U.S. private sector," in Proc. AAMAS, 2016.
[6] D. Ballas, G. Clarke, and J. Dewhurst, "Modelling the socio-economic
impacts of major job loss or gain at
level: a spatial
microsimulation framework," Spatial Economic Analysis, vol. 1, no. 1,
pp. 127 -- 146, 2006.
the local
[7] N. Parikh, M. Youssef, S. Swarup, and S. Eubank, "Modeling the
effects of transient populations on epidemics in Washington DC,"
Scientific Reports, vol. 3, p. Article 3152, Nov 2013, pMCID:
PMC3818653.
[8] S. Eubank, H. Guclu, V. S. A. Kumar, M. Marathe, A. Srinivasan,
Z. Toroczkai, and N. Wang, "Modelling disease outbreaks in realistic
urban social networks," Nature, vol. 429, pp. 180 -- 184, May 2004.
[9] S. Swarup, J. M. Gohlke, and J. R. Bohland, "A microsimulation model
of population heat exposure," in Proceedings of the 2nd International
Workshop on Agent-based Modeling of Urban Systems (ABMUS), Sau
Paulo, Brazil, 2017.
[10] P. Waddell, "UrbanSim: Modeling urban development for land use,
transportation, and environmental planning," Journal of the American
Planning Association, vol. 68, no. 3, pp. 297 -- 314, 2002.
[11] N. Parikh, H. G. Hayatnagarkar, R. J. Beckman, M. V. Marathe, and
S. Swarup, "A comparison of multiple behavior models in a simulation
of the aftermath of an improvised nuclear detonation," Autonomous
Agents and Multi-Agent Systems, Special Issue on Autonomous Agents
for Agent-Based Modeling, vol. 30, no. 6, pp. 1148 -- 1174, 2016.
[12] K. L. Edwards and G. P. Clarke, "The design and validation of a
spatial microsimulation model of obesogenic environment for children
in Leeds, UK: SimObesity," Social Science & Medicine, vol. 69, pp.
1127 -- 1134, 2009.
[13] E. J. Wegman and Y. H. Said, "A social network model of alcohol
behaviors," in Social Computing and Behavioral Modeling, H. Liu
and al., Eds.
Springer Science + Business Media, LLC, 2009, pp.
236 -- 243.
[14] K. Muller and K. W. Axhausen, "Population synthesis for microsim-
ulation: State of the art," in The 10th Swiss Transport Research
Conference (STRC), August 2010.
[15] J. Y. Guo and C. R. Bhat, "Population synthesis for microsimulation
the
travel behavior," Transportation Research Record: Journal of
Transportation Research Board, vol. 2014, pp. 92 -- 101, 2007.
[16] C. Elbers, J. O. Lanjouw, and P. Lanjouw, "Micro-level estimation of
poverty and inequality," Econometrica, vol. 71, no. 1, pp. 355 -- 364,
2003.
[17] H. Xia, J. Chen, M. V. Marathe, and S. Swarup, "Comparison and
validation of synthetic social contact networks for epidemic modeling
(extended abstract)," in Proceedings of The Thirteenth International
Conference on Autonomous Agents and Multiagent Systems (AAMAS),
Paris, France, May 2014.
[18] S. Eubank, V. S. A. Kumar, M. Marathe, A. Srinivasan, and N. Wang,
"Structure of social contact networks and their impact on epidemics,"
AMS-DIMACS Special Volume on Epidemiology, 2006.
[19] C. L. Barrett, S. Eubank, V. S. A. Kumar, and M. V. Marathe, "Under-
standing large-scale social and infrastructure networks: A simulation-
based approach," SIAM News, vol. 37, no. 4, May 2004.
[20] H. Xia, C. L. Barrett, J. Chen, and M. V. Marathe, "Computa-
tional methods for testing adequacy and quality of massive synthetic
proximity social networks," in Proceedings of the 2013 IEEE 16th
International Conference on Computational Science and Engineering,
2013, pp. 1113 -- 1120.
[21] D. J. Watts and S. H. Strogatz, "Collective dynamics of small-
worldnetworks," nature, vol. 393, no. 6684, p. 440, 1998.
[22] L. Page, S. Brin, R. Motwani, and T. Winograd, "The pagerank citation
ranking: Bringing order to the web." Stanford InfoLab, Tech. Rep.,
1999.
[23] U. Brandes and C. Pich, "Centrality estimation in large networks,"
International Journal of Bifurcation and Chaos, vol. 17, no. 07, pp.
2303 -- 2318, 2007.
[24] T. Opsahl, F. Agneessens, and J. Skvoretz, "Node centrality in
weighted networks: Generalizing degree and shortest paths," Social
networks, vol. 32, no. 3, pp. 245 -- 251, 2010.
[25] L. Bai and E. R. Hancock, "Graph kernels from the jensen-shannon
divergence," Journal of mathematical imaging and vision, vol. 47, no.
1-2, pp. 60 -- 69, 2013.
[26] D. Bonchev, "Complexity analysis of the yeast proteome network,"
Chemistry and Biodiversity, vol. 1, pp. 312 -- 326, 2004.
[27] A. Adiga, A. Agashe, S. Arifuzzaman, C. L. Barrett, R. J. Beckman,
K. R. Bisset, J. Chen, Y. Chungbaek, S. G. Eubank, S. Gupta, M. Khan,
C. J. Kuhlman, E. Lofgren, B. L. Lewis, A. Marathe, M. V. Marathe,
H. S. Mortveit, E. Nordberg, C. Rivers, P. Stretz, S. Swarup, A. Wilson,
and D. Xie, "Generating a synthetic population of the United States,"
Network Dynamics and Simulation Science Laboratory, Tech. Rep.
NDSSL 15-009, 2015.
[28] R. J. Beckman, K. A. Baggerly, and M. D. McKay, "Creating syn-
thetic base-line populations," Transportation Research A -- Policy and
Practice, vol. 30, pp. 415 -- 429, 1996.
[29] C. T. Ireland and S. Kullback, "Contingency tables with given
marginals," Biometrika, vol. 55, no. 1, pp. 179 -- 188, Mar. 1968.
[30] K. Lum, Y. Chungbaek, S. G. Eubank, and M. V. Marathe, "A
two-stage, fitted values approach to activity matching," International
Journal of Transportation, vol. 4, no. 1, pp. 41 -- 56, 2016.
[31] S. Erlander and N. F. Stewart, The Gravity Model in Transportation
Analysis: Theory and Extensions. Utrecht, The Netherlands: VSP,
1990.
[32] R. Beckman, K. Channakeshava, F. Huang, J. Kim, A. Marathe,
M. Marathe, G. Pei, S. Saha, and A. K. S. Vullikanti, "Integrated multi-
network modeling environment for spectrum management," IEEE
Journal on Selected Areas in Communications, vol. 31, no. 6, pp.
1158 -- 1168, June 2013.
[33] M. C. Gonz´alez, C. A. Hidalgo, and A.-L. Barab´asi, "Understanding
human mobility patterns," Nature, vol. 453, pp. 779 -- 782, June 5 2008.
[34] S. Swarup, S. Eubank, and M. Marathe, "Computational epidemiology
as a challenge domain for multiagent systems," in Proceedings of
the Thirteenth International Conference on Autonomous Agents and
Multiagent Systems (AAMAS), Paris, France, May 2014.
[35] NetworkX developer team, "Networkx," 2014. [Online]. Available:
https://networkx.github.io/
[36] S.-H. Lim, S. M. Lee, S. Powers, M. Shankar, and N. Imam, "Survey
of approaches to generate realistic synthetic graphs," 2015.
[37] M. E. Newman and D. J. Watts, "Renormalization group analysis of
the small-world network model," Physics Letters A, vol. 263, no. 4-6,
pp. 341 -- 346, 1999.
[38] P. Holme and B. J. Kim, "Growing scale-free networks with tunable
clustering," Physical review E, vol. 65, no. 2, p. 026107, 2002.
[39] T. P. Peixoto, "The graph-tool python library," figshare, 2014.
[Online]. Available: https://graph-tool.skewed.de
[40] S. Lloyd, "Least squares quantization in pcm," IEEE transactions on
information theory, vol. 28, no. 2, pp. 129 -- 137, 1982.
[41] S. Wold, K. Esbensen, and P. Geladi, "Principal component analysis,"
Chemometrics and intelligent laboratory systems, vol. 2, no. 1-3, pp.
37 -- 52, 1987.
|
1704.02042 | 1 | 1704 | 2017-04-06T23:02:08 | Tactics and Tallies: A Study of the 2016 U.S. Presidential Campaign Using Twitter 'Likes' | [
"cs.SI"
] | We propose a framework to measure, evaluate, and rank campaign effectiveness in the ongoing 2016 U.S. presidential election. Using Twitter data collected from Sept. 2015 to Jan. 2016, we first uncover the tweeting tactics of the candidates and second, using negative binomial regression and exploiting the variations in 'likes,' we evaluate the effectiveness of these tactics. Thirdly, we rank the candidates' campaign tactics by calculating the conditional expectation of their generated 'likes.'
We show that while Ted Cruz and Marco Rubio put much weight on President Obama, this tactic is not being well received by their supporters. We demonstrate that Hillary Clinton's tactic of linking herself to President Obama resonates well with her supporters but the same is not true for Bernie Sanders. In addition, we show that Donald Trump is a major topic for all the other candidates and that the women issue is equally emphasized in Sanders' campaign as in Clinton's.
Finally, we suggest two ways that politicians can use the feedback mechanism in social media to improve their campaign: (1) use feedback from social media to improve campaign tactics within social media; (2) prototype policies and test the public response from the social media. | cs.SI | cs |
Tactics and Tallies: A Study of the 2016 U.S. Presidential Campaign Using Twitter
'Likes'
Yu Wang
Political Science
University of Rochester
Rochester, NY, 14627
[email protected]
Xiyang Zhang
Psychology
Beijing Normal University
Beijing, 100875
[email protected]
Jiebo Luo
Computer Science
University of Rochester
Rochester, NY, 14627
[email protected]
Abstract
We propose a framework to measure, evaluate, and rank cam-
paign effectiveness in the ongoing 2016 U.S. presidential
election. Using Twitter data collected from Sept. 2015 to Jan.
2016, we first uncover the tweeting tactics of the candidates
and second, using negative binomial regression and exploit-
ing the variations in 'likes,' we evaluate the effectiveness of
these tactics. Thirdly, we rank the candidates' campaign tac-
tics by calculating the conditional expectation of their gener-
ated 'likes.'
We show that while Ted Cruz and Marco Rubio put much
weight on President Obama, this tactic is not being well re-
ceived by their supporters. We demonstrate that Hillary Clin-
ton's tactic of linking herself to President Obama resonates
well with her supporters but the same is not true for Bernie
Sanders. In addition, we show that Donald Trump is a major
topic for all the other candidates and that the women issue is
equally emphasized in Sanders' campaign as in Clinton's.
Finally, we suggest two ways that politicians can use the feed-
back mechanism in social media to improve their campaign:
(1) use feedback from social media to improve campaign tac-
tics within social media; (2) prototype policies and test the
public response from the social media.
Introduction
Figure 1: Selected tweets Donald Trump (R) posted on
February 9th.
Twitter is playing an important role in connecting the pres-
idential candidates with voters (Sanders 2016). Between
September 18, 2015 and January 23, 2016, Hillary Clin-
ton posted 1316 tweets, Bernie Sanders 1698 tweets, Donald
Trump 2533 tweets, Ted Cruz 1309 tweets, and Marco Rubio
908 tweets.1 These tweets constitute a valuable data source
because they are explicitly political in nature, they are many,
and, importantly, they carry feedback information from the
voters in the form of 'likes.'
In this paper, we solve two problems. We first study the
tweeting tactics in the tweets: we analyze who are men-
tioned in these tweets and what issues are raised. We then
use negative binomial regression to evaluate the effective-
ness of these tactics by exploiting the variations in 'likes,'
which we refer to as tallies. Our study focuses on the five
c
(cid:13) 2017, Yu Wang ([email protected]),
1We do not count retweets, as retweets do not have as a feature
Copyright
Xiyang Zhang, Jiebo Luo. All rights reserved.
the number of 'likes.'
leading candidates: Hillary Clinton (D), Bernie Sanders (D),
Donald Trump (R), Ted Cruz (R), Marco Rubio (R).2
Figure 1 shall illustrate our points well. It shows three
tweets that Donald Trump posted on February 9th, 2016,
all of which are political in nature. The first tweet talks
about drugs. The second tweet raises the issue of Oba-
maCare and points towards President Obama (D).3 The third
tweet is about the ISIS. Trump supporters responded to these
three tweets differently, assigning to the third tweet the most
'likes' and to the second tweet the fewest 'likes.' By con-
necting topics with responses, we are therefore able to infer
the effectiveness of the tactics.
Our approach has a distinct advantage over polls. Individ-
2This selection is based on both polling results and on candi-
dates' performance in the Iowa caucus.
3Throughout, we follow the convention that Republican candi-
dates are marked with (R) and Democratic candidates are marked
with (D).
uals surveyed in polls may not actually turn out to vote and
even if they do vote they might change their mind and vote
differently. By contrast, our data is built on strong revealed
preference. Individuals voluntarily express their preferences,
and thus the estimates we obtain are more reliable.
We organize our paper as follows. Section 2 presents re-
lated work. Section 3 introduces the dataset US2016 and the
methodology. Section 4 presents the tactics we uncover from
the tweets. Section 5 evaluates these tactics. Section 6 ranks
the campaign effectiveness of the five candidates. Section 7
concludes.
Related Work
Our work builds upon previous research in electoral studies
in political science and behavioral studies based on social
media.
Political scientists have long studied the effects of cam-
paigns and public debates. Many studies have found that
campaign and news media messages can alter voters' be-
havior (Riker 1986; Iyengar and Kinder 1987). According to
Gabriel S. Lenz, public debates help inform some of the vot-
ers about the parties' or candidates' positions on the impor-
tant issues (Lenz 2009). In our work, we assume that tweets
posted by the presidential candidates reveal their policy po-
sitions in various dimensions and that supporters reveal their
policy preference by deciding whether or not to 'like' the
tweets.
In a related strand, researchers have found that gender
constitutes an important factor in voting behavior. One com-
mon observation is that women tend to vote for women,
which political scientists refer to as gender affinity effect
(King and Matland 2003; Dolan 2008). In our work, we test
whether the women issue is emphasized in Hillary Clinton's
campaign and evaluate its effectiveness.
There are also a large number of studies on using so-
cial media data to analyze and forecast election results. Di-
Grazia et al. (DiGrazia et al. 2013) find a statistically sig-
nificant relationship between tweets and electoral outcomes.
MacWilliams (MacWilliams 2015) suggests that a candi-
date's number of 'likes' in Facebook can be used for mea-
suring a campaign's success in engaging the public. Accord-
ing to Williams and Gulati (Williams and Gulati 2008), the
number of Facebook fans constitutes an indicator of candi-
date viability. According to O'Connor et al. (O'Connor et al.
2010), tweets with sentiment can potentially serve as votes
and substitute traditional polling. Gayo-Avello, Metaxas and
Mustafaraj (Gayo-Avello, Metaxas, and Mustafaraj 2011),
on the other hand, report unsatisfactory performance of such
predictions and advocate that scholarly research should be
accompanied with a model explaining the predicative power
of social media.
Substantively, our paper is closely related to two existing
studies of the 2016 U.S. presidential election. Wang, Li and
Luo (Wang, Li, and Luo 2016b) study the growth pattern
of Donald Trump's followers. Wang, Li and Luo (Wang, Li,
and Luo 2016a) use Twitter profile images to study and com-
pare the demographics of the followers of Donald Trump
and Hillary Clinton. The authors also study the effects of
public debates on the number of Twitter followers. Our work
uses both the number of candidate followers (as a control
variable) and the number of 'likes' (as the dependent vari-
able). Our contribution is to infer tactic effectiveness from
these 'likes."
There are also quite a few studies modeling individual be-
haviors on social media. Lee et al. (Lee et al. 2015) model
the decision to retweet, using Twitter user features such as
agreeableness, number of tweets posted, and daily tweeting
patterns. Mahmud, Chen, and Nichols (Mahmud, Chen, and
Nichols 2013) model individuals' waiting time before reply-
ing to a tweet based on their previous replying patterns. Our
study models the number of 'likes' that candidates' tweets
receive. Our innovation is to use tweet-specific features in-
stead of individual-specific features, as is done in the above-
cited literature. A closely related work is Wang, et al. (Wang
et al. 2016), which uses Latent Dirichlet Allocation (LDA)
to extract tweet topics and models supporter preferences. In
this paper, we reply on domain knowledge and search for
specific topics using predefined keywords. As a result, we
will have definitive labels.
Data and Methodology
We use the dataset US2016, constructed by us with Twitter
data. The dataset contains a tracking record of the number
of followers for all the major candidates in the 2016 presi-
dential race, including Hillary Clinton (D), Bernie Sanders
(D), Donald Trump (R), Ted Cruz (R), and Marco Rubio (R).
The dataset spans the entire period between September 18th,
2015 and January 23th, 2016, and covers four Democratic
debates and four Republican debates.
Dependent variable
Our dataset US2016 contains all the tweets that the five
candidates posted during the same period and the number of
'likes' that each tweet has received. In Table 1, we report the
summary statistics of the dependent variable: 'likes.'
Table 1: Summary statistics
Mean
Variable
Std. Dev. Min. Max. N
Hillary Clinton 1702.454 1682.262 120 19935 1316
Bernie Sanders 2792.472 2748.807 204 44267 1698
Donald Trump 3757.479 2900.289 730 32652 2533
7991 1309
Ted Cruz
Marco Rubio
4856
908
437.015
367.976
553.396
511.606
8
3
To visualize these tallies, we plot the density distribu-
tion for each candidate, grouped by party affiliation. We
align the x axis so that it is easy to compare the distribu-
tion both across candidates and across parties. We observe
that in the Democratic party, Sanders' tweets tend to receive
more 'likes' than Clinton's tweets. Among Republican can-
didates, Trump's tweets receive more 'likes' than Cruz and
Rubio. Equally important, we observe large variations in the
distribution for all the candidates.
Explanatory Variables
We believe part of the variations can be attributed to the
topics embedded in the tweets: a more preferred topic gener-
ates more 'likes.' To operationalize this idea, we first multi-
label each tweet for the following individual-based topics:
Figure 2: Distribution of 'Likes' in Log units.
President Obama (D), Hillary Clinton (D), Bernie Sanders
(D), Martin O'Malley (D), Donald Trump (R), Ted Cruz
(R), Marco Rubio (R), Jeb Bush (R), Ben Carson (R), Rand
Paul (R), John Kasich (R), and Chris Christie (R).4 We then
multi-label each tweet for issue-based topics: ISIS, immigra-
tion, Iran, women, education, drugs, gun control, abortion,
economy and the Wall Street.5
Topic features are binary. We derive these features using
keyword matching. For example, we assign to the Obama
topic 1 for tweets that contain "Obama" and assign 1 to
the Rubio topic for tweets containing "marcorubio" (case-
sensitive) or "Rubio." For issue topics, we first transform
the tweets to lowercase before the matching procedure. For
example, we assign 1 to the abortion topic for tweets that
either contain "abortion" or "planned parenthood."
Control Variables
Following Wang, et al. (Wang et al. 2016), we control for
the number of followers that each candidate has on Twitter.
Intuitively, the more followers the candidate has the more
'likes' his or her tweets shall receive, as followers are more
likely to notice the tweets posted by these candidates. On
Figure 3, we report the growth of followers for the five can-
didates under study.
In addition to the number of followers, we also control for
three tweet-specific features: the length of the tweet calcu-
lated as the number of words, whether the tweet contains a
hyperlink, which is binary, and whether the candidate men-
tions himself or herself in the message.6
4By the end of the New Hampshire primary, Martin O'Malley
5The
poll
selection
performance. For
(D), Rand Paul (R), and Chris Christie (R) have quit the race.
based
refer
the
http://elections.huffingtonpost.com/pollster#2016-primaries.
Our selection of political issues follows the Bing Political Index.
Available at https://blogs.bing.com/search/2015/12/08/the-bing-
2016-election-experience-how-do-the-candidates-measure-up/.
political
poll
figures
data,
on
to
is
please
6Note that here we treat candidates' self-referencing behavior
of
Figure 3: Growth of Candidates' Twitter Followers.
Negative Binomial Regression
Negative Binomial regression is the main workhorse in
our study. Our dependent variable 'likes' is count data. In
our MLE estimation, we formulate the link functions and
the log-likelihood as follows (Greene 2008):
µ = exp(β0 + β1Follower Count + β2Tweet Length
+ β3Hyperlink + β4Self Referencing
+ γγγ · Political Figures + θ · Political Issues + ν)
eν ∼ Gamma(1/α, α)
p = 1/(1 + αµ)
m = 1/α
lnL =
n
X
j=1
[ln(Γ(m + yj) − ln(Γ(yj + 1)) − ln(Γ(m))
+ mln(pj) + yjln(1 − pj)]
where Follower Count is the number of Twitter followers
(in millions) averaged over the day when the tweet is posted,
Tweet Length is the number of words that the tweet contains.
Hyperlink is binary and is 1 if the tweet contains an external
link. Political Figures is a vector of 11 binary variables. The
binary variable is 1 when the political figure is mentioned in
the tweet and is 0 otherwise. Political Issues is a vector of 10
binary variables. The binary variable is 1 when the political
issue is raised in the tweet and is 0 otherwise. Lastly, α is a
measure of dispersion of the data.
Forward-Stepwise Selection
Out of the total 21 features, we select the top five top-
ics using the Forward-Stepwise selection algorithm (Hastie,
Tibshirani, and Friedman 2013). Such a selection allows us
to uncover the most important topics and to order them ac-
cordingly.7
as a control variable rather than as a distinct topic.
7While we use loglikelihood as our selection criterion, using the
Akaike information criterion (AIC) would yield exactly the same
result, as AIC = 2k - 2loglike.
8
8
10
10
Democrats
6
Republicans
6
4
4
Clinton
Sanders
2
2
Trump
Cruz
Rubio
.6
.2
.4
Density
0
0
.6
.4
Density
.2
0
0
Trump
Cruz
Rubio
4
followers (million)
2
Clinton
Sanders
4
followers (million)
2
Jan 21, 2016
Jan 09, 2016
Dec 29, 2015
Dec 17, 2015
Dec 06, 2015
Nov 24, 2015
Nov 13, 2015
Nov 01, 2015
Oct 20, 2015
Oct 09, 2015
Sep 27, 2015
Sep 16, 2015
Jan 21, 2016
Jan 09, 2016
Dec 29, 2015
Dec 17, 2015
Dec 06, 2015
Nov 24, 2015
Nov 13, 2015
Nov 01, 2015
Oct 20, 2015
Oct 09, 2015
Sep 27, 2015
Sep 16, 2015
0
0
Timeline of Follower Growth
6
6
Forward-Stepwise Selection (S, k)
1: Add in control variables;
2: Initialize the topic set S = {topici,∀i};
3: Initialize the selection set to S∗ = ∅;
3: for i from 1 to k: // k≤ S;
topic= argmax logPr(Θy, topic ∈ S);
4:
5:
S∗ = S∗ ∩ {topic};
6:
S = S\{topic};
7: end for;
and Donald Trump, with President Obama being a distant
third.8 Other political figures barely receive attention.
In Figure 5, we present the histogram of the individual-
based tweet topics for Trump, Cruz and Rubio. One sharp
contrast among the three candidates is that Donald Trump
virtually engages with all the political figures, whereas Ted
Cruz and Marco Rubio focus their attacks on President
Obama and Hillary Clinton.9
Tactic Evaluation
dates' tactics:
We propose the following metric to measure the candi-
Eval(i) =Xj
f (j)p(ji,X I(j) > 0)
where i denotes candidate, j denotes topic, f(j) denotes the
marginal effects of topic j that we derive using negative bi-
nomial regression, and p(j-i,P I(j) > 0) denotes the con-
ditional probability of candidate i engaging in topic j given
the candidate is raising at least one topic. We learn this con-
ditional distribution from the tweets.
Tactics
In this section, we report on the tactics that we uncover from
the candidates' tweets. We first present the tactics with re-
gard to political figures and then present tactics on policy
issues. We follow the convention to color Democrats blue
and Republicans red. Whenever possible, we draw refer-
ences from the political science literature.
Political Figures
Figure 4: Distribution of Tweets on Political Figures for
Hillary Clinton and Bernie Sanders.
In Figure 4, we present the histogram of the individual-
based tweet
topics. One immediate observation is that
Hillary Clinton focuses on Donald Trump and President
Obama, and that Bernie Sanders focuses on Hillary Clinton
Figure 5: Distribution of Tweets on Political Figures for
Donald Trump, Ted Cruz and Marco Rubio.
Political Issues
In Figure 6, we report on the political issues that Demo-
cratic candidates focus on. Hillary Clinton focuses on the
women issue and on gun control; Bernie Sanders focuses on
the economy, the Wall Street, and education.
Putting women at the center of her campaign is one of
the key strategies in Hillary Clinton's campaign.10 Passing
tougher gun control regulations is also high on her agenda,
as Clinton tries to follow President Obama who has been
pushing for gun controls. Bernie Sanders is less progressive
8Note that while Clinton's focus is on both Trump and President
Obama, she is attacking Trump while embracing President Obama.
This is not immediately readable from the histogram.
9For a discussion of Marco Rubio's attacks on President
http://abcnews.go.com/Politics/marco-
Obama,
rubio-defends-repeated-attack-president-obama-
republican/story?id=36760445.
please
see.
10For
a detailed historical discussion and a
compari-
the White House in 2008, see
son with Clinton's bid for
http://thehill.com/homenews/campaign/219058-hillary-clinton-
puts-womens-rights-at-center-of-her-agenda.
Clinton
Christie
Kasich
Rubio
Paul
Carson
Jeb
Cruz
Trump
OMalley
Sanders
Clinton
Obama
Sanders
Christie
Kasich
Rubio
Paul
Carson
Jeb
Cruz
Trump
OMalley
Sanders
Clinton
Obama
010203040
Frequency
01020304050
Frequency
Trump
Christie
Kasich
Rubio
Paul
Carson
Jeb
Cruz
Trump
OMalley
Sanders
Clinton
Obama
Cruz
Christie
Kasich
Rubio
Paul
Carson
Jeb
Cruz
Trump
OMalley
Sanders
Clinton
Obama
Rubio
Christie
Kasich
Rubio
Paul
Carson
Jeb
Cruz
Trump
OMalley
Sanders
Clinton
Obama
0200
Frequency
0100
Frequency
0100
Frequency
Figure 6: Distribution of Tweets on Political Issues for
Hillary Clinton and Bernie Sanders.
on that issue. As New York Times writes, Sanders' mixed
record on gun controls is one of his major vulnerabilities
in the campaign.11 Our data shows that Sanders' strategy is
to avoid this issue.
In Figure 7, we report on the political issues that Re-
publican candidates focus on. Trump's most frequent topic
is immigration, which is not surprising given Trump is the
original proposer for constructing a wall between the United
States and Mexico. For Ted Cruz and Marco Rubio, it is the
ISIS. The overall pattern is that the Republican candidates
focus on foreign affairs, and the Democrats focus on domes-
tic affairs.
Tallies
In this section, we first use negative binomial regression to
connect these tactics to the tallies of 'likes' and measure
which tactic fairs best in terms of generating 'likes.' Sec-
ondly, we use Forward-Stepwise selection to select and rank
the top 5 salient topics for the candidates.
Negative Binomial regression
We report the estimated coefficients in Table 2. Each col-
umn represents one candidate and each row represents one
topic or one control variable. Cells are missing when candi-
dates do not discuss the corresponding topic (represented by
rows).
We shall only interpret a few highlights here, but our re-
sults are much richer. First, we find the mention of Presi-
dent Obama increases the number of 'likes' for Clinton but
not so for Sanders. This is strategically important when it
comes to how candidates position themselves. While Pres-
ident Obama has not explicitly endorsed either Clinton or
Figure 7: Distribution of Tweets on Political Issues for Don-
ald Trump, Ted Cruz and Marco Rubio.
Sanders 12, voters tend to identify him more with the former
Secretary of State than with Senator Sanders. Now in retro-
spect, Sanders' strategy of downplaying President Obama in
his campaign is wise.
We also observe that focusing on attacking President
Obama does not serve Cruz or Rubio well. This is an im-
portant discovery, because, unlike Sanders, both these candi-
dates are investing heavily on the Obama topic. And we are
showing this strategy is not generating many 'likes' among
their supporters.
On the ISIS issue, our results show that all the Republican
candidates are drawing more 'likes,' and that neither Demo-
cratic candidate wins on this issue. On immigration, Don-
ald Trump (R) is clearly the winner. Hillary Clinton (D) and
Bernie Sanders (D) both suffer on this topic. It is therefore
no accident that the most frequent issue topic in Trump's
campaign is immigration: it serves him well.
For Donald Trump (R), our results are consistent with
(Wang et al. 2016), which finds that Trump supporters re-
spond well to attacks on Democrats but less positively to-
wards attacks on fellow Republicans, such as Jeb Bush. Our
study shows that the result still holds at individual level and
suggests that Trump should shift his attention away from fel-
low Republicans and focus more on Democrats.
For Rubio (R), one topic that resonates particularly well
and sets himself apart from others is abortion. During the
eighth Republican debate, Rubio attacks Clinton (D) and
11http://www.nytimes.com./politics/first-
draft/2016/01/08/obamas-pledge-on-gun-control-leaves-bernie-
sanders-with-something-to-prove/? r=0.
12This is stated by the White House Chief of Staff Denis
McDonough. Available at http://www.reuters.com/article/us-usa-
election-obama-idUSKCN0UO0L720160110.
Sanders
Wall Street
Economy
Abortion
Gun Control
Drugs
Education
Woman
Iran
Immigration
ISIS
0
020406080
Frequency
Wall Street
Economy
Abortion
Gun Control
Drugs
Education
Woman
Iran
Immigration
ISIS
Clinton
100
50
Frequency
Wall Street
Economy
Abortion
Gun Control
Drugs
Education
Woman
Iran
Cruz
Wall Street
Economy
Abortion
Gun Control
Drugs
Education
Woman
Iran
Rubio
Immigration
Immigration
ISIS
ISIS
Wall Street
Economy
Abortion
Gun Control
Drugs
Education
Woman
Iran
Immigration
ISIS
Trump
033
Frequency
031
Frequency
015
Frequency
Likes
Followers
Length
Http
Obama
Clinton
Sanders
OMalley
Jeb
Table 2: Negative Binomial Regression
Clinton Sanders Trump
Cruz
Rubio
(0.34)
(0.087)
(0.023)
0.30∗∗∗ 0.43∗∗∗ 0.57∗∗∗ 3.88∗∗∗ 3.48∗∗∗
(0.072)
(0.61)
-0.015∗∗∗ -0.0062 0.015∗∗∗ 0.056∗∗∗ 0.071∗∗∗
(0.0040) (0.0037) (0.0018) (0.0040) (0.0075)
-0.27∗∗∗ -0.52∗∗∗ 0.11∗∗∗ 0.44∗∗∗ 0.45∗∗∗
(0.045)
(0.083)
0.12
0.33∗
(0.15)
(0.15)
0.37∗
-0.45∗∗∗
(0.039)
(0.17)
0.084
(0.34)
(0.061)
(0.025)
0.13
0.39∗∗∗
(0.070)
(0.13)
0.28∗∗∗ 0.91∗∗∗
(0.046)
(0.25)
0.19
(0.14)
0.39
(0.28)
(0.036)
-0.16
(0.27)
0.28
(0.14)
0.67∗∗∗
(0.14)
-0.19
(0.66)
(0.15)
Christie
ISIS
Trump
Cruz
Carson
Rubio
Kasich
Rand Paul
0.67
(0.39)
(0.051)
0.88
(0.78)
0.20
(0.33)
-0.32∗
(0.13)
0.33
(0.38)
-0.30
(0.66)
-0.52
(0.38)
1.34∗
(0.66)
0.075
(0.46)
-0.73
(0.49)
0.43∗∗∗ 1.10∗∗∗ -0.34∗∗∗ 1.12∗∗∗
(0.13)
(0.24)
-0.17
(0.66)
2.62∗
(0.021)
(1.10)
-0.096 -0.52∗∗∗ 1.89∗
(0.78)
(0.063)
0.79
-0.25∗∗
(0.56)
(0.078)
-0.11∗
-3.00∗
(1.36)
(0.047)
-1.00∗∗
-0.12
(0.066)
(0.31)
-0.11
(0.10)
0.028
(0.20)
-0.42∗
(0.16)
0.48∗∗∗ 0.50∗∗∗ 1.18∗∗∗
-0.011
(0.29)
(0.12)
(0.15)
-0.17
0.18∗
Immigration -0.40∗∗
(1.10)
(0.090)
(0.14)
0.063
0.22
0.15
(0.14)
(0.30)
(0.32)
-0.23
-0.042
0.24∗∗∗ 0.48∗∗∗
(0.64)
(0.10)
(0.096)
(0.071)
0.53
0.65∗
0.30∗∗∗
-0.14
(0.29)
(0.78)
(0.085)
(0.14)
-0.76
0.083
0.023
(0.12)
(0.21)
(0.48)
0.19
0.62∗∗∗ 0.61∗∗
0.12
(0.25)
(0.18)
(0.073)
(0.20)
0.13
0.077
0.36
(0.30)
(0.20)
(0.15)
0.11
-0.23∗∗
-0.27∗
(0.55)
(0.074)
(0.11)
-1.72∗
-0.19∗
-0.63∗∗∗
(0.18)
(0.79)
(0.077)
6.59∗∗∗ 7.79∗∗∗ 5.23∗∗∗ 2.54∗∗∗
0.91
(0.35)
(0.22)
(0.59)
0.44∗∗∗ 0.43∗∗∗ 0.23∗∗∗ 0.60∗∗∗ 1.20∗∗∗
(0.016)
(0.050)
-0.83∗∗∗ -0.85∗∗∗ -1.48∗∗∗ -0.51∗∗∗ 0.19∗∗∗
(0.037)
(0.041)
1306
(0.14)
-0.41
(0.22)
0.073
(0.17)
0.27
(0.26)
-0.021
(0.28)
0.39
(0.40)
1.30∗∗
(0.49)
1.00∗
(0.49)
0.041
(0.15)
-0.64
(0.48)
(0.028)
2445
(0.037)
1252
(0.032)
1688
Gun Control
Wall Street
Education
(0.014)
(0.006)
(0.022)
(0.11)
(0.12)
α
ln(α)
Economy
Abortion
Iran
Women
Drugs
Constant
21568.1 29468.6 42921.2 17215.4 11979.5
889
Observations
AIC
Standard errors in parentheses
∗ p < 0.05, ∗∗ p < 0.01, ∗∗∗ p < 0.001
Sanders (D) for not raising the issue during the Democratic
debates.13 This criticism is consistent with our data: both
Clinton and Sanders have downplayed the topic of abortion.
Rubio is also strategically right in emphasizing his pro-life
stance, when he explains that he would rather lose an elec-
tion than be wrong about abortion. Our study shows that the
topic of abortion resonates well with Rubio's supporters.
To numerically evaluate the effectiveness of each topic
for each candidate, we calculate the marginal effects of that
topic, while holding all other variables to their mean. We
then plot the estimates with 95% confidence intervals in Fig-
ures 8-12. They are reported at the end of the paper.
Using likelihood ratio test on α, we are further able to
confirm the existence of over-dispersion, and thus confirm
that negative binomial regression is more appropriate than
Poisson regression.
Topic Selection
We use the Forward-Stepwise selection algorithm to se-
quentially select the five most salient topics for each can-
didate. The selected topics are the ones that influence the
number of 'likes' the most. We present the results in Tables
3 and 4.
Table 3: Topic Selection (D)
Topic
Clinton
Topic
Sanders
Likes
1
2
3
4
5
Constant
α
Constant
Trump
Women
Economy
Wall Street
0.42∗∗∗
(0.13)
-0.27∗
(0.11)
-0.65∗∗∗
(0.17)
0.23∗∗
(0.070)
Immigration -0.39∗∗
(0.14)
6.66∗∗∗
(0.34)
0.44∗∗∗
(0.016)
-0.82∗∗∗
(0.037)
1306
21556.7
N
AIC
Standard errors in parentheses
∗ p < 0.05, ∗∗ p < 0.01, ∗∗∗ p < 0.001
Gun
Trump
Women
1.10∗∗∗
(0.15)
0.54∗∗∗
(0.092)
0.62∗∗∗
(0.18)
Education 0.29∗∗∗
(0.085)
Economy -0.25∗∗∗
(0.075)
7.81∗∗∗
(0.11)
0.43∗∗∗
(0.014)
-0.84∗∗∗
(0.032)
1688
29473.3
Our study shows that Donald Trump (R) is on the top-5
list of all other candidates. It also shows that the ISIS topic
is on the top lists of all the Republican candidates but is
not prioritized either by Clinton or Sanders. Women is an
important topic for Hillary Clinton (D). But it ranks even
higher for Bernie Sanders (D). This is consistent with the
exit poll results after the New Hampshire primary, in which
Sanders won more women votes than Clinton and 69% of
13http://www.npr.org/sections/thetwo-
way/2016/02/06/465880648/the-8th-republican-debate-in-100-
words-and-3-videos.
women under 45 backed Sanders.14
Table 4: Topic Selection (R)
Topic Trump Topic Cruz
Topic
Rubio
Obama 0.39∗∗∗ Trump 1.10∗∗∗ ISIS
Clinton0.30∗∗∗ Clinton 0.92∗∗∗ Trump
(0.070)
(0.045)
0.49∗∗∗ ISIS
(0.12)
(0.24)
1.20∗∗∗
(0.29)
2.56∗
(0.25)
(1.11)
0.49∗∗∗ Abortion 1.26∗
(0.50)
(0.14)
1.50∗
(0.64)
Cruz
Economy0.97
ISIS
Gun
Likes
1
2
3
4
5
Const.
α
Const.
Educt. 0.79∗∗ Rubio 0.65
(0.28)
0.56∗∗
(0.20)
5.26∗∗∗
(0.11)
0.23∗∗∗
(0.006)
-1.46∗∗∗
(0.028)
2445
42936.5
(0.39)
Immigt.-0.42
(0.22)
2.51∗∗∗
(0.21)
0.60∗∗∗
(0.022)
-0.51∗∗∗
(0.037)
1252
17205.2
N
AIC
Standard errors in parentheses
∗ p < 0.05, ∗∗ p < 0.01, ∗∗∗ p < 0.001
(0.50)
0.50
(0.57)
1.22∗∗∗
(0.050)
0.20∗∗∗
(0.041)
889
11974.0
Tactic Evaluation
In this section, we evaluate the candidates' tactics by con-
necting their tweeting tactics and the 'likes' tally. We just
observed that Donald Trump (R) is receiving many 'likes'
for his comments on President Obama (D) and Hillary Clin-
ton (D), but meanwhile he is also spending much time at-
tacking Jeb Bush and Marco Rubio, which is not generating
positive response. Senator Sanders (D), almost knowingly,
avoids talking about President Obama to his benefits but his
focus on the Wall Street is not generating positive response.
To solve this problem, we provide a unified approach to
evaluate and rank the candidates' tactics, using the metric
proposed in Section 3.
Eval(i) =Xj
f (j)p(ji,X I(j) > 0)
In Table 5, we report the evaluation results. Our calcu-
lation suggests that Sanders, who cunningly avoids talking
about President Obama and focuses on Trump instead, has
the best performing tactic. Hillary Clinton comes last. This
can be attributed to the fact that women issue and gun control
issue, which she invests heavily in, is not generating many
'likes.'15
14http://abcnews.go.com/PollingUnit/voted-live-hampshire-
primary-exit-poll-analysis/story?id=36805930.
15After her defeat in the New Hampshire primary, Clinton
started to consider adjusting her strategies. For details, please
see http://www.wsj.com/articles/hillary-clinton-cast-in-underdog-
role-as-new-hampshire-votes-1455041196#livefyre-comment.
Table 5: Tactic Evaluation
Candidate
Sanders
Trump
Rubio
Cruz
Clinton
Score
295.46
236.63
147.69
117.88
89.81
Party
D
R
R
R
D
Rank
1
2
3
4
5
Conclusions
We have presented a framework to measure, evaluate and
rank the campaign effectiveness. We have studied the tac-
tics and tallies of the ongoing 2016 U.S. presidential elec-
tion. Using Twitter data collected from Sept. 2015 to Jan.
2016, we have uncovered the tweeting tactics of the can-
didates and second we have evaluated the effectiveness of
the candidates' tactics using negative binomial regression
and exploiting the variations in 'likes.' We have also applied
the Forward-Stepwise selection algorithm to select the most
salient topics for the candidates. Lastly, we have calculated
the expected number of 'likes' that each tactic is generating
and ranked them.
We observe that while Ted Cruz and Marco Rubio put
considerable weight on President Obama, their tactics are
not well received by their supporters. We also demonstrate
that Hillary Clinton's tactic of linking herself to President
Obama resonates well with her supporters but it is not so
for Bernie Sanders. We also show that Trump is now a ma-
jor topic for all the other presidential candidates and that
the women issue is equally, if not more so, emphasized in
Sanders' campaign as in Clinton's.
Our study shows two possible ways that politicians can
use the feedback mechanism in social media to improve their
campaign: (1) use feedback from social media to improve
campaign tactics within social media; (2) prototype policies
and test the public response from the social media.
References
DiGrazia, J.; McKelvey, K.; Bollen, J.; and Rojas, F. 2013.
More tweets, more votes: Social media as a quantitative in-
dicator of political behavior. PLoS ONE.
Dolan, K. 2008. Is There a Gender Affinity Effect in Ameri-
can Politics? Information, Affect, and Candidate Sex in U.S.
House Elections. Political Research Quarterly.
Gayo-Avello, D.; Metaxas, P. T.; and Mustafaraj, E. 2011.
Limits of Electoral Predictions Using Twitter. In Proceed-
ings of the Fifth International AAAI Conference on Weblogs
and Social Media.
Greene, W. 2008. Functional forms for the negative bino-
mial model for count data. Economic Letters (99):585–590.
Hastie, T.; Tibshirani, R.; and Friedman, J. 2013. The Ele-
ments of Statistical Learning. Springer, 2nd edition.
Iyengar, S., and Kinder, D. 1987. News That Matter: Tele-
vision and American Opinion. University of Chicago Press.
King, D. C., and Matland, R. E.
Sex and the
Grand Old Party: An Experimental Investigation of the Ef-
2003.
fect of Candidate Sex on Support for a Republican Candi-
date. American Politics Research.
Lee, K.; Mahmud, J.; Chen, J.; Zhou, M.; and Nichols, J.
2015. Who will retweet this? detecting strangers from twit-
ter to retweet information. ACM Transactions on Intelligent
Systems and Technology 6(3):1–25.
Lenz, G. S. 2009. Learning and Opinion Change, Not Prim-
ing: Reconsidering the Priming Hypothesis. American Jour-
nal of Political Science.
MacWilliams, M. C. 2015. Forecasting Congressional Elec-
tions Using Facebook Data. PS: Political Science & Politics
48(04).
Mahmud, J.; Chen, J.; and Nichols, J. 2013. When will
you answer this? estimating response time in twitter. In Pro-
ceedings of the Seventh International AAAI Conference on
Weblogs and Social Media.
O'Connor, B.; Balasubramanyan, R.; Routledge, B. R.; and
Smith, N. A. 2010. From Tweets to Polls: Linking Text
Sentiment to Public Opinion Time Series. In Proceedings of
the Fourth International AAAI Conference on Weblogs and
Social Media.
Riker, W. H. 1986. The Art of Political Manipulation. Yale
University Press.
Sanders, B. 2016. Our Revolution: A Future to Believe In.
Thomas Dunne Books.
Wang, Y.; Luo, J.; Li, Y.; and Hu, T. 2016. Catching Fire
via 'Likes': Inferring Topic Preferences of Trump Followers
on Twitter. In Proceedings of the 10th International AAAI
Conference on Web and Social Media (ICWSM-16).
Wang, Y.; Li, Y.; and Luo, J. 2016a. Deciphering the 2016
U.S. Presidential Campaign in the Twitter Sphere: A Com-
parison of the Trumpists and Clintonists. In Proceedings of
the 10th International AAAI Conference on Web and Social
Media (ICWSM-16).
Wang, Y.; Li, Y.; and Luo, J. 2016b. To Follow or Not to
Follow: Analyzing the Growth Patterns of the Trumpists on
Twitter. In Workshop Proceedings of the 10th International
AAAI Conference on Web and Social Media.
Williams, C. B., and Gulati, G. J. 2008. The Political Im-
pact of Facebook: Evidence from the 2006 Midterm Elec-
tions and 2008 Nomination Contest. Politics & Technology
Review, March, 11-21. Politics & Technology Review.
Figure 9: Topic Effects of Sanders's Tweets.
Figure 10: Topic Effects of Trump's Tweets.
Figure 11: Topic Effects of Cruz's Tweets.
Figure 8: Topic Effects of Clinton's Tweets.
Figure 12: Topic Effects of Rubio's Tweets.
|
1804.02233 | 2 | 1804 | 2018-04-16T11:53:56 | Forex trading and Twitter: Spam, bots, and reputation manipulation | [
"cs.SI",
"cs.CL",
"cs.CY",
"econ.TH"
] | Currency trading (Forex) is the largest world market in terms of volume. We analyze trading and tweeting about the EUR-USD currency pair over a period of three years. First, a large number of tweets were manually labeled, and a Twitter stance classification model is constructed. The model then classifies all the tweets by the trading stance signal: buy, hold, or sell (EUR vs. USD). The Twitter stance is compared to the actual currency rates by applying the event study methodology, well-known in financial economics. It turns out that there are large differences in Twitter stance distribution and potential trading returns between the four groups of Twitter users: trading robots, spammers, trading companies, and individual traders. Additionally, we observe attempts of reputation manipulation by post festum removal of tweets with poor predictions, and deleting/reposting of identical tweets to increase the visibility without tainting one's Twitter timeline. | cs.SI | cs | Forex trading and Twitter:
Spam, bots, and reputation manipulation
Igor Mozetic1, Peter Gabrovsek2, Petra Kralj Novak1
1 Department of Knowledge Technologies, Jozef Stefan Institute, Ljubljana, Slovenia
2 Faculty of Computer and Information Science, University of Ljubljana, Slovenia
Correspondence: [email protected]
Abstract
Currency trading (Forex) is the largest world market in terms of volume. We analyze trading and
tweeting about the EUR-USD currency pair over a period of three years. First, a large number of tweets
were manually labeled, and a Twitter stance classification model is constructed. The model then
classifies all the tweets by the trading stance signal: buy, hold, or sell (EUR vs. USD). The Twitter
stance is compared to the actual currency rates by applying the event study methodology, well-known in
financial economics. It turns out that there are large differences in Twitter stance distribution and
potential trading returns between the four groups of Twitter users: trading robots, spammers, trading
companies, and individual traders. Additionally, we observe attempts of reputation manipulation by
post festum removal of tweets with poor predictions, and deleting/reposting of identical tweets to
increase the visibility without tainting one's Twitter timeline. 1
1
Introduction
Foreign exchange market (Forex) is a global decentralized market for trading with currencies. The daily
trading volume exceeds 5 trillion USD, thus making it the largest market in the world.
In this paper we analyze three sources of data, over a period of three years (from January 2014 to
December 2016) [6]:
• the actual EUR-USD exchange rates,
• financial announcements provided by the central banks (ECB and FED) and governments that
influence both currencies (called "events"), and
• tweets related to both currencies and their exchange.
We focus on potential missinformation spreading and manipulations on Twitter. The main issue is:
What is the ground truth? We address this problem by moving out of the social network system and by
observing another, financial market system. Actual financial gains in the market provide clues to
potential manipulations in the social network.
We relate both systems by applying and adapting the "event study" methodology [9]. The currency
announcements are events which are expected to influence the EUR-USD exchange rate. If the event
signal (buy, hold, or sell) is properly recognized then some actual financial returns can be made in the
hours (or days) after the event. In contrast to classical event studies, we categorize events on the basis
of sentiment (properly called "stance") of relevant Twitter users. In our previous work, we already
analyzed the effects of Twitter stance on stock prices (30 stocks from the Dow Jones index) [7, 14]. We
showed that the peaks of Twitter activity and their polarity are significantly correlated with stock
returns. In this paper, we show that, for certain classes of Twitter users, returns after the events are
1Presented at MIS2: Misinformation and Misbehavior Mining on the Web, Workshop at WSDM-18, Marina Del Rey,
CA, USA, February 9, 2018.
8
1
0
2
r
p
A
6
1
]
I
S
.
s
c
[
2
v
3
3
2
2
0
.
4
0
8
1
:
v
i
X
r
a
1
statistically significant (albeit small). And we can also identify differences in returns after the potential
manipulations of Twitter feed.
The paper is organized as follows. In section 2 we specify how the Forex tweets were collected, a
subset manually annotated, and a stance classification model constructed. Section 3 provides simple
rules to identify different classes of Twitter users (such as trading robots, spammers, and actual traders).
We show that there are large differences in Twitter stance between these users. Section 4 describes the
event study methodology in some detail, as needed to understand the subsequent results. We show
significant differences in cumulative abnormal returns between the different user groups. In section 5 we
address potential manipulations of the user Twitter feed with a tentative goal to improve her/his
reputation and visibility. We focus on the tweets that were deleted after we originally collected them,
and analyze different reasons for this post festum deletions. We conclude with the ideas for further work
and enhancements of the preliminary, but promising, results presented so far.
2 Twitter stance model
Tweets related to Forex, specifically to EUR and USD, were acquired through the Twitter search API
with the following query: "EURUSD", "USDEUR", "EUR", or "USD". In the period of three years
(January 2014 to December 2016) almost 15 million tweets were collected. A subset of them (44,000
tweets) was manually labeled by knowledgeable students of finance. The label captures the leaning or
stance of the Twitter user with respect to the anticipated move of one currency w.r.t. the other. The
stance is represented by three values: buy (EUR vs. USD), hold, or sell. The tweets were collected,
labeled and provided to us by the Sowa Labs company (http://www.sowalabs.com).
The labeled tweets were generalized into a Twitter stance model. For supervised learning, variants of
SVM [16] are often used, because they are well suited for large scale text categorization, are robust, and
perform well. For Forex tweets, we constructed a two plane SVM classifier [11, 12]. The two plane SVM
assumes the ordering of stance values and implements ordinal classification. It consists of two SVM
classifiers: One classifier is trained to separate the 'buy' tweets from the 'hold-or-sell' tweets; the other
separates the 'sell' tweets from the 'buy-or-hold' tweets. The result is a classifier with two hyperplanes
that partitions the vector space into three subspaces: buy, hold, or sell. During classification, the
distances from both hyperplanes determine the predicted stance value.
The stance classifier was evaluated by 10-fold blocked cross-validation. Since tweets are time-ordered,
they should not be randomly selected into individual folds, but retained in blocks of consecutive
tweets [3]. The results of performance evaluation are in Table 1. Note that the F1 measure considers just
the 'buy' and 'sell' classes, as is common in the three-valued sentiment classification evaluations [11].
Table 1. Evaluation results of the Twitter stance model.
Measure
Accuracy
F1(buy, sell)
Value
0.811 ± 0.014
0.810 ± 0.014
3 Twitter user groups
Different types of Twitter users have very different intentions regarding their impact and message they
want to spread. In recent years, specially automated robots became increasingly influential. To properly
estimate the relation between the Forex market and tweetosphere, it is important to focus on relevant
Twitter users, i.e., Forex trading companies and individual traders.
In related work, it was already shown that bots exercise a profound impact on content popularity
and activity on Twitter. For example, Gilani et al. [8] implemented a simple bot detection mechanism
based on click frequency and user agent strings. To classify users into three categories (organizations,
2
journalists/media bloggers, and individuals), De Choudhury et al. [5] trained an automatic classifier. An
alternative approach is to detect communities in a retweet network, e.g., [4, 15].
It turns out that it is easy to identify Forex trading robots. Their tweets (t(bots)) all start with one
of the eighth patterns (such as "Closed Buy", "Sell stop", ...). The Forex Twitter users can then be
classified into one of the four groups by the following simple rules:
• Trading robots:
t(bot)rate > 0.75
• Spam/scam/advertisements:
tweets > 1000 & retweetedratio < 0.01
• Trading companies:
daysactive > 30 & trate > 0.5 & retweetedratio > 0.25
• Individual traders:
daysactive > 30 & retweetedratio > 0.05
where trate = tweets/daysactive indicates the daily activity of the user, and
retweetedratio = retweeted/tweets is the proportion of the user tweets that were retweeted by others.
Figure 1 shows the proportions of different Twitter user groups and their tweets in our dataset. We
can see that more than half of the users are individuals, but that the trading robots produce by far the
largest fraction of Forex tweets.
Fig 1. Proportions of Twitter accounts and tweets for different user groups.
There are also considerable differences in the stance between different user groups. Figure 2 shows
that trading robots produce almost exclusively polarized tweets (no 'hold' tweets). On the other hand,
spammers (without robots) are predominantly neutral (relatively few 'buy' or 'sell' tweets). The groups
we focus on, trading companies and individuals, are more opinionated than spammers. It is interesting
that in their tweets the 'sell' signal is prevailing, probably due to the downward trend of EUR vs. USD
in the last three years.
3
Fig 2. Twitter stance distribution of different user groups (bars show the proportion of tweets).
Trading robots produce almost exclusively polarized tweets while spammers are predominantly neutral.
4 Event study
An event study captures the impact of external events on the market returns. External events that we
consider here are the currency related announcements by the central banks (FED and ECB) and
governments (around 750 in the three years). In an event study, Cumulative Abnormal Return (CAR) is
defined as a measure of return which exceed the overall market return. Specifically:
• Market model corresponds to the overall market movement before the event. In our case, we use
a linear regression of 30 days currency ratios prior to the event. The market model price is then
subtracted from the actual currency price (at one minute resolution) to get the abnormal price
(pab):
pabi = pi − k ∗ i
where pi is actual price at time i after the event.
• Abnormal return is computed as a relative (abnormal) price change:
rabi =
pabi+1 − pabi
pabi
• Cumulative abnormal return (CAR) measures aggregated returns over longer periods of
time i:
CAR =
n(cid:88)
rabi
The other essential component of an event study is determining the type of event in terms of its
expected impact on the price. In stock market, typically Earnings Announcements are studied. If an
announcement exceeds prior expectations of analysts, it is classified as positive, and stock prices are
i=0
4
expected to rise. An event study combines announcements about several stocks, over longer period of
time, and computes the average CARs in the days or hours after the announcements.
In our case, we do not consider expectation of the analysts, but instead use the stance of the Forex
Twitter users regarding the EUR vs. USD exchange rate. We consider all tweets in one hour after the
announcement, and aggregate their stance to categorize the event. Then we compute the CARs for up
to one day after the event, at one minute resolution. If Twitter stance correctly predicts the exchange
rate movement then there should be some tangible returns (CARs) in the hours after the event.
Figure 3 shows returns, aggregated over all 750 events, for different Twitter user groups. The
expected result is visible for trading companies (bottom-left chart). For 'buy' events (we buy EUR at
time 0) CARs are positive (return is around 0.1%, small but significant), for 'sell' events (we sell EUR at
time 0) CARs are negative , and for 'hold' events (no transaction) CARs are around zero. Similar
results are obtained for individual traders (bottom-right chart), but the separation of events is not as
clear as for trading companies.
Fig 3. Cumulative abnormal returns (CARs) for different user groups. The events are classified as
'buy', 'hold', or 'sell' according to the cumulative Twitter stance in one hour after the event. The event
is announced at lag = 0. CARs are computed at one minute resolution, for up to one day (1440 minutes)
after the event.
On the other hand, trading robots and spam users (top two charts in Figure 3) show no useful
correlation between the Twitter stance and CARs. As a consequence, we conclude that it is important
to properly identify them and eliminate their tweets from any trading strategy based on Twitter.
5
5 Reputation manipulation
Here we focus on another aspect of Twitter misuse for potential manipulation: post festum deletion of
tweets by the Twitter user. What are the reasons for users to delete their tweets? Previous research
addressed prediction of malicious or deleted tweets [1, 10, 13], and identification of deleted and suspicious
accounts [17]. On one hand, some authors show that typos and rephrasing are among the major causes
for deleting tweets [1]. On the other hand, other authors found that in deleted tweets, a significantly
higher fraction of the vocabulary consists of swear words, and markers that indicate anger, anxiety, and
sadness [2].
Fig 4. Fractions of tweets deleted for different user groups.
We verified which of the tweets that were collected during the three years in near real time, still exist.
It turns out that in our dataset, 4.7% (689,658) posts were post festum deleted by the users. Different
user groups exhibit different patterns of deletion. A histogram in Figure 4 shows fractions of tweets
deleted by different user groups. The majority of users do not delete their own tweets at all (peak at 0).
At the other extreme (100), there is about 5% of the users who deleted their accounts and all their
tweets. But the really interesting are the trading companies, where only one third of them does not
delete tweets, and more than half of them delete up to 10% of their tweets.
We focus on the deleted tweets by trading companies and individual traders and search for signs of
reputation manipulations. A breakdown of deleted tweets for both groups in terms of different stances is
in Table 2.
User group
Trading
companies
Individual
traders
Buy
Hold
Sell
453 (2.3%)
3,285 (2.4%)
1,297 (2.4%)
4,438 (4.1%)
35,915 (7.3%)
11,572 (5.5%)
Table 2. The number of deleted tweets of different stance.
6
5.1 Deleting tweets to increase CARs
One reason for companies and individuals to delete their tweets might be to create an image of their
capabilities to predict the market. For example, one can post two contradictory tweets at the same time:
EUR will go up, and EUR will go down. After the market shows the actual EUR move, the incorrect
prediction is deleted, and the user's timeline shows his forecasting insight.
We compare the results of the event study before and after the tweets were deleted. Figure 5 shows
CARs for trading companies and individual traders after removing their deleted tweets. At this point,
we can report only negative results, i.e., there is no increase of CARs, and the 'hold' events are further
away from the zero line than in Figure 3.
Fig 5. Cumulative abnormal returns (CARs) for trading companies and individual traders, after
removing the tweets that were post festum deleted by the user.
7
5.2 Analyzing trading companies
We analyze deleted tweets of 189 (out of 195) Twitter users categorized as trading companies that have
active Twitter accounts (by deleting an account, all the tweets from that account are also deleted). The
189 companies deleted 3,741 tweets. Among them, four deleted all Forex related tweets from their profile
while the accounts are still active, 8 users deleted between 10% and 40% of their tweets, 33 users deleted
between 1% and 5% of their tweets, and only 68 did not delete any tweets. The deleting behaviour of
trading companies is shown in Figure 6. Note that the majority (76% of the trading companies) deleted
less than 1% of their tweets. Note also that there are no trading companies that delete between 5 and
10% of their tweets. We analyze the deleted tweets and focus on criteria that might indicate reputation
manipulation.
Fig 6. The fractions of deleted tweets (altogether 3,741 tweets) for the 189 trading companies.
Out of the 3,741 deleted tweets, 3,611 are unique (same author and identical text) while 130 tweets
are deleted more than once. An extreme case is a tweet (advertising easy and safe profit) which is
deleted 46 times (same author and identical text). The deleting and reposting of identical tweets is one
form of increasing visibility without tainting the author's Twitter timeline. A tweet that is deleted and
posted again appears several times in the user's followers feed while it appears just once in the authors
timeline. This can be therefore considered a kind of reputation manipulation. Out of the 93 tweets that
were deleted and reposted, 50 were deleted and reposted once while the rest were deleted and reposted
several times. The 746 'recommendation' tweets that were deleted afterward point to a potential
reputation manipulation by deleting the bad recommendations. The breakdown of deleted tweets is
shown in Figure 7.
One of the major reasons to delete tweets are typos and rephrasing [1]. In these cases, a very similar
tweet to the deleted tweet is posted again. We check for each of the 3,575 tweets that were deleted once
and not reposted, if they were deleted due to a typo. We define typo as a reason of tweet deletion if the
tweet is:
• posted by the same author,
• within the three next tweets after the deleted one,
• with a very similar text (1 < Levenshtein distance < 4),
• and the difference is not in the URLs present in the tweet.
We found that 122 deleted tweets were reposted with changes so small that indicate typos.
8
Fig 7. A breakdown of deleted tweets by trading companies.
Another category of deleted tweets are retweets. If retweets are deleted, it is usually because the
original tweets were deleted. In our dataset, 406 retweets are deleted.
We check the remaining 3,437 tweets for the use of vocabulary specific for trading: long, short, bear,
bull, bearish, bullish, resistance, support, buy, sell, close. We identify 746 tweets that are
recommendations for trading (manually confirmed). This is another kind of possible reputation
manipulation: a tweet with recommendation is posted and afterwards, if the recommendation turns out
to be spurious, the tweet is deleted. The author's Twitter timeline then falsely appears as if following
his recommendations would yield profit.
We inspect a specific Twitter account from the category trading companies that posted more than
500 tweets and deleted between 10% and 40% of them. The identity of the account cannot be revealed
due to the privacy issues. The tweets deleted fall into the following categories:
• Reposts: 91, 60 of them are advertisements (e.g., subscribe for analysis),
• Links (to recommendations): 17,
• Recommendations: 11,
• Retweet: 1 (if the original tweet is deleted, retweets are also deleted).
We manually checked each of the 11 recommendations that were deleted. In all the cases, the
recommendations turned out to be bad, i.e., an investor would loose money. An (anonymized) example
of a bad recommendation post is the following:
"@user mention while daily candle is above 1.xyz we are bullish on $EURUSD."
while in the actual Forex market, EUR went down.
This user used both types of reputation manipulation: deleting poor recommendations, and
deleting/reposting of identical tweets to increase their visibility. The percentage of deleted poor
predictions is small compared to all the deleted tweets and compared to all the posted tweets. We
speculate that the manipulation by tweet deletion needs to be subtle to go unnoticed by the users'
followers. However, even a subtle reputation burst in a domain as competitive as Forex trading can
bring major benefits to the deceptive user.
9
6 Conclusions
This is an initial study of potential misuses of Twitter to influence the public interested in Forex trading.
We identify different types of Twitter accounts that are posting tweets related to the EUR-USD
currency exchange. We show that there are considerable differences between them in terms of Twitter
stance distribution and CARs. If we eliminate trading robots and spam, we find significant correlations
between the Twitter stance and CARs (the returns are small, but the Forex market has very low trading
costs). The remaining posts come from the Forex trading companies and individual traders. We further
analyze the reasons for post festum deleting of tweets. Some reasons are harmless (such as correcting
typos), but some show indications of reputation busting. We consider this a promising direction for
further, more in-depth analysis.
Acknowledgements
The authors acknowledge financial support from the H2020 FET project DOLFINS (grant no. 640772),
and the Slovenian Research Agency (research core funding no. P2-103).
References
1. Hazim Almuhimedi, Shomir Wilson, Bin Liu, Norman Sadeh, and Alessandro Acquisti. Tweets
are forever: a large-scale quantitative analysis of deleted tweets. In Proceedings of the 2013
conference on Computer supported cooperative work, pages 897 -- 908. ACM, 2013.
2. Parantapa Bhattacharya and Niloy Ganguly. Characterizing deleted tweets and their authors. In
ICWSM, pages 547 -- 550, 2016.
3. V. Cerqueira, L. Torgo, J. Smailovi´c, and I. Mozetic. A comparative study of performance
estimation methods for time series forecasting. In Proc. 4th Intl. Conf. on Data Science and
Advanced Analytics, pages 529 -- 538. IEEE, 2017.
4. D. Cherepnalkoski and I. Mozetic. Retweet networks of the European Parliament: Evaluation of
the community structure. Applied Network Science, 1:2, 2016.
5. Munmun De Choudhury, Nicholas Diakopoulos, and Mor Naaman. Unfolding the event landscape
on twitter: classification and exploration of user categories. In Proceedings of the ACM 2012
conference on Computer Supported Cooperative Work, pages 241 -- 244. ACM, 2012.
6. P. Gabrovsek. Analysis of relations between currency market and social networks, MSc thesis,
University of Ljubljana, Slovenia, 2017.
7. P. Gabrovsek, D. Aleksovski, I. Mozetic, and M. Grcar. Twitter sentiment around the Earnings
Announcement events. PLoS ONE, 12(2):e0173151, 2017.
8. Zafar Gilani, Reza Farahbakhsh, and Jon Crowcroft. Do bots impact twitter activity? In
Proceedings of the 26th International Conference on World Wide Web Companion, pages 781 -- 782.
International World Wide Web Conferences Steering Committee, 2017.
9. A Craig MacKinlay. Event studies in economics and finance. Journal of economic literature, pages
13 -- 39, 1997.
10. Juan Martinez-Romo and Lourdes Araujo. Detecting malicious tweets in trending topics using a
statistical analysis of language. Expert Systems with Applications, 40(8):2992 -- 3000, 2013.
11. I. Mozetic, M. Grcar, and J. Smailovi´c. Multilingual Twitter sentiment classification: The role of
human annotators. PLoS ONE, 11(5):e0155036, 2016.
10
12. I. Mozetic, L. Torgo, V. Cerqueira, and J. Smailovi´c. How to evaluate sentiment classifiers for
Twitter time-ordered data? PLoS ONE, 13(3):e0194317, 2018.
13. Sasa Petrovic, Miles Osborne, and Victor Lavrenko. I wish i didn't say that! Analyzing and
predicting deleted messages in twitter. arXiv preprint arXiv:1305.3107, 2013.
14. G. Ranco, D. Aleksovski, G. Caldarelli, M. Grcar, and I. Mozetic. The effects of Twitter
sentiment on stock price returns. PLoS ONE, 10(9):e0138441, 2015.
15. B. Sluban, J. Smailovi´c, S. Battiston, and I. Mozetic. Sentiment leaning of influential
communities in social networks. Computational Social Networks, 2:9, 2015.
16. Vladimir N. Vapnik. The Nature of Statistical Learning Theory. Springer, 1995.
17. Svitlana Volkova and Eric Bell. Identifying effective signals to predict deleted and suspended
accounts on twitter across languages. In ICWSM, pages 290 -- 298, 2017.
11
|
1507.08364 | 1 | 1507 | 2015-07-30T03:25:54 | Reconstruction of Graph Signals through Percolation from Seeding Nodes | [
"cs.SI",
"cs.IT",
"cs.IT"
] | New schemes to recover signals defined in the nodes of a graph are proposed. Our focus is on reconstructing bandlimited graph signals, which are signals that admit a sparse representation in a frequency domain related to the structure of the graph. Most existing formulations focus on estimating an unknown graph signal by observing its value on a subset of nodes. By contrast, in this paper, we study the problem of reconstructing a known graph signal using as input a graph signal that is non-zero only for a small subset of nodes (seeding nodes). The sparse signal is then percolated (interpolated) across the graph using a graph filter. Graph filters are a generalization of classical time-invariant systems and represent linear transformations that can be implemented distributedly across the nodes of the graph. Three setups are investigated. In the first one, a single simultaneous injection takes place on several nodes in the graph. In the second one, successive value injections take place on a single node. The third one is a generalization where multiple nodes inject multiple signal values. For noiseless settings, conditions under which perfect reconstruction is feasible are given, and the corresponding schemes to recover the desired signal are specified. Scenarios leading to imperfect reconstruction, either due to insufficient or noisy signal value injections, are also analyzed. Moreover, connections with classical interpolation in the time domain are discussed. The last part of the paper presents numerical experiments that illustrate the results developed through synthetic graph signals and two real-world signal reconstruction problems: influencing opinions in a social network and inducing a desired brain state in humans. | cs.SI | cs | Reconstruction of Graph Signals through
Percolation from Seeding Nodes
Santiago Segarra, Antonio G. Marques, Geert Leus, and Alejandro Ribeiro
1
5
1
0
2
l
u
J
0
3
]
I
S
.
s
c
[
1
v
4
6
3
8
0
.
7
0
5
1
:
v
i
X
r
a
Abstract—New schemes to recover signals defined in the
nodes of a graph are proposed. Our focus is on reconstructing
bandlimited graph signals, which are signals that admit a sparse
representation in a frequency domain related to the structure
of the graph. Most existing formulations focus on estimating
an unknown graph signal by observing its value on a subset
of nodes. By contrast, in this paper, we study the problem of
reconstructing a known graph signal using as input a graph
signal that is non-zero only for a small subset of nodes (seeding
nodes). The sparse signal is then percolated (interpolated) across
the graph using a graph filter. Graph filters are a general-
ization of classical time-invariant systems and represent linear
transformations that can be implemented distributedly across
the nodes of the graph. Three setups are investigated. In the
first one, a single simultaneous injection takes place on several
nodes in the graph. In the second one, successive value injections
take place on a single node. The third one is a generalization
where multiple nodes inject multiple signal values. For noise-
less settings, conditions under which perfect reconstruction is
feasible are given, and the corresponding schemes to recover
the desired signal are specified. Scenarios leading to imperfect
reconstruction, either due to insufficient or noisy signal value
injections, are also analyzed. Moreover, connections with classical
interpolation in the time domain are discussed. The last part
of the paper presents numerical experiments that illustrate the
results developed through synthetic graph signals and two real-
world signal reconstruction problems: influencing opinions in a
social network and inducing a desired brain state in humans.
Index Terms—Graph signal processing, Signal reconstruction,
Interpolation, Percolation, Graph-shift operator, Bandlimited
graph signals
I. INTRODUCTION
Sampling and reconstruction of bandlimited signals are
cornerstone problems in classical signal processing. The emer-
gence of new fields of knowledge such as network science
and big data is generating a pressing need to extend the
results existing for classical time-varying signals to signals
defined on graphs [3]–[5]. This not only entails modifying the
existing algorithms, but also gaining intuition on the concepts
that are preserved and lost when a signal
is defined not
in the time grid, but in a more general graph domain. In
the context of reconstruction of graph signals, two different
approaches have been developed. A first approach is related
to the interpolation of bandlimited signals, which consists in
inferring unobserved values by leveraging the fact that the
signal
lives in a low-dimensional space [6]–[8]. Although
is
Work in this paper
supported by Spanish MINECO grant No
TEC2013-41604-R and USA NSF CCF-1217963. S. Segarra and A.
Ribeiro are with the Dept. of Electrical and Systems Eng., Univ. of
Pennsylvania. A. G. Marques is with the Dept. of Signal Theory and
Comms., King Juan Carlos Univ. G. Leus is with the Dept. of Elec-
trical Eng., Mathematics and Computer Science, Delft Univ. of Tech-
nology. Emails: [email protected], [email protected],
[email protected], and [email protected]. Parts of this paper will
be presented at EUSIPCO 2015 [1] and GLOBALSIP 2015 [2].
interpolation approaches are centralized,
iterative [9]
most
and distributed [10], [11] interpolation schemes have also
been developed. A different approach towards graph signal
reconstruction is graph regularization [12], [13] where a notion
of smoothness is assumed on the signal and the unobserved
values are estimated based on this notion. Both approaches co-
incide in that they estimate a graph signal from the observation
of a subset of the signal values. By contrast, the approach in
this paper is to preserve the two-step methodology used when
recovering bandlimited time-varying signals, which consists in
the generation of a sparse signal followed by the application of
a low-pass filter to reconstruct the missing entries, and extend
it to the more general graph domain.
To be more specific, we study the reconstruction of ban-
dlimited graph signals through the application of low-pass
graph filters to sparse seeding signals. Graph filters are the
generalization of classical time-invariant systems when the
signals are defined on a general graph as opposed to the
classical time domain [4]. Seeding signals are graph signals
attaining nonzero values on a subset of the nodes in the graph,
called seeding nodes. To describe our approach more precisely,
let y stand for the target graph signal we want to recover. Our
goal is to design a graph filter H and a sparse signal x such
that y can be obtained upon applying H to x. The design
is accomplished in two steps. In the first step, we design the
filter H leveraging the bandlimitedness of y, to eliminate the
frequencies not present in y. Then, we use the H designed
in the first step and the specific value of y to design the
signal x. The challenge is that x cannot be chosen freely
but is rather the output of a seeding phase where only a few
seeding nodes inject values. The seeding phase requires more
elaboration than its counterpart for time-varying signals, not
only because graph signals are less regular, but also because
it will be shown that in general the seeding values cannot
coincide with those of the signal to recover. For a rigorous
problem definition see Section II-B and Figure 1 in Section III.
Since graph filters act on graph signals through the successive
application of local operators, the output of a graph filter
can be viewed as the outcome of a diffusion or percolation
process. Applications include the generation of an opinion
profile in a social network [14] by influencing a few agents
(Section VII-B) and the synthesis of brain signals [15] by
exciting a few neural regions (Section VII-C). Other potential
applications for signal reconstruction via local interactions
include molecular communications in nanonetworks [16], [17]
and wireless sensor networks [18].
investigates
The paper
three different
reconstruction
schemes, each of them associated with a different seeding
phase. In Section III, the seeding phase consists of a unique
seeding signal with several nonzero values, which coincides
with the intermediate signal x. By contrast, in Section IV the
2
seeding phase consists of several seeding signals injected by
a single seeding node. At each instant, the signal is perco-
lated (diffused) within one-hop neighborhoods. The support
of x depends on the duration of the seeding phase and the
connectivity of the seeding node. Finally, in Section V we
consider a more general scheme which merges the two earlier
approaches. In this scheme, the seeding phase consists of
several time instants and, in each of them, multiple nodes are
allowed to inject a signal. The schemes will be referred to as
multiple node-single time (MN-ST), single node-multiple time
(SN-MT) and multiple node-multiple time (MN-MT) seeding,
respectively. For the three of them, we state conditions on the
underlying graph and the seeding nodes to guarantee perfect
reconstruction of any bandlimited signal. We also show that,
in general, if the interpolator takes the form of a graph filter,
the seeding values cannot coincide with those of the signal to
interpolate. Furthermore, we discuss how additional seeding
values can be used to reduce the complexity of the graph
filter needed for perfect recovery and draw connections with
classical interpolation of time-varying signals. In Section VI
we study the reconstruction performance in imperfect settings,
either because the seeding values are insufficient in number
or corrupted by noise. In Section VII we run numerical
experiments to illustrate signal reconstruction in noiseless and
noisy scenarios using both synthetic and real-world graphs.1
II. BANDLIMITED GRAPH SIGNALS AND GRAPH FILTERS
Let G denote a directed graph with a set of N nodes or
vertices N and a set of links E, such that if node i is connected
to j, then (i, j) ∈ E. The (incoming) neighborhood of i is
defined as the set of nodes Ni = {j (j, i) ∈ E} connected
to i. For any given graph we define the adjacency matrix A
as a sparse N × N matrix with nonzero elements Aji if and
only if (i, j) ∈ E. The value of Aji captures the strength of
the connection from i to j. The focus of this paper is not on
analyzing G, but a graph signal defined on the set of nodes
N . Formally, such a signal can be represented as a vector
x = [x1, ..., xN ]T ∈ RN where the i-th component represents
the value of the signal at node i or, alternatively, as a function
f : N → R, defined on the vertices of the graph.
The graph G is endowed with a graph-shift operator S [4],
[19]. The shift S is a N × N matrix whose entry Sji can be
nonzero only if i = j or if (i, j) ∈ E. The sparsity pattern of
the matrix S captures the local structure of G, but we make no
specific assumptions on the values of the nonzero entries of S.
Choices for S are the adjacency matrix of the graph [4], [19],
its Laplacian [3], and their respective generalizations [20].
The intuition behind S is to represent a linear transformation
that can be computed locally at the nodes of the graph. More
rigorously, if y is defined as y = Sx, then node i can compute
yi provided that it has access to the value of xj at j ∈ Ni. We
assume henceforth that S is diagonalizable, so that there exists
a N × N matrix V and a N × N diagonal matrix Λ that can
be used to decompose S as S = VΛV−1. In particular, S is
diagonalizable when it is normal, i.e., it satisfies SSH = SH S
1Notation: ei is the ith N × 1 canonical basis vector (all entries of ei are
zero except the ith one, which is one); EK := [e1, ..., eK ] is a tall matrix
collecting the K first canonical basis vectors while ¯EK := [eK+1, ..., eN ]
collects the last N − K canonical basis vectors; 0 and 1 are, respectively,
the all-zero and all-one matrices (when not clear from the context, a subscript
indicating the dimensions will be used).
where SH denotes the conjugate transpose of S. In that case,
we have that V is unitary, which implies V−1 = VH, and
leads to the decomposition S = VΛVH.
We are interested in cases where the graph-shift operator S
plays a role in explaining the graph signal x. More specifically,
cases where x can be expressed as a linear combination of a
subset of the columns of V = [v1, ..., vN ], or, equivalently,
where the vector (cid:98)x = V−1x is sparse [21]. In this context,
vectors vi are interpreted as the graph frequency basis, (cid:98)xi as
the corresponding signal frequency coefficients, and x as a
bandlimited graph signal. We assume that the set of active
frequencies are known and, without loss of generality, that
those are the first K ones associated with the eigenvalues of
largest magnitude [21], [22]. Under this assumption, if we
denote by(cid:98)xK := [(cid:98)x1, . . . ,(cid:98)xK]T a K × 1 vector collecting the
coefficients corresponding to those frequencies, it holds that
x is a K-bandlimited signal if
(cid:98)x = [(cid:98)xT
K, 0, . . . , 0]T ,
x = V(cid:98)x := VK(cid:98)xK,
(1)
where we have defined the tall matrix VK := [v1, ..., vK]
containing the first K eigenvectors of the shift operator S.
A. Graph filters
operators of the form H :=(cid:80)L−1
Graph filters H : RN → RN are linear graph-signal
l=0 hlSl; i.e., polynomials (of
degree L−1) of the graph-shift operator [4]. A particularity of
graph filters is that they can be implemented locally, e.g., with
L− 1 exchanges of information among neighbors. This is true
because the application of S on a signal x can be computed
through local interactions.
l=0 hlΛl(cid:1)V−1. The diagonal matrix (cid:98)H :=(cid:80)L−1
V(cid:0)(cid:80)L−1
can be alternatively written as (cid:98)H = diag((cid:98)h), where vector (cid:98)h
The graph filter H can also be written as H =
l=0 hlΛl
can then be viewed as the frequency response of H and it
is a vector that contains the frequency response of the filter.
Let λi denote the i-th eigenvalue of S and define the N × L
Vandermonde matrix
1 λ1
...
. . . λL−1
...
...
1 λN . . . λL−1
1
N
.
Ψ :=
(2)
(3)
therefore
Upon defining the vector containing the coefficients of the
This implies that if y is defined as y = Hx, its frequency
l=0 hlSl = Vdiag(cid:0)Ψh(cid:1)V−1 = Vdiag((cid:98)h)V−1.
filter as h := [h0, . . . , hL−1]T , it holds that (cid:98)h = Ψh and
H =(cid:80)L−1
representation (cid:98)y satisfies(cid:98)y = diag(cid:0)Ψh(cid:1)(cid:98)x.
one where the frequency response (cid:98)h := Ψh is given by
where (cid:98)hK contains the frequency response for the first K
Within this context, a low-pass graph filter of bandwidth K is
(cid:98)h = [(cid:98)hT
K, 0, . . . , 0]T ,
frequencies. Notice that when the low-pass filter in (5) is
(4)
(5)
L−1(cid:89)
applied to an arbitrary signal x,
is K-
bandlimited as described in (1). An alternative expression to
define a graph filter is [23]
the output signal
H = a0
(S − alI),
(6)
l=1
which also gives rise to a polynomial on S of degree L− 1. A
specific advantage of the representation in (6) is that it provides
a straightforward way to design low-pass filters via successive
annihilation of graph frequencies. In particular, if we fix al =
λk for some eigenvalue λk of S then the filter H will eliminate
the frequency basis vk, i.e., the eigenvector associated with λk.
For future reference, we denote by D the number of distinct
eigenvalues in {λk}N
k=K+1.
Remark 1 (Discrete-time signals) To establish connections
with classical time-varying signals, we define the directed
cycle graph Gdc, with node set N = {1, 2, . . . , N} and edge
set Edc = {(i, modN (i) + 1)}N
i=1, where modN (i) denotes
the remainder obtained after dividing i by N. Its adjacency
and Laplacian matrices are denoted, respectively, as Adc and
Ldc := I−Adc. Discrete-time periodic signals can be thought
as graph signals on the directed cycle Gdc. Setting the shift
operator either to S = Adc or S = Ldc gives rise to the
√
Fourier basis F. More formally, the right eigenvectors of S
satisfy V = F, with Fij := exp(+j2π(i − 1)(j − 1)/N )/
√−1. Selecting S = Adc has the additional
N
where j
advantage of satisfying Λii = exp(−j2π(i − 1)/N ), i.e., the
eigenvalues of the shift operator correspond to the classical
also exist [3]. The frequency representation(cid:98)x of a graph signal
discrete frequencies. Interpretations for the eigenvalues of Ldc
x is given by (cid:98)x = V−1x whereas the frequency response of
a filter with coefficients h is given by (cid:98)h = Ψh. For general
graphs, matrices V−1 and Ψ need not be related. However,
for the case of Gdc, if Sdc = Adc, then Ψ =
N FH and
V−1 = FH. Thus, the Fourier transforms for signals and filter
coefficients are equivalent up to a constant for time-varying
signals but this is not true for general graph signals.
√
:=
B. Signal reconstruction using graph filters
Our objective is to reconstruct a specific K-bandlimited
signal y by applying a graph filter H to a signal x, where
x is the result of a seeding procedure. More specifically, the
reconstruction scheme proceeds in two phases:
• Seeding phase. The input to this phase is a set of τ
graph signals {s(t)}τ−1
t=0 , denominated seeding signals.
These signals percolate through the graph following the
dynamics
x(t) = Sx(t−1) + s(t),
x(−1) = 0.
The output of this phase is set as x := x(τ−1).
(7)
• Filtering phase. The graph signal x is used as input to a
low-pass graph filter H, generating the output z := Hx.
The purpose of the seeding phase, which has duration τ, is to
inject into the graph the information needed to interpolate the
signal y. The filtering phase further propagates the informa-
tion available from the seeding phase while annihilating the
frequencies with indices k > K that are present in x but not
3
in y. This phase has duration L− 1, which is the order of the
filter H.
The goal of this paper is to design {s(t)}τ−1
t=0 and H such
that z = y. In Sections III, IV, and V we present this design for
three different seeding schemes, where we impose additional
restrictions on the structure and the number of seeding signals.
Remark 2 In classical discrete-time signal processing, recov-
ery of bandlimited signals is a two-step process. Firstly, a
sparse regular signal whose non-zero values coincide with
those of the signal to recover is generated. Secondly, the (zero)
values not specified in the sparse signal are extrapolated from
the non-zero ones using a low-pass filter. Our approach in
this paper is to preserve this two-step methodology and use it
to recover bandlimited graph signals. This provides a way to
regenerate a desired signal in a graph – either estimated from
samples or otherwise – by acting on a subset of (seeding)
nodes. As it will be shown in the ensuing sections, for signals
defined on a general graph, the non-zero values of the sparse
signal in the first step will not coincide with those of the
signal to recover. This deviates from the classical concept of
interpolation, which assumes that the non-zero values are the
same than those of the signal to reconstruct.
The practical advantage of studying recovery schemes that
use graph filters is twofold. First, they can be implemented
distributedly, using only local exchanges among neighbors.
Second, since graph filters can be used to model diffusion
processes (e.g. the spread of an opinion in a social network),
our results can be used to reconstruct signals in network
applications that implement linear diffusion dynamics.
III. MULTIPLE NODE - SINGLE TIME SEEDING
In multiple node - single time (MN-ST) seeding we consider
the particular case where there is only τ = 1 seeding signal s
so that x = s [cf. (7)]. Denoting by P the amount of nonzero
values in s, we interpret MN-ST seeding as having P seeding
nodes that inject a single value, while the remaining N − P
nodes keep silent; see left and center panels in Figure 1. Define
the signal injected by node i as si and assume, without loss
of generality, that the seeding nodes are the P first ones. We
therefore define the P × 1 and N × 1 seeding vectors as
sP = [s1, . . . , sP ]T ,
(8)
(9)
Then, given a bandlimited signal y = VK(cid:98)yK [cf. (1)], our
s = [s1, . . . , sP , 0, . . . , 0]T .
goal is to design H and s such that
y = Hs,
(10)
where H has the particular structure of a graph filter (cf. Sec-
tion II-A). Exploiting the fact that y is bandlimited, it is
reasonable to write (10) in the frequency domain. To do this,
both sides of (10) are left multiplied by V−1, which yields
(11)
(cid:98)y = V−1Hs = V−1Vdiag(Ψh)V−1s = diag(Ψh)(cid:98)s,
where we used (3) for the second equality. Utilizing the fact
that the seeding signal s is sparse [cf. (9)] we may write its
frequency representation as
(cid:98)s = V−1s = V−1EP sP ,
(12)
4
(cid:98)yK = ET
where, we recall, EP := [e1, ..., eP ] is a tall matrix collecting
the P first canonical basis vectors of size N × 1. By substi-
tuting (12) into (11), our goal of designing H and s such that
y = Hs can be reformulated as designing h and sP such that
(cid:98)y = diag(cid:0)Ψh(cid:1)V−1EP sP ,
Leveraging the sparsity of (cid:98)y [cf. (1)],
equations in (13) can be split into two
which is a bilinear system of N equations and L+P variables.
the system of N
(13)
K diag(Ψh) V−1EP sP ,
K diag(Ψh) V−1EP sP ,
(14)
0N−K = ¯ET
(15)
where, we recall, ¯EK := [eK+1, ..., eN ] collects the last
N − K canonical basis vectors and 0N−K denotes the
(N − K) × 1 vector of all zeros. Note that the conditions in
(15) are the same for any K-bandlimited signal. On the other
hand, the conditions in (14) depend on the specific signal to be
interpolated. A natural approach is to use the filter coefficients
h – which are related to the global behavior of the graph – to
guarantee that (15) holds, while using the seeding signal sP
to satisfy (14) and, hence, to guarantee that the output of the
interpolation is y. In this way, the filter coefficients h to be
designed do not depend on the particular signal to reconstruct.
The conditions under which the mentioned approach is
guaranteed to find a feasible solution are given in the form
of two propositions. Ensuing discussions describe the actual
procedure to interpolate the signal.
Proposition 1 If L > D (cf. Section II-A), there exist infinitely
many nonzero L×1 vectors h∗ such that, after setting h = h∗,
(15) is satisfied for any V−1 and sP .
Proof: Since (15) has to hold for any seeding signal sP , we
need ¯ET
KΨh = 0. This requires h to belong to the kernel of
the (N −K)×L matrix ¯ET
KΨ. Since ¯ET
KΨ is a Vandermonde
matrix, its number of linearly independent rows is equal to the
number of distinct eigenvalues in {λk}N
k=K+1, which is D.
Thus, the existence of a solution h∗ (cid:54)= 0 requires L > D.
For L > D, ¯ET
KΨ is rank deficient and the dimension of
its kernel space is L − D. Hence, setting h to any nonzero
element of the kernel space will satisfy (15). In what follows,
we will assume that L = D + 1 and set the coefficients h∗
that solve (15) as the unit vector spanning the unidimensional
kernel space of ¯ET
KΨ. For the case where all the eigenvalues
k=K+1 are distinct, this implies that L = N − K + 1.
{λk}N
Once the coefficients of the filter are designed, the next step
K Ψh∗
K := ET
denoting the frequency response of the low-pass filter in the
active frequencies, substituting h = h∗ into (14) yields
is to find the optimum seeding signal. With (cid:98)h∗
(cid:98)yK = diag((cid:98)h∗
K) ET
KV−1EP sP .
(16)
For which the following result holds.
Proposition 2 The system of K equations in (16) is guaran-
teed to have a solution with respect to sP if the following two
conditions hold:
i) λk1 (cid:54)= λk2 for all (λk1, λk2) such that k1 ≤ K and k2 > K,
ii) rank(ET
KV−1EP ) ≥ K.
Proof : Condition i) is required to guarantee that all
KΨh∗ = 0N−K; b) h∗ (cid:54)= 0L and c) rank of ¯ET
elements of (cid:98)h∗
(cid:98)h∗
elements of (cid:98)h∗
the
K are nonzero. We prove this by contradiction.
Recall that the following facts holds true (cf. Proposition 1):
a) ¯ET
KΨ is
L− 1. Assume, without loss of generality, that the element of
K that is zero is the K-th one. Then, we can use a) to write
K−1Ψh∗ = 0N−K+1. Condition i) and fact c) guarantee that
¯ET
K−1Ψh∗ = 0N−K+1
¯ET
K−1Ψ has rank L; then, satisfying ¯ET
requires h∗ = 0L, which contradicts b). Hence, all
the
K)
K are nonzero. This guarantees that diag((cid:98)h∗
diag((cid:98)h∗
(17)
KV−1EP is a K×P submatrix of V−1. To guarantee
where ET
that the system of equations in (17) has at least one solution,
we need condition ii) to hold.
K)−1(cid:98)yK = (ET
is invertible, so that (16) can be written as
KV−1EP )sP ,
Different from the time domain, where all the eigenvalues
of S (frequencies) are distinct, in the more general graph
domain there can be graph topologies that give rise to S with
repeated eigenvalues. Condition i) is required because a graph
filter H always produces the same frequency response if the
corresponding eigenvalues are the same. Therefore, it is not
possible for H to eliminate one of the frequencies without
eliminating the other. An alternative to bypass this problem
is discussed in Section III-A. Condition ii) requires the rank
of the K × P matrix ET
KV−1EP being at least K. At the
very least, this requires P , the number of seeding nodes, to be
equal to K, the number of frequencies present in y. For the
particular case of P = K, if the conditions in the proposition
are satisfied, the sP that recovers y is
KV−1EP )−1diag((cid:98)h∗
K)−1(cid:98)yK.
sP = (ET
(18)
However, if condition ii) is not satisfied, there may be cases
where setting P = K fails. To see why this is true, notice that
[V−1]k,p can be viewed as how strongly node p expresses
frequency k. Suppose for example that there exists a k such
that [V−1]k,p = 0 for all nodes p = 1, . . . , P , then it is not
possible to reconstruct a signal y with (cid:98)yk (cid:54)= 0 using that set
of nodes. This problem is also present when sampling graph
signals by observing the value of the signal in a subset of
nodes [7].
Proposition 2 states conditions for perfect reconstruction
in a noiseless setting. In noisy scenarios, the specific set of
nodes selected to inject the seeding signal has an impact on
the reconstruction error. This is analyzed in Section VI.
A. Filter degree reduction in MN-ST seeding
The MN-ST reconstruction scheme requires a low-pass filter
H of degree D, which grows with the size of the graph.
Since the degree of H corresponds to the number of local
interactions needed to implement the filter, the communication
overhead can be a problem for large graphs. In this context, we
look for solutions that reduce the degree of H by increasing
the number of seeding nodes P . This can be done by splitting
the system of equations in (13) as [cf. (14)-(15)]
K, 0T
P−K]T = ET
P diag(Ψh) V−1EP sP ,
0N−P = ¯ET
P diag(Ψh) V−1EP sP.
(19)
(20)
[(cid:98)yT
MN - ST
x
y
SN - MT
x
H
H
S
5
Fig. 1: Two different schemes to reconstruct signal y. On the left, MN-ST seeding injects P = 2 values simultaneously (blue arrows), after
which the low-pass filter H is applied. On the right, SN-MT seeding first injects a single value that percolates to the two neighboring nodes.
After a second value injection at the same node, filter H completes the reconstruction.
The filter coefficients must be obtained now to annihilate the
N − P frequencies in (20) and the P seeding nodes must
inject a signal whose spectrum, after being filtered by H,
matches that of the desired signal (19). Notice that (19)-(20)
can also be used when (14)-(15) fail due to a violation of
condition i) in Proposition 2. More specifically, for every
frequency index k2 > K with the same eigenvalue as a
frequency index k1 ≤ K we can induce a zero frequency
coefficient in the reconstructed signal via the seeding values
[cf. (19)] instead of through the low-pass filter [cf. (20)] and,
hence, drop condition i) as a requirement for recovery. Further
notice that for (20) to hold for any sP , the degree of the filter
needs to be at least equal to the number of distinct eigenvalues
in {λk}N
k=P +1 (cf. Proposition 1). In the extreme case of
P = N, the trivial solution h = [1, 0, . . . , 0]T (0-order filter)
and sP = y satisfies (19)-(20).
B. Relation to classical interpolation
In the classical time domain, sinc (low-pass) interpolation
of a bandlimited signal
leads to perfect reconstruction. If
the sampling is performed at the minimum possible rate, the
bandwidth of the low-pass filter has to be exactly the same
than that of y. By contrast, if the signal is oversampled, the
bandwidth can be larger. Equivalently, if more samples than
the minimum required number are available, then the low-pass
filter does not have to cancel all the frequencies not present
in y. The analysis in Section III-A reveals that this is also the
case when signals are defined in more general graph domains.
The main differences between the MN-ST reconstruction
scheme and classical time interpolation come from the fact
that the basis V of a general graph shift S is not as structured
as the Fourier basis F. A difference of particular relevance is
that, for general graphs, the seeding values sP do not coincide
with the values of the desired signal y. This contrasts with
the classical interpolation of uniformly sampled time-varying
signals, where sP is a subset of the signal y. In fact, it
can be rigorously shown that requiring such a condition for
general graphs would lead to an infeasible interpolation. To
be concrete, suppose that P = K, so that s = [sT
K, 0T ]T [cf.
(9)], and that sK is equal to the first entries of y. We can then
(21)
Secondly, we write the goal of y = Hs into the frequency
leverage the fact that s and (cid:98)y are sparse to write
KVEK(cid:98)yK.
domain as (cid:98)y = diag((cid:98)h)V−1s and use again the sparsity of s
and (cid:98)y to write
Kdiag((cid:98)h)EKET
Kdiag((cid:98)h)V−1EKsK = ET
(cid:98)yK = ET
= diag((cid:98)hK)ET
KV−1EKsK
(22)
KV(cid:98)y = ET
KV−1EKsK,
Ky = ET
sK = ET
(23)
KV−1EKET
Substituting (21) into (22) yields
KVEK(cid:98)yK.
(cid:98)yK = diag((cid:98)hK)ET
K(cid:98)h contains the first K components of (cid:98)h.
where (cid:98)hK := ET
Since (23) must hold for all (cid:98)yK, it can only be satisfied
if diag((cid:98)hK)ET
KV−1EKET
KVEK = I. This requires matrix
KVEK) to be diagonal. While this is true when
(ET
K = N, it is not true for a general K. However, in the
time domain where V = F (see Remark 1), for some cases
the multiplication of submatrices of F is guaranteed to be
diagonal. For example, if the K seeding nodes are chosen
uniformly (equally) spaced, then (ET
KVEK) =
K/N I. This implies not only that (23) is satisfied, but also
that all the entries in(cid:98)hK must be set to N/K. In other words,
KV−1EKET
KV−1EKET
the optimal low-pass interpolator after uniform sampling in
the time domain has the same response for all the active
frequencies, as known from classical signal processing.
IV. SINGLE NODE - MULTIPLE TIME SEEDING
In single node - multiple time (SN-MT) seeding, we con-
sider the particular case where all the τ = P seeding values
are injected at a single node; see right and center panels in
Figure 1. To be more specific, assume without loss of gener-
ality that the first node is the one injecting the seeding values,
so that the seeding signal s(t) at time t is of the form s(t) =
[s(t), 0, . . . , 0]T . Then, define sP := [s(P−1), . . . , s(0)]T to be
a P × 1 vector grouping the seeding values. We present the
relation between the seeding values sP and the output of the
seeding phase x in the following lemma.
Lemma 1 The frequency representation of the intermediate
signal x in SN-MT seeding is given by
where(cid:98)e1 := V−1e1 is the frequency representation of the first
(24)
canonical basis vector.
(cid:98)x = diag((cid:98)e1)ΨsP ,
Proof: Since x is obtained after P injections of seeding values
following the dynamics in (7), it holds that
x = x(P−1) =(cid:80)P−1
l=0 Sls(P−1−l) =(cid:80)P−1
l=0 Sls(P−1−l)e1.
(25)
Equation (25) relates the signal x to the successive inputs s(·)
of the seeding node and can be interpreted as the application
of the graph filter
¯H :=(cid:80)P−1
l=0 s(P−1−l)Sl
(26)
6
(cid:98)x = diag(ΨsP )(cid:98)e1,
of degree P − 1 to the canonical basis vector e1. Building on
this interpretation, we may use (4) to write
(28)
K)ET
K := ET
(28), we obtain [cf. (16)]
(cid:98)zK = ET
The next step is to analyze the output of the filtering
structure of the graph Ψ and the seeding values sP , as well as
(27)
and, by exploiting the fact that for generic vectors a and b it
holds that diag(a)b = diag(b)a, the lemma follows.
The proof of Lemma 1 exploits the reinterpretation of the
seeding phase as the application of a graph filter ¯H, whose
coefficients are given by the seeding values, to the canonical
elements represent how strongly the node expresses each of
the graph frequencies.
basis vector e1. Equation (24) reveals how (cid:98)x depends on the
on the particular node chosen to inject the values via(cid:98)e1, whose
phase in the frequency domain (cid:98)z. To do this, recall that h∗
(cid:98)h∗ := Ψh∗, we may analyze the application of the low-pass
Kdiag((cid:98)h∗)(cid:98)x = ET
Kdiag((cid:98)h∗)EKET
K(cid:98)x.
Further recalling that(cid:98)h∗
K(cid:98)h∗ and substituting (24) into
(cid:98)yK = diag((cid:98)h∗
Kdiag((cid:98)e1)ΨsP .
denotes the coefficients of a low-pass filter (cf. Section II-A)
that eliminates all frequencies with indices k > K. Defining
(29)
Expression (29) relates the frequencies present in y to the
seeding values sP . Provided that K ≤ P ,
the following
proposition states the conditions under which (29) can be
solved with respect to sP .
Proposition 3 Let U1 be the number of values in {[(cid:98)e1]k}K
filter in the frequency domain as
diag((cid:98)h∗
(cid:17)(cid:0)ET
Kdiag((cid:98)e1)EK
k=1
that are zero and let D1 be the number of repeated values
in {λk}K
the system of K equations in (29) is
guaranteed to have a solution with respect
the
following two conditions hold:
i) λk1 (cid:54)= λk2 for all (λk1 , λk2 ) such that k1 ≤ K and k2 > K,
ii) U1 = 0 and D1 = 0.
(cid:98)yK =
Proof: If we rewrite (29) as
is required to guarantee that all the entries of vector (cid:98)h∗
are nonzero and, hence, matrix diag((cid:98)h∗
K) is invertible (cf.
Kdiag((cid:98)e1)EK is invertible since it is a diagonal matrix with
proof of Proposition 2). Condition U1 = 0 in ii) ensures that
ET
no zero elements in its diagonal. Finally, D1 = 0 guarantees
KΨ has rank K whenever K ≤ P since it is a row-wise
that ET
Vandermonde matrix with no repeated rows.
then it becomes clear that conditions i) and ii) ensure in-
vertibility of the two square matrices, and full row rank of
KΨ. To be specific, condition i)
the rectangular matrix ET
KΨ(cid:1) sP ,
(cid:1)(cid:0)ET
k=1. Then,
to sP if
(cid:16)
(30)
K)
K
Condition i), which is equivalent to that in Proposition 2,
guarantees that the low-pass filter with coefficients h∗ does not
eliminate any of the frequencies present in y. Condition ii)
states requirements for recovery on both the seeding node
and the global structure of the graph. The seeding node is
required to be able to act on every active frequency (U1 = 0),
while the graph is required to have every active frequency
distinguishable from each other (D1 = 0). Condition ii)
ensures that the rank of matrix ET
K when P ≥ K, guaranteeing that (29) can be solved with
respect to sP . For the particular case of P = K the seeding
values can be found as
Kdiag((cid:98)e1)Ψ is equal to
sP =(cid:0)ET
Kdiag((cid:98)e1)Ψ(cid:1)−1 diag((cid:98)h∗
K)−1(cid:98)yK.
(31)
When comparing the conditions ii) in Propositions 2 and 3,
we observe that for MN-ST seeding we should require a rank
condition on a submatrix of V−1. By contrast, for SN-MT
seeding, the Vandermonde structure of Ψ allows reformulating
the rank condition in terms of the graph related quantities U1
and D1, providing further insight on specifying the situations
when recovery is possible. This dual behavior is also present
when sampling graph signals. When following “selection
sampling” [7], which is the counterpart of MN-ST interpo-
lation, perfect reconstruction depends on the invertibility of
a submatrix of V, whereas when following an “aggregation
sampling” scheme [8], which is the counterpart of SN-MT
interpolation, the conditions for perfect reconstruction can be
written in terms of specific graph related quantities.
Even though Proposition 3 guarantees perfect recovery
under SN-MT seeding in a noiseless case, in noisy scenarios
the selection of the seeding node is essential to reduce the
reconstruction error. This is analyzed in Section VI under a
more general seeding scheme.
A. Filter degree reduction in SN-MT seeding
Mimicking the filter degree reduction technique presented
in Section III-A, SN-MT seeding can also implement a lower-
degree filter if a higher number of seeding values is injected.
To achieve this, we need the additional seeding values to
generate a signal whose spectrum is zero for the inactive fre-
quencies that are not eliminated by the filter. More specifically,
the seeding values sP and the filter coefficients h have to
satisfy [cf. (19)-(20)]
P diag((cid:98)e1)ΨsP ,
P diag((cid:98)e1)ΨsP ,
(32)
K, 0T
P−K]T = diag(ET
0N−P = diag( ¯ET
P Ψh)ET
P Ψh) ¯ET
(33)
where N − P is the number of frequency coefficients elim-
inated by the low-pass filter h. As done in Section III-A, h
will be designed to solve (33) for any choice of sP , while sP
will be chosen to solve the P equations in (32). A sufficient
degree for h is presented next.
{[(cid:98)e1]k}N
be
k=K+1
repeated
the
zero
in
be
are
values
Proposition 4 Let U2
number
of
values
and D2
the
in
that
K < k ≤ N and [(cid:98)e1]k (cid:54)= 0}. Then, (33)
{λk}k∈KU , where
number
of
KU := {k
can be solved with respect to h for any choice of sP provided
that L−1 ≥ max(0, N−P −U2−D2).
Proof: Notice that in (33) the filter eliminates the last N −
P frequencies, however, since the ordering is arbitrary, any
subset of N − P frequencies (not containing the K first ones)
can be chosen to be annihilated by h. Thus, our objective
it to show that the proposed degree is enough to nullify a
particular choice of N − P frequency coefficients. Define as
R the set of indices corresponding to zero elements in(cid:98)e1 or
[(cid:98)yT
repeated rows in Ψ. Since condition ii) in Proposition 3 must
be satisfied – otherwise, perfect recovery would be infeasible
–, the cardinality of R is U2 + D2 and every index in R must
be greater than K.
First assume that U2 + D2 < N − P and pick the
N − P frequencies to be eliminated to include the ones in
R. This is equivalent to picking a frequency ordering such
that every index in R is greater than P . Based on R, define
the selection matrices ER := [ek1 , ek2 , . . . , ekU2+D2
] for all
ki ∈ R and ¯ER := [ek1, ek2 , . . . , ekN−P −U2−D2
] for all
ki ∈ {P + 1, . . . , N}\R where \ represents the set difference
operator. Hence, the system of equations in (33) can be split
0N−P−U2−D2 = diag( ¯ETRΨh) ¯ETRdiag((cid:98)e1)ΨsP ,
into two
0U2+D2 = diag(ETRΨh)ETRdiag((cid:98)e1)ΨsP .
(34)
(35)
Condition (34) can be guaranteed for any sP if h = h∗, where
h∗ are the coefficients of a low-pass filter of degree L−1 =
N − P − U2− D2, as stated by the proposition. To complete
the proof, we need to show that h = h∗ also guarantees that
(35) holds. To see why this is the case, notice that U2 rows
of ETRdiag((cid:98)e1)Ψ are exactly zero, trivially satisfying (35) for
any sP . Also, each of the remaining D2 equations in (35)
corresponds to a repeated eigenvalue and, thus, can be obtained
by multiplying one of the N − K − U2 − D2 homogenous
equations in (34) and (32) by a scalar, guaranteeing that h∗
also solves these D2 equations.
For the case where U2 + D2 ≥ N − P , we pick a frequency
ordering such that every index greater than P is contained in
R. Thus, (33) is implied by the homogenous equations in (32),
and no filter (degree 0) is needed.
Proposition 4 explicitly states that every additional seeding
value decreases the required filter degree. However, in contrast
to the situation for MN-ST, this reduction of the filter degree
does not entail a reduction in the number of applications
of the graph-shift operator, because it requires the length
of the seeding phase to be extended. More interestingly, the
additional seeding values can be used as a mean to guarantee
perfect reconstruction when condition i) in Proposition 3 is not
satisfied, as explained in Section III-A for MN-ST seeding.
When P ≥ N−U2−D2 the seeding phase suffices to recover
the signal. This can be of interest in scenarios where the graph-
shift operator S describes an intrinsic graph diffusion dynamic
and the design of the filter coefficients is not feasible. It is also
of interest if y is not bandlimited. See Section VII for further
discussions.
B. Relation to classical interpolation
When S = Adc, applying the lth power of S to a signal
amounts to shifting the signal l time instants. Consequently,
the intermediate signal x obtained after the seeding phase in
SN-MT reconstruction coincides with the seeding signal s in
MN-ST reconstruction, provided that the seeding nodes are
chosen adjacent to each other. Moreover, for the extreme case
of the number of seeding values P being enough to eliminate
the filtering phase, which entails L − 1 = 0, Proposition 4
requires setting P = N, because both U2 and D2 are zero if
S = Adc. The design of the P = N seeding values sP that
guarantee that x = y can be carried out trivially by setting
sP = [x1, . . . , xN ] = y.
V. MULTIPLE NODE - MULTIPLE TIME SEEDING
7
In the more general multiple node - multiple time (MN-MT)
seeding scheme, we can have several seeding signals (τ > 1)
and we do not assume any structure on s(t), so that any node
may inject a seeding value at any given time. We concatenate
the τ seeding signals into the N τ × 1 vector s defined as
s := vec([s(τ−1), s(τ−2), . . . , s(0)]T ).
Defining the N×N 2 matrix Θ := [diag((cid:98)e1), . . . , diag((cid:98)eN )],
we may relate x to s as stated in the following lemma.
Lemma 2 The frequency representation of the intermediate
signal x in MN-MT seeding is given by
(cid:98)x = Θ(I ⊗ Ψ)s,
where ⊗ represents the Kronecker product.
Proof: If we denote by x := x(τ−1) the signal obtained after
the seeding phase, it holds that [cf. (7)]
τ−1(cid:88)
(cid:32) N(cid:88)
(cid:33)
N(cid:88)
s(τ−1−l)
i
ei
=
l=0
l=0
i=1
i=1
τ−1(cid:88)
x =
Sls(τ−1−l) =
where the filter Hi is given by
(36)
Hiei,
(37)
(38)
Sl
τ−1(cid:88)
l=0
Hi =
s(τ−1−l)
i
Sl.
Writing the input-output relationship of those filters in the
frequency domain, we have that [cf. (4)]
N(cid:88)
(cid:98)x =
diag(Ψsi)(cid:98)ei =
N(cid:88)
diag((cid:98)ei)Ψsi.
(39)
i=1
i=1
Recalling the definitions of Θ and s, the sum in (39) can be
written in matrix form, giving rise to (36).
As was the case for Lemma 1 in SN-MT seeding, Lemma 2
leverages the reinterpretation of the seeding phase as the
application of a filter – in this case, N different filters, one per
node – to the canonical basis vectors [cf. (37)]. The coefficients
of the filter associated with the i-th node are given by the
values injected by that i-th node [cf. (38)]. Notice that, as
expected, (36) reduces to (24) whenever the seeding values
are forced to be zero for every seeding node except for the
first one.
To analyze the output of the filtering phase z, recall that
KΨh∗ denotes the response of a low-pass filter in the
K = ET
active frequencies. Mimicking the procedure in Section IV, we
find that the active frequency coefficients in y can be written
in terms of the seeding values s as
(cid:98)h∗
K)ET
KΘ(I ⊗ Ψ)s.
(40)
K values in(cid:98)yK can be reconstructed using the N τ values in
The system of equations in (40) is underdetermined, since the
s. However, our focus is on the case where only P (cid:28) N τ
elements are binary Cij ∈ {0, 1} and satisfy(cid:80)
seeding values are injected during the seeding phase. To this
(cid:80)
extent, we introduce the P × N τ selection matrix C whose
j Cij = 1 and
i Cij ≤ 1 for all i and j, respectively. Since the matrix has
exactly one 1 in every row, C selects P seeding values among
the N τ node-time pairs. If we denote by sP := Cs the vector
(cid:98)yK =(cid:98)zK = diag((cid:98)h∗
8
containing these P seeding values, (40) can be rewritten as
[cf. (16) and (29)]
A. Insufficient seeding values
(cid:98)yK = diag((cid:98)h∗
K)ET
KΘ(I ⊗ Ψ)CT sP .
(41)
To resemble the structure of previous sections, the conditions
under which (41) can be solved with respect to sP are given
in the form of a proposition.
Proposition 5 The system of K equations in (41) is guaran-
teed to have a solution with respect to sP if the following two
conditions hold:
i) λk1 (cid:54)= λk2 for all (λk1, λk2) such that k1 ≤ K and k2 > K,
ii) rank(ET
Proof: Condition i) is required to guarantee that diag((cid:98)h∗
K) is
invertible (cf. proof of Proposition 2). This allows us to rewrite
(41) as
KΘ(I ⊗ Ψ)CT ) ≥ K.
diag((cid:98)h∗
K)−1(cid:98)yK = ET
KΘ(I ⊗ Ψ)CT sP .
(42)
To guarantee that the system of equations in (42) has at least
one solution, we need condition ii) to hold.
Condition i), also present in Propositions 2 and 3, guarantees
that the filtering phase does not annihilate any of the frequen-
cies present in y. Condition ii) requires, at the very least,
P ≥ K. However, there may be cases where setting P = K
can fail as stated in the discussion ensuing Proposition 2.
Mimicking the developments in Sections III-A and IV-A,
for the general case of MN-MT seeding, additional seeding
values can be used to reduce the degree of the low-pass filter.
Indeed, for every extra seeding value the degree of the filter
needed decreases by one, reducing the communication cost
of the reconstruction scheme. Moreover, these extra seeding
values can be used to obtain perfect reconstruction even when
condition i) in Proposition 5 is violated, as explained in
Section III-A.
The selection matrix C can be designed so that condition ii)
in Proposition 5 is satisfied, guaranteeing perfect recovery.
Furthermore, for the cases in which perfect reconstruction is
infeasible due to, e.g., the presence of noise, the choice of C
can be optimized to achieve robust recovery, as analyzed in
the following section.
Remark 3 When C in (41) selects the first P elements of
s, (41) reduces to (29) and SN-MT reconstruction is recov-
ered. Similarly, if C selects the elements of s in positions
1, τ + 1, . . . , P τ + 1, then (41) reduces to (16) as in MN-ST
reconstruction.
VI. IMPERFECT RECONSTRUCTION
We study two settings where perfect reconstruction is infea-
sible: insufficient number of seeding values (Section VI-A) and
additive noise in the injections (Section VI-B). The analysis
is focused on the MN-MT seeding scheme, since the results
for MN-ST and SN-MT can be obtained by particularizing the
value of the selection matrix C (cf. Remark 3).
When the number of seeding values P is not enough to
achieve perfect reconstruction, the goal is to minimize a pre-
specified error metric between the reconstructed signal z and
the original K-bandlimited graph signal y. Three different
design scenarios are considered. In the first one, the seeding
values sP are designed assuming that both h and C are fixed.
The second scenario addresses the joint design of sP and h.
In the last one, the joint design of sP and C is performed.
1) Designing the seeding values sP : Assume that condi-
tion i) in Proposition 5 holds and recall that h∗ stands for
the coefficients of a low-pass filter that eliminates all the
frequencies k > K. Then, the first K frequency coefficients
(cid:98)zK of the reconstructed signal z are obtained as [cf. (41)]
obtaining (cid:98)yK = (cid:98)zK is in general infeasible. A reasonable
(43)
Since we assume insufficient seeding values, i.e., P < K,
(cid:98)zK = diag((cid:98)h∗
KΘ(I ⊗ Ψ)CT sP .
approach is to design sP to minimize the energy of the
reconstruction error. Defining the matrix
K)ET
ΦK := diag((cid:98)h∗
the optimal seeding values s∗
s∗
P := arg min
sP
KΘ(I ⊗ Ψ),
K)ET
P can be obtained as
(cid:107)y − VKΦKCT sP(cid:107)2
2,
(44)
(45)
where, we recall, VK := VEK. The minimization problem
in (45) has the well-known closed-form solution [24]
s∗
P = (CΦH
K ΦKCT )−1CΦH
K VH
(46)
where we assume that the fixed seeding locations C lead to
a matrix ΦKCT that has full column rank. With := y−z
denoting the reconstruction error, its energy can be written as
(cid:107)(cid:107)2
(cid:17)
K ΦKCT )−1CΦH
I − ΦKCT (CΦH
2 = yH VK
(cid:16)
K y,
K y.
VH
K
(47)
Notice that, since h∗ is given, the reconstruction error is zero
for the frequency components k > K.
2) Designing the seeding values sP and the filter coeffi-
cients h: When perfect reconstruction is infeasible, carrying
out a separate optimization of h and sP , where h is designed
to filter the frequencies not present in y and sP is designed
to match the spectrum of y in the active frequencies, is not
jointly optimal. Minimization of the reconstruction error by
jointly designing sP and h is briefly discussed next. Notice
that the N frequency coefficients – as opposed to just the first
K coefficients – of the reconstructed signal(cid:98)z are [cf. (41)]
(cid:98)z = diag(Ψh)ET
(cid:107)y − V(cid:98)z(cid:107)2
Hence, if the objective is to minimize (cid:107)(cid:107)2
{s∗
P , h∗} := argmin
{sP ,h}
2
KΘ(I ⊗ Ψ)CT sP .
2, we have that
(48)
(49)
(cid:107)y − Vdiag(Ψh)ET
KΘ(I ⊗ Ψ)CT sP(cid:107)2
2,
= argmin
{sP ,h}
which is a bilinear optimization. Bilinear problems are non-
convex, but there is a large amount of works dealing with their
analysis and efficient solution [25]–[27].
The formulation in (49) considers that h∗ can be chosen as a
function of the signal to reconstruct y. In applications where
P (h, y))(cid:107)2
this is not feasible, formulating the optimal design requires
additional assumptions on y. If the distribution of y is known,
a two-stage stochastic programming approach can be pursued
[28]. In the second stage, h in (49) is considered given and
P is obtained as the minimizer of (cid:107)(h, y, sP )(cid:107)2
the optimal s∗
2,
which is a function of h and y [cf. (46)]. In the first stage, the
solution of the second stage s∗
P (h, y) and the distribution of
y are leveraged to write the expectation of the reconstruction
error in (49) as ¯(h) := Ey[(cid:107)(h, y, s∗
2], which only
depends on h. The optimum h∗ is then the minimizer of the
expected error ¯(h). Notice that this two-stage approach is
used in Sections III, IV, and V to find conditions for perfect
recovery, where bandlimitedness is the prior knowledge of y.
3) Designing the seeding values sP and the seeding loca-
tions C: Suppose now that one can select the specific nodes
and time instants where the injections take place. This amounts
to choosing the P entries of C that are non-zero, which is a
combinatorial problem. Although for small networks one could
try all possible choices of C and select the one leading to
the smallest reconstruction error, for general networks a more
scalable approach is required. To formulate the corresponding
optimization problem sP = C s is substituted into (45). After
that, the product CT C is rewritten as diag(c) where c is a
binary selection vector of dimension N τ ×1. Note that having
ci = 1 indicates that at time t = modτ (N τ − i) the node
(i + t)/τ injects a seeding value. With this notation, the joint
design of sP and c amounts to solving
{s∗, c∗} := argmin
{s,c}
(cid:107)y − VKΦKdiag(c) s(cid:107)2
2 + γ(cid:107)c(cid:107)0
s.t.
c ∈ {0, 1}N τ ,
(50)
where ΦK is defined in (44). In (50) each seeding location
used is penalized with a constant cost γ. By tuning γ, the
desired level of sparsity of c can be achieved. Problem (50) can
be further simplified by setting d := diag(c) s and requiring
sparsity on d
d∗ := argmin
d
(cid:107)y − VKΦKd(cid:107)2
2 + γ(cid:107)d(cid:107)0.
(51)
Among other advantages, the formulation in (51) is amenable
to relaxations that reduce the computational complexity re-
quired to find a solution. A straightforward approach is to
relax the problem by replacing the 0-norm with the 1-norm to
obtain a convex formulation.
As in problem (49), the design in (50) and its subsequent
simplification in (51) assume that the seeding nodes can be
chosen as a function of y. For applications where this is
not convenient, a two-stage stochastic programming approach
similar to the one described for (49) can also be used in solving
(50). Last but not least, although computationally challenging,
a joint optimization of sP , h and C can be pursued by
combining the approaches in Sections VI-A2 and VI-A3.
B. Noise when injecting the seeding values
The conditions for perfect reconstruction stated in Propo-
sitions 2, 3 and 5 require the seeding values to be the exact
solution of (16), (29), and (41), respectively. However, in real
applications, the injected values can be corrupted with additive
noise. This noise can be either attenuated or amplified when
the signal percolates through the graph via the successive
9
applications of S. The goal of this section is to quantify the
reconstruction error and to discuss seeding selection schemes
tailored to these operating conditions. Their performance will
be illustrated via numerical simulations in Section VII.
Let us assume that the injected signal is sP +wP , where wP
is a P × 1 noise vector with zero mean and covariance Rw.
The active frequencies of the reconstructed signal can then be
written as(cid:98)zK = ΦKCT (sP + wP ) [cf. (41) and (44)]. From
this, we may obtain the reconstruction error as
= VK((cid:98)zK −(cid:98)yK) = VKΦKCT wP ,
(52)
with covariance matrix
R = E(H ) = VKΦKCT RwCΦH
KVH
K .
(53)
Ideally, C should be designed to select the seeding nodes and
time instants that minimize the reconstruction error, which
can be quantified as a function of R. In what follows, we
will focus on minimizing the mean squared error (MSE),
which is achieved by minimizing trace(R). However, similar
approaches can be followed to minimize other commonly used
error metrics such as λmax(R) and log(det(R)) [29].
To illustrate the design of C, two particular scenarios are
considered. In the first one, we assume i) that the frequency
coefficients (cid:98)yK are zero mean with covariance R(cid:98)y = I and
ii) that the noise wP is zero mean with covariance Rw =
σ2 E((cid:107)sP(cid:107)2
2)I. Note that assumption ii) is meaningful if the
system operates under a constant signal-to-noise ratio (SNR)
regime. In the second scenario, we assume the noise is also
uncorrelated but its power is independent of that of the seeding
signal, so that Rw = σ2I.
For convenience, the optimal seeding strategy for the first
scenario is presented in the form of a lemma.
Lemma 3 Suppose that (cid:98)yK and wP are drawn from zero-
mean distributions with covariances R(cid:98)y = I and Rw =
σ2 E((cid:107)sP(cid:107)2
2)I, respectively. Then, the selection c∗ that mini-
(cid:17)
mizes the MSE of the reconstruction is given by
c∗:= argmin
(cid:16)(cid:0)ΦKdiag(c)ΦH
(cid:1)−1(cid:17)
ΦKdiag(c)ΦH
K
(cid:16)
trace
K
c
s.t.
c ∈ {0, 1}N τ ,
trace
(cid:107)c(cid:107)0 = P.
(54)
KVH
K ).
2)trace(VKΦKdiag(c)ΦH
(55)
to cyclic permutations and
Proof : To prove the lemma, we need to show that
the
minimization of the objective in (54) is equivalent to the min-
imization of trace(R). By substituting Rw = σ2 E((cid:107)sP(cid:107)2
2)I
and diag(c) := CT C into (53), it follows that
trace(R) = σ2 E((cid:107)sP(cid:107)2
Since the trace is invariant
VH
K VK = I, we have that
trace(R) = σ2 E((cid:107)sP(cid:107)2
that (cid:98)yK = ΦKCT sP [cf. (41) and (44)] to write sP =
To find an expression for E((cid:107)sP(cid:107)2
K)−1(cid:98)yK and, consequently, to write (cid:107)sP(cid:107)2
CΦH
P sP =(cid:98)yH
as
K)−1(cid:98)yK.
2), we leverage the fact
2)trace(ΦKdiag(c)ΦH
K (ΦKdiag(c)ΦH
K(ΦKCT CΦH
(cid:107)sP(cid:107)2
2 = sH
(57)
2
K).
(56)
10
(cid:98)y
y
Fig. 2: Perfect recovery of a bandlimited graph signal. (a) The graph G, the target signal to recover y and its frequency representation (cid:98)y.
(b) Evolution of the reconstructed signal. The seeding and filtering phases are separated by a dotted line and the recovered signal is framed
in red. (c) Evolution of the frequency components of the reconstructed signal. Successive annihilation during the filtering phase is observed.
(b)
(a)
(c)
Using the expression for the expected value of a quadratic
form, it follows that
E((cid:107)sP(cid:107)2
(cid:16)(cid:0)ΦKdiag(c)ΦH
(cid:1)−1(cid:17)
2) = trace
(58)
K
.
Upon replacing (58) into (56) and recalling that σ2 does not
depend on c, the expression in (54) follows.
The statistical assumption on(cid:98)yK allows us to design c∗ such
that the expected performance of the reconstruction scheme
is optimized. In this way, the choice of the seeding nodes
and instants is independent of the particular signal being
reconstructed.
Even though obtaining general relaxations to efficiently
approximate the non-convex problem in (54) is out of the
scope of the paper, we can gain intuition by specializing (54)
for time-varying signals, i.e., by setting S = Adc. For SN-
MT seeding, where designing c boils down to selecting the
seeding node, it can be shown that the objective in (54) does
not depend on the particular node chosen. This is as it should
be, since in the directed cycle every node is topologically
indistinguishable from the others. For MN-ST seeding, the
best strategy is to uniformly distribute the seeding nodes, as
we formally state next.
Proposition 6 Suppose that the problem in (54) is particu-
larized for the case of MN-ST seeding of time-varying signals
using an ideal low-pass filter. Then, if K = P = N/θ, it holds
that the optimal seeding strategy selects the nodes in positions
1, 1 + θ, . . . , 1 + (K − 1)θ.
Proof: When S = Adc we have that: a) V = F; b)(cid:98)h∗
trace(cid:0)M−1(cid:1) trace (M)
K = α1K
for some constant α where 1K is the K × 1 vector of all
ones – since we are considering an ideal low-pass filter –;
and c) c only can take nonzero values in positions i = 1, 1 +
τ, . . . , 1+(N−1)τ (since we are considering MN-ST seeding).
Leveraging a), b) and c), problem (54) can be reformulated as
c∗ := argmin
(59)
KFHdiag(c)FEK, c ∈ {0, 1}N , (cid:107)c(cid:107)0 = K,
where c selects K seeding nodes out of the N possible ones.
First, notice that trace(M) does not depend on the particular
choice of c. To see why this is true, we denote by I(c) the
set containing the indices of the K seeding nodes selected by
c. Then, we can exploit the structure in F to write
s.t. M = ET
c
(cid:88)
K−1(cid:88)
i∈I(c)
j=0
(cid:12)(cid:12)(cid:12)(cid:12) 1√
N
trace(M) =
% of recovery
Min error
Median error
MN-ST
91.8
.001
.048
SN-MT MN-MT
96.4
.032
.349
94.4
.003
.066
(cid:114)
K
N
If we denote by {γi}K
TABLE I: Recovery performance for the three seeding schemes. We
restrict MN-MT to consist of two seeding nodes injecting two values.
which does not depend on c. Hence, the optimal c∗ in (59)
can be found as the one minimizing trace(cid:0)M−1(cid:1).
is then to find the c∗ that minimizes(cid:80)
that(cid:80)
i=1 the K eigenvalues of M, our goal
i 1/γi. Given that all γi
are nonnegative (M is positive semi-definite) and (60) implies
i γi = K 2/N, the minimization is achieved by setting
γ1 = γ2 = . . . = γK = K/N. Hence, if we show that uniform
seeding leads to γi = K/N for all i, the proof concludes. To
show this, notice that under uniform sampling
diag(c)FEK =
(61)
where F(K) is the Fourier basis of size K × K. Hence, M =
K/N I [cf. (59)] and every eigenvalue of M equals K/N.
F(K),
In words, even though for the noiseless case any seeding
selection strategy satisfying the conditions in Proposition 2 is
equally optimal, uniform seeding in directed cycles is the best
MN-ST scheme when noise is present in sP .
A second scenario of interest are setups where the additive
noise at different value injections is uncorrelated and of fixed
power, i.e., Rw = σ2I. In this case, (53) can be rewritten as
(62)
The design of c that minimizes the MSE of the reconstruction
is the solution of the following linear integer program
c∗ := argmin
R = σ2VKΦKdiag(c)ΦH
trace(ΦKdiag(c)ΦH
K)
KVH
K .
c
trace(R) = argmin
(cid:107)c(cid:107)0 = P
c ∈ {0, 1}N τ ,
c
s.t.
(63)
which can be approximated by relaxing the binary and 0-norm
constraints.
It turns out that the solution of (63) promotes the injection
of seeding values at nodes that weakly express the active
frequencies, i.e., nodes j such that the values [(cid:98)ej]k for k ≤ K
are small. This occurs because the noise power is fixed and
those nodes require the injection of seeding signals with high
power, leading to a high SNR.
VII. NUMERICAL EXPERIMENTS
(cid:12)(cid:12)(cid:12)(cid:12)2
N (i−1)(j−1)
e+j 2π
=
K 2
N
, (60)
We illustrate the reconstruction schemes in noiseless and
noisy scenarios using synthetic (Section VII-A) and real-world
graphs (Sections VII-B and VII-C).
12345678910-0.8-0.6-0.4-0.200.20.40.60.811.2-0.27-0.49-0.380.39-0.820.370.760.31-0.770.22 Node12345678910Node Index-0.180.311.241.030.000.000.000.000.000.00 Frequency Index123456789100000000.31-0.420.000.000.000.000.000.000.000.00-0.440.860.000.31-0.420.00-0.110.310.00-0.11-0.150.44-0.43-0.010.070.080.14-0.10-0.09-0.11-0.220.52-0.53-0.070.170.090.42-0.04-0.46-0.24-0.040.49-0.65-0.140.270.040.590.22-0.75-0.530.120.22-0.750.02-0.070.160.750.47-0.85-0.490.540.02-0.730.21-0.050.160.300.57-0.40-0.81-0.27-0.49-0.380.39-0.820.370.760.31-0.770.22Time01234567Node1234567891000000000000Node Index-0.03-0.02-0.030.160.29-0.070.250.18-0.210.11-0.000.010.070.05-0.940.19-0.22-0.110.53-0.20-0.00-0.01-0.060.150.000.02-0.45-0.180.37-0.24-0.000.010.060.400.000.00-0.85-0.290.22-0.26-0.01-0.02-0.090.820.000.00-1.11-0.29-0.00-0.13-0.030.040.181.270.00-0.00-0.87-0.13-0.000.00-0.08-0.10-0.441.360.000.00-0.280.00-0.000.00-0.180.311.241.03-0.00-0.00-0.000.000.000.00Time01234567Frequency Index123456789100000000000000000000000011
Fig. 3: Reconstruction errors when recovering a signal in a social
network with insufficient seeding values.
Fig. 4: Heat map of the adjacency matrix A of brain graph G.
A. Synthetic graph signals
Figure 2a represents a graph G with N = 10 nodes and
adjacency matrix A generated using an Erdos-R´enyi (ER)
model with edge probability 0.3 [30]. Define the graph-shift
operator S = A and let y be a signal to be recovered. Though
seemingly random in the node domain, the structure of y is
highly determined by G. Indeed, y has bandwidth K = 4,
as can be observed from its frequency representation (cid:98)y in
Figure 2a.
The first set of experiments illustrates the perfect recovery
of y when P = 4 seeding values are injected into G followed
by a low-pass filter of degree N−P = 6. The reconstruction is
carried out using MN-MT seeding (Section V) where nodes 1
and 2 act as seeding nodes and each of them injects a seeding
value for time instants t ∈ {0, 1}. After the seeding phase, a
filter that successively annihilates the N − K = 6 frequencies
not active in y is implemented [cf. (6)]. The evolutions
of the reconstructed signal and its frequency representation
are depicted in Figures 2b and 2c, respectively. Notice that
perfect reconstruction is achieved since the last column in
both figures coincide with y and (cid:98)y. Figure 2b illustrates that
the reconstructed signal is sparse during the seeding phase,
consisting of the first two time instants. More specifically, for
t = 0 the signal attains nonzero values only for the seeding
nodes [cf. (7)] and for t = 1 the signal remains zero for
every node outside of the one-hop neighborhood of the seeding
nodes. During the filtering phase – times t = 2 to t = 7 –
signal values are successively exchanged between neighboring
nodes in order to finally recover y at time t = 7. Figure 2c
helps to understand the operation of the filtering phase. The
signal x obtained after the seeding phase (t = 1) contains
every frequency not active in the desired signal y. Thus,
in every successive time instant, one of these frequencies is
annihilated. E.g., at time t = 2 the frequency with index i = 5
is eliminated and at t = 3 the frequency i = 6 is eliminated.
In this way, at time t = 7 every frequency not active in y has
been annihilated and perfect recovery is achieved.
To compare the reconstruction performance of MN-ST, SN-
MT, and MN-MT seeding, we generate 1000 Erdos-R´enyi
graphs with 10 nodes and edge probabilities between 0.2
and 0.4. On each graph we define a 4-bandlimited signal
and try to recover it
through the three seeding schemes
presented; see Table I. We restrict the MN-MT schemes to
those consisting of two seeding nodes injecting two values
each. We first compute the recovery percentage of the three
schemes in noiseless scenarios. More specifically, for a given
graph and signal to recover, we test for perfect recovery for
every possible combination of seeding nodes. For example,
there are 210 ways (10 choose 4) of selecting the seeding
nodes in MN-ST while there are only 10 ways of selecting
the single seeding node in SN-MT. If, e.g., 9 out of these 10
ways lead to perfect recovery, then the recovery percentage
for SN-MT on that particular graph is 90%. The values in
Table I correspond to the averages of these percentages across
the 1000 graphs generated. Notice that the highest recovery
percentage of SN-MT suggests that condition ii) in Proposi-
tion 3 is more commonly satisfied in random ER graphs than
the respective conditions in Propositions 2 and 5. We then
introduce noise in the injections following the constant SNR
model in Section VI-B for σ = 10−3. Denoting by z the signal
obtained from the reconstruction and by y the desired signal,
we define the reconstruction error as = (cid:107)z− y(cid:107)2/(cid:107)y(cid:107)2. For
every given graph and signal y, we record the minimum and
median for every possible choice of seeding nodes within
each reconstruction scheme. In Table I we report the median
of these values across the 1000 graphs generated. As it turns
out, MN-ST is an order of magnitude more robust than SN-MT
both in terms of minimum and median error. Finally, observe
that MN-MT seeding presents an intermediate behavior both
in terms of recovery percentage and reconstruction error.
B. Influencing opinions in social networks
Consider the well-known social network of Zachary’s karate
club [31] represented by a graph G consisting of 34 nodes or
members of the club and 78 undirected edges symbolizing
friendships among members. Denoting by L the Laplacian
of G, define the graph shift operator S = I − αL with
α = 1/λmax(L). A signal y on G can be interpreted as
a unidimensional opinion of each club member regarding
a specific topic, and each successive application of S can
be seen as an opinion update influenced by neighboring
individuals. Bandlimitedness of y implies that the opinion
discrepancies between neighbors are small. In this context,
signal reconstruction can be interpreted as the problem of
inducing a desired global opinion profile by influencing the
opinion of a subset of members.
We analyze the recovery performance when the number
of seeding values is insufficient (Section VI-A). For this, we
generate a signal y of bandwidth K = 5 and try to reconstruct
it using P seeding values for P = 1, . . . , 5; see Figure 3.
For every P , we find the combination of seeding values and
locations that minimizes the reconstruction error within each
seeding scheme (cf. Section VI-A3). E.g., if P = 2 and we
Seeding Values11.522.533.544.55Reconstruction Error00.10.20.30.40.50.60.70.80.9MNSTSNMTMNMTBrain Regions102030405060Brain Regions10203040506000.20.40.60.811.212
Left Hemisphere
Right Hemisphere
(a)
(b)
(c)
Fig. 6: Inducing a brain state in the presence of noise. (a) Histogram of the reconstruction error for different choices of the six seeding
nodes. (b) Frequency of appearance of each brain region among the configurations achieving the lowest reconstruction errors. (c) Anatomical
location of the six regions most used in robust seeding configurations.
PORB: Pars orbitalis
RMF: Rostral middle frontal
CM: Caudal middle frontal
IP: Inferior Parietal
SM: Supra marginal
C. Inducing a brain state
Upon dividing the human brain into the 66 regions of
interest (ROIs) defined in [32], we build a weighted undirected
graph G whose nodes are the ROIs and whose edge weights
are given by the density of anatomical connections between
regions; see Figure 4. The first 33 ROIs are located on the right
hemisphere of the brain while regions 34 to 66 correspond
to their left counterparts. From Figure 4 we see that most
connections occur within the same cortical hemisphere with
few inter hemispheric connections. We define the graph-shift
operator S = A where A is the adjacency matrix of G.
The level of activity of each ROI can be represented by a
graph signal y where larger values represent higher levels of
activity. Successive applications of S on y model a linear
evolution of the brain activity pattern [33]. As a method to
inject seeding values to G, we consider transcranial magnetic
stimulation (TMS) [15], a noninvasive method to stimulate
ROIs. In this context, reconstructing a brain signal amounts
to inducing a specific brain state via TMS. In particular, we
consider the problem of driving the brain from a resting state
to one associated with high-level cognitive operations.
Brain resting states are associated with high activity in
the posterior cingulate (PC) and inferior parietal (IP) cortices
whereas active states are associated with high activity in
the rostral middle frontal (RMF) and superior parietal (SP)
cortices [34], [35]. In Figure 5 we present the initial yi and
target yt signals, where the activity corresponding to the eight
regions mentioned – left and right versions of each cortex –
is highlighted with larger markers. In order to drive the brain
from yi to yt we consider a MN-MT seeding scheme with six
seeding nodes. Since it is unclear how to implement a low-
pass filter in a human brain, we consider that each seeding
node injects eleven values, totalizing P = 66 seeding values
permitting the recovery of the target signal after the seeding
phase without the need of a posterior filtering phase. Notice
that throughout the paper we assumed the initial signal yi to
be zero, meaning that there is no signal present on the graph
before the reconstruction process. However, our model can
accommodate for yi different from zero. To see this, if the
seeding phase lasts τ instants, then we can design our seeding
values to recover the signal yr = yt − Sτ−1yi in the original
formulation so that the negative term cancels the effect of the
seeding phase on yi and the target signal yt is recovered.
We consider noisy injections following the constant SNR
model in Section VI-B for σ = 10−3. Denoting by z the re-
constructed signal, define the reconstruction error as = (cid:107)z−
Fig. 5: Initial yi (red) and target yt (blue) brain states. High activity is
represented by positive activity levels while negative values represent
low levels of activity.
are analyzing SN-MT seeding, we consider every individual
as possible seeding node and then choose the one achieving
the minimum error. In Figure 3 we report the average of these
minimum errors across 100 bandlimited signals. As expected,
for P = 1 the three schemes coincide and for P = 5 perfect
recovery is achieved for all of them. However, for intermediate
values of P , MN-ST presents a considerably lower error than
SN-MT. For P = 3 this implies that, when trying to induce
a global opinion profile, it is more effective to influence the
opinion of three individuals once than to influence the opinion
of the same individual three times. The fact that MN-MT
seeding presents the lowest reconstruction errors is expected
since this scheme includes the other two as particular cases.
Notice that in this case, as opposed to Table I, we do not
restrict MN-MT to the cases where multiple seeding nodes
and multiple seeding values in each node are used.
For the above analysis to hold true, we must be able to
apply a low-pass filter on the social network as required by the
filtering phases of MN-ST, SN-MT, and MN-MT. This can be
achieved by assuming that we can modify the rate of exchange
of opinions in the network represented by α. Indeed, consider
that after the seeding phase, the signal still percolates over the
graph – people still communicate their opinions to neighbors
– but we can modify the diffusion rate αl at each discrete time
instant. Thus, after L − 1 interactions we obtain that
(64)
z =(cid:81)L−1
l=1 (I − αlL)x,
which is equivalent to applying an annihilating filter [cf. (6)]
to x. Notice that the filter in (64) is a polynomial on L rather
than S. However, the frequency annihilation procedure is still
valid since the eigenvectors – frequency basis – of L and S
are equal.
Reconstruction Error00.020.040.060.080.1Frequency05k10k15k20k25kBrain Regions05101520253035404550556065Frequency0100200300400500600PORB%IP%CM%PORB%SM%Brain Regions0102030405060Activity Level-10-8-6-4-20246810yt(cid:107)2/(cid:107)yr(cid:107)2. We compute for every possible combination
of seeding nodes. Given that the seeding values are induced
by TMS, we discard as possible seeding nodes the regions
inaccessible by TMS like the ones located in the medial cortex
and subcortical structures. After discarding inaccessible ROIs,
the six seeding nodes can be chosen out of 38 possible ROIs,
amounting to 2,760,681 possible configurations. In Figure 6a
we present a histogram of the reconstruction error for different
seeding configurations where we only show those attaining
errors below 0.1. The red bar in this histogram corresponds to
the 1,611 configurations that achieve the lowest reconstruction
errors. In Figure 6b we present the frequency of appearance
of each ROI in these 1,611 robust seeding configurations.
The regions with zero appearances correspond to the ROIs
inaccessible to TMS, however, among the accessible regions
the frequency of appearance is not uniform. For example, the
left inferior parietal cortex in position 41 appears 583 times
whereas the right bank of the frontal pole in position 1 is
only used 50 times. In Figure 6c we depict the 6 regions
more commonly used in robust seeding configurations. Notice
that both the left and right versions of the Pars Orbitalis are
commonly used as seeding nodes, suggesting the importance
of this region for robust brain state induction.
VIII. CONCLUSIONS
A novel approach for the recovery of bandlimited graph
signals – that admit a sparse representation in the frequency
domain – was proposed. The focus was not on estimating
an unknown graph signal but rather on inducing a known
bandlimited signal
through minimal actions on the graph.
These actions referred to signal injections at different seeding
nodes, which then percolate through the graph via local
interactions described by a graph filter. Restrictions on the
number of seeding nodes and the amount of injections at each
node gave rise to three different reconstruction schemes and
their performance in noiseless and noisy settings was analyzed.
For the noiseless case, we showed that a K-bandlimited signal
can be recovered using K injections followed by a low-
pass filter in the (graph) frequency domain. In contrast to
classical time-varying signals, it was also shown that if the
seeding nodes inject the values of the original signal in those
nodes, perfect recovery is not feasible. For scenarios leading to
imperfect reconstruction, we analyzed robust seeding strategies
to minimize distortion. Finally, the different reconstruction
schemes were illustrated through numerical experiments in
both synthetic and real-world graph signals.
REFERENCES
[1] S. Segarra, A. G. Marques, G. Leus, and A. Ribeiro, “Interpolation of
graph signals using shift-invariant graph filters,” in European Signal
Process. Conf. (EUSIPCO), Nice, France, Aug. 31 - Sept. 4 2015.
[2] ——, “Reconstruction of graph signals: percolation from a single
seeding node,” in Global Conf. on Signal and Info. Process. (GlobalSIP),
Orlando, FL, December 2015 (submitted).
[3] D. Shuman, S. Narang, P. Frossard, A. Ortega, and P. Vandergheynst,
“The emerging field of signal processing on graphs: Extending high-
dimensional data analysis to networks and other irregular domains,”
IEEE Signal Process. Mag., vol. 30, no. 3, pp. 83–98, Mar. 2013.
[4] A. Sandryhaila and J. Moura, “Discrete signal processing on graphs,”
IEEE Trans. Signal Process., vol. 61, no. 7, pp. 1644–1656, Apr. 2013.
[5] X. Zhu and M. Rabbat, “Approximating signals supported on graphs,” in
IEEE Intl. Conf. Acoust., Speech and Signal Process. (ICASSP), March
2012, pp. 3921–3924.
13
[6] S. Narang, A. Gadde, and A. Ortega, “Signal processing techniques
for interpolation in graph structured data,” in IEEE Intl. Conf. Acoust.,
Speech and Signal Process. (ICASSP), May 2013, pp. 5445–5449.
[7] S. Chen, R. Varma, A. Sandryhaila, and J. Kovacevi´c, “Dis-
crete signal processing on graphs: Sampling theory,” arXiv preprint
arXiv:1503.05432, 2015.
[8] A. G. Marques, S. Segarra, G. Leus, and A. Ribeiro, “Sampling
of graph signals with successive local aggregations,” arXiv preprint
arXiv:1504.04687, 2015.
[9] S. Narang, A. Gadde, E. Sanou, and A. Ortega, “Localized iterative
methods for interpolation in graph structured data,” in Global Conf. on
Signal and Info. Process. (GlobalSIP), Dec. 2013, pp. 491–494.
[10] X. Wang, P. Liu, and Y. Gu, “Local-set-based graph signal reconstruc-
tion,” IEEE Trans. Signal Process., vol. 63, no. 9, pp. 2432–2444, Sept.
2015.
[11] X. Wang, M. Wang, and Y. Gu, “A distributed tracking algorithm for
reconstruction of graph signals,” IEEE J. Sel. Topics Signal Process.,
vol. 9, no. 4, pp. 728–740, June 2015.
[12] S. Chen, A. Sandryhaila, J. Moura, and J. Kovacevi´c, “Signal recovery
on graphs,” arXiv preprint arXiv:1411.7414, 2014.
[13] D. Zhou and B. Scholkopf, “A regularization framework for learning
from graph data,” in ICML Work. Stat. Relational Learning and its
Connections to other Fields, vol. 15, 2004, pp. 67–68.
[14] D. J. Watts and P. S. Dodds, “Influentials, networks, and public opinion
formation,” J. Consumer Research, vol. 34, no. 4, pp. 441–458, 2007.
[15] M. Hallett, “Transcranial magnetic stimulation and the human brain,”
Nature, vol. 406, no. 6792, pp. 147–150, 2000.
[16] T. Nakano, M. Moore, F. Wei, A. Vasilakos, and J. Shuai, “Molecular
communication and networking: Opportunities and challenges,” IEEE
Trans. Nanobiosci., vol. 11, no. 2, pp. 135–148, June 2012.
[17] M. S. Kuran, H. B. Yilmaz, T. Tugcu, and B. Ozerman, “Energy model
for communication via diffusion in nanonetworks,” Nano Commun.
Netw., vol. 1, no. 2, pp. 86 – 95, 2010.
[18] C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed diffusion: A
scalable and robust communication paradigm for sensor networks,” in
Intl. Conf. Mobile Comput. and Netw. New York, NY, USA: ACM,
2000, pp. 56–67.
[19] A. Sandryhaila and J. Moura, “Discrete signal processing on graphs:
Frequency analysis,” IEEE Trans. Signal Process., vol. 62, no. 12, pp.
3042–3054, June 2014.
[21] A. Anis, A. Gadde, and A. Ortega, “Towards a sampling theorem for
signals on arbitrary graphs,” in IEEE Intl. Conf. Acoust., Speech and
Signal Process. (ICASSP), May 2014, pp. 3864–3868.
[22] M. Rabbat and V. Gripon, “Towards a spectral characterization of signals
supported on small-world networks,” in IEEE Intl. Conf. Acoust., Speech
and Signal Process. (ICASSP), May 2014, pp. 4793–4797.
[23] S. Safavi and U. Khan, “Revisiting finite-time distributed algorithms via
successive nulling of eigenvalues,” IEEE Signal Process. Lett., vol. 22,
no. 1, pp. 54–57, Jan. 2015.
[24] S. M. Kay, Fundamentals of Statistical Signal Processing: Estimation
Theory. Upper Saddle River, NJ, USA: Prentice-Hall, Inc., 1993.
[25] G. McCormick, “Computability of global solutions to factorable non-
convex programs: Part I convex underestimating problems,” Math.
Program., vol. 10, no. 1, pp. 147–175, 1976.
[26] H. Konno, “A cutting plane algorithm for solving bilinear programs,”
Math.l Program., vol. 11, no. 1, pp. 14–27, 1976.
[27] S. Choudhary and U. Mitra, “Identifiability scaling laws in bilinear
inverse problems,” arXiv preprint arXiv:1402.2637, 2014.
[28] A. Shapiro, D. Dentcheva, and A. Ruszczynski, Lectures on Stochastic
Programming: Modeling and Theory. SIAM, 2014, vol. 16.
[29] F. Pukelsheim, Optimal Design of Experiments. SIAM, 1993, vol. 50.
[30] B. Bollob´as, Random Graphs. Springer, 1998.
[31] W. W. Zachary, “An information flow model for conflict and fission
in small groups,” J. Anthropological Research, vol. 33, no. 4, pp. pp.
452–473, 1977.
[32] P. Hagmann, L. Cammoun, X. Gigandet, R. Meuli, C. J. Honey, V. J.
Wedeen, and O. Sporns, “Mapping the structural core of human cerebral
cortex,” PLoS Biol, vol. 6, no. 7, p. e159, 2008.
[33] S. Gu, F. Pasqualetti, M. Cieslak, S. T. Grafton, and D. S. Bassett,
“Controllability of brain networks,” arXiv preprint arXiv:1406.5197,
2014.
[34] M. D. Greicius, B. Krasnow, A. L. Reiss, and V. Menon, “Functional
connectivity in the resting brain: A network analysis of the default mode
hypothesis,” Proc. Nat. Academy Sci., vol. 100, no. 1, pp. 253–258, 2003.
[35] J. D. Medaglia, M.-E. Lynall, and D. S. Bassett, “Cognitive network
neuroscience,” J. Cogn. Neurosci., vol. 27, no. 8, pp. 1471–1491, July
2015.
[20] C. Godsil and G. Royle, Algebraic graph theory.
Graduate Texts in Mathematics, 2001, vol. 207.
Springer-Verlag,
|
1611.09030 | 4 | 1611 | 2019-08-26T17:48:48 | A modelling and computational study of the frustration index in signed networks | [
"cs.SI",
"math.OC"
] | Computing the frustration index of a signed graph is a key step toward solving problems in many fields including social networks, political science, physics, chemistry, and biology. The frustration index determines the distance of a network from a state of total structural balance. Although the definition of the frustration index goes back to the 1950's, its exact algorithmic computation, which is closely related to classic NP-hard graph problems, has only become a focus in recent years. We develop three new binary linear programming models to compute the frustration index exactly and efficiently as the solution to a global optimisation problem. Solving the models with prioritised branching and valid inequalities in Gurobi, we can compute the frustration index of real signed networks with over 15000 edges in less than a minute on inexpensive hardware. We provide extensive performance analysis for both random and real signed networks and show that our models outperform all existing approaches by large factors. Based on solve time, algorithm output, and effective branching factor we highlight the superiority of our models to both exact and heuristic methods in the literature. | cs.SI | cs |
A modelling and computational study of the frustration index
in signed networks
Samin Aref1 2
Andrew J. Mason3
Mark C. Wilson2
1Max Planck Institute for Demographic Research
Konrad-Zuse-Str. 1, Rostock, 18057, Germany
2School of Computer Science, University of Auckland
Auckland, Private Bag 92019, New Zealand
3Department of Engineering Science, University of Auckland
Auckland, Private Bag 92019, New Zealand
[email protected]
August 27, 2019
Abstract
Computing the frustration index of a signed graph is a key step toward solving problems
in many fields including social networks, political science, physics, chemistry, and biology. The
frustration index determines the distance of a network from a state of total structural balance.
Although the definition of the frustration index goes back to the 1950's, its exact algorithmic
computation, which is closely related to classic NP-hard graph problems, has only become a
focus in recent years. We develop three new binary linear programming models to compute
the frustration index exactly and efficiently as the solution to a global optimisation problem.
Solving the models with prioritised branching and valid inequalities in Gurobi, we can compute
the frustration index of real signed networks with over 15000 edges in less than a minute on
inexpensive hardware. We provide extensive performance analysis for both random and real
signed networks and show that our models outperform all existing approaches by large factors.
Based on solve time, algorithm output, and effective branching factor we highlight the superi-
ority of our models to both exact and heuristic methods in the literature.
Keywords: 0-1 integer linear programming, Graph optimisation, Frustration index, Branch
and bound, Signed networks, Balance theory
The reference to this article should be made as follows: Aref, S., Mason, M. J., Wil-
son, M. C. A modelling and computational study of the frustration index in signed networks.
Networks, (Forthcoming), doi: 10.1002/net.XXXXX.
Old title: An exact method for computing the frustration index in signed networks using
binary programming
1
1 Introduction
Local ties between entities lead to global structures in networks. Ties can be formed as a result of
interactions and individual preferences of the entities in the network. The dual nature of interactions
in various contexts means that the ties may form in two opposite types, namely positive ties and
negative ties. In a social context, this is interpreted as friendship versus enmity or trust versus
distrust between people. The term signed network embodies a multitude of concepts involving
relationships characterisable by ties with plus and minus signs. Signed graphs are used to model
such networks where edges have positive and negative signs. Structural balance in signed graphs
is a macro-scale structural property that has become a focus in network science. Balance theory
was the first attempt to understand the sources of tensions and conflicts in groups of people with
signed ties [37]. According to balance theory, some structural configurations of people with signed
ties lead to social tension and therefore are not balanced.
In network context, if the vertex set of a signed network can be partitioned into k ≤ 2 subsets
such that each negative edge joins vertices belonging to different subsets, it is called a balanced
network [13]. Using graph-theoretic concepts, Cartwright and Harary identified cycles of the graph
as the origins of tension, in particular cycles containing an odd number of negative edges [13].
By definition, signed graphs in which no such cycles are present satisfy the property of structural
balance. For graphs that are not totally balanced, a distance from total balance (a measure of partial
balance [7]) can be computed. Among various measures is the frustration index that indicates the
minimum number of edges whose removal (or equivalently, negation) results in balance [1, 35, 64].
In what follows, we discuss previous works related to the frustration index (also called the line index
of balance [35]). We use both names, line index of balance and frustration index, interchangeably
in this paper.
1.1 Motivation
In the past few decades, different measures of balance [13, 55, 61, 44, 25] have been suggested
and deployed to analyse balance in real-world signed networks resulting in conflicting observations
[46, 26, 25]. Measures based on cycles [13, 55], triangles [61, 44], and closed-walks [25] are not
generally consistent and do not satisfy key axiomatic properties [7]. Among all the measures, a
normalised version of the frustration index is shown to satisfy many basic axioms [7]. This measure
provides a clear understanding of the transition to balance in terms of the number of edges to be
modified to reduce the tension, as opposed to graph cycles that were first suggested as origins of
tension in unbalanced networks [13].
The frustration index is a key to frequently stated problems in many different fields of research
In biological networks, optimal decomposition of a network into monotone
[39, 36, 40, 20, 21].
subsystems is made possible by computing the frustration index [39]. In finance, performance of a
portfolio can be linked to the balance of its underlying signed graph [36]. In physics, the frustration
index provides the minimum energy state in models of atomic magnets known as Ising models [40].
In political science [6] and international relations [20], networks can be partitioned into cohesive
clusters using the line index of balance. In chemistry, bipartite edge frustration has applications to
the stability of fullerene, a carbon allotrope [21]. For discussions on applications of the frustration
index, one may refer to [8].
2
1.2 Complexity
Computing the frustration index is related to the well-known unsigned graph optimisation prob-
lem EDGE-BIPARTIZATION, which requires minimisation of the number of edges whose dele-
tion makes the graph bipartite. Given an instance of the latter problem, by declaring each edge
to be negative we convert it to the problem of computing the frustration index. Since EDGE-
BIPARTIZATION is known to be NP-hard [63], so is computing the frustration index. In the con-
verse direction there is a reduction of the frustration index problem to EDGE-BIPARTIZATION
which increases the number of edges by a factor of at most 2 [38]. If the reduction preserves pla-
narity, the frustration index can be computed in polynomial time for such planar graphs [33], which
is equivalent to the ground state calculation of a two-dimensional spin glass model with no periodic
boundary conditions and no magnetic field [18, 30].
The classic graph optimisation problem MAXCUT is also a special case of the frustration index
problem, as can be seen by assigning all edges to be negative (an edge is frustrated if and only if it
does not cross the cut).
1.3 Approximation
In general graphs, the frustration index is even NP-hard to approximate within any constant factor
(assuming Khot's Unique Games Conjecture [41]) [38]. That is, for each C > 0, the problem of
finding an approximation to the frustration index that is guaranteed to be within a factor of C is
believed to be NP-hard.
log n) [2] or O(k log k) [9] where
n is the number of vertices and k is the frustration index. Coleman et al. provide a review on the
performance of several approximation algorithms of the frustration index [14].
√
The frustration index can be approximated to a factor of O(
1.4 Heuristics and local optimisation
Doreian and Mrvar have reported numerical values as the line index and suggest that determining
this index is in general a polynomial-time hard problem [20]. However, their algorithm does not
provide optimal solutions and the results are not equal to the line index of balance [5]. Data-
reduction schemes [38] and ground state search heuristics [39] are used to obtain estimates for the
frustration index. Facchetti, Iacono, and Altafini suggested a non-linear energy function minimisa-
tion model for finding the frustration index [26]. Their model was solved using various techniques
[39, 23, 49, 50]. Using the ground state search heuristic algorithms [39], the frustration index is
estimated in biological networks with n ≈ 1.5 × 103 [39] and social networks with n ≈ 105 [26, 27].
1.5 Exact computation
Using a parametrised algorithmics approach, Huffner, Betzler, and Niedermeier show that the frus-
tration index (under a different name) is fixed parameter tractable and can be computed in O(2km2)
[38], where m is the number of edges and k is the fixed parameter (the frustration index). Binary
(quadratic and linear) programming models were recently suggested as methods for computing the
exact value of the frustration index [5] capable of processing graphs with m ≈ 103 edges.
3
1.6 Related works on a similar problem
Despite the lack of exact computational methods for the frustration index, a closely related and
more general problem in signed networks has been investigated comprehensively. According to
Davis's definition of generalised balance, a signed network is weakly balanced (k-balanced) if and
only if its vertex set can be partitioned into k subsets such that each negative edge joins vertices
belonging to different subsets [17]. The problem of finding the minimum number of frustrated edges
for general k (an arbitrary number of subsets) is referred to as the Correlation Clustering problem
[10].
For every fixed k, there is a polynomial-time approximation scheme for the correlation clustering
problem [32]. For arbitrary k, exact [12, 29] and heuristic methods [22, 47, 48] are developed based
on a mixed integer programming model [19]. Denoting the order of a graph by n, exact algorithms
fail for n > 21 [12] and n > 40 [29], while greedy algorithms [22] and local search heuristics [47] are
used for larger instances with n ≈ 103 and n ≈ 104 respectively.
After extending the non-linear energy minimisation model suggested by Facchetti et al. [26] to
generalised balance, Ma et al. has experimented on the correlation clustering problem in networks
with n ≈ 105 using various heuristics [49, 50]. Esmailian et al. have also extended the work of
Facchetti et al. [26] focusing on the role of negative ties in signed graph clustering [23, 24].
Our contribution
The principal focus of this research study is to provide further insight into computing the frustration
index by developing efficient computational methods outperforming previous methods by large
factors. We systematically investigate several formulations for exact computation of the frustration
index and compare them based on solve time as well as other performance measures.
The advantage of formulating the problem as an optimisation model is not only exploring the
details involved in a fundamental NP-hard problem, but also making use of powerful mathematical
programming solvers like Gurobi [34] to solve the NP-hard problem exactly and efficiently. We
provide numerical results on a variety of undirected signed networks, both randomly generated and
inferred from well-known data sets (including real signed networks with over 15000 edges).
A recent study by the current authors has investigated computing the frustration index in
smaller scales using quadratic and linear optimisation models [5]. The linear model is used for
computing the frustration index in several small random and real networks with up to 3200 edges.
We improve the contributions of [5] by providing three new binary linear formulations which not
only outperform the models in [5] by large factors, but also facilitate a more direct and intuitive
interpretation. We discuss more efficient speed-up techniques that require substantially fewer ad-
ditional constraints compared to [5]. This allows Gurobi's branch and bound algorithm to start
with a better root node solution and explore considerably (several orders of magnitude) fewer nodes
leading to a substantially shorter solve time. Moreover, our new models handle order-of-magnitude
larger instances that are not solvable by the models in [5]. We provide in-depth performance anal-
ysis using extensive numerical results showing the solve times of our worst-performing model to be
2 − 9 times faster than the best-performing model in [5].
This paper begins by laying out the theoretical dimensions of the research in Section 2. Linear
programming models are formulated in Section 3. Section 4 provides different techniques to improve
the formulations and reduce solve time. The numerical results on the models' performance are
presented in Section 5. Section 6 provides comparison against the literature using both random
4
and real networks. Other formulations and extensions to the models are provided in Section 7
followed by Section 8 which sums up the research highlights.
2 Preliminaries
We recall some standard definitions.
2.1 Basic notation
We consider undirected signed networks G = (V, E, σ). The ordered set of nodes is denoted by
V = {1, 2, . . . , n}, with V = n. The set E of edges is partitioned into the set of positive edges E+
and the set of negative edges E− with E− = m−, E+ = m+, and E = m = m− + m+. The
sign function is denoted by σ : E → {−1, +1}.
We represent the m undirected edges in G as ordered pairs of vertices E = {e1, e2, ..., em} ⊆
{(i, j) i, j ∈ V, i < j}, where a single edge ek between nodes i and j, i < j, is denoted by
ek = (i, j), i < j. We denote the graph density by ρ = 2m/(n(n − 1)). The entries, aij, of the
signed adjacency matrix, A, are defined in (1).
σ(i,j)
σ(j,i)
0
aij =
if (i, j) ∈ E
if (j, i) ∈ E
otherwise
(1)
The number of edges incident to the node i ∈ V represents the degree of node i and is de-
noted by d(i). A directed cycle (for simplicity cycle) of length k in G is a sequence of nodes
v0, v1, ..., vk−1, vk = v0 such that for each i = 1, 2, ..., k there is an edge from vi−1 to vi. The sign
of a cycle is the product of the signs of its edges. A cycle with negative sign is unbalanced. A
balanced cycle is one with positive sign. A balanced graph is one with no negative cycles.
2.2 Node colouring and frustration count
Satisfied and frustrated edges are defined based on colourings of the nodes. Colouring each node
with black or white, a frustrated (satisfied) edge (i, j) is either a positive (negative) edge with
different colours on the endpoints i, j or a negative (positive) edge with the same colours on the
endpoints i, j. Subfigure 1a illustrates an example signed graph in which positive and negative
edges are represented by solid lines and dotted lines respectively. Subfigures 1b and 1c illustrate
node colourings and their impacts on the frustrated edges that are represented by thick lines.
Let X ⊆ V be a subset of vertices. This defines a partition (X, V \ X) of V . We call X a
colouring set. Let binary variable xi denote the colour of node i ∈ V under colouring set X. We
consider xi = 1 if i ∈ X (black node) and xi = 0 if i ∈ V \ X (white node).
Definition. We define the frustration count of signed graph G under colouring X as fG(X) :=
(i,j)∈E fij(X) where fij(X) is the frustration state of edge (i, j), given by
(cid:80)
fij(X) =
if xi = xj and (i, j) ∈ E+
if xi = xj and (i, j) ∈ E−
if xi (cid:54)= xj and (i, j) ∈ E−
if xi (cid:54)= xj and (i, j) ∈ E+.
0,
1,
0,
1,
5
(2)
(a) An example graph
with four nodes,
two
positive edges, and three
negative edges
(b) An arbitrary node
colouring resulting in
two
edges
(0,2), (2,3)
frustrated
(c) Another node colouring resulting in one
frustrated edge (1,2)
Figure 1: Node colourings and the respective frustrated edges for an example signed graph
The optimisation problem consists in finding a subset X∗ ⊆ V of G that minimises the frus-
tration count fG(X), i.e., solving Eq. (3). The globally optimal solution to this problem gives the
frustration index L(G) of signed graph G.
It follows that fG(X) gives an upper bound on L(G) for any X ⊆ V . Note that the colouring
in Subfigure 1b does not minimise fG(X), while in Subfigure 1c fG(X) is minimum.
L(G) = min
X⊆V
fG(X)
(3)
3 Binary linear programming formulations
In this section, we introduce three binary linear models in (4) -- (6) to minimise the frustration
count as the objective function. There are various ways to form the frustration count using variables
defined over graph nodes and edges which lead to various mathematical programming models that
we discuss in this section.
3.1 The AND model
We start with an objective function to minimise the frustration count. Note that the frustration
state of a positive edge (i, j) can be represented by fij = xi + xj − 2xixj ∀(i, j) ∈ E+ using
the two binary variables xi, xj ∈ {0, 1} for the endpoint colours. For a negative edge, we have
fij = 1 − (xi + xj − 2xixj) ∀(i, j) ∈ E−.
The term xixj can be replaced by binary variable xij = xixj for each edge (i, j) that take value
1 whenever AND(xi,xj ) = 1 (both endpoints are coloured black) and 0 otherwise. This gives our
first binary linear model in (4) that calculates the frustration index in the minimisation objective
function.
The optimal solution represents a subset X∗ ⊆ V of G that minimises the frustration count. The
optimal value of the objective function in Eq. (4) is denoted by Z∗ which represents the frustration
index.
The dependencies between the xij and xi, xj values are taken into account using standard
AND constraints. The AND model has n + m variables and 2m+ + m− constraints. Note that
6
120312031203Negative frustrated edgePositive frustrated edgeNegative edgePositive edgexij variables are dependent variables because of the constraints and the minimisation objective
function. Therefore, we may drop the integrality constraint of the xij variables and consider them
as continuous variables in the unit interval, xij ∈ [0, 1]. The next subsection discusses an alternative
binary linear model for computing the frustration index.
(cid:88)
min
xi:i∈V,xij :(i,j)∈E
Z =
(i,j)∈E+
xi + xj − 2xij +
s.t. xij ≤ xi ∀(i, j) ∈ E+
xij ≤ xj ∀(i, j) ∈ E+
xij ≥ xi + xj − 1 ∀(i, j) ∈ E−
xi ∈ {0, 1} ∀i ∈ V
xij ∈ {0, 1} ∀(i, j) ∈ E
(cid:88)
(i,j)∈E−
1 − (xi + xj − 2xij)
(4)
3.2 The XOR model
The XOR model is designed to directly count the frustrated edges using binary variables fij ∈
{0, 1},∀(i, j) ∈ E. As before, we use xi ∈ {0, 1},∀i ∈ V to denote the colour of node i. This model
is formulated by observing that the frustration state of a positive edge (i, j) ∈ E+ is given by
fij = XOR(xi,xj ). Similarly for (i, j) ∈ E−, we have fij = 1− XOR(xi,xj ). Therefore, the minimum
frustration count under all node colourings is obtained by solving (5).
(cid:88)
min
xi:i∈V,fij :(i,j)∈E
Z =
fij
(i,j)∈E
s.t.
fij ≥ xi − xj ∀(i, j) ∈ E+
fij ≥ xj − xi ∀(i, j) ∈ E+
fij ≥ xi + xj − 1 ∀(i, j) ∈ E−
fij ≥ 1 − xi − xj ∀(i, j) ∈ E−
xi ∈ {0, 1} ∀i ∈ V
fij ∈ {0, 1} ∀(i, j) ∈ E
(5)
The dependencies between the fij and xi, xj values are taken into account using two standard
XOR constraints per edge. Therefore, the XOR model has n + m variables and 2m constraints.
Note that fij variables are dependent variables because of the constraints and the minimisation
objective function. Therefore, we may specify fij variables as continuous variables in the unit
interval, fij ∈ [0, 1]. A third linear formulation of the problem is provided in the next subsection.
3.3 The ABS model
In this subsection, we propose the ABS model, a binary linear model in which we use two edge
variables to represent the frustration state of an edge. We start by observing that for a given node
colouring, xi − xj = 1 for a positive frustrated edge and xi − xj = 0 for a positive satisfied edge
(i, j) ∈ E+. Similarly, 1 − xi − xj = xi + xj − 1 gives the frustration state of a negative edge
(i, j) ∈ E−.
7
To linearise the absolute value terms, we introduce additional binary variables eij, hij ∈ {0, 1},
∀(i, j) ∈ E. We replace xi − xj with eij + hij to represent the frustration state of a positive edge
(i, j) ∈ E+. This requires adding the constraint xi − xj = eij − hij ∀(i, j) ∈ E+. Similarly, we
replace xi + xj − 1 with eij + hij to represent the frustration state of a negative edge (i, j) ∈ E−.
Accordingly, we add the constraint xi + xj − 1 = eij − hij ∀(i, j) ∈ E−.
These two replacements allow us to linearise the two absolute value terms and formulate the
ABS model in (6) which has n + 2m variables and m constraints. Note that in an optimal solution,
variables eij and hij both take the value 0 for a satisfied edge (i, j) ∈ E, whereas for a frustrated
edge (i, j) ∈ E exactly one of the two variables eij and hij takes the value 1. The objective function
in (6) sums the frustration states of all edges and its optimal value equals the frustration index.
min
xi:i∈V,eij ,hij :(i,j)∈E
Z =
eij + hij
(cid:88)
(i,j)∈E
s.t. xi − xj = eij − hij ∀(i, j) ∈ E+
xi + xj − 1 = eij − hij ∀(i, j) ∈ E−
xi ∈ {0, 1} ∀i ∈ V
eij ∈ {0, 1} ∀(i, j) ∈ E
hij ∈ {0, 1} ∀(i, j) ∈ E
(6)
3.4 Comparison of the models
In this subsection we compare the three models introduced above and two of the models suggested
in [5], based on the number and type of constraints. Table 1 summarises the comparison.
Table 1: Comparison of optimisation models developed for computing the frustration index
Variables
Constraints
Constraint type
Objective
et al.
Aref
UBQP [5]
n
0
-
quadratic
et
Aref
al.
binary linear [5]
n + m
m+ + m−
linear
linear
AND (4)
XOR (5)
ABS (6)
n + m
n + 2m
n + m
2m+ + m− 2m+ + 2m− m+ + m−
linear
linear
linear
linear
linear
linear
In optimal solutions of our three suggested models, the frustration state of edge (i, j) is repre-
sented by the corresponding term for edge (i, j) in the objective function. This leads to Eq. (7)
which makes a connection between the optimal values of the decision variables in the three models.
fij = eij + hij = (1 − aij)/2 + aij(xi + xj − 2xij)
(7)
Note that not only does the number of constraints scale linearly with graph size, each constraint
involves at most 4 variables. Thus the worst-case space usage for solving these models is O(n2).
The three linear models perform differently in terms of solve time and the number of branch and
bound (B&B) nodes required to solve a given instance.
Solving large-scale binary programming models is not easy in general [11] and therefore there
is a limit to the size of the largest graph whose frustration index can be computed in a given time.
In the next section, we discuss some techniques for improving the performance of Gurobi in solving
our suggested binary linear models.
8
4 Speed-up techniques
In this section we discuss techniques to speed up the branch and bound algorithm for solving the
binary linear models described in the previous section. The branch and bound algorithm can be
provided with a list of prioritised variables for branching which may speed up the solver if branching
on these variables leads more quickly to integer solutions.
Another technique often deployed in solving Integer Programming (IP) models is using valid
inequalities which we discuss briefly. Two key features of valid inequalities is that they are satisfied
by the optimal integer solutions (validity), but are violated by undesired feasible solutions (useful-
ness). We implement some valid inequalities as lazy constraints which are given to the solver, but
only added to the model if they are violated by a solution [42, 34]. Implementing valid inequalities
as lazy constraints restricts the model by removing the undesired solutions that violate them. Such
valid and useful restrictions reduce solve time [42].
4.1 Pre-processing data reduction
Standard graph pre-processing can be used to reduce graph size and order without changing the
frustration index. This may reduce solve time in graphs containing nodes of degree 0 and 1 (also
called isolated and pendant vertices respectively) and nodes whose removal increases the number
of connected components (also called articulation points) [38]. We have tested iterative reduction
of isolated and pendant vertices as well as decomposing graphs by cutting them into smaller sub-
graphs using articulation points. Our experiments show that reducing isolated and pendant vertices
does not considerably affect the solve time. Moreover, the scarcity of articulation points in many
graphs in which isolated and pendant vertices have been removed, makes decomposition based on
articulation points not particularly useful.
4.2 Branching priority and fixing a colour
We relax the integrality constraints and observe in the Linear Programming relaxation (LP relax-
ation) of all three models that there always exists a fractional solution of xi = 0.5,∀i ∈ V which
gives an optimal objective function value of 0. We can increase the root node objective by fixing
one node variable to value 1. Fixing a node variable also breaks the symmetry that exists and
allows changing all node colours to give an equivalent solution. This is similar to fixing the ghost
spin in the ground state calculation of a spin glass model [18] and is also used in [5].
When the colour of node k is fixed by imposing xk = 1, the variables associated with edges
incident to node k take value 0.5 (in the ABS model one of the two variables eij and hij take value
0.5). In all three models, this changes the fractional solution of the LP relaxation from 0 to d(k)/2
because all edges incident to node k contribute 0.5 to the objective function. This observation
shows that the best node variable to be fixed is the one associated with the highest degree which
allows for an increase of maxi∈V d(i)/2 in the LP relaxation optimal objective function value. We
formulate this as a constraint in (8).
xk = 1 k = arg max
i∈V
d(i)
(8)
In our experiments, we always observed an improvement in the root node objective value when
Eq. (8) was added, which shows it is useful. We provide more detailed results on the root node
objective values for several instances in Section 6.
9
Based on the same idea, we may modify the branch and bound algorithm so that it branches first
on the node with the highest degree. This modification is implemented by specifying a branching
priority for the node variables in which variable xi has a priority given by its degree d(i).
4.3 Unbalanced triangle constraints
We consider one valid inequality for each negative cycle of length 3 (unbalanced triangle) in the
graph. Under arbitrary colouring X, every negative cycle of the graph contains an odd number
of frustrated edges. This means that any colouring of the nodes in an unbalanced triangle must
produce at least one frustrated edge. Recalling that under colouring X, the variable fij is 1 if
edge (i, j) is frustrated (and 0 otherwise), then for any node triple (i, j, k) defining an unbalanced
triangle in G, inequality (9) is valid.
fij + fik + fjk ≥ 1 ∀(i, j, k) ∈ T −
(9)
In (9), T − = {(i, j, k) ∈ V 3 aijaikaj k = −1} denotes the set of node triples that define an
unbalanced triangle. The expression in inequality (9) denotes the sum of frustration states for
the three edges (i, j), (i, k), (j, k) making an unbalanced triangle. Note that in order to implement
the unbalanced triangle constraints (9), fij must be represented using the decision variables in
the particular model. Eq. (7) shows how fij can be defined in the AND and ABS models. We
implement the valid inequality in (9) using Gurobi's feature for adding lazy constraints and ensure
that lazy constraints that cut off the relaxation solution at the root node are also pulled into the
model (see lazy as a tunable parameter in linear constraint attributes in [34]).
4.4 Overall improvement made by the speed-up techniques
In this subsection, we report the solve time improvement obtained by implementing the speed-up
techniques. The evaluation is based on 100 Erdos-R´enyi graphs with uniformly random parameters
from the ranges 40 ≤ n ≤ 50, 0 ≤ ρ ≤ 1, and 0 ≤ m−/m ≤ 1. The total solve time reduction
observed when both speed-up techniques (4.2 -- 4.3) are implemented is 67% for the AND model,
90% for the XOR model, and 78% for the ABS model. Table 2 shows the solve time improvements
made by implementing the speed-up techniques individually and collectively.
Table 2: Usefulness of the speed-up techniques based on 100 Erdos-R´enyi graphs
Without speed-up
With branching priority
With triangle inequalities
With both speed-up techniques
Average solve time (s)
AND XOR ABS
14.80
19.71
5.50
5.90
17.26
9.21
4.93
4.42
41.60
4.91
31.72
4.08
-
Time improvement (%)
AND XOR ABS
-
60% 88% 72%
38% 24% 12%
67% 90% 78%
-
5 Computational performance
In this section, our optimisation models are tested on various random instances using 64-bit Gurobi
version 7.5.2 on a desktop computer with an Intel Core i5 7600 @ 3.50 GHz (released in 2017) and
10
8.00 GB of RAM running 64-bit Microsoft Windows 10. We use NetworkX package in Python for
generating random graphs. The models were created using Gurobi's Python environment in 64-bit
Anaconda3 5.0.1 Jupyter.
5.1 Comparison of the models' performance
In this subsection, we discuss the time performance of Gurobi for solving the extended binary linear
models which include both speed-up techniques (4.2 -- 4.3).
In order to compare the performance of the three linear models, we consider 12 test cases each
containing 10 Barab´asi-Albert random graphs with various combinations of density and propor-
tion of negative edges. The results in Table 3 show that the three models have relatively similar
performance in terms of solve time.
Table 3: Solve time comparison of the three models based on test cases of 10 Barab´asi-Albert graphs
m−
m
Average Z∗
n m
ρ
60
539
0.3
884
0.5
70
741
0.3
1209
0.5
0.3
0.5
0.7
1
0.3
0.5
0.7
1
0.3
0.5
0.7
1
0.3
0.5
0.7
1
157.4
185.0
172.9
55.0
262.4
325.8
329.4
272.4
217.0
260.6
248.0
78.0
361.7
460.4
457.7
382.2
Solve time (s) mean ± SD
AND (4)
1.13 ± 0.48
1.48 ± 0.56
1.07 ± 0.41
0.04 ± 0.01
1.4 ± 0.16
37.41 ± 11.53
36.73 ± 8.28
1 ± 0.17
4.07 ± 1.67
4.56 ± 0.89
2.94 ± 0.37
0.07 ± 0
3.27 ± 0.34
471.18 ± 77.27
308.05 ± 130.31
4.07 ± 1.08
XOR (5)
1.59 ± 0.3
2.95 ± 0.28
2.55 ± 0.8
0.04 ± 0.01
0.45 ± 0.08
27.09 ± 27.09
39.8 ± 7.82
0.77 ± 0.26
4.55 ± 0.77
12.28 ± 1.72
9.72 ± 2.32
0.05 ± 0.01
0.76 ± 0.09
322.99 ± 112.29
369.14 ± 208.88
2.93 ± 1.31
ABS (6)
0.84 ± 0.1
1.1 ± 0.19
0.84 ± 0.16
0.06 ± 0.02
0.41 ± 0.04
25.15 ± 8.46
30.44 ± 5.73
6.12 ± 4.61
1.52 ± 0.34
2.84 ± 0.46
1.87 ± 0.26
0.1 ± 0.03
0.96 ± 0.1
324.72 ± 131.86
251.21 ± 96.75
20.67 ± 14.28
Comparing values of the same column, it can be seen that graphs with a higher density (more
edge variables) have a longer solve time. For graphs of a given order and density, we observe the
shortest solve times for m−/m ∈ {0.3, 1} in most cases which are also associated with the two
smallest averages of values of Z∗.
5.2 Convergence of the models with and without the speed-ups
We investigate the algorithm convergence by running the three models with and without the speed-
up techniques for one Erdos-R´enyi (ER) random graph and one Barab´asi-Albert (BA) random
graph with n = 100, m = 900, m− = 600 and plotting the upper and lower bounds over time.
Figure 2 shows normalised bounds over time on a log scale where the vertical axes represent upper
and lower bounds normalised by dividing by the optimal objective function value.
11
(a) The AND model, ER graph
(b) The XOR model, ER graph
(c) The ABS model, ER graph
(d) The AND model, BA graph
(e) The XOR model, BA graph
(f) The ABS model, BA graph
Figure 2: Normalised upper and lower bounds over time with and without the speed-up techniques
for one ER graph and one BA graph with n = 100, m = 900, m− = 600 on a log scale. Vertical axes
show normalised upper and lower bounds. (colour version online)
For the randomly generated Erdos-R´enyi graph in Subfigures 2a, 2b, and 2c, the solve times of
all three models without the speed-up techniques are over 12000 seconds (and in one case 33000
seconds). These solve times are reduced to less than 2800 seconds (and in one case 1400 seconds)
when the speed-up techniques are implemented.
Subfigures 2d, 2e, and 2f show a considerable solve time improvement for the randomly generated
Barab´asi-Albert graph. It takes 420 seconds (80 seconds) for the AND model and the ABS model to
find an optimal solution without (with) the speed-up techniques. The XOR model without (with)
the speed-up techniques reaches optimality in 655 seconds (40 seconds).
5.3 Largest instances solvable in 10 hours
Our experiments allow us to discuss the size of the largest graph whose frustration index can be
computed in a reasonable time using an extended binary linear model. Two important factors
must be taken into consideration in this regard: network properties and processing capacities.
As it is expected from our degree-based prioritised branching in 4.2, network properties such as
degree heterogeneity could have an impact on the solve time. Moreover, the numerical results in [5]
12
0.00.20.40.60.81.01.201101001,00010,000100,000Time (seconds)0.00.20.40.60.81.01.201101001,00010,000100,000Time (seconds)0.00.20.40.60.81.01.201101001,00010,000100,000Time (seconds)0.00.20.40.60.81.01.201101001,000Time (seconds)Upper bound (with speed-up)Lower bound (with speed-up)Upper bound (without speed-up)Lower bound (without speed-up)0.00.20.40.60.81.01.201101001,000Time (seconds)0.00.20.40.60.81.01.201101001,000Time (seconds)suggest that reaching optimality in real signed networks takes a considerably shorter time compared
to randomly generated signed networks of comparable size and order, confirming the observations of
[16, 38]. Processing capacities of the computer that runs the optimisation models are also relevant
to the size of the largest solvable instance because Gurobi allows using multiple processing cores
for exploring the feasible space in parallel [34]. Besides, exploring a large binary tree may require a
considerable amount of memory which might be a determining factor in solve time of some instances
due to memory limits.
Given a maximum solve time of 10 hours on the current hardware configuration (Intel Core i5
7600 @ 3.50 GHz and 8.00 GB of RAM), random instances with up to 2000 edges were observed
to be solvable to global optimality. Regarding real signed graphs which have regularities favouring
Gurobi's solver performance, graphs with up to 30000 edges are solvable (to global optimality)
within 10 hours. If we use more advanced processing capacities (32 Intel Xeon CPU E5-2698 v3 @
2.30 GHz processors and 32 GB of RAM), real signed graphs with up to 100000 edges are solvable
(to global optimality) within 10 hours [8].
We have observed in most of our numerical experiments that the branch and bound algorithm
finds the globally optimal solution in a fraction of the total solve time, but it takes more time and
computations to guarantee the optimality. To give an example, Subfigures 2a, 2b, and 2c show
that a considerable proportion of the solve time, ranging in 30% -- 90%, is used for guaranteeing
optimality after finding the globally optimal solution. One may consider using a non-zero mixed
integer programming gap to find solutions within a guaranteed proximity of an optimal solution
even if the instance has more than 100000 edges.
6 Evaluating performance against the literature
In this section, we use both random and real networks to evaluate not only the solve time, but also
the output of our models against other methods in the literature.
6.1 Solve time in random graphs
In this subsection, we compare the solve time of our algorithm against other algorithms suggested
for computing the frustration index. Besides [5], our review of the literature finds only two methods
claiming exact computation of the frustration index [12, 38]. Brusco and Steinley suggested a branch
and bound algorithm for minimising the overall frustration (under a different name) for a predefined
number of colours [12]. Huffner, Betzler, and Niedermeier have suggested a data-reduction schemes
and an iterative compression algorithm for computing the frustration index [38].
Brusco and Steinley have reported running times for very small graphs with only up to n = 21
vertices. While, their exact algorithm fails to solve graphs as large as n = 30 in a reasonable
time [12], our binary linear models solve such instances in split seconds. Huffner, Betzler, and
Niedermeier have generated random graphs of order n with low densities (ρ ≤ 0.04) to test their
algorithm [38]. The largest of such random graphs solvable by their algorithm in 20 hours has 500
nodes. They also reported that only 3 out of 5 random graphs with n ∈ {100, 200, 300, 400, 500}
can be solved by their method in 20 hours. Our three binary linear models solve all such instances
in less than 100 seconds.
13
6.2 Solve time and algorithm output in real networks
In this section we use signed network data sets from biology and international relations. The
frustration index of biological networks has been a subject of interest to measure the distance to
monotonicity [16, 39]. In international relations, the frustration index is used to measure distance
to balance for a network of countries [20]. In this section, the frustration index is computed in real
biological and international relations networks by solving the three binary linear models coupled
with the two speed-up techniques 4.2 -- 4.3.
We use effective branching factor as a performance measure. If the solver explores b branch and
√
bound nodes to find an optimal solution of a model with v variables, the effective branching factor
is v
b. The most effective branching is obtained when the solver only explores 1 branch and bound
node to reach optimality. The effective branching factor for such a case would take value 1 which
represents the strength of the mathematical formulation.
6.2.1 Biological data sets
We use the four signed biological networks that were previously analysed by [16] and [39]. The
epidermal growth factor receptor (EGFR) pathway [57] is a signed network with 779 edges. The
molecular interaction map of a macrophage (macro.) [56] is another well studied signed network
containing 1425 edges. We also investigate two gene regulatory networks, related to two organisms:
a eukaryote, the yeast Saccharomyces cerevisiae (yeast), [15] and a bacterium, Escherichia coli
(E.coli) [59]. The yeast and E.coli networks have 1080 and 3215 edges respectively. The data sets
for real networks used in this study are publicly available in a Figshare research data repository [4].
For more details on the four biological data sets, one may refer to [39].
We use root node objective, Number of B&B nodes, effective branching factor, and solve time
as performance measures. The performance of three binary linear models can be compared based
on these measures in Table 4 in which values in brackets show the corresponding measure for the
case in which speed-up techniques were not used.
DasGupta et al. have suggested approximation algorithms [16] that are later tested on the four
biological networks in [38]. Their approximation method provides 196 ≤ L(G)EGFR ≤ 219 which
our exact model proves to be incorrect. The bounds obtained by implementing their approximation
are not incorrect for the other three networks, but they have very large gaps between lower and
upper bounds.
Huffner, Betzler, and Niedermeier have previously investigated frustration in the four biological
networks suggesting a data-reduction schemes and (an attempt at) an exact algorithm [38]. Their
suggested data-reduction schemes can take more than 5 hours for yeast, more than 15 hours for
EGFR, and more than 1 day for macrophage if the parameters are not perfectly tuned. Besides the
solve time issue, their algorithm provides L(G)EGFR = 210, L(G)macrophage = 374, both of which
are proven to be incorrect by our results. They report that their algorithm fails to terminate for
E.coli [38].
Iacono et al. have also investigated frustration in the four networks [39]. Their heuristic algo-
rithm provides upper and lower bounds for EGFR, macrophage, yeast, and E.coli with 96.37%,
90.96%, 100%, and 98.38% ratio of lower to upper bound respectively. The comparison of our
outputs against those reported in the literature is provided in Table 5.
Iacono et al. also suggest an upper bound for the frustration index [39, page 227]. However,
some values of the frustration index in complete graphs with all negative edges show that their
suggested upper bound is incorrect (take a complete graph with 9 nodes and 36 negative edges
14
Table 4: Performance measures for the three binary linear models with (and without) the speed-ups
Root node objective
EGFR
329, 779
Graph
n, m
AND 28.5
(13)
XOR 28.5
(13)
28.5
(13)
ABS
Number of B&B nodes
AND 3
(91)
XOR 1
ABS
(25)
1
(47)
Effective branching factor AND 1.0010
(1.0041)
XOR 1
ABS
(1.0029)
1
(1.0027)
Macro.
678, 1425
67
(53)
67
(53)
67
(53)
1
(199)
1
(1)
1
(456)
1
(1.0025)
1
(1)
1
(1.0022)
Yeast
690, 1080
11.5
(0)
11.5
(0)
11.5
(0)
1
(7)
1
(1)
3
(7)
1
(1.0011)
1
(1)
1.0004
(1.0008)
E.coli
1461, 3215
130.5
(4)
130.5
(4)
130.5
(4)
31
(279)
3
(19)
36
(357)
1.0007
(1.0012)
1.0002
(1.0006)
1.0006
(1.0010)
which has a frustration index of 16 while the bound suggested in [39] gives a value of 15). For a
more detailed discussion on bounds for the frustration index, one may refer to [5, 53].
We also compare our solve times to the best results reported for heuristics and approximation
algorithms in the literature. Huffner et al. have provided solve time results for their suggested
algorithm [38] (if parameters are perfectly tuned for each instance) as well as the algorithm suggested
by DasGupta et al. [16]. Iacono et al. have only mentioned that their heuristic requires a fairly
limited amount of time (a few minutes on an ordinary PC [39]) that we conservatively interpret as
60 seconds.
Table 6 sums up the solve time comparison of our suggested models against the literature
in which the values for running our models without the speed-up techniques are provided inside
brackets. As the hardware configuration is not reported in [16, 39], we conservatively evaluate the
order-of-magnitude improvements in solve time with respect to the differences in computing power
in different years.
According to Moore's law [54], the exponential increase in transistor density on integrated
circuits leads to computer power doubling almost every two years. Moore's prediction has been
remarkably accurate from 1965 to 2013, while the actual rate of increase in computer power has
slowed down since 2013 [51].
Moore's law ballpark figures allow us to compare computations executed on different hardware
in different years. We conservatively estimate a factor of 16 times for the improvements in computer
power between 2010 and 2018 to be attributable to hardware improvements. The solve times of
the slowest (fastest) model among AND, XOR, and, ABS in Table 6 shows a factor of improvement
ranging between 30 − 333 (81 − 545) compared to the fastest solve time in 2010 [16, 38, 39]. This
15
Table 5: Our algorithm output against the best results reported in the literature
ABS
(6)
193
332
41
371
DasGupta
et al. [16]
[196, 219]†
[218,383]
[0, 43]
[0, 385]
Iacono
et al. [39]
[186, 193]
[302, 332]
41
[365, 371]
Author
Reference
EGFR
Macro.
Yeast
E.coli
† Incorrect results
‡ The algorithm does not converge
Huffner
et al. [38]
210†
374†
41
‡
Aref
et al. [5]
193
332
41
371
AND
(4)
193
332
41
371
XOR
(5)
193
332
41
371
Table 6: Algorithm solve time in seconds with (and without) the speed-up techniques against the
results reported in the literature
Year
2010
2010
Reference
[16]
[39]
EGFR
420
>60
Macro.
2640
>60
Yeast
4620
>60
†
E.coli
>60
† Not reported
‡ The algorithm does not converge
2010
[38]
6480
60
60
‡
2018
[5]
0.68
1.85
0.33
18.14
2018
AND (4)
0.27 (0.82)
0.34 (1.24)
0.18 (0.45)
0.99 (1.91)
2018
XOR (5)
0.21 (0.67)
0.26 (1.37)
0.11 (0.28)
1.97 (4.73)
2018
ABS (6)
0.23 (0.66)
0.49 (1.30)
0.15 (0.39)
0.74 (1.86)
shows our solve time improvements are not merely resulted from hardware differences.
While data-reduction schemes [38] can take up to 1 day for these data sets and heuristic algo-
rithms [39] only provide bounds with up to 9% gap from optimality, our three binary linear models
equipped with the speed-up techniques (4.2 -- 4.3) solve the four instances to optimality in a few
seconds.
6.2.2
International relations data sets
We also compute the frustration index for two data sets of international relations networks.
In
international relation networks, countries and their relations are represented by nodes and edges
of signed graphs. We use the Correlates of War (CoW) [58] data set which has 51 instances of
networks with up to 1247 edges [20] and the United Nations General Assembly (UNGA) [52] data
set which has 62 instances with up to 15531 edges when converted into signed networks by [28].
Figueiredo and Frota provide detailed explanation on the process of creating signed networks from
the UNGA data [28].
The CoW signed network data set is constructed by Doreian and Mrvar [20] based on signed
international relations between countries in 1946-1999. In their analysis, some numerical results
provided on the CoW data set are referred to as line index [20]. However, the values of L(G) we
have obtained using our optimisation models prove that values reported in [20] for the 51 time
frames of the network are never the smallest number of edges whose removal results in balance.
Doreian and Mrvar have not reported any solve time, but have suggested that determining their
line index is in general a polynomial-time hard problem [20]. The solve times of our models for
each instance of the CoW data set is ≤ 0.1 seconds.
We also tested our three models on the UNGA instances. The UNGA data set is based on
16
voting on the UN resolutions. In this data set, instances refer to annual UNGA sessions between
1946 and 2008. Figure 3 shows the solve times of our models for instances of this data set.
Figure 3: Solve times of AND, XOR, and ABS models tested on the UNGA instances (colour
version online)
As it can be seen in Figure 3, most UNGA instances can be solved in less that 5 seconds using
any of the three models. The XOR and the ABS models solve all UNGA instances in less than
a minute, while solving the AND model for instance 21 and instance 25 takes about 75 and 118
seconds respectively. These two harder instances have the highest values of the frustration index
(L(G) = 616 and L(G) = 611 respectively) in the UNGA data set.
7 Other formulations and extensions
In this section we provide an alternative formulation and two extensions to the 2-colour minimum
frustration count optimisation problem.
7.1 Max (2,2)-CSP formulation and theoretical results
In this subsection, we formulate the problem of computing the frustration index as a constraint
satisfaction problem in (10) and provide theoretical results on the fastest known algorithms. Compu-
tation of the frustration index can be formulated as a Maximum 2-Constraint Satisfaction Problem
with 2 states per variable (Max (2,2)-CSP) with n variables and m constraints.
The signed graph, G(V, E, σ), is the input constraint graph. We consider a score for each
edge (i, j) depending on its sign σij and the assignment of binary values to its endpoints. In the
formulation provided in (10), the dyadic score function S(i,j) : {0, 1}2 → {0, 1} determines the
satisfaction of edge (i, j) accordingly (score 1 for satisfied and score 0 for frustrated). The output
of solving this problem is the colouring function φ : V → {0, 1} which maximises the total number
of satisfied edges as score function S(φ).
Denoting the maximum score function value by S∗(φ), the frustration index can be calculated
as the number of edges that are not satisfied m − S∗(φ).
17
75.76118.4552.0157.2936.3051015202530123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263Solve time (s)United Nations General Assembly session numberANDXORABS(cid:88)
φ
max
S(φ) =
(i,j)∈E
S(φ(i),φ(j))
S(i,j) = {((0, 0), (1 + σij)/2),
((0, 1), (1 − σij)/2),
((1, 0), (1 − σij)/2),
((1, 1), (1 + σij)/2)}
(10)
According to worst-case analyses, the fastest known algorithm [43] with respect to n solves Max
(2,2)-CSP in O(nm2nω/3), where ω is the matrix multiplication exponent. Since ω < 2.373 [45],
the running time of the algorithm from [43] is O(1.7303n).
It improves on the previous fastest
algorithm [62] only in the polynomial factor of the running time. With respect to n, the algorithm
in [43] is the fastest known algorithm for MAXCUT, and therefore for computing the frustration
index as well. Both algorithms [43, 62] use exponential space and it is open whether MAXCUT can
be solved in O(cn) for some c < 2 when only polynomial space is allowed.
With respect to the number m of edges, the Max (2,2)-CSP formulation in (10) enables the use
of algorithms from [31] and [60]. The first algorithm uses 2(9m/50+O(m)) time and polynomial space
[31], while the second algorithm uses 2(13m/75+O(m)) time and exponential space. With respect
to the number of edges, these two algorithms [31, 60] are also the fastest algorithms known for
MAXCUT, and therefore for computing the frustration index.
7.2 Weighted minimum frustration count optimisation problem
We extend the 2-colour minimum frustration count optimisation problem for a graph with weights
wij ∈ [−1, 1] instead of the signs aij ∈ {−1, 1} on the edges. We call such a graph a weighted signed
graph.
Taking insights from (7), the frustration of edge (i, j) ∈ E with weight wij can be represented
by fij = (1 − wij)/2 + wij(xi + xj − 2xij) using the binary variables xi, xj, xij of the AND model
(4). Note that, the frustration of an edge in a weighted signed graph is a continuous variable in the
unit interval fij ∈ [0, 1].
Note that, aijxij ≤ (3aij − 1)(xi + xj)/4 + (1 − aij)/2 embodies all constraints for edge (i, j)
in the AND model regardless of the edge sign. Accordingly, the constraints of the AND model
can be modified to incorporate weights wij. The weighted minimum frustration count optimisation
problem can be formulated as a binary linear programming model in (11).
(1 − wij)/2 + wij(xi + xj − 2xij)
(cid:88)
Z =
min
xi:i∈V,xij :(i,j)∈E
(i,j)∈E
s.t. wijxij ≤ (3wij − 1)(xi + xj)/4 + (1 − wij)/2 ∀(i, j) ∈ E
(11)
xi ∈ {0, 1} ∀i ∈ V
xij ∈ {0, 1} ∀(i, j) ∈ E
We have generated random weighted signed graphs to test the model in (11). Our preliminary
results show that the weighted version of the problem (11) is solved faster than the original models
for signed graphs.
18
7.3 Multi-colour minimum frustration count optimisation problem
We formulate another extension to the 2-colour minimum frustration count optimisation problem
by allowing more than 2 colours to be used. As previously mentioned in Subsection 1.6, a signed
network is k-balanced if and only if its vertex set can be partitioned into k subsets (for some fixed
k ≥ 1) such that each negative edge joins vertices belonging to different subsets [17]. Figure 4
demonstrates an example graph and the frustrated edges for various numbers of colours. Subfig-
ure 4d shows that the graph is weakly balanced.
(a) An
example
graph with n = 4,
m− = 4, m+ = 1
(b) One colour re-
sulting in four frus-
trated edges
(c) Two colours re-
sulting in one frus-
trated edge
(d) Three colours resulting in no frus-
trated edge
Figure 4: The frustrated edges represented by dashed lines for the multi-colour minimum frustration
count optimisation problem.
The harder problem of finding the minimum number of frustrated edges where k is not specified
in advance (an arbitrary number of node colours) is referred to as the Correlation Clustering
problem. As mentioned in Subsection 1.6, another integer linear programming formulation for the
correlation clustering problem is suggested by [19] which is widely used in the literature [29, 22, 47].
In the multi-colour minimum frustration count optimisation problem, each node may be given
one of a set of colours C = {1, 2, 3, ..., k := C}. Assume ci ∈ C is the colour of node i. We
consider that a positive edge (i, j) ∈ E+ is frustrated (indicated by fij = 1) if its endpoints i
and j are coloured differently, i.e., ci (cid:54)= cj; otherwise it is not frustrated (indicated by fij = 0). A
negative edge (i, j) ∈ E− is frustrated (indicated by fij = 1) if ci = cj; otherwise it is not frustrated
(indicated by fij = 0).
Using binary variables xic = 1 if node i ∈ V has colour c ∈ C (and xic = 0 otherwise), we
formulate this as the following binary linear model in Eq. (12).
(cid:88)
(cid:88)
(i,j)∈E
min
s.t.
c∈C
fij
xic = 1 ∀i ∈ V
fij ≥ xic − xjc ∀(i, j) ∈ E+, ∀c ∈ C
fij ≥ xic + xjc − 1 ∀(i, j) ∈ E−, ∀c ∈ C
xic ∈ {0, 1} ∀i ∈ V, ∀c ∈ C
fij ∈ {0, 1} ∀(i, j) ∈ E
(12)
If we have just two colours, then we use xi ∈ {0, 1} to denote the colour of node i. This gives
the XOR model expressed in Eq. (5).
19
1203120312031203Negative frustrated edgePositive frustrated edgeNegative edgePositive edgeSolving the problem in (12) provides us with the minimum number of frustrated edges in the
k-colour setting. This number determines how many edges should be removed to make the network
k-balanced. For a more general formulation of partitioning graph vertices into k sets, one may refer
to [3] where numerical results for graphs with up to 20 nodes are provided.
8 Conclusion
In this study, we provided an efficient method for computing a standard measure in signed graphs
which has many applications in different disciplines. The present study suggested efficient mathe-
matical programming models and speed-up techniques for computing the frustration index in graphs
with up to 15000 edges on inexpensive hardware.
We developed three new binary optimisation models which outperform previous methods by
large factors. We also suggested prioritised branching and valid inequalities which make the binary
linear optimisation models several times (see Table 6) faster than recently developed models [5] and
capable of processing relatively large instances.
Extensive numerical results on random and real networks were provided to evaluate computa-
tional performance and underline the superiority of our models to other methods in the literature
in both solve time and algorithm output. We also formulated the problem as a constraint satis-
faction model and provided theoretical results on the fastest known algorithms for computing the
frustration index with respect to the number of nodes and the number of edges. We also provided
two extensions to the model for future investigation.
Acknowledgements
The authors thank the anonymous referees, Serge Gaspers, Gregory Gutin, and Jeffrey Linderoth for
valuable comments, Yuri Frota for providing data on United Nations General Assembly instances,
and Serge Gaspers for his contribution to Subsection 7.1.
ORCID
Samin Aref
Andrew J. Mason
Mark C. Wilson
http://orcid.org/0000-0002-5870-9253
http://orcid.org/0000-0001-9848-6595
http://orcid.org/0000-0002-3343-7458
References
[1] Abelson, R. P., and Rosenberg, M. J. Symbolic psycho-logic: A model of attitudinal
cognition. Behavioral Science 3, 1 (1958), 1 -- 13.
√
[2] Agarwal, A., Charikar, M., Makarychev, K., and Makarychev, Y. O(
log n) ap-
proximation algorithms for min UnCut, min 2CNF deletion, and directed cut problems. In
Proceedings of the Thirty-seventh Annual ACM Symposium on Theory of Computing (New
York, NY, USA, 2005), R. Fagin, Ed., STOC '05, ACM, pp. 573 -- 581.
20
[3] Ales, Z., Knippel, A., and Pauchet, A. Polyhedral combinatorics of the k-partitioning
problem with representative variables. Discrete Applied Mathematics 211 (2016), 1 -- 14.
[4] Aref, S. Signed networks from sociology and political science, systems biology, international
relations, finance, and computational chemistry. Figshare research data repository (2017). doi:
10.6084/m9.figshare.5700832.v2.
[5] Aref, S., Mason, A. J., and Wilson, M. C. Computing the line index of balance using in-
teger programming optimisation. In Optimization Problems in Graph Theory, B. Goldengorin,
Ed. Springer, 2018, pp. 65 -- 84.
[6] Aref, S., and Neal, Z. Legislative effectiveness hangs in the balance: Studying balance and
polarization through partitioning signed networks. arXiv preprint arXiv:1906.01696 (2019).
[7] Aref, S., and Wilson, M. C. Measuring partial balance in signed networks. Journal of
Complex Networks 6, 4 (2018), 566 -- 595.
[8] Aref, S., and Wilson, M. C. Balance and frustration in signed networks. Journal of
Complex Networks 7, 2 (2019), 163 -- 189.
[9] Avidor, A., and Langberg, M. The multi-multiway cut problem. Theoretical Computer
Science 377, 1 (2007), 35 -- 42.
[10] Bansal, N., Blum, A., and Chawla, S. Correlation clustering. Machine learning 56, 1-3
(2004), 89 -- 113.
[11] Bilitzky, A., and Sadeh, A. Efficient solutions for special zero-one programming problems.
Journal of Combinatorial Optimization 10, 3 (2005), 227 -- 238.
[12] Brusco, M., and Steinley, D. K-balance partitioning: An exact method with applications
to generalized structural balance and other psychological contexts. Psychological Methods 15,
2 (2010), 145 -- 157.
[13] Cartwright, D., and Harary, F. Structural balance: a generalization of Heider's theory.
Psychological Review 63, 5 (1956), 277 -- 293.
[14] Coleman, T., Saunderson, J., and Wirth, A. A local-search 2-approximation for
In European Symposium on Algorithms (Berlin, Germany, 2008),
2-correlation-clustering.
D. Halperin and K. Mehlhorn, Eds., Springer, pp. 308 -- 319.
[15] Costanzo, M. C., Crawford, M. E., Hirschman, J. E., Kranz, J. E., Olsen,
P., Robertson, L. S., Skrzypek, M. S., Braun, B. R., Hopkins, K. L., Kondu,
P., Lengieza, C., Lew-Smith, J. E., Tillberg, M., and Garrels, J. I. YPDTM,
PombePDTM and WormPDTM: model organism volumes of the BioKnowledgeTM Library, an
integrated resource for protein information. Nucleic Acids Research 29, 1 (2001), 75 -- 79.
[16] DasGupta, B., Enciso, G. A., Sontag, E., and Zhang, Y. Algorithmic and complexity
results for decompositions of biological networks into monotone subsystems. Biosystems 90, 1
(2007), 161 -- 178.
[17] Davis, J. A. Clustering and structural balance in graphs. Human Relations 20, 2 (1967),
181 -- 187.
21
[18] De Simone, C., Diehl, M., Junger, M., Mutzel, P., Reinelt, G., and Rinaldi, G.
Exact ground states of Ising spin glasses: New experimental results with a branch-and-cut
algorithm. Journal of Statistical Physics 80, 1 (1995), 487 -- 496.
[19] Demaine, E. D., Emanuel, D., Fiat, A., and Immorlica, N. Correlation clustering in
general weighted graphs. Theoretical Computer Science 361, 2 (2006), 172 -- 187.
[20] Doreian, P., and Mrvar, A. Structural Balance and Signed International Relations. Journal
of Social Structure 16 (2015), 1 -- 49.
[21] Dosli´c, T., and Vukicevic, D. Computing the bipartite edge frustration of fullerene graphs.
Discrete Applied Mathematics 155, 10 (2007), 1294 -- 1301.
[22] Drummond, L., Figueiredo, R., Frota, Y., and Levorato, M. Efficient solution of
the correlation clustering problem: An application to structural balance. In On the Move to
Meaningful Internet Systems: OTM 2013 Workshops (Berlin, Heidelberg, 2013), Y. T. Demey
and H. Panetto, Eds., Springer Berlin Heidelberg, pp. 674 -- 683.
[23] Esmailian, P., Abtahi, S. E., and Jalili, M. Mesoscopic analysis of online social networks:
The role of negative ties. Physical Review E 90, 4 (2014), 042817.
[24] Esmailian, P., and Jalili, M. Community detection in signed networks: The role of negative
ties in different scales. Scientific reports 5 (2015), 14339.
[25] Estrada, E., and Benzi, M. Walk-based measure of balance in signed networks: Detecting
lack of balance in social networks. Physical Review E 90, 4 (2014), 1 -- 10.
[26] Facchetti, G., Iacono, G., and Altafini, C. Computing global structural balance in
large-scale signed social networks. Proceedings of the National Academy of Sciences 108, 52
(2011), 20953 -- 20958.
[27] Facchetti, G., Iacono, G., and Altafini, C. Exploring the low-energy landscape of
large-scale signed social networks. Physical Review E 86, 3 (2012), 036116.
[28] Figueiredo, R., and Frota, Y. The maximum balanced subgraph of a signed graph:
Applications and solution approaches. European Journal of Operational Research 236, 2 (2014),
473 -- 487.
[29] Figueiredo, R., and Moura, G. Mixed integer programming formulations for clustering
problems related to structural balance. Social Networks 35, 4 (2013), 639 -- 651.
[30] Fytas, N. G., Theodorakis, P. E., and Hartmann, A. K. Revisiting the scaling of
the specific heat of the three-dimensional random-field Ising model. The European Physical
Journal B 89, 9 (2016), 200.
[31] Gaspers, S., and Sorkin, G. B. Separate, measure and conquer: Faster polynomial-
space algorithms for max 2-csp and counting dominating sets. In Automata, Languages, and
Programming (Berlin, Heidelberg, 2015), M. M. Halld´orsson, K. Iwama, N. Kobayashi, and
B. Speckmann, Eds., Springer Berlin Heidelberg, pp. 567 -- 579.
22
[32] Giotis, I., and Guruswami, V. Correlation clustering with a fixed number of clusters.
In Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithm
(Philadelphia, PA, USA, 2006), C. Stein, Ed., SODA '06, Society for Industrial and Applied
Mathematics, pp. 1167 -- 1176.
[33] Grotschel, M., and Pulleyblank, W. R. Weakly bipartite graphs and the MAX-CUT
problem. Operations Research Letters 1, 1 (1981), 23 -- 27.
[34] Gurobi Optimization Inc. Gurobi optimizer reference manual, 2017. url: http://www.
gurobi.com/documentation/7.5/refman/index.html date accessed 2017-05-01.
[35] Harary, F. On the measurement of structural balance. Behavioral Science 4, 4 (1959),
316 -- 323.
[36] Harary, F., Lim, M.-H., and Wunsch, D. C. Signed graphs for portfolio analysis in risk
management. IMA Journal of Management Mathematics 13, 3 (2002), 201 -- 210.
[37] Heider, F. Social perception and phenomenal causality. Psychological Review 51, 6 (1944),
358 -- 378.
[38] Huffner, F., Betzler, N., and Niedermeier, R. Separator-based data reduction for
signed graph balancing. Journal of Combinatorial Optimization 20, 4 (2010), 335 -- 360.
[39] Iacono, G., Ramezani, F., Soranzo, N., and Altafini, C. Determining the distance to
monotonicity of a biological network: a graph-theoretical approach. IET Systems Biology 4, 3
(2010), 223 -- 235.
[40] Kasteleyn, P. W. Dimer Statistics and Phase Transitions. Journal of Mathematical Physics
4, 2 (1963), 287 -- 293.
[41] Khot, S. On the power of unique 2-prover 1-round games. In Proceedings of the thirty-fourth
annual ACM symposium on Theory of computing (Montreal, Quebec, Canada, 2002), STOC
'02, ACM, pp. 767 -- 775.
[42] Klotz, E., and Newman, A. M. Practical guidelines for solving difficult mixed integer
linear programs. Surveys in Operations Research and Management Science 18, 1-2 (2013), 18
-- 32.
[43] Koivisto, M. Optimal 2-constraint satisfaction via sum-product algorithms. Information
processing letters 98, 1 (2006), 24 -- 28.
[44] Kunegis, J. Applications of Structural Balance in Signed Social Networks. arXiv:1402.6865
[physics] (2014). arXiv: 1402.6865.
[45] Le Gall, F. Powers of tensors and fast matrix multiplication. In Proceedings of the 39th
International Symposium on Symbolic and Algebraic Computation (New York, NY, USA, 2014),
ISSAC '14, ACM, pp. 296 -- 303.
[46] Leskovec, J., Huttenlocher, D., and Kleinberg, J. Signed networks in social media. In
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York,
NY, USA, 2010), E. D. Mynatt, D. Schoner, G. Fitzpatrick, S. E. Hudson, W. K. Edwards,
and T. Rodden, Eds., CHI '10, ACM, pp. 1361 -- 1370.
23
[47] Levorato, M., Drummond, L., Frota, Y., and Figueiredo, R. An ILS algorithm to
evaluate structural balance in signed social networks. In Proceedings of the 30th Annual ACM
Symposium on Applied Computing (New York, NY, USA, 2015), A. Bechini and J. Hing, Eds.,
SAC '15, ACM, pp. 1117 -- 1122.
[48] Levorato, M., Figueiredo, R., Frota, Y., and Drummond, L. Evaluating balancing
on social networks through the efficient solution of correlation clustering problems. EURO
Journal on Computational Optimization 5, 4 (2017), 467 -- 498.
[49] Ma, L., Gong, M., Du, H., Shen, B., and Jiao, L. A memetic algorithm for computing
and transforming structural balance in signed networks. Knowledge-Based Systems 85 (2015),
196 -- 209.
[50] Ma, L., Gong, M., Yan, J., Yuan, F., and Du, H. A decomposition-based multi-objective
optimization for simultaneous balance computation and transformation in signed networks.
Information Sciences 378 (2017), 144 -- 160.
[51] Mack, C. The multiple lives of Moore's law. IEEE Spectrum 52, 4 (2015), 31 -- 37.
[52] Macon, K. T., Mucha, P. J., and Porter, M. A. Community structure in the United
Nations general assembly. Physica A: Statistical Mechanics and its Applications 391, 1-2 (2012),
343 -- 361.
[53] Martin, F. Frustration and isoperimetric inequalities for signed graphs. Discrete Applied
Mathematics 217 (2017), 276 -- 285.
[54] Moore, G. E. Cramming more components onto integrated circuits. Electronics 38, 8 (1965),
114 -- 117.
[55] Norman, R. Z., and Roberts, F. S. A derivation of a measure of relative balance for
social structures and a characterization of extensive ratio systems. Journal of Mathematical
Psychology 9, 1 (1972), 66 -- 91.
[56] Oda, K., Kimura, T., Matsuoka, Y., Funahashi, A., Muramatsu, M., and Kitano,
H. Molecular interaction map of a macrophage. AfCS Research Reports 2, 14 (2004), 1 -- 12.
[57] Oda, K., Matsuoka, Y., Funahashi, A., and Kitano, H. A comprehensive pathway map
of epidermal growth factor receptor signaling. Molecular Systems Biology 1, 1 (2005).
[58] Pevehouse, J., Nordstrom, T., and Warnke, K. The Correlates of War 2 international
governmental organizations data version 2.0. Conflict Management and Peace Science 21, 2
(2004), 101 -- 119.
[59] Salgado, H., Gama-Castro, S., Peralta-Gil, M., D´ıaz-Peredo, E., S´anchez-
Solano, F., Santos-Zavaleta, A., Martinez-Flores, I., Jim´enez-Jacinto, V.,
Bonavides-Mart´ınez, C., Segura-Salazar, J., Martnez-Antonio, A., and Collado-
Vides, J. Regulondb (version 5.0): Escherichia coli k-12 transcriptional regulatory network,
operon organization, and growth conditions. Nucleic Acids Research 34, suppl 1 (2006), D394 --
D397.
24
[60] Scott, A. D., and Sorkin, G. B. Linear-programming design and analysis of fast algorithms
for max 2-csp. Discrete Optimization 4, 3 (2007), 260 -- 287.
[61] Terzi, E., and Winkler, M. A spectral algorithm for computing social balance. In Pro-
ceedings of International Workshop on Algorithms and Models for the Web-Graph (Atlanta,
Georgia, USA, 2011), A. Frieze, P. Horn, and P. Pra(cid:32)lat, Eds., WAW 2011, Springer, Berlin
Heidelberg, pp. 1 -- 13.
[62] Williams, R. A new algorithm for optimal 2-constraint satisfaction and its implications.
Theoretical Computer Science 348, 2 (2005), 357 -- 365.
[63] Yannakakis, M. Edge-deletion problems. SIAM Journal on Computing 10, 2 (1981), 297 -- 309.
[64] Zaslavsky, T. Balanced decompositions of a signed graph. Journal of Combinatorial Theory,
Series B 43, 1 (1987), 1 -- 13.
25
|
1404.7048 | 2 | 1404 | 2015-02-06T00:15:42 | Multiscale Event Detection in Social Media | [
"cs.SI",
"cs.LG",
"physics.soc-ph",
"stat.ML"
] | Event detection has been one of the most important research topics in social media analysis. Most of the traditional approaches detect events based on fixed temporal and spatial resolutions, while in reality events of different scales usually occur simultaneously, namely, they span different intervals in time and space. In this paper, we propose a novel approach towards multiscale event detection using social media data, which takes into account different temporal and spatial scales of events in the data. Specifically, we explore the properties of the wavelet transform, which is a well-developed multiscale transform in signal processing, to enable automatic handling of the interaction between temporal and spatial scales. We then propose a novel algorithm to compute a data similarity graph at appropriate scales and detect events of different scales simultaneously by a single graph-based clustering process. Furthermore, we present spatiotemporal statistical analysis of the noisy information present in the data stream, which allows us to define a novel term-filtering procedure for the proposed event detection algorithm and helps us study its behavior using simulated noisy data. Experimental results on both synthetically generated data and real world data collected from Twitter demonstrate the meaningfulness and effectiveness of the proposed approach. Our framework further extends to numerous application domains that involve multiscale and multiresolution data analysis. | cs.SI | cs | Noname manuscript No.
(will be inserted by the editor)
Multiscale Event Detection in Social Media
Xiaowen Dong · Dimitrios Mavroeidis ·
Francesco Calabrese · Pascal Frossard
5
1
0
2
b
e
F
6
]
I
S
.
s
c
[
2
v
8
4
0
7
.
4
0
4
1
:
v
i
X
r
a
Received: date / Accepted: date
Abstract Event detection has been one of the most important research top-
ics in social media analysis. Most of the traditional approaches detect events
based on fixed temporal and spatial resolutions, while in reality events of dif-
ferent scales usually occur simultaneously, namely, they span different intervals
in time and space. In this paper, we propose a novel approach towards multi-
scale event detection using social media data, which takes into account differ-
ent temporal and spatial scales of events in the data. Specifically, we explore
the properties of the wavelet transform, which is a well-developed multiscale
transform in signal processing, to enable automatic handling of the interac-
tion between temporal and spatial scales. We then propose a novel algorithm
to compute a data similarity graph at appropriate scales and detect events of
different scales simultaneously by a single graph-based clustering process. Fur-
thermore, we present spatiotemporal statistical analysis of the noisy informa-
tion present in the data stream, which allows us to define a novel term-filtering
procedure for the proposed event detection algorithm and helps us study its
behavior using simulated noisy data. Experimental results on both syntheti-
cally generated data and real world data collected from Twitter demonstrate
the meaningfulness and effectiveness of the proposed approach. Our framework
X. Dong
MIT Media Lab, Cambridge, MA, United States
E-mail: [email protected]
D. Mavroeidis
Philips Research, Eindhoven, Netherlands
E-mail: [email protected]
F. Calabrese
IBM Research, Dublin, Ireland
E-mail: [email protected]
P. Frossard
´Ecole Polytechnique F´ed´erale de Lausanne (EPFL), Lausanne, Switzerland
E-mail: [email protected]
2
Xiaowen Dong et al.
further extends to numerous application domains that involve multiscale and
multiresolution data analysis.
Keywords Multiscale event detection · Spatiotemporal analysis · Wavelet
decomposition · Modularity-based clustering
1 Introduction
The last decade has seen rapid development of online social networks and
social media platforms, which leads to an explosion of user-generated data
posted on the Internet. The huge amount of such data enables the study of
many research problems, and event detection is certainly one of the most pop-
ular and important topics in this novel research area. Social media platforms
present several advantages for event detection. First, due to the real-time na-
ture of online social services, the public awareness of real world happenings
could be raised in a much quicker fashion than with the traditional media.
Second, due to the large amount of users posting content online, more com-
plete pictures of the real world events with descriptions from different angles
are offered with fast and large-scale coverage. These advantages have attracted
a significant amount of interest from the data mining communities in event
detection problems. For instance, the MediaEval Workshop has open research
task dedicated to event detection (Reuter et al, 2013), and numerous event
detection approaches have been proposed recently in the literature (Sayyadi
et al, 2009; Becker et al, 2009; Aggarwal and Subbian, 2012).
Events in social media platforms can be loosely defined as real world hap-
penings that occur within similar time periods and geographical locations, and
that have been mentioned by the online users in the forms of images, videos
or texts. Different types of events are usually of different temporal and spa-
tial scales or resolutions 1, meaning that they span different intervals in time
and space. For example, discussions about the London 2012 Summer Olympic
Games would span a temporal period of nearly one month and a spatial area
of all over the world, while those regarding the 2012 concert of The Stone
Roses in the Phoenix Park in Dublin may concentrate only on the date and
at the location of the concert. Similarly, Fig. 1 illustrates discussions on Twit-
ter about two events of different spatiotemporal scales in New York City. In
the designs of event detection algorithms, it is thus important to take into
account the different temporal and spatial scales of various kinds of events.
This is challenging in the sense that: (i) Event detection approaches usually
rely on classification or clustering algorithms with fixed temporal and spatial
resolutions; This results in the detected events being of similar scales; (ii) It
is not yet clear how multiple resolutions in time and in space interact with
each other so that they can be analyzed simultaneously, even if it is relatively
easier to take into account multiple resolutions in only one of these two di-
mensions; (iii) Data streams from social media platforms usually contain much
1 Throughout the paper, we use “scales” and “resolutions” interchangeably.
Multiscale Event Detection in Social Media
3
(a)
(b)
Fig. 1 Two events in New York City that has been discussed on Twitter: (a) Occupy
Wall Street protests. (b) Katy Perry’s concert at the Madison Square Garden. Each dot
on the map represents a tweet. While discussions about the first event span the middle
and lower Manhattan area for more than three hours, the discussions about the second are
concentrated near the concert venue for less than an hour.
noisy information irrelevant to the events of interest. It is thus important to
understand how to attenuate the influence of the noise on detecting events of
different scales. Efficient and robust multiscale event detection for solving the
above challenges is exactly the objective of the present paper.
In this paper, we first introduce a baseline approach that detects events
that are of similar scales and localized in both time and space, which serves
as a first step towards the understanding of multiscale event detection. We
then propose a novel approach towards the detection of events that are of
different scales and localized either in time or in space but not necessarily in
both simultaneously. To this end, we study the relationship between scales
in the two dimensions and explore the properties of the wavelet transform to
automatically and explicitly handle the interaction between different scales in
time and space simultaneously. We propose an algorithm to compute a data
similarity graph at appropriate scales, based on which we perform a graph-
based clustering process to detect events of different spatiotemporal scales.
Furthermore, we present spatiotemporal analysis of the distribution of noisy
information in data streams, especially using notions from spatial statistics,
which allows us to define a novel term-filtering procedure for the proposed
multiscale event detection algorithm, and helps us study the behavior of the
two approaches in this paper using simulated noisy data.
We compare the proposed multiscale event detection approach with the
baseline approach on both synthetically generated data and real world data
collected from Twitter. We show experimentally that the proposed approach
can effectively detect events of different temporal and spatial scales. On the one
hand, we believe that the modeling of the relationship and interaction between
temporal and spatial scales and the detection of multiscale events provide new
insights into the task of event detection with social media data. On the other
hand, the proposed framework can be further generalized to other application
domains that involve multiscale or multiresolution data analysis.
4
Xiaowen Dong et al.
2 Spatiotemporal detection of events
In this paper, we define an “event” in social media as follows.
Definition. Events in social media are real world happenings that are reflected
by data that are concentrated either in both time and space, or in at least one
of the two dimensions.
Events defined as above are usually of different temporal and spatial scales,
namely, they span different intervals in time and space. In addition, there exist
data that do not contain any information about ongoing events. In the case
of Twitter, such examples can be tweets that are like: “At work”, or “It feels
great to be home...”. When non-informative tweets constitute a large part of
the input data, the event-relevant tweets could however be buried in noise. It
becomes very difficult in this case to identify the information of interest. In
this paper, we focus on the Twitter data streams and consider the following
objective.
Objective. Consider a Twitter data stream that contains temporal, spatial
and text information. Our goal is to design event detection approaches that
(i) are able to identify events that appear at multiple spatiotemporal scales,
namely, events that affect or take place in different temporal and spatial inter-
vals, and (ii) are robust against the ambiguous and noisy information present
in the data.
In this paper, we cast event detection as a graph-based clustering prob-
lem, where the vertices of the graph represent the tweets, and the edges reflect
their similarities. The goal is to group similar tweets into the same cluster such
that they correspond to a real world event. The clustering algorithm utilizes a
similarity measure between tweets that takes into account the temporal, spa-
tial, and textual features of a tweet. Intuitively, two tweets that are generated
by users that are participating in the same event should share a number of
common terms and be closely located in time and/or space. In this paper, we
compare two different ways of measuring similarity between tweets, the first a
baseline approach based on spatiotemporal constraints and the second a novel
wavelet-based scheme. Then, in order to effectively handle the noisy infor-
mation, we study the spatiotemporal distribution of the noise in the Twitter
data, especially using a homogeneous Poisson process as a statistical model in
our analysis. This is helpful to analyze the behavior of the baseline and the
proposed event detection algorithms.
3 Local event detection via spatiotemporal constraints
Events defined as in the previous section can have different localization be-
havior in time and space. When the events are localized in both dimensions,
event detection can be effectively implemented by imposing spatiotemporal
constraints on the data. In this section, we first describe a baseline approach
Multiscale Event Detection in Social Media
5
for detecting events that are localized both in time and space, which serves as
a first step towards the understanding of multiscale event detection presented
later. We formulate a clustering problem, where we wish to group together the
tweets that correspond to the same real world event. The similarity measure
between different tweets is thus important. In our baseline event detection
approach, we measure the similarity between every pair of tweets ti and tj as:
(cid:26) stf-idf(ti, tj)
S1(ti, tj) =
0
t(ti, tj) ≤ Tt and d(ti, tj) ≤ Td,
if
otherwise.
(1)
where t(ti, tj) and d(ti, tj) are the temporal difference in minutes and the
spatial distance in meters, respectively, between ti and tj. The thresholds Tt
and Td enforce the locality of the events and impose strict spatiotemporal
constraints. Under such constraints, two tweets ti and tj that have a reason-
ably high text similarity tend to refer to the same event in real world. The
function stf-idf(ti, tj) represents the text similarity of ti and tj in terms of the
cosine angle between the vector representations of the two tweets using the
term frequency-inverse document frequency (tf-idf ) weighting scheme (Man-
ning et al, 2008).
Given S1(ti, tj) as the pairwise similarity between tweets, we can create an
undirected and weighted graph with adjacency matrix W1:
(cid:26) S1(ti, tj)
W1(i, j) =
0
i (cid:54)= j,
i = j,
if
if
(2)
where the vertices represent tweets and the edges (along with the associated
weights) are defined by S1(ti, tj). By partitioning the vertices of the graph
into disjoint clusters, each cluster is then expected to contain tweets that are
likely to correspond to the same event. Furthermore, due to the constraints
introduced in Eq. (1), these events are localized in both time and space. In this
paper, we perform graph-based clustering using the Louvain method (Blon-
del et al, 2008). This is a greedy optimization method that first find small
communities in a local way by maximizing the modularity function (Newman,
2006), before repeating the same procedure by considering the communities
found in the previous step as vertices in a new graph, until a maximum of
modularity is attained2. The Louvain method is suitable for our purpose of
event detection because of the following advantages: (i) Unlike most of the
clustering methods, it does not require prior knowledge about the number of
clusters; This is important because we usually do not know the number of
events a priori. (ii) Unlike the popular approach based on normalized graph
cut (such as spectral clustering (von Luxburg, 2007)), it does not necessarily
favor a balanced clustering; This enables the detection of small-scale clusters
together with some relatively larger ones. (iii) It is also computationally very
efficient when applied to large scale networks. Specifically, the complexity of
2 Since we are interested in local clusters, we apply the non-recursive version of the Lou-
vain method which stops after the first iteration.
6
Xiaowen Dong et al.
(a)
(b)
Fig. 2 (a) Events of similar scales and are localized in both time and space. (b) Events of
different scales and are not necessarily localized in both time and space.
the greedy implementation in Blondel et al (2008) is empirically observed to
be close to O(n log n) where n is the number of the vertices in the graph.
The graph-based clustering approach described above outputs a set of clus-
ters that correspond to events localized in both time and space. This can be
illustrated by Fig. 2(a), where each cluster corresponds to a particular time-
space “cube”. After clustering, we apply simple post-processing steps to iden-
tify those clusters that are likely to correspond to meaningful events in real
world. For example, we consider that a meaningful event should be observed
by a sufficient number of users with sufficient information reflected on Twitter.
Therefore, we consider a cluster as a local event if and only if the number of
tweets and distinct Twitter users within the cluster are above certain thresh-
olds (see Sect. 7 for the implementation details of these post-processing steps).
The algorithm for local event detection is summarized in Algorithm 1.
Obviously, the choices for the values of thresholds Tt and Td in Eq. (1)
are critical in LED. Without prior information we may choose them such
that they correspond to the expected temporal and spatial spans of events
to be discovered. By setting Tt and Td appropriately, the algorithm would
then be efficient at detecting events that are of similar scales and that are
sufficiently concentrated in both time and space. For events of different scales,
however, setting the thresholds too low might break down some event clusters
while setting them too high would generally lead to a higher amount of noisy
information in other clusters3 (as we will see in the experimental sections). In
this case, one needs to implement more complex detection schemes to identify
events that appear at multiple spatiotemporal scales. Hence, we introduce in
the next section our novel wavelet-based method for multiscale event detection.
3 One may think of applying LED with small values for Tt and Td before grouping similar
clusters together using a second clustering step. In fact, the second and further iterations of
the Louvain method already offers such a grouping. Alternatively, a hierarchical clustering
algorithm can be applied to the clusters obtained by LED. However, such further grouping
process does not usually lead to a clear interpretation in terms of the spatiotemporal scales
of the resulting event clusters, and it is often difficult to decide when to stop the recursive
process and output the eventual clusters.
Multiscale Event Detection in Social Media
7
Algorithm 1 Local Event Detection via Locality Constraints (LED)
1: Input:
T : a set of tweets with temporal, spatial, and text information
Tt: temporal threshold
Td: spatial threshold
2: Compute the pairwise similarities S1(ti, tj ) between tweets in T using Eq. (1), and the
3: Apply the non-recursive Louvain method to W1, and retain the meaningful clusters
adjacency matrix W1 using Eq. (2).
{ci}m
{ci}m
i=1 after post-processing steps.
4: Output:
i=1: clusters that correspond to events that are localized in both time and space.
4 Multiscale event detection using wavelets
In this section, we propose a novel algorithm for multiscale event detection.
Specifically, we first introduce a new model of the relationship and interaction
between the temporal and spatial scales. We then propose a wavelet-based
scheme for computing the pairwise multiscale similarities between tweets.
4.1 Relationship model between temporal and spatial scales
The fundamental question in designing approaches towards multiscale event
detection resides in properly handling events that are of different scales and
do not have simultaneous temporal and spatial localization. An illustration is
shown in Fig. 2(b), where three events are represented by rectangular cuboids
that span different time and space intervals. Two of them are only concentrated
in one dimension but spread in the other one. In such cases, we need to compute
a similarity score S2(ti, tj) between pairs of tweets ti and tj that carefully
considers the temporal and spatial scales of different events. We shall relax the
strict constraints in both temporal and spatial dimensions as defined in Eq. (1),
so that S2(ti, tj) is computed at appropriate scales that actually correspond
to the span of the underlying events. To this end, we propose in this paper
to model the relationship and interaction between the temporal and spatial
scales as follows.
Scale relationship model. When two tweets ti and tj share common terms
and are close in space, we could tolerate a coarser temporal resolution in com-
puting S2(ti, tj). Vice versa, when they are close in time, we could tolerate a
coarser spatial resolution.
Our scale relationship model essentially says that, for two tweets ti and tj to be
considered similar, they should be similar at a fine resolution in at least one of
the temporal or spatial dimensions, but not necessarily in both simutaneousy.
It thus represents a tradeoff between time and space in the detection of events
of different spatiotemporal scales. This matches the observation that real world
events often happen within a small geographical area but could span longer
time intervals (such as a protest at a certain location in a city), or they take
8
Xiaowen Dong et al.
Fig. 3 Two time series of the number of occurrences of a certain term (computed using the
temporal resolution ∆t) within two different geographical cells. These geographical cells are
defined by discretizing the geographical area using the spatial resolution ∆d.
place only within short time intervals but could spread a larger geographical
area (such as a brief power outage across different areas of a city). Therefore,
based on the proposed model, we can relax the strict constraints defined in
Eq. (1) in event detection.
In order to do so, however, we do not compare two tweets ti and tj with
large temporal or spatial distances by simply choosing higher thresholds Tt
and Td, since this would suffer from text ambiguity generally present in the
Twitter data stream (the same word having different meanings depending
on context). We do not either incorporate directly the exact temporal and
spatial distances between them into the computation of the similarity metric
S2(ti, tj), since this might lead to domination of one scale to the other. These
limitations motivate us to propose a more detailed analysis model, that is,
instead of considering the temporal and spatial information of each tweet as
a whole, we now analyze spatiotemporal patterns of the terms (or keywords)
contained in each tweet. More specifically, to compare two tweets ti and tj,
we propose to look at the similarity between the time series of the number of
occurrences of the common terms shared by them (the occurrence is evaluated
in terms of in how many tweets these terms appear). On the one hand, this
enables us to study the interaction between the temporal and spatial scales
when computing the similarity between keyword time series. On the other
hand, this does not affect the clustering-based event detection framework, as
similarities between tweets would eventually be computed based on similarities
between time series of the common terms shared by them.
We build the time series of keywords as follows. We start with initial tem-
poral resolution ∆t and spatial resolution ∆d. Next, for each term shared by
ti and tj, we compute using the temporal resolution ∆t two time series of
its number of occurrences, that are based on data corresponding to the two
geographical cells to which ti and tj belong. These geographical cells are de-
fined by discretizing the geographical area using the spatial resolution ∆d. The
keyword time series are illustrated in Fig. 3.
Multiscale Event Detection in Social Media
9
4.2 Wavelet-based similarity computation
We now propose to use a wavelet-based method to measure similarities between
time series of keywords. Similarity between time series are often measured by
the correlation of their coefficients under the wavelet transform (Daubechies,
1992), which is a well-developed tool in signal processing that leads to a mul-
tiresolution representation of the signals. In this paper, we consider the discrete
wavelet transform (DWT) using the Haar wavelet, since it provides a natural
way to handle different temporal scales as required in our approach. Specifi-
cally, due to the properties of the Haar wavelet, the approximation coefficients
of DWT at different levels naturally correspond to aggregating the time se-
ries from fine scales (starting with the initial temporal resolution) into coarse
scales, each time by a factor of two. Therefore, to evaluate the similarity of the
time series at a certain temporal scale, we only need to measure the correlation
between a specific set of the DWT coefficients at the corresponding level (see
Fig. 4 for an illustration).
Our key idea is then to evaluate the similarity between the two time se-
ries shown in Fig. 3 at a properly chosen temporal scale, which is in turn
determined by the spatial distance between the two geographical cells. More
specifically, we introduce a number of predefined spatial scales for the spa-
tial distance. Then, if the spatial scale is coarse, which means that ti and tj
are distant, then we require the time series to be compared at a finer tem-
poral scale (the finest temporal scale being the initial temporal resolution);
Alternatively, if the spatial scale is fine, which means that ti and tj are close,
then the time series could be compared at a coarser temporal scale. Given
the number of spatial scales specified by the parameter nscale, we define nscale
distance ranges using logarithmical equispacing between the minimum and
maximum distances between two distinct geographical cells (measured based
on the center of the cells), which correspond to these spatial scales4. According
to the scale relationship model, the temporal scale St is then selected inversely
according to the spatial scale:
St = nscale + 1 − Ss.
(3)
For instance, if we choose to have nscale = 4 spatial scales Ss ∈ {1, 2, 3, 4},
1 being the coarsest and 4 the finest, then we would have St = 4, 3, 2, 1,
respectively, that represent from the finest to the coarsest temporal scale. This
in turn means that we compute the DWT at levels from 1 to 4, respectively.
This procedure is illustrated in Fig. 4.
We can now define a new similarity metric between two tweets ti and tj as
follows:
S2(ti, tj) = stf-idf(ti, tj) × sst(ti, tj),
(4)
4 When two tweets come from the same geographical cell, they would share the same time
series for any common term. In this case, the correlation of DWT coefficients would always
be 1 regardless of the level at which we compute the transform (or the temporal scale). This
special case can be interpreted as only keeping the spatial constraint in LED but relaxing
the temporal constraint.
10
Xiaowen Dong et al.
Fig. 4 An illustration of wavelet-based similarity computation for time series of length 16
(zero padding can be applied when needed if the length of time series is not a power of
2). The dots indicate the DWT coefficients at the corresponding level that are used for
computing correlation, while the dots highlighted by the rounded rectangle correspond to
approximation coefficients at each level. The approximation coefficients at DWT level k
correspond to a time series generated by aggregating every 2k entries in the original time
series (up to a constant).
where stf-idf(ti, tj) is the text similarity of ti and tj defined as in Eq. (1). For
each term shared by ti and tj, we can compute a similarity of the corresponding
time series; sst(ti, tj) is then defined as the maximum such similarity among
all the terms shared by ti and tj. The reasons why we choose the maximum
similarity are as follows. First, social media platforms that are ideal for event
detection usually contain short textual data where two pieces of text, if corre-
sponding to the same event, would share only a few but informative common
terms, such as hashtags in Twitter or tags in Youtube or Flickr. Second, in
Twitter specifically, although many tweets may share the same popular term,
it is less often that there would be a high similarity between the two keyword
time series in terms of their spatiotemporal patterns, especially at fine tempo-
ral scales, after a term-filtering procedure which we propose in the next section
that removes the “noisy” terms that generally spread in time and space. We
thus consider high similarity between time series as a strong indicator that
ti and tj may be related to the same event. Taking the maximum instead
of the average similarity helps us preserve such information and promote a
higher recall metric (retrieval of positive links between tweets) that we favor.
In Eq. (4), we consider the overall similarity between two tweets as a prod-
uct of their text similarity (stf-idf(ti, tj)) and the similarity of spatiotemporal
patterns of the terms shared by them (sst(ti, tj)). This leads to an interesting
comparison between LED and MED: Both approaches only consider the text
similarity stf-idf(ti, tj) that is meaningful in event detection; However, while
the former relies on fixed temporal and spatial constraints on ti and tj, the
latter looks at similar spatiotemporal patterns of the common terms, thus of-
fers more flexibility for events of different scales. Finally, we can use our new
similarity metric to construct an undirected and weighted graph W2:
(cid:26) S2(ti, tj)
i (cid:54)= j,
i = j,
if
if
(5)
W2(i, j) =
0
Multiscale Event Detection in Social Media
11
Based on this similarity graph, we can again apply the Louvain method to
detect event clusters. The complete algorithm for the proposed multiscale event
detection approach is summarized in Algorithm 2.
Algorithm 2 Multiscale Event Detection using Wavelets (MED)
1: Input:
T : a set of tweets with temporal, spatial, and text information
∆t: initial temporal resolution
∆d: initial spatial resolution
nscale: number of spatial scales
2: For every pair of tweets ti and tj in T , extract the common terms {wi}k
3: For each wi, compute using ∆t the time series of its number of occurrences, that are
based on data corresponding to the two geographical cells (defined using ∆d) to which
ti and tj belong.
4: Determine using Eq. (3) the temporal scale St using the spatial scale Ss to which the
i=1.
distance between the two geographical cells corresponds.
5: Apply DWT to the two time series, and compute the similarity between them as the
correlation between a specific set of DWT coefficients at the level corresponding to Ss.
6: Compute sst(ti, tj ) as the maximum time series similarity among {wi}k
i=1. Compute
7: Apply the non-recursive Louvain method to W2, and retain the meaningful clusters
S2(ti, tj ) using Eq. (4), and the adjacency matrix W2 using Eq. (5).
{ci}m
{ci}m
i=1 after post-processing steps.
i=1: clusters that correspond to events of different temporal and spatial scales.
8: Output:
There are a number of parameters in our multiscale event detection ap-
proach. First, the initial resolution parameters ∆t and ∆d are used for con-
structing keyword time series; Compared to Tt and Td in LED, they do not
have to adapt to the “true” scales of various events, thanks to the scale rela-
tionship model and the scale adjustment afterwards using the wavelet-based
scheme. In practice, we can simply choose them to be relatively small, for
example, as the expected minimum temporal and spatial intervals a desired
event may span (specific example choices are presented in Sect. 7). Second,
the number of spatial scales nscale can be considered as a choice in the design
of the algorithm. Intuitively, an nscale too small would not take full advantage
of the spatiotemporal scale relationship model, while nscale being too large
might lead to unnecessary increase in computational cost. The choice of this
parameter is also influenced by the resolution parameters ∆t and ∆d. One
the one hand, ∆d determines the number of geographical cells ld along one
dimension hence the spatial variability in the data. This implicitly controls
the maximum nscale such that the resulting distance scales are meaningful.
On the other hand, given a certain time span of data, the temporal resolution
∆t would determine the length of keyword time series lt, which in turn de-
termines the maximum (meaningful) level of DWT computation using a Haar
wavelet and hence the maximum temporal scale. Because of the relationship in
Eq. (3), the maximum spatial scale is thus determined accordingly. Based on
these two observations, we therefore suggest considering (cid:100)min(log2ld, log2lt)(cid:101)
as an upper bound for nscale, where (cid:100)·(cid:101) denotes the ceiling of a number. In our
12
Xiaowen Dong et al.
experiments, we choose nscale = 4 to ensure a certain level of spatial variability
while respecting this upper bound.
5 Spatiotemporal analysis of noise in Twitter
One challenge in designing event detection algorithms for Twitter data is that
we often need to deal with a large amount of “noise” tweets that do not pro-
vide any information regarding real world events. Examples can be tweets such
as “Could really use a drink” or “Nachos for lunch”, or discussions between
Twitter users about personal matters. We consider these tweets as noise and
event detection algorithms should be able to discard them and not allow them
to influence the event detection result. In the literature, several works (such
as Sakaki et al (2010)) have employed keyword filtering techniques in order to
tackle this problem and derived a working set of tweets that contain informa-
tion relevant to the types of events they wish to detect. Since we do not focus
in this paper on specific event types, but rather on events that take place in
specific locations and time intervals, we analyze in this section the spatiotem-
poral structure of the noise, namely, the event-irrelevant tweets in the data.
This analysis will allow us to define a novel term-filtering procedure, and to
evaluate empirically the performance of the event detection algorithms in this
paper using simulated noisy data under different space-time parameters.
5.1 Spatial distribution of noise in Twitter data
In order to get an intuition about the relevant spatial statistics models that
can be useful for analyzing the spatial distribution of the noise, we focus on
a set of geo-located tweets collected from a specific day (22-01-2012) in New
York City. In this dataset, four of the top-ten frequent terms are: nyc contained
in 335 tweets (183 of which are located in middle and lower Manhattan), love
contained in 674 tweets (145 of which are located in middle and lower Man-
hattan), lol contained in 1080 tweets (110 of which are located in middle and
lower Manhattan), and night contained in 355 tweets (97 of which are located
in middle and lower Manhattan). These terms, albeit being among the most
frequent ones in the daily collection of tweets, do not appear to be relevant to
a specific event of interest. In Fig. 5 we illustrate the locations of the tweets
(in middle and lower Manhattan) that contain these frequent terms. One can
observe that the tweets have a slight, but not strong spatial concentration and
appear to be almost randomly distributed within the Manhattan area. Based
on these spatial plots we seek the appropriate spatial statistics tools to model
these distributions.
In the spatial statistics literature (Cressie and Wikle, 2011), the lack of
spatial structure is commonly assessed using the concept of Complete Spa-
tial Randomness (CSR). CSR considers that the points on a map (locations
Multiscale Event Detection in Social Media
13
(a) “nyc”
(b) “love”
(c) “lol”
(d) “night”
Fig. 5 Locations of tweets that contain four specific frequent terms.
of tweets in our context) follow a homogeneous Poisson point process. This
implies that the numbers of tweets in non-overlapping areas in the map are in-
dependent and follow a Poisson distribution with some intensity parameter λ.
More precisely, if we denote the number of tweets within an area A as N (A),
CSR asserts that N (A) follows a Poisson distribution with mean λ · V (A),
where V (A) denotes the size of the area A. Intuitively, the CSR property as-
serts that points are “randomly” scattered in an area and are not concentrated
in specific locations.
We consider the task of assessing the levels of noise in Twitter data (with
respect to the target event detection task) by testing the CSR property for
tweets that contain common terms5. In particular, we initially select a term
(say the most frequent term in a collection of tweets) and then we test whether
the locations of the tweets that contain this term have the CSR property. In
case a term has the CSR property (i.e., the locations of the tweets that contain
this term follow a Poisson point process distribution), the edges in the twitter
similarity graph that are based on these terms can be considered as noise and
may result in the identification of clusters that are not related to events of
interest.
5 The direct usage of the CSR tests for the whole input tweet stream would not be
particularly informative since both of our algorithms construct a similarity graph between
tweets where the edge weights (i.e., the similarities between tweets) are based on the terms
that two tweets have in common. In this case, noise or event-irrelevant tweets would affect
the construction of the graph only when two “noise” tweets have a term in common (i.e.,
resulting in the formation of an edge that connects event-irrelevant tweets in the tweet
similarity graph).
14
Xiaowen Dong et al.
In order to evaluate the CSR property we have employed Ripley’s K-
function (Cressie and Wikle, 2011), which is a commonly used measure for
assessing the proximity of a spatial distribution to a homogeneous Poisson
point process. The sample-based estimate of Ripley’s K-function is defined as
N (dij < s)/n2 for a given distance value s, where dij de-
(cid:98)K(s) = V (A)(cid:80)
i(cid:54)=j
notes the Euclidean distance between two sample points i and j (two tweets
in our context) in the space, N (dij < s) counts the number of sample pairs
that has a distance smaller than s, n is the total number of points, and V (A)
is the size of the area A. It is known that, when a spatial Poisson process is
homogeneous, the values of the K-function are approximately equal to πs2.
Thus, the proximity of (cid:98)K(s) to πs2 can be employed for evaluating how similar
use the standardized K-function: (cid:98)L(s) =
π − s, and the proximity to a
(cid:98)L(s) to 0.
homogeneous Poisson process is measured by the proximity of the values of
our data distribution is to a homogeneous Poisson process. In this paper, we
(cid:113) (cid:98)K(s)
We now assess the spatial distribution of the sets of tweets shown in Fig. 5
(tweets containing the terms “nyc”, “love”, “lol” and “night”). Specifically,
we illustrate in Fig. 6 the values of their standardized K-function for different
values of s (distances) up to 4km, depicted in the black lines. Moreover, we
simulate (2000 times) a homogeneous Poisson process and compute the maxi-
mum and minimum values for (cid:98)L(s), depicted in the blue and red dashed lines,
respectively. We can observe that, the values of (cid:98)L(s) obtained using the loca-
values of (cid:98)L(s) obtained from the simulated homogeneous Poisson processes.
tions of these tweets are close to, and in several cases within the ranges of, the
This indicates that these tweets are slightly more concentrated in space than
what a homogeneous Poisson process would produce (possibly due to the dif-
ferences in the concentration of twitter users in different areas in middle and
lower Manhattan), but their spatial distribution is still close to a homogeneous
Poisson process.
To further explain what we mean by “still close to a homogeneous Poisson
process”, let us consider what appears to be one of the most extreme differences
between the spatial distribution of tweets and a homogeneous Poisson process
in Fig. 6, which is the value (cid:98)L(s) = 0.19 that is achieved for a distance value
s = 1km for the term “nyc”. Based on the number of tweets that contain the
term “nyc” on 22-01-2012 (in middle and lower Manhattan), a homogeneous
Poisson process would require an intensity parameter λ = 7.93 per square
kilometer to generate the same number of tweets. This would mean that on
average, the number of tweets per square kilometer that contain the term
“nyc” should be 7.93. In our case, the value of (cid:98)L(s) = 0.19 for s = 1km means
that, for small distances, the actual concentration of tweets is slightly higher,
with an intensity parameter λ = 11.21 per square kilometer. This shows that,
even in this worst case, the spatial distribution of tweets is still not far from
a homogeneous Poisson process.
Multiscale Event Detection in Social Media
15
(a) “nyc”
(b) “love”
(c) “lol”
(d) “night”
Fig. 6 Comparison between the sample-based estimates of the standardized K-function
for tweets containing the four specific terms, and the max-min values of this function for
simulated homogeneous Poisson processes.
In order to evaluate whether our observation for the four specific terms
holds for a larger tweet collection, we analyze all the geo-located tweets from
the New York area for the duration between 01-11-2011 and 01-04-2013. Specif-
ically, for each day, we have retrieved the top-ten frequent terms, and for each
frequent term we have computed the sample-based estimates of(cid:98)L(s) for s from
ues of (cid:98)L(s) only when the number of tweets in middle and lower Manhattan
illustrates the mean, the variance and the range of the values of (cid:98)L(s) (around
0.1km to 1.2km, again focusing on the middle and lower Manhattan area. To
avoid cases where the number of samples is low, we have computed the val-
is larger than 100. The results are presented in the boxplot of Fig. 7, which
5000 values in total, ten for each of the 500 days), for different values of s. As
we can see, the boxplot in Fig. 7 illustrates that the most frequent terms in
our Twitter data do not have a strong spatial pattern and follow a distribution
16
Xiaowen Dong et al.
Fig. 7 Boxplot of the values of the standardized K-function for the most frequent terms.
that is close to a homogeneous Poisson process, only exhibiting slightly higher
tweet concentrations for small distances.
5.2 Temporal distribution of noise in Twitter data
In order to analyze the temporal pattern of the noise in Twitter data, we have
assessed whether the distribution of the timestamps of event-irrelevant tweets
is close to a uniform distribution. A uniform distribution of the timestamps can
serve as a strong indication that these tweets are not relevant to an event that
takes place in a confined time interval. In order to test this hypothesis, we have
collected the timestamps of the top-ten frequent terms of each day between
01-11-2011 and 01-04-2013. We focus our analysis on a 6-hour interval between
11am and 5pm. For this time interval we tested whether the timestamps of
tweets that contain a specific frequent term follow a uniform distribution, using
the Chi-squared goodness of fit test. Interestingly, we could reject the null
hypothesis that the timestamps are uniformly distributed at a 5% confidence
level only in 27% of the cases. This result suggests that a large number of
frequent terms in our data does not have a strong temporal pattern.
In summary, the spatiotemporal analysis of the distribution of the noise
in Twitter data presented in this section allows us to (i) conduct synthetic
experiments with simulated noisy data that help us understand the behavior
of the event detection algorithms under different space-time parameters, and
(ii) consider a term-filtering mechanism that removes tweets that contain the
terms with low values for (cid:98)L(s). We will describe both aspects in more details
in the next section.
Multiscale Event Detection in Social Media
17
6 Synthetic experiments
In order to better understand the behavior of the event detection algorithms
LED and MED, and the potential influence of the noise in the data, we
present in this section experimental results based on synthetic data. Specifi-
cally, we generate artificial documents that are considered as “tweets” posted
at different time instants and diverse spatial locations. By creating some arti-
ficial “events” in this setting, we are able to evaluate quantitatively the per-
formances of the proposed methods under different choices for the parameter
values. In what follows, we first explain the experimental setup, and then
present the event detection results.
6.1 Experimental setup
We work with a spatial area of 10 by 10, which are defined by bottom left
and top right coordinates (0, 0) and (10, 10) respectively in a 2-D Euclidean
space, and a temporal interval of (0, 32) on the real line. We then define events
that span different spatial areas and temporal intervals in diverse experimental
settings. First, for each event, we choose a number between 3 and 10 uniformly
at random as the number of tweets related to that event. These event-relevant
tweets are uniformly distributed in the spatial area and temporal interval
spanned by that event. We also generate, based on the spatiotemporal analysis
presented in Sect. 5, event-irrelevant tweets, namely, noise, which follows a 2-D
Poisson point process in the whole spatial area and are distributed uniformly
in the whole temporal interval. Next, the content of each tweet is generated as
follows. We take geo-located tweets from New York collected on a random day
(in this case 21-01-2012) as a reference, and choose 59 terms as event-relevant
terms (referred to as signal terms) and consider all the other terms that appear
in the tweets on that day as noise (referred to as noise terms). We select the
number of terms in each event-relevant tweet uniformly at random between
5 and 10. In particular, in each event-relevant tweet, one term is selected
uniformly at random from the 59 signal terms, and the rest are randomly
chosen from the noise terms with probabilities that depend on their numbers
of occurrences in the actual daily tweets. We also create event-irrelevant tweets,
and the number of terms in each event-irrelevant tweet is selected uniformly
at random between 3 and 10. The terms in each event-irrelevant tweet are
only chosen from the noise terms. We present event detection results in the
following scenarios.
6.2 Event detection results in synthetic data
6.2.1 Events concentrated in both time and space without noise
In a first scenario, we consider 20 events, each of which is concentrated in a 2
by 2 spatial area and a temporal interval of 2. The spatial and temporal loca-
18
Xiaowen Dong et al.
tions are chosen uniformly at random in the whole spatial area and temporal
interval. We only consider event-relevant tweets, where the goal is to detect
the 20 clusters that correspond to the events by clustering the tweets into dif-
ferent subsets. For MED, we focus on terms that appear in at least 3 tweets.
We choose nscale = 4 unless its upper bound (cid:100)min(log2ld, log2lt)(cid:101) goes below
4 due to the increase of resolution parameters. In our experiments, we take
the same value for the four parameters in the two methods, namely Tt and Td
in LED and ∆t and ∆d in MED, and evaluate the clustering performance
in terms of Normalized Mutual Information (NMI) and F-measure (Manning
et al, 2008). The F-measure is computed using a choice of β = 2 meaning that
it is slightly in favor of recall6, as we consider that it is more important to
ensure that tweets related to the same event are grouped into one cluster. The
results obtained by averaging 10 test runs are shown in Fig. 8. As we can see,
in terms of both evaluation criteria, the performance of LED with small values
of the thresholds Tt and Td is not satisfactory as it is not able to capture the
links between all the tweets within the same event. However, the performance
increases noticeably as the temporal and spatial thresholds are chosen to be
close to or larger than the “true” scales of the events (2 in this case for both
time and space). When the thresholds get too large, the performance drops
slightly, as the chance of grouping two different events together in one cluster
increases. Compared to LED, MED achieves much better performance even
when the resolution parameters ∆t and ∆d are small. The reason is that, even
at very fine initial resolutions, the wavelet-based representation in MED is
able to aggregate the time series appropriately such that the similarity of the
time series is actually computed at a coarser scale. This suggests that MED is
better at capturing the links between tweets corresponding to the same event,
even with suboptimal choices for the value of the parameters. Therefore, the
performance of MED is much less sensitive to parameter selection than that
of LED.
6.2.2 Events concentrated in only one dimension without noise
We now consider events that are not necessarily concentrated in both time
and space but only in one of the two dimensions. Specifically, we consider 20
events, where 10 of them are concentrated in a temporal interval of length
between 1 to 2 but spread in a spatial area with a size from 8 by 8 to 16 by
16. The other 10 events are concentrated in a spatial area with a size from
1 by 1 to 2 by 2 but spread in a temporal interval of length between 8 to
16. We still consider a noise-free scenario as in the previous experiment. The
clustering results are shown in Fig. 9. We see that, while MED can handle the
scale changes in this scenario with a performance that remains comparable to
that in the previous experiment, the performance of LED drops significantly.
Specifically, due to the lack of a single temporal and spatial scale for all the
events, LED only performs reasonably well when the threshold values for Tt
6 F-measure is computed as (1 + β2) ·
Precision·Recall
(β2·Precision)+Recall
.
Multiscale Event Detection in Social Media
19
(a)
(b)
Fig. 8 Clustering performance in terms of (a) NMI and (b) F-measure, on events concen-
trated in both time and space without noise.
(a)
(b)
Fig. 9 Clustering performance in terms of (a) NMI and (b) F-measure, on events concen-
trated in only one dimension without noise.
and Td are large enough to cover the scales of all the events. This experiment
highlights the advantage of MED in handling events of different scales and in
the absence of simultaneous temporal and spatial localization.
6.2.3 Events concentrated in both time and space with noise
We now move to noisy scenarios where we also consider event-irrelevant tweets
in addition to event-relevant tweets. Specifically, we generate event-irrelevant
tweets that follow a 2-D Poisson point process with an intensity parameter
λ = 10 within the whole spatial area of 10 by 10. This generates around 1000
noise tweets in addition to the tweets that correspond to 20 events generated
as in Sect. 6.2.1. The goal is to detect the events by applying clustering to
all the tweets in the dataset. To measure the clustering quality, we define the
groundtruth to be a combination of 20 event clusters and noise clusters where
each noise tweet is considered as a single cluster. The reason for this setting
is that we wish to group tweets that correspond to the same event, and at
the same time we want to ensure that the noise tweets remain as separated as
possible. Based on the analysis in Sect. 5, for MED, we propose to evaluate
20
Xiaowen Dong et al.
the values of the standardized K-function (cid:98)L(s) for all the terms that appear
that have an average(cid:98)L(s) value no smaller than 1 as valid terms for generating
in at least 3 tweets for s chosen to be 0.5, 1, 1.5 and 2, and only consider terms
keyword time series. The clustering results are shown in Fig. 10. In the noisy
scenario, we see that the NMI and F-measure curves show different trends.
Specifically, with small values for the threshold or resolution parameters, the
number of links between tweets created by both methods is small, and most of
the noise clusters remain well-separated. When the parameter values increase,
noise tweets starting forming more links to event-relevant tweets as well as
to themselves, which penalizes the clustering. Therefore, we see that the NMI
curves show an almost monotonically decreasing trend as the parameter val-
ues increase. In contrast, the F-measure is a weighted combination of precision
and recall, which penalizes both false positives and false negatives. Therefore,
for both methods, we see that the F-measure curves initially increase as the
parameter values increase (where the number of false negatives generally de-
creases), and decrease as these parameters become large (where the number
of false positives increases).
We now compare the performance of LED and MED in the same experi-
ment. For NMI, we see that the performance of LED drops significantly when
the thresholds exceed the “true” scales of the events, as large thresholds in
LED tend to increase the number of event-relevant and noise tweets that are
linked to each others. In comparison, the performance of MED is relatively
more stable, which is partly due to the term-filtering procedure employed.
Similarly, we see that MED outperforms LED for a large range of parameter
values in terms of the F-measure. In addition, the performance of MED is
again more stable in the sense that it peaks at a wider range of parameter
values, while LED only performs well when the threshold values are chosen
at the “true” event scales.
6.2.4 Events concentrated in only one dimension with noise
Finally, we show in Fig. 11 the experimental results in a noisy scenario where
the events are concentrated either in time or space as defined in Sect. 6.2.2.
While the NMI curves are similar to those in Fig. 10, the F-measure curves
show that the performance of both methods drops significantly in this challeng-
ing scenario. Still, MED outperforms LED in terms of both peak performance
and stability.
6.2.5 Influence of parameter settings
We now take a closer look at the parameter settings for the synthetic experi-
ments. Especially, we investigate how the length of the temporal interval, the
size of the spatial area, and the number of signal terms in each event-relevant
tweet, influence the performance of both algorithms in terms of the F-measure
in the scenario of Sect. 6.2.4, that is, the performance curve in Fig. 11(b)).
Multiscale Event Detection in Social Media
21
(a)
(b)
Fig. 10 Clustering performance in terms of (a) NMI and (b) F-measure, on events concen-
trated in both time and space with noise.
(a)
(b)
Fig. 11 Clustering performance in terms of (a) NMI and (b) F-measure, on events concen-
trated in only one dimension with noise.
First, given a fixed parameter for the Poisson point process and fixed spatial
area of 10 by 10, the total number of noise tweets remains the same. In this
case, we observe that the performance of both algorithms has improved when
the temporal interval increases from 32 to 128 (Fig. 12(a)), due to decreased
noise density in the temporal dimension hence a higher signal-to-noise-ratio.
Such a gain is more dramatic for LED especially at large parameter values, in
which case the performance of this approach is more sensitive to the density
of the noisy information.
Second, given a fixed temporal interval of 32, as the spatial area increases
from 10 by 10 to 16 by 16, the total number of noise tweets increases quadrat-
ically. In this case, we see from Fig. 12(b) that the performance of both algo-
rithms decreases mainly because of that, as the total number of noise tweets
increases, generally more links are formed between noise tweets.
Finally, we have investigated the influence of the number of signal terms in
each event-relevant tweet on the performance of the algorithms. Specifically,
we increase the number of signal terms from 1 to 3 in each event-relevant
tweet and repeat the same experiments. We have observed performance gain
22
Xiaowen Dong et al.
(a)
(b)
(c)
Fig. 12 Clustering performance in terms of F-measure on events concentrated in only one
dimension with noise. (a) The same setting as Sect. 6.2.4. but with a temporal interval of
128. (b) The same setting as Sect. 6.2.4. but with a spatial area of 16 by 16. (c) The same
setting as Sect. 6.2.4. but with 3 signal terms in each event-relevant tweet.
in Fig. 12(c) for both algorithms which matches the intuition that a higher
signal-to-noise-ratio generally leads to better performance.
In summary, the synthetic experiments suggest that LED is efficient at
detecting events that are concentrated in both time and space, provided that
these events are of similar scales and that the correct temporal and spatial
thresholds are chosen in the algorithm. In comparison, although we employed
a term-filtering procedure in MED in the noisy scenarios, the results on syn-
thetic data generally suggest that MED is better than LED at detecting
events of different scales and in the absence of simultaneous temporal and
spatial localization. MED is also less sensitive to parameter selection and
leads to more robust and stable event detection performance.
7 Real world experiments
We now test the performance of LED and MED in real world event detection
tasks. We focus in this section on the comparison between these two event
detection methods, since (i) such a comparison would highlight the difference
between LED and MED in detecting real world events of various temporal
and spatial scales, and (ii) to the best of our knowledge, there is no other
multiscale method in the literature that is dedicated to event detection. We
first describe the data and some implementation details, and then present the
event detection results. Finally, we discuss about the scalability of the proposed
algorithm.
7.1 Data description
We have collected geotagged public tweets in the New York area, which cor-
responds to a geographical bounding box with bottom left GPS coordinates
pair (40.4957, -74.2557) and top right coordinates pair (40.9176, -73.6895),
from November 2011 to March 2013. The streams of public tweets are re-
trieved using Twitter’s official Streaming API with the “locations” request
Multiscale Event Detection in Social Media
23
parameter7. After the initial retrieval, we filter out those tweets that have no
geotags or have geotags outside the predefined bounding box. This results in
16449769 geotagged tweets in total. As a pre-processing step, we remove those
tweets that contain a clear location indicator, such as the ones corresponding
to Foursquare check-ins, which we do not consider as events of interest.
7.2 Implementation details
We implement both event detection algorithms LED and MED on a daily
basis, that is, we aim at detecting events from each day. The tf-idf weight-
ing scheme in the vector space model is implemented using the Text to Ma-
trix Generator (TMG) MATLAB toolbox (Zeimpekis and Gallopoulos, 2006),
where we also remove a list of stop words provided by the toolbox (with an
additional one “http”), and set the minimum and maximum length of a valid
term to be 3 and 30.
For LED, we use a temporal threshold of Tt = 30 minutes and spatial
threshold of Td ≈ 100 meters (difference of 0.001 in latitude or 0.0015 in
longitude) in Eq. (1) for the detection of local event clusters. For MED, we
focus on terms that appear in at least 5 tweets. We evaluate the values of the
standardized K-function (cid:98)L(s) for all these terms with s chosen to be 0.2, 0.4,
0.6, 0.8 and 1, and only consider those that have an average (cid:98)L(s) value no
smaller than 0.5 as valid terms for generating keyword time series. The initial
temporal and spatial resolutions in MED are set to ∆t = 30 minutes and
∆d = 100 meters, and the number of spatial scales is set to nscales = 4. Once
the clusters are obtained by both methods, we perform simple post-processing
steps that (i) remove clusters that contain less than 3 tweets or less than 3
distinct users, so that each event would contain sufficient information from
sufficient number of observes, and (ii) remove clusters in which more than
50% of the tweets comes from a single user, so that the information source
is sufficiently diverse, and finally (iii) remove clusters that correspond to job
advertisements and traffic alerts posted by bots. While there is no general rule
for such post-processing, we found these steps practical to remove clusters that
are not meaningful and correspond to noisy information.
7.3 Event detection results
We now analyze the clustering results for both LED and MED algorithms.
First of all, the clusters detected by LED do correspond to meaningful real
world events of interest. For example, Table 1 shows some example local clus-
ters obtained that correspond to several protests during the Occupy Wall
Street (OWS) movement8 in New York City. To understand better the be-
havior of LED, we take 2011-11-17 as an example date, when many OWS
7 https://dev.twitter.com/streaming/overview/request-parameters#locations
8 http://en.wikipedia.org/wiki/Occupy_Wall_Street
24
Xiaowen Dong et al.
Table 1 Example local clusters detected by LED that correspond to protests in the OWS
movement.
protests took place. We first show in Fig. 13 all the 41 local event clusters
detected on this date in middle and lower Manhattan, where different clusters
are shown in different colors. Detailed information about the top 20 clusters
are further shown in Table 2, where the six columns correspond to cluster id,
median timestamp (GMT+0) of all the tweets in the cluster, minimal time
interval (in seconds) that covers 80% of the tweets, mean latitude and lon-
gitude of the tweets, and (up to 10) top terms contained in the cluster. As
we can see in Fig. 13 and in the third column of Table 2, all the clusters are
highly localized in both time and space. In addition, due to the strict temporal
and spatial constraints used by LED (see Eq. (1)), for the same event we get
separate clusters, which correspond to different timestamps (such as clusters
2 and 5 that talk about protests at Zuccotti Park) or different locations (such
as clusters 3 and 13 that talk about protests at Union Square). Ideally, we
would like some of these separated clusters to be grouped together if they are
related to the same real world event.
We now present the event detection results on data from the same date
using MED. Table 3 summarizes the top 10 clusters detected by MED, four
of which are visualized on the map in Fig. 14. From Fig. 14 and the third
column of Table 3, we see that MED is able to detect events that spread
in much larger spatial areas or longer time intervals than LED. Specifically,
we see in Fig. 14(a) and Fig. 14(b) two clusters related to OWS protests
at Zuccotti Park (cluster 1), and Union Square and Foley Square (cluster 2),
respectively, both of which span rather long time intervals. Moreover, although
most of the tweets in the two clusters are mainly posted from locations where
the protests took place, there also exist tweets in the clusters that mention
Multiscale Event Detection in Social Media
25
Fig. 13 Local event clusters detected by LED on 2011-11-17. The colors represent cluster
ids.
the same events but have been posted at quite distant locations. In Fig. 14(c)
and Fig. 14(d), we see two clusters corresponding to the Raise Cache tech
event (cluster 5) and the Mastercard free lunch promotion event (cluster 9),
respectively, both of which are more concentrated in time but spread in space
(with a few outliers in the latter case). Although there exists certain amount of
noise tweets in the detected clusters, these examples demonstrate that MED is
able to detect events that concentrate only in time or space, many of which are
of different scales. In comparison, LED is not able to detect such event clusters.
Specifically, LED produced many separated clusters for OWS protests, two
separated clusters with some missing tweets for the Raise Cache tech event,
and missed completely the Mastercard promotion event due to the lack of a
group of tweets that are concentrated in both time and space.
Finally, we notice that even in the results obtained by MED there some-
times exists more than one cluster about the same event, for example, in Ta-
ble 3 there are two clusters detected for both the OWS protests (clusters 1 and
2) and the Katy Perry concert (clusters 3 and 4). First, the protests at Zuccotti
26
Xiaowen Dong et al.
Table 2 Detailed information about the top 20 local event clusters detected by LED on
2011-11-17. The six columns from the left to the right correspond to cluster id, median
timestamp (GMT+0) of all the tweets in the cluster, minimal time interval (in seconds)
that covers 80% of the tweets, mean latitude and longitude of the tweets, and (up to 10)
top terms contained in the cluster.
Table 3 Detailed information about the top 10 event clusters detected by MED on 2011-
11-17. The six columns from the left to the right correspond to cluster id, median timestamp
(GMT+0) of all the tweets in the cluster, minimal time interval (in seconds) that covers
80% of the tweets, mean latitude and longitude of the tweets, and (up to 10) top terms
contained in the cluster.
Park took place from the morning to noon, while the protests at Union Square
and Foley Square happened in the afternoon after 3pm. Although there indeed
exist semantic links between tweets that correspond to these two events, the
rather different locations and timestamps lead to separate clusters. Second, for
the Katy Perry concert, the two clusters highly overlap in both time and space,
and the tweets in one cluster have quite strong links to those in the other one.
In this case, clusters have been separated mainly because of the strong pat-
terns present in the texts: While in cluster 3 the concert is described mostly
using a single term “katyperry”, in cluster 4 we see two separate terms “katy”
and “perry”.
Multiscale Event Detection in Social Media
27
(a)
(b)
(c)
(d)
Fig. 14 Example event clusters detected by MED on 2011-11-17: (a) OWS protests at
Zuccotti Park (cluster 1). (b) OWS protests at Union Square and Foley Square (cluster 2).
(c) Raise Cache (cluster 5). (d) Mastercard free lunch promotion (cluster 9).
7.4 Scalability
The computational complexity of both LED and MED mainly depend on
(i) the construction of a similarity graph, and (ii) the graph-based clustering
process. As we mentioned before, the Louvain method used in the cluster-
ing process is empirically observed to be able to scale to large scale graphs.
Therefore, we mainly discuss the computational cost of constructing similarity
graphs in the two algorithms.
For both LED and MED, the construction of a similarity graph can be
performed efficiently because the similarities need to be computed only for
pairs of tweets that have common terms. Thus, the computational complexity
of the similarity graph construction, using an appropriate index structure (such
as an inverted index), can be O(n × avg connectivity), where n is the total
number of tweets and avg connectivity denotes, given a tweet t, the average
number of tweets in the dataset with non-zero similarity with t. In our real
world experiment, avg connectivity corresponds to only 2% of the total number
of tweets.
In addition, avg connectivity can be further reduced by the term-filtering
procedure that is employed in MED for noise-filtering. Since term-filtering
is applied to the most popular (frequent) terms, this can substantially affect
28
Xiaowen Dong et al.
avg connectivity. In our experiment, for example, after the filtering procedure
avg connectivity is further reduced by more than 40% compared to LED.
Moreover, the filtering procedure potentially represents a tradeoff between
the performance of the algorithm and its computational complexity. A more
aggressive filtering can largely attenuate the influence of noisy information and
at the same time reduce the computational cost. However, it might also filter
out terms that are related to some relatively small-scaled events.
For MED, we need to compute the spatiotemporal similarity of time series
for the valid terms (after term-filtering) shared by every pair of tweets. How-
ever, since the spatiotemporal similarity is defined between time series that
come from different geographical cells, we only need to evaluate, for each valid
term, the pairwise similarity between time series from different cells, instead of
comparing every pair of different tweets containing that term. This keeps the
number of DWT computations needed relatively low due to the small number
of geographical cells.
Practically, for the daily Twitter stream with geotag in the middle and
lower Manhattan area of New York City that we have considered in the ex-
periment (∼8000 geotagged tweets with 36000 terms in total), it takes only
a few seconds to finish the construction of the similarity graph in LED. For
the implementation of MED, it takes roughly 5 minutes for our MATLAB
code to create the similarity graph on a lab server with average computing
power or 8 minutes on a mid-2009 MacBook Pro (both single core process),
where the main computational cost is due to the DWT computations. While
we consider this computation time reasonable given the benefits of the algo-
rithm, we certainly hope to further improve the scalability of our algorithm in
future work.
8 Related work
Social media data have become pervasive due to the fast development of online
social networks since the last decade. This has given rise to a series of interest-
ing research problems such as event detection based on user-generated content
(Sayyadi et al, 2009; Becker et al, 2009; Aggarwal and Subbian, 2012). As an
example, Chen and Roy (2009) and Papadopoulos et al (2011) have proposed
to detect social events using tagged photos in Flickr. A more popular platform
is Twitter, which has attracted a significant amount of interest due to the
rich user-generated text data that can be used for event detection (Atefeh and
Khreich, 2013). Early works in the field have focused on more specific types of
events, such as news (Sankaranarayanan et al, 2009) and earthquakes (Sakaki
et al, 2010), while recent approaches detect various types of events (Petrovic
et al, 2010; Marcus et al, 2011; Becker et al, 2011; Ozdikis et al, 2012; Li et al,
2012a; Parikh and Karlapalem, 2013; Berlingerio et al, 2013). Although the
specific techniques presented in the state-of-the-art event detection approaches
may vary from a technical point of view, many of them rely on the detection
of certain behaviors in the Twitter stream such as the burstiness of certain
Multiscale Event Detection in Social Media
29
keywords, which indicates the emergence of particular events. In particular,
several works use wavelets, which is a well-developed tool in signal process-
ing, for event detection based on keyword burstiness patterns (Weng and Lee,
2011; Cordeiro, 2012).
Recently, there has been an increasing amount of interest in exploring both
the temporal and spatial dimensions to better capture the meaningful informa-
tion and reduce noise in the data from social media platforms. In Rattenbury
et al (2007), the authors have proposed to analyze for event extraction the
semantics of tags associated with the Flickr photos, by taking into account
multiple temporal and spatial resolutions. In Chen and Roy (2009), the au-
thors have proposed to cluster Flickr photos based on both the temporal and
the spatial distributions of the photo tags using wavelets. In Becker et al
(2010), the authors have considered combining text, temporal and spatial fea-
tures in order to build an appropriate tweet similarity measure. In Lappas
et al (2012), the authors have proposed two approaches to detect burstiness of
keywords in both temporal and spatial dimensions simultaneously. In Sugitani
et al (2013), the authors have proposed a hierarchical clustering procedure for
event detection in Twitter, where both temporal and spatial constraints have
been imposed to measure the similarities of tweets. They have also proposed to
examine co-occurrences of keywords that present specific spatiotemporal pat-
terns. Other examples include Lee et al (2011); Li et al (2012b); Thom et al
(2012); Walther and Kaisser (2013) and Zaharieva et al (2013), where the au-
thors have proposed spatiotemporal clustering methods for anomaly and event
detection in Twitter and Flickr, respectively. These approaches are certainly
inspirational to the idea proposed in the present paper; However, most of them
do not explicitly handle multiple spatiotemporal scales in event detection.
Finally, there are a few approaches in the literature that have studied the
influence of different resolutions for temporal and spatial analysis in event de-
tection. For example, in Cooper et al (2005) and Rattenbury et al (2007), the
authors have proposed to use a scale-space analysis of the data (Witkin, 1983).
The common objective in these approaches is to select the most appropriate
scale for event extraction and detection. More generally, multiscale or mul-
tiresolution clustering algorithms has been of interest in the machine learning,
pattern recognition, and physics (Ronhovde et al, 2011, 2012) communities
since the last decade. The approaches that take advantage of the properties of
the wavelet transform to enable a multiresolution interpretation in the cluster-
ing process, such as the works in Sheikholeslami et al (2000) and Tremblay and
Borgnat (2012), are of particular interest. Although these approaches are not
originally proposed for event detection in social media platforms, they have
inspired us to consider wavelets in our framework. While they output multi-
ple sets of clustering solutions at different resolutions, our approach however
uses wavelets to choose the appropriate temporal and spatial resolutions for
constructing a single data similarity graph.
In summary, although there exist many approaches that take into account
the temporal and spatial dimensions of the social media data for event detec-
tion, they generally do not explicitly handle different scales in data analysis.
30
Xiaowen Dong et al.
In contrast, our framework explicitly handles multiple spatiotemporal scales,
which we believe is essential for building an efficient and generic event detec-
tion approach. Different scales in the temporal and spatial dimensions have
been treated separately in most of the state-of-the-art analyses, but the rela-
tionship and interaction between these scales have been largely overlooked in
the literature. To the best of our knowledge, our approach is the first attempt
that is based on an explicit modeling of the relationship between different tem-
poral and spatial resolutions. Finally, we present a statistical analysis of the
temporal and spatial distributions of noisy information in the Twitter data,
which we believe is the first of its kind. We believe our perspective contributes
to the research in the field of social media analytics and provides new insights
into the design of novel clustering and event detection algorithms.
9 Conclusion
In this paper, we have proposed a novel approach towards multiscale event de-
tection in social media. Especially, we have shown that it is important to under-
stand and model the relationship between the temporal and spatial scales, so
that events of different scales can be separated simultaneously and in a mean-
ingful way. Furthermore, we have presented statistical modeling and analysis
about the spatiotemporal distributions of noisy information in the Twitter
stream, which not only helps us define a novel term-filtering procedure for
the proposed approach, but also provides new insights into the understanding
of the influence of noise in the design of event detection algorithms. Future
directions include (i) further investigation of the possibility of extending and
generalizing the proposed scale relationship model to handle temporal and
spatial scales simutaneously for multiscale event detection, (ii) more appro-
priate and accurate statistical models for analyzing noisy information present
in social media data, and (iii) improvement on the scalability of the proposed
algorithms.
References
Aggarwal CC, Subbian K (2012) Event Detection in Social Streams. In: SIAM
International Conference on Data Mining (SDM), Anaheim, CA
Atefeh F, Khreich W (2013) A Survey of Techniques for Event Detection in
Twitter. Computational Intelligence
Becker H, Naaman M, Gravano L (2009) Event Identification in Social Me-
dia. In: ACM SIGMOD Workshop on the Web and Databases (WebDB),
Providence, RI
Becker H, Naaman M, Gravano L (2010) Learning Similarity Metrics for Event
Identification in Social Media. In: The Third ACM International Conference
on Web Search and Data Mining (WSDM), New York City, NY
Multiscale Event Detection in Social Media
31
Becker H, Naaman M, Gravano L (2011) Beyond Trending Topics: Real-World
Event Identification on Twitter. In: The Fifth International AAAI Confer-
ence on Weblogs and Social Media (ICWSM), Barcelona
Berlingerio M, Calabrese F, Lorenzo GD, Dong X, Gkoufas Y, Mavroeidis
D (2013) SaferCity: a System for Detecting and Analyzing Incidents from
Social Media. In: IEEE International Conference on Data Mining (ICDM),
Dallas, TX
Blondel VD, Guillaume JL, Lambiotte R, Lefebvre E (2008) Fast unfolding
of communities in large networks. Journal of Statistical Mechanics: Theory
and Experiment (10):P10,008 (12pp)
Chen L, Roy A (2009) Event Detection from Flickr Data through Wavelet-
Based Spatial Analysis. In: The 18th ACM Conference on Information and
Knowledge Management (CIKM), Hong Kong
Cooper M, Foote J, Girgensohn A, Wilcox L (2005) Temporal Event Clustering
for Digital Photo Collections. ACM Transactions on Multimedia Computing,
Communications, and Applications (TOMCCAP) 1(3):269–288
Cordeiro M (2012) Twitter Event Detection: Combining Wavelet Analysis and
Topic Inference Summarization. In: Doctoral Symposium on Informatics
Engineering, Porto
Cressie N, Wikle CK (2011) Statistics for Spatio-Temporal Data (Wiley Series
in Probability and Statistics). Wiley
Daubechies I (1992) Ten Lectures on Wavelets. SIAM
Lappas T, Vieira MR, Gunopulos D, Tsotras VJ (2012) On the Spatiotemporal
Burstiness of Terms. In: The 38th International Conference on Very Large
Databases, Istanbul
Lee CH, Yang HC, Chien TF, Wen WS (2011) A Novel Approach for Event
Detection by Mining Spatio-temporal Information on Microblogs. In: Inter-
national Conference on Advances in Social Networks Analysis and Mining
(ASONAM), Kaohsiung
Li C, Sun A, Datta A (2012a) Twevent: Segment-based Event Detection from
Tweets. In: The 21st ACM International Conference on Information and
Knowledge Management (CIKM), Maui, HI
Li R, Lei KH, Khadiwala R, Chang KCC (2012b) TEDAS: A Twitter-based
Event Detection and Analysis System. In: The 28th IEEE International
Conference on Data Engineering (ICDE), Washington, DC
von Luxburg U (2007) A Tutorial on Spectral Clustering. Statistics and Com-
puting 17(4):395–416
Manning CD, Raghavan P, Schutze H (2008) Introduction to Information Re-
trieval. Cambridge University Press
Marcus A, Bernstein MS, Badar O, Karger DR, Madden S, Miller RC (2011)
Twitinfo: Aggregating and Visualizing Microblogs for Event Exploration. In:
ACM CHI Conference on Human Factors in Computing Systems, Vancouver
Newman MEJ (2006) Modularity and community structure in networks. Pro-
ceedings of the National Academy of Sciences of the USA 103(23):8577–8582
Ozdikis O, Senkul P, Oguztuzun H (2012) Semantic Expansion of Hashtags for
Enhanced Event Detection in Twitter. In: The First International Workshop
32
Xiaowen Dong et al.
on Online Social Systems (WOSS), Istanbul
Papadopoulos S, Zigkolis C, Kompatsiaris Y, Vakali A (2011) Cluster-Based
Landmark and Event Detection for Tagged Photo Collections. IEEE Multi-
Media 18(1):52–63
Parikh R, Karlapalem K (2013) ET: Events from Tweets. In: The 22nd Inter-
national Conference on World Wide Web (WWW), Rio de Janeiro
Petrovic S, Osborne M, Lavrenko V (2010) Streaming First Story Detection
with application to Twitter. In: The 11th Annual Conference of the North
American Chapter of the Association for Computational Linguistics, Los
Angeles, CA
Rattenbury T, Good N, Naaman M (2007) Towards Automatic Extraction of
Event and Place Semantics from Flickr Tags. In: ACM SIGIR Conference
on Research and Development on Information Retrieval, Amsterdam
Reuter T, Papadopoulos S, Petkos G, Mezaris V, Kompatsiaris Y, Cimiano P,
de Vries C, Geva S (2013) Social Event Detection at MediaEval 2013: Chal-
lenges, Datasets, and Evaluation. In: MediaEval Benchmarking Initiative
for Multimedia Evaluation (MediaEval) 2013 Workshop, Barcelona
Ronhovde P, Chakrabarty S, Hu D, Sahu M, Sahu KK, Kelton KF, Mauro
NA, Nussinov Z (2011) Detecting hidden spatial and spatio-temporal struc-
tures in glasses and complex physical systems by multiresolution network
clustering. The European Physical Journal E 34:105
Ronhovde P, Chakrabarty S, Hu D, Sahu M, Sahu KK, Kelton KF, Mauro
NA, Nussinov Z (2012) Detection of hidden structures for arbitrary scales
in complex physical systems. Scientific Reports 2:329
Sakaki T, Okazaki M, Matsuo Y (2010) Earthquake Shakes Twitter Users:
Real-time Event Detection by Social Sensors. In: The 19th International
Conference on World Wide Web (WWW), Raleigh, NC
Sankaranarayanan J, Samet H, Teitler BE, Lieberman MD, Sperling J (2009)
TwitterStand: News in Tweets. In: The 17th ACM SIGSPATIAL Interna-
tional Conference on Advances in Geographic Information Systems, Seattle,
WA
Sayyadi H, Hurst M, Maykov A (2009) Event Detection and Tracking in Social
Streams. In: The Third International AAAI Conference on Weblogs and
Social Media (ICWSM), San Jose, CA
Sheikholeslami G, Chatterjee S, Zhang A (2000) WaveCluster: A Multi-
Resolution Clustering Approach for Very Large Spatial Databases. The In-
ternational Journal on Very Large Data Bases 8(3-4):289–304
Sugitani T, Shirakawa M, Hara T, Nishio S (2013) Detecting Local Events by
Analyzing Spatiotemporal Locality of Tweets. In: The 27th International
Conference on Advanced Information Networking and Applications Work-
shops (WAINA), Barcelona
Thom D, Bosch H, Koch S, Woerner M, Ertl T (2012) Spatiotemporal
Anomaly Detection through Visual Analysis of Geolocated Twitter Mes-
sages. In: 2012 IEEE Pacific Visualization Symposium (PacificVis), Songdo
Tremblay N, Borgnat P (2012) Multiscale Community Mining in Networks
Using Spectral Graph Wavelets. arXiv:12120689
Multiscale Event Detection in Social Media
33
Walther M, Kaisser M (2013) Geo-spatial Event Detection in the Twit-
ter Stream. In: The 35th European Conference on Information Retrieval
(ECIR), Moscow
Weng J, Lee BS (2011) Event Detection in Twitter. In: The Fifth International
AAAI Conference on Weblogs and Social Media (ICWSM), Barcelona
Witkin A (1983) Scale Space Filtering. In: International Joint Conference on
Artificial Intelligence (IJCAI), Karlsruhe
Zaharieva M, Zeppelzauer M, Breiteneder C (2013) Automated Social Event
Detection in Large Photo Collections. In: ACM International Conference on
Multimedia Retrieval, Dallas, TX
Zeimpekis D, Gallopoulos E (2006) TMG: A MATLAB Toolbox for Generating
Term-Document Matrices from Text Collections. In “Grouping Multidimen-
sional Data: Recent Advances in Clustering”, J Kogan, C Nicholas and M
Teboulle, eds pp 187–210
|
1605.04374 | 1 | 1605 | 2016-05-14T04:01:49 | Online learning for Social Spammer Detection on Twitter | [
"cs.SI"
] | Social networking services like Twitter have been playing an import role in people's daily life since it supports new ways of communicating effectively and sharing information. The advantages of these social network services enable them rapidly growing. However, the rise of social network services is leading to the increase of unwanted, disruptive information from spammers, malware discriminators, and other content polluters. Negative effects of social spammers do not only annoy users, but also lead to financial loss and privacy issues. There are two main challenges of spammer detection on Twitter. Firstly, the data of social network scale with a huge volume of streaming social data. Secondly, spammers continually change their spamming strategy such as changing content patterns or trying to gain social influence, disguise themselves as far as possible. With those challenges, it is hard to directly apply traditional batch learning methods to quickly adapt newly spamming pattern in the high-volume and real-time social media data. We need an anti-spammer system to be able to adjust the learning model when getting a label feedback. Moreover, the data on social media may be unbounded. Then, the system must allow update efficiency model in both computation and memory requirements. Online learning is an ideal solution for this problem. These methods incrementally adapt the learning model with every single feedback and adjust to the changing patterns of spammers overtime. Our experiments demonstrate that an anti-spam system based on online learning approach is efficient in fast changing of spammers comparing with batch learning methods. We also attempt to find the optimal online learning method and study the effectiveness of various feature sets on these online learning methods. | cs.SI | cs | Noname manuscript No.
(will be inserted by the editor)
Online Learning for Social Spammer Detection on Twitter
Phuc Tri Nguyen · Hideaki Takeda
6
1
0
2
y
a
M
4
1
]
I
S
.
s
c
[
1
v
4
7
3
4
0
.
5
0
6
1
:
v
i
X
r
a
Received: date / Accepted: date
Abstract Social networking services like Twitter have
been playing an import role in people's daily life since
it supports new ways of communicating effectively and
sharing information. The advantages of these social net-
work services enable them rapidly growing. However,
the rise of social network services is leading to the in-
crease of unwanted, disruptive information from spam-
mers, malware discriminators, and other content pol-
luters. Negative effects of social spammers do not only
annoy users, but also lead to financial loss and privacy
issues. There are two main challenges of spammer detec-
tion on Twitter. Firstly, the data of social network scale
with a huge volume of streaming social data. Secondly,
spammers continually change their spamming strategy
such as changing content patterns or trying to gain so-
cial influence, disguise themselves as far as possible.
With those challenges, it is hard to directly apply tra-
ditional batch learning methods to quickly adapt newly
spamming pattern in the high-volume and real-time so-
cial media data. We need an anti-spammer system to
be able to adjust the learning model when getting a la-
bel feedback. Moreover, the data on social media may
be unbounded. Then, the system must allow update
efficiency model in both computation and memory re-
quirements. Online learning is an ideal solution for this
problem. These methods incrementally adapt the learn-
ing model with every single feedback and adjust to the
changing patterns of spammers overtime. Our experi-
Phuc Tri Nguyen
University of Information Technology,
Ho Chi Minh, Vietnam
E-mail: [email protected]
Hideaki Takeda
National Institute of Informatics
Tokyo, Japan
E-mail: [email protected]
ments demonstrate that an anti-spam system based on
online learning approach is efficient in fast changing of
spammers comparing with batch learning methods. We
also attempt to find the optimal online learning method
and study the effectiveness of various feature sets on
these online learning methods.
Keywords Social spammer detection · Online
learning · Twitter
1 Introduction
Social network services like Twitter have been played a
major role in people's daily life. It offers a convenient
and efficient way to communicate and disseminate in-
formation. Individuals use Twitter to tweet anything
about their concern such as news, jokes, or even their
feeling. Companies and organizations use Twitter as
an effective channel to connect with their customers,
promote or sell their products. With these advantages,
Twitter has been increasingly used for large-scale in-
formation dissemination in various fields of human life
such as marketing, journalism or public relations.
Nevertheless, the popularity of Twitter has led to the
rise of unwanted, disruptive information from social
spammers. Twitter spammers (Wikipedia, 2016) are de-
fined as malicious users who try to gain social influence
and generate spamming contents which negatively im-
pact on legitimate users. Spammers are motivated to
launch various of attacks such as stealing personal in-
formation of users (Bilge et al, 2009), spreading viruses,
malware (Grier et al, 2010), phishing attacks, or com-
promise suspicious fake followers. Social spammers do
not only annoy users, but also lead to financial loss and
2
Phuc Tri Nguyen, Hideaki Takeda
privacy issues of users. Therefore, the problem of so-
cial spamming is a serious issue prevalent on Twitter.
Characterizing and detecting social spammers can keep
Twitter as a spam-free environment and improve the
quality of user experiences.
There are two main challenges of spammer detection
on Twitter.
1. The first challenge is how to process an enormous
amount of Twitter data. Today, Twitter services
handle more than 2.8 billion requests and store 4.5
petabytes of time series data every minutes (Twit-
ter, 2016). We need an approach that can be able
to scale up to handle a huge volume of data with
limited computation capacity.
2. Fast change of spamming patterns is the second
challenge. The social spammer detection usually seems
like a endless game between spammers and anti-
spam systems. Spammers continually change their
spamming strategy to fool the anti-spam systems.
An approach that can be able to adapt to the com-
plex, and fast changing of data is needed.
There were some previous studies on the Twitter spam-
mer detection for years. Their approaches address this
problem as the task of classifying a Twitter user into
a spammer or a legitimate user. By analytic the spam-
mers behaviors, they proposed effective features which
related to content-based and network-based of users
and then built a traditional batch learning model to
detect spammers for future data. However, such batch
learning models are less efficient due to rapid changing
and quick evolution of spammers. Moreover, because of
limited resources, it is very expensive if we gather all
spamming patterns from batches to train the learning
model.
One efficient approach for the fast evolve and large-
scale of social spammer detection on Twitter is online
learning. The online learning method continually up-
dates the existing model while data arrives, as opposed
to batch learning techniques which learn from the en-
tire data. In this paper, we study how to apply online
learning on the social spammer detection on Twitter.
Our experiment on Honey Pot dataset (Lee et al, 2011)
and 1KS-10KN (Yang et al, 2012) dataset indicate the
effectiveness of the online learning approach for this
problem.
The main contributions of our work are outlined as fol-
lows:
1. Successfully apply online learning for the problem
of social spammer detection on Twitter. Our ex-
periments show that online learning approaches ef-
ficiently reflect with the fast changing of data.
2. Find an optimal online learning method for social
spammer detection on Twitter. We evaluated 16 on-
line learning algorithms and find the Soft Confident-
Weight algorithm achieves the best performance.
3. Evaluate the effectiveness of four different feature
sets when applying online learning on this problem.
The best result was observed by the combination of
2 sets of user network features and user activities
features. This results indicated that user profile fea-
tures and user content features are less robust than
user network features and user activities features.
The remaining of this report is organized as follows.
In the next section, we will present a brief overview of
related works on spammer detection. A description of
the methodology applied will be described in Section 3.
Then an experimental study showing the effectiveness
of online learning is presented in Section 4. Finally, we
conclude and discuss future work in Section 5.
2 Related Works
2.1 Spammer detection in other platforms
Spammers have been around us since the beginning of
the electronic communication and adapted through the
development of technology. Spam detection problem is
a serious issue, and it has been studied for years on
various platforms such as SMS (G´omez Hidalgo et al,
2006), email (Blanzieri and Bryl, 2008), and the Web
(Webb, 2006). A popular and well-developed approach
for spam detection is based on machine learning tech-
niques. They extracted effective features from historical
data and built a supervised learning model. This model
will be used to classify new data as either spam or le-
gitimate user/message.
2.2 Spammer detection on Twitter
As a result of the popularity of social media like Twit-
ter, spammers are turning into the fast growing in this
platform. There were some previous studies to tackle
this problem.
Some studies focus on analyzing the spammer charac-
teristics on Twitter. (Yardi et al, 2009) explored the be-
havior of spammers from the entire life cycle of #robot-
pickupline hashtag. According to their observations, spam-
mers tend to send more messages and network interac-
tion with others. Thus, the higher ratio of followers to
followings of a user have, the higher probability that
Online Learning for Social Spammer Detection on Twitter
3
the user is a spammer. (Grier et al, 2010) studied per-
spective of spammers and click-through behaviors. Ad-
dition, they had already evaluated the effectiveness of
backlists to prevent spamming. (Thomas et al, 2011b)
collected the suspended accounts in 7 months from Au-
gust 2010 to March 2011 and then they studied the
characteristic of spammer account, tweet behavior, and
spam campaign. (Ghosh et al, 2012) focused on the link
farm on Twitter by analyzing the suspended accounts.
They observed that most of the link farms came from
new users. They also proposed Collusion Rank to de-
mote the ranking of link farms on Twitter.
(Benevenuto et al, 2010) addressed the study of spam-
mer detection on Twitter trending topics. They used an
SVM classifier to distinguish between spammers and le-
gitimate users based on the basic of tweet contents and
user profile information. Using the social honeypot to
collected spammers is an interested work studied by
(Lee et al, 2010, 2011). After analysis spammer behav-
ior, they extracted user profile features and user net-
work features and built a supervised learning classifier
to identify spammers. However, the approach requires
a lot of time for observation spamming evidence. Addi-
tion, the collected data is often biased because it was
only received content polluted from active spammers
who was following the honeypot accounts.
(Yang et al, 2011) observed that the proposed features
from previous works were less effective with the evolv-
ing of spammers. They utilized ten new features for
spammer detection on Twitter and evaluated these fea-
tures with the existing ones. Their experiments indi-
cated that using their new features give a better result
for spammer detection problem. (Ferrara et al, 2014)
used the information related to tweet content, user net-
work, sentiment, and temporal patterns of activity for
detecting Twitter bots. Some approaches have assessed
the safety or suspiciousness of URLs in tweets as a mean
to identify spam tweets (Thomas et al, 2011a; Cao and
Caverlee, 2015; Wang et al, 2013; Lee and Kim, 2012).
More recent work has investigated the relationship be-
tween automation and spamming. In the study of (Am-
leshwaram et al, 2013), a system for automated spam-
mers detection is described. Features related to automa-
tion have been exploited to adapt to the changing struc-
ture of Twitters spammers population. An analysis of
automated activity on Twitter was presented on (Chu
et al, 2010), and a system that detects the automation
of an account is described in (Chu et al, 2012).
Previous works on spam detection on Twitter can be
summarized as follows: collecting and analyzing spam-
mer behaviors, define and extracting effective features,
using supervised learning algorithms to build the sta-
tistical classifier to detect spammers. However, the be-
havior of spammers changes too fast in social media. It
is hard for the batch-learning system to adapt to the
evolving of spammers.
3 Online Learning for Social Spam Detection
To detect spammer on Twitter, we propose a framework
based on online supervised classification method. The
classify model will be incrementally updated real-time.
The overall framework is presented in the Fig 1. In the
training step, given m users with their identity label,
the system will extract the features vector of each user.
The detail of the extracted features will be talking in
the feature represent spammers or legitimate users. Fea-
ture vectors and identity labels will be used to built the
classifier model Hm. Given one more user, the feature
extraction module will be used to extract the features
of the user and update classifier model Hm to Hm+1.
3.1 Features represent spammers or legitimate users
A spammer and a legitimate user have motivation dif-
ferently in posting tweets or doing social activities. We
can assume that the characteristics of spammers are
quite different to legitimate users. The features to present
a user include profile, social networks, activities and
content of posted tweets.
3.1.1 User profile features
The profile features are extracted from a user's Twitter
profile and consist of:
– the length of screen name
– whether the user profile has a description, the length
of description
– whether the user profile has a URL
– the longevity (age) of an account (hours, days, weeks)
3.1.2 User networks features
The following features are used to characterize a user's
social networks which mainly extracted from friendship
information.
– number of users following (friends)
– number of followers
– the ratio of number of following to number of fol-
lowers
4
Phuc Tri Nguyen, Hideaki Takeda
Fig. 1: The online learning framework for spammer detection on Twitter
– the reputation of a user which is calculated by the
ratio between the number of followers and the total
number of followers and following. User's reputation
=
f ollowers
f ollowing+f ollowers
– the following rate which is calculated the ratio be-
tween number of following and the longevity of ac-
count (hours, days, weeks)
– the followers rate which is calculated the ratio be-
tween number of followers and the longevity of ac-
count (hours, days, weeks)
– number of bidirectional friend f ollowing∩ f ollowes
– the percentage of bidirectional friends with follow-
ing f ollowing∩f ollowes
f ollowing
f ollowing∩f ollowes
– the percentage of bidirectional friends with followers
f ollowes
– the standard deviation of followings
– the standard deviation of followers
3.1.3 User activity features
These features category capture user's social activities
such as posted tweets or retweets.
– number of posted tweets
– number of posted tweets per hours, days, weeks
– number of content similarity of posted tweets by a
user.
– number of direct mentions (e.g., @username) per
posted tweet
– number of direct mentions (e.g., @username) per
hours, days, weeks
– number of URLs per tweet
– number of URLs per hours, days, weeks
– number of hashtags per tweet
– number of hashtags per hours, days, weeks
– number of retweets per tweet
– number of retweets per hours, days, weeks
3.1.4 User content features
Capture the linguistic properties of the text of each
tweet such as part-of-speech tagging, the number of
spam words from spamming words dictionary 1, Lin-
guistic Inquiry and Word Count (LIWC) and sentiment
features.
– Part-of-speech tagging provides the syntactic infor-
mation of a sentence and has been used in the nat-
ural language processing for measuring text infor-
mativeness. In detail implementation, we use the
Twitter-specific tagger (Gimpel et al, 2011).
– Number of spam words is generated by matching a
famous list of spam words. This list contains over
21,000 phrases, patterns, and keywords commonly
used by spammers and comment bots in usernames,
email addresses, link text. Since the masking be-
havior can dramatically decrease the proportion of
spam tweets in a spamming account, applying this
feature on an account content may not be helpful in
detecting complex spamming accounts.
– LIWC dictionary is used to analyze text statisti-
cally and find psychologically-meaningful categories
(Pennebaker et al, 2001). There are 68 defined cate-
gories in LIWC dictionary. We use LIWC dictionary
to compute 68 user's personality features. These
features may help to determine the personality of
spammers or legitimate users.
– In psychological, the micro expressions (Matsumoto
and Hwang, 2011) play a distinct role in detecting
deception. Inspired by this work, I explore the senti-
ment information could help capture deceptions of
spammers. In this work, I use the list of lexicons
from (Dodds et al, 2011) for generating the senti-
ment features.
1 https://github.com/splorp/wordpress-comment-blacklist
Classifier HmUsersLabelsvectorsUserLabelvectormm+1Classifier Hm+1UservectorPredicted LabelInputFeature extractionInputFeature extractionTrainUpdateTraining stepPredicting stepOutputOnline Learning for Social Spammer Detection on Twitter
5
3.2 Online learning algorithms
Table 1: Statistics of 2 two datasets: Honey Pot (Lee
et al, 2011) and 1KS-10KN (Yang et al, 2012)
This section briefly presents the online learning algo-
rithms which we use for our evaluation. Informal, the
online learning algorithms are trying to solve an online
classification problem over a sequence of pairs {(x1, y1),
(x2, y2), ..., (xm, ym)}, where each xm is an example's
feature vector and ym ∈ {0, 1} is its label. At each step
m during training, the algorithm makes a label pre-
diction hm(xm), which for linear classifier is hm(x) =
sign(wmx).
After making a prediction, the algorithm receives the
actual label ym. Then the algorithms compute the loss
l(ym, ym) based on some criterion to measure the differ-
ence between the prediction and the revealed true label
ym. The learner finally decides when and how to update
the classification model at the end of each learning step
bases on the result of the loss function.
In this paper, we have no vested interest in any par-
ticular strategy for online learning. We simply focus on
the application of online learning on the problem social
spammer detection on Twitter.
In our experiment, we use the LIBOL an online learn-
ing tool which was developed by (Hoi et al, 2014). This
tool consists of existing state-of-the-art online learning
algorithms for large-scale online classification tasks. In
details, these online learning algorithms can be grouped
into two following categories: first-order online learning
algorithms and second-order online learning algorithms.
First-order online learning algorithms include the algo-
rithms that only keep updating one classification func-
tion. The examples algorithms in this categories are fol-
lowing:
– Perceptron: the classical online learning algorithm
(Rosenblatt, 1958)
Spammers
Legitimate Users
# Users # Tweets # Users # Tweets
Honey Pot
22,223
2,353,473
19,276
3,259,693
1KS-10KN
1,000
145,095
10,000
1,209,521
space d. The examples algorithms in this categories are
following:
– SOP: the Second Order Perceptron algorithm (Cesa-
Bianchi et al, 2005)
– CW: the Confidence-Weight learning algorithm (Cram-
mer et al, 2009a)
– IELLIP: the online learning algorithms by improved
ellipsoid method (Yang et al, 2009)
– ARROW: the Adaptive Regularization of Weight
Vectors algorithm (Crammer et al, 2009b)
– NARROW: the New variant of Adaptive Regular-
ization (Orabona and Crammer, 2010)
– NHERD: the Normal Herding method via Gaussian
Herding (Crammer and Lee, 2010)
– SCW: the Soft Confidence Weight algorithms (Wang
et al, 2012)
4 Experiments
In this section, we conduct the experiments to evalu-
ate the effectiveness of online learning over the social
spammer detection on Twitter. To demonstrate the ef-
fectiveness of online learning, we address the following
questions:
1. What is the accuracy of online learning methods
compare with the batch learning methods on the
single dataset?
– ALMA: the Approximate Maximal Margin algorithm
2. Do online learning algorithms provide a better adap-
(Gentile, 2002)
tation on the data distribution changing?
– ROMMA: the Relaxed Online Maximum Margin al-
3. Which online algorithms are most appropriate for
gorithm (Li and Long, 2002)
our application?
– OGD: the Online Gradient Descent algorithm (Zinke-
vich, 2003)
– PA: the Passive Aggressive algorithm (Crammer et al,
4. How about the effectiveness of four different fea-
ture sets when applying online learning on the social
spammer detection on Twitter?
2006)
Second-order online learning algorithms have been ex-
plored in recent years. The major family of this cat-
egories assume the weight vector follows a Gaussian
distribution w ∼ N (µ, Σ) with mean vector µ ∈ Rd,
covariance matrix Σ ∈ Rd×d and dimensional vector
4.1 Datasets
In our experiments, we use two Twitter datasets. The
statistics of two datasets are presented in Table 1.
6
Phuc Tri Nguyen, Hideaki Takeda
4.1.1 Social Honeypot Dataset:
Table 2: Effectiveness of online learning on single
dataset
(Lee et al, 2011) created 60 Tweeter accounts to attract
spammers. After seven months, from December 2009
to August 2010, his team collected the information of
41,499 users and 5,613,166 their tweets. 22,223 users
were labeled as spammers and 19,276 legitimate users.
The ratio of spammers to legitimate users is around 1:1.
4.1.2 1KS-10KN Dataset:
This dataset was collected by (Yang et al, 2012) from
April 2010 to July 2010. This dataset contains the in-
formation of 11,000 users and 1,354,616 their tweets.
They labeled 1,000 users as spammers and 10,000 legit-
imate users. The ratio of spammers to legitimate in the
1KS-10KN data is 1:10.
In two dataset, we don't have the information about
the changing of network information of users through a
specific time interval. We only have a snapshot of net-
work information at the ending of collected data. For
our work, we adapted the datasets with our purpose by
randomly splitting each dataset to 20 parts and consid-
ering each part as a time interval.
4.2 Effectiveness of Online learning on single dataset
In this section, we start by evaluating the effectiveness
of online learning over the batch learning method re-
garding classification cumulative error rate on Honey
Pot dataset and 1KS-10KN dataset. A lower the cu-
mulative error rate means the better performance. In
details, we compare two online learning algorithms -
SCW (Wang et al, 2012) and ALMA (Gentile, 2002)
against two different training set configurations of the
batch learning - Random Forest algorithms. We choose
the batch learning - Random Forest algorithm because
it was produced the highest performance on previous
researches: (Lee et al, 2011; Yang et al, 2011). 2 on-
line learning algorithms: SCW (Wang et al, 2012) and
ALMA (Gentile, 2002) were chosen because they gave
the lowest and second-lowest cumulative error rate in
our experiments which will be presented in Table 4. As-
suming that our system can only process one part of the
dataset, we conduct experiments to every single part of
data.
Figure 2 and Table 2 shows the classification cumu-
lative error rates for online learning method and batch
learning method on Honey Pot dataset and 1KS-10KN
dataset. The x-axis shows the percentage of the dataset
%
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
HoneyPot
1KS-10KN
RF1
0.101
0.102
0.101
0.099
0.099
0.099
0.098
0.098
0.097
0.097
0.096
0.097
0.096
0.095
0.095
0.096
0.096
0.096
0.096
RF-2
0.098
0.095
0.091
0.090
0.091
0.090
0.089
0.090
0.089
0.089
0.089
0.090
0.089
0.089
0.090
0.090
0.090
0.090
0.091
SCW ALMA RF-1 RF-2
0.020
0.104
0.018
0.099
0.015
0.094
0.014
0.092
0.015
0.089
0.015
0.090
0.088
0.016
0.015
0.088
0.015
0.087
0.014
0.087
0.014
0.087
0.014
0.087
0.086
0.014
0.015
0.086
0.015
0.086
0.015
0.086
0.015
0.086
0.015
0.086
0.086
0.015
0.112
0.108
0.105
0.102
0.099
0.099
0.098
0.099
0.098
0.099
0.099
0.099
0.099
0.099
0.099
0.099
0.099
0.099
0.100
0.018
0.014
0.013
0.012
0.013
0.014
0.014
0.013
0.013
0.012
0.012
0.012
0.012
0.012
0.012
0.013
0.013
0.013
0.013
SCW ALMA
0.055
0.038
0.053
0.030
0.048
0.025
0.044
0.021
0.044
0.019
0.044
0.019
0.018
0.044
0.042
0.017
0.040
0.016
0.039
0.016
0.037
0.015
0.035
0.014
0.014
0.033
0.032
0.014
0.032
0.014
0.031
0.014
0.030
0.014
0.029
0.014
0.014
0.029
and the y-axis shows the cumulative error rate: per-
centage of miss-classified examples for all user up to
this part. The RF-1 represent using the batch learning
- Random Forest to train once on the first part of 20
splitting data. Then the model will be used to test on
all the remaining parts. The RF-2 uses the same setting
with RF-1 but retrain the model for every interval. For
example, RF-2 train on part 2 of dataset and test on
part 3. SCW and ALMA are 2 online learning used to
make a single update over a cumulative training data.
In our experiment on single dataset, the distribution
of data does not change much since we do not have the
real streaming data on social spammer detection. We
try to adapt the data Honey Pot and 1KS-10KN with
our purpose. At the beginning part of data, the cumula-
tive error rate of two online learning algorithms: SCW
and ALMA are lower than batch learning: RF-1 and
RF-2. However, the next results on the remaining parts
show that SCW and ALMA faster reduce the cumula-
tive error rate than batch learning. It means that online
learning gives a more rapid adaptability when testing
with other parts of data.
These results tested on single dataset indicate that on-
line learning can give a comparable result with batch-
learning when the distribution of data does not change
much. Although online learning does not achieve the
better result compare with batch learning techniques,
it allows faster adapt to new data.
Online Learning for Social Spammer Detection on Twitter
7
(a) Honey Pot dataset
(b) 1KS-10KN dataset
Fig. 3: Effectiveness of Online learning on combine
dataset
new data from the 1KS-10KN dataset. In RF-2, the
classifier will be re-trained from the prior interval, gave
the better performance than RF-1. It means that the
new data eventually can help to reduce the cumulative
error rate. However, online learning algorithms - SCW
and ALMA gave the better adaptability with the chang-
ing of data distribution since it gave the lowest cumula-
tive error rate compare with the batch-learning method.
The experiment results show that online learning very
appropriate with the fast changing of spammers.
Fig. 2: Effectiveness of online learning on single dataset
4.4 Which online algorithms are most appropriate for
social spammer detection
4.3 Effectiveness of Online learning on combine
dataset
In the real world problem, social spammers always change
their spamming strategy; it makes rapid changing in
the distribution of data. It explained why we study the
ability to adapt to the changing distribution when to
combine two datasets. We use the same online learn-
ing algorithms and two setting of batch learning in the
previous section and evaluate on the combined dataset.
In particular, this dataset contains 20 first parts from
Honey Pot dataset and 20 next parts from 1KS-10KN
dataset.
Figure 3 show the result of social spammer detection
on the combine of Honey Pot and 1KS-10KN dataset.
In the RF-1, the cumulative error rate becomes signifi-
cant increase when testing on data from 1KS-10KN. It
is indicated the classifier model fail to detect spammers
when data distribution changes. If we want to achieve
better accuracy, we need to retrain the model with the
In this section, we evaluate which of the online learning
algorithms are the best suited to the social spammer
detection. We tested 16 online learning algorithms im-
plemented using the LIBOL tool. All of the experiments
run on the combined dataset discussed in the previous
section.
Table 4 shown the comparison of the performance of
online learning algorithms. We find that the cumula-
tive error rate ranged from 0.265 to 0.071. The Soft
Confidence-Weight showed the best performance com-
pare with the other online learning algorithms.
4.5 Effectiveness of various feature set combinations
In this section, we trained 2 online learning (SCW-
the highest performance and ALMA-the second-highest
performance) with different feature sets (e.g. UP: User
Profile features, UN: User Network features, UA: User
Activities features, UC: User Content features) and var-
ious combination of the feature sets on the mixture of
Cumulative error rate (%)8%9%10%10%11%12%Percentage of Dataset
10%20%30%40%50%60%70%80%90%100%RF-1RF-2SCWALMACumulative error rate (%)1%2%3%4%5%6%Percentage of Dataset
10%20%30%40%50%60%70%80%90%100%RF-1RF-2SCWALMACumulative error rate (%)7%14%21%28%35%42%HoneyPot Dataset 1KS-10KN Dataset
Percentage of Dataset
20%40%60%80%100%20%40%60%80%100%RF-1RF-2SCWALMA8
Phuc Tri Nguyen, Hideaki Takeda
Table 4: Performance comparison of online learning algorithms
n
o
r
t
p
e
c
r
e
P
%
10% 0.137
15% 0.129
20% 0.125
25% 0.126
30% 0.123
35% 0.124
40% 0.122
45% 0.122
50% 0.120
55% 0.121
60% 0.121
65% 0.121
70% 0.121
75% 0.122
80% 0.122
85% 0.122
90% 0.123
95% 0.123
100% 0.123
5%
0.129
10% 0.134
15% 0.135
20% 0.134
25% 0.134
30% 0.135
35% 0.132
40% 0.130
45% 0.129
50% 0.128
55% 0.129
60% 0.126
65% 0.124
70% 0.122
75% 0.121
80% 0.119
85% 0.119
90% 0.119
95% 0.117
100% 0.115
A
M
M
O
R
0.164
0.150
0.148
0.150
0.151
0.152
0.150
0.151
0.150
0.152
0.153
0.154
0.155
0.155
0.157
0.157
0.158
0.158
0.159
0.162
0.164
0.165
0.166
0.166
0.166
0.170
0.170
0.171
0.171
0.174
0.172
0.172
0.173
0.174
0.176
0.178
0.177
0.178
0.180
A
M
M
O
R
a
0.168
0.155
0.154
0.155
0.156
0.158
0.158
0.159
0.158
0.159
0.160
0.162
0.163
0.162
0.162
0.163
0.164
0.164
0.165
0.166
0.168
0.169
0.170
0.168
0.167
0.170
0.169
0.169
0.169
0.171
0.169
0.168
0.169
0.169
0.170
0.173
0.174
0.175
0.176
A
M
L
A
0.107
0.102
0.099
0.098
0.096
0.097
0.096
0.096
0.096
0.096
0.096
0.097
0.097
0.097
0.097
0.097
0.098
0.098
0.098
0.109
0.108
0.108
0.105
0.103
0.100
0.098
0.096
0.093
0.091
0.089
0.086
0.084
0.082
0.080
0.079
0.077
0.075
0.074
0.072
D
G
O
0.095
0.096
0.092
0.090
0.088
0.089
0.087
0.087
0.086
0.085
0.086
0.086
0.085
0.085
0.086
0.086
0.086
0.085
0.086
0.102
0.116
0.128
0.135
0.141
0.147
0.152
0.156
0.158
0.162
0.165
0.166
0.167
0.167
0.168
0.168
0.168
0.168
0.167
0.166
t
o
P
y
e
n
o
H
N
K
0
1
-
S
K
1
A
P
0.145
0.143
0.140
0.137
0.137
0.138
0.135
0.136
0.136
0.136
0.135
0.136
0.136
0.135
0.135
0.135
0.136
0.136
0.136
0.135
0.133
0.130
0.128
0.124
0.122
0.120
0.118
0.116
0.114
0.114
0.112
0.110
0.110
0.109
0.108
0.108
0.107
0.106
0.107
1
A
P
2
A
P
0.126
0.128
0.127
0.126
0.125
0.126
0.123
0.124
0.123
0.124
0.123
0.123
0.123
0.123
0.122
0.123
0.123
0.123
0.123
0.123
0.120
0.117
0.113
0.110
0.107
0.104
0.101
0.099
0.096
0.095
0.092
0.090
0.088
0.086
0.085
0.084
0.083
0.081
0.080
0.131
0.132
0.130
0.128
0.126
0.129
0.125
0.126
0.125
0.125
0.125
0.125
0.125
0.125
0.125
0.125
0.125
0.125
0.126
0.125
0.123
0.120
0.118
0.115
0.112
0.110
0.109
0.107
0.105
0.105
0.103
0.100
0.100
0.099
0.098
0.098
0.097
0.096
0.097
P
O
S
0.137
0.131
0.127
0.123
0.120
0.121
0.118
0.118
0.118
0.118
0.117
0.118
0.118
0.119
0.120
0.120
0.121
0.121
0.121
0.124
0.129
0.130
0.132
0.131
0.130
0.131
0.130
0.128
0.129
0.128
0.126
0.124
0.123
0.123
0.122
0.122
0.121
0.119
0.118
P
I
L
L
E
I
0.165
0.159
0.156
0.154
0.154
0.155
0.152
0.153
0.152
0.153
0.153
0.154
0.154
0.154
0.153
0.154
0.155
0.155
0.155
0.155
0.153
0.151
0.148
0.144
0.142
0.141
0.139
0.138
0.135
0.136
0.134
0.131
0.132
0.131
0.130
0.130
0.129
0.129
0.129
W
C
0.148
0.146
0.147
0.146
0.145
0.150
0.149
0.151
0.152
0.154
0.154
0.155
0.156
0.156
0.157
0.158
0.159
0.159
0.161
0.155
0.151
0.147
0.144
0.140
0.137
0.135
0.132
0.131
0.129
0.128
0.127
0.124
0.124
0.123
0.121
0.121
0.120
0.118
0.118
D
R
E
H
N
0.097
0.097
0.093
0.090
0.087
0.088
0.087
0.087
0.086
0.086
0.086
0.086
0.086
0.085
0.086
0.086
0.086
0.086
0.086
0.100
0.110
0.122
0.130
0.138
0.146
0.153
0.158
0.163
0.170
0.175
0.179
0.182
0.185
0.189
0.192
0.196
0.200
0.202
0.204
W
O
R
A
0.093
0.092
0.089
0.088
0.085
0.086
0.085
0.085
0.084
0.084
0.084
0.084
0.083
0.083
0.084
0.084
0.084
0.084
0.085
0.096
0.104
0.116
0.124
0.130
0.136
0.142
0.147
0.150
0.156
0.160
0.163
0.165
0.166
0.169
0.171
0.173
0.175
0.176
0.176
W
O
R
A
N
0.103
0.104
0.102
0.102
0.098
0.098
0.097
0.097
0.096
0.096
0.096
0.096
0.095
0.095
0.095
0.095
0.095
0.095
0.095
0.111
0.125
0.138
0.148
0.158
0.168
0.177
0.185
0.193
0.202
0.209
0.216
0.221
0.227
0.233
0.240
0.245
0.251
0.256
0.262
W
C
S
0.105
0.098
0.094
0.093
0.091
0.091
0.089
0.089
0.087
0.087
0.087
0.087
0.087
0.087
0.087
0.087
0.087
0.087
0.087
0.096
0.098
0.098
0.098
0.097
0.095
0.094
0.092
0.089
0.088
0.086
0.084
0.082
0.080
0.079
0.077
0.076
0.074
0.073
0.071
2
W
C
S
0.104
0.101
0.098
0.099
0.097
0.097
0.095
0.095
0.094
0.094
0.093
0.093
0.093
0.093
0.094
0.094
0.094
0.093
0.094
0.110
0.125
0.140
0.151
0.163
0.175
0.184
0.193
0.200
0.209
0.217
0.224
0.229
0.235
0.241
0.246
0.251
0.257
0.261
0.265
Honey Pot dataset and 1KS-10KN dataset. The experi-
ment results are reported in Figure 4, Table 5 and Table
6.
The result of social spammer detection by using SCW
algorithm and ALMA algorithm are quite similar. The
result of user profile features and user content features
lower than user network features and user activity fea-
tures when using a single feature set. It is consistent
because social spammers are easy to fake their profile as
a normal user on Twitter. Moreover, spammers quickly
change their content information. It makes the user con-
tent features become noisy and less efficient.
In all of the experiments, the result of the combination
of user network features and user activity features gives
the best result in term of cumulative error rate 0.068 by
using SCW algorithm and 0.056 by using ALMA. These
results indicate that this two kind of features set are
robustness with the changing spamming patterns and
stable across the choice of online learning algorithms.
5 Conclusion and Future Work
The social spammer detection on Twitter is sophisti-
cated and adaptable to game the system by contin-
ually change their content and network patterns. To
handle fast evolving social spammers, we suggest us-
ing the online learning incrementally update classifier
model when the newly spamming pattern occurred. Our
experiment results show that the approach is effective
in dynamically changing spamming strategies of spam-
mers comparing with other batch learning method. Ad-
ditionally, we address that the online learning - Soft
Confident-Weight achieve the best result compare with
other online algorithms. We also studied the effective-
ness of four feature sets on two online learning algo-
rithms - SCW and ALMA. The experiments show that
user network features and user activities features are
more robustness than user profile features and user con-
tent features and stable across online learning algo-
rithms.
In near future, the amount of available data has risen
Online Learning for Social Spammer Detection on Twitter
9
Table 5: Evaluation of various feature set combinations on the SCW algorithm
%
P
U
N
U
A
U
C
U
10% 0.354
15% 0.365
20% 0.360
25% 0.362
30% 0.359
35% 0.360
40% 0.358
45% 0.359
50% 0.357
55% 0.358
60% 0.358
65% 0.359
70% 0.359
75% 0.360
80% 0.361
85% 0.359
90% 0.359
95% 0.360
100% 0.360
5%
0.369
10% 0.376
15% 0.381
20% 0.387
25% 0.391
30% 0.396
35% 0.400
40% 0.405
45% 0.410
50% 0.411
55% 0.414
60% 0.417
65% 0.421
70% 0.424
75% 0.426
80% 0.428
85% 0.430
90% 0.432
95% 0.434
100% 0.435
0.152
0.150
0.147
0.146
0.145
0.146
0.146
0.145
0.143
0.143
0.143
0.143
0.143
0.142
0.142
0.142
0.142
0.143
0.143
0.138
0.133
0.128
0.123
0.119
0.114
0.111
0.107
0.104
0.101
0.098
0.095
0.092
0.090
0.088
0.086
0.084
0.082
0.080
0.079
0.214
0.204
0.203
0.204
0.202
0.201
0.199
0.201
0.200
0.199
0.199
0.199
0.198
0.199
0.199
0.198
0.198
0.197
0.198
0.206
0.202
0.197
0.192
0.186
0.181
0.176
0.170
0.165
0.160
0.155
0.151
0.147
0.143
0.139
0.136
0.132
0.129
0.126
0.123
0.188
0.184
0.183
0.184
0.182
0.182
0.179
0.179
0.178
0.177
0.176
0.176
0.176
0.177
0.177
0.176
0.176
0.176
0.175
0.196
0.211
0.223
0.234
0.243
0.249
0.254
0.260
0.266
0.270
0.274
0.277
0.279
0.281
0.284
0.286
0.288
0.289
0.290
0.290
t
o
P
y
e
n
o
H
N
K
0
1
-
S
K
1
N
U
+
P
U
0.133
0.137
0.133
0.132
0.130
0.131
0.130
0.130
0.128
0.128
0.127
0.128
0.127
0.127
0.127
0.127
0.127
0.128
0.128
0.132
0.127
0.122
0.118
0.113
0.109
0.106
0.102
0.099
0.096
0.094
0.091
0.089
0.087
0.085
0.082
0.081
0.079
0.078
0.076
A
U
+
P
U
0.204
0.195
0.193
0.193
0.191
0.192
0.191
0.192
0.191
0.191
0.190
0.190
0.190
0.190
0.191
0.189
0.189
0.189
0.189
0.202
0.208
0.212
0.212
0.207
0.202
0.196
0.190
0.184
0.178
0.173
0.168
0.163
0.159
0.155
0.151
0.147
0.143
0.140
0.137
C
U
+
P
U
0.189
0.182
0.179
0.177
0.175
0.174
0.172
0.172
0.171
0.170
0.168
0.168
0.168
0.169
0.169
0.168
0.167
0.167
0.168
0.186
0.204
0.219
0.235
0.249
0.260
0.271
0.281
0.290
0.299
0.306
0.313
0.321
0.329
0.335
0.340
0.345
0.349
0.355
0.361
A
U
+
N
U
0.103
0.100
0.097
0.096
0.093
0.094
0.093
0.093
0.092
0.092
0.091
0.091
0.091
0.091
0.091
0.091
0.091
0.091
0.091
0.098
0.097
0.096
0.096
0.094
0.093
0.092
0.090
0.087
0.085
0.083
0.081
0.079
0.078
0.076
0.074
0.072
0.071
0.069
0.068
C
U
+
N
U
0.110
0.109
0.105
0.102
0.101
0.101
0.098
0.098
0.097
0.096
0.096
0.096
0.096
0.096
0.096
0.096
0.096
0.096
0.096
0.101
0.100
0.097
0.095
0.093
0.090
0.089
0.087
0.085
0.084
0.082
0.081
0.079
0.078
0.077
0.076
0.075
0.073
0.072
0.071
C
U
+
A
U
0.188
0.184
0.182
0.182
0.181
0.180
0.177
0.178
0.176
0.176
0.175
0.175
0.175
0.176
0.176
0.175
0.175
0.175
0.175
0.191
0.203
0.212
0.218
0.223
0.226
0.229
0.231
0.232
0.233
0.234
0.234
0.233
0.232
0.231
0.231
0.230
0.229
0.228
0.227
A
U
+
N
U
+
P
U
0.096
0.094
0.091
0.091
0.089
0.090
0.090
0.090
0.089
0.088
0.088
0.089
0.088
0.088
0.088
0.089
0.089
0.088
0.089
0.097
0.105
0.112
0.117
0.122
0.126
0.130
0.133
0.136
0.139
0.142
0.145
0.147
0.150
0.152
0.154
0.157
0.159
0.161
0.162
C
U
+
N
U
+
P
U
0.109
0.110
0.104
0.102
0.100
0.099
0.097
0.097
0.096
0.095
0.095
0.095
0.094
0.094
0.094
0.095
0.095
0.095
0.095
0.101
0.099
0.097
0.095
0.093
0.091
0.089
0.087
0.086
0.084
0.083
0.081
0.080
0.079
0.077
0.076
0.075
0.074
0.073
0.072
C
U
+
A
U
+
N
U
0.103
0.099
0.094
0.093
0.090
0.091
0.089
0.088
0.087
0.087
0.087
0.087
0.086
0.086
0.087
0.086
0.086
0.086
0.086
0.098
0.106
0.111
0.114
0.115
0.115
0.116
0.116
0.115
0.115
0.115
0.114
0.113
0.112
0.112
0.111
0.111
0.111
0.110
0.109
A
U
+
C
U
+
N
U
+
P
U
0.104
0.100
0.095
0.093
0.091
0.090
0.088
0.088
0.087
0.087
0.087
0.087
0.086
0.086
0.087
0.086
0.087
0.086
0.086
0.099
0.107
0.113
0.116
0.117
0.118
0.119
0.119
0.118
0.119
0.118
0.117
0.116
0.115
0.114
0.114
0.113
0.113
0.112
0.111
steadily. It imposes a computational burden on the sin-
gle system. In consequences, we need an approach can
be able to perform in a distributed fashion. With this
motivation, the future works will be focused on how to
build the scalable distributed spammer detection sys-
tem.
References
Amleshwaram AA, Reddy N, Yadav S, Gu G, Yang
C (2013) Cats: Characterizing automation of twit-
ter spammers. In: Communication Systems and Net-
works (COMSNETS), 2013 Fifth International Con-
ference on, IEEE, pp 1–10
Benevenuto F, Magno G, Rodrigues T, Almeida V
(2010) Detecting spammers on twitter. In: In Collab-
oration, Electronic messaging, Anti-Abuse and Spam
Conference (CEAS
Bilge L, Strufe T, Balzarotti D, Kirda E (2009) All
your contacts are belong to us: Automated identity
theft attacks on social networks. In: Proceedings of
the 18th International Conference on World Wide
Web, ACM, New York, NY, USA, WWW '09, pp
551–560, DOI 10.1145/1526709.1526784, URL http:
//doi.acm.org/10.1145/1526709.1526784
Blanzieri E, Bryl A (2008) A survey of learning-based
techniques of email spam filtering. Artif Intell Rev
29(1):63–92, DOI 10.1007/s10462-009-9109-6, URL
http://dx.doi.org/10.1007/s10462-009-9109-6
Cao C, Caverlee J (2015) Detecting spam urls in so-
cial media via behavioral analysis. In: Advances in
Information Retrieval, Springer, pp 703–714
Cesa-Bianchi N, Conconi A, Gentile C (2005) A second-
order perceptron algorithm. SIAM Journal on Com-
puting 34(3):640–668
Chu Z, Gianvecchio S, Wang H, Jajodia S (2010) Who
is tweeting on twitter: human, bot, or cyborg? In:
Proceedings of the 26th annual computer security ap-
plications conference, ACM, pp 21–30
10
Phuc Tri Nguyen, Hideaki Takeda
Table 6: Evaluation of various feature set combinations on the ALMA algorithm
%
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
P
U
N
U
A
U
C
U
0.359
0.362
0.360
0.360
0.359
0.360
0.359
0.360
0.357
0.359
0.359
0.360
0.360
0.359
0.359
0.357
0.356
0.357
0.357
0.364
0.370
0.375
0.379
0.381
0.383
0.385
0.385
0.387
0.389
0.391
0.391
0.391
0.390
0.390
0.390
0.390
0.389
0.389
0.386
0.137
0.140
0.135
0.134
0.131
0.132
0.132
0.132
0.130
0.131
0.130
0.130
0.130
0.129
0.130
0.130
0.130
0.130
0.131
0.144
0.152
0.158
0.160
0.161
0.159
0.157
0.153
0.148
0.143
0.139
0.135
0.132
0.129
0.126
0.123
0.120
0.118
0.115
0.113
0.227
0.216
0.213
0.213
0.213
0.212
0.210
0.211
0.211
0.211
0.210
0.211
0.210
0.211
0.212
0.211
0.210
0.210
0.210
0.203
0.194
0.185
0.178
0.171
0.164
0.158
0.153
0.148
0.143
0.138
0.134
0.130
0.127
0.123
0.120
0.117
0.114
0.112
0.109
0.205
0.203
0.202
0.200
0.198
0.197
0.193
0.196
0.194
0.194
0.193
0.193
0.193
0.193
0.193
0.192
0.192
0.193
0.193
0.198
0.198
0.197
0.196
0.194
0.191
0.189
0.186
0.184
0.182
0.181
0.178
0.176
0.174
0.172
0.170
0.169
0.168
0.166
0.165
t
o
P
y
e
n
o
H
N
K
0
1
-
S
K
1
N
U
+
P
U
0.132
0.135
0.131
0.131
0.128
0.129
0.127
0.127
0.126
0.126
0.126
0.126
0.125
0.125
0.125
0.125
0.125
0.125
0.125
0.139
0.149
0.156
0.160
0.162
0.161
0.160
0.157
0.152
0.148
0.144
0.140
0.137
0.134
0.131
0.128
0.125
0.123
0.120
0.117
A
U
+
P
U
0.207
0.196
0.196
0.196
0.194
0.196
0.194
0.197
0.196
0.197
0.196
0.196
0.196
0.196
0.196
0.195
0.195
0.195
0.195
0.198
0.191
0.183
0.175
0.168
0.162
0.157
0.151
0.146
0.141
0.137
0.133
0.129
0.125
0.122
0.119
0.116
0.113
0.110
0.108
C
U
+
P
U
0.201
0.194
0.192
0.190
0.186
0.185
0.180
0.183
0.182
0.183
0.181
0.182
0.182
0.182
0.182
0.180
0.180
0.180
0.181
0.191
0.193
0.193
0.192
0.190
0.188
0.186
0.184
0.182
0.180
0.179
0.177
0.175
0.173
0.171
0.169
0.168
0.166
0.165
0.163
A
U
+
N
U
0.101
0.103
0.100
0.100
0.097
0.099
0.098
0.098
0.097
0.097
0.096
0.096
0.096
0.096
0.097
0.097
0.097
0.098
0.098
0.100
0.096
0.092
0.088
0.085
0.082
0.079
0.077
0.074
0.072
0.070
0.068
0.066
0.064
0.063
0.061
0.060
0.059
0.058
0.056
C
U
+
N
U
0.126
0.123
0.120
0.118
0.115
0.113
0.111
0.111
0.110
0.109
0.109
0.109
0.108
0.109
0.109
0.108
0.109
0.109
0.110
0.120
0.122
0.122
0.122
0.121
0.120
0.120
0.118
0.117
0.116
0.115
0.113
0.113
0.112
0.111
0.110
0.110
0.109
0.108
0.107
C
U
+
A
U
0.197
0.193
0.194
0.193
0.192
0.191
0.188
0.189
0.188
0.188
0.187
0.187
0.187
0.188
0.187
0.187
0.187
0.187
0.187
0.189
0.186
0.181
0.176
0.171
0.166
0.161
0.156
0.152
0.147
0.143
0.139
0.135
0.132
0.129
0.126
0.123
0.120
0.117
0.114
A
U
+
N
U
+
P
U
0.096
0.096
0.095
0.095
0.091
0.093
0.091
0.093
0.092
0.091
0.092
0.092
0.092
0.092
0.092
0.093
0.092
0.093
0.093
0.102
0.100
0.097
0.095
0.093
0.091
0.086
0.083
0.080
0.079
0.077
0.075
0.073
0.071
0.067
0.065
0.063
0.062
0.060
0.059
C
U
+
N
U
+
P
U
0.122
0.121
0.117
0.114
0.111
0.111
0.108
0.108
0.107
0.107
0.107
0.108
0.108
0.108
0.108
0.108
0.109
0.109
0.109
0.120
0.124
0.125
0.126
0.125
0.125
0.124
0.123
0.122
0.121
0.120
0.119
0.118
0.117
0.116
0.115
0.114
0.113
0.112
0.111
C
U
+
A
U
+
N
U
0.103
0.101
0.098
0.097
0.094
0.095
0.093
0.094
0.094
0.094
0.094
0.094
0.094
0.094
0.095
0.095
0.095
0.095
0.095
0.106
0.107
0.106
0.104
0.102
0.099
0.097
0.095
0.092
0.090
0.088
0.085
0.083
0.081
0.079
0.077
0.076
0.074
0.073
0.071
A
U
+
C
U
+
N
U
+
P
U
0.107
0.105
0.102
0.100
0.096
0.096
0.095
0.095
0.095
0.095
0.095
0.095
0.094
0.095
0.095
0.095
0.095
0.096
0.096
0.105
0.105
0.103
0.101
0.099
0.097
0.094
0.092
0.090
0.088
0.085
0.083
0.081
0.079
0.077
0.076
0.074
0.073
0.071
0.070
Chu Z, Gianvecchio S, Wang H, Jajodia S (2012) De-
tecting automation of twitter accounts: Are you a hu-
man, bot, or cyborg? Dependable and Secure Com-
puting, IEEE Transactions on 9(6):811–824
Crammer K, Lee DD (2010) Learning via gaussian herd-
ing. In: Advances in neural information processing
systems, pp 451–459
Crammer K, Dekel O, Keshet J, Shalev-Shwartz S,
Singer Y (2006) Online passive-aggressive algo-
rithms. The Journal of Machine Learning Research
7:551–585
Crammer K, Dredze M, Pereira F (2009a) Exact convex
confidence-weighted learning. In: Advances in Neural
Information Processing Systems, pp 345–352
Crammer K, Kulesza A, Dredze M (2009b) Adaptive
regularization of weight vectors. In: Advances in neu-
ral information processing systems, pp 414–422
Dodds PS, Harris KD, Kloumann IM, Bliss CA, Dan-
forth CM (2011) Temporal patterns of happiness and
information in a global social network: Hedonomet-
rics and twitter. PloS one 6(12):e26,752
Ferrara E, Varol O, Davis C, Menczer F, Flammini
A (2014) The rise of social bots. arXiv preprint
arXiv:14075225
Gentile C (2002) A new approximate maximal mar-
gin classification algorithm. The Journal of Machine
Learning Research 2:213–242
Ghosh S, Viswanath B, Kooti F, Sharma NK, Kor-
lam G, Benevenuto F, Ganguly N, Gummadi KP
(2012) Understanding and combating link farming
in the twitter social network. In: Proceedings of
the 21st International Conference on World Wide
Web, ACM, New York, NY, USA, WWW '12, pp
61–70, DOI 10.1145/2187836.2187846, URL http:
//doi.acm.org/10.1145/2187836.2187846
Gimpel K, Schneider N, O'Connor B, Das D, Mills
D, Eisenstein J, Heilman M, Yogatama D, Flanigan
J, Smith NA (2011) Part-of-speech tagging for twit-
ter: Annotation, features, and experiments. In: Pro-
ceedings of the 49th Annual Meeting of the Asso-
Online Learning for Social Spammer Detection on Twitter
11
Table 3: Effectiveness of Online learning on combine
dataset
%
RF-1 RF-2
SCW ALMA
t
o
P
y
e
n
o
H
N
K
0
1
-
S
K
1
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
0.102
0.103
0.102
0.102
0.100
0.101
0.099
0.101
0.102
0.102
0.102
0.102
0.102
0.102
0.101
0.101
0.101
0.101
0.102
0.130
0.157
0.182
0.206
0.227
0.246
0.263
0.279
0.294
0.308
0.321
0.333
0.344
0.355
0.365
0.375
0.384
0.393
0.402
0.410
0.101
0.102
0.100
0.096
0.096
0.097
0.095
0.097
0.096
0.095
0.095
0.095
0.094
0.094
0.094
0.095
0.095
0.095
0.095
0.131
0.126
0.120
0.116
0.112
0.108
0.105
0.102
0.099
0.096
0.093
0.090
0.088
0.086
0.084
0.082
0.080
0.078
0.077
0.075
0.105
0.098
0.094
0.093
0.091
0.091
0.089
0.089
0.087
0.087
0.087
0.087
0.087
0.087
0.087
0.087
0.087
0.087
0.087
0.096
0.098
0.098
0.098
0.097
0.095
0.094
0.092
0.089
0.088
0.086
0.084
0.082
0.080
0.079
0.077
0.076
0.074
0.073
0.071
0.107
0.102
0.099
0.098
0.096
0.097
0.096
0.096
0.096
0.096
0.096
0.097
0.097
0.097
0.097
0.097
0.098
0.098
0.098
0.109
0.108
0.108
0.105
0.103
0.100
0.098
0.096
0.093
0.091
0.089
0.086
0.084
0.082
0.080
0.079
0.077
0.075
0.074
0.072
Fig. 4: Evaluation of various feature set combination on
SCW algorithm and ALMA algorithm
ciation for Computational Linguistics: Human Lan-
guage Technologies: Short Papers - Volume 2, Asso-
ciation for Computational Linguistics, Stroudsburg,
PA, USA, HLT '11, pp 42–47, URL http://dl.acm.
org/citation.cfm?id=2002736.2002747
G´omez Hidalgo JM, Bringas GC, S´anz EP, Garc´ıa FC
(2006) Content based sms spam filtering. In: Proceed-
ings of the 2006 ACM Symposium on Document En-
gineering, ACM, New York, NY, USA, DocEng '06,
pp 107–114, DOI 10.1145/1166160.1166191, URL
http://doi.acm.org/10.1145/1166160.1166191
Grier C, Thomas K, Paxson V, Zhang M (2010) @
spam: the underground on 140 characters or less. In:
Proceedings of the 17th ACM conference on Com-
puter and communications security, ACM, pp 27–37
Hoi SC, Wang J, Zhao P (2014) Libol: A library for
online learning algorithms. The Journal of Machine
Learning Research 15:495–499, URL http://LIBOL.
stevenhoi.org
Lee K, Caverlee J, Webb S (2010) Uncovering so-
cial spammers: Social honeypots + machine learn-
ing.
the 33rd International
ACM SIGIR Conference on Research and De-
velopment in Information Retrieval, ACM, New
In: Proceedings of
York, NY, USA, SIGIR '10, pp 435–442, DOI 10.
1145/1835449.1835522, URL http://doi.acm.org/
10.1145/1835449.1835522
Lee K, Eoff BD, Caverlee J (2011) Seven months with
the devils: A long-term study of content polluters on
twitter. In: ICWSM, Citeseer
Lee S, Kim J (2012) Warningbird: Detecting suspicious
urls in twitter stream. In: NDSS
Li Y, Long PM (2002) The relaxed online maximum
margin algorithm. Machine Learning 46(1-3):361–387
Matsumoto D, Hwang HS (2011) Evidence for train-
ing the ability to read microexpressions of emotion.
Motivation and Emotion 35(2):181–191
Orabona F, Crammer K (2010) New adaptive algo-
rithms for online classification. In: Advances in neural
information processing systems, pp 1840–1848
Pennebaker JW, Francis ME, Booth RJ (2001) Lin-
guistic inquiry and word count: Liwc 2001. Mahway:
Lawrence Erlbaum Associates 71:2001
Rosenblatt F (1958) The perceptron: a probabilistic
model for information storage and organization in the
brain. Psychological review 65(6):386
Thomas K, Grier C, Ma J, Paxson V, Song D (2011a)
Design and evaluation of a real-time url spam filtering
SCWUPUNUAUCUP+UNUP+UAUP+UCUN+UAUN+UCUA+UCUP+UN+UAUP+UN+UCUN+UA+UCUP+UN+UC+UACumulative Error Rate0.0000.1250.2500.3750.5000.1110.1090.0720.1620.2270.0710.0680.3610.1370.0760.2900.1230.0790.435ALMAUPUNUAUCUP+UNUP+UAUP+UCUN+UAUN+UCUA+UCUP+UN+UAUP+UN+UCUN+UA+UCUP+UN+UC+UACumulative Error Rate0.0000.1250.2500.3750.5000.0700.0710.1110.0590.1140.1070.0560.1630.1080.1170.1650.1090.1130.38612
Phuc Tri Nguyen, Hideaki Takeda
service. In: Security and Privacy (SP), 2011 IEEE
Symposium on, IEEE, pp 447–462
Thomas K, Grier C, Song D, Paxson V (2011b) Sus-
pended accounts in retrospect: an analysis of twit-
ter spam. In: Proceedings of the 2011 ACM SIG-
COMM conference on Internet measurement confer-
ence, ACM, pp 243–258
Twitter
(2016) Observability at
twitter:
technical
overview, part i
Wang D, Navathe SB, Liu L, Irani D, Tamersoy A, Pu C
(2013) Click traffic analysis of short url spam on twit-
ter. In: Collaborative Computing: Networking, Ap-
plications and Worksharing (Collaboratecom), 2013
9th International Conference Conference on, IEEE,
pp 250–259
Wang J, Zhao P, Hoi SC (2012) Exact soft confidence-
weighted learning. arXiv preprint arXiv:12064612
Webb S (2006) Introducing the webb spam corpus: Us-
ing email spam to identify web spam automatically.
In: In Proceedings of the 3rd Conference on Email
and AntiSpam (CEAS) (Mountain View
Wikipedia (2016) Spamming - wikipedia, the free
encyclopedia. URL https://en.wikipedia.org/
w/index.php?title=Spamming&oldid=710141595,
[Online; accessed 25-March-2016]
Yang C, Harkreader RC, Gu G (2011) Die free or live
hard? empirical evaluation and new design for fight-
ing evolving twitter spammers. In: Recent Advances
in Intrusion Detection, Springer, pp 318–337
Yang C, Harkreader R, Zhang J, Shin S, Gu G (2012)
Analyzing spammers' social networks for fun and
profit: a case study of cyber criminal ecosystem on
twitter. In: Proceedings of the 21st international con-
ference on World Wide Web, ACM, pp 71–80
Yang L, Jin R, Ye J (2009) Online learning by ellipsoid
method. In: Proceedings of the 26th Annual Inter-
national Conference on Machine Learning, ACM, pp
1153–1160
Yardi S, Romero D, Schoenebeck G, et al (2009) Detect-
ing spam in a twitter network. First Monday 15(1)
Zinkevich M (2003) Online convex programming and
generalized infinitesimal gradient ascent
|
1312.0938 | 1 | 1312 | 2013-12-03T04:01:51 | Epidemic Thresholds with External Agents | [
"cs.SI",
"physics.soc-ph"
] | We study the effect of external infection sources on phase transitions in epidemic processes. In particular, we consider an epidemic spreading on a network via the SIS/SIR dynamics, which in addition is aided by external agents - sources unconstrained by the graph, but possessing a limited infection rate or virulence. Such a model captures many existing models of externally aided epidemics, and finds use in many settings - epidemiology, marketing and advertising, network robustness, etc. We provide a detailed characterization of the impact of external agents on epidemic thresholds. In particular, for the SIS model, we show that any external infection strategy with constant virulence either fails to significantly affect the lifetime of an epidemic, or at best, sustains the epidemic for a lifetime which is polynomial in the number of nodes. On the other hand, a random external-infection strategy, with rate increasing linearly in the number of infected nodes, succeeds under some conditions to sustain an exponential epidemic lifetime. We obtain similar sharp thresholds for the SIR model, and discuss the relevance of our results in a variety of settings. | cs.SI | cs | Epidemic Thresholds with External Agents
Siddhartha Banerjee, Avhishek Chatterjee, Sanjay Shakkottai
Department of Electrical and Computer Engineering
The University of Texas at Austin, USA
Email: {siddhartha, avhishek}@utexas.edu,[email protected]
3
1
0
2
c
e
D
3
]
I
S
.
s
c
[
1
v
8
3
9
0
.
2
1
3
1
:
v
i
X
r
a
Abstract—We study the effect of external infection sources
on phase transitions in epidemic processes. In particular, we
consider an epidemic spreading on a network via the SIS/SIR
dynamics, which in addition is aided by external agents - sources
unconstrained by the graph, but possessing a limited infection
rate or virulence. Such a model captures many existing models
of externally aided epidemics, and finds use in many settings
- epidemiology, marketing and advertising, network robustness,
etc. We provide a detailed characterization of the impact of
external agents on epidemic thresholds. In particular, for the
SIS model, we show that any external infection strategy with
constant virulence either fails to significantly affect the lifetime
of an epidemic, or at best, sustains the epidemic for a lifetime
which is polynomial in the number of nodes. On the other hand, a
random external-infection strategy, with rate increasing linearly
in the number of infected nodes, succeeds under some conditions
to sustain an exponential epidemic lifetime. We obtain similar
sharp thresholds for the SIR model, and discuss the relevance of
our results in a variety of settings.
I . IN TRODUC T ION
We study epidemic processes on large graphs in the presence
of external agents - i.e., settings in which information/infection
spreads in a network via an intrinsic infection process (i.e.,
along the edges of the graph), but in addition, is aided in
its spread by external sources unconstrained by the graph
topology. More specifically, we focus on characterizing phase
transition behaviour in SIS/SIR epidemic processes in the
presence external infection sources of bounded virulence, but
whose position is unconstrained by the graph.
Epidemic processes are widely used as an abstraction for
various real-world phenomena – human infections, computer
viruses, rumors, information broadcast, product advertising,
etc. Though there are many models for such epidemic pro-
cesses, at a high level they can be divided in two groups –
those in which nodes once infected remain forever in such a
state, and those in which nodes can recover from the infection.
Henceforth, to distinguish between the two, we refer to the
former as spreading processes, reserving the term epidemic
process for the latter. Spreading processes help understand
the dynamics of one-way dissemination of some object in a
network – for example: a rumor, a software update, a fitter
genetic mutation, etc. On the other hand, epidemic processes
are used to study transient infection processes, i.e., those which
spread for a while but eventually die out in finite networks.
for a spreading process is the SI
A standard model
(Susceptible-Infected) dynamics, wherein a ‘susceptible’ node
(S) transitions to being ‘infected’ (I) at a rate proportional
to the number of infected neighboring nodes. An important
metric here is the spreading time, i.e., the time taken for all
nodes to get infected. In our earlier work [1], it was shown that
external agents can dramatically shorten the spreading time of
the SI process in some graphs - further this remains true even
if the agents infect in a random manner.
in epidemic
On the other hand,
the metric of interest
processes is usually the extinction time – the time when
the infection dies out
in the system. A non-trivial aspect
of epidemic processes is that they exhibit phase transition
phenomena - when the infection rate exceeds a threshold,
then the infection abruptly switches from being short-lived
to being persistent (i.e., with a very large extinction time; in
case of infinite graphs, they never die out). This aspect makes
them interesting from a mathematical perspective, and also
is important for understanding real-life settings, wherein such
threshold phenomena have been observed empirically.
The two most widely-used models for epidemic processes
are the Susceptible-Infected-Susceptible (SIS) [2], and the
Susceptible-Infected-Resistant (SIR) dynamics [3]. In both
models, as in the SI model, a node in the susceptible state (S)
transitions to the infected state (I) at a rate equal to an infection
rate times the number of infected neighbors – however nodes
do not remain infected forever. In the SIS model, an infected
node transitions back to the susceptible state (S) according to
a cure rate – the critical parameter herein is the ratio of the
infection to cure rate, denoted as β 1 . In the SIR dynamics,
a node in state (I) upon being cured enters a resistant state
(R), whereupon it is removed from the system. Note that
the absorbing states of the SIS/SIR models correspond to the
epidemic becoming extinct – for the SIS process, this is when
all nodes are in state (S ), while for the SIR process it is
when all nodes are either in state (S) or (R)2 . In this work, we
characterize the impact of external sources on phase transition
phenomena in SIS/SIR epidemics..
In addition to technical contributions to the understanding of
epidemic processes (in terms of new techniques and intuition
for threshold phenomena), our results are significant in terms
of their interpretation for certain real-world settings. Our
analysis captures both the worst-case perspective (by how
much can the extinction time of a ‘harmful’ epidemic be
extended via an adversarial external agent?) and the design
perspective (how can we design the external policy to prolong
1 It turns out that without loss of generality, we can normalize the cure rate
to 1 – the ratio of the two is sufficient to characterize the system.
2 Specifically, an absorbing state of the SIR model consists of any connected
component of nodes in state (R), and the rest in state (S)
the lifetime of ‘useful’ epidemic). In particular, it is instructive
to keep in mind two particular examples:
• Epidemiology - Characterizing the spread of a human
disease/computer worm in a network, aided by external
agents. Here the aim is to understand the worst case
scenario that could be induced by external agents un-
constrained by locality/geography. In human diseases,
the external agents correspond to long-distance travellers;
for the propagation of computer viruses spreading on a
local network, long-range jumps are via the Internet, or
sometimes, through portable disks.
• Product advertising - Enhancing brand recall amongst
consumers via viral means (word-of mouth, viral ads
on online social networks, etc.) coupled with long-range
‘broadcast’ advertising (TV advertising, targeting cus-
tomers for special offers, etc.). The aim here is the exact
opposite of the previous case – how can product aware-
ness be sustained for a longer time via well-designed
advertising strategies.
A. Our Contributions
We consider graphs Gn = (V , E ), parametrized by the
number of nodes V = n, in which an epidemic commences
spreading through two interacting processes: an intrinsic
spread, and an additional external
infection. The intrinsic
spread follows either the SIS or SIR dynamics (refer Section
I for an informal description, and Section II for details). For
the external infection process, similar to the model in [1], each
node becomes infected (if susceptible) at a different (zero or
non-zero) exponential rate at each instant in addition to the
intrinsic process; thus at time t, the external infection can
be represented as a V -dimensional vector ¯L(t) of external
infection-rates for each node. We allow the external rates
to be chosen as a function of the network state and history
(omniscience) and further, potentially designed to maximize
the extinction time (adversarial) – the only constraint on the
external process is that it has bounded virulence, i.e., the
total external rate at any instant is less than some parameter
µ (which can be a function of n). Further, we assume that
the external source exists if and only if there is at least one
infected node in the network, ensuring that our process has
the same absorbing states as the original epidemics.
We focus on characterizing the expected time to extinction
E[TS I S ] (and in case of the SIR model, the number of eventual
infected nodes) as a function of four factors: (i) the intrinsic
infection rate β (with intrinsic cure rate normalized to 1), (ii)
the external virulence µ, (iii) the graph topology, and iv . the
external infection policy. Our main results are as follows:
1) (Subcritical SIS epidemic): Under the SIS dynamics
with µ = O(1) (constant external infection), for any
graph G with maximum degree dmax , and any external
infection policy, if β dmax < 1, then E[TS I S ] = O(1),
i.e., the epidemic dies out in constant time.
For comparison,
the critical
threshold for subcritical
epidemics without external infection is βλ1 < 1 [2],
2
where λ1 is the leading eigenvalue of the graph adjacency
matrix; note that davg ≤ λ1 ≤ dmax .
2) (Critical SIS epidemic): Under the SIS dynamics with
(cid:28) β < 1
, i.e., order-
µ = O(1), for any graph if
1
dmax
λ1
wise greater than (dmax )−1 , but less than (λ1 )−1 , then
there exists an external infection policy resulting in an
extinction time which is at least polynomial in n.
this is tight
Furthermore,
in that for any graph with
sufficiently large maximum-degree, and any infection
policy with the above choices of β and µ, the extinction
time is also bounded by a polynomial in n. To the best
of our knowledge, this is the first rigorous demonstration
of such a polynomial-lifetime regime in SIS epidemics.
3) (Supercritical SIS epidemic): Next, we consider the
problem of designing an external infection strategy so
as to result in a supercritical epidemic, i.e., E[TS I S ] =
enΩ(1) . Without external infection, the best-known suffi-
cient condition for this is β η ≥ 1 [2], where η is the
graph conductance3 . We show that if the external rate µ
grows with the number of infected nodes I as γ I , for
some constant γ > 0, and up to some I = nα , then even
a random external infection strategy ensures exponential
epidemic lifetime provided β η + γ ≥ 1.
4) (Subcritical SIR epidemic): Finally, we show that µ =
Θ(1) is a tight
threshold for subcritical epidemics –
if β dmax < 1, then the number of infected nodes is
sub-polynomial in n, whereas if β is orderwise greater,
then it
is possible to infect a polynomial number of
nodes independent of where the infection starts spreading.
A unique feature of our analysis is that unlike most
existing work on the SIR epidemic which essentially
reduce the problem to studying a static process, our model
necessitates an understanding of the dynamics of the SIR
model – we achieve this via a coupling between the SIS
and SIR models.
We formally state these results in Section III. In addition,
in Section III-E, we highlight the importance of our results
through detailed analyses of several important settings – we
discuss both the import of our results in real-world examples,
as well as apply them to characterize epidemic lifetimes in
some important classes of networks.
B. Related Work
The spread of processes over graphs/networks has been
studied in various contexts (e.g., epidemiology [4], [5], [6],
sociology [7], [8], applied probability [9], [10], [11]).
The SIS/SIR processes has been widely studied to char-
acterize its phase transitions. The foundational work in the
probability community focused on infinite regular graphs,
in particular, grids and trees [10]. For finite graphs, phase
transitions were first characterized via empirical [12], [13],
and also approximate (mean-field) techniques [14], [15]. Other
works have provided a more rigorous analysis of phase tran-
sition – in particular, Ganesh et al. [2] for general graphs,
3More specifically, the local conductance, i.e., the isoperimetric number of
all sets of size ≤ nα for some α > 0.
and some specific families, and Berger et al. [16] for the
preferential attachment graph. These papers provide conditions
for subcritical and supercritical regimes under the SIS model.
Draief et al. [3] undertake a similar program for the SIR model.
Our work follows in the line of these results, providing a
rigorous characterization for epidemics with external sources.
The role of external sources in epidemic spread has been
studied under different models. In the context of human
disease spread, works include [17] (airline effects), [18] (geo-
graphic effects) and [19] (multiscale effects). This is paralleled
by studies of epidemics on computer/mobile phone networks
[20], [21], [22]. Finally, in the context of social networks,
Myers et al. [23] consider a model similar to our model of
random external infection, and use Twitter data to estimate
the extent of external influence.
Several studies in literature consider network intervention to
modify spread properties. The authors in [24] study enhancing
epidemics via designing the seed set. In [14], the authors
change the graph topology via additional edges; this in some
sense is an optimization view of the famous ‘small-world’
graph constructions [25], [26]. Wagner and Anantharam [27]
consider redistributing edge infection-rates in a line network so
as to ensure long-lasting epidemics. A complementary setting
to this is considered by Borgs et al. [28], wherein the cure-rate
can be redistributed among nodes to minimize the infection
spread. All of these works only consider static (or one-shot)
policies – we instead allow our external agents to dynamically
change their policies.
Finally, our earlier work [1] considers the same model of
external infection, but for spreading processes (in particular,
the SI dynamics). However, unlike spreading processes, where
external agents always speed up spreading, this work shows
that the situation is much more subtle for epidemic processes.
I I . MODE L
Intrinsic infection: As mentioned before, we consider epi-
demic processes on an underlying graph G(V , E ) (with V =
n). The process evolves in continuous-time t following either
the SIS or the SIR dynamics.
In the SIS model, a node exists in one of the two states:
susceptible (0) or infected (1). The state of the network at
any time t is given by X(t) ∈ {0, 1}n (with Xi (t) the state
of node i at time t). Infected nodes propagate the epidemic to
neighboring susceptible nodes at rate β , and revert to being
susceptible at a rate 1. Hence at a time t the transition for
a node j in the network follows a Markov process with
(cid:88)
transitions:
0 → 1 : at rate β
i:(i,j )∈E
Xi (t), 1 → 0 : at rate 1.
In the SIR model, a node can take 3 states: susceptible (0),
infected (1) or resistant (e). Now an infected node, i.e., with
state (1), upon recovering transitions to a resistant state (e)
– subsequently it plays no further part in the dynamics. Thus
3
(cid:88)
the transition for node j follows a Markov process:
0 → 1 : at rate β
i:(i,j )∈E ,Xi (t)(cid:54)=e
Xi (t),
1 → e : at rate 1.
Note that state (e) is an absorbing state for a node.
External infection: Our model for external infections is the
same as in [1]. We formally model the external infection as a
time-varying vector L(t) = {Li (t) : i ∈ V }, where Li (t) ≥ 0
is the extra rate (i.e., in addition to any intrinsic infection
rate) at which the external source tries to infect node i at time
t. We define the external virulence as L(t)1 ≤ µ – one
way to visualize this is that the external source’s infection
times follow a Poisson process with rate µ, and during each
infection event (say at time t), the external source infects a
single node j with probability Lj (t)
µ . The external infection-
rate vector L(t) (and the virulence µ) can vary with time t
and can depend on the state of the network S (t).
Our external infection model generalizes several models for
long-range infection spreading, in particular:
• µ = 0 reduces to the underlying SIS/SIR process.
• Static long-range edges: µ is the number of additional
edges added; Li (t) at time t is the number of long-range
edges incident on node i that have an infected node at
the other end.
• Dynamic long-range edges: Same as above, but the set
of additional edges can be changed over time.
• Mobile agents: One/several mobile agents spread the
infection (and which can move arbitrarily over the graph).
This can also model targeted advertising, giving ‘special
offers’ for individuals, etc.
• Broadcasting with bandwidth constraints: An external
source with bandwidth µ, which can be shared across
any set of nodes. Such a model can be used for broadcast
advertising (eg., TV/magazine ads), or dissemination of
software updates from a central server, etc.
Note that we do not claim our results are the tightest possible
under all models of infection via external sources. Some of the
above have been studied before, and it is sometimes non-trivial
to analyze particular models of external infection, such as
additional long-range links [14] or agents performing random
walks on the graph [29]. However, our model and analysis
does capture many of the salient features of these models,
reproducing some existing results, and more importantly, help-
ing characterize many new settings. At a higher level, our
work suggests that such models for external infection exhibit
a certain dichotomy – external infection sources either do not
affect the phase transition points (if µ is insufficient), or if
they do change the threshold (i.e., if µ is large enough), then
they do so even if the strategy is random.
Notation: We denote Z0 to be the collection of non-negative
integers, and R0 to be the real numbers. Further, we use the
Landau notation (O , Θ, Ω) to describe the growth rate of
functions. We use {≥st , ≤st} to denote stochastic dominance
relations between random variables; specifically Y ≥st X
implies that P[Y > r] ≥ P[X > r] for all r.
I I I . MA IN R E SU LT S AND D I SCU S S ION
We now state our main results, and discuss their implica-
tions for different graphs, and different external agent models.
We present the results and discussions here, with brief proof
outlines. In Section IV, we discuss in more detail some of
the technical novelty of our analysis. The complete proofs are
presented in the appendix.
A. Subcritical SIS Epidemic
For an SIS epidemic X(t) = {Xi (t) : i ∈ V }, the metric
of interest is the extinction time, given by:
TS I S = inf {t : X(t) = 0}.
Note that this definition remains consistent under our model
of external agents, as we define the external infection vector
L(t) to be 0 when X(t) = 0. Note also that the distribution
of TS I S depends on the initial condition X(0).
Recall that the subcritical regime is one wherein the extinc-
tion time of an epidemic is small (usually O(1) or O(log n)).
Our main result for subcritical SIS epidemics in the presence
of external infection agents is as follows:
Theorem 1. Given an SIS epidemic with intrinsic infection
rate β on a graph G with maximum degree dmax , if the initial
number of infected nodes is O(1) (arbitrarily chosen) and
β dmax < 1, then for any external infection strategy with rate
µ = O(1), we have:
E[TS I S ] = O(1).
Prior work for the intrinsic SIS epidemic (i.e., without
external agents) reveals that the subcritical threshold for β is
, where λ1 is the largest eigenvalue (or spectral
related to 1
λ1
radius) of the adjacency matrix. This fact,
though earlier
known empirically and via mean-field approximations, was
formally established by Ganesh et al. [2], who showed that
if βλ1 < 1, then E[TS I S ] = O(log n)4 . Note that for any
graph, davg ≤ λ1 ≤ dmax (where davg is the average degree).
Thus for d-regular graphs, the spectral radius is equal to the
maximum degree; moreover, for any graph, β dmax < 1 is a
sufficient condition for the sub-critical regime.
What Theorem 1 shows is that under constant external
infection (i.e., µ = O(1)), β dmax < 1 remains a sufficient
condition for sub-critical epidemics – as long as the initial
infected set is of size O(1), the epidemic has O(1) extinc-
tion time, under an arbitrary choice of the initial infected
nodes, and arbitrary external infection strategies (including
omniscient and adversarial strategies).
Proof outline: We first embed the multi-dimensional
Markov chain in a suitable 1-dimensional Markov chain – we
do this by considering the total number of infected nodes in
the network and embedding it in a Markov chain via stochastic
domination arguments. Similar techniques were used to show
supercritical behavior in [2], [16] – however the resulting
4Note that this result does not make any restrictions on the size of the
initial infected set. The log n factor is then inevitable – essentially, it is the
expected time for n isolated infected nodes to recover.
4
Markov chains in those works have an absorbing state at 0
(i.e., if there are no infected nodes in the network). A critical
contribution of our work is to show that it is possible to further
embed the process in an ergodic Markov Chain, by adding
some virtual transitions, while preserving the quantities of
interest (in this case, the time to absorption). This technique
allows us to easily compute closed-form bounds for the
absorbing time,even under complex external-infection policies.
The complete proof is given in Section A in the Appendix.
Comparing with the bounds for the intrinsic infection raises
the following natural question – what happens in settings
max (cid:28) β < λ−1
where µ is still O(1), but d−1
(i.e., β is
1
orderwise greater than d−1
max , but below the subcriticalilty
threshold). We focus on this in the next section where we show
that such a setting does in fact make a difference – it leads
to a regime where the resulting epidemic has a polynomial
lifetime.
B. Critical SIS Epidemic
max (cid:28) β < λ−1
Suppose now µ is still O(1), but d−1
– in
1
other words, it is not large enough to escape the subcritical
regime without external aid, but
larger than the sufficient
condition in Theorem 1 for O(1) extinction time with ex-
ternal aid. The question now is whether this regime is also
subcritical, or if there is a fundamental shift in the epidemic
lifetime in this region brought about by the external agents.
This is particularly important in settings where dmax and λ1
differ greatly – for example, graphs with a power law degree
distribution.
In this section we show that there is in fact a fundamental
shift in this regime – for a large class of graphs, the presence
of the external source causes an orderwise change in the
epidemic lifetime, which we characterize in a tight manner.
First, existing results for subcritical epidemics without external
aid (in particular, Theorem 3.1 in [2]) can be bootstrapped to
derive the following upper bound on the extinction time:
Theorem 2. For an SIS epidemic with βλ1 < 1, originating
from any set of initially infected nodes, and aided by any
external infection strategy with µ = O(1), we have
E[TS I S ] = nO(1) ,
i.e., the lifetime is at most polynomial in the number of nodes.
Proof Outline: The main intuition behind this result is
that within any time interval that is O(log n), the external
infection has a n−λ (for some λ = Θ(1)) probability of failing
to infect even a single node. Furthermore, existing results
indicate that for any initial set of infected nodes, a subcritical
epidemic has O(log n) expected extinction-time. Now we can
combine these two facts to create a stochastically dominating
process, wherein whenever the external agent successfully
infects a node, we instead assume all the nodes in the system
are infected – however by our previous observation, this can
happen at most a polynomial number of times. The complete
proof is given in Section B in the appendix.
Thus we know that the epidemic can last for a time at most
polynomial in n - however can this be achieved? The answer
to this is provided in the following result:
for some α > 0, suppose β = Ω (cid:0)n−α(1−) (cid:1) for some > 0.
Theorem 3. For SIS epidemics on graphs with dmax = Ω(nα )
Then, for any initial infected set, there exists external infection
policies with µ = O(1) such that, for some λ = Θ(1):
E[TS I S ] = Ω(n−λ ).
The implication of this theorem is as follows: if we con-
sider any graph with sufficiently large maximum degree (i.e.,
scaling polynomially with n), then an intrinsic infection rate
of β >> d−1
max coupled with a constant external infection
is sufficient to ensure that the epidemic lifetime is at least
√
polynomial in n. Now the first eigenvalue of the adjacency
dmax} ≤ λ1 ≤ dmax – thus it can
matrix satisfies max{davg ,
√
be order-wise less than dmax . For example, for the star graph
on n nodes, we have λ1 =
n while dmax = n. The above
theorem now implies that for such graphs, it is possible to
max (cid:28) β < λ−1
choose an intrinsic infection rate such that d−1
1 ,
and then design an appropriate external infection strategy to
ensure polynomial lifetime. Note that this is not unique to the
star graph – for many graphs, like power-law and other heavy-
tailed degree distributions, it is known that the maximum
degree is polynomial in number of nodes, and further, there is
an order-wise difference between λ1 and dmax (see also [2]).
The above theorem implies that constant external-infection can
cause a polynomial-lifetime critical regime in such networks.
Proof outline: The proof proceeds in three steps. First,
given any initial infected set, the external source can infect the
node with degree dmax with at least constant probability (by
focusing its entire virulence at that node). Next, by coupling
arguments,
the process subsequently can be stochastically
dominated by considering an SIS process on a single star of
degree dmax . The main technical ingredient is showing that the
SIS infection on a star on dmax = nα nodes lasts for a time
that is at least polynomial in n if aided by an external source
of at least constant virulence; note that this is not true if the
external source is absent (from existing results in [2], [16]).
The complete proof is given in Section B in the appendix.
C. Supercritical SIS Epidemic
The results in the previous two sections indicates that O(1)
external infection is insufficient to push an epidemic from the
subcritical to the supercritical regime - it can at most increase
the lifetime to a polynomial function of n, but not to an
exponential. The question we address now is what conditions
on µ are sufficient to ensure exponential epidemic lifetimes –
i.e. E[TS I S ] = enΩ(1) .
More specifically, we want to design an external-infection
scheme that guarantees that epidemic is in the supercritical
regime; ideally, this policy should work for any graph/initial
infected set/intrinsic infection rate β . The results from the
previous section show that we need µ to grow with n to have
any chance of reaching the supercritical regime. In fact, it
5
turns out that just scaling with n is not sufficient, as we prove
the following refinement of Theorem 1, that demonstrates
that even if µ grows slowly with n, it can not escape sub-
exponential extinction times:
(cid:17)5 results in sub-polynomial lifetime, i.e.,
(cid:16) log n
Theorem 4. For the SIS epidemic on graph G, if β dmax < 1
and the initial infected set is O(1), then:
1) µ = o
log log n
E[TS I S ] = no(1) .
2) µ = O (polylog(n)) results in sub-exponential lifetime,
specifically E[TS I S ] = O(epolylog(n) ).
Thus, in order to achieve exponential epidemic lifetimes,
it would appear that we need µ to be at least polynomial in
n. However this is impractical for real-world settings – for
example, it implies having a very high advertising budget, or
a large number of infected long-distance travelers. Further,
such an assumption is somewhat trivial from a mathematical
point of view, as essentially the external infection dominates
any effects of the intrinsic infection.
However, it turns out we can circumvent this problem in
the following way: instead of considering a fixed, large µ, we
allow µ to scale with the size of the infected population (upto
some maximum size). Note that from the previous theorem, it
is clear that we need the maximum size to be polynomial in
n, however the required external rate over time may be much
smaller. This is the situation we consider next; in Section III-E,
we discuss the relevance of this assumption in various settings.
To state our results, we first need to recap the best known
conditions for the supercritical regime for the SIS epidemic
without external infection. For this, we need to introduce the
generalized isoperimetric constant η(m) of a graph G [2],
defined as follows:
E (S, S c )
S
,
η(m) = min
S⊆V :S ≤m
where S is any subset of nodes (of size ≤ m, with its
complement S c = V \ S ), and E (S, S c ) is the set of edges
with one endpoint in S and one in the complement. The
isoperimetric constant captures the notion of a bottleneck
set: one which has the smallest number of edges exiting it,
normalized by the number of nodes in the set. It is related to
the notion of expansion on graphs – in particular, the above
definition is equivalent to a ( m
n , η(m))-expander [16]. Further,
via Cheeger’s inequality, it is also related to the second largest
eigenvalue λ2 of the adjacency matrix. Finally, it is known [2]
that if β η(nα ) > 1, then for any initial set of infected nodes,
we have E[TS I S ] = Ω(enα
). We now show how this can be
improved with external sources.
Suppose we define the set of infected nodes at time t as
I (t) ⊆ V . Now we have the following sufficient condition for
the epidemic to enter the supercritical regime:
Theorem 5. Consider the SIS epidemic on graph G: given any
α > 0, suppose the external infection rate µ scales linearly
5Recall f (n) = o(g(n)) means that limn→∞ f (n)
g(n) = 0.
.
with the number of infected nodes I as µ = γ I for I < nα .
Now if the intrinsic infection rate satisfies β η(I ) + γ > 1,
then under an external infection strategy which infects nodes
uniformly at random, we have
E[TS I S ] ≥ enα
We can unravel this result as follows – to achieve supercrit-
icality, we require:
• The external infection-rate scale linearly with the number
of infected nodes I upto a maximum limit which is at
least polynomial in n (though it can be of as small an
order as we desire).
• The slope of the line γ must obey γ > 1 − β η(nα ):
essentially, it must compensate for the gap between the
intrinsic rate and the critical threshold.
• The external infection need not be specifically designed –
in fact, it can be random. More specifically, it is sufficient
to try to infect each node at a rate µ
n , irrespective of
whether it is already infected or not.
We give an outline of the proof in Section IV-A; the complete
proof is provided in Section C of the appendix.
Combining all the previous theorems, we get the following
summary for the SIS epidemic with external agents: suppose
we have an intrinsic infection with rate β which is below the
critical threshold, then adding a constant amount of additional
external infection will either leave the extinction time unaf-
fected (in a scaling sense, if β dmax < 1), or at best, if designed
carefully, improve it to a polynomial in n (if β dmax >> 1). If
however, we want to push the epidemic into the supercritical
regime, we can do so by making the external rate grow linearly
with the number of infected nodes, at a rate equal to how much
β is below the threshold. The three regimes are summarized in
Figure 1. We interpret these results in more detail via several
examples in Section III-E.
Illustration of the 3 regimes in SIS epidemics with external infection
Fig. 1.
sources: For µ = O(polylog(n)), we get subcritical and critical regimes,
depending on β ; µ scaling linearly with I results in a supercritical epidemic.
D. Subcritical SIR Epidemic
Next we turn to the case of the SIR epidemic (see Section
II for definitions). Recall that in this model, an absorbing state
consists of a connected set of nodes in state (e), and the
rest in state (0). We define the time to extinction TS IR of
the epidemic as before. However a more important object of
study here is the number of nodes eventually infected by the
epidemic – we denote this as NS IR = I (TS IR ).
6
We assume throughout that the initial number of infected
nodes is O(1), and they are chosen arbitrarily – this can
be generalized, but since we are interested in the number
eventually infected, this assumption is appropriate. We also
note that there are two models which are referred to as the
SIR model in literature – the one we define in Section II,
wherein the nodes transition from state (1) to (e) according
to an E xponential(1) clock, and an alternate model wherein
the nodes transition from (1) to (e) after a deterministic
time (usually 1 unit). We consider only the former model in
this work; the results can be generalized to the latter in a
straightforward way.
Sufficient conditions for subcritical SIR epidemics,
i.e.,
with small E[NS IR ], have been (rigorously) established –
in particular, Driaef et al. [3] show that β dmax < 1, then
E[NS IR ] = O(1)6 . Our main result
in this section is a
generalization of this result for the setting with external agents:
Theorem 6. For the SIR epidemic on graph G with external
infection-rate µ = O(1), if β (dmax − 1) < 1, then for any
external infection policy, we have:
(cid:17)
(cid:16) log n
E[NS IR ] = O(1).
then the number of nodes
Further,
if µ = o
log log n
eventually infected is sub-polynomial – i.e., E[NS IR ] = no(1) .
This means that any infection with intrinsic rate less than
d−1
max can infect only a vanishing fraction of the nodes if the
log n
external infection strength is less than
log log n .
Proof Outline: As existing bounds on the SIR epidemic
are obtained by observing the structure of the infection as
t → ∞[3],
it
is difficult
to take the same approach to
incorporate external infection. We instead build on our results
for the SIS epidemic spread via a coupling argument. The main
observation is that for SIS and SIR epidemics on the same
graph, with identical intrinsic rate β , as well as external rate µ
(and identical external infection strategies), the extinction time
for the SIS infection stochastically dominates that of the SIR
infection. Using this, we can use various coupling arguments
to get the result. The complete proof is given in Section D of
the appendix.
These conditions, in particular, for ensuring sub-polynomial
number of infected nodes, are again tight in case of graphs
with sufficiently large (polynomial) maximum degree. In par-
ticular we have the following result:
Lemma 7. Consider a graph G with maximum degree
dmax = Ω(nα ) for some α > 0. For an SIR epidemic with
β = Ω (n−α ) for 0 < < α, aided by external infection-rate
µ = Ω(1), then there exists an external infection policy such
that E[NS IR ] = Ω(nk ) for some k > 0.
Thus constant external
infection does not significantly
change the number of infected nodes when the underlying
6One can also get results for the case when βλ1 < 1, but the bounds are
in terms of the eigenvectors of the adjacency matrix, making them harder to
interpret in general.
epidemic is subcritical.
E. Discussion and Examples
We conclude the presentation of our results by showing how
they can be applied to various settings.
Epidemiology: Both the SIS and SIR models are widely
used to model human epidemics [13], and also computer
viruses/worms [12]. SIR dynamics is used in cases where re-
covery from an infection prevents re-infection (e.g., resistance
in humans, patches for computer viruses); the SIS dynamics
more closely models cases where an infection may return via
mutations in the parasite (in fact this is true even for computer
worms, which have been known to circumvent patches by
exploiting multiple vulnerabilities). Finally, external sources
have long been known to promote the spread of such epi-
demics, be it via long-distance air travel/shipping propagating
human diseases, or worms spreading via the Internet.
What do our results imply for such settings? On the positive
side, Theorems 1 and 2 show that an external source of
constant virulence can not cause an infection to become
supercritical – further, Theorem 3 reaffirms the intuition
that the critical nodes that need to be defended against the
infection are the ones which have high-degree. This is in
a sense complementary to the results of Borgs et al. [28],
who show that an effective strategy for distributing antidotes
(i.e., augmenting recovery rates) is to provide it to nodes
proportional to their degree. Our result can be viewed in terms
of designing preventive measures – to control epidemic spread,
one should vaccinate/quarantine nodes with a high degree.
However, it can be argued that in many cases, the number
of external agents actually does scale as γ I - for example
in case of long-distance travel, if we assume that the people
traveling are randomly chosen (irrespective of whether infected
or not), then the number of infected people traveling does scale
linearly as the number of infected people. In such a regime,
the import of Theorem 5 is more grim – it suggests that an
infection can become supercritical if such travel is not curbed
before a certain point, and further this is not affected if the
travel is random. This matches the empirical observation that
epidemics which have a long incubation period (i.e., do not
show symptoms in carriers till long after infection) often tend
to become more widespread.
Advertising: It is widely accepted that the recall of a product
in the minds of consumers is jointly affected by its prevalence
in social circles (e.g., if many your friends use a certain
product,
then you would tend to use it as well) and the
use of advertising. Moreover, advertising can be both via
broadcast media (e.g., TV/magazine ads, billboards) and also,
increasingly, viral media (e.g., word of mouth, videos on
Youtube, etc.). This scenario is very well modeled by the
SIS/SIR epidemic – the epidemic represents the recall of a
brand, which is strengthened by local interactions, and also
by broadcast advertising; further, the rate of TV/magazine ads
are subject to advertising budgets.
In this domain, our results make very clear recommenda-
tions – for any brand, a constant advertising budget is not
7
sufficient to ensure long-lasting recall. However, increasing
the advertising budget proportional to the number of customers
(which is viable since the revenues also increase) can achieve
supercritical behavior. In terms of advertising strategy, our
results suggest
that
if the budget
is small,
then targeted
advertising, biased towards highly-networked consumers, is
more beneficial - however, if the budget is large enough (and
scaling linearly with the number of customers), then broadcast
advertising (which can be thought of as a random infection
strategy) is sufficient.
Popular Models for Network Formation: Our results can
be applied to specific graph families to obtain thresholds for
the different regimes – however, they may not be the tightest
in all graph families. Such a program is carried out in [2],
who characterize λ1 and η(m) for several families of graphs,
including random graph families such as the G(n, p) and
certain families of power-law graphs – since our thresholds
are also in terms of the same quantities, these results carry
over to our setting, and in addition we get additional results
for the case of external infection; for example, for graphs with
sufficiently high maximum degree, we show that O(1) external
infection rate is sufficient to push the lifetime to poly(n).
However, our results allow for analysis of more sophisti-
cated models of external infection. To illustrate this, consider
the example of Kleinberg’s small-world network construction
[25] – this consists of a 2-dimensional grid, where each node
has an additional long range link, the other end of which
is selected according to some given distribution. Viewing
these long-range links as external-infection sources, we see
µ = β (cid:0)I − n−1+α (cid:1) as long as I ≤ nα ). Now, using
that the external infection rate increases roughly as β I (in
particular, if the long-range link is chosen uniformly, then
Theorem 5, we have that if β > 1, then the epidemic is
supercritical.
IV. PROO F S O F S E LECT ED R E SU LT S
Due to lack of space, we defer complete proofs to the ap-
pendix. Instead, we outline some of the main technical novelty
behind our results; these ideas may be of independent interest
for tackling other questions regarding epidemic processes.
A. Embedding in a Dominating Ergodic Markov Chain
The main idea for the results in the subcritical and super-
critical regimes is to study the dynamics of the total number
of infected nodes in the network at time t. This depends on the
exact network topology; however it is possible to stochastically
dominate it via appropriate 1−dimensional Markov Chains.
Similar techniques have been used before [2], [16]; however
in all prior work, state 0 is an absorbing state, and the
absorption time is estimated via Martingale techniques. A
technical novelty in our proof is that we embed the chain in an
ergodic Markov chain, in a way that preserves the absorption
time. This allows us to obtain closed-form expressions for
the absorption time, and also consider more complex external
infection strategies. We now outline this technique.
8
E[TL,0 ] =
using detailed balance equations – this gives us the closed-
form expression for E[T1,0 ].
The above lemma can be extended to a setting where the
initial number of infected nodes is some L > 0. As before,
k that has the same transition
we construct a Markov chain U L
probabilities as Uk , but now with an additional
transition
p0,k = 1 – again we have U L
k is irreducible, finite state, and
hence ergodic. Let πL denote the stationary distribution for
k . We have the following lemma:
U L
L(cid:88)
k(cid:89)
n(cid:88)
Lemma 9.
i=L+1
k=L+1
k=1
where fk s are quantities that depend only on the transition
probabilities for states in {0, 1, · · · , L}.
Proof: The proof is identical to that of Lemma 8 – the
only difference is that the chain is a birth-death chain for states
≥ L. Thus the expression for the stationary probability of
state 0 has additional terms which depend on transition-rates
of states between 1 and L; in our applications, the terms fk , fL
are all O(1), and do not affect the scaling.
The above lemmas allow us to get detailed characterizations
for the subcritical and supercritical regimes. For complete
proofs of Theorems 1, 4 and 5, refer Section C in the
Appendix.
pi−1,i
pi,i−1
fk + fL
B. Dynamic Analysis of the SIR Epidemic
Studying thresholds for the SIR model with external in-
fection requires understanding the transient behavior of the
process. To this end, we develop the following coupling
argument relating the dynamics of the SIR to the SIS model:
Lemma 10. Consider an SIR epidemic on graph G with
intrinsic infection-rate β and a given external infection policy
with infection-rate µ. For an SIS epidemic on the same graph
with identical external infection policy (i.e., same L(t) ∀ t), we
have:
TS I S ≥st TS IR .
Proof: The result follows from a simple coupling argu-
ment, wherein when a node gets recovered in the SIR model,
it becomes susceptible in the SIS model. Now, given that
the external infection policies are identical, the SIS epidemic
dominates the SIR epidemic with respect to extinction time.
R E F ER ENC E S
[1] A. Gopalan, S. Banerjee, A. K. Das, and S. Shakkottai, “Random
mobility and the spread of infection,” in IEEE INFOCOM, 2011, pp.
999–1007, see also longer version titled "Epidemic Spreading with
External Agents" (available on arXiv.org).
[2] A. J. Ganesh, L. Massoulié, and D. F. Towsley, “The effect of network
topology on the spread of epidemics,” in IEEE INFOCOM, 2005, pp.
1455–1466.
[3] M. Draief, A. Ganesh, and L. Massoulie, “Thresholds for virus spread
on networks,” The Annals of Appl. Prob., vol. 18, pp. 359–378, 2008.
[4] R. M. Anderson and R. M. May, Infectious Diseases of Humans
Dynamics and Control. Oxford University Press, 1992.
Fig. 2.
Dominating chain for the total number of infected nodes. The
transition rates {r(i)} are appropriately chosen to over/under dominate the
underlying process. A ‘virtual’ 0 → 1 transition makes the chain ergodic.
First, consider the continuous-time Markov chain for the
aggregate infected nodes – note that
transitions from any
state (i.e., increase/decrease in the number of infected nodes)
happen at a rate at least 1 and at most βn2 + n + µ ∼ poly(n).
This allows us to consider a uniformized discrete-time Markov
chain; from the previous observation, we see that the number
of time-slots till absorption for the discrete chain is within a
poly(n) factor of the time to absorption for the continuous
chain. This is the reason this technique is most useful for the
subcritical/supercritical regimes, but not fine-grained enough
to capture the intermediate critical regime.
Now consider a DTMC Uk , k ∈ Z0 on {0, 1, · · · , n} with
state-transitions pi,i+1 , pi,i−1 > 0 for 1 ≤ i ≤ n− 1, pn,n−1 =
1, and remaining transitions having probability 0 – i.e., a birth-
death chain, with absorbing state at 0 and reflection at n. Next,
consider another DTMC, denoted Uk , on the same state space
with the same transition matrix as Uk , but in addition, with
p0,1 = 1 (i.e., a reflection at 0 instead of absorption). Note
that Uk has an absorbing state and hence is not an ergodic
DTMC; Uk , however, is an irreducible, aperiodic, finite state
Markov chain, and hence ergodic [30].
The chain Uk is often referred to as the Ehrenfest Urn
Process [30]; we denote π as the stationary distribution of Uk .
Now let T1,0 be the time to hit 0 for the DTMC U starting
from state 1 (i.e., the time to absorption with initial state 1).
Then we have the following lemma:
Lemma 8.
E[T1,0 ] + 1 =
1
π(0)
More specifically, in terms of the transition probabilities of
n(cid:88)
k(cid:89)
Uk , with p0,1 defined to be 1, we have:
i=1
k=1
Proof: First note that the distributions of T1,0 and T1,0
are same – this is because a sample path from state 1 to state
0 for Uk does not experience a 0 to 1 transition. Further,
since the transition from 0 to 1 happens with probability 1,
T0,0 = 1+ T1,0 a.s,. and as Uk is an ergodic Markov chain, the
expectations for both the random variables exist, and also the
expected return time for any state i is π(i)−1 . Putting these
together we get the first claim. For the second, observe that
for a birth-death DTMC with transition provabilities pi,i+1 and
pi,i−1 , we can exactly evaluate the steady state distributions
E[T1,0 ] =
pi−1,i
pi,i−1
[5] M. J. Keeling and K. T. Eames, “Networks and epidemic models,”
Journal of the Royal Society Interface, vol. 2, no. 4, pp. 295–307, 2005.
[6] D. J. Daley and J. Gani, Epidemic modelling: an introduction. Cam-
bridge University Press, 2001, vol. 15.
[7] E. M. Rogers, Diffusion of Innovations, 5th Edition. Free Press, August
2003.
[8] A. Vespignani, “Modelling dynamical processes in complex socio-
technical systems,” Nature Physics, vol. 8, pp. 32–39, 2012.
[9] M. Draief and L. Massoulié, Epidemics and rumours in complex
networks, volume 369 of London Mathematical Society Lecture Notes.
Cambridge University Press, Cambridge, 2010.
[10] T. M. Liggett, Stochastic interacting systems: contact, voter and exclu-
sion processes. Springer, 1999, vol. 324.
[11] R. Pastor-Satorras and A. Vespignani, Evolution and structure of the
Internet: A statistical physics approach. Cambridge Univ. Press, 2007.
[12] J. O. Kephart and S. R. White, “Directed-graph epidemiological models
of computer viruses,” in IEEE Symposium on Security and Privacy,
1991, pp. 343–361.
[13] R. Pastor-Satorras and A. Vespignani, “Epidemic Dynamics in Finite
Size Scale-Free Networks,” Phys. Rev. E, vol. 65, no. 3, p. 035108, Mar
2002.
[14] D. Chakrabarti, Y. Wang, C. Wang, J. Leskovec, and C. Faloutsos, “Epi-
demic thresholds in real networks,” ACM Transactions on Information
and System Security (TISSEC), vol. 10, no. 4, p. 1, 2008.
[15] P. Van Mieghem, J. Omic, and R. Kooij, “Virus spread in networks,”
Networking, IEEE/ACM Transactions on, vol. 17, no. 1, pp. 1–14, 2009.
[16] N. Berger, C. Borgs, J. T. Chayes, and A. Saberi, “On the spread of
viruses on the internet,” in Proceedings of the sixteenth annual ACM-
SIAM symposium on Discrete algorithms.
Society for Industrial and
Applied Mathematics, 2005, pp. 301–310.
[17] V. Colizza, A. Barrat, M. Barthélemy, and A. Vespignani, “The role of
the airline transportation network in the prediction and predictability of
global epidemics,” Proceedings of the National Academy of Sciences,
vol. 103, no. 7, pp. 2015–2020, 2006.
[18] B. Wang, K. Aihara, and B. J. Kim, “Immunization of geographical
networks,” in Complex (2), 2009, pp. 2388–2395.
[19] D. Balcan, V. Colizza, B. Gonçalves, H. Hu, J. J. Ramasco, and
A. Vespignani, “Multiscale mobility networks and the spatial spread-
ing of infectious diseases,” Proceedings of the National Academy of
Sciences, vol. 106, no. 51, pp. 21 484–21 489, 2009.
[20] J. Kleinberg, “The Wireless Epidemic,” Nature, vol. 449, pp. 287–288,
September 2007.
[21] D. Moore, C. Shannon et al., “Code-red: a case study on the spread and
victims of an internet worm,” in Proceedings of the 2nd ACM SIGCOMM
Workshop on Internet measurment. ACM, 2002, pp. 273–284.
[22] P. Wang, M. C. González, C. A. Hidalgo, and A.-L. Barabasi, “Under-
standing the spreading patterns of mobile phone viruses,” Science, vol.
324, no. 5930, pp. 1071–1076, May 2009.
[23] S. A. Myers, C. Zhu, and J. Leskovec, “Information diffusion and
influence in networks,” in Proceedings of
the 18th ACM
external
SIGKDD international conference on Knowledge discovery and data
mining. ACM, 2012, pp. 33–41.
[24] D. Kempe, J. Kleinberg, and E. Tardos, “Maximizing the spread of
influence through a social network,” in KDD ’03: Proc. 9th ACM
SIGKDD International Conference on Knowledge Discovery and Data
mining. ACM, 2003, pp. 137–146.
[25] J. Kleinberg, “Small-world phenomena and the dynamics of informa-
tion,” Advances in neural information processing systems, vol. 1, pp.
431–438, 2002.
[26] M. E. Newman and D. J. Watts, “Scaling and percolation in the small-
world network model,” Physical Review E, vol. 60, no. 6, p. 7332, 1999.
[27] A. B. Wagner and V. Anantharam, “Designing a contact process: the
piecewise-homogeneous process on a finite set with applications,” Stoch.
processes and their applications, vol. 115, no. 1, pp. 117–153, 2005.
[28] C. Borgs, J. Chayes, A. Ganesh, and A. Saberi, “How to distribute an-
tidote to control epidemics,” Random Structures & Algorithms, vol. 37,
no. 2, pp. 204–222, 2010.
[29] M. Draief and A. Ganesh, “A random walk model for infection on
graphs: spread of epidemics & rumours with mobile agents,” Discrete
Event Dynamic Systems, vol. 21, no. 1, pp. 41–61, 2011.
[30] P. Bremaud, Markov Chains: Gibbs Fields, Monte Carlo Simulation, and
Queues, corrected ed. Springer-Verlag New York Inc., February 2001.
9
A P P END IX
A. Subcritical SIS Epidemics with External Agents
We now prove Theorems 1 and 4, using the techniques
discussed in Section IV-A.
Proof of Theorem 1: As transitions in X(t) are via
exponential clocks, hence the system is a continuous time
Markov chain – further TS I S , the time when X(t) hits 0,
is a stopping time with respect to this Markov chain. Our aim
is to upper-bound the time E[TS I S ].
To do so, we study the one-dimensional chain induced
by the number of infected nodes in the network – more
specifically, we stochastically dominate the total number of
infected nodes as follows: Consider a Markov chain Z (t) ∈
{0, 1, 2, . . .} with Z (0) = X(0) and the state transition rates
being the following:
i → i + 1 at a rate β dmax i + µ for i > 0
i → i − 1 at a rate i for i > 0
We claim that Z stochastically dominates X(t), and con-
sequently, the time to hit 0 for Z is a.s. larger than TS I S .
This can be formally argued via a coupling argument, but
essentially it arises from the fact that for any state X(t),
the maximum rate at which the infection can grow (i.e at
which X(t) can increase) is β X(t)dmax + µ – this is
because a node can try to infect at most dmax nodes and the
external infection can increase the number of infected nodes at
a maximum rate of µ. Also note that for the original process
X(t) is the rate at which infection decreases, since each node
recovers at rate 1. Thus whenever Z (t) = X(t) = i, the rate
of growth for Z is higher than that for X, while the rate of
decrease are the same for both the processes. Hence, we can
instead focus on finding an upper bound on time to hit zero
for the process Z .
Note that Z is a process on a finite state space [n] and is
irreducible, with an absorbing state at 0 – hence the expected
time to hit state 0 is finite. We next consider Z D , the embedded
discrete-time chain (i.e., jump chain) of Z , whose transitions
( ∀ i > 0) are given by:
pi,i+1 =
β dmax i + µ
(β dmax + 1)i + µ
, pi,i−1 =
i
(β dmax + 1)i + µ
Note that as the rate of jumps for any state i > 0 is lower
bounded by 1 – hence the expected time spent in any state
is O(1), and the time to absorption in the discrete time chain
is orderwise equivalent to the absorption time in the original
chain. Now we can use Lemma 9 to compute the expected
hitting time to zero for Z D , given initial state is 1 (or some
fixed K ). Note that for any fixed K > 0, the transition
probabilities of Z D do not scale with n for states in [K ];
hence for the stated result, it is sufficient to show that the
contribution due to the states i ∈ {K, K + 1, . . . , n} is O(1).
pi,i+1
pi,i−1
(cid:33)
µ
iβ dmax
βdmax ) .
µ
k(cid:89)
i=1
n(cid:88)
We have:
k=K
k(cid:89)
i=1
β dmax i + µ
(cid:32) k(cid:88)
i
i=1
≤ n(cid:88)
≤ n(cid:88)
k=1
(β dmax )k exp
∞(cid:88)
k=1
≤
(β dmax )k (k + 1)(
k=1
Now note that for β dmax < 1 and µ = O(1), the RHS in
the last expression can be upper bound by a constant order
moment of a geometric random variable – hence it is O(1).
This completes the proof.
Thus we have that β dmax < 1 and µ = O(1) is a
sufficient condition for subcritical epidemics. We can also now
generalize the above argument to prove Theorem 4, wherein
we bound the extinction time for µ scaling with n.
Proof of Theorem 4: We define γ =
> 1 –
1
βdmax
further we can always assume γ = O(1), as otherwise, we
can increase β , which can only increase the extinction time.
Now following identical arguments as in those for Theorem
E[TS I S ] ≤ n(cid:88)
n(cid:88)
1, we get that
(cid:90) ∞
(β dmax )k (k + 1)(
k=1
k=2
≤ γ
γ−xxγµdx ≤ γΓ(γµ + 1)
(log γ )γµ+1 ,
1
where Γ(x + 1) = x!. Now using Stirling’s formula, and the
(cid:17)
(cid:16) log n
fact that γ = Θ(1), we get that E[TS I S ] = O(µ2µ ). Now
suppose µ = f (n) log n
log log n , where f (n) is some function such that
, and f (n) = o(1)) –
limn→∞ f (n) = 0 (i.e., µ = o
log log n
substituting, we have E [TS I S ] = O(nf (n) ) = no(1) – similarly
we can show that µ = polylog(n) is not sufficient for an
exponential lifetime.
βdmax ) ≤ γ
µ
γ−k kγµ
B. Critical SIS Epidemics with External Agents
Next we turn to Theorem 2, wherein we derive a polynomial
upper bound for the extinction time in the case when βλ1 < 1:
Proof of Theorem 2: From existing results (such as
Theorem 3.1 of Ganesh et al. [2]), we have that in the absence
S I S for the intrinsic
of external agents, the time to extinction T i
SIS process obeys E[T i
S I S ] = O(log n) for any initial set of
infected nodes, if βλ1 < 1. We now bootstrap this to obtain
our result.
Note that the external sources, under any strategy, can infect
at most at a rate µ – thus to upper-bound E[TS I S ] (the
extinction time with external sources), we can stochastically
dominate it as follows: at time 0, assume all nodes are infected,
and start an exponential clock with rate µ. Clearly the underly-
ing SIS infection expires if all nodes recover before this clock
expires; if however the clock stops before the SIS process dies,
we restart the process with all nodes infected, and start another
exponential clock with µ. By standard coupling arguments, the
10
time to extinction for this new process stochastically dominates
TS I S for the original process.
Given an SIS process starting with all nodes initially in-
fected, the time to extinction without external sources is T i
S I S ;
further, let Zµ ∼ E xponential(µ). Then we have:
S I S ] = E[exp(−µT i
P[Zµ > T i
S I S )]
≥ exp(−µE[TS I S ]) ≥ n−C ,
where C > 0 is some constant (independent of n); the second
inequality above follows from Jensen’s inequality, and also we
have used the fact that E[T i
S I S ] = O(log n) and µ = O(1).
Note that the above quantity lower-bounds the probability
that,
in the constructed process,
the infection process ex-
pires before the clock (corresponding to the external source)
stops. Hence the expected number of regenerations that take
place before the process expires is upper-bounded by O(nC ).
the expected time between each regeneration is
Further,
E[min{T i
S I S , Zµ }] – this is upper-bounded by E[Zµ ] = 1
µ =
O(1). Thus E[TS I S ] = O(nO(1) ).
To complete our analysis of the critical regime, we show
that polynomial extinction-times are in fact achievable for any
graphs with sufficiently large (i.e., polynomial) degree. We
consider the following strategy: the external agent targets any
susceptible node with degree Ω(nα−+δ ) (henceforth referred
to as a high-degree node); else it infects a susceptible node
chosen at random (in fact, for ease of exposition, we assume
in the proof that the external node only infects the maximum-
degree node; however it is easy to see that the above strategy
is sufficient to show polynomial lifetime).
A crucial result we use in our proof is as follows: note
that as β scales as n−α , the expected number of infection
attempts due to an infected high-degree node before it recovers
is Ω(n ). Suppose now we have that a high-degree node is
infected, but none of its neighbors is infected – we show
that with high probability (i.e., at least 1 −
), the
1
poly(n)
number of neighbors in infected state at the time the first node
recovery occurs is poly(n). Subsequently, we show that given
a poly(n) number of infected neighbors, a node gets infected
with a probability at least 1 − n−Ω(1) in presence of O(1)
external infection – note that this is not true in the absence
of the external agents (when βλ1 < 1). Combining these
observations, we show that the expected time to extinction
of the epidemic is poly(n).
Lemma 11. Given a star-graph on m nodes, and an SIS
infection with β = Ω(m−1 ),
for some constant > 0.
Suppose only the hub is infected at time t = 0 – then at
(cid:1).
least 1 − O (cid:0) 1
the time when the first node recovery occurs, the number of
infected nodes in the system is Ω(m/3 ) with probability at
m/3
Proof: First, note that decreasing the value of β can only
make it less likely to have several infections before a recovery
– hence we can assume that < 1. Define k = m/3 . Now let
Nt be the number of infected nodes at time t (thus N0 = 1),
and T be the first time that some infected node recovers. For
.
=
≥
1 +
= 1 −
some constants c1 , c2 > 0, we want to show that P[NT ≥ c1k ]
with probability 1 − c2k−1 .
For the system at a time t < T , suppose Nt = i – note that
the hub is still infected, since no recoveries have occurred.
Then there are 2 possible events – either Nt goes to state
i + 1 at rate β (m − i + 1), or it stops (due to node recovery)
at rate i. Now we have:
(cid:19)
(cid:18) β (m − i + 1)
k(cid:89)
P[NT ≥ k ] ≥ P[Nt reaches k before stopping]
(cid:18)
(cid:19)−k ≥ 1 −
β (m − i + 1) + i
i=1
k2
k
β (m − k + 1)
β (m − k + 1)
≥ 1 − m−/3
m2/3
1 − o(m)
m − m5/3−1 + m−1
Choosing m sufficiently large, we get the result
Proof of Theorem 3: We assume henceforth that the
external agent only tries to infect the (unique) node with
maximum degree – this is without loss of generality for the
scaling results. First, note that irrespective of the initial state,
the maximum-degree node gets infected with probability at
least µ
1+µ = Ω(1) – thus the expected lifetime with any initial
set of infected nodes is at least a constant fraction of the
expected lifetime if the epidemic started at the maximum-
degree node. Further, note that the lifetime of the epidemic on
graph G if some edges are removed is stochastically dominated
by the lifetime on G – this means that to complete the proof, it
is sufficient to show that the SIS epidemic has a lifetime which
is poly(n) if on a star graph with a hub and nα leaf-nodes, and
an additional infection-source of rate µ = O(1) for the hub.
We do this by analyzing cyclical epochs characterized by the
reinfection/recovery of the hub – this is similar to techniques
used in [2], [16], however the presence of external infection-
sources changes the lifetime dramatically.
We construct the following process which under-dominates
the epidemic on the star: at time 0, we assume that only the
hub is infected; subsequently, when either the hub or any
of its neighboring leaf-nodes recovers for the first time, we
instead make the hub recover – this clearly under-dominates
the epidemic, as we have the same recovery rate, but a smaller
infection rate in the system. We then show that with probability
at least 1 − n−Ω(1) , the hub gets re-infected before all the
infected leaf-nodes get recovered. If this happens, we can
again restart the system with only the hub infected (and all
leaf-nodes susceptible) – note that this implies the expected
number of such regenerations is nΩ(1) , and the time spent
in each epoch is at least Ω(1), which gives us the desired
polynomial expected lifetime.
First, suppose the hub is infected at some time t – then
from Lemma 11, we have that when any infected node in
probability at least 1 − Ω (cid:0)n−α/3 (cid:1). As we described above,
the neighborhood recovers for the first time after t, then the
number of infected nodes in the system is Ω(nα/3 ) with
we now assume that the hub is the node which recovers first,
11
P[A n ] =
and thus there are n = Ω(nα/3 ) infected neighbors.
Next, given that there are n infected neighbors when the
hub recovers – then the probability of the event A n that the
hub is not re-infected before all the neighbors recover is given
n−1(cid:89)
by the following.
n − i
µ + (n − −i + 1)(1 + β )
i=0
To see this, note that if k neighbors are infected, then the
probability that one of them recovers before the hub is re-
infected is the same as that among three exponential random
variables of rate µ, kβ and k , the one with rate k is minimum,
µ+k(1+β ) ; subsequently, we can use the memoryless
i.e.,
k
property of the exponential distribution. We can now bound
≤ n(cid:89)
n−1(cid:89)
the above as follows:
n − i
1
(cid:17)2(cid:33)
(cid:32)
µ + (n − −i + 1)(1 + β )
(cid:16)
(cid:17)
(cid:16)
− n(cid:88)
n(cid:88)
1 + β + µ
i
i=0
i=1
≤ exp
µ
1
µ
β +
i
2
i
i=1
i=1
where we use that 1 + x ≥ ex− x2
2 . Now, using the fact that
(cid:16)
n−αµ/3(cid:17)
log n + 1 ≤ Hn ≤ log(n + 1), we can simplify to get:
P[A n ] ≤ C (n + 1)−µ(1−β ) = O
,
where we have used the fact that βλ1 ≤ 1 and hence is
dies in the network is at least 1 − O (cid:0)n−αµ/3 (cid:1) = 1 − n−Ω(1) .
β ≤ 1. Combining the two (via the union bound), we get the
probability that the hub gets re-infected before the infection
Thus, there are nΩ(1) such regenerations on average before the
infection dies in the network.
P[A n ] =
β +
+
,
C. Supercritical SIS Epidemics with External Agents
We now give a sufficient condition for supercritical SIS
epidemics in the presence of external sources.
Proof of Theorem 5: To obtain a sufficient condition
for supercritical behavior, we need to lower bound E[TS I S ] –
for this, we stochastically under-dominate the process via the
following (one-dimensional) Markov chain: let Y (t) be a con-
tinuous time Markov chain on the state space {0, 1, · · · , m}
with the following transition rates.
i → i + 1 at rate β η(i)i + µ for i > 0,
i → i − 1 at rate i for i > 0,
and all other transitions having rate 0. Essentially, η(i) cap-
tures the bottleneck cut for all sets of size ≤ i – standard
coupling arguments show that this process is stochastically
dominated by X[t].
To lower bound the time to absorption for this chain we use
an approach similar to that in the proof of the theorem 1 – we
construct an appropriate discrete-time ergodic Markov chain,
so that we can use Lemma 8. Note that to find a lower-bound
on the expected time to hit zero, it is sufficient to consider an
initial state where only 1 node is infected.
12
E[N0 ] + E
(cid:35)
Li (t)dt
(cid:82) TSIR
Li (t)dt for each i. Adding up the inequalities for all
(cid:19)
(cid:18)
n(cid:88)
0
the nodes, we get:
≤
1 − β di
P[Xi (∞) = e]
(cid:34) n(cid:88)
(cid:90) TSIR
β + 1
i=1
where N0 = (cid:80)
0
i=1
1{Xi (0)=e} is the number of initially infected
nodes. Reorganizing, and using di ≤ dmax and β (dmax − 1) <
i
1, we get:
E[NS IR ] ≤ E[N0 ] + µE[TS IR ]
1 − βdmax
β+1
(cid:17)
(cid:16) log n
To conclude the proof, we need to bound E[TS IR ] – however
from Lemma 10, we know it is sufficient to bound E[TS I S ].
,
Further, from Theorem 4, we have that if µ = o
log log n
then TS I S = subpoly(n). This completes the proof.
,
The embedded chain Y D corresponding to Y has transition
probabilities pi,i+1 = βη(i)i+µ
βη(i)i+µ+i and pi,i−1 =
i
for all i > 0 (note we still assume i ≤ m), and all other
βη(i)i+µ+i
transition probabilities being 0. Defining T D
1,0 to be the time
for the embedded chain to hit state 0 starting from 1, then
(cid:19)
(cid:18)
k(cid:89)
n(cid:88)
from Lemma 8), we have:
β η(i) +
i=1
k=1
E[T D
1,0 ] =
µ(i)
i
Next, we want to lower bound the time that the system
(cid:16) enα
(cid:17)
spends in each state. Let M = βn2 + n+ µ – then the expected
time spent at any state of the continuous time Markov chain
M . Hence E[TS I S ] = Ω
which
Y is lower-bounded by 1
M
(cid:16)
enΩ(1) (cid:17)
is enΩ(1) as long as M = O(poly(n)).
Thus we have that a sufficient condition for supercritical
. Now if ∀ i ∈
behavior is given by E[T D
1,0 ] = Ω
Ω (cid:0)enα (cid:1), which is what we desire.
{1, 2, . . . , nα } for some α > 0, we have β η(i) + µ(i)
i ≥ 1 +
for some > 0, then the LHS of the above equation is
(cid:1), when I = i. Now suppose we have
µ(i) = µ(i) (cid:0)1 − i
To obtain the condition given in Theorem 5, note that
random infection strategy is successful at a rate that equals
β η(nα ) + γ ≥ 1 + for some > 0. Then we have:
(cid:18)
(cid:18)
(cid:19)(cid:19)
n
k(cid:89)
1,0 ] ≥ nα(cid:88)
1 − i
E[T D
(cid:19)
(cid:18)
β η(nα ) + γ
k(cid:89)
≥ nα(cid:88)
n
i=1
k=1
i=1
k=1
Now we can choose n large enough such that we have
γnα−1 <
2 - this then ensures E[T D
1,0 ] = enΩ(1) .
D. SIR Epidemics with External Agents
Finally, we utilize Lemma 10 to get conditions for subcrit-
ical SIR epidemics:
Proof of Theorem 6: We first consider a standard
technique for bounding the size of eventual infection without
external agents (for example, in [3]).The main observation
is that the probability of a node i to get infected eventually
is dependent on its being infected initially and its neighbors
N (i) = {j ∈ V (i, j ) ∈ E } being infected eventually. We
(cid:88)
have:
P[Xi (∞) = e] ≤ P[Xi (0) = 1] +
j∈N (i)
P[Xj (∞) = e]
1 + − γ i
n
β
β + 1
.
to account for the external sources, we can add
Next,
an additional
term to the RHS to capture the probability
that the node i is infected by external agent at some time.
Recall that we defined L( t) to be an inhomogeneous Poisson
given by 1 − exp((cid:82) TSIR
process representing the external infection at node i – then
the probability of i being infected via the external source is
Li (t)dt), which is upper-bounded by
0
|
1710.06609 | 1 | 1710 | 2017-10-18T07:59:24 | Supervised and Extended Restart in Random Walks for Ranking and Link Prediction in Networks | [
"cs.SI",
"physics.soc-ph"
] | Given a real-world graph, how can we measure relevance scores for ranking and link prediction? Random walk with restart (RWR) provides an excellent measure for this and has been applied to various applications such as friend recommendation, community detection, anomaly detection, etc. However, RWR suffers from two problems: 1) using the same restart probability for all the nodes limits the expressiveness of random walk, and 2) the restart probability needs to be manually chosen for each application without theoretical justification. We have two main contributions in this paper. First, we propose Random Walk with Extended Restart (RWER), a random walk based measure which improves the expressiveness of random walks by using a distinct restart probability for each node. The improved expressiveness leads to superior accuracy for ranking and link prediction. Second, we propose SuRe (Supervised Restart for RWER), an algorithm for learning the restart probabilities of RWER from a given graph. SuRe eliminates the need to heuristically and manually select the restart parameter for RWER. Extensive experiments show that our proposed method provides the best performance for ranking and link prediction tasks, improving the MAP (Mean Average Precision) by up to 15.8% on the best competitor. | cs.SI | cs | Supervised and Extended Restart in Random Walks
for Ranking and Link Prediction in Networks
Woojeong Jin∗
Jinhong Jung∗
U Kang∗
7
1
0
2
t
c
O
8
1
]
I
S
.
s
c
[
1
v
9
0
6
6
0
.
0
1
7
1
:
v
i
X
r
a
Abstract
Given a real-world graph, how can we measure rel-
evance scores for ranking and link prediction? Random
walk with restart (RWR) provides an excellent measure
for this and has been applied to various applications
such as friend recommendation, community detection,
anomaly detection, etc. However, RWR suffers from two
problems: 1) using the same restart probability for all
the nodes limits the expressiveness of random walk, and
2) the restart probability needs to be manually chosen
for each application without theoretical justification.
We have two main contributions in this paper.
First, we propose Random Walk with Extended
Restart (RWER), a random walk based measure
which improves the expressiveness of random walks
by using a distinct restart probability for each node.
The improved expressiveness leads to superior accuracy
for ranking and link prediction. Second, we propose
SuRe (Supervised Restart for RWER), an algorithm
for learning the restart probabilities of RWER from a
given graph. SuRe eliminates the need to heuristically
and manually select the restart parameter for RWER.
Extensive experiments show that our proposed method
provides the best performance for ranking and link
prediction tasks, improving the MAP (Mean Average
Precision) by up to 15.8% on the best competitor.
1
Introduction
How can we measure effective node-to-node proxim-
ities for graph mining applications such as ranking and
link prediction? Measuring relevance (i.e., proximity or
similarity) scores between nodes is a fundamental tool
for many graph mining applications [1, 3, 2, 14, 5, 12].
Among various relevance measures, Random Walk with
Restart (RWR) [6, 11, 10] provides useful node-to-node
relevance scores by considering global network struc-
ture [7] and intricate edge relationships [26]. RWR
has been successfully exploited in a wide range of data
mining applications such as ranking [28, 24, 11], link
prediction [1, 3, 2, 15, 5], community detection [4, 30],
anomaly detection [25], etc.
∗Seoul National University, Email: [email protected];
[email protected]; [email protected]
However, RWR has two challenges for providing
more effective relevance scores. First, RWR assumes
a fixed restart probability on all nodes, i.e., a random
surfer jumps back to the query node with the same prob-
ability regardless of where the surfer is located. This as-
sumption prevents the surfer from considering the query
node's preferences for other nodes, thereby limiting the
expressiveness of random walk for measuring good rel-
evance scores. Second, RWR requires users to heuris-
tically select the restart probability parameter without
any theoretical guide or justification to choose it.
In this paper, we propose a novel relevance measure
Random Walk with Extended Restart (RWER),
an extended version of RWR, which reflects a query
node's preferences on relevance scores by allowing a dis-
tinct restart probability for each node. We also pro-
pose a supervised learning method SuRe (Supervised
Restart for RWER) that automatically finds optimal
restart probabilities in RWER from a given graph. Ex-
tensive experiments show that our method provides the
best the link prediction accuracy: e.g., SuRe boosts
MAP (Mean Average Precision) by up to 15.8% on the
best competitor as shown in Figure 1. Our main con-
tributions are summarized as follows:
• Model. We propose Random Walk with Ex-
tended Restart (RWER), a new random walk
model to improve the expressiveness of RWR.
RWER allows each node to have a distinct restart
probability so that the random surfer has a finer
control on preferences for each node.
• Learning. We propose SuRe, an algorithm for
learning the restart probabilities in RWER from
data. SuRe automatically determines the best
restart probabilities.
• Experiment. We empirically demonstrate that
our proposed method improves accuracy in all
dataset.
Specifically, our proposed method im-
proves MAP by up to 15.8% and Precision@20 by
up to 10.1% on the best competitor.
The code of our method and datasets used in this
paper are available at http://datalab.snu.ac.kr/
sure. The rest of this paper is organized as follows.
Section 2 presents a preliminary on RWR and defines
Copyright c(cid:13) 2018 by SIAM
Unauthorized reproduction of this article is prohibited
Figure 1: Link prediction performance on the HepTh
dataset. SuRe shows the highest accuracies: 15.8%
higher MAP, and 10.1% higher Precision@20 compared
to the best existing method.
the problem. Our proposed methods are described in
Section 3. After presenting experimental results in
Section 4, we provide a review on related works in
Section 5. Lastly, we conclude in Section 6.
2 Preliminaries
In this section, we describe the preliminaries on
Random Walk with Restart. Then, we formally define
the problem handled in this paper. We use Aij or A(i, j)
to denote the entry at the intersection of the i-th row
and j-th column of matrix A, A(i, :) to denote the i-th
row of A, and A(:, j) to denote the j-th column of A.
The i-th element of the vector x is denoted by xi.
2.1 Random Walk with Restart.Random walk
with restart (also known as Personalized PageRank,
PPR) [28] measures each node's proximity (relevance)
w.r.t. a given query node s in a graph. RWR assumes a
random surfer who starts at node s. The surfer moves
to one of its neighboring nodes with probability 1− c or
restarts at node s with probability c. When the surfer
moves from u to one of its neighbors, each neighbor v
is selected with a probability proportional to the weight
in the edge (u, v). The relevance score between seed
node s and node u is the stationary probability that the
surfer is at node u.
If the score is large, we consider
that nodes s and u are highly related.
Limitations. RWR cannot consider a query node's
preferences for estimating relevance scores between the
query node and other nodes. For example, suppose
we compute relevance scores from the query node A
to other nodes in a political blog network in Figure 2
where blue colored nodes are liberal blogs, red colored
ones are conservative, black ones are not labeled, and
an edge between nodes indicates a hyperlink between
the corresponding blogs. Based on the topology of the
graph, we consider that nodes E and F tend to be
moderate, node D is likely to be liberal, and node I
Figure 2:
Example of RWR and our proposed ap-
proaches RWER & SuRe on a political blog network.
Blue colored nodes are liberal blogs, red colored are con-
servative, and black colored ones are unlabeled blogs.
RWR uses the fixed restart probability 0.1 or 0.5 while
our proposed RWER uses distinct restart probabilities
on nodes. Note that RWR shows different ranking re-
sults depending on the restart probability. The ranking
result of RWER is more desirable for the query node A
(liberal) than those of RWR because many liberal blog
nodes are ranked high in the ranking result.
is likely to be conservative. Since the query node A is
a liberal blog, node A will prefer other liberal nodes to
conservative nodes. However, a conservative node G is
ranked higher than nodes related to liberal blogs such
as nodes C and D in the ranking result of RWR. The
reason is that preferences are not considered in RWR,
and the random surfer jumps back to the query node
A with a fixed restart probability c wherever the surfer
is. On the other hand, RWER reflects the query node's
preferences on relevance scores by allowing a distinct
restart probability for each node.
Another practical problem is that it is non-trivial
to set an appropriate value of the restart probability
c for different applications since we need to manually
choose c so that the restart probability provides opti-
mal relevance scores for each application. RWR scores
are highly affected by the restart probability; the rank-
ing results of each restart probability (c = 0.1 and
c = 0.5) are quite different as seen in Figure 2.
In
contrast, our learning method SuRe automatically de-
termines the optimal restart probabilities for all nodes
based on the query node's preferences as well as relation-
ships between nodes. The detailed descriptions of our
proposed approaches RWER and SuRe are presented
in Section 3.
2.2 Problem Definition.We are given a graph G
with n nodes and m edges, a query node s, and side
information from the query node. The side information
contains a set of positive nodes P = {x1, ..., xk} that
s prefers, and a set of negative nodes N = {y1, ..., yl}
Copyright c(cid:13) 2018 by SIAM
Unauthorized reproduction of this article is prohibited
0.35 0.4 0.45 0.5 0.55 0.6 0.65 0.7MAPP@20𝑨𝑭𝑩𝑪𝑬𝑮𝑯𝑰RWRRankNode𝑐=0.1Node𝑐=0.51 𝐺 𝐴2 𝐻 𝐵3 𝐼 𝐹4 𝐴 𝐺5 𝐵 𝐶6 𝐶 𝐻7 𝐷 𝐷8 𝐸 𝐼9 𝐹 𝐸RWER & SuRe(proposed)RankNode𝑐1 𝐴0.122 𝐵0.063 𝐶0.094 𝐷0.195 𝐹0.486 𝐸0.217 𝐺0.948 𝐻0.839 𝐼0.85𝑫Liberal blog nodeConservative blog nodeQuerynodeUnlabeled blog nodeclose toliberalclose toconservativemoderate§𝑐is a restart probabilitymoderatethat s dislikes. Our task is to learn restart probabilities
for all nodes such that relevance scores of the positive
nodes are greater than those of the negative ones.
3 Proposed Method
In this section, we describe Random Walk with
Extended Restart (RWER), our proposed model
for extended restart probabilities. Also, we propose
SuRe, an efficient algorithm for learning the restart
probabilities.
3.1 Overview of Random Walk with Extended
Restart. RWER is a novel relevance model reflecting a
query node's preferences on relevance scores. The main
idea of RWER is that we introduce a restart probability
vector each of whose entry corresponds to a restart
probability at a node, so that the restart probabilities
are related to the preferences for the nodes.
In RWER, a restart probability of each node is
interpreted as the degree of boredom of a node w.r.t.
the query node. That is, if the restart probability on a
node is large, then the surfer runs away from the current
node to the query node (i.e., the surfer becomes bored at
the node). On the other hand, if the restart probability
of the node is small, then surfer desires to move around
the node's neighbors (i.e., the surfer has an interest in
the node and its neighbors).
As depicted in Figure 2, each node has its own
restart probability in our model RWER. The restart
probabilities are determined by our supervised learning
method SuRe (Section 3.5) from the query (liberal)
node A, the positive (liberal) nodes B and C, and the
negative (conservative) nodes G and H. Note that
a ranking list where many liberal nodes are ranked
high is desirable for the query node A since A is
liberal. As shown in Figure 2, using distinct restart
probabilities for each node by RWER provides more
satisfactory rankings for the query node than using a
single restart probability for all nodes by RWR. The
restart probabilities of liberal nodes are smaller than
those of conservative nodes, which implies that the
random surfer prefers searching around the liberal nodes
such as B and C while the surfer is likely to run away
from the conservative nodes such as G and H.
One might think that it is enough to simply assign
small restart probabilities to positive nodes and large
restart probabilities to negative nodes for a desirable
ranking. However, the restart probabilities should be
determined also for unlabeled nodes, and the probabili-
ties should reflect intricate relationships between nodes
as well as the query node's preferences. For example,
the restart probability of node F in Figure 2 is relatively
moderate because node F is located between a liberal
node A and a conservative node G. Also, the restart
probability of node D is small since node D is close to
Figure 3: Example of a network. Each node has its
own restart probability.
other liberal nodes B and C. Similarly, the restart prob-
ability of node I is large since node I is closely related
to other conservative nodes G and H.
3.2 Formulation of Random Walk with Ex-
tended Restart.We formulate RWER in this sec-
tion. We first explain the formulation using the example
shown in Figure 3, and present general equations. In the
example, the surfer goes to one of its neighbors or jumps
back to the query node. To obtain the RWER proba-
bility ru at time t + 1, we should take into account the
scores of the three nodes which are i, j and k at time
t. Suppose the surfer is at the node i at time t. The
surfer can go to an out-neighbor through one of the two
outgoing edges with probability 1 − ci. Note that every
node has a distinct restart probability and node i has a
restart probability ci in this case. Without the restart
action, r(t+1)
in Figure 3 is defined as follows:
u
u ← (1 − ci)
r(t+1)
r(t)
i
2
+ (1 − cj)
r(t)
j
3
+ (1 − ck)r(t)
k
Also, the surfer on any node v jumps back to the
query node with probability cv. The above equation is
rewritten as follows considering the restart action of the
random surfer:
u ← (1 − ci)
r(t+1)
c1r(t)
+
(cid:16)
r(t)
i
2
+ (1 − cj)
r(t)
j
3
+ (1 − ck)r(t)
k
1 + ··· + cvr(t)
v + ··· + cnr(t)
n
1(u = s)
where 1(u = s) is 1 if u is the query node s; otherwise,
it is 0. Note that the restart term is different from that
of the traditional random walk with restart.
Based on the aforementioned example, the recursive
equation of our model is defined as follows:
(3.1)
(cid:17)
(cid:33)
ru =
(1 − cv)
rv
OUTv
cvrv
1(u = s)
where INi
OUTi is the set of out-neighbors of node i.
is the set of in-neighbors of node i, and
Equation (3.1) is expressed in the form of a matrix
equation as follows:
(cid:62)
r = A
(3.2)
(I − diag(c))r +
(cid:62)
c
r
q
(cid:16)
(cid:17)
where A is a row-normalized matrix of the adjacency
matrix A, c is a restart vector whose i-th entry is ci,
diag(c) is a matrix whose diag(c)ii = ci and other
Copyright c(cid:13) 2018 by SIAM
Unauthorized reproduction of this article is prohibited
(cid:88)
v∈INu
+
(cid:32)(cid:88)
v
𝑖𝑗𝑢𝑘 𝒄'𝒄(𝒄)𝒄*entries are 0, and q is a vector whose s-th element is 1
and all other elements are 0. Notice that if c is a vector
all of whose elements are the same, then the RWER is
equal to RWR (or PPR).
The following lemma shows that equation (3.2) can
be represented as a closed form equation.
Lemma 3.1. The closed form w.r.t. r in equation (3.2)
is represented as follows:
r = (I − B)
−1q
(3.3)
where B is A(cid:62)(I − diag(c)) + q(c − 1)(cid:62), A is a row-
normalized matrix, and 1 is an all-ones vector.
Proof. See Section 1.1 of [8].
(cid:4)
Note that if c is given, the RWER vector r can be
calculated using the closed form in Lemma 3.1. How-
ever, the computation using the closed form requires
O(n3) time and O(n2) memory space due to the matrix
inversion where n is the number of nodes; thus, this ap-
proach is impractical when we need to compute RWER
scores in large-scale graphs. In order to avoid the heavy
computational cost, we exploit an efficient iterative al-
gorithm described in Section 3.3.
3.3 Algorithm for Random Walk with Ex-
tended Restart.We present an iterative algorithm for
computing RWER scores efficiently. Our algorithm is
based on power iteration and comprises two phases:
a normalization phase (Algorithm 1) and an iteration
phase (Algorithm 2).
Normalization phase (Algorithm 1). Our pro-
posed algorithm first computes the out-degree diagonal
matrix D of A (line 1). Then, the algorithm computes
the row normalized matrix A using D (line 2).
Iteration phase (Algorithm 2). Our algorithm
computes the RWER score vector r for the seed node
s in the iteration phase. As described in Section 3.2,
the vector q denotes a length-n starting vector whose
entry at the index of the seed node is 1 and otherwise
0 (line 1). Our algorithm iteratively computes equa-
tion (3.2) (line 3). We then compute the error δ between
r(cid:48), the result in the previous iteration, and r (line 4).
Next, we update r(cid:48) into r for the next iteration (line 5).
The iteration stops when the error δ is smaller than a
threshold (line 6).
Theoretical analysis. We analyze the conver-
gence of the iterative algorithm in Theorem 3.1 and the
time complexity in Theorem 3.2. We assume that all the
matrices considered are saved in a sparse format, such as
the compressed column storage [20], which stores only
non-zero entries, and that all the matrix operations ex-
ploit such sparsity by only considering non-zero entries.
Algorithm 1 Normalization phase of RWER
Input: adjacency matrix A
Output: row-normalized matrix A
1: compute a degree diagonal matrix D of A (i.e., Dii =
(cid:80)
j Aij)
2: compute a normalized matrix, A = D−1A.
3: return A
Algorithm 2 Iteration phase of RWER
Input: row-normalized matrix A, query node s, restart
probability vector c, and error tolerance
compute error, δ = (cid:107)r(cid:48) − r(cid:107)
update r ← r(cid:48)
r(cid:48) ← A(cid:62) (I − diag(c)) r +(cid:0)c(cid:62)r(cid:1) q
Output: RWER score vector r
1: set the starting vector q from the seed node s
2: repeat
3:
4:
5:
6: until δ <
7: return r
Theorem 3.1. (Convergence) Suppose
graph
represented by A is irreducible and aperiodic. Then,
the power iteration algorithm (Algorithm 2) for RWER
converges.
the
Proof. See Section 1.2 of [8]
Theorem 3.2. (Time Complexity) The time com-
plexity of Algorithm 2 is O(T m) where T is the number
of iterations, and m is the number of edges.
Proof. See Section 1.3 of [8].
Theorem 3.2 indicates that our method in Algorithm 2
presents the linear scalability w.r.t the number of edges.
3.4 Cost Function. Although our relevance measure
RWER improves the expressiveness of RWR by intro-
ducing a distinct restart probability for each node, it
is difficult to manually investigate the optimal restart
probabilities for all nodes in large graphs. In this sec-
tion, we define the cost function for finding the optimal
restart probabilities.
As mentioned in Section 2.2, our goal is to set the
optimal restart probabilities so that the relevance scores
of positive nodes outweigh those of negative nodes. We
define the following cost function:
F (c) = λ(cid:107)c − o(cid:107)2 +
h(ry − rx)
(cid:88)
arg min
(3.4)
c
x∈P,y∈N
where λ is a regularization parameter that controls the
importance of the regularization term, o is a given origin
vector, h is a loss function, and rx and ry are RWER
scores of nodes x and y, respectively. The cost function
is obtained from the pairwise differences between the
RWER scores of positive and negative nodes. Given
an increasing loss function h, F (c) is minimized as
the scores of positive nodes are maximized and those
Copyright c(cid:13) 2018 by SIAM
Unauthorized reproduction of this article is prohibited
of negative nodes are minimized. The origin vector o
prevents the c vector becoming too small, and serves
as a model regularizer which helps avoid overfitting and
thus improves accuracy, as we will see in Section 4.4.
We set o to a constant vector all of whose elements are
set to a constant. We use the loss function h(x) =
(1 + exp(−x/b))−1 since the loss function maximizes
AUC [17, 5].
3.5 SuRe - Optimizing the Cost Function. Our
goal is to minimize equation (3.4) with respect to c.
Note that the objective function F (c) is not convex.
Thus, we exploit the gradient descent method to find
the local minimum of function F (c). For the purpose,
we first need to obtain the derivative of F (c) w.r.t. c:
∂F (c)
∂c
= 2(c − o) +
= 2(c − o) +
(3.5)
(cid:88)
(cid:88)
x∈P,y∈N
x∈P,y∈N
∂h(ry − rx)
∂c
∂h(δyx)
∂δyx
(
∂ry
∂c
− ∂rx
∂c
)
where δyx is ry − rx. The derivative ∂h(δyx)
function is 1
b h(δyx)(1 − h(δyx)).
∂δyx
of the loss
In order to obtain the derivative ∂rx
∂c , we have to
calculate the derivative of the relevance score rx w.r.t. ci
which is the i-th element of c. Let M be (I−B)−1; then,
r = (I − B)−1q = Mq, M(:, s) = r, and M (x, s) = rx,
from Theorem 3.1.
Since M is the inverse of I − B, according to [19],
becomes:
∂M
∂ci
= −M
∂M
∂ci
∂(I − B)
∂ci
M = M(− A
(cid:62)
Jii + Jsi)M
where Jij is a single-entry matrix whose (i, j)th entry
is 1 and all other elements are 0. Based on the above
equation, ∂M (x,s)
∂M (x, s)
is represented as follows:
= M(x, :)(− A
(cid:62)
(:, i) + es)M (i, s)
∂ci
∂ci
∂c
=
∂ci
(cid:16)
∂rx
∂c
∂M (x, s)
where es is a length n unit vector whose s-th entry is 1.
is calculated for 1 ≤ i ≤ n; then, ∂rx
Note that ∂M (x,s)
is written in the following equation:
(− A + 1e
(cid:62)
s )M(x, :)
(3.6)
where ◦ denotes Hadamard product, and 1 is an all-
ones vector of length n. Similarly, ∂ry
∂c is calculated by
switching x to y.
∂c −
( ∂ry
Using the equation (3.6), (cid:80)
(cid:62)(cid:17) ◦ M(:, s)
∂δyx
∂rx
∂c ) in equation (3.5) is represented as follows:
x∈P,y∈N
∂h(δyx)
∂c
=
(cid:32)
(3.7)
(− A + 1e
(cid:62)
s )
(cid:88)
∂h(δyx)
x∈P,y∈N
∂δyx
(cid:33)
(cid:17) ◦ r
(M(y, :)−M(x, :))
(cid:62)
◦ M(:, s)
(cid:16)
(− A + 1e
(cid:62)
s )r
=
Algorithm 3 SuRe - Learning a restart vector c
Input: adjacency matrix A, query node s, positive set P ,
negative set N , origin vector o, parameter b of loss
function h, and the learning rate η
Output: the learned restart vector c
1: initialize c ← o
2: while c does not converge do
3:
compute r = M(:, s) based on equation (3.2) (Algo-
rithm 2)
compute r = (cid:80)
(M(y, :) − M(x, :))
(cid:62)
x∈P,y∈N
∂h(δyx)
∂δyx
by a linear system solver (Lemma 3.2)
compute ∂F (c)
update c ← c − η ∂F (c)
∂c by equation (3.8)
∂c
6:
7: end while
8: return the learned restart vector c
where r = M(:, s) is an RWER score vector, and r =
in
(cid:62)
(M(y, :) − M(x, :))
(cid:80)
. Then, ∂F (c)
∂c
x∈P,y∈N
∂h(δyx)
∂δyx
4:
5:
equation (3.5) is represented as follows:
(− A + 1e
(cid:62)
s )r
= 2(c − o) +
∂F (c)
(3.8)
∂c
(cid:16)
(cid:17) ◦ r
Notice that we do not obtain M explicitly to
compute M(:, s) in equations (3.8) since M is the inverse
of I − B and inverting a large matrix is infeasible as
mentioned in Section 3.2. Instead, we use the iterative
method described in Algorithm 2 to get r = M(:, s).
However, the problem is that we also require rows of
M (i.e., M(x, :) in r), and Algorithm 2 only computes
a column of M for a given seed node. How can
we calculate r without inverting M? r is computed
iteratively by the following lemma:
∂δyx
∂h(δyx)
x∈P,y∈N
(cid:62)
(M(y, :)− M(x, :))
Lemma 3.2. From the result of equation (3.7), r =
which is repre-
sented as r = M(cid:62) p ⇔ (I − B(cid:62))r = p where p =
(ey − ex), ex is an n × 1 vector whose
x-th element is 1 and the others are 0, and δyx = ry−rx.
Then, r is the solution of the linear system (I− B(cid:62))r =
p which is solved by an iterative method for linear sys-
tems.
x∈P,y∈N
∂h(δyx)
∂δyx
Proof. See Section 1.4 of [8].
(cid:4)
Note that M−(cid:62) = I − B(cid:62) is non-symmetric and
invertible (Lemma 1.1.
of [8]); thus, any iterative
method for a non-symmetric matrix can be used to
solve for r. We use GMRES [21], an iterative method
for solving linear systems since it is the state-of-the-art
method in terms of efficiency and accuracy.
Optimization phase (Algorithm 3). SuRe al-
gorithm for solving the optimization problem is sum-
marized in Algorithm 3 and Figure 4. In the algorithm,
we use a gradient-based method to update the restart
probability c based on equation (3.8).
Copyright c(cid:13) 2018 by SIAM
Unauthorized reproduction of this article is prohibited
(cid:80)
(cid:80)
Table 1: Dataset statistics. The query nodes are used
for the ranking and the link prediction tasks.
Dataset #Nodes
#Edges #Queries
Wikipedia1 3,023,165
Epinions1
131,828
Slashdot1
79,120
HepPh1
34,546
HepTh1
27,770
Polblogs2
1,490
102,382,410
841,327
515,397
421,534
352,768
19,025
-
200
200
135
121
115
1 http://konect.uni-koblenz.de
2 http://www-personal.umich.edu/~mejn/netdata
• Q2.
Link prediction performance (Sec-
tion 4.3). How effective is SuRe for link predic-
tion tasks?
• Q3. Parameter sensitivity (Section 4.4). How
does the value of the origin vector used in SuRe
affect the accuracy of link prediction?
• Q4. Scalability (Section 4.5). How well does
SuRe scale up with the number of edges?
4.1 Experimental Settings.
Datasets. We experiment on various real-world
network datasets. Datasets used in our experiments
are summarized in Table 1. We use Polblogs and
signed networks (Epinions and Slashdot) for the ranking
task (Section 4.2), HepPh and HepTh for the link
prediction task (Section 4.3), and Wikipedia for the
scalability experiment (Section 4.5). Since only HepPh
and HepTh have time information, we use them in the
link prediction task. All experiments are performed on
a Linux machine with Intel(R) Xeon E5-2630 v4 CPU
@ 2.2GHz and 256GB memory.
Methods. We compare our proposed method
SuRe with Common Neighbor (CN) [16], Adamic-
Adar (AA) [1], Jaccard's Coefficient (JC) [22], Random
Walk with Restart (RWR) [6], MRWR [23], Supervised
Random Walks (SRW) [5], and QUINT [15]. We set
parameters in each method to the ones that give the
best performance (see Section 2 of [8] for parameters).
Evaluation Metrics. To compare the methods,
we use Mean Average Precision (MAP), Area under
the ROC curve (AUC), and Precision@20. MAP is the
mean of average precisions for multiple queries. AUC
is the expectation that a uniformly drawn random pos-
itive is ranked higher than a uniformly drawn random
negative. Precision@20 is the precision at the top-20
position in a ranking result. The higher the values of
the metrics are, the better the performance is.
4.2 Ranking Performance.We evaluate the rank-
ing performance of our method SuRe compared to that
of other methods.
Experimental setup. We perform this exper-
iments on the Polblogs dataset and signed networks
Copyright c(cid:13) 2018 by SIAM
Unauthorized reproduction of this article is prohibited
Figure 4: Flowchart of RWER (Algorithms 1 and
2) and SuRe (Algorithm 3).
SuRe learns restart
probability vector c, and RWER computes our node
relevance score vector r for given seed node s.
tation of r = (cid:80)
3.6 Theoretical analysis.We analyze the time com-
plexity of SuRe (Algorithm 3).
Lemma 3.3. Let P and N denote the number of
positive and negative nodes, respectively. The compu-
(M(y, :) − M(x, :))(cid:62) takes
O(T m + PN) time where T is the number of iter-
ations until convergence, and m is the number of edges.
(cid:4)
Proof. See Section 1.5 of [8].
∂h(δyx)
x,y
∂δyx
Based on Lemma 3.3, the time complexity of Algo-
rithm 3 is presented in Theorem 3.3.
Theorem 3.3. (Time complexity of Algorithm 3)
For a given graph with m non-zero elements, the learn-
ing algorithm SuRe takes O(T1(T2m + PN)) time
where T1 is the number of times c is updated with the
gradient, and T2 is the number of inner iterations for
computing r and r.
Proof. See Section 1.6 of [8].
(cid:4)
Theorem 3.3 implies that our learning method
SuRe in Algorithm 3 provides linear time and space
scalability w.r.t. the number m of edges. Notice that
P and N are constants much smaller than m.
4 Experiment
We evaluate our proposed method SuRe with vari-
ous baseline approaches. Since there is no ground-truth
of node-to-node relevance scores in real-world graphs,
we instead evaluate the performance of two represen-
tative applications based on relevance scores: ranking
and link prediction. Based on these settings, we aim to
answer the following questions from the experiments:
• Q1. Ranking performance (Section 4.2).
Does our proposed method SuRe provide the best
relevances scores for ranking compared to other
methods?
Compute𝐫 and𝐫#(Equations3.2)Initialize𝐜←𝐨𝐜𝐫,𝐫#,𝐜,𝐀)𝐀)Compute𝐫(Equation3.2)𝑃𝑁𝑠SuRe:optimize 𝐜𝐜not converged𝐜RWER:compute 𝐫Normalize𝐀𝐫converged𝐫Compute-.(𝐜)-𝐜(Equation3.8)𝐜←𝐜−𝜂𝜕𝐹(𝐜)𝜕𝐜𝑠𝐀),𝐪Initialize𝐪from𝑠Table 2: Ranking results of our proposed method SuRe
and other methods w.r.t. a query node obsidianwings, a
liberal blog. Red colored nodes are conservative blogs,
and the black colored ones are liberal blogs. Our ranking
result from SuRe contains only liberal nodes, indicating
the best result, while other ranking results wrongly
contain conservative nodes.
Rank
SuRe
RWR
SRW
QUINT
1
2
3
4
5
6
7
8
9
10
digbysb
billmon
gadflye
reachm
jameswo
angrybe
marksch
tbogg
wampum
stevegi
freerep
michell
prolife
rightwi
digbysb
littleg
billmon
jameswo
reachm
politic
digbysb
tbogg
liberal
billmon
xnerg
corrent
hughhew
busybus
pacific
nielsen
freerep
michell
prolife
rightwi
digbysb
littleg
billmon
jameswo
reachm
hughhew
(a) Epinions
(b) Slashdot
Figure 6: Ranking performance on the signed networks.
Our method SuRe obtains up to 17.9% higher MAP
and 25.6% higher Precision@20 (in Slashdot) compared
to the best competitor.
(a) MAP
(b) Precision@20
Figure 5: Ranking performance on Polblogs. Our
method SuRe provides the best ranking performance
compared to other methods in terms of MAP and
Precision@20.
(Epinions and Slashdot). See Section 2.1 of [8] for de-
tailed experimental setup.
Case study. We analyze the ranking quality
produced from each method in the Polblogs dataset.
Table 2 shows the top-10 ranking list for a query node
obsidianwings, a liberal blog. Red colored nodes are
conservative, and the black colored ones are liberal. As
shown in the table, our ranking result from SuRe is of
a higher quality compared to those from RWR, SRW,
and QUINT since top-10 ranking result from SuRe
contains only liberal nodes while other ranking results
have several conservative nodes, considering that the
query node is liberal.
Result. To evaluate ranking performances, we
measure MAP, Precision@20, and AUC for the ranking
results produced from our method SuRe including other
random walk based methods. For brevity, we report
MAP and Precision@20 in Polblogs, and MAP and AUC
in Epinions and Slashdot.
In Polblogs, if the query node is liberal (conserva-
tive), then the positive class is liberal (conservative),
Figure 7: Link prediction performance on the HepPh
dataset. SuRe shows the highest accuracies: 12.5%
higher MAP, and 6.8% higher Precision@20 compared
to the best existing method.
and the negative one is conservative (liberal). As shown
in Figure 5, our method SuRe shows the best rank-
ing performance compared to other methods in terms
of MAP and Precision@20.
In signed networks, we evaluate the perfor-
mance of SuRe compared to other baselines includ-
ing MRWR [23], an RWR-based method for signed net-
works. As in Figure 6, our method SuRe shows the
best performance: up to 17.9% higher MAP and 25.6%
higher Precision@20 compared to the best competitor.
4.3 Link Prediction Performance.We examine
the link prediction performance of our proposed method
SuRe compared to other link prediction methods as well
as RWR-based methods SRW and QUINT.
Experimental Setup. We perform this experi-
ments on the HepPh and HepTh datasets which are
time-stamped networks. See Section 2.2 of [8] for de-
tailed experimental setup.
Result. Figures 1 and 7 show the link prediction
performances in terms of MAP and Precision@20. As
Copyright c(cid:13) 2018 by SIAM
Unauthorized reproduction of this article is prohibited
0.6 0.62 0.64 0.66 0.68 0.7 0.78 0.8 0.82 0.84 0.86 0.88 0.9 0.92 0.64 0.66 0.68 0.7 0.72MAPAUC 0.48 0.52 0.56 0.6 0.64 0.68 0.72MAPAUC 0.35 0.4 0.45 0.5 0.55 0.6 0.65MAPP@20shown in the results, our method SuRe outperforms
other competitors including SRW and QUINT which
are the state-of-the-art methods for link prediction. In
the HepTh dataset, compared to the best competitor
SRW, SuRe achieves 15.8% improvement in terms of
MAP, and 10.1% improvement in terms of Precision@20
(Figure 1). For the AUC results, see Section 2.3 of [8].
Note that SuRe provides the best prediction over all
datasets. The results state that assigning a distinct
restart probability to each node and learning the restart
probabilities (RWER and SuRe) have a significant ef-
fect on link prediction compared to using a fixed restart
probability for all nodes (RWR). Furthermore, the re-
sult indicates that learning restart probabilities (SuRe)
provides better link prediction accuracy than existing
supervised learning methods that focus on learning edge
weights (SRW) or network topology (QUINT).
Table 3: Number of parameters for each method.
Dataset
SRW
SuRe QUINT
#parameters O(#f eatures)
O(n)
O(n2)
Discussion. We discuss the above experimental
results in terms of the number of model parameters. As
shown in Table 3, SRW has not enough parameters (i.e.,
#f eatures < n); thus, feature selection is important for
the performance of applications in SRW. On the other
hand, QUINT has too many parameters; thus, QUINT
is prone to overfit. Also, it is infeasible to learn O(n2)
parameters in large-scale graphs. Compared to these
methods, SuRe has a moderate number of parameters,
implying that 1) the expressiveness of SuRe is better
than that of SRW, and 2) SuRe is not likely to overfit
compared to QUINT. This point explains why SuRe
provides better performance of the ranking and link
prediction tasks than SRW and QUINT do as shown
in Sections 4.2 and 4.3.
4.4 Parameter Sensitivity.We investigate the pa-
rameter sensitivity of SuRe w.r.t. the value of the ori-
gin vector o. The origin vector o serves as a model
regularizer which helps avoid overfitting and improves
accuracy, as described in Section 3.4. We evaluate MAP
of ranking and link prediction tasks, and report the re-
sults in Figure 8. Note that the performance of SuRe is
improved by introducing the origin parameter o, com-
pared to the case without o, which corresponds to the
leftmost points in both plots of Figure 8.
4.5 Scalability.We examine the scalability of our
proposed method SuRe compared to other baselines.
We perform the optimization phase in Algorithm 3 with
various sizes of the Wikipedia dataset to investigate the
scalability of SuRe. Figure 9 shows that SuRe scales
near-linearly with the number of edges. The slope of
(a) MAP of ranking task in the
(b) MAP of link prediction task
Polblogs dataset
in the HepTh dataset
Figure 8: Parameter sensitivity of our method SuRe
in Polblogs and HepTh datasets. We report the link
prediction and ranking accuracy using MAP measure,
changing the values of the elements in the origin vector
o in SuRe, where all the elements of o is set to a same
value. Note that the performance of SuRe is improved
by introducing the origin parameter o.
Figure 9: Scalability of SuRe with other baselines in
the Wikipedia dataset. The figure shows that SuRe has
near-linear scalability w.r.t. the number of edges.
the fitted line for SuRe is 0.76, the smallest number:
those for RWR, SRW, and QUINT are 0.83, 0.88, and
2.57, respectively. As shown in Figure 9, SuRe is not
the fastest among the tested methods, but SuRe is the
fastest among all learning based methods (SRW and
QUINT). Note that the result for SuRe is consistent
with Theorem 3.3 which states that SuRe scales near-
linearly w.r.t. the number of edges.
5 Related Works
The related works fall into two main categories: 1)
relevance measures in graphs, and 2) ranking and link
prediction based on relevance measures.
Relevance measures in graphs. There are var-
ious relevance measures in graphs based on link anal-
ysis and random walk, e.g., PageRank [18], HITS [14],
Random Walk Graph Kernel [13], and RWR (or Per-
sonalized PageRank) [6]. Among these measures, RWR
has received much attention from the data mining com-
munity since it provides a personalized ranking w.r.t.
a node, and it has been applied to many graph mining
applications such as community detection [4], link pre-
diction [5, 15], ranking [28], and graph matching [27].
Also, fast and scalable methods [24, 11, 28] for comput-
Copyright c(cid:13) 2018 by SIAM
Unauthorized reproduction of this article is prohibited
0.64 0.65 0.66 0.67 0.68 0.69 0.7 0 0.2 0.4 0.6 0.8MAPValue of oSuRe 0.56 0.58 0.6 0.62 0.64 0.66 0 0.2 0.4 0.6 0.8MAPValue of oSuRe10-310-210-1100101102103104105106107108Running time (sec)Number of edgesSuReRWRSRWQUINTing RWR in large graphs have been proposed to boost
the performance of those applications in terms of time.
Ranking and link prediction. Jung et al. [9] ex-
tended the concept of RWR to design a personalized
ranking model in signed networks. Wang et al. [29]
proposed an image annotation technique that gener-
ates candidate annotations and re-ranks them using
RWR. Liben-Nowell et al. [16] extensively studied the
link prediction problem in social networks based on rele-
vance measures such as PageRank, RWR, and Adamic-
Adar [1]. Many researchers have proposed supervised
learning methods for link prediction. Backstrom et
al. [5] proposed Supervised Random Walk (SRW), a
supervised learning method for link prediction based
on RWR. SRW learns parameters for adjusting edge
weights. Li et al. [15] developed QUINT, a learning
method for finding a query-specific optimal network.
QUINT modifies the network topology including edge
weights. In many real-world scenarios, however, modi-
fying the graph structure would not be allowed. On the
contrary, our SuRe method controls the behavior of the
random surfer without modifying the graph structure,
and provides better prediction accuracy than other com-
petitors as shown in Section 4.
6 Conclusion
We propose Random Walk with Extended
Restart (RWER), a novel relevance measure using
distinct restart probabilities for each node. We also
propose SuRe, a data-driven algorithm for learning
restart probabilities of RWER. Experiments show that
our method brings the best performance for ranking
and link prediction tasks, outperforming the traditional
RWR and recent supervised learning methods. Specifi-
cally, SuRe improves MAP by up to 15.8% on the best
competitor. Future works include designing distributed
algorithms for computing and learning RWER.
References
[1] L. A. Adamic and E. Adar. Friends and neighbors on
the web. Social networks, 25(3):211–230, 2003.
[2] A. Agarwal and S. Chakrabarti. Learning random
walks to rank nodes in graphs. In ICML, 2007.
[3] A. Agarwal, S. Chakrabarti, and S. Aggarwal. Learn-
ing to rank networked entities. In KDD, 2006.
[4] R. Andersen, F. Chung, and K. Lang. Local graph
partitioning using pagerank vectors. In FOCS, 2006.
[5] L. Backstrom and J. Leskovec. Supervised random
walks: predicting and recommending links in social
networks. In WSDM, 2011.
[6] T. H. Haveliwala. Topic-sensitive pagerank. In WWW,
2002.
[7] J. He, M. Li, H.-J. Zhang, H. Tong, and C. Zhang.
Manifold-ranking based image retrieval. In MM, 2004.
[8] W. Jin, J. Jung, and U. Kang. Supplementary material
and codes. http://datalab.snu.ac.kr/sure.
[9] J. Jung, W. Jin, L. Sael, and U. Kang. Personalized
ranking in signed networks using signed random walk
with restart. In ICDM, 2016.
[10] J. Jung, N. Park, L. Sael, and U. Kang. Bepi: Fast and
memory-efficient method for billion-scale random walk
with restart. In Proceedings of the 2017 ACM Interna-
tional Conference on Management of Data, SIGMOD
Conference 2017, Chicago, IL, USA, May 14-19, 2017,
pages 789–804, 2017.
[11] J. Jung, K. Shin, L. Sael, and U. Kang. Random walk
with restart on large graphs using block elimination.
TODS, 41(2):12, 2016.
[12] U. Kang, M. Bilenko, D. Zhou, and C. Faloutsos. Ax-
iomatic analysis of co-occurrence similarity functions.
CMU-CS-12-102, 2012.
[13] U. Kang, H. Tong, and J. Sun. Fast random walk graph
kernel. In SDM, pages 828–838. SIAM, 2012.
[14] J. M. Kleinberg. Authoritative sources in a hyperlinked
environment. JACM, 46(5):604–632, 1999.
[15] L. Li, Y. Yao, J. Tang, W. Fan, and H. Tong. Quint:
On query-specific optimal networks. In KDD, 2016.
[16] D. Liben-Nowell and J. Kleinberg. The link-prediction
problem for social networks. Journal of the Amer-
ican society for information science and technology,
58(7):1019–1031, 2007.
[17] M. C. Mozer. Optimizing classifier performance via an
approximation to the wilcoxon-mann-whitney statistic.
2003.
[18] L. Page, S. Brin, R. Motwani, and T. Winograd. The
pagerank citation ranking: bringing order to the web.
1999.
[19] K. B. Petersen, M. S. Pedersen, et al. The matrix
cookbook. Technical University of Denmark, 7:15,
2008.
[20] W. H. Press, B. P. Flannery, S. A. Teukolsky, W. T.
Vetterling, et al. Numerical recipes, volume 3. cam-
bridge University Press, cambridge, 1989.
[21] Y. Saad and M. H. Schultz. Gmres: A generalized
minimal residual algorithm for solving nonsymmetric
linear systems. SIAM Journal on scientific and statis-
tical computing, 7(3):856–869, 1986.
[22] G. Salton and M. J. McGill. Introduction to modern
information retrieval. 1986.
[23] M. Shahriari and M. Jalili. Ranking nodes in signed
social networks. Social Network Analysis and Mining,
4(1):172, 2014.
[24] K. Shin, J. Jung, S. Lee, and U. Kang. Bear: Block
elimination approach for random walk with restart on
large graphs. In SIGMOD, 2015.
[25] J. Sun, H. Qu, D. Chakrabarti, and C. Faloutsos.
Neighborhood formation and anomaly detection in
bipartite graphs. In ICDM, 2005.
[26] H. Tong and C. Faloutsos. Center-piece subgraphs:
problem definition and fast solutions. In KDD, 2006.
[27] H. Tong, C. Faloutsos, B. Gallagher, and T. Eliassi-
Rad. Fast best-effort pattern matching in large at-
Copyright c(cid:13) 2018 by SIAM
Unauthorized reproduction of this article is prohibited
tributed graphs. In KDD, 2007.
[28] H. Tong, C. Faloutsos, and J.-Y. Pan. Fast random
walk with restart and its applications. 2006.
[29] C. Wang, F. Jing, L. Zhang, and H.-J. Zhang.
Im-
age annotation refinement using random walk with
restarts. In MM, 2006.
[30] Z. A. Zhu, S. Lattanzi, and V. S. Mirrokni. A local
algorithm for finding well-connected clusters. In ICML,
2013.
Copyright c(cid:13) 2018 by SIAM
Unauthorized reproduction of this article is prohibited
|
1910.05736 | 1 | 1910 | 2019-10-13T12:09:12 | Collective Link Prediction Oriented Network Embedding with Hierarchical Graph Attention | [
"cs.SI",
"physics.soc-ph"
] | To enjoy more social network services, users nowadays are usually involved in multiple online sites at the same time. Aligned social networks provide more information to alleviate the problem of data insufficiency. In this paper, we target on the collective link prediction problem and aim to predict both the intra-network social links as well as the inter-network anchor links across multiple aligned social networks. It is not an easy task, and the major challenges involve the network characteristic difference problem and different directivity properties of the social and anchor links to be predicted. To address the problem, we propose an application oriented network embedding framework, Hierarchical Graph Attention based Network Embedding (HGANE), for collective link prediction over directed aligned networks. Very different from the conventional general network embedding models, HGANE effectively incorporates the collective link prediction task objectives into consideration. It learns the representations of nodes by aggregating information from both the intra-network neighbors (connected by social links) and inter-network partners (connected by anchor links). What's more, we introduce a hierarchical graph attention mechanism for the intra-network neighbors and inter-network partners respectively, which resolves the network characteristic differences and the link directivity challenges effectively. Extensive experiments have been conducted on real-world aligned networks datasets to demonstrate that our model outperformed the state-of-the-art baseline methods in addressing the collective link prediction problem by a large margin. | cs.SI | cs | Collective Link Prediction Oriented Network Embedding
with Hierarchical Graph A(cid:130)ention
Yizhu Jiao
Yun Xiong
Shanghai Key Laboratory of Data Science, Shanghai
Institute for Advanced Communication and Data Science,
Shanghai Key Laboratory of Data Science, Shanghai
Institute for Advanced Communication and Data Science,
School of Computer Science, Fudan University,
Shanghai, China, [email protected]
School of Computer Science, Fudan University,
Shanghai, China, [email protected]
9
1
0
2
t
c
O
3
1
]
I
S
.
s
c
[
1
v
6
3
7
5
0
.
0
1
9
1
:
v
i
X
r
a
Jiawei Zhang
IFM Lab, Department of Computer Science
Florida State University, Tallahassee, FL, USA
[email protected]
Yangyong Zhu
Shanghai Key Laboratory of Data Science, Shanghai
Institute for Advanced Communication and Data Science,
School of Computer Science, Fudan University,
Shanghai, China, [email protected]
ABSTRACT
To enjoy more social network services, users nowadays are usually
involved in multiple online sites at the same time. Aligned social
networks provide more information to alleviate the problem of data
insu(cid:129)ciency. In this paper, we target on the collective link predic-
tion problem and aim to predict both the intra-network social links
as well as the inter-network anchor links across multiple aligned
social networks. It is not an easy task, and the major challenges
involve the network characteristic di(cid:130)erence problem and di(cid:130)erent
directivity properties of the social and anchor links to be predicted.
To address the problem, we propose an application oriented net-
work embedding framework, Hierarchical Graph A(cid:138)ention based
Network Embedding (HGANE), for collective link prediction over
directed aligned networks. Very di(cid:130)erent from the conventional
general network embedding models, HGANE e(cid:130)ectively incorpo-
rates the collective link prediction task objectives into consideration.
It learns the representations of nodes by aggregating information
from both the intra-network neighbors (connected by social links)
and inter-network partners (connected by anchor links). What's
more, we introduce a hierarchical graph a(cid:138)ention mechanism for
the intra-network neighbors and inter-network partners respec-
tively, which resolves the network characteristic di(cid:130)erences and
the link directivity challenges e(cid:130)ectively. Extensive experiments
have been conducted on real-world aligned networks datasets to
demonstrate that our model outperformed the state-of-the-art base-
line methods in addressing the collective link prediction problem
by a large margin.
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for pro(cid:128)t or commercial advantage and that copies bear this notice and the full citation
on the (cid:128)rst page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permi(cid:138)ed. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior speci(cid:128)c permission and/or a
fee. Request permissions from [email protected].
CIKM '19, Beijing, China
© 2019 ACM. 978-1-4503-6976-3/19/11...$15.00
DOI: 10.1145/3357384.3357990
CCS CONCEPTS
•Information systems → Data mining; Social networks;
•Computing methodologies → Knowledge representation and
reasoning;
KEYWORDS
Multiple Aligned Networks, Collective Link Prediction, A(cid:138)ention,
Embedding
ACM Reference format:
Yizhu Jiao, Yun Xiong, Jiawei Zhang, and Yangyong Zhu. 2019. Collective
Link Prediction Oriented Network Embedding
with Hierarchical Graph A(cid:138)ention. In Proceedings of (cid:138)e 28th ACM Inter-
national Conference on Information and Knowledge Management, Beijing,
China, November 3 -- 7, 2019 (CIKM '19), 10 pages.
DOI: 10.1145/3357384.3357990
1 INTRODUCTION
Nowadays, online social networks have become very popular and
extensively used in our lives. To enjoy more services, it is ubiq-
uitous for users to participate in multiple online social platforms
concurrently. For example, users may share photos with Instagram
and check the latest news information via Twi(cid:138)er. To simplify
the sign up/in process, most social platforms usually allow users
to use their existing Twi(cid:138)er/Facebook/Google IDs to create their
accounts at these new social sites, which will align di(cid:130)erent online
networks together naturally. Each of these platforms can be repre-
sented as a massive network where nodes represent user accounts
and intra-network links represent the social relationships among
users. Especially, accounts owned by the same user in di(cid:130)erent
networks are de(cid:128)ned as anchor nodes [9] and inter-network cor-
responding relationships between the anchor users are de(cid:128)ned as
anchor links [9]. Di(cid:130)erent online networks connected by anchor
links are de(cid:128)ned as multiple aligned social networks [31].
In recent years, there has been a surge of interest in multi-
network analysis. Traditional methods that target on one single
network require su(cid:129)cient information to build e(cid:130)ective models.
However, as proposed in [25], this assumption can be violated seri-
ously when dealing with the cold start [10] and data sparsity prob-
lems. (cid:140)e study of multiple aligned networks provides a direction
to alleviate the data insu(cid:129)ciency problem. Some research works
propose to transfer information across networks by anchor links to
enhance the link prediction results within multiple networks mu-
tually [1, 30, 31]. Besides, many existing works aim at anchor link
formation prediction [11, 12, 21]. However, most of these works
study either intra-network or inter-network link prediction tasks
separately. As discovered in [26], multiple link prediction tasks
in the same networks can actually be done simultaneously and
enhanced mutually due to their strong correlations.
Predicting multiple kinds of links among users across multiple
aligned networks is de(cid:128)ned as the collective link prediction prob-
lem in [23]. (cid:140)e collective link prediction problem covers several
di(cid:130)erent link formation prediction tasks simultaneously including
both the intra-network social link prediction and the inter-network
anchor link prediction. It can take advantage of the strong cor-
relations between these di(cid:130)erent tasks to enhance the prediction
performance across these aligned networks synergistically. Fig-
ure 1 shows an example of the collective link prediction tasks of
two social networks. In the (cid:128)gure, black lines with the arrow indi-
cate existing directed intra-network social links and the gray lines
indicate the existing inter-network anchor links instead. (cid:140)ese
directed/undirected red dashed lines with question marks signify
the potential intra-network and inter-network links to be predicted,
respectively.
(cid:140)e problem of collective link prediction is worth exploring due
to both its importance and novelty. Some existing methods have
been introduced to tentatively address the problem [23]. However,
these existing methods mostly ignore the contradiction of di(cid:130)erent
characteristics of aligned networks or adopt (cid:128)xed parameters to
control the proportion of information di(cid:130)used across networks,
which usually need to be (cid:128)ne-tuned manually. Besides, these works
also fail to consider the connectivity of the links within and across
networks.
(cid:140)e collective link prediction problem studied in this paper is
also very challenging to solve due to the following reasons:
• Network characteristic di(cid:130)erences: Since users nor-
mally join in di(cid:130)erent networks for di(cid:130)erent purposes,
each network usually has di(cid:130)erent characteristics and re-
veals di(cid:130)erent aspects of the users. For example, profes-
sional relations are established on LinkedIn while personal
social-tiers are built in Twi(cid:138)er. (cid:140)us, information trans-
ferred from other networks may be di(cid:130)erent from the target
network that we want to study. Previous work found in-
formation transfer could also deteriorate the performance
of intra-network link prediction [31]. Correspondingly,
anchor link prediction can be more susceptible as anchor
links are directly related to information transferred across
networks. (cid:140)erefore, it is more crucial but challenging to
overcome network characteristic di(cid:130)erence problem for
collective link prediction.
• Link directivity di(cid:130)erences: (cid:140)e intra-network social
links are usually uni-directed from the initiator pointing
Figure 1: An example of collective link prediction over mul-
tiple aligned networks
to the recipient instead. For the users involved in the so-
cial network, the social links pointing to them re(cid:131)ect the
objective recognition from the community, whereas that
from them to others re(cid:131)ect their personal social interest.
(cid:140)us, these social relations collaboratively de(cid:128)ne a unique
character in social networks. However, the inter-network
anchor links are bi-directed according to the de(cid:128)nition.
Such di(cid:130)erent directivity properties on social links and an-
chor links should be carefully considered in the prediction
model.
In this paper, we propose a novel application oriented network
embedding framework, namely Hierarchical Graph A(cid:138)ention based
Network Embedding (HGANE), to solve the collective link pre-
diction problem over aligned networks. Very di(cid:130)erent from the
conventional general network embedding models, HGANE e(cid:130)ec-
tively incorporates the collective link prediction task objectives into
consideration. It learns node embeddings in multiple aligned net-
works by aggregating information from the related nodes, including
both the intra-network social neighbors and inter-network anchor
partners. What's more, we introduce a hierarchical graph a(cid:138)en-
tion mechanism for the intra-network neighbors and inter-network
partners respectively, which handles the network characteristic
di(cid:130)erences and link directivity di(cid:130)erences. HGANE balances be-
tween the prediction tasks of both the intra-network social link
and inter-network anchor link and the learned embedding results
can resolve the collective link prediction problem e(cid:130)ectively. We
conduct detailed empirical evaluations using several real-world
datasets and show that our model outperforms other competitive
approaches.
We summarize the main contributions of this paper as follows:
• We propose a novel embedding framework to learn the
representations of nodes by aggregating information from
both the intra-network neighbors (connected by social
links) and inter-network partners (connected by anchor
links).
• We introduce a hierarchical graph a(cid:138)ention mechanism.
It includes two levels of a(cid:138)ention mechanisms (cid:128)(cid:148) one at
the node level and one at the network level (cid:128)(cid:148) to resolve
the network characteristic di(cid:130)erences and link directivity
challenges e(cid:130)ectively.
• HGANE incorporates the collective link prediction task
objectives into consideration and balances between the
prediction tasks of the intra-network social link and inter-
network anchor link, respectively.
• Extensive experiments are conducted on two real-world
aligned social network datasets. (cid:140)e results demonstrate
that the proposed model outperforms existing state-of-the-
art approaches by a large margin.
(Multiple Aligned Social Networks) :
2 PRELIMINARY
In this
De(cid:128)nition 1.
paper, we follow the de(cid:128)nitions introduced in [9]. Given n
networks {G(1), . . . , G(n)} with shared users, they can be de-
(cid:128)ned as multiple aligned networks G = ((G(1), G(2), · · · , G(n)),
(A(1,2), A(1,3), · · · , A(1,n), A(2,3), · · · , A(n−1,n))), where G(i)
(V (i), E(i)), i ∈ {1, 2, · · · , n} is a network consisting of nodes and
links, and A(i, j) represents the anchor links between G(i) and G(j).
For two nodes v(i) ∈ V (i) and v(j) ∈ V (j), node pair (v(i), v(j)) ∈
A(i, j) i(cid:130) v(i) and v(j) are the accounts of the same user in networks
G(i) and G(j) respectively.
For two online networks, such as Foursquare and Twi(cid:138)er used
in this paper, we can represent them as two aligned social networks
G = ((G(1), G(2)),(A(1,2))), which will be used as an example to
illustrate the model. A simple extension of the proposed framework
can be applied to multiple aligned networks conveniently.
=
Table 1: Descriptions of notations in our framework.
Notation
ui
vj
uin
i
vin
j
ur e
i
vr e
j
Ni(ui)
Nr(ui)
Na(ui)
ein(ui , uj)
ein(ui , vj)
er e(ui , uj)
er e(ui , vj)
Description
Node i in G(1)
Node j in G(2)
Initiator feature of ui in G(1)
Initiator feature of vi in G(2)
Recipient feature of ui in G(1)
Recipient feature of vi in G(2)
Inter-network anchor partners of ui
Intra-network neighbors of ui as the initiator
Intra-network neighbors of ui as the recipient
Intra-network initiator a(cid:138)ention of ui to uj
Inter-network initiator a(cid:138)ention of ui to vj
Intra-network recipient a(cid:138)ention of ui to uj
Inter-network recipient a(cid:138)ention of ui to vj
Problem De(cid:128)nition : (cid:140)e collective link prediction problem
studied in this paper includes simultaneous prediction of both intra-
network social links and inter-network anchor links. Formally,
given two aligned networks G = ((G(1), G(2)),(A(1,2))) where both
of G(1) and G(2) are directed social networks. We can represent all
the unknown social links among the nodes in G(k) as U (k) = V (k) ×
V (k)\(E(k) ∪ {(u, u)}u∈V (k)) where k ∈ {1, 2}. And the unknown
anchor links across G(1) and G(2) can be denoted as U (1,2) = V (1) ×
V (2)\A(1,2). We aim at building a mapping f : U (1)∪U (2)∪U (1,2) →
[0, 1] to project these intra-network social links and inter-network
anchor links to their formation probabilities.
3 PROPOSED METHOD
In this section, we will introduce the framework HGANE in detail.
For the convenience of elaboration, we provide the main notations
used through this paper in Table 1. At the beginning, the hierar-
chical graph a(cid:138)ention mechanism will be introduced to handle the
problems of network characteristic di(cid:130)erences and link directivity
challenges. A(cid:137)er that, we will propose a novel node embedding
method in multiple aligned networks. Finally, we will introduce
the application oriented network embedding framework which can
resolve the collective link prediction problem e(cid:130)ectively.
3.1 Hierarchical Graph Attention Mechanism
Social networks consist of nodes and social links, while multiple
aligned social networks consist of many social networks and anchor
links across them. (cid:140)erefore, multiple aligned social networks have
a hierarchical structure, which is illustrated in Figure 2. Besides,
for the target node, it is observed that the relevance of di(cid:130)erent
Figure 2: Hierarchical structure of multiple aligned net-
works
neighbors is di(cid:130)erent. For the target network, other networks are
di(cid:130)erentially informative since they have di(cid:130)erent characteristics.
Furthermore, as each node is cooperatively characterized by its
neighbor nodes and anchor partners in other networks, their im-
portance is highly dependent on node embeddings.
(cid:140)erefore, we propose the hierarchical graph a(cid:138)ention mecha-
nism in this section. It includes two levels of a(cid:138)ention mechanisms
(cid:128)(cid:148) one at the node level and the other at the network level (cid:128)(cid:148) to
make our model pay more or less a(cid:138)ention to di(cid:130)erent neighbor
nodes and networks when constructing the node representations.
(cid:140)ese two levels of a(cid:138)ention mechanisms are formally called the
intra-network social a(cid:136)ention and the inter-network anchor a(cid:136)ention.
(cid:140)ey are essential to resolve the problems of network characteristic
di(cid:130)erences and link directivity challenges in the multiple aligned
networks. In the following subsections, we will introduce the de(cid:128)-
nitions and motivations of these two a(cid:138)ention mechanisms.
Intra-Network Social A(cid:130)ention.
3.1.1
Given two aligned networks G = ((G(1), G(2)),(A(1,2))), the an-
chor links are de(cid:128)ned to be bi-directed; while the intra-network
social links are usually uni-directed from the initiator pointing
to the recipient instead. (cid:140)us, every node plays these two roles
within the social network. Normally, we represent each node ui
i ∈ Rd and
with two vector representations, the initiator feature uin
i ∈ Rd, where d is the feature dimension.
the recipient feature ur e
(cid:140)e initiator feature uin
represents the characteristic of the node
i
as the initiator following others while the recipient feature ur e
i
represents the characteristic of the node as the recipient followed
by others. By distinguishing the initiator and recipient features for
each node, we can lay the foundation for resolving the problem of
link directivity challenges e(cid:130)ectively.
For the target node ui, we de(cid:128)ne the nodes followed by it as
its intra-network recipient neighbors. (cid:140)e set of intra-network
recipient neighbors of the initiator ui is denoted as Ni(ui). (cid:140)e
node uj ∈ Ni(ui) i(cid:130) (ui , uj) ∈ E(1). Similarly, the nodes following
ui are de(cid:128)ned as its intra-network initiator neighbors and the set of
these neighbors of the recipient ui is denoted as Nr(ui). (cid:140)e node
uj ∈ Nr(ui) i(cid:130) (uj , ui) ∈ E(1). Here, based on the two node roles,
we introduce intra-network initiator a(cid:136)ention and intra-network
recipient a(cid:136)ention, to leverage the structural information within
the social network.
For intra-network social neighbors, the characteristic of the
initiator is relevant to the recipient. (cid:140)e intra-network initiator
a(cid:138)ention mechanism computes the coe(cid:129)cients to judge the impor-
tance of the intra-network recipient neighbor to the target initiator.
Here, the concept of intra-network initiator a(cid:138)ention mechanism
can be represented formally.
De(cid:128)nition 2. (Intra-Network Initiator A(cid:138)ention) : For the target
node ui and its intra-network recipient neighbor uj ∈ Ni(ui), the
intra-network initiator a(cid:138)ention coe(cid:129)cient of ui to uj can be given
as
(cid:16)
where ·T represents transposition and (cid:107) is the concatenation op-
(1)
(1)
in ∈ Rd(cid:48)×d and W
r e ∈ Rd(cid:48)×d are the weight matrixes
eration. W
applied to every node as the initiator and the recipient for shared
(1)T
linear transformation in G(1). a
in ∈ R2d(cid:48) is a weight vector and
(1)T
σ denotes the activation function. a
will be
r e
used with similar meanings.
ein(ui , uj) = σ
(1,2)T
and a
r e
(cid:13)(cid:13)(cid:13)W
(1,2)T
, a
in
(1)
in uin
i
(1)
r e ur e
j
(1)T
a
in
(cid:105)(cid:17)
(cid:104)
W
,
Similarly, since the characteristics of the initiator and the recipi-
ent are correlative, we can introduce the de(cid:128)nition of intra-network
initiator a(cid:138)ention mechanism formally to obtain the importance of
the intra-network initiator neighbor to the target recipient.
De(cid:128)nition 3. (Intra-Network Recipient A(cid:138)ention) : For the target
node ui and its intra-network initiator neighbor uj ∈ Nr(ui), the
intra-network recipient a(cid:138)ention coe(cid:129)cient of ui to uj can be given
as
(cid:16)
(cid:104)
er e(ui , uj) = σ
W
is also a weight vector.
(1)T
a
r e
(1)
r e ur e
i
(1)
in uin
j
(cid:13)(cid:13)(cid:13)W
(cid:105)(cid:17)
,
(1)T
where a
r e
With these two kinds of intra-network a(cid:138)ention mechanism, our
model can pay more a(cid:138)ention on useful information and neglect
harmful information within the social networks. It is signi(cid:128)cant
to resolve the problem of directivity challenges e(cid:130)ectively and
leverage structural information within social networks.
Inter-Network Anchor A(cid:130)ention.
3.1.2
Di(cid:130)erent from the intra-network social a(cid:138)ention mechanism
which targets at the node level, the inter-network anchor a(cid:138)ention
is for the network level. (cid:140)e anchor links connecting multiple
networks play a crucial role in cross-network information transfer.
However, due to the problem of network characteristic di(cid:130)erences,
information transferred from other networks could also undermine
the learned embeddings of the target network.
To handle this problem, we introduce the inter-network anchor
a(cid:138)ention mechanism. For the target node, the inter-network anchor
a(cid:138)ention coe(cid:129)cient to its anchor partners in the other network
indicates the importance of information transferred from that net-
work. As mentioned in the last section, each node is represented
by the initiator and recipient embeddings. To transfer the directed
structural information within networks, two kinds of inter-network
anchor a(cid:138)ention will be introduced according to these two roles of
the nodes.
Di(cid:130)erent from uni-directed social links, since the anchor nodes
reveal the information of the same user from di(cid:130)erent aspects, it
is intuitive that their initiator and recipient features in di(cid:130)erent
networks can be related correspondingly. For the target node and
its anchor partner in some network, the inter-network initiator
a(cid:138)ention coe(cid:129)cient indicates the importance of information from
that network to the target node as the initiator. Firstly, we represent
the set of the inter-network anchor partners in the other network
for the target node ui as Na(ui). If the node pair (ui , vj) ∈ A(1,2),
vj ∈ Na(ui). And the de(cid:128)nition of inter-network initiator a(cid:138)ention
is introduced as follows.
De(cid:128)nition 4. (Inter-Network Initiator A(cid:138)ention): For the target
node ui and its inter-network anchor partner vj ∈ Na(ui), the intra-
network initiator a(cid:138)ention coe(cid:129)cient of ui to vj as the initiator
can be given as
,
W
(1)
in uin
i
(1,2)T
a
in
(1,2)
in vin
j
is a weight vector.
ein(ui , vj) = σ
(1,2)
where W
is the weight matrix applied to every anchor node
in
in G(2) as the initiator while transferring information to G(1) and
(1,2)T
a
in
Similarly, considering the recipient role of nodes, it is intuitive
that the recipient features of anchor partners are related. Based
on this, we give the concept of inter-network recipient a(cid:138)ention,
which denotes the importance of information from that network to
the target node as the recipient.
De(cid:128)nition 5. (Inter-Network Recipient A(cid:138)ention) : For the target
node ui and its inter-network anchor partner vj ∈ Na(ui), the intra-
network recipient a(cid:138)ention coe(cid:129)cient of ui to vj as the recipient
can be given as
(cid:13)(cid:13)(cid:13)W
(cid:105)(cid:17)
(cid:16)
(cid:16)
(cid:104)
(cid:104)
(cid:13)(cid:13)(cid:13)W
(cid:105)(cid:17)
,
er e(ui , vj) = σ
(1,2)
where W
r e
(1,2)T
the recipient and a
r e
(1,2)T
a
r e
(1)
r e ur e
i
W
(1,2)
r e vr e
j
is the weight matrix for every anchor node in G(2) as
is also a weight vector.
Inter-network anchor a(cid:138)ention mechanism can make a great con-
tribution to e(cid:130)ective cross-network information transfer. It handles
the problem of network characteristic di(cid:130)erences by making our
model focus on more important networks with useful information.
Besides, to make multiple coe(cid:129)cients easily comparable across
di(cid:130)erent nodes, we normalize all the coe(cid:129)cients mentioned above
across all choices of intra-network neighbors and inter-network
partners using the so(cid:137)max function. (cid:140)us, the four kinds of at-
tention coe(cid:129)cients of the concerned nodes within networks and
across networks can be rewri(cid:138)en into a uni(cid:128)ed formula:
(eop(ui , uj/vj))
op
ui
αop(ui , uj/vj) = so(cid:135)maxuj/vj
, where op ∈ {in, re} indicates the role of the target node. And the
denominator is set as
= exp(eop(ui , uj/vj))(cid:46)
exp(eop(ui , uk)) +
=
exp(eop(ui , vk))
SU M
op
ui
SU M
uk ∈Nop(ui)
vk ∈Na(ui)
3.2 Multiple Aligned Network Embedding
With the hierarchical graph a(cid:138)ention introduced in the previous
section, we will introduce the cross-network embedding framework
HGANE in this part. HGANE is based on the cross-network graph
neural network model, which extends the traditional graph neural
network (GNN) model [16] to the multiple aligned social networks
scenario. According to the principle of GNN, embeddings can cap-
ture the localized structural features by utilizing information propa-
gated from the intra-network social neighbors. What's more, it can
preserve more comprehensive features by leveraging cross-network
information transferred by anchor links. (cid:140)erefore, HGANE learns
the node representations by aggregating information from both the
intra-network neighbors and inter-network partners. At the same
time, HGANE takes advantage of the hierarchical graph a(cid:138)ention
mechanism to focus on more important information to handle the
problems of network characteristic di(cid:130)erences and link directivity
challenges. (cid:140)e architecture of HGANE is illustrated in Figure 3.
, ac-
cording to its two role in social networks. (cid:140)e implicit initiator and
(cid:48) ∈ Rd(cid:48)
recipient representations of the node are represented as uin
i
(cid:48) ∈ Rd(cid:48) of the potentially di(cid:130)erent dimension d(cid:48).
and ur e
i
Each node is represented by two embeddings, uin
i
(cid:140)e initiator embedding of ui, uin
i
, which indicates its features
as the initiator in the social network, depends on its intra-network
recipient neighbors. (cid:140)erefore, for the node uj ∈ Ni(ui), ur e
j
with the coe(cid:129)cient, αin(ui , uj), determined
can contribute to uin
i
by intra-network initiator a(cid:138)ention. We de(cid:128)ne the intra-network
neighbor recipient contribution (NRC) from uj to ui as
and ur e
i
N RC(ui , uj) = αin(ui , uj)W
(1)
r e ur e
j
As to inter-network anchor partners, node embeddings can pre-
serve more comprehensive information by taking their features of
the same role in other networks into consideration. For the anchor
node vj ∈ Na(ui), its initiator embedding vin
also contribute to
j
the initiator embedding uin
of the target node. To overcome the
i
problem of network characteristic di(cid:130)erences, the inter-network
initiator a(cid:138)ention will compute the weights of information from
di(cid:130)erent networks. (cid:140)e inter-network partner initiator contribution
(PIC) from vj to ui is introduced as
PIC(ui , vj) = αin(ui , vj)W
(1,2)
in vin
j
Formally, we can obtain the initiator embedding of ui by aggre-
gating the intra-network neighbor recipient contribution and the
inter-network partner initiator contribution as
(cid:16)
uj ∈Ni(ui)
N RC(ui , uj) +
PIC(ui , vj)(cid:17)
,
vj ∈Na(ui)
(cid:48)
uin
i
= σ
where σ denotes a nonlinearity. Besides, the recipient embedding
of ui, ur e
, can be generated in the similar way. Inter-network and
i
inter-network recipient a(cid:138)ention will determine the importance
of di(cid:130)erent related nodes' contribution. As the recipient, ui is
naturally characterized by its intra-network initiator neighbors
who actively follow it in social networks. Such intuition leads to
the contribution from every node, such as uj ∈ Nr(ui), to ui. (cid:140)e
intra-network neighbor initiator contribution (NIC) from uj to ui can
be de(cid:128)ned as
(1)
N IC(ui , uj) = αr e(ui , uj)W
in uin
j
(cid:140)e inter-network anchor partners provide more information
about the recipient role of the target node from di(cid:130)erent sources.
(cid:140)us, the recipient embedding of ui will aggregate the information
from other networks by the anchor nodes with di(cid:130)erent weights
computed by the inter-network recipient a(cid:138)ention in other net-
works. We can obtain the inter-network partner recipient contribu-
tion (PRC) from uj to ui to be
PRC(ui , vj) = αr e(ui , vj)W
(1,2)
r e vr e
j
By combining these contributions from intra-network initiator
neighbors and inter-network partners, the recipient embedding of
ui can be represented formally as
N IC(ui , uj) +
PRC(ui , vj)(cid:17)
(cid:48) = σ
ur e
i
(cid:16)
uj ∈Nr (ui)
vj ∈Na(ui)
To stabilize the learning process of node embeddings, we have
found extending our mechanism to employ multi-head a(cid:138)ention to
be bene(cid:128)cial, inspired by Vaswani et al. 2017 [20]. Speci(cid:128)cally, K
independent a(cid:138)ention mechanisms execute the above transforma-
tion, and then their embeddings are concatenated, resulting in the
following initiator and recipient feature representations:
(cid:16)
(cid:16)
σ
σ
K(cid:110)
K(cid:110)
k =1
uj ∈Ni(ui)
k =1
uk ∈Nr (ui)
N RCk(ui , uj) +
N ICk(ui , uj) +
vj ∈Na(ui)
PICk(ui , vj)(cid:17)
PRCk(ui , vj)(cid:17)
vj ∈Na(ui)
(cid:48)
=
uin
i
(cid:48) =
ur e
i
where NRC, PIC, NIC and PRC with the subscript k in the formu-
las denote the contributions computed with the k-th hierarchical
a(cid:138)ention mechanism.
With reference to above equations, the formula derivation of
computing the node embeddings for G(2) can be obtained in the
similar way. (cid:140)ey are not listed due to the page limit.
3.3 Collective Link Prediction Oriented
Network Embedding Framework
(cid:140)e embeddings of each node in multiple aligned networks can be
generated by aggregating information from both the intra-network
neighbors and inter-network partners as introduced in last section.
In this part, we will introduce the network embedding optimization
framework oriented to collective link prediction. (cid:140)e task includes
Figure 3: HGANE model architecture. Each node is represented by the initiator and recipient embeddings (the orange and
green little squares) in the aligned networks. (cid:135)e le(cid:133) plot provides the example of learning node embeddings (u1 in Net1) by
aggregating information from both the intra-network neighbors (u2, u3 in Net1) and inter-network partners (v1 in Net2), which
is weighted by hierarchical graph attention. (cid:135)e right plot illustrates how HGANE resolves the collective link prediction with
the learned embeddings.
the simultaneous prediction of the social links within each network
and the anchor links between every two networks.
For a node pair (ui , uj) within the social network, we de(cid:128)ne
the probability of the intra-network social link formation from the
initiator ui pointing to the recipient uj as
p(cid:0)ui , uj
(cid:1),
T · ur e
j
i
(cid:1) = σ(cid:0)uin
(cid:1) +
{(um,un)}
where σ(x) = 1/(1+exp(−x)) is the sigmoid function. And we adopt
the approach of negative sampling [13] to de(cid:128)ne the objective of
intra-network social link formation from the initiator uj to the
recipient ui as
(cid:0)ui , uj
(cid:1) = log p(cid:0)ui , uj
Lsoc
log(cid:0)1 − p(cid:0)um, un
(cid:1)(cid:1),
where {(um, un)} denotes the set of the negative social links random
sampled from the unknown links among nodes in G(1).
In the
objective, the (cid:128)rst term models the existing social links while the
second term models the negative links. By adding the objective of
each intra-network social link, the (cid:128)nal objective for G(1) can be
formally represented as
L(1) =
(ui,uj)∈E(1)
Lsoc(ui , uj)
Similarly, we can de(cid:128)ne the objective for the embedding results
for G(2), which can be formally represented as L(2).
Besides, anchor nodes re(cid:131)ect information of same users. (cid:140)ere-
fore, their features tend to be in a close region in the embedding
space whether as the initiator or the initiator. For the cross-network
node pair (ui , vj) where ui ∈ E(1) and vi ∈ E(2), we concatenate
the initiator and recipient embeddings of each node to de(cid:128)ne the
the probability of the inter-network anchor link formation as
p(cid:0)ui , vj
(cid:1) = σ(cid:0)(cid:0)uin
i (cid:107)ur e
i
(cid:1)T ·(cid:0)vin
j (cid:107)vr e
j
(cid:1)(cid:1)
Similarly with the objective of the intra-network social link
formation, the objective of node alignment with negative sampling
can be de(cid:128)ned as
(cid:0)ui , vj
(cid:1) = log p(cid:0)ui , vj
(cid:1) +
log(cid:0)1 − p(cid:0)um, vn
(cid:1)(cid:1),
Lach
{(um,vn)}
where {(um, vn)} denotes the set of the negative anchor links ran-
dom sampled from the unknown anchor links across G(1) and G(2).
By aligning anchor nodes, we can leverage information from mul-
tiple sources to learn the node embeddings comprehensively. In-
formation transfer across networks is achieved based on every
inter-network anchor link. Formally, the information transfer ob-
jective between G(1) and G(2) is represented by summing up the
the objective of each anchor link as
L(1,2) =
(ui,vj)∈A(1,2)
(cid:0)Lach
(cid:0)ui , vj
(cid:1)(cid:1)
To incorporate the collective link prediction task into a uni(cid:128)ed
framework, we learn the node representations with rich informa-
tion by jointly training the objective function including the ob-
jective for networks G(1), G(2), and the objective of information
transfer, which can be denoted as
(1)
, G
G
= L(1) + L(2) + α · L(1,2) + β · Lr e❕
L(cid:16)
(2)(cid:17)
(cid:140)e parameter α denotes the weight of the information transfer
objective to balance between the several prediction tasks of both
the intra-network social link and the inter-network anchor link. In
the objective function, the term Lr e❕ is added to avoid over(cid:128)(cid:138)ing
and the parameter β denotes the weight of it. By optimizing the
above objective function, the node embeddings can be learned to
resolve the collective link prediction problem e(cid:130)ectively.
Table 2: Statistics of datasets
Dataset
Twi(cid:138)er
Foursquare
Facebook
Twi(cid:138)er
#Nodes
5,223
5,392
4,137
4,137
#Social Links
164,920
76,972
57,528
147,726
#Anchor Links
3,388
4,137
4 EXPERIMENT
4.1 Datasets
We conducted experiments using two real-world aligned social
networks: Twi(cid:138)er-Foursquare and Facebook-Twi(cid:138)er(Statistical in-
formation in Table 2):
• Twitter-Foursquare [9]: Twi(cid:138)er is the most popular
worldwide microblog site and Foursquare is the famous
location-based social network. (cid:140)ere are 5,223 users
and 164,920 follow links in Twi(cid:138)er and 5,392 users and
76,972 social links in Foursquare. Among these crawled
Foursquare users, 3,388 of them are aligned by anchor links
with Twi(cid:138)er.
• Facebook-Twitter [2]: Facebook is another worldwide
online social media. (cid:140)e Facebook and Twi(cid:138)er accounts of
4,137 users were crawled. Every node has a counterpart in
the other network. (cid:140)ere are 57,528 social links in Facebook
and 147,726 follow links in Twi(cid:138)er among these users.
It is noted that these two datasets were crawled respectively and
there is no overlap of these two Twi(cid:138)er subnetworks.
Source Code: (cid:140)e source code of HGANE is available in h(cid:138)p:
//github.com/yzjiao/HierarchicalGraphA(cid:138)ention.
4.2 Comparison Methods
Table 3: Comparision of di(cid:130)erent models
Method
DeepWalk
Node2Vec
GAT
IONE
DIME
MNN
CLF
HGANE
Multiple
Networks
Links
Directi.
Di(cid:130)ere.
Network
Charact.
Di(cid:130)ere.
Predict
Social
Link
Predict
Anchor
Link
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
(cid:140)e network embedding methods used in the experiment are
listed as follows (summarized in Table 3):
• DeepWalk [15]: Skip-gram based vertex embedding
method for a single network that extends the word2vec
[14] to the network scenario.
• Node2Vec [6]: Word-to-vector approach for a single net-
work that modi(cid:128)es the random walk strategy in DeepWalk
into a more sophisticated schemes.
• GAT [20]: A neural network architecture for a single net-
work to learn node representation by leveraging masked
self-a(cid:138)ention layers.
• IONE [12]: A representation learning model for multiple
aligned network by preserving the proximity of users with
(cid:128)similar(cid:128) followers/followees in the embedded space for
network alignment.
• DIME [30]: An embedding framework for multiple het-
erogeneous aligned network with aligned autoencoders to
transfer information and improve the link prediction in
emerging networks.
• MNN [1]: A multi-neural-network framework for intra-
network link prediction over aligned networks. It is not
suitable for anchor link prediction as it assigns anchor
users with the same feature vectors.
• CLF [23]: A method aiming at collective link prediction by
propagating the probabilities of predicted links across the
partially aligned networks with collective random walk.
4.3 Experiment Setting
In our experiment, we will target on the collective link prediction
task and concern the performance of social link prediction in G(1),
G(2), and anchor link prediction across these two networks. (cid:140)ese
three subtasks will be denoted as Soc1, Soc2, Ach in the experiment
results. As link prediction is regarded as a binary classi(cid:128)cation
task, the performance will be evaluated with Area Under the Curve
(AUC) metric.
All the existing links in the two aligned networks are used as
the positive link set, including social links within two networks
and anchor links across these two networks. We sample a subset of
unknown links among nodes in the same network randomly as the
negative social link set, which is of the double size of the positive
social link set. (cid:140)e negative anchor link set is generated by the
random sample of unknown cross-network links. (cid:140)e size of the
negative anchor link set is (cid:128)ve times of that of the positive set. A
proportion of the links in the positive and negative sets are sampled
as the training set, the rest as the test set.
For our embedding framework HGANE, we initialize the initiator
and recipient features of each node with the common initiator and
recipient neighbor features within its networks. (cid:140)ere are two
a(cid:138)ention-based layers involved for each network. (cid:140)e (cid:128)rst layer
consists of K = 8 a(cid:138)ention heads computing 256 features each,
followed by an exponential linear unit (ELU) [4] nonlinearity. (cid:140)e
second layer is a single a(cid:138)ention head to compute node embeddings,
followed by a so(cid:137)max activation. (cid:140)e dimension of the embeddings
is 100. During training, we apply dropout [17] to the normalized
a(cid:138)ention coe(cid:129)cients. And we train for 3000 epochs using the Adam
optimizer [8] with the learning rate of 0.005. (cid:140)e parameters α =
1.0 and β = 0.0005 are used in the experiments.
For the comparison methods that target at one single network,
such as Node2vec, DeepWalk and GAT, we preprocess the datasets
by merging two networks into one and regarding anchor links as
social links within networks. We apply the linear SVM classi(cid:128)er
Table 4: Performance comparison with di(cid:130)erent methods. Soc1, Soc2 and Ach indicate social link prediction in the (cid:128)rst and
second network and anchor link prediction respectively.
Training Ratio
Dataset
Method
Twi(cid:138)er
&
Foursquare
Facebook
Twi(cid:138)er
&
DeepWalk
Node2Vec
GAT
IONE
DIME
MNN
CLF
HGANE
DeepWalk
Node2Vec
GAT
IONE
DIME
MNN
CLF
HGANE
0.4
Soc2
76.9%
80.9%
86.9%
81.7%
80.3%
81.1%
80.5%
0.6
Soc2
79.7%
84.3%
90.3%
84.7%
83.0%
86.1%
84.2%
0.2
Soc2
72.5%
77.4%
78.2%
75.7%
76.2%
72.4%
78.7%
Ach
75.4%
78.9%
80.9%
87.4%
84.9%
Ach
57.9%
64.3%
65.5%
72.1%
74.8%
-
70.9%
Ach
67.3%
72.1%
75.8%
85.6%
82.6%
-
83.1%
Ach
63.1%
66.1%
68.9%
78.0%
76.3%
-
75.2%
Soc1
85.7%
89.3%
92.6%
88.7%
92.0%
96.3%
92.3%
Soc1
82.2%
86.4%
92.5%
88.2%
89.8%
94.8%
90.9%
Soc1
80.3%
84.6%
91.5%
86.2%
88.4%
92.9%
86.7%
Soc1
75.8%
82.5%
85.5%
83.2%
85.1%
89.2%
84.5%
87.1%
94.4% 90.3% 76.7% 96.4% 95.1% 85.8% 97.1% 96.8% 90.0% 97.5% 97.5% 93.0%
78.9%
76.3%
83.2%
83.0%
87.3%
85.5%
92.1%
82.8%
87.1%
87.5%
88.6%
84.9%
90.4%
91.8% 90.9% 84.8% 95.2% 94.8% 93.4% 97.1% 96.9% 95.8% 98.1% 97.5% 97.1%
70.3%
81.5%
86.1%
79.1%
86.2%
87.1%
81.1%
81.6%
87.5%
92.8%
85.1%
90.0%
93.1%
88.9%
75.2%
85.7%
90.0%
82.6%
87.3%
91.3%
85.9%
81.5%
86.6%
92.0%
85.9%
88.4%
92.4%
88.7%
84.0%
88.8%
94.7%
87.4%
89.8%
94.4%
91.4%
90.9%
91.3%
95.7%
90.9%
94.0%
95.7%
93.1%
86.5%
88.2%
93.4%
89.1%
92.2%
94.8%
90.2%
70.9%
76.2%
78.5%
85.4%
81.9%
-
84.2%
77.7%
81.0%
83.5%
89.4%
85.1%
-
87.6%
55.8%
58.6%
60.2%
77.9%
74.3%
-
80.5%
-
-
0.8
Soc2
82.5%
88.3%
92.3%
84.7%
85.2%
87.6%
86.5%
Table 5: Validation of the design of represent each node with
two embeddings to resolve the link directivity di(cid:130)erences
problem. Our full model outperforms two variants with ei-
ther the initiator or recipient features.
Feature
initiator
recipient
both
Facebook&Twi(cid:138)er
Twi(cid:138)er&Foursquare
Ach
Ach
Soc1
95.8%
85.2%
93.4%
93.0%
96.2%
85.6%
97.2% 96.8% 93.0% 98.1% 97.5% 97.1%
Soc2
93.2%
93.7%
Soc1
97.0%
97.1%
Soc2
94.9%
95.1%
for those embedding methods that can't directly predict the forma-
tion of links. Notably, we have chosen optimal hyper-parameters
carefully for di(cid:130)erent baselines in this paper to ensure the fairness
of comparison experiments.
4.4 Experiment Result
In the collective link prediction task, we compare the performance
of eight di(cid:130)erent embedding methods under di(cid:130)erent training rate
λ ∈ {20%, 40%, 60%, 80%}. Table 4 shows the performance of our
model and other seven baseline methods evaluated by AUC with
di(cid:130)erent training rate λ. (cid:140)e method we proposed in this paper,
HGANE, performs much be(cid:138)er than the other methods in the three
subtasks simultaneously, which shows its e(cid:130)ectiveness in the col-
lective link prediction task. HGANE incorporates the task-oriented
objectives into consideration and thus balance between the predic-
tion tasks of both the intra-network social link and inter-network
anchor link simultaneously.
Considering the experiments with di(cid:130)erent training rate λ, as
the ratio drops, the performance of all the methods deteriorates.
However, the performance degradation of the proposed model is
rather moderate compared to other methods since we leverage the
information of the multiple aligned networks and handle the prob-
lem of network characteristic di(cid:130)erences. Even when the training
rate λ is as low as 20%, the baseline models will su(cid:130)er from the
information sparsity a lot, but our model can still obtain very good
performance.
To demonstrate the e(cid:130)ectiveness of considering the directivity,
we compare our full model to its two variants with either the initia-
tor features or the recipient features. (cid:140)e experiment results show
in Table 5 with the training ratio as 0.8. We found that the two
variants can give be(cid:138)er results than other baselines but their perfor-
mance is much inferior to that of the full model. According to the
experimental statistics of two datasets, the performance of social
link prediction within the more dense network can be improved
more by distinguishing nodes' initiator and recipient roles.
4.5 Hypothesis Veri(cid:128)cation
As mentioned in the method part, in our framework, each node
is represented with the initiator and recipient features and it is
crucial to determine how to aggregate information from the neigh-
bors connected by social links and anchor links. If the neighbor's
initiator and recipient features contribute to the target node' s re-
cipient and initiator respectively, we name it as cross-contribution.
Conversely, if the initiator and recipient features of two neighbor
nodes are related correspondingly, we name it direct-contribution.
By combining two mechanisms with two kinds of links, there are
four di(cid:130)erent hypotheses as illustrated in Figure 4.
(cid:140)e hypotheses SC+AD is adopted in our framework. To validate
it, we study the variants of our full model with the other three
hypotheses and compared their performances on the collective link
Figure 4: Four hypotheses about how the neighbors con-
tribute to the target node. (cid:135)ere are two kinds of contribu-
tion modes for social neighbors and anchor partners respec-
tively.
prediction task in Table 6. (cid:140)e experimental results indicate the
model with SC+AD can achieve the best performance in both social
link prediction and anchor link prediction. If direct-contribution
is replaced with cross-contribution for anchor links, AUC of the
anchor link prediction decreases a lot in two datasets. And the
performances of the social link prediction are a(cid:130)ected if we adopt
direct-contribution for social links.
Table 6: Hypothesis veri(cid:128)cation. SC+AD is adopted in our
framework and achieves the best results.
Hypothesis
SC+AC
SD+AD
SD+AC
SC+AD
Facebook&Twi(cid:138)er
Twi(cid:138)er&Foursquare
Ach
Soc1
Ach
96.0%
89.4%
97.2%
95.3%
82.8%
91.8%
91.8%
94.3%
82.1%
97.2% 96.7% 92.4% 98.1% 97.1% 96.7%
Soc2
97.0%
95.2%
95.3%
Soc2
96.0%
91.3%
91.3%
Soc1
98.1%
97.0%
96.9%
4.6 Parameter Analysis
Now we examine the in(cid:131)uence of three key parameters in our
framework: the embedding size d and the weight of the information
transfer objective α and the weight of the regularization β. (cid:140)e three
sub(cid:128)gures on the le(cid:137) in Figure 5 show the sensitivity analysis on the
(cid:128)rst dataset while the rest is about the second dataset. (cid:140)e results
in the (cid:128)rst two sub(cid:128)gures indicate that se(cid:138)ing the embedding size
d to 100 can provide the best performance on both two datasets.
Even when d is as low as 10, our model can achieve good results
on three kinds of link prediction simultaneously.
(cid:140)e parameter α denotes the strength of aligning the two net-
works. (cid:140)e two sub(cid:128)gures about α in the middle show how di(cid:130)erent
values of α can a(cid:130)ect the results on di(cid:130)erent datasets. (cid:140)e optimal
α is near 1.0. When se(cid:138)ing α in [1, 3], all the link prediction tasks
perform well and stably. Anchor link prediction and social link
prediction in sparser networks are a(cid:130)ected as α increases. How-
ever, social link prediction in the dense networks is still stable. For
the weight parameter β, the best se(cid:138)ing is in [0.1, 0.2] according
to the last two sub(cid:128)gures. It has a certain impact on anchor link
Figure 5: Hyperparameter analysis. Our method is robust to
choices of d, α and β on two datasets
prediction across the network while social link prediction within
the network is not that sensitive to the parameter β on both two
datasets.
5 RELATED WORK
Multi-Network Analysis Traditional network embedding meth-
ods focus on one single network [6, 15, 32] and su(cid:130)er from the
data insu(cid:129)ciency problem in the cold start scenarios. (cid:140)erefore,
multi-network analysis has been a hot research topic and studied
for data enrichment for several years on which dozens of works
have been published [24, 28]. Some work studied on information
transfer across networks by anchor links to improving the quality
of inter-network link prediction [1, 25, 26, 30, 31]. Besides, many ex-
isting works aim at anchor link formation prediction automatically
[9, 27]. However, most of these works study either intra-network
or inter-network link prediction tasks separately. Zhang et al. (cid:128)rst
proposed the collective link prediction task [23]. (cid:140)e existing meth-
ods mostly ignore the contradiction of di(cid:130)erent characteristics of
aligned networks or adopt (cid:128)xed parameters to control the propor-
tion of information di(cid:130)used across networks, which usually need
to be (cid:128)ne-tuned manually. Besides, these works also fail to consider
the link connectivity of the links within and across networks.
10501001502002503000.80.850.90.95dAUCTwitter&FoursquareSoc1Soc2Ach10501001502002503000.80.850.90.95dAUCFacebook&TwitterSoc1Soc2Ach12345101520250.80.850.90.95αAUCTwitter&FoursquareSoc1Soc2Ach12345101520250.80.850.90.95αAUCFacebook&TwitterSoc1Soc2Ach0.0010.010.10.20.30.40.50.60.80.850.90.95βAUCTwitter&FoursquareSoc1Soc2Ach0.0010.010.10.20.30.40.50.60.80.850.90.95βAUCFacebook&TwitterSoc1Soc2AchNeural attention mechanism Neural a(cid:138)ention mechanism
has inspired many state-of-the-art models in several machine learn-
ing tasks including image caption generation [22], machine trans-
lation [5, 19] and semantic role labeling [18]. Its e(cid:130)ectiveness is
owed to making the model focus on more important detailed in-
formation and neglecting the useless information. In recent years,
some works have also investigated the use of a(cid:138)ention on graphs
[3, 20, 29]. Our work propose the hierarchical graph a(cid:138)ention to
model multiple aligned networks and overcome network character-
istics contradiction to transfer more e(cid:130)ective information across
networks.
6 CONCLUSION
In this paper, we study the collective link prediction problem in
multiple aligned social networks. We propose a novel applica-
tion oriented network embedding framework, namely Hierarchical
Graph A(cid:138)ention based Network Embedding (HGANE) to learn
node embeddings. (cid:140)e hierarchical graph a(cid:138)ention mechanism is
introduced to resolve the network characteristic di(cid:130)erences and link
directivity di(cid:130)erences. We conduct detailed empirical evaluations
using several real-world datasets and the results demonstrate that
our model outperforms other competitive approaches and handles
the collective link prediction problems e(cid:130)ectively.
ACKNOWLEDGMENTS
(cid:140)is work is supported in part by the National Natural Science
Foundation of China Projects No.U1636207 and NSF through grant
IIS-1763365. (cid:140)is work is also partially supported by the Shang-
hai Science and Technology Development Fund No. 16JC1400801
and the National Natural Science Foundation of China Projects
No.91546105.
REFERENCES
[1] Xuezhi Cao, Haokun Chen, Xuejian Wang, Weinan Zhang, and Yong Yu. 2018.
Neural link prediction over aligned networks. In (cid:138)irty-Second AAAI Conference
on Arti(cid:128)cial Intelligence.
[2] Xuezhi Cao and Yong Yu. 2016. ASNets: A benchmark dataset of aligned social
networks for cross-platform user modeling. In Proceedings of the 25th ACM
International on Conference on Information and Knowledge Management. ACM,
1881 -- 1884.
[3] Edward Choi, Mohammad Taha Bahadori, Le Song, Walter F Stewart, and Jimeng
Sun. 2017. GRAM: graph-based a(cid:138)ention model for healthcare representation
learning. In Proceedings of the 23rd ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining. ACM, 787 -- 795.
[4] Djork-Arn´e Clevert, (cid:140)omas Unterthiner, and Sepp Hochreiter. 2015. Fast and
Accurate Deep Network Learning by Exponential Linear Units (ELUs). CoRR
abs/1511.07289 (2015). arXiv:1511.07289 h(cid:138)p://arxiv.org/abs/1511.07289
Jonas Gehring, Michael Auli, David Grangier, and Yann Dauphin. 2017. A
Convolutional Encoder Model for Neural Machine Translation. In Proceedings of
the 55th Annual Meeting of the Association for Computational Linguistics (Volume
1: Long Papers), Vol. 1. 123 -- 135.
[6] Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable feature learning for
networks. In Proceedings of the 22nd ACM SIGKDD international conference on
Knowledge discovery and data mining. ACM, 855 -- 864.
[7] Adrien Guille, Hakim Hacid, Cecile Favre, and Djamel A Zighed. 2013. Informa-
tion di(cid:130)usion in online social networks: A survey. ACM Sigmod Record 42, 2
(2013), 17 -- 28.
[8] Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic opti-
mization. arXiv preprint arXiv:1412.6980 (2014).
[9] Xiangnan Kong, Jiawei Zhang, and Philip S Yu. 2013. Inferring anchor links
across multiple heterogeneous social networks. In Proceedings of the 22nd ACM
[5]
[12] Li Liu, William K Cheung, Xin Li, and Lejian Liao. 2016. Aligning Users across
international conference on Information & Knowledge Management. ACM, 179 --
188.
[10] Vincent Leroy, B Barla Cambazoglu, and Francesco Bonchi. 2010. Cold start link
prediction. In Proceedings of the 16th ACM SIGKDD international conference on
Knowledge discovery and data mining. ACM, 393 -- 402.
[11] Yongjun Li, You Peng, Zhen Zhang, Hongzhi Yin, and (cid:139)anqing Xu. 2018. Match-
ing user accounts across social networks based on username and display name.
World Wide Web (2018), 1 -- 23.
Social Networks Using Network Embedding.. In IJCAI. 1774 -- 1780.
[13] Tomas Mikolov, Kai Chen, Greg Corrado, and Je(cid:130)rey Dean. 2013. E(cid:129)cient
Estimation of Word Representations in Vector Space. CoRR abs/1301.3781 (2013).
arXiv:1301.3781 h(cid:138)p://arxiv.org/abs/1301.3781
[14] Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Je(cid:130) Dean. 2013.
Distributed representations of words and phrases and their compositionality. In
Advances in neural information processing systems. 3111 -- 3119.
[15] Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. 2014. Deepwalk: Online learn-
ing of social representations. In Proceedings of the 20th ACM SIGKDD international
conference on Knowledge discovery and data mining. ACM, 701 -- 710.
[16] Franco Scarselli, Marco Gori, Ah Chung Tsoi, Markus Hagenbuchner, and
Gabriele Monfardini. 2009. (cid:140)e graph neural network model. IEEE Transactions
on Neural Networks 20, 1 (2009), 61 -- 80.
[17] Nitish Srivastava, Geo(cid:130)rey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan
Salakhutdinov. 2014. Dropout: a simple way to prevent neural networks from
over(cid:128)(cid:138)ing. (cid:138)e Journal of Machine Learning Research 15, 1 (2014), 1929 -- 1958.
[18] Zhixing Tan, Mingxuan Wang, Jun Xie, Yidong Chen, and Xiaodong Shi. 2018.
Deep semantic role labeling with self-a(cid:138)ention. In (cid:138)irty-Second AAAI Conference
on Arti(cid:128)cial Intelligence.
[19] Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones,
Aidan N Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. A(cid:138)ention is all
you need. In Advances in Neural Information Processing Systems. 5998 -- 6008.
[20] Petar Velickovic, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro
Li`o, and Yoshua Bengio. 2017. Graph A(cid:138)ention Networks. CoRR abs/1710.10903
(2017). arXiv:1710.10903 h(cid:138)p://arxiv.org/abs/1710.10903
[21] Yaqing Wang, Chunyan Feng, Ling Chen, Hongzhi Yin, Caili Guo, and Yunfei
Chu. 2018. User identity linkage across social networks via linked heterogeneous
network embedding. World Wide Web (2018), 1 -- 22.
[22] BaJ XuK, CourvilleA KirosR, et al. 2015. Show, a(cid:138)end and tell: Neural image cap-
tion generation with visual a(cid:138)ention. Proceedings of the International Conference
on Machine Learning. Lille, France 2048 (2015), 2057.
[23] Qianyi Zhan, Jiawei Zhang, and S Yu Philip. 2018. Integrated anchor and social
link predictions across multiple social networks. Knowledge and Information
Systems (2018), 1 -- 24.
Jiawei Zhang. 2018. Social Network Fusion and Mining: A Survey. arXiv preprint
arXiv:1804.09874 (2018).
Jiawei Zhang, Xiangnan Kong, and S Yu Philip. 2013. Predicting social links
for new users across aligned heterogeneous social networks. In 2013 IEEE 13th
International Conference on Data Mining. IEEE, 1289 -- 1294.
Jiawei Zhang, Xiangnan Kong, and Philip S Yu. 2014. Transferring heteroge-
neous links across location-based social networks. In Proceedings of the 7th ACM
international conference on Web search and data mining. ACM, 303 -- 312.
Jiawei Zhang and S Yu Philip. 2015. Multiple anonymized social networks
alignment. In 2015 IEEE International Conference on Data Mining. IEEE, 599 -- 608.
Jiawei Zhang and S Yu Philip. 2019. Broad Learning (cid:138)rough Fusions: An Applica-
tion on Social Networks. Springer.
Jiani Zhang, Xingjian Shi, Junyuan Xie, Hao Ma, Irwin King, and Dit-Yan Yeung.
2018. Gaan: Gated a(cid:138)ention networks for learning on large and spatiotemporal
graphs. arXiv preprint arXiv:1803.07294 (2018).
Jiawei Zhang, Congying Xia, Chenwei Zhang, Limeng Cui, Yanjie Fu, and S Yu
Philip. 2017. BL-MNE: emerging heterogeneous social network embedding
through broad learning with aligned autoencoder. In 2017 IEEE International
Conference on Data Mining (ICDM). IEEE, 605 -- 614.
Jiawei Zhang, Philip S Yu, and Zhi-Hua Zhou. 2014. Meta-path based multi-
network collective link prediction. In Proceedings of the 20th ACM SIGKDD
international conference on Knowledge discovery and data mining. ACM, 1286 --
1295.
[32] Yao Zhang, Yun Xiong, Xiangnan Kong, and Yangyong Zhu. 2017. Learning node
embeddings in interaction graphs. In Proceedings of the 2017 ACM on Conference
on Information and Knowledge Management. ACM, 397 -- 406.
[33] Xiaoping Zhou, Xun Liang, Xiaoyong Du, and Jichao Zhao. 2018. Structure based
user identi(cid:128)cation across social networks. IEEE Transactions on Knowledge and
Data Engineering 30, 6 (2018), 1178 -- 1191.
[26]
[28]
[24]
[25]
[31]
[27]
[29]
[30]
|
1809.00320 | 2 | 1809 | 2018-09-07T18:57:13 | Network Alignment by Discrete Ollivier-Ricci Flow | [
"cs.SI",
"cs.CG"
] | In this paper, we consider the problem of approximately aligning/matching two graphs. Given two graphs $G_{1}=(V_{1},E_{1})$ and $G_{2}=(V_{2},E_{2})$, the objective is to map nodes $u, v \in G_1$ to nodes $u',v'\in G_2$ such that when $u, v$ have an edge in $G_1$, very likely their corresponding nodes $u', v'$ in $G_2$ are connected as well. This problem with subgraph isomorphism as a special case has extra challenges when we consider matching complex networks exhibiting the small world phenomena. In this work, we propose to use `Ricci flow metric', to define the distance between two nodes in a network. This is then used to define similarity of a pair of nodes in two networks respectively, which is the crucial step of network alignment. %computed by discrete graph curvatures and graph Ricci flows. Specifically, the Ricci curvature of an edge describes intuitively how well the local neighborhood is connected. The graph Ricci flow uniformizes discrete Ricci curvature and induces a Ricci flow metric that is insensitive to node/edge insertions and deletions. With the new metric, we can map a node in $G_1$ to a node in $G_2$ whose distance vector to only a few preselected landmarks is the most similar. The robustness of the graph metric makes it outperform other methods when tested on various complex graph models and real world network data sets (Emails, Internet, and protein interaction networks)\footnote{The source code of computing Ricci curvature and Ricci flow metric are available: https://github.com/saibalmars/GraphRicciCurvature}. | cs.SI | cs |
Network Alignment by
Discrete Ollivier-Ricci Flow
Chien-Chun Ni1[0000−0002−9082−7401], Yu-Yao Lin2[0000−0001−9761−5156],
Jie Gao3 [0000−0001−5083−6082], and Xianfeng Gu3[0000−0001−8226−5851]
1 Yahoo! Research, Sunnyvale CA 94089, USA
[email protected]
2 Intel Inc., Hillsboro OR 97124, USA
3 Stony Brook University, Stony Brook NY 11794, USA
[email protected]
{jgao,gu}@cs.stonybrook.edu
Abstract. In this paper, we consider the problem of approximately
aligning/matching two graphs. Given two graphs G1 = (V1, E1) and
G2 = (V2, E2), the objective is to map nodes u, v ∈ G1 to nodes u(cid:48), v(cid:48) ∈
G2 such that when u, v have an edge in G1, very likely their correspond-
ing nodes u(cid:48), v(cid:48) in G2 are connected as well. This problem with subgraph
isomorphism as a special case has extra challenges when we consider
matching complex networks exhibiting the small world phenomena. In
this work, we propose to use 'Ricci flow metric', to define the distance
between two nodes in a network. This is then used to define similarity of
a pair of nodes in two networks respectively, which is the crucial step of
network alignment. Specifically, the Ricci curvature of an edge describes
intuitively how well the local neighborhood is connected. The graph Ricci
flow uniformizes discrete Ricci curvature and induces a Ricci flow metric
that is insensitive to node/edge insertions and deletions. With the new
metric, we can map a node in G1 to a node in G2 whose distance vector
to only a few preselected landmarks is the most similar. The robustness
of the graph metric makes it outperform other methods when tested on
various complex graph models and real world network data sets (Emails,
Internet, and protein interaction networks)4.
1
Introduction
Given two graphs G1 and G2 with approximately the same graph topology, we
want to find the correspondence of their nodes -- node v in G1 is mapped to a node
f (v) in G2 such that whenever u, v is connected in G1, f (u), f (v) are likely to be
connected in G2 as well. This is called the network alignment problem and has
been heavily studied [10] with numerous applications including database schema
matching [19], protein interaction alignment [59,9,15,45], ontology matching [58],
pattern recognition [48] and social networks [71,23].
4 The source code of computing Ricci curvature and Ricci flow metric are available:
https://github.com/saibalmars/GraphRicciCurvature
2
C.-C. Ni et al.
Network alignment is a hard problem. A special case is the classical problem
of graph isomorphism, in which we test whether or not two graphs have ex-
actly the same topology under a proper correspondence. The most recent break-
through by László Babai [3] provides an algorithm with quasi-polynomial run-
ning time O(exp ((log n)O(1))), where n is the number of nodes. It still remains
open whether the problem is NP-complete or not. For special graphs, polynomial
time algorithms have been developed (e.g. trees [2], planar graphs [28], graphs
of bounded valence [43]). For general graphs what has been commonly used in-
clude heuristic algorithms such as spectral methods [59,1,54], random walks [63],
optimal cost matching method [32] and software packages such as Nauty, VF,
and VF2, see [47,11]. The subgraph isomorphism problem, i.e., testing whether
one graph is the subgraph of the other, is NP-complete and has been heavily
studied as well. See the survey [10,69,16].
For practical settings, the problem is often formulated as finding a matching
in a complete bipartite graph H = (V1, V2, E), in which V1 are nodes in G1, V2
are nodes in G2, and edges E carry weights that indicate similarity of the two
nodes. Here similarity can be either attribute similarity or structural similarity
(quantifying their positions in the network). The two graphs are aligned by tak-
ing a matching of high similarity in graph H. Many algorithms use this approach
and they differ by how to define node similarity: L-Graal [46], Natalie [14], NetAl-
ignMP++ [6], NSD [35], and IsoRank [59]. In this paper, our main contribution
is to provide a new method to compute node structural similarity using the idea
of graph curvature and curvature flow.
Our Setting. We mainly focus on complex networks that appear in the real
world. Consider the Internet backbone graphs captured at two different points
in time, we wish to match the nodes of the two graphs in order to understand how
the network has evolved over time. Or, consider two social network topologies
on the same group of users. It is likely that when two users are connected by
a social tie in one network (say LinkedIn), they are also connected in the other
network (say Facebook). A good alignment of two networks can be useful for
many applications such as feature prediction [18], link prediction [67], anomaly
detection [51], and possibly de-anonymization [22,55].
We work with the assumption that a small number k (say 2 or 3) of nodes,
called landmarks, are identified. Often a small number of landmarks could be
discovered by using external information or properties of the networks. For ex-
ample, in networks with power law degree distributions, there are often nodes
with really high degree that can be identified easily. Given the landmarks, we
can find a coordinate for each node u as [d(u, (cid:96)1), d(u, (cid:96)2),··· , d(u, (cid:96)k)], where
d(u, (cid:96)i) captures the similarity of u with the ith landmark. This coordinate vec-
tor captures the structural position of a node in the network and can be used
in the network alignment problem -- two nodes u1 ∈ V1 and u2 ∈ V2 can be
aligned if their respective coordinates are similar. This approach is motivated by
localization in the Euclidean setting, in which three landmarks are used to define
the barycentric coordinates of any node in the plane. In the complex network
setting, this approach faces two major challenges that need to be addressed.
Network Alignment by Discrete Ollivier-Ricci Flow
3
(a) Ricci Curvature: The Original
(b) Ricci Curvature: After Ricci Flow
Fig. 1. An example of Ricci curvature on the karate club graph before and after Ricci flow. The col-
ors represent the Ricci curvature while the thickness represents the edge weight. Ricci flow deformed
the edge weights until Ricci curvatures converged (−0.0027 in this case).
First, a proper metric that measures the distance from any node to the
landmarks in the network is needed. The easiest metric is probably the hop
count -- the number of edges on the shortest path connecting two nodes in the
network. While the hop count is often used for communication networks, for
complex networks it is less helpful as these networks often have a small diameter.
To look for a better measure, edges shall be properly weighed which is highly
application dependent. For the Internet setting [39], measures such as Round-
Trip Time (RTT) are used. In a social network setting, it is natural to weight
each edge by its tie strength. But these weights are not easy to obtain. Many
graph analysis methods use measures that capture local graph structures by
common neighborhood, statistics generated by random walks [56,24], etc.
Second, the approach of using distances to landmarks to locate a node in
the network is truly geometric in nature [20,33]. But a fundamental question
is to decide what underlying metric space shall be used. Low-dimensional Eu-
clidean spaces are often used [26,37] and spectral embedding or Tutte embedding
are popular. But it is unclear what is the dimensionality of a general complex
network and robustness of these embeddings is not fully understood.
Our Approach. We address the above problems by using the tool of graph
curvature and curvature flow. In the continuous setting of a two dimensional
surface, the curvature of a point captures how much it deviates from being flat
at the point. The tip of a bump has positive curvature and a saddle point has
negative curvature. Curvature flow is a process that deforms the surface (chang-
ing the metric) and eventually makes the curvature to be uniform everywhere.
In our setting, we look at discrete curvatures and curvature flow defined on a
graph and argue that by curvature one can encode and summarize graph struc-
tures. As will be explained later in more details and rigor, edges that are in a
densely connected 'community' are positively curved while edges that connect
two dense communities are negatively curved. Further, we can define curvature
flow (which is an adaptation of surface Ricci flow to the graph setting) such that
weights are given to the edges to make all edges have the same curvature. This
Ricci CurvatureRicci Curvature4
C.-C. Ni et al.
(a) Spectral (Avg: 7.9 ± 7.2(%))
(b) RF Metric (Avg: 1.9 ± 1.1(%))
Fig. 2. A comparison of stretch ratios under different metrics started from node 4 labeled in yellow.
Here the stretch ratio defined by the ratio of shortest path changed when nodes or edges are removed
from graph. For graph G and G \ {v2v7, v26v29}, the stretch ratios of shortest paths from node 4 to
all other nodes are labeled in color. Here the top five stretches paths are labeled by its ratios next
to the nodes. With just two edges removed, the stretch ratios of spring and spectral metric changed
drastically while RF metric remains stable.
process in some sense 'uniformizes' the network and can be imagined as em-
bedding the network in some intrinsic geometric space. These weights are again
intuitive -- edges in a dense community are short while edges that connect two
far away communities are long, see Figure 1. We call the shortest path length
under such weights as the Ricci flow metric. The Ricci flow metric is designed
to improve robustness under insertions and deletions of edges/nodes -- when an
edge is removed, the shortest path distance between the two endpoints in the
original graph can possibly change a lot and Ricci flow reduces such imbalance.
This is useful for matching two graphs that are different topologically.
Our curvature based coordinates depend only on the network topology and
thus are purely structural. But they can also be combined with node attributes
(when available) to produce an alignment score. In our evaluation we have
focused on methods that use structural similarities and embeddings such as
hop counts, metrics induced by spectral embedding [44] or spring/Tutte em-
bedding [64], and topology based network alignment algorithm IsoRank [59]
and NSD [35]. We evaluated our network alignment algorithms on a variety of
real world data sets (Internet AS graphs [60], Email networks [25,36], protein
networks [18,36]) and generated model networks (random regular graphs, Erdös-
Rényi graphs [17], preferential attachment model [5] and Kleinberg's small world
model [34]). Experimental evaluations show that the Ricci flow metric greatly
outperforms other alternatives. In particular, most of the embedding methods
perform poorly on random regular graphs due to identical node degree. Meth-
ods using hop counts suffer from the problem of not being descriptive, especially
when there are only a small number of landmarks. There might be too many
nodes with same coordinate under the landmark based coordinates. The spec-
tral embedding and the spring embedding are less robust under edge insertion
and deletion. IsoRank compares local similarity in a pair of graphs. In a large
complex network, it is possible to have nodes that look similar in terms of local
+40%+9.1%+9.1%+9.7%-29%+4.3%+3.4%+3.1%+3.1%-3.3%Network Alignment by Discrete Ollivier-Ricci Flow
5
structures but globally should not be matched. This may explain why IsoRank
does not scale well.
In the following, we first present background knowledge on curvature and
Ricci flow [27,62]. We then present graph curvature and curvature flow, how
they are used in network alignment, and empirical evaluations.
2 Background
Curvature and Ricci Flow on Surfaces. Curvature is a measure of the
amount by which a geometric object deviates from being flat/straight and has
multiple definitions depending on the context. Ricci flow was introduced by
Richard Hamilton for Riemannian manifolds in 1982 [27]. A surface Ricci flow
is the process to deform the Riemannian metric of the surface, proportional to
the Gaussian curvature, such that the curvature evolves like heat diffusion and
becomes uniform at the limit. Intuitively, this behaves as flattening a piece of
crumpled paper. Surface Ricci flow is a key tool in the proof of the Poincaré
conjecture on 3-manifolds, and has numerous applications in image and shape
analysis. In engineering fields, surface Ricci flow has been broadly applied on
a triangulated surface setting for tackling many important problems, such as
parameterization in graphics [30] and deformable surface registration in vision
[70].
Discrete Ricci Curvature. Curvatures for general graphs have only been stud-
ied over the past few years [53,40,8,4,42,61,7]. The definitions of curvatures that
are easier to generalize to a discrete graph setting are sectional curvature and
Ricci curvature. Consider a point x on a surface M and a tangent vector v at
x whose endpoint is y. Take another tangent vector wx at x and imagine trans-
porting wx along vector v to be a tangent vector wy at y. Denote the endpoints
of wx, wy as x(cid:48), y(cid:48). If the surface is flat, then x, y, x(cid:48), y(cid:48) would constitute a paral-
lelogram. Otherwise, the distance between x(cid:48), y(cid:48) differs from v. The difference
can be used to define sectional curvature [53].
Sectional curvature depends on two tangent vectors v, w. Averaging sectional
curvature over all directions w gives the Ricci curvature which only depends
on v. Intuitively, if we think of a direction w at x as a point on a small ball
Sx centered at x, on average Ricci curvature controls whether the distance be-
tween a point of Sx and the corresponding point of Sy is smaller or larger than
the distance d(x, y). To allow for a general study, Ollivier [53] defined a Ricci
curvature by using a probability measure mx to represent the ball Sx. Later
Ollivier Ricci curvature has been applied in different fields, for distinguishing
between cancer-related genes and normal genes [57], for understanding phyloge-
netic trees [68], and for detecting network features such as backbone and con-
gestions [50,65,66,49,31]. There was very limited amount of theory on discrete
Ollivier-Ricci curvature on graphs, and nearly none on graph Ricci flow. In the
future work section of [52] Ollivier suggested that people should study the dis-
crete Ricci flow in a metric space (X, d) by evolving the distance d(x, y) on X
6
C.-C. Ni et al.
according to the Ricci curvature κ(x, y) between two points x, y ∈ X:
d(x, y) = −κ(x, y)d(x, y).
d
dt
We are the first to study Ollivier-Ricci flow in the graph setting. We also suggest
variants of the Ollivier-Ricci curvature that admits much faster computation
and empirically evaluate properties of the Ricci flow metrics and applications in
network alignment.
3 Theory and Algorithms
Ricci Curvature on Graphs For an undirected graph G = (V, E), the
Ollivier-Ricci curvature of an edge xy is defined as follows. Let πx denote the
neighborhood of a node x ∈ V and Deg(x) is the degree of x. For a parameter
α ∈ [0, 1], define a probability measure mα
x:
α
mα
x (xi) =
(1 − α) / Deg(x)
0
if xi = x
if xi ∈ πx
otherwise ,
Suppose w(x, y) is the weight of edge xy and d(x, y) the shortest path length
between x and y in the weighted graph. The optimal transportation distance
y is defined as the best way of transporting the mass
(OTD) between mα
distribution mα
y :
x to the mass distribution mα
x and mα
W (mα
x , mα
y ) = inf
M
d(xi, yj)M (xi, yj)
(cid:88)
xi,yj∈V
where M (xi, yj) is the amount of mass moved from xi to yj along the shortest
path (of length d(xi, yj)) and we would like to take the best possible assign-
ment (transport plan) that minimizes the total transport distance. The discrete
Ollivier-Ricci curvature [53] is defined as follows
κw(x, y) = 1 − W (mα
x , mα
y )
.
d(x, y)
In this paper, κw(x, y) is called the OTD-Ricci curvature.
The OTD-Ricci curvature describes the connectivity in the local neighbor-
hood of xy [50]. If xy is a bridge so the nodes in πx have to travel through
the edge xy to get to nodes in πy, W (mα
y ) > d(x, y) and the curvature of
xy is negative. Similarly, if the neighbors of x and the neighbors of y are well
connected (such that W (mα
y ) < d(x, y)), the curvature on xy is positive.
The optimal transportation distance can be solved by linear programming
x , mα
x , mα
(LP) to find the best values for M (xi, yj):
d(xi, yj)M (xi, yj)
M (xi, yj) = mα
x (xi),∀i
and (cid:88)
i
M (xi, yj) = mα
y (yj),∀j
j
Minimize: (cid:88)
s.t. (cid:88)
i,j
Network Alignment by Discrete Ollivier-Ricci Flow
7
The computation of the linear program on large networks may be time-
consuming. To address the computational challenges, we define a variant of
the OTD-Ricci curvature by using a specific transportation plan instead of the
optimal transportation plan. We take the average transportation distance
(ATD) A(mα
y ), in which we transfer an equal amount of mass from each
neighbor xi of x to each neighbor yj of y and transfers the mass of x to y. One
could easily verify that this is a valid transportation plan. Thus, the discrete
Ricci curvature by the average transportation distance (ATD) is defined as:
x , mα
κa(x, y) = 1 − A(mα
x , mα
y )
d(x, y)
,
Since we remove the LP step in the computation, the computational complexity
of the ATD-Ricci curvature is drastically improved. As will be presented later,
our experimental results show that computing discrete Ricci flow using the ATD-
Ricci curvature maintains and even enhances the robustness of graph alignment.
In this paper, we fix α = 0.5 and simplify the notation of discrete Ricci curvature
by κ(x, y) in the discussion of discrete Ricci flow.
Discrete Ricci Flow Ricci flow is a process that deforms the metric while the
Ricci curvature evolves to be uniform everywhere. For any pair of adjacent nodes
x and y on a graph G = (V, E), we adjust the edge weight of xy, w(x, y), by the
curvature κ(x, y):
wi+1(x, y) = wi(x, y) − · κi(x, y) · wi(x, y),
∀xy ∈ E,
where κi(x, y) is computed using the current edge weight wi(x, y). The step size
is controlled by > 0 and we take = 1 in our experiment.
After each iteration we rescale the edge weights so the total edge weight in
the graph remains the same, since only relative distances between nodes matter
in a graph metric. A pseudo-code is presented in the appendix.
Ricci Flow Metric When graph Ricci flow converges, each edge xy is given
a weight w(x, y). We denote the shortest path metric with such weights to be
the Ricci Flow Metric, denoted as d(x, y). To understand the metric, notice that
when the Ricci flow converges the following is true. Here we take step size = 1:
where
(w(x, y) − κ(x, y) · w(x, y)) · N ≈ w(x, y)
(cid:80)
xy∈E(w(x, y) − κ(x, y)w(x, y))
E
.
N =
Denote the transportation distance between the two probability measures mα
x
and mα
y to be T (x, y), we have
κ(x, y) ≈ 1 − T (x, y)
d(x, y)
,
T (x, y)
d(x, y)
≈ 1
N
.
To understand what this means, recall that T (x, y) represents the distances
from x's neighborhood to y's neighborhood. Before we run Ricci flow, this value
8
C.-C. Ni et al.
for different edges can vary a lot -- in the neighborhood of positively curved edges
there are many 'shortcuts' making T (x, y) to be significantly shorter than d(x, y),
while in the neighborhood of negatively curved edges T (x, y) is longer than
d(x, y). The purpose of Ricci flow is to re-adjust the edge weights to reduce such
imbalance. Suppose we remove an edge xy with negative curvature before Ricci
flow and break the shortest path from x(cid:48) (a neighbor of x) to y(cid:48) (a neighbor of
y). The alternative path from x(cid:48) to y(cid:48) in the neighborhood of xy tends to become
much longer, as T (x, y)/d(x, y) is large. Thus, the change to the shortest path
metric is significant. However, after the Ricci flow, with the new edge weights, the
alternative path from x(cid:48) to y(cid:48) in the neighborhood of xy may still get longer but
not as long. Thus, the change in the shortest path length is less significant. The
Ricci flow metric is more robust when edges and nodes are randomly removed.
To capture this property, we define the uniformity of graph metric using the
variation of T (x, y)/d(x, y) for different edges xy.
Definition 1 (Metric Uniformity). Given a graph G = (V, E) with edge
weight w(x, y) on xy ∈ E, the metric uniformity is defined by the interquar-
tile range (IQR), i.e., of T (x, y)/d(x, y) over all edges, the difference between
75th and 25th percentiles.
The metric uniformity measures the diversity of T (x, y)/d(x, y) over all edges
around the median. Lower metric uniformity indicates that T (x, y)/d(x, y) are
less dispersed about the median. Therefore, the corresponding metric is more
robust upon node/edge insertions and deletions.
4 Network Alignment by Ricci Flow Metric
Given two graphs G1 and G2, suppose there are k landmarks L = {(cid:96)ii =
1, 2,··· , k} in both G1 and G2 with known correspondence, k is a small con-
stant such as 3 or 4. These landmarks may be known beforehand by external
knowledge. We use these landmarks to find the correspondence of nodes in G1
and G2. Specifically, we represent each node v ∈ Gj by its relative positions
to the landmarks vL = [dj(v, (cid:96)1), dj(v, (cid:96)2),··· , dj(v, (cid:96)k)], where dj(v, (cid:96)i) denotes
the shortest distance from v to (cid:96)i in graph Gj using the Ricci flow metric. We
define the cost of matching u ∈ G1 with v ∈ G2 by the 2-norm of the difference
between uL and vL,
Cuv = uL − vL2.
The smaller Cuv is, the more similar u, v are. The alignment problem can be
formulated as finding a low-cost matching in the complete bipartite graph H =
(V1 ∪ V2, E) where the edge in E connecting u ∈ V1 and v ∈ V2 has weight Cuv.
Matching Algorithms. To find a low cost matching in the bipartite graph or
a similarity matrix, we can apply the following two algorithms.
minimizes(cid:80)
-- The Hungarian min-cost matching algorithm [29] finds a matching which
u∈G1,v∈G2
Cuv in O(V 3) time.
Network Alignment by Discrete Ollivier-Ricci Flow
9
-- A greedy matching method iteratively locates the minimal Cuv, records the
node pair (u, v), and removes all elements involving either u or v, until the
nodes of either G1 or G2 are all paired.
We note that in prior network alignment algorithms, such as IsoRank and NSD,
greedy matching was unanimously selected due to its efficiency. We tested both
algorithms with the results on Hungarian algorithms presented in the appendix.
Matching Accuracy. To evaluate the accuracy of the matching results, one
idea is to count how many nodes are correctly matched with respect to their
IDs in the ground truth. But this measure may be too strict. For example, if
G1 and G2 are both complete graphs of the same size, any matching of nodes
in G1 and nodes in G2 should be considered to be correct. It is well known that
social networks have community structures and many different levels of node
equivalence and symmetry. There are different definitions for two nodes u, v in
a graph G to be equivalent:
-- Structural equivalence: u and v have exactly the same set of neighbors;
-- Automorphic equivalence: if we relabel the nodes in an automorphic transfor-
mation (i.e., the graph after relabeling is isomorphic to the original graph),
the labels of u, v are exchanged;
-- Regular equivalence [41]: u, v are connected if they are equally related to
equivalent others. That is, regular equivalence sets are composed of nodes
who have similar relations to members of other regular equivalence sets.
Regular equivalence is the least restrictive of the three definitions of equivalence,
but probably the most important for the sociologists as it captures the sociologi-
cal concept of a "role". Previous quantitative measures of regular equivalence [38]
unfortunately, are not very effective in identifying the global symmetric struc-
tures. For example, the two terminal nodes of a path graph cannot be classified
to the same regular equivalence class.
Connected Equivalence. Motivated by regular equivalence, we would like to
consider two nodes to be connected equivalence if they have similar connections
to other nodes. Specifically, we compute the length of shortest paths (using the
Ricci flow metric) from u and v to all other nodes, except u, v themselves, in a
fixed order in G1 or G2, and denote the results by two vectors uL and vL. If the
two vectors are similar (i.e., uL − vL2 < for some small > 0), then we say
that u, v are equivalent and the matching of u to v is correct.
5 Evaluation
In this section, we demonstrate the performance of Ricci flow metric and its
power on network alignment. Since Ricci flow metric only used topology feature,
we compare RF-OTD, RF-ATD with two topology based network alignment al-
gorithms IsoRank [59] and NSD [35] (other network alignment algorithms require
node label/attributes), and three different embedding metrics: spectral embed-
ding, spring embedding, and hop count. We evaluated the performance of these
10
C.-C. Ni et al.
algorithms in both model graphs and real world data. The descriptions of these
methods as well as the data sets are presented in Appendix B and Appendix C.
Our main observations are as follows:
1. Ricci flow metrics (both RF-OTD and RF-ATD) are much more robust
against edge/node insertion and deletions compared to others on noisy graph
alignment problem.
2. Ricci flow metrics greatly outperform previous topological based network
alignment algorithms (IsoRank, NSD) as well as other metrics and similar-
ity measures on noisy graph alignment problem. In many experiments our
algorithm achieves more than 90% matching accuracy while other methods
achieve accuracy below 30%.
3. While greedy matching performs well in model graphs, min-cost matching
(i.e, Hungarian algorithm) is more suitable for real world graph.
Due to space limit, please refer to Appendix E for further discussion.
Experiment Setup. Given a graph G1, we remove n nodes or edges (less than
1% ) uniform randomly to create G2 as a noisy graph. We then perform the
alignment of G1 and G2. Notice that in this case, we can also regard G2 as a
graph with random noises added to G1. Therefore, we only present the results
of node deletion cases.
The graph alignment problem is solved in two steps. First we construct a
similarity matrix that records the cost of matching node i in G1 with node j in
G2 for all possible i, j; then we perform Hungarian algorithm or greedy matching
to match nodes in G1 with nodes in G2. We evaluate the algorithm performance
by using connected equivalence.
For IsoRank and NSD, the similarity matrix is the output of the algorithm;
for landmark based method, the similarity matrix is defined by (cid:96)2 norm of their
landmark distance vectors. Here the distance metric is defined by RF-OTD and
RF-ATD5, distances induced by spectral embedding (dim=2), spring embedding,
and hop count respectively. The performance of each metric is evaluated by
varying the number of removed nodes/edges n and the number of landmarks
k. To eliminate the dependency of landmark selection, the matching accuracy
is averaged by 10 experiments on different sets of landmarks. These landmarks
are chosen such that every newly added landmark is furthest away from the
landmarks chosen so far.
Metric Uniformity We first analyze the metric uniformity over all metrics on
a random regular graph with 1000 nodes and 6000 edges. The box plot result is
illustrated in Figure 3(a). RF-ATD yields the best metric uniformity with the
smallest IQR of 2e− 5. RF-OTD also performs well with IQR as 0.002. Spectral
and spring embedding behave poorly. These performances are directly related
to the accuracy in graph alignment. The metric with low metric uniformity is
more stable when nodes/edges are missing, see Figure 2. Notice that hop count
metric generates a small IQR=0.001. This is because there are often multiple
5 With 50 Ricci flow iterations, = 1, α = 0.5
Network Alignment by Discrete Ollivier-Ricci Flow
11
(a) Metric uniformity comparison
(b) Stretch ratios comparison
Fig. 3. Figure 3(a) shows metric uniformity comparison of all metrics. The box plot is for
T (x, y)/w(x, y) with respect to each metric. We define the IQR (InterQuartile Range) of the box
plot to be the metric uniformity. The smaller the metric uniformity is, the more robust the metric is
under random edge removals. Figure3(b) demonstrates a comparison of the stretch ratios of shortest
path length over all methods.
shortest paths (in terms of hop count) connecting two nodes in the network so
hop count is actually a fairly robust measure. But using it for graph alignment
is still limited by its lack of descriptive power.
(u, v))/dm
G1
For further analysis that metric uniformity indeed captures the robustness of
shortest path metric, we compute the stretch of the shortest path length between
a pair of nodes in a random regular graph when 10 edges are randomly removed,
shown in Figure 3(b). Consider two nodes u, v in both G1 and G2, we denote
(u, v) under a metric m, where
the length of the shortest path from u to v by dm
(u, v) −
Gi
i = 1, 2. We define the stretch ratio of G1 and G2 as s(u, v) = (dm
G1
(u, v). The stretch ratio captures the changes of the shortest path
dm
G2
length. A larger stretch ratio means the shortest path length changes more. In
Figure 3(b), we collect the stretch ratios from one random node to all of the
other nodes based on different metrics, and plot the distribution of these stretch
ratios as a histogram. It turns out that hop count, Ricci flow metric with OTD
and with ATD result in smaller stretch ratios, while spectral embedding is the
most vulnerable one with edge deletions.
Similarity Matrix Here we test the similarity matrix of every pairwise node
similarity of two graphs G1, G2. G1 is a random regular graph with 1000 nodes
Fig. 4. The comparison of the similarity rank of all methods. The similarity matrix represents the
pairwise similarity between a random regular graph with 1000 nodes and 6000 edges and the previous
graph with 10 random nodes and 120 corresponding edges removed.
IQR: 0.002IQR: 0.011IQR: 0.022IQR: 0.001IQR: 0.00002T(x, y) / w(x, y)10−310−210−11RF Metricwith OTDSpectralSpringHop CountRF Metric with ATDRandom Regular (1000 nodes, 6000 edges)Histogram of RF Metric with ATDHistogram of Hop CountHistogram of SpringHistogram of SpectralHistogram of RF Metric with OTDPercentage in Bin (log)11001100110011001100Shortest Path Stretch Ratio−2.0−1.5−1.0−0.500.51.0Random Regular (1000 nodes, 6000 edges) with 10 edges removedIQR: 4IQR: 502IQR: 163IQR: 56IQR: 483IQR: 443IQR: 502Similarity Rank (log)1101001000RF Metric with ATD #landmark=2IsoRankHop CountBtwness CetralitySpringSpectralNSDRandom Regular (1000 nodes, 6000 edges) v.s. (-10 Nodes, -120 edges)12
C.-C. Ni et al.
(a) Random Regular Graph
(b) Protein-Protein Interaction
Fig. 5. A comparison of noisy graph alignment results by Hungarian algorithm and connected equiv-
alence on a random regular graph(Figure 5(a)) and protein-protein interaction graph(Figure 5(b)).
and 6000 edges and G2 removes 10 nodes randomly from G1. We check the
performance of the similarity matrix as follows. For every node n1 ∈ G1 and the
corresponding node n2 in G2 in the ground truth, we check the rank of n2 in the
sorted list ranked by similarity values with n1. A good similarity matrix should
rank n2 as the most similar one. A lower ranking indicates better performance of
the similarity matrix. We show the results in Figure 4 with 2 landmarks. Thanks
to the metric uniformity, our method yields the best performance with average
similarity rank of 2 while other methods are at least 10 times higher.
Network Alignment Here we demonstrate the matching accuracy results on
noisy graph alignment problem for a random regular graph (1000 nodes and de-
gree 12 as G1, and G2 by randomly removing 1 node and 12 edges from G1) and
a real word protein-protein interaction graph (to be aligned with a graph of 10
edges randomly removed). Figure 5 shows that while most of the methods failed
to align the graph correctly, the Ricci flow metric performs well with only 2
landmarks. Here since IsoRank and NSD method do not require landmarks, the
performance over different landmark is shown as a straight line. The result shows
that RF-ATD, which is computationally much more efficient, performs equally
well as RF-OTD. Notice that the methods with poor metric uniformity as shown
in Figure 3 also result in poor performance here. This supports the importance
of metric uniformity in network alignment. More evaluation on different model
networks and real networks also support this claim. The performance of align-
ment accuracy also effected by the portion of nodes and edges added/removed,
the noisy graph alignment problem become harder with more noise. Please see
Appendix C for further details.
6 Conclusion
In this paper, we have presented a framework to endow a graph with a novel
metric through the notion of discrete Ricci flow with an application to network
alignment. From the experimental results, we found that 1) the graph Ricci
curvature converges through the discrete Ricci flow and; 2) Ricci flow metric on
Ricci Flow(ATD)SpringSpectralNSDISORankHop CountRicci Flow(OTD)Recovery Accuracy00.20.40.60.81.0# Landmark23456Random Regular (1000 nodes, 6000 edges) v.s. (-1 Node, -12 edges)Ricci Flow(ATD)SpringSpectralNSDISORankHop CountRicci Flow(OTD)Recovery Accuracy00.20.40.60.81.0# Landmark23456Protein-Protein Interaction (2217 Nodes, 6418 Edges) V.S. (-10 Edges)Network Alignment by Discrete Ollivier-Ricci Flow
13
a graph is fairly stable when edges are inserted or removed. Providing theoretic
proofs of these observations are currently open and will be the next direction of
our future work.
Acknowledgement The authors would like to thanks the funding agencies NSF DMS-
1737812, CNS-1618391, CCF-1535900, DMS-1418255, and AFOSR FA9550-14-1-0193.
References
1. Aflalo, Y., Bronstein, A., Kimmel, R.: On convex relaxation of graph isomorphism.
Proceedings of the National Academy of Sciences 112(10), 2942 -- 2947 (2015)
2. Aho, A.V., Hopcroft, J.E.: The Design and Analysis of Computer Algorithms.
Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1st edn. (1974)
3. Babai, L.: Graph isomorphism in quasipolynomial time. CoRR abs/1512.03547
(2015), http://arxiv.org/abs/1512.03547
4. Bakry, D., Émery, M.: Diffusions hypercontractives. In: Séminaire de probabilités,
XIX, 1983/84, pp. 177 -- 206. Springer, Berlin, Berlin, Heidelberg (1985)
5. Barabasi, A., Albert, R.: Emergence of scaling in random networks. Science 286,
509 -- 512 (1999)
6. Bayati, M., Gleich, D.F., Saberi, A., Wang, Y.: Message-Passing algorithms for
sparse network alignment. ACM Trans. Knowl. Discov. Data 7(1), 3:1 -- 3:31 (Mar
2013)
7. Bonciocat, A.I.: A rough curvature-dimension condition for metric measure spaces
- Springer. Central European Journal of Mathematics (2014)
8. Chung, F.R.K., Yau, S.T.: Logarithmic Harnack inequalities. Math. Res. Lett 3(6),
793 -- 812 (1996)
9. Clark, C., Kalita, J.: A comparison of algorithms for the pairwise alignment of
biological networks. Bioinformatics 30(16), 2351 -- 2359 (Aug 2014)
10. CONTE, D., Foggia, P., Sansone, C.: Thirty years of graph matching in pattern
recognition. International Journal of Pattern Recognition and Artificial Intelligence
18(03), 265 -- 298 (2004)
11. Cordella, L.P., Foggia, P., Sansone, C., Vento, M.: A (sub)graph isomorphism algo-
rithm for matching large graphs. Pattern Analysis and Machine Intelligence, IEEE
Transactions on 26(10), 1367 -- 1372 (Oct 2004)
12. Diamond, S., Boyd, S.: CVXPY: A Python-embedded modeling language for con-
vex optimization. Journal of Machine Learning Research 17(83), 1 -- 5 (2016)
13. Eades, P.: A heuristic for graph drawing. Congressus numerantium 42, 149 -- 160
(1984)
14. El-Kebir, M., Heringa, J., Klau, G.W.: Natalie 2.0: Sparse global network alignment
as a special case of quadratic assignment. Algorithms 8(4), 1035 -- 1051 (Nov 2015)
15. Elmsallati, A., Clark, C., Kalita, J.: Global alignment of Protein-Protein inter-
action networks: A survey. IEEE/ACM Trans. Comput. Biol. Bioinform. 13(4),
689 -- 705 (Jul 2016)
16. Emmert-Streib, F., Dehmer, M., Shi, Y.: Fifty years of graph matching, network
alignment and network comparison. Information Sciences 346-347, 180 -- 197 (Jun
2016)
17. Erdos, P., Renyi, A.: On random graphs. Publicationes Mathematicae 6, 290 -- 297
(1959)
14
C.-C. Ni et al.
18. Ewing, R.M., Chu, P., Elisma, F., Li, H., Taylor, P., Climie, S., McBroom-
Cerajewski, L., Robinson, M.D., O'Connor, L., Li, M., Taylor, R., Dharsee, M.,
Ho, Y., Heilbut, A., Moore, L., Zhang, S., Ornatsky, O., Bukhman, Y.V., Ethier,
M., Sheng, Y., Vasilescu, J., Abu-Farha, M., Lambert, J.P., Duewel, H.S., Stew-
art, I.I., Kuehl, B., Hogue, K., Colwill, K., Gladwish, K., Muskat, B., Kinach, R.,
Adams, S.L., Moran, M.F., Morin, G.B., Topaloglou, T., Figeys, D.: Large-scale
mapping of human protein -- protein interactions by mass spectrometry. Molecular
Systems Biology 3 (Mar 2007)
19. Fan, W., Wang, X., Wu, Y.: Incremental graph pattern matching. ACM Transac-
tions on Database Systems (TODS) 38(3), 18 (Aug 2013)
20. Fang, Q., Gao, J., Guibas, L., de Silva, V., Zhang, L.: GLIDER: Gradient landmark-
based distributed routing for sensor networks. In: Proc. of the 24th Conference of
the IEEE Communication Society (INFOCOM). vol. 1, pp. 339 -- 350 (March 2005)
21. Fruchterman, T.M., Reingold, E.M.: Graph drawing by force-directed placement.
Software: Practice and experience 21(11), 1129 -- 1164 (1991)
22. Fu, H., Zhang, A., Xie, X.: Effective Social Graph Deanonymization Based on
Graph Structure and Descriptive Information. ACM Transactions on Intelligent
Systems and Technology (TIST) 6(4), 49 -- 29 (Aug 2015)
23. Goga, O., Loiseau, P., Sommer, R., Teixeira, R., Gummadi, K.P.: On the reliabil-
ity of profile matching across large online social networks. In: Proceedings of the
21th ACM SIGKDD International Conference on Knowledge Discovery and Data
Mining. pp. 1799 -- 1808. KDD '15, ACM, New York, NY, USA (2015)
24. Grover, A., Leskovec, J.: node2vec. In: Proceedings of the 22nd ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining - KDD '16
(2016)
25. Guimerà, R., Danon, L., Díaz-Guilera, A., Giralt, F., Arenas, A.: Self-similar com-
munity structure in a network of human interactions. Physical Review E 68(6),
065103 (Dec 2003)
26. Ham, J., Lee, D.D., Saul, L.K.: Semisupervised alignment of manifolds. In: AIS-
TATS. pp. 120 -- 127 (2005)
27. Hamilton, R.S.: Three manifolds with positive Ricci curvature. Journal of Differ-
ential Geometry 17, 255 -- 306 (1982)
28. Hopcroft, J.E., Wong, J.K.: Linear time algorithm for isomorphism of planar graphs
(preliminary report). In: Proceedings of the Sixth Annual ACM Symposium on
Theory of Computing. pp. 172 -- 184. STOC '74, ACM, New York, NY, USA (1974).
https://doi.org/10.1145/800119.803896
29. Hopcroft, J.E., Karp, R.M.: An n5/2 algorithm for maximum matchings in bi-
partite graphs. SIAM Journal on computing 2(4), 225 -- 231 (1973)
30. Jin, M., Kim, J., Luo, F., Gu, X.: Discrete surface Ricci flow. IEEE TVCG 14(5),
1030 -- 1043 (2008)
31. Kennedy, W.S., Narayan, O., Saniee, I.: On the hyperbolicity of large-scale net-
works. arXiv preprint arXiv:1307.0031 (2013)
32. Khan, A., Wu, Y., Aggarwal, C.C., Yan, X.: NeMa: Fast Graph Search with Label
Similarity . Proceedings of the VLDB Endowment 6(3), 181 -- 192 (2013)
33. Kleinberg, J., Slivkins, A., Wexler, T.: Triangulation and embedding using small
sets of beacons. In: Proc. 45th IEEE Symposium on Foundations of Computer
Science. pp. 444 -- 453 (2004)
34. Kleinberg, J.M.: The small-world phenomenon - an algorithmic perspective. STOC
(2000)
Network Alignment by Discrete Ollivier-Ricci Flow
15
35. Kollias, G., Mohammadi, S., Grama, A.: Network similarity decomposition (nsd): A
fast and scalable approach to network alignment. IEEE Transactions on Knowledge
and Data Engineering 24(12), 2232 -- 2243 (2012)
36. Kunegis, J.: KONECT. In: Proceedings of the 22nd International Conference on
World Wide Web - WWW '13 Companion. pp. 1343 -- 1350. ACM Press, New York,
New York, USA (2013)
37. Lafon, S., Keller, Y., Coifman, R.R.: Data fusion and multicue data matching by
diffusion maps. IEEE Trans. Pattern Anal. Mach. Intell. 28(11), 1784 -- 1797 (Nov
2006)
38. Leicht, E.A., Holme, P., Newman, M.E.: Vertex similarity in networks. Physical
Review E 73(2), 026120 (2006)
39. Lim, H., Hou, J.C., Choi, C.H.: Constructing internet coordinate system based on
delay measurement. IEEE/ACM Trans. Netw. 13(3), 513 -- 525 (Jun 2005)
40. Lin, Y., Lu, L., Yau, S.T.: Ricci curvature of graphs. Tohoku Mathematical Journal
63(4), 605 -- 627 (2011)
41. Lorrain, F., White, H.C.: Structural equivalence of individuals in social networks.
J. Math. Sociol. 1(1), 49 -- 80 (1 Jan 1971)
42. Lott, J., Villani, C.: Ricci curvature for metric-measure spaces via optimal trans-
port. Annals of Mathematics. Second Series 169(3), 903 -- 991 (2009)
43. Luks, E.M.: Isomorphism of graphs of bounded valence can be tested in polynomial
time. Journal of computer and system sciences 25(1), 42 -- 65 (1982)
44. Luxburg, U.: A tutorial on spectral clustering. Statistics and Computing 17(4),
395 -- 416 (Dec 2007). https://doi.org/10.1007/s11222-007-9033-z
45. Malod-Dognin, N., Ban, K., Pržulj, N.: Unified alignment of protein-protein inter-
action networks. Scientific Reports 7(1), 953 (2017)
46. Malod-Dognin, N., Pržulj, N.: L-GRAAL: Lagrangian graphlet-based network
aligner. Bioinformatics 31(13), 2182 -- 2189 (Jul 2015)
47. McKay, B.D., Piperno, A.: Practical graph isomorphism, ii. Journal of Symbolic
Computation 60(0), 94 -- 112 (2014)
48. Melnik, S., Garcia-Molina, H., Rahm, E.: Similarity Flooding - A Versatile Graph
Matching Algorithm and Its Application to Schema Matching. ICDE (2002)
49. Narayan, O., Saniee, I.: Large-scale curvature of networks. Physical Review E
84(6), 066108 (2011)
50. Ni, C.C., Lin, Y.Y., Gao, J., Gu, X., Saucan, E.: Ricci curvature of the Internet
topology. In: 2015 IEEE Conference on Computer Communications (INFOCOM).
pp. 2758 -- 2766. IEEE (2015)
51. Noble, C.C., Cook, D.J.: Graph-based anomaly detection. In: Proceedings of the
ninth ACM SIGKDD international conference on Knowledge discovery and data
mining - KDD '03. pp. 631 -- 636. University of Texas at Arlington, Arlington, United
States (2003)
52. Ollivier, Y.: A survey of Ricci curvature for metric spaces and Markov chains.
Probabilistic approach to geometry (2010)
53. Ollivier, Y.: Ricci curvature of Markov chains on metric spaces. Journal of Func-
tional Analysis 256(3), 810 -- 864 (Feb 2009)
54. Patro, R., Kingsford, C.: Global network alignment using multiscale spectral sig-
natures. Bioinformatics 28(23), 3105 -- 3114 (2012)
55. Peng, W., Li, F., Zou, X., Wu, J.: A Two-Stage Deanonymization Attack against
Anonymized Social Networks. Ieee Transactions on Computers 63(2), 290 -- 303 (Feb
2014)
16
C.-C. Ni et al.
56. Perozzi, B., Al-Rfou, R., Skiena, S.: Deepwalk: Online learning of social represen-
tations. In: Proceedings of the 20th ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining - KDD '14. pp. 701 -- 710. New York (2014)
57. Sandhu, R., Georgiou, T., Reznik, E., Zhu, L., Kolesov, I., Senbabaoglu, Y., Tan-
nenbaum, A.: Graph Curvature for Differentiating Cancer Networks. Scientific Re-
ports 5, 12323 (Jul 2015)
58. Shvaiko, P., Euzenat, J.: Ontology matching: State of the art and future challenges.
IEEE Trans. Knowl. Data Eng. 25(1), 158 -- 176 (Jan 2013)
59. Singh, R., Xu, J., Berger, B.: Global alignment of multiple protein interaction
networks with application to functional orthology detection. Proceedings of the
National Academy of Sciences 105(35), 12763 -- 12768 (Sep 2008)
60. Spring, N., Mahajan, R., Wetherall, D.: Measuring isp topologies with rocketfuel.
SIGCOMM Comput. Commun. Rev. 32(4), 133 -- 145 (Aug 2002)
61. Sturm, K.T.: On the geometry of metric measure spaces - Springer. Acta Mathe-
62. Tao, T.: Ricci flow. Tech. rep., Technical report, Department of Mathematics,
matica (2006)
UCLA (2008)
63. Tong, H., Faloutsos, C., Gallagher, B., Eliassi-Rad, T.: Fast best-effort pattern
matching in large attributed graphs. In: Proceedings of the 13th ACM SIGKDD
international conference on Knowledge discovery and data mining - KDD '07. pp.
737 -- 746. Carnegie Mellon University, Pittsburgh, United States (2007)
64. Tutte, W.T.: How to draw a graph. Proceedings of the London Mathematical
Society. Third Series 13, 743 -- 767 (1963)
65. Wang, C., Jonckheere, E., Banirazi, R.: Wireless network capacity versus Ollivier-
Ricci curvature under Heat-Diffusion (HD) protocol. In: Proceedings of the Amer-
ican Control Conference. pp. 3536 -- 3541. University of Southern California, Los
Angeles, United States, IEEE (Jan 2014)
66. Wang, C., Jonckheere, E., Banirazi, R.: Interference constrained network control
based on curvature. In: Proceedings of the American Control Conference. pp. 6036 --
6041. University of Southern California, Los Angeles, United States, IEEE (Jul
2016)
67. Wang, D., Pedreschi, D., Song, C., Giannotti, F., Barabasi, A.L.: Human mobility,
social ties, and link prediction. ACM, New York, New York, USA (Aug 2011)
68. Whidden, C., Matsen IV, F.A.: Ricci-Ollivier Curvature of the Rooted Phylogenetic
Subtree-Prune-Regraft Graph. ANALCO pp. 106 -- 120 (2016)
69. Yan, J., Yin, X.C., Lin, W., Deng, C., Zha, H., Yang, X.: A short survey of recent
advances in graph matching. In: Proceedings of the 2016 ACM on International
Conference on Multimedia Retrieval. pp. 167 -- 174. ICMR '16, ACM, New York,
NY, USA (2016). https://doi.org/10.1145/2911996.2912035
70. Zeng, W., Samaras, D., Gu, X.D.: Ricci flow for 3D shape analysis. IEEE Transac-
tions on Pattern Analysis and Machine Intelligence (IEEE TPAMI) 32(4), 662 -- 677
(2010)
71. Zhang, J., Yu, P.S.: Multiple anonymized social networks alignment. In: 2015 IEEE
International Conference on Data Mining. pp. 599 -- 608 (Nov 2015)
Network Alignment by Discrete Ollivier-Ricci Flow
17
A Algorithm Pseudo-code
Algorithm 1 shows the steps of our Ricci flow algorithm.
Algorithm 1: Ricci flow on a graph
Input : An undirected graph G.
Output: A weighted graph G in which the Ricci curvature on all edges are the
same.
1 Initialize w0(x, y) = 1, ∀xy ∈ E;
2 Compute the Ricci curvature κ0(x, y), ∀xy ∈ E;
3 Update the edge weight by
wi+1(x, y) ← wi(x, y) − · κi(x, y) · wi(x, y);
4 Normalize the edge weight by
wi+1(x, y) ← wi+1(x, y) ·
xy∈E wi+1(x, y)
5 Repeat 2 − 4 until the curvature values do not change much.
(cid:80)
E
;
B Evaluation Datasets
For generality, the network alignment experiments are evaluated over both model
and real world network graphs. Here we give an overview of these graphs. The
statistics of these graphs are listed in Table 1.
Table 1. Graph properties for networks.
Pref. Attach.
Data Set
G(n,p)
Kleinberg
#Node #Edge Avg.Deg. Diam. Mean SP
4979
1000
5462
900
3984
1000
Random Regular 1000
6000
Random Regular 10000 40000
2071
5451
6418
895
1133
Protein Network 2217
3.259
3.272
3.138
3.05
4.816
5.944
3.606
3.844
9.958
12.138
7.968
12
8
4.628
9.62
5.789
6
5
5
4
7
13
8
10
AS: 3967
Email
18
C.-C. Ni et al.
B.1 Model Networks
Erdős-Rényi The Erdős-Rényi model [17], also known as the G(n, p) model,
connects each pair of nodes {i, j} by an edge with probability p independent of
every other edge. We choose (n, p) = (1000, 0.01) in our model.
Kleinberg The Kleinberg graph [34] begins with an n × n squared graph. Each
node is represented by {(i, j) : i, j ∈ {1, 2,··· , n}}. The distance between two
nodes (i, j) and (k, l) is defined by d((i, j), (k, l)) = k − i + l − j. For any
node u, q long-range connections to endpoint v are constructed by probability
proportional to d(u, v)−r. Here we take (q, r) = (4, 2).
Preferential Attachment We choose the Barabási-Albert model [5] as the pref-
erential attachment model. The model starts with k nodes and then adds nodes
one by one. Each newcomer node connects k edges to the existing nodes. For
each edge, the endpoint is selected with probability proportional to its current
degree. We take (n, k) = (1000, 4) in our example.
Random Regular A random d−regular graph is a graph with n nodes and each
node randomly connected to other d nodes. We take (n, d) = (1000, 12) in our
example.
B.2 Real Networks
Router Network A router network graph is composed of routers as nodes and
the physical connections as edges. We take the data set 'AS:3967, Exodus' from
the Rocketfuel project [60].
Email Network We take the email communication network at the University
Rovira i Virgili. In the graph, nodes are users and edges represent emails between
users [25,36].
Protein Network We choose the protein-protein interaction network in human
cells. Here every node in graph is a protein and an edge represents the interaction
between proteins [18,36].
C Comparisons With Other Methods
We compared our method with other topology-based methods in literature. The
brief introduction of these methods are described as follows. All experiments
were performed in Python on a 2012 Retina Macbook Pro with 16G ram and
2.6 GHz Intel Core i7. We used CVXPY+ECOS [12] as the Linear Programming
solver.
Network Alignment by Discrete Ollivier-Ricci Flow
19
Spectral Embedding The spectral embedding method [44] uses the eigenvectors of
the graph Laplacian matrix to embed nodes into the corresponding eigenspace.
It has been widely applied to graph matching and data clustering such as image
segmentation.
Spring Embedding Spring embedding is an iterative process first introduced by
Eades [13]. An advanced algorithm was later developed by Fruchterman and
Reingold [21]. A graph can be treated as a spring system such that the nodes
with initial positions oscillate until they find their own stable positions. The
spring embedding can be regarded as an evolution process, therefore, it is useful
to observe the change of the same dataset overtime.
IsoRank IsoRank was proposed by Singh et al. [59] for biological network align-
ment. A matching score is defined on each pair of nodes between two networks.
The matching score interprets not only the matching quality of the pair of node
but also that of their neighbors.
Network Similarity Decomposition (NSD) NSD [35] is an improvement of Iso-
Rank in terms of running time. It is performed by pre-processing two input
graphs separately and decomposing the computation of similarity matrix.
D Running Time of ATD and OTD.
Here we analyze the speed performance of Ricci flow metric with ATD and
OTD in Figure 6. In all settings, the computation time of Ricci flow metric with
ATD is up to 3X faster than that of OTD. This is because ATD does not need
linear programming computation for computing the optimal transport cost. In
fact, most of the computation time in Ricci flow metric by ATD is to compute
the all pair shortest path, which can be easily parallelized for further speed
improvement.
E More Alignment Results
In the following experiment we consider the case with random edge removal,
spectral embedding with 2 dimensions, and up to 5 landmarks. We use Ricci
Flow metric with ATD, Hungarian algorithm, and connected equivalence in the
following results. Figure 7 shows the results of graph matching on different model
networks, when G2 removes 0, 1, 10, 100 edges from G1 respectively. In all the
graphs, Ricci flow metric yields the best performance of matching accuracy,
even with only 2 or 3 landmarks, and with a large number of removed edges.
The accuracy of spring embedding and hop count are low when the number of
landmarks is small.
Notice that spectral embedding shows sensitivity with edge removal. In a
random regular graph, even with only 1 edge removed, the accuracy drops dra-
matically. This is because the stability of spectral embedding is highly influenced
20
C.-C. Ni et al.
Fig. 6. A comparison of computation times between Ricci flow metric with apportioned
Ricci curvature and Ollivier Ricci curvature.
by the connectivity of the graph. If a graph has more tree-like edges, its spectral
embedding is more likely to be affected by edge removal.
Figure 8 illustrates the matching results on real networks. Again, Ricci flow
metric performs the best on all of the graphs. Spectral embedding behaves rel-
atively better on real networks than on model networks. This is because real
networks do have high clustering coefficient and edges with high Jaccard coef-
ficient (Figure 10(b)). Notice that the matching accuracy of spring embedding
and hop count on AS:3967 and protein-protein interaction graph are low, this
may be caused by the larger diameter of these two graphs.
In Figure 9, the result of noisy graph alignment using greedy matching instead
of Hungarian algorithm is presented. With greedy matching, most of the methods
experience performance degradation except for Ricci flow metric. In AS graph
(Figure 9(a)), all methods performs poorly with greedy matching because of the
graph's tree like structure and large graph diameter.
F Tree-Like Graphs
To capture how much would the results be affected by tree-like edges in the
graphs, we evaluate the Jaccard coefficient on each edge as displayed in Fig-
ure 10(a). For an edge uv, the Jaccard coefficient of this edge is defined as
πu ∩ πv/πu ∪ πv. If an edge has a large Jaccard coefficient, it is likely to be
an interior edge of a cluster or a community; if an edge has a small Jaccard
coefficient, it then acts more like a tree edge or a bridge between clusters. In
Figure 10(a), it is clear that Kleinberg model has more edges with high Jaccard
coefficients, its spectral embedding is more robust and supports our results in
Figure 7(d).
Ricci Flow Metric with ATDRicci Flow Metric with OTDComputation Time (sec)0100020003000AS: 3967EmailG(n,p)KlienbergPref. Attach.ProteinRandomRegularNetwork Alignment by Discrete Ollivier-Ricci Flow
21
(a) G(n, p)
(b) Preferential Attachment
(c) Random Regular
(d) Kleinberg
Fig. 7. Result of approximate graph matching on model networks using Hungarian algorithm.
(a) AS: 3967, Exodus
(b) Email
Fig. 8. Result of approximate graph matching on real networks using Hungarian algorithm.
(c) Protein-protein interaction
-0 -1 -10 -100RF Metric -0 -1 -10 -100Spectral -0 -1 -10 -100Spring -0 -1 -10 -100Hop CountAccuracy00.51.0Accuracy00.51.0# Landmark12345# Landmark12345G(n, p) (1000 Nodes, 4979 Edges) / Edge removal -0 -1 -10 -100RF Metric -0 -1 -10 -100Spectral -0 -1 -10 -100Spring -0 -1 -10 -100Hop CountAccuracy00.51.0Accuracy00.51.0# Landmark12345# Landmark12345Preferential Attachment (1000 Nodes, 3984 Edges) / Edge removal -0 -1 -10 -100RF Metric -0 -1 -10 -100Spectral -0 -1 -10 -100Spring -0 -1 -10 -100Hop CountAccuracy00.51.0Accuracy00.51.0# Landmark12345# Landmark12345Random Regular (1000 Nodes, 6000 Edges) / Edge removal -0 -1 -10 -100RF Metric -0 -1 -10 -100Spectral -0 -1 -10 -100Spring -0 -1 -10 -100Hop CountAccuracy00.51.0Accuracy00.51.0# Landmark12345# Landmark12345Kleinberg (900 Nodes, 5462 Edges) / Edge removal -0 -1 -10 -100RF Metric -0 -1 -10 -100Spectral -0 -1 -10 -100Spring -0 -1 -10 -100Hop CountAccuracy00.51.0Accuracy00.51.0# Landmark12345# Landmark12345 AS:3967, Exodus (895 Nodes, 2071 Edges) / Edge removal -0 -1 -10 -100RF Metric -0 -1 -10 -100Spectral -0 -1 -10 -100Spring -0 -1 -10 -100Hop CountAccuracy00.51.0Accuracy00.51.0# Landmark12345# Landmark12345Email Network (1133 Nodes, 5451 Edges) / Edge removal -0 -1 -10 -100RF Metric -0 -1 -10 -100Spectral -0 -1 -10 -100Spring -0 -1 -10 -100Hop CountAccuracy00.51.0Accuracy00.51.0# Landmark12345# Landmark12345Protein-Protein Interaction (2217 Nodes, 6418 Edges) / Edge removal22
C.-C. Ni et al.
(a) AS: Greedy Matching
(b) PPI: Greedy Matching
Fig. 9. Result of noisy graph alignment with greedy matching and connected equivalence.
(c) Random Regular: Greedy Matching
(a) Model Networks
(b) Real Networks
Fig. 10. Histogram of Jaccard Coefficient on edge over networks.
Ricci Flow(ATD)SpringSpectralNSDISORankHop CountRecovery Accuracy00.20.40.60.81.0# Landmark23456AS:3967, Exodus (895 Nodes, 2071 Edges) V.S. (-10 Edges)Ricci Flow(ATD)SpringSpectralNSDISORankHop CountRecovery Accuracy00.20.40.60.81.0# Landmark23456Protein-Protein Interaction (2217 Nodes, 6418 Edges) V.S. (-10 Edges)Ricci Flow(ATD)SpringSpectralNSDISORankHop CountRicci Flow(OTD)Recovery Accuracy00.20.40.60.81.0# Landmark23456Random Regular (1000 nodes, 6000 edges) v.s. (-1 Node, -12 edges)Histogram of G(n, p)Histogram of Pref. AttachHistogram of Random RegularHistogram of Kleinberg1103110311031103Jaccard Coefficient00.20.40.60.8Histogram of AS: 3967Histogram of Email NetworkHistogram of Protein-Protein110210411021041102104Jaccard Coefficient00.20.40.60.8Network Alignment by Discrete Ollivier-Ricci Flow
23
G More Tests of Spectral and Spring Embedding
In Figure 11, we tested the influence of spectral embedding into Euclidean space
in Euclidean spaces of different dimensions. The improvement of alignment ac-
curacy with increasing dimensionality is still limited.
Fig. 11. A comparison of graph alignment results between Ricci flow metric and spectral embedding
of different dimensions.
Ricci FlowSpectral (dim=2)Spectral (dim=3)Spectral (dim=4)Random Regular -50 node (Spectral)Recovery Accuracy (log)0.010.11# Landmark05101520 |
1708.02000 | 1 | 1708 | 2017-08-07T06:23:53 | Analysis of Social Group Dynamics | [
"cs.SI",
"physics.soc-ph"
] | In this thesis the method for social group evolution discovery, called GED, is analyzed. Especially, GED method is compared with other methods tracking changes in groups over time with focus on accuracy, computational cost, ease of implementation and flexibility of the methods. The methods are evaluated on overlapping and disjoint social groups. Finally, GED method is run with different user importance measures. | cs.SI | cs | 1
Wydział Informatyki i Zarządzania
kierunek studiów: Informatyka
specjalność: Multimedialne Systemy Informacyjne
Praca dyplomowa - magisterska
Analysis of Social Group Dynamics
Stanisław Saganowski
keywords:
social network, community evolution,
communities in social networks, social
network analysis, groups dynamics, GED
short abstract:
In this thesis the method for social group evolution discovery, called GED, is
analyzed. Especially, GED method is compared with other methods tracking
changes in groups over time with focus on accuracy, computational cost, ease
of implementation and flexibility of the methods. The methods are evaluated
on overlapping and disjoint social groups. Finally, GED method is run with
different user importance measures.
opiekun pracy
dyplomowej
..................................................
Tytuł/stopień naukowy/imię i nazwisko
....................... .......................
ocena
podpis
Do celów archiwalnych pracę dyplomową zakwalifikowano do:*
a) kategorii A (akta wieczyste)
b)
kategorii BE 50 (po 50 latach podlegające ekspertyzie)
* niepotrzebne skreślić
Wrocław 2011
2
TABLE OF CONTENT
Abstract ...................................................................................................................................... 4
Streszczenie ................................................................................................................................ 4
1. Introduction ............................................................................................................................ 5
1.1. Aim and Objectives ......................................................................................................... 5
1.2. Research Questions ......................................................................................................... 5
1.3. Chapters Content ............................................................................................................. 6
2. Social Network ....................................................................................................................... 7
2.1. General Concept of Social Network ................................................................................ 7
2.2. Notation and Representation of Social Group ................................................................. 7
2.3. Social Network Analysis ................................................................................................. 7
2.4. Measures in Social Network Analysis ............................................................................ 9
2.4.1. Social Position .......................................................................................................... 9
2.4.2. Centrality Degree ................................................................................................... 10
2.4.3. Centrality Closeness ............................................................................................... 10
2.4.4. Centrality Betweenness .......................................................................................... 11
2.5. Temporal Social Network ............................................................................................. 11
3. Related Work ........................................................................................................................ 13
3.1. Methods for Group Extraction ...................................................................................... 13
3.1.1. Clique Percolation Method ..................................................................................... 13
3.1.2. Fast Modularity Optimization ................................................................................ 13
3.1.3. Algorithm of Girvan and Newman ......................................................................... 14
3.1.4. Radicchi et al. Method ........................................................................................... 14
3.1.5. Lancichinetti et al. Method ..................................................................................... 15
3.1.6. iLCD Algorithm ..................................................................................................... 15
3.1.7. Other Methods ........................................................................................................ 15
3.2. Methods for Tracking Group Evolution ........................................................................ 15
3.2.1. Asur et al. Method .................................................................................................. 15
3.2.2. Palla et al. Method .................................................................................................. 17
3.2.3. Chakrabarti et al. Method ....................................................................................... 18
3.2.4. Kim and Han Method ............................................................................................. 18
3.2.5. FacetNet ................................................................................................................. 19
3.2.6. GraphScope ............................................................................................................ 19
4. Group Evolution Discovery Method .................................................................................... 20
4.1. Community Evolution ................................................................................................... 20
4.2. Inclusion Measure ......................................................................................................... 22
3
4.3. Algorithm ...................................................................................................................... 23
4.4. Pseudo-code .................................................................................................................. 25
5. Group Evolution Discovery Platform .................................................................................. 26
5.1. Data Structures .............................................................................................................. 26
5.1.1. Import Module ........................................................................................................ 27
5.1.2. GED Module .......................................................................................................... 27
5.1.3. Asur Module ........................................................................................................... 28
5.1.4. Palla Module .......................................................................................................... 28
5.1.5. Analysis Module .................................................................................................... 29
6. Email Communication Data ................................................................................................. 30
6.1. Data Description ............................................................................................................ 30
6.2. Data Pre-processing ....................................................................................................... 30
7. Experiments .......................................................................................................................... 33
7.1. Test Environment .......................................................................................................... 33
7.2. Experiment Based on Overlapping Groups Extracted by CPM .................................... 33
7.2.1. GED Method .......................................................................................................... 34
7.2.2. Method by Asur et al. ............................................................................................. 39
7.2.3. GED Method vs. Asur et al. Method ...................................................................... 40
7.2.4. Method by Palla et al. ............................................................................................. 42
7.2.5. GED Method vs. Palla et al. Method ..................................................................... 43
7.3. Experiment Based on Disjoint Groups Extracted by Blondel ....................................... 44
7.3.1. GED Method. ......................................................................................................... 44
7.3.2. Method by Asur et al. ............................................................................................. 48
7.3.3. GED Method vs. Asur et al. Method ...................................................................... 48
7.4. Experiment Based on Different User Importance Measures ......................................... 48
8. Conclusions and Future Work .............................................................................................. 52
9. References ............................................................................................................................ 55
Abstract
4
The continuous interest in the social network area contributes to the fast development
of this field. New possibilities of obtaining and storing data allows for more and more deeper
analysis of the network in general, as well as groups and individuals within it. Especially
interesting is studying the dynamics of changes in social groups over time. Having such
knowledge ones may attempt to predict the future of the group, and then manage it properly in
order to achieve presumed goals. Such ability would be a powerful tool in the hands of human
resource managers, personnel recruitment, marketing, etc.
The thesis presents a new method for exploring the evolution of social groups, called
Group Evolution Discovery (GED). Next, the results of its use are provided together with
comparison to two other algorithms in terms of accuracy, execution time, flexibility and ease
of implementation. Moreover, the method was evaluated with various measures of user
importance within a group.
dynamics.
Obtained results suggest that GED is the best method for analyzing social group
Streszczenie
Nieustające zainteresowanie tematem sieci społecznych przyczynia się do szybkiego
rozwoju tej dziedziny nauki. Nowe sposoby pozyskiwania i magazynowania danych
pozwalają na coraz to głębszą analizę sieci jako ogółu, a także grup oraz jednostek w niej
występujących. Szczególnie interesujące jest badanie dynamiki zmian zachodzących w
grupach społecznych na przestrzeni czasu. Mając taką wiedzę można próbować przewidzieć
przyszłość grupy, a następnie odpowiednio nią kierować aby osiągnąć założone cele. Taka
umiejętność byłaby potężnym narzędziem w rękach osób zajmujących się zarządzaniem
zasobami ludzkimi, doborem personelu, marketingiem, itp.
W pracy przedstawiono nową metodę do odkrywania ewolucji grup społecznych
nazwaną Group Evolution Discovery (GED). Następnie pokazano wyniki jej użycia oraz
porównano z dwoma innymi algorytmami pod kątem dokładności i szybkości działania, a
także elastyczności i łatwości implementacji. Ponadto, metoda została sprawdzona z różnymi
miarami ważności użytkowników w grupie społecznej.
społecznych.
Otrzymane wyniki sugerują, że GED jest najlepszą metodą do badania dynamiki grup
5
1. Introduction
Social network in a simplest form is a social structure consisting of units that are
connected by various kinds of relations like friendship, common interest, financial exchange,
dislike, knowledge or prestige [27]. The easiest way to present social network in a
mathematical way is graph representation where members are nodes of the graph and relations
are edges between those nodes.
Social Network Analysis (SNA), which focuses on understanding the nature and
consequences of relations between individuals or groups [61], [67] has become progressively
attractive area within the social sciences for investigating human and social dynamics. The
earliest basic text known of dealing exclusively with social network analysis is Knoke and
Kuklinski's Network Analysis, published in 1982 [50]. The development of SNA is so fast
that the publications on methods and applications for analyzing social networks are updated
almost every year. [29], [7].
Changes in technology and society creates a powerful mix of forces that will
revolutionize the way all businesses – not just media companies – act, produce goods, and
relate to customers [3]. There are plenty of reasons why SNA area should be examined, e.g.
SNA can be used to help companies adapt to rapid economic changes [62], find key target
markets, build up harmonious and successful project teams [10], help people find jobs [24],
and more.
Social networks are dynamic by nature. A dynamic network consists of relations
between members that evolves over time. Although, the idea is very simple and intuitive,
tracking changes over time, especially changes within social groups is still uncharted territory
on the social network analysis map. There are only a few methods dealing with this problem,
and the need for more methods is tremendous.
This thesis presents new method for discovering group evolution in the social network.
The method is evaluated on the email communication data in order to show its features and
usefulness in the social network analysis area. The first results of the method were already
presented in [70] and [71].
1.1. Aim and Objectives
The goal with this project is to identify and analyze the changes occurring in the social
groups over the time. Additional objectives are:
1. to conduct research in literature on existing methods for detecting groups within the social
network,
2. to extract social groups from large email communication dataset,
3. to conduct research in literature on existing methods for tracking group evolution,
4. to develop new algorithm for group evolution discovery working on both overlapping and
disjoint group,
5. to identify and analyze changes occurring in social groups,
6. to prepare and conduct experiments which compare the new algorithm with existing ones.
1.2. Research Questions
The thesis addressed following research questions:
1. Which methods for detection groups within social network, methods based on fast
modularity or methods based on cliques, are faster for the large datasets?
2. How changes of a social group over time can be noticed and evaluated?
3. What are the most common event types occurring in social group evolution?
6
4. What is the difference between various methods for tracking group evolution?
5. Which methods for discovering group evolution can be successfully used on overlapping
groups?
1.3. Chapters Content
The rest of the thesis is organized as follows. Chapter 2 describes general concept of
the social network and basis of the SN theory together with notation and representation of
social group, also description of the social network analysis and measures used in the SNA
and presentation of the temporal social network is provided. Chapter 3 describes the most
common and valuable methods for group extraction and methods for quantifying group
evolution in the social network. Chapter 4 presents the idea of new method for tracking group
evolution preceded by theoretical basis, such as event types or inclusion measure required to
understand the algorithm. Formula and pseudo-code is also provided in this section. Chapter 5
includes general scheme of all GED Platform's modules and detailed description of their
tasks. Chapter 6 describes the email communication data used in the study together with data
pre-processing needed to conduct the experiments. In Chapter 7 evaluation of the Group
Evolution Discovery method focused on accuracy and flexibility is presented. Other aspects,
such as execution time, ease of implementation and design are also mentioned. Moreover,
exhaustive comparison with two other methods for tracking group evolution is provided.
Chapter 8 includes outcomes from running experiments with answers for research questions.
Additionally, development direction of GED method is revealed. Chapter 9 presents a lists of
tables and figures occurring in the thesis, and finally Chapter 10 contains sorted list of the
literature used in the thesis.
7
2. Social Network
2.1. General Concept of Social Network
There is no universally acceptable definition of the social network. Network analysed
in this thesis can be described as set of actors (network nodes) connected by relationships
(network edges). Many researchers proposed their own concept of social network [25], [61].
[67]. [68]. Social networks, as an interdisciplinary domain, might have different form:
corporate partnership networks (law partnership) [40], scientist collaboration networks [48],
movie actor networks, friendship network of students [4], company director networks [57],
sexual contact networks [44], labour market [42], public health [8], psychology [51], etc.
The easiest to investigate, social networks, are online social networks [12], [20], web-
based social networks [23], computer-supported social networks [69] or virtual social
networks. The reason for this is simple and continuous way to obtain data from which those
social networks can be extracted. Depending on the type of social network, data can be found
in various places, e.g.: bibliographic data [21], blogs [2], photos sharing systems like Flickr
[32], e-mail systems [65], [30], telecommunication data [6], [33], social services like Twitter
[28] or Facebook [17], [64], video sharing systems like YouTube [11], Wikipedia [67] and
more. Obtaining data from mentioned "data sources" allows to explore more than single
social network in specific snapshot of time. Using proper techniques it is possible to evaluate
changes occurring in social network over time. Especially interesting is following changes of
social groups (communities) extracted from social networks.
2.2. Notation and Representation of Social Group
As there is no definition of the social network, there is also no common definition of
the groups (communities) in social networks [18], [54]. Several different definitions are used,
sometimes they are even simplified just to criteria for existence of the group [14], [19], [35].
Biologists described group as a cooperating entities, existing in the same environment. For
sociologists community is a group of units sharing common area. Both definitions are focused
on location of a members of a group. However, caused by fast propagation of the Internet,
community is no more associated with geographical position. A general concept of a social
group assumes that community is a set of units in given population (social network), who
collaborate together more often than with other units of this population (social network). This
general idea can be easily moved to the graph theory, where social network is represented as a
graph and a community is a set of nodes (vertices) with high density of links (edges) within
community, and lower density of a links directed outside the community. Moreover,
communities can also be algorithmically determined, as the output of the specific clustering
algorithm [43]. In this thesis, such a definition will be used, i.e. a group G extracted from the
social network SN(V,E) is a subset of vertices from V (GV), extracted using any community
extraction method (clustering algorithm).
2.3. Social Network Analysis
The term social networks have been used for the first time in the middle of 1950, but
only in the 1980s researchers began to explore social relationships. Since then social network
analysis (SNA) becomes necessary in an increasing number of application domains, including
community discovery (as formation and evolution), social dynamics (as consensus, agreement
and uniformity), recommendation systems and so on [22].
8
General idea of social network analysis is projecting and measuring of relationships
and flows between people, communities, institutions, computers, web sites, and other
knowledge processing units. SNA provides both a visual and a mathematical analysis of units
relationships [36].
While performing social network analysis four main tasks can be observed. First step
is selection of a sample which will be analyzed. Then the data can be collected using any
existing method for collecting data, e.g. interviews, questionnaires, observation. There are two
types of data that might be investigated, members and relations between them. Third step in
SNA is choice and implementation of a social network analysis method. There are three
approaches to the analyzing procedure (Figure 2.1):
Figure 2.1. Visualisation of social network analysis methods (figure from [31]).
Full network methods are collecting and analyzing data about the whole network. None
of the members nor relationships is omitted. This approach is the most accurate but also
the most expensive when it comes to computational cost or time needed for processing.
Another inconvenience may be problem with collecting data for entire network [25].
Snowball methods starts with single local member or small set of members and follow its
relations in order to reach another members. Ones the method reach them the whole
process is repeated until all members are investigated or the predefined number of
iteration is exceeded. This method works very well for finding well connected groups in
big networks but it also has some disadvantages. The method can omit members who are
isolated or loosely connected, or in worst case the method can end on the first member
because of lack in relations [25].
9
Ego-centric methods are focused only on the single member and its neighbourhood (and
also on relations between them). This method is useful for analyzing the local network and
what influence has this network on considered member. Because of local character the
method is very fast and computationally efficient [25].
The final step in social network analysis is drawing conclusions [20].
There are plenty of reasons why SNA area should be investigated, e.g. SNA can be
used to identify target markets, create successful project teams and serendipitously identify
unvoiced conclusion [10].
2.4. Measures in Social Network Analysis
While analyzing social network it is sometimes crucial to investigate which member is
the most powerful (central). Or, looking from another angle, how important is the specific
member within the social group, which he belongs to. To do so, one of the measures listed
below may be used.
2.4.1. Social Position
Social position is a measure which express the user importance within social network
and is calculated in the iterative way. The social position for network SN(V,E) is calculated as
follows [45]:
(2.1)
where:
– the social position of member x after the n+1st iteration,
– the coefficient from the range (0;1),
– the commitment function which expresses the strength of the relation from y to x,
.
Characteristic for the social position is that it takes into account both, the value of
social positions of member's x relations and their commitment in connections to x. In general,
the greater social position one have the more profitable this user is for the entire network [45].
Algorithm of a method can be easily presented as follows:
1. For each member in a network assign SP0 = 1.
2. For each edge e(x,y)
in a network recalculate SP of y according
to:
3. For
each member
in
a
network
recalculate
SP
according
to:
4. Repeat steps 2 and 3 until gain in SP for each member in a network is below
presumed threshold.
Directed social network presented in Figure 2.2 contains commitment values between
social position of members is
members. Based on these values and coefficient value
calculated in Table SN1. Each column represents one iteration of algorithm. Calculations
stops when difference between successive iterations is 0,01 or lower. The final value of social
position determines the rank of particular member within examined social network, the higher
social position the higher position in the ranking. In the example illustrated in Figure 2.2
member C has the highest SP (and rank) due to the number of relations and their high
commitment value from other members. Member D, in turn, has second place in the ranking
VynnxyCySPxSP11)(1xSPnxyCVxxSPeach for 1)(0yxCxSPySPySPnnn1xSPxSPnn15,0as a result of just one relation, but it is relation from the most important member in the
network. As easily seen in Table 2.1 the algorithm found the final ranking in the second
iteration. In general, the smaller network the less iterations needed to calculate social
positions.
10
Figure 2.2. Members of a directed social network with assigned commitment values.
Member SP0 SP1
SP2
SP3
SP4
SP5
SP6
SP7 Rank
A
B
C
D
E
1 0,60 0,565 0,565 0,565 0,568 0,567 0,566
1 0,65 0,650 0,650 0,678 0,665 0,665 0,667
1 1,75 1,410 1,393 1,458 1,440 1,434 1,440
1 1,375 1,205 1,196 1,229 1,220 1,217
1
1
1
1 1,188 1,103 1,098 1,115 1,110
5
4
1
2
3
Table 2.1. Social position of a members in successive iterations of algorithm.
Last column contains ranking of a members in social network.
2.4.2. Centrality Degree
The way of calculating centrality degree is very simple and intuitive. It is the number
of direct connections of member x with other members [45]:
(2.2)
where:
– the number of members which are directly connected to member x,
m – the number of members in a network.
2.4.3. Centrality Closeness
In a centrality closeness the member's location within the network is more important
than the number of connections with other members (like in a centrality degree measure). A
1)(mxdxCDxd11
centrality closeness measure determines how close the member is to all other members in a
network and counts how quick this member can get in touch with other members[45]:
(2.3)
where:
– a function describing the distance between members x and y,
m – the number of members in a network.
2.4.4. Centrality Betweenness
A centrality betweenness focuses on how many times member is located between two
other members and how often the path goes through this member. Importance of the members
with high centrality betweenness lies on fact that other members are connected with each
other only by them. The measure is determined using [45]:
(2.4)
where:
– the number of shortest paths from x to y that goes through z,
– the number of all paths from x to y,
m – the number of members in a network.
2.5. Temporal Social Network
Temporal social network TSN is a list of succeeding timeframes (time windows) T.
Each timeframe is in fact one social network SN(V,E) where V is a set of vertices and E is a
set of directed edges
(2.5)
Example of a temporal social network is presented in Figure 2.3. TSN consists of five
timeframes, and each timeframe is social network created from data gathered in particular
interval of time. In the simplest case one interval starts when previous interval ends, but based
on author's needs intervals may overlap by a set of time or even contain full history of
previous timeframes.
VyxyyxcmxCC,1)(yxc,1)(,mbzbxCBVyxzyxxyxyzbxyxybyxVyxyx,,:,miyxVyxyxEmiEVSNTNmTTTTSNiiiiiim,...,2,1,,:,,...,2,1),,(,,....,,2112
Figure 2.3. Example of temporal social network consisting of five timeframes.
13
3. Related Work
3.1. Methods for Group Extraction
Methods for group extraction, also called community detection methods or grouping
methods, are the first step in analyzing social networks. The aim of these methods is to
identify (extract) groups within a social network by only using the information contained in
the network's graph. Two main types of the community detection methods can be
distinguished, the one which assign each member to a single group, and the one which allows
members to be the part of more than one community. The groups extracted with the first type
of methods are called disjoint groups (they do not share any nodes), while the communities
obtained by utilizing the second type of methods are called overlapping groups (they do share
nodes). In further sections the most common and valuable methods for group extraction in the
social network are presented.
3.1.1. Clique Percolation Method
The clique percolation method (CPM) proposed by Palla et al. [54], [15] is the most
widely used algorithm for extracting overlapping communities. The CPM method works
locally and its basic idea assumes that the internal edges of a group has a tendency to form
cliques as a result of high density between them. Oppositely, the edges connecting different
communities are unlikely to form cliques. A complete graph with k members is called k-
clique. Two k-cliques are treated as adjoining if number of shared members is k–1. Lastly, a k-
clique community is the graph achieved by the union of all adjoining k-cliques [1]. Such a
assumption is made to represent fact that it is crucial feature of a group that its nodes can be
attained through densely joint subsets of nodes. Algorithm works as follows:
1. All cliques are found for different values of k.
2. A square matrix
, where n is the number of cliques found, is created. Each
cell [i, j] contains number of nodes shared by cliques i and j.
3. All cliques of size equal or greater than k are selected and between cliques of the
same size connections are found in order to create a k-clique chain.
Palla et al. proposing their method aim for algorithm which is not too rigorous, takes
into account the density of edges, works locally, and allows nodes to be a part of several
groups. All the requirements were fulfilled, moreover Palla and co-workers [18] implemented
CPM algorithm in software package called CFinder, which is freely available at [26].
3.1.2. Fast Modularity Optimization
The method by Blondel et al. [6] is designed to deal with the large social networks. It
provides good quality of the extracted disjoint groups in low computation time, what is more
a complete hierarchical community structure is also supplied. In the first step algorithm
creates a different community for each member of the network. Then, repeating iteratively
members are moved to neighbours' communities, but only if such action will improve the
modularity of the considered group. Gain in modularity ΔQ obtained by adding node i into a
community C is calculated as follows:
nnM14
(3.1)
where:
– the sum of the weights of the links inside community C,
– the sum of the weights of the links incident to nodes in community C,
– the sum of the weights of the links incident to node i,
– the sum of the weights of the links from node i to nodes in community C,
Algorithm stops when none of the members cannot increase the modularity of its
m – the sum of the weights of all the links in the network.
neighbours' group. Algorithm, step by step, is presented below.
1. Each node is assigned to separate group.
2. Each node is removed from its group and added to the neighbour's group, gain in
modularity is counted and node stays in group where gain is the biggest. If the gain in
modularity is below zero for all neighbours' groups, the node goes back to its original
group.
3. Step 2 is repeated until modularity cannot be improved any more.
4. New network is created, where groups are represented by super-nodes. Super-nodes
are connected if there is at least one connection between groups represented by super-
nodes. The weight of the connection equals sum of weights of connections between
groups.
5. Steps 1 – 4 are repeated until the network consist of one super-node.
The biggest advantages of the method are intuitive concept of grouping nodes, ease of
implementation, extremely low computational cost, and unfolding hierarchical community
structure. Method by Blondel et al. is implemented for example in a Workbench for Network
Scientists (NWB) [49].
3.1.3. Algorithm of Girvan and Newman
Method by Girvan and Newman [21] [46] is one of the best known algorithms for
extracting disjoint groups. This method focuses on the edges which are least central in order
to remove them from the network. To determine the weakest edges, those which are most
"between" groups, Girvan and Newman used slightly modified betweenness centrality
measure (mentioned in section 2.4.4.). The edges are iteratively removed from the network,
based on the value of their betweenness. After each iteration betweenness of the edges
affected by the removal is recalculated. Algorithm stops when there are no edges to remove,
which means that all groups have been disjointed.
3.1.4. Radicchi et al. Method
Radicchi et al. in [55] proposed faster version of Girvan-Newman method. A divisive
algorithm requires the consideration of only local quantities. The authors used edge-clustering
coefficient to single out edges connecting members belonging to different groups. Having the
same accuracy as algorithm of Girvan and Newman, method by Radicchi et al. works much
faster, allowing to investigate far bigger networks.
222,22222mkmmmkmkQitotinitotiniinintotikinik,15
3.1.5. Lancichinetti et al. Method
Algorithm by Lancichinetti et al. [39] identifies the natural communities of the
members based on their fitness. The fitness is calculated from the internal and external
degrees of the members in communities. Counting fitness for every node in graph will cover it
by the overlapping groups. Due to the parameter controlling the size of the communities there
is a possibility to find hierarchical dependencies between groups. The method is very flexible,
fitness function can be designed for particular type of network, e.g. weighted networks.
3.1.6. iLCD Algorithm
In order to detect communities, Cazabet et al. in [56] focused not only on edges and
nodes within group, but also on its particular pattern of development. When new member
appears in the network algorithm looks for groups which will suites new node. Suits in this
case means that (1) the number of neighbours inside the community which new member can
access with a path of length two or less is higher than the mean number of second neighbours
within community, and (2) the number of neighbours inside the community which new
member can access with a path of length two or less, by at least two different paths is greater
than the mean number of robust second neighbours within community. The intrinsic
Longitudinal Community Detection (iLCD) algorithm allows groups to overlap, which makes
it optional for CPM method.
3.1.7. Other Methods
Apart from the most common, presented above, methods for detecting groups in a
network, researchers developed many other, e.g. Fast greedy modularity optimization by
Clauset, Newman and Moore [13], Markov Cluster Algorithm [66], Structural algorithm by
Rosvall and Bergstrom [59], Dynamic algorithm by Rosvall and Bergstrom [60], Spectral
algorithm by Donetti and Muñoz [16], Expectation-maximization algorithm by Newman and
Leicht [47], Potts model approach by Ronhovde and Nussinov [58]. Most of them are
analyzed and evaluated by Lancichinetti and Fortunato in [38].
3.2. Methods for Tracking Group Evolution
One aspect of the social network analysis is to investigate dynamics of a community,
i.e., how particular group changes over time. To deal with this problem several methods for
tracking group evolution have been proposed. Almost all of them as a input data needs the
social network with communities extracted by one of the grouping methods. In a consequence
specific methods for tracking evolution works better on disjoint groups or on overlapping
groups. Further paragraphs provides the basic ideas behind the most popular methods for
analyzing social group dynamics.
3.2.1. Asur et al. Method
The method by Asur et al. [5] has simple and intuitive approach for investigating
community evolution over time. The group size and overlap are compared for every possible
pair of groups in the consecutive timeframes and events involving those groups are assigned.
When none of the nodes of community from timeframe i occur in following timeframe i+1,
Asur et al. described this situation as dissolve of the group.
16
(3.2)
where:
– community number k in timeframe number i,
– the set of the vertex (nodes) of community number k in timeframe number i.
In opposite to dissolve, if none of the nodes of community from timeframe i+1 was
present in previous timeframe i, group is marked as new born.
(3.3)
Community continue its existence when identical occurrence of the group in
consecutive timeframe is found.
Situation when two communities from timeframe i joint together overlap with more
of the single group in timeframe i+1, is called merge.
(3.4)
(3.5)
Opposite case, when two groups from timeframe i+1 joint together overlap with more
of the single group in timeframe i, is marked as split.
than
than
(3.6)
the events described by Asur et al. are presented in Figure 3.1. Communities
Authors of the method suggested 30% or 50% as a value for
threshold. Example of
and
continue between timeframes 1 and 2, then merge into one community
in timeframe 3. In
timeframe 4 community
splits into three groups
,
and
, next in timeframe 5 new
community
forms and finally in timeframe 6 the biggest community
dissolves.
1such that no iff 111jikijikiVVCCDissolvekiCkiV1such that no iff 111jikijikiVVCCFormjikijikiVVCCContinue11 iff 1,%2 and 2 and%,such that iff 1,,11111lijilikijikijilikijilikijilikiCVVCVVVVVMaxVVVCCCMerge%2 and 2 and%,such that , iff 1,1111111111lijilikijikijilikijilikilikijiCVVCVVVVVMaxVVVCCCSplit11C21C13C13C14C24C34C45C15C17
Figure 3.1. Possible group evolution by Asur et al. (figure from [5]).
Method provided by Asur et al. allows also to investigate behaviour of individual
members in a community life. Node can appear in a network, disappear from a network, and
also join and leave community.
detection, nor if method works for overlapping groups.
Unfortunately, Asur et al. did not specify which method should be used for community
3.2.2. Palla et al. Method
Palla et al. in their method [52], [53] used all advantages of the clique percolation
method (described in section 3.1.1.) for tracking social group evolution. Social networks at
two consecutive timeframes i and i+1 are merged into single graph Q(i, i+1) and groups are
extracted using CPM method. Next, the communities from timeframes i and i+1, which are
the part of the same group from joint graph Q(i, i+1), are considered to be matching i.e.
community from timeframe i+1 is considered to be an evolution of community from
timeframe i. It is common that more than two communities are contained in the same group
from joint graph (Figure 3.2b and Figure 3.2c). In such a case matching is performed based on
the value of their relative overlap sorted in descending order. The overlap is calculated as
follows:
(3.7)
where:
– the number of common nodes in the communities A and B,
– the number of nodes in the union of the communities A and B.
However, the authors of the method did not explain how to chose the best match for
the community, which in next timeframe has the highest overlap with two different groups.
BABABAO,BABA18
Figure 3.2. Most common scenarios in the group evolution by Palla et al.. The groups at
timeframe t are marked with blue, the groups at timeframe t+1 are marked with yellow, and
the groups in the joint graph are marked with green. a) a group continue its existence, b) the
dark blue group swallows the light blue, c) the yellow group is detached from the orange one
(figure from [53]).
Palla et al. proposed several event types between groups: growth, contraction, merge,
split, birth and death, but no algorithm to assign them is provided. The biggest disadvantage
of the method by Palla et al. is that it has to be run with CPM, no other method for community
evolution can be used. Despite some lacks, the method is considered the best algorithm
tracking evolution for overlapping groups.
3.2.3. Chakrabarti et al. Method
Chakrabarti et al. in their method [9] presented original concept for the identifying
group changes over time. Instead of extracting communities for each timeframe and matching
them, the authors of the method introduced the snapshot quality to measure the accuracy of
the partition Ct in relation to the graph formation at time t. Then the history cost measures
difference between partition Ct and partition at the previous timeframe Ct-1. The total worth of
Ct is the sum of snapshot quality and history cost at each timeframe. Most valuable partition is
the one with high snapshot quality and low history cost. To obtain Ct from Ct-1, Chakrabarti et
al. use relative weight cp (tuned by user) to minimize difference between snapshot quality and
history cost. Chakrabarti et al. did not mention if method work for overlapping groups.
3.2.4. Kim and Han Method
Kim and Han in their method [34] used links to connect nodes at timeframe t–1 with
nodes at timeframe t, creating nano-communities. The nodes are connected to their future
occurrences and to their future neighbours. Next, the authors analyzed the number and density
19
of the links to judge which case of relationship occurs for given nano-community. Kim and
Han stated most common changes, which are: evolving, forming and dissolving. Evolving of
a group can be distinguished into three different cases: growing, shrinking and drifting.
Community Ct grows between timeframes t and t+1 if there is a group Ct+1 in the following
timeframe containing all nodes of Ct. Group Ct+1 may, of course, contain additional nodes,
which are not present in Ct. In opposite, community Ct shrinks between timeframes t and t+1
when there is a group Ct+1 in the next timeframe which all nodes are contained in Ct. Finally,
group Ct is drifting between timeframes t and t+1 if there is group Ct+1 in the following
timeframe which has at least one node common with Ct. Kim and Han did not specify if the
method is designed for overlapping or disjoint groups, but the drifting event suggest that
method will not work correctly for overlapping groups.
3.2.5. FacetNet
Lin et al. used evolutionary clustering to create FacetNet [41], a framework allowing
members to be a part of more than one community at given timeframe. In contrast to
Chakrabarti et al. method, Lin et al. used the snapshot cost and not the snapshot quality to
calculate adequate of the partition to the data. Kullback-Leibler method [37] has been used for
counting snapshot cost and history cost. Based on results of FacetNet it is easier to follow
what happens with particular nodes, rather than what happens with a group in general. The
algorithm is not assigning any events, but user can analyze results and assign events on his
own. Unfortunately, FacetNet is unable to catch forming and dissolving events.
3.2.6. GraphScope
Sun et al. presented parameter-free method called GraphScope [63]. At the first step
partitioning is repeated until the smallest encoding cost for a given graph is found. Subsequent
graphs are stored in the same segment Si if encoding cost is similar. When examined graph G
has higher encoding cost than encoding cost of segment Si, graph G is placed to segment Si+1.
Jumps between segments marks change-points in graph evolution over time. The main goal of
this method is to work with a streaming dataset, i.e. method has to detect new communities in
a network and decide when structure of the already existing communities should be changed
in the database. Therefore, to adapt GraphScope for tracking group evolution, some
extensions are needed.
20
4. Group Evolution Discovery Method
The small number of algorithms for tracking community evolution, as well as their
low flexibility and accuracy suggest a gap in the knowledge. Therefore, in this thesis, the new
method for the group evolution discovery, called GED, is proposed. Further sections presents
the particular elements of the method and explains their usefulness.
4.1. Community Evolution
Evolution of particular social community can be represented as a sequence of events
(changes) following each other in the successive timeframes within the temporal social
network. Possible events in social group evolution are:
Figure 4.1. The events in community evolution.
21
Continuing (stagnation) – the community continue its existence when two groups in the
consecutive time windows are identical or when two groups differ only by few nodes but
their size is the same. Intuitively, when two communities are so much similar that it is
hard to see the difference.
Shrinking – the community shrinks when some members has left the group, making its
size smaller than in the previous time window. Group can shrink slightly, losing only few
nodes, or greatly, losing most of its members.
Growing (opposite to shrinking) – the community grows when some new members have
joined the group, making its size bigger than in the previous time window. A group can
grow slightly as well as significantly, doubling or even tripling its size.
Splitting– the community splits into two or more communities in the next time window
when few groups from timeframe Ti+1 consist of nodes of one group from timeframe Ti.
Two types of splitting can be distinguished: (1) equal, which means the contribution of the
groups in split group is almost the same and (2) unequal, when one of the groups has
much greater contribution in the split group. In second case for the biggest group the
splitting might looks similar to shrinking.
Merging (reverse to splitting) – the community has been created by merging several other
groups when one group from timeframe Ti+1 consist of two or more groups from the
previous timeframe Ti. Merge, just like the split, might be (1) equal, which means the
contribution of the groups in merged group is almost the same, or (2) unequal, when one
of the groups has much greater contribution into the merged group. In second case for the
biggest group the merging might looks similar to growing.
Dissolving happens when a community ends its life and does not occur in the next time
window, i.e., its members have vanished or stop communicating with each other and
scattered among the rest of the groups.
Forming (opposed to dissolving) of new community occurs when group which has not
existed in the previous time window Ti appears in next time window Ti+1. In some cases, a
group can be inactive over several timeframes, such case is treated as dissolving of the
first community and forming again of the, second, new one.
The examples of events described above are illustrated in Figure 4.1.
The easiest way to track whole evolution process for the particular community is to
combine all changes during its lifetime to a single graph (Figure 4.2) or table (Table 4.1).
Figure 4.2. Evolution of the single community presented on a graph.
22
In the examples presented in Figure M2. and in Table M1. the network consists from
eight timeframes. Group G1 forms in T2, which means that members of G1 have no relations in
T1 or relations are rare. Next, by gaining four new nodes, community grows in T3. In
following timeframe T4 group G1 splits into G2 and G3. By losing one node, group G2 shrinks
in T5 while group G3 remains unchanged. Then new group G4 forms in T6, while both
communities G2 and G3 continue their existence. In timeframe T7 all groups merges into one
community G5 but in last timeframe T8 group dissolves preserving only few relations between
its members.
Event T2 Event T3 Event T4 Event
form G1 growth G1
form G1 growth G1
-
split G2
shrink G2 continue G2 merge G5 dissolve
split G3 continue G3 continue G3 merge G5 dissolve
dissolve
T6 Event T7 Event
T5 Event
-
-
-
-
Table 4.1. Evolution of the communities presented in a table.
form
G4 merge G5
-
-
-
4.2. Inclusion Measure
To be able to track social community evolution, the groups from successive
timeframes have to be matched into pairs. The most common and simplest approach is
counting the overlapping of those groups:
(4.1)
where:
– the number of shared nodes.
– the size of the bigger group.
However, overlap function can easily miss important relationships, e.g., when one
group is small and another one is huge overlapping will be low and the methods for tracking
evolution will ignore this pair of the groups. To avoid such a situations and to emphasize
relations within the community a novel measure called inclusion is proposed. This measure
allows to evaluate the inclusion of one group in another. Therefore, inclusion of group G1 in
group G2 is calculated as follows:
(4.2)
where:
– value of social position of the member x in G1.
The unique structure of this measure takes into account both the quantity and quality
of the group members. The quantity is reflected by the first part of the inclusion measure ,i.e.,
what portion of G1 members is shared by both groups G1 and G2, whereas the quality is
expressed by the second part of the inclusion measure, namely what contribution of important
members of G1 is shared by both groups G1 and G2. It provides a balance between the groups
which contain many of the less important members and groups with only few but key
members.
212121,,GGMAXGGGGO21GG21,GGMAX%100qualitygroupquantitygroup,1121112121GxGGGxGxSPxSPGGGGGIxSPG123
The one might say that inclusion formula is "unfair" for not identical groups, because
if community differ even by only one member, inclusion is reduced for not having all nodes
and also for not having social position of those nodes. Indeed, it is slightly "unfair" (or rather
strict), but using social position measure, which is calculated based on members' relations,
causes that inclusion focuses not only on nodes (members) but also on edges (relations)
giving great advantage over overlapping measure.
Naturally, instead of social position (SP) any other measure which indicates user
importance can be used e.g. centrality degree, closeness degree, betweenness degree, etc. But
it is important that this measure is calculated for the group and not for social network in order
to reflect node importance in community and not in the whole social network.
4.3. Algorithm
As mentioned before, the overlap measure has a tendency to missing important
evolutions, therefore inclusion is counted for both groups separately. Then, even if the
inclusion of huge group in small one is low, the opposite inclusion, the inclusion of small
group in huge group can still have high value. In such a case, the method will not skip any
meaningful evolutions.
Intuitively, between two groups <G1, G2> only one event may occur, e.g. community
G1 cannot shrinks and merge into community G2 at the same time. Of course one community
in timeframe Ti may have several events with different communities in Ti+1, e.g. G1 can split
into G2 and G3. Assigning events with GED method is based on the size of the communities
and on the inclusion values of both groups, if at least one of the inclusions exceeds the
thresholds set by the user, the event is assigned, (see Figure M3.). The exceptions are events
forming and dissolving, which are assigned with special condition. In order to assign forming
(dissolving) event members of a community cannot have relations in previous (next)
timeframe or relations have to be rare, i.e. considered group must have very low inclusions
level with all groups in previous (next) timeframe. In this thesis a very low level is regarded
as a value below 10%, argumentation for that is presented in experimental section.
The user can set value of each threshold individually, α threshold is for inclusion of
group G1 in G2, while β threshold is for inclusion of G2 in G1. The value of thresholds has to
be from range <0%, 100%>, however it is recommended to choose values above 50% to
guarantee good inclusion of matching communities. An advantage of counting two inclusions
instead of one was already provided, what is the profit of using two thresholds? Primarily, the
method gains on flexibility and the user has possibility to obtain the results which he needs.
The extensive explanation on setting value of thresholds and their influence on results are
provided in experimental section of this thesis.
Input:
GED – Group Evolution Discovery Method
TSN in which at each timeframe Ti groups are extracted by any community
detection algorithm; calculated any user importance measure.
1. For each pair of groups <G1, G2> in consecutive timeframes Ti and Ti+1 inclusion
of G1 in G2 and G2 in G1 is counted according to equations (MW2).
2. Based on inclusion and size of two groups one type of event may be assigned:
a. Continuing: I(G1,G2) α and I(G2,G1) β and G1 = G2
24
b. Shrinking:
I(G1,G2) α and I(G2,G1) β and G1 > G2
OR
I(G1,G2) < α and I(G2,G1) β and G1 G2 and there is only
one match (matching event) between G2 and all groups in the
previous timeframe Ti
c. Growing:
I(G1,G2) α and I(G2,G1) β and G1 < G2
OR
I(G1,G2) α and I(G2,G1) < β and G1 G2 and there is only
one match (matching event) between G1 and all groups in the
next timeframe Ti+1
d. Splitting:
I(G1,G2) α and I(G2,G1) < β and G1 G2 and there is more
than one match (matching events) between G2 and all groups in
the previous time window Ti
OR
I(G1,G2) < α and I(G2,G1) β and G1 G2 and there is more
than one match (matching events) between G2 and all groups in
the previous time window Ti
e. Merging:
I(G1,G2) α and I(G2,G1) < β and G1 G2 and there is more
than one match (matching events) between G1 and all groups in
the next time window Ti+1
OR
I(G1,G2) < α and I(G2,G1) β and G1 G2 and there is more
than one match (matching events) between G1 and all groups in
the next time window Ti+1
f. Dissolving: for G1 in Ti and each group G2 in Ti+1 I(G1,G2) < 10% and
I(G2,G1) < 10%
g. Forming:
for G2 in Ti+1 and each group G1 in Ti I(G1,G2) < 10% and
I(G2,G1) < 10%
in the method is presented in Figure 4.3.
The scheme which facilitate understanding of the event selection for the pair of groups
Group Evolution Discovery
in Social Networks
GED
Calculating I(G1,G2)
α
< α
Calculating I(G2,G1)
β
< β
β
< β
Comparing groups sizes
G1 = G2
G1 > G2
G1 < G2
G1 G2
G1 < G2
G1 G2
G1 < G2
Any
Assigning the event
Continue
Shrink
Growth
Split,
Shrink
Merge
Growth
Split,
Shrink
Merge
Growth
Form,
Dissolve
Figure 4.3. Decision tree for assigning the event type to the group.
25
between each two successive timeframes, the group evolution is created (Figure 4.2).
Based on the list of extracted events, which have occurred for selected community
4.4. Pseudo-code
Pseudo-code of the algorithm can be implemented in any programming language,
however the lowest execution time can be achieved with SQL languages, which are aimed for
processing large datasets, e.g. T-SQL language.
Input:
GED – Group Evolution Discovery Method
TSN in which at each timeframe Ti groups are extracted by any community detection
algorithm; calculated any user importance measure.
Output:
The list of communities matched into pairs with assigned event type and calculated
inclusions.
begin
for (each group in Ti) do
begin
for (each group in Ti+1) do
begin
calculate inclusions I(G1,G2) and I(G2,G1)
assign the event based on Figure 4.3 and add matched pair to the list
end;
end;
for (each pair on the list) update splitting/shrinking, merging/growing
begin
if (there is only one match between G2 and all groups in the previous (next)
else set splitting (merging)
end;
end.
timeframe) set shrinking (growing)
26
5. Group Evolution Discovery Platform
The Group Evolution Discovery Platform (GED Platform) was created for the
purposes of conducting experiments (Section 7.). The main aim was to implement the GED
method and methods by Asur et al. and by Palla et al. Additionally, GED Platform was used
to analyze and compare mentioned methods. The scheme of GED Platform, containing all
modules, is presented in Figure 5.1.
Figure 5.1. Modules in GED Platform.
5.1. Data Structures
Each module consists of at least one table. Relations between them are illustrated in
Figure 5.2.
Figure 5.2. Relations between tables within GED Platform.
27
5.1.1. Import Module
Primarily, import module reads data about groups within social network from text files
and stored them in GED Platform's database. User provides tab-delimited files, where each
row consists of three columns: group number, member id, timeframe number. All timeframes
of a particular social network are stored in one table named Groups, different networks or
networks obtained with different grouping methods are stored in separate tables. Scheme of
the table is presented in Table 5.1.
PK Column name Data type Allow nulls
group_id
node_id
timeframe
smallint
int
tinyint
No
No
No
Table 5.1. Scheme of table Groups, storing data about
groups and members within social network.
For the needs of GED module another data, data about commitment value in the entire
network, are imported as well. Each row of tab-delimited files consist of four columns: from
node, to node, weight, timeframe. The data for the whole network are stored in the same table
named Edges. Structure of the table is presented in Table 5.2.
PK Column name Data type Allow nulls
from_node
to_node
weight
timeframe
int
int
float
tinyint
No
No
No
No
Table 5.2. Scheme of table Edges, storing data about commitment value within network.
Palla module, in turn, demands data about groups in the joint graph achieved by
joining two consecutive timeframes. The data are stored in table Groups_Joint, which
structure is identical to table Groups presented in Table 5.1.
5.1.2. GED Module
The main task of GED module is tracking group evolution according to GED method
(Section 4.). To make it possible GED module also has to calculate social position (Section
2.4.1.) of a members in all groups from a network. To do so data gathered by import module
are used, especially data about groups and members within social network (Table 5.1) and
commitment value between members (Table 5.2). Groups with calculated social position are
stored in table named Groups_SP, which scheme is presented in Table 5.3.
PK Column name Data type Allow nulls
group_id
node_id
sp
ranking
timeframe
smallint
int
float
int
tinyint
No
No
Yes
Yes
No
Table 5.3. Scheme of table Groups_SP, storing data about groups,
members and their social position within social network.
Having data about groups, members and their social position GED module can
proceeds its main task – tracking group evolution. By calculating inclusion measures and
following GED method's rules new table named Evolutions_GED is filled with the data about
groups evolutions. Structure of the table is showed in Table 5.4.
PK Column name Data type Allow nulls
28
id_evolutions
event_type
group1
timeframe1
group2
timeframe2
alpha
beta
threshold
int
varchar
int
tinyint
int
tinyint
tinyint
tinyint
varchar
No
No
Yes
Yes
Yes
Yes
Yes
Yes
No
Table 5.4. Scheme of table Evolutions_GED, storing data
about groups evolutions found with GED method.
5.1.3. Asur Module
The only task of Asur module is discovering group evolution according to Asur et al.
method (Section 3.2.1.). Based on the data from Table 5.1 overlapping is calculated and new
table named Evolutions_Asur is filled with the data about groups changes. Scheme of the
table is presented in Table 5.5.
PK Column name Data type Allow nulls
id_evolutions
event_type
group1
timeframe1
group2
timeframe2
overlap
int
varchar
int
tinyint
int
tinyint
float
No
No
Yes
Yes
Yes
Yes
Yes
Table 5.5. Scheme of table Evolutions_Asur, storing data
about groups evolutions discovered with Asur et al. method.
5.1.4. Palla Module
The last module for uncovering communities evolutions is Palla module. Based on the
data from tables Groups and Groups_Joint new table named Contained is filled with data
about groups from the single timeframes contained in groups from the joint graphs. Structure
of the table is showed in Table 5.6. Next, groups located in the same joint graph are matched
based on the highest overlap and results are saved in table Matched, which structure is
presented in Table 5.7.
29
PK Column name Data type Allow nulls
id_contained
group_id
timeframe
group_joint
timeframe_joint
int
int
tinyint
int
tinyint
No
Yes
Yes
Yes
Yes
Table 5.6. Scheme of table Contained, storing data about groups
from the single timeframes contained in groups from the joint graphs.
PK Column name Data type Allow nulls
id_matched
group1
timeframe1
group2
timeframe2
overlap
int
int
tinyint
int
tinyint
float
No
Yes
Yes
Yes
Yes
Yes
Table 5.7. Scheme of table Matched, storing data about matched groups.
5.1.5. Analysis Module
The last module in GED Platform is module for analyzing and comparing results.
Functions implemented in this module allows to find differences between methods for
tracking group evolution. All functions are briefly described in Table 5.8.
Function name (input)
Inclusion (group1,
group2)
Migration (group1)
Compare (table1, table2)
Evolution (group1)
Evolution (table1)
Description
Provides detailed information about selected
groups, such as: inclusions, sizes, social
position of cores, total social positions,
intersection.
Provides detailed information about single
group evolution, such as: size, core size,
number of nodes migrated, average ranking
of migrated nodes before migration, average
ranking of migrated nodes after migration,
size of new group.
Joins results from two methods for tracking
evolution in order to show which events are
assigned to each pair of groups by both
methods. Also provides events found by one
method and omitted by second one.
Provides evolution of selected group in
next/previous timeframe, i.e. shows which
groups are matched with selected group.
Shows all possible processes of evolution
for all groups from all timeframes.
Tables used
Groups_SP
Groups_SP
Evolutions_GED,
Evolutions_Asur,
Matched_Palla
Evolutions_GED,
Evolutions_Asur,
Matched_Palla
Evolutions_GED,
Evolutions_Asur,
Matched_Palla
Table 5.8. Functions implemented in analysis module.
30
6. Email Communication Data
The email communication data was gained from Wroclaw University of Technology
(WrUT), which extracted exchange of messages from its server logs.
6.1. Data Description
Data set was delivered in WrUT.zip and it size was 2.7 MB. Unpacked data was
divided into fourteen text files (1.txt – 14.txt) and their size was 20.2 MB. All text files
contained information about temporal social network (see section 2.5.) which consists from
fourteen 90-days timeframes (timestamps from server logs were used to determine exact
dates). Timeframes are overlapping with the 45-days overlap, i.e., the first timeframe begins
on the 1st day and ends on the 90th day, second begins on the 46th day and ends on the 135th
day and so on. The whole data set was collected within period of February 2006 – October
2007 and consists of 5.845 members and 149.344 relations. Each row of the single text file
means relation between two members of Wroclaw University of Technology. The relation in
this case is exchanging emails and is represented by pair of members and weight of relation
between them, Figure 6.1.
4376;27588;0,001924927815206929740
4376;28598;0,004812319538017324350
4376;59745;0,000962463907603464870
Figure 6.1. Example of the data. WrUT member 1 id (•), WrUT member 2 id (•),
weight of relation (•).
Basic information about data:
Provider – Wroclaw University of Technology
Size – 20.2 MB (plain text)
Time period from February 2006 to October 2007
Number of members – 5.845
Number of relations – 149.344
Number of timeframes – 14
Timeframe interval – 90 days
Timeframe overlap – 45 days
6.2. Data Pre-processing
First, the data had to be converted to fulfil the input requirements of both algorithms
for extracting groups. Fortunately both methods, CPM implemented in CFinder [26] and
Blondel implemented in a Workbench for Network Scientists (NWB) [49], allowed common
data format, tab–delimited text files. Therefore, semicolon was replaced by tab and comma in
weight of relation was replaced by point. In order to improve execution time of the
algorithms, weight of relation between members was rounded to four decimal places. New
format of the data is presented in Figure 6.2.
31
4376
4376
4376
27588
28598
59745
Figure 6.2. The data after conversion. WrUT member 1 (•), WrUT member 2 (•),
0.0019
0.0048
0.0010
weight of relation (•).
Next, each timeframe of the temporal social network of email communication data was
grouped using both methods. Output file of the CFinder software contained the groups sorted
in ascending order with assigned members of WrUT, Figure 6.3. The groups may share
members, in Figure 6.3 member 615 belongs to group 14 and 16.
14: 14151 1154 96 615 1153 5383
15: 2865 853 1225 15866 315 4132
16: 4513 14151 615 1160 6535 5861
Figure 6.3. The output of the CFinder software. Group number (•),
members of the particular group (•), member 615 (•).
Output file of the NWB application contained the members assigned to the groups on
particular hierarchy level. Each member might be a part of only one community at each level
of hierarchy, Figure 6.4.
63
64
65
"83"
"community_12"
"292" "community_12"
"628" "community_27"
"community_3"
"community_3"
"community_6"
"community_3"
"community_3"
"community_6"
Figure 6.4. The output of the NWB application. ID (•), member id (•),
members communities at particular hierarchy level – from the lowest to the highest (•).
Both output data sets were converted to the same format, tab–delimited text files
containing group number, member id, timeframe number, Figure 6.5.
15
15
16
178
228
292
7
7
7
Figure 6.5. The data after final conversion. Group number (•), member id (•),
timeframe number (•).
After final conversion data sets were imported to the common MS SQL database, but
to separate tables. Output of the CFinder was imported to the table Groups_CPM, and output
of the NWB was imported to the table Groups_Blondel. Both tables had the same structure
consisted of three columns: group_id was the type of smallint, node_id was the type of int,
timeframe was the type of tinyint. Number of rows in the table Groups_CPM was 29.650,
while in the table Groups_Blondel 65.639.
At this stage data sets were ready to run method for tracking evolution provided by
Asur et al. The GED method with the simplified version of inclusion measure could be also
run at this point of data preparations, however it is recommended to use any measure
determining members importance within a group. Therefore, according to [45] an algorithm
for calculating social position (SP) was implemented in T-SQL language and run on data from
the tables Groups_CPM and Groups_Blondel. As a result new tables were created,
Groups_CPM_SP and Groups_Blondel_SP, with additional column of float type for SP value.
32
Method by Palla et al. required more preparations, because each pair of following
timeframes had to be merged into single networks (graphs) and extracted again by CFinder.
When grouping was finished output files were converted to format presented in Figure 6.5,
but in this case timeframe number referred to the first timeframe in the pair. Afterwards, data
set was imported to the database to the table Groups_CPM_Joint, which had identical
structure as the table Groups_CPM. Number of rows in this table was 36.153. All tables in the
database necessary to conduct experiments are presented in Table 6.1.
Table name
Groups_CPM
Groups_Blondel
Groups_CPM_SP
Groups_Blondel_SP
Groups_CPM_Joint
Description
List of members assigned to groups in
each timeframe, extracted with CPM
List of members assigned to groups in
each timeframe, extracted with Blondel
List of members and their social
position, assigned to groups in each
timeframe, extracted with CPM
List of members and their social
position, assigned to groups in each
timeframe, extracted with Blondel
List of members assigned to groups in
networks obtained by joining two
following timeframes, extracted with
CPM
Size [MB] No. of rows
29.650
0,695
1,016
65.639
1,188
29.650
1,656
65.639
0,883
36.153
Table 6.1. Basic information about tables required for experiments.
33
7. Experiments
The main aim of the experiments was to investigate the features of GED method, such
as accuracy, flexibility, execution time, etc. Accuracy of a method is the ability to catch
evolutions, i.e. how many pairs of groups from different timeframes which share nodes can be
found by the algorithm. Flexibility, in turn, determines how much influence on a results has
user by adjusting methods parameters. Moreover, the influence of thresholds values on the
results was examined. Differences in results obtained by GED with different user importance
measures were also investigated. Lastly, GED method and methods by Asur et al. and by
Palla et al. were compared on groups obtained with CPM algorithm and Blondel algorithm.
The study was focused on accuracy, flexibility and execution time of particular methods, but
other aspects, e.g. ease of implementation, design, were also took into account.
7.1. Test Environment
The first step of the experiments, extraction of the communities by grouping
algorithms, was conducted on stationary computer with computational power 3 GHz (Intel
Pentium Dual Core) and 2 GB of RAM memory, the operating system was Microsoft
Windows 7 Professional. Both software packages, CFinder and NWB, required Sun's Java
Runtime Environment (JRE) in version not lower than 1.4. All single timeframes were
extracted without any problems, but extraction of networks obtained by joining two
consequence timeframes was unsuccessful because of the size and density of those networks.
Therefore, another computer, with computational power 2,8 GHz (Intel Pentium Core 2 Duo)
and 8 GB of RAM memory, was used to extract mentioned networks, this time with success.
For the next step, implementing methods for group evolution discovery, another
computer, with computational power 1,7 GHz (Intel Pentium Core Duo) and 2 GB of RAM
memory, was used. The platform used for implementing methods was Microsoft SQL Server
Management Studio 2005. A list of the hardware and software utilized in experiments
together with tasks performed on each computer is presented in Table 7.1.
Id Computational power
1. Intel Pentium Dual Core 3
Software needed
CFinder, NWB.
GHz, 2 GB of RAM.
2. Intel Pentium Core 2 Duo
2,8 GHz, 8 GB of RAM.
CFinder.
3. Intel Pentium Core Duo
1,7 GHz, 2 GB of RAM.
MS SQL 2005.
Tasks
Extracting communities from each
timeframes.
Extracting communities from networks
obtained by joining two consecutive
timeframes.
Data set conversions (pre-processing),
implementing and running methods for
tracking community evolution.
Table 7.1. A list of hardware and software used in experiments.
7.2. Experiment Based on Overlapping Groups Extracted by CPM
In the first experiment, as a method for group extraction, CPM implemented in
CFinder (www.http://cfinder.org/) was used. The groups were discovered for k=6 and for the
directed and unweighted social network. CFinder extracted from 80 to 136 groups for the
timeframe (avg. 112 per timeframe, Table 7.2). The time needed to extract single time
window on computer 1. from Table 7.1 varied from 1minute to 20 hours, depending on the
size and density of the network. The average size of the group was 19 nodes (Table 7.2), the
smallest groups had size 6, because of k parameter, and the biggest one was 613 in time
window 10.
Time
window
No of nodes
in network
Number of
Avg size of
groups
a group
34
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Avg
Table 7.2. Results of CPM method extraction.
1585
1616
1579
1131
1067
1867
2056
1999
2351
2323
2139
1557
955
536
1626
136
128
129
82
105
96
117
123
108
119
98
125
121
80
112
15,7
17,2
16,8
17,4
13,9
23,6
23
21,6
26,8
24,8
27
16,9
11,2
9,3
19
7.2.1. GED Method
As already mentioned, the GED method was implemented in T-SQL language. The
method was run frequently with different value of α and β thresholds to analyse the influence
of these parameters on the method, the results are presented in Table 7.3. The time needed for
single run was about 6 minutes. The lowest checked value for the thresholds was set to 50%,
which guarantee that at least half of the considered group was contained in the matched
group. The highest possible value was of course 100% and means that the studied group is
identical with the matched group. The thresholds for forming and dissolving event was set to
10% based on average group size and intuition.
Average group size is 19 and average core size in this case is 8. Social position of this
core is 11 what means that, with threshold 10% for forming (dissolving), groups cannot have
more than 4-5 strong nodes (core nodes) or 6-7 weak nodes (nodes outside the core) existing
together in one group from previous (next) timeframe in order to assign forming (dissolving)
event.
– calculations
inclusion < 10%.
for strong nodes
(core nodes). Event assigned,
– calculations for few strong and few weak nodes. Event not assigned,
inclusion > 10%.
– calculations for weak nodes (nodes outside the core). Event assigned,
inclusion < 10%.
%7,9197195spcore%12196197spmixed%8194197spweakThreshold
Number of
α
β
50 50
50 60
50 70
50 80
50 90
50 100
60 50
60 60
60 70
60 80
60 90
60 100
70 50
70 60
70 70
70 80
70 90
70 100
80 50
80 60
80 70
80 80
80 90
80 100
90 50
90 60
90 70
90 80
90 90
90 100
100 50
100 60
100 70
100 80
100 90
100 100
form
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
122
dissolve
shrink growth continue
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
186
204
204
202
203
199
199
190
191
187
187
181
179
179
180
177
174
165
161
172
173
170
165
157
152
172
174
171
165
154
148
176
177
173
166
154
148
180
173
157
149
154
156
177
170
152
144
148
149
176
170
156
149
150
152
169
154
137
127
128
129
169
152
132
121
123
123
167
149
127
116
117
115
127
124
124
122
122
122
124
120
119
117
117
117
123
119
113
111
111
111
120
117
111
97
96
96
120
117
111
96
91
91
120
117
111
96
91
90
35
total
1734
1678
1612
1522
1486
1468
1689
1630
1559
1462
1419
1399
1613
1549
1470
1364
1315
1293
1555
1482
1396
1272
1215
1191
1521
1443
1346
1217
1151
1126
1505
1425
1322
1188
1119
1091
split
517
464
400
311
279
261
531
475
409
314
277
259
543
486
418
317
277
259
553
495
426
324
276
257
553
494
425
324
276
257
549
491
423
323
276
257
merge
398
405
421
429
424
422
359
366
384
392
388
387
284
286
298
305
304
302
233
235
244
251
250
249
199
198
199
203
199
199
185
183
180
179
173
173
Table 7.3. The results of GED computation on overlapping groups extracted by CPM.
Analogously, small groups of size 6 and average core size of 2.5 with social position
3, can contain maximum 2 weak nodes existing in the same group from previous (next)
timeframe to be treated as new born (dissolved).
– calculations for two strong nodes (core nodes). Event not assigned,
inclusion > 10%.
%176362spcore36
– calculations for one strong node and one weak node. Event not assigned,
inclusion > 10%.
– calculations for two weak nodes (nodes outside the core). Event
assigned, inclusion < 10%.
While analysing Table 7.3, it can be observed that with the increase of α and β
thresholds, the total number of events is decreasing, when α and β equals 50% the number is
1734, and with thresholds equal 100% the number is only 1091. This means that the
parameters α and β can be used to filtering results, preserving events where groups are highly
overlapped. Another advantage of having parameters is possibility to adjust the results to ones
needs. Setting appropriate levels for α and β thresholds effects in tendency to assign particular
event more often than another one. For example group G40 from timeframe T6 match group
G68 from timeframe T7 with inclusions equals respectively I1(G40, G68)=82% and
I2(G68, G40)=76%. Then, event assigned between considered groups depends on the value of α
and β, Table 7.4.
Threshold
β
α
50
70
60
70
70
70
80
70
90
70
70 100
50
100
60
100
70
100
80
100
100
90
100 100
Group1
Time
window1
Event type Group2
Time
window2
I1
I2
40
40
40
40
40
40
40
40
40
40
40
40
6
6
6
6
6
6
6
6
6
6
6
6
growing
growing
growing
merging
merging
merging
merging
merging
merging
no event
no event
no event
68
68
68
68
68
68
68
68
68
68
68
68
7
7
7
7
7
7
7
7
7
7
7
7
82%
82%
82%
82%
82%
82%
82%
82%
82%
82%
82%
82%
76%
76%
76%
76%
76%
76%
76%
76%
76%
76%
76%
76%
Table 7.4. Influence of thresholds values on assigning event type.
The linear increase of threshold α causes close to linear reduction in number of
merging events and slightly decrease of the number of growing events, Figure 7.1 and Figure
7.2.
%116262spmixed%84162spweaks
t
n
e
v
e
g
n
i
g
r
e
m
f
o
r
e
b
m
u
N
450
400
350
300
250
200
150
37
beta = 50
beta = 60
beta = 70
beta = 80
beta = 90
beta = 100
trendline
50
60
70
80
90
100
Threshold alpha
Figure 7.1. Number of merging events for different values of alpha and beta thresholds.
s
t
n
e
v
e
g
n
i
w
o
r
g
f
o
r
e
b
m
u
N
190
180
170
160
150
140
130
120
110
beta = 50
beta = 60
beta = 70
beta = 80
beta = 90
beta = 100
trendline
50
60
70
80
90
100
Threshold alpha
Figure 7.2. Number of growing events for different values of alpha and beta thresholds.
In contrast, with linear increase of threshold β, the number of splitting events decrease
in almost linear way and the number of shrinking events slightly decrease as well, Figure 7.3
and Figure 7.4.
s
t
n
e
v
e
g
n
i
t
t
i
l
p
s
f
o
r
e
b
m
u
N
590
540
490
440
390
340
290
240
alpha = 50
alpha = 60
alpha = 70
alpha = 80
alpha = 90
alpha = 100
trendline
50
60
70
80
90
100
Threshold beta
Figure 7.3. Number of splitting events for different values of beta and alpha thresholds.
s
t
n
e
v
e
g
n
i
k
n
i
r
h
s
f
o
r
e
b
m
u
N
210
200
190
180
170
160
150
140
alpha = 50
alpha = 60
alpha = 70
alpha = 80
alpha = 90
alpha = 100
trendline
50
60
70
80
90
100
Threshold beta
38
Figure 7.4. Number of shrinking events for different values of beta and alpha thresholds.
It is a consequence of the algorithm structure, raising the thresholds makes it harder to
match the groups (see Figure 4.3). Furthermore, dissolving event occurs more often than
forming event. The main reason is the fact that the last timeframe covers only the period of
summer holidays, and as a result the email exchange is very low. This causes the groups to be
small and have low density.
100%.
GED method found 90 continue events when both inclusions of groups are equal to
39
7.2.2. Method by Asur et al.
The method by Asur et al. was implemented in T-SQL language as well. The authors
suggested to set 30% or 50% as an overlapping threshold for merge and split. In experiment
threshold was set to 50%. It took more than 5.5 hours to calculate events between groups in
all fourteen time windows. The total number of events found by Asur et al. method is 1526,
from which 90 are continuation, 18 are forming, 29 are dissolving, 703 are merging and 686
are splitting.
Such a small number of continuing events is caused by very rigorous condition, which
requires for groups to remain unchanged. Small amount of forming (dissolving) events came
from another strong condition, which state that none of the nodes from the considered group
can exist in network at previous (following) time window. A huge number of merging
(splitting) events is a result of low overlapping threshold for merge (split).
However, it has to be noticed that these numbers are slightly overestimated. Method
by Asur et al. allows that one pair of groups has assigned more than one type of event. This
leads to anomalies presented in Figure 7.5a and in Table 7.5.
Figure 7.5. Evolution of two overlapping groups. a) anomalies generated by Asur et al.
method, b) simplified case, when groups are disjoint c) events assigned correctly by GED
method.
Community coloured red overlaps with community coloured yellow in timeframe Ti
by sharing four members. In next timeframe Ti+1 community marked with red has exactly the
40
same structure, while yellow community brake up relations with three members from shared
area. If these groups were disjoint, the events would be assigned without any doubt (Figure
7.5b). But they are not, and it is up to matching algorithm to deal with this situation. Intuition
says that red community continue its existence, while yellow shrinks or splits into two groups,
both events are correct (but not both at the same time). According to method by Asur et al.
community coloured red is continuing and also merging with yellow one. In the meantime
community marked with yellow splits into communities marked with yellow and red, and also
merges with red community (Figure 7.5a and Table 7.5). Such a case should not appear when
condition for continuing event in Asur et al. method is so rigorous. What is more, Asur et al.
defined merging event as a joining members (implicitly different members) from two groups
into single one, and in the situation presented above joining members are shared by both
groups, so there should be no merging event at all. Possible explanation for anomalies is that
method by Asur et al. is not designed for overlapping communities. Further experiments with
disjoint groups should clarify this assumption (section 7.3.2.).
Group1
Time
window1
Event type Group2
Time
window2
Overlap
13•
13•
13•
1•
1•
1•
1•
1•
1•
1•
splitting
splitting
merging
merging
continuing
2•
9•
9•
9•
9•
2•
2•
2•
2•
2•
57%
57%
57%
100%
100%
Table 7.5. Anomalies generated by Asur et al. method.
Colours marks groups illustrated in Figure 7.5.
The total number of anomalies is 128 cases, 8% of all results. More than a half of
these cases are groups with split and merge event into another group at the same time. The
rest of the cases are even worse, because one group has continue and split or merge event into
another group simultaneously (Figure 7.5a, Table 7.5). Therefore the total number of
"distinct" events found by Asur et al. is 1398.
A great advantage of the method is ease of implementation. Asur et al. provided
simple formulas, together with pseudo-code (section 3.2.1.), which can be implemented in any
programming language. On the other hand, a big disadvantage of the method is very low
flexibility. Only threshold for splitting/merging can be adjusted, all other thresholds are
constant.
7.2.3. GED Method vs. Asur et al. Method
As already mentioned, the computation time for Asur et al. method was more than 5.5
hours, while for GED it took less than 4 hours to calculate whole Table 7.3. The single run of
GED method lasted less than 6 minutes, so it is over 50 times faster than method by Asur et
al.
The GED method run with thresholds equals 50% found 721 events which method by
Asur et al. has not. Such a big lack in results obtained with Asur et al. method is caused
mostly by rigorous conditions for assigning events and almost no flexibility of the method.
From the other hand Asur et al. method found 399 events which GED method run with
thresholds 50% has not. However, it is not treated as a lack in GED's results because all these
events have both inclusions below 50%, therefore GED algorithm skips them in purpose
(because of thresholds value). To prove this, GED method was run with thresholds equal 10%
and this time none of events found by Asur et al. method were skipped by GED method.
41
Furthermore, Asur et al. did not introduced shrinking and growing events, which
effects in assigning splitting and merging events or, in the worst case, missing the event,
Figure 7.6. When two groups in successive time windows differ only by one node they will
not be treated as continuation (since the overlapping is below 100%) and might not be treated
as merging (splitting) if there does not exist another group fulfilling the requirements for
merging (splitting). Such a case is not possible in GED method, which through the change of
inclusion thresholds allows to adjust the results to user's needs.
As demonstrated in Figure 7.6a, the community at timeframe Ti+1 has three members,
who not belongs to the group at timeframe Ti. Additionally, the members are not present at
timeframe Ti in any other group what, results in omitting the event by Asur et al. method
despite the fact that overlapping is 63%. In case when mentioned members are present at
timeframe Ti in any group (Figure 7.6b) the method assigns merging event, which in this case
is not perfect but still better than nothing. In the situation presented in Figure 7.6a GED
method assigns growing event (Figure 7.6c) and in the second considered case GED decides
based on the size of the groups at timeframe Ti and social position of their members in the
community at the following timeframe Ti+1. In this case GED assigned growing event to
bigger group and merging event to smaller one (Figure 7.6d), however if the groups would be
more equal or core of the group at timeframe Ti+1 would come from the pink group (smaller
one) then GED method would assign merging event to both groups at timeframe Ti.
Figure 7.6. Lack of the growing event in method by Asur et al.
Lastly, GED method is free of anomalies occurs in Asur et al. method. While
algorithm by Asur et al. is assigning multiple events between two groups (Figure 7.5a), GED
method assigns correct events (Figure 7.5c). In the exampled picture method assigned
shrinking event between yellow communities because core of the group (the most important
members) stayed in the group. If the members who left the group had higher social position
than rest of the group, then algorithm would assigned splitting event, which is also correct in
this situation.
In most cases events assigned by both methods are the same, however stated analysis
proves that GED method is not only faster but also more accurate and much more flexible
than method by Asur et al.
42
7.2.4. Method by Palla et al.
The method delivered by Palla et al. was also implemented in T-SQL language, but it
required more preparations with data set than method by Asur et al. Apart from extracting
groups in all time windows, another group extraction was needed. The data from two
consecutive timeframes were merged into single graphs, from which groups were extracted
with CPM method. As easy to count, group extraction had to be calculated additional thirteen
times, some of them took only five minutes to calculate, but there were also those that lasted
up to two days.
Palla et al. designed method in order to catch all matched pairs of groups, even if they
overlap in the slightest way, sharing only one node. The great advantage of this approach is
that no event will be ignored. However, if one takes into account the fact, that Palla et al. only
showed which event types may occur (and did not provide the algorithm to assign them),
analysis of the group evolution during its life is very difficult and cumbersome. Each case of
assigning event must be considered individually and with a huge number of possibilities it is
very hard to find key match. On average one group from joint graph contains five groups from
single timeframes, what gives not less than three and up to six possibilities of matching the
groups. Data in Table 7.6 presents groups extracted from the single timeframes T8 and T9
contained in the group G19 extracted from the joint graph T8,9. Three of the groups are from
timeframe T8 and another three from T9, therefore groups can be matched on nine different
ways, Table 7.7.
Group
Time
Joins
Time
id
68
83
102
23
26
49
window
8
8
8
9
9
9
id
19
19
19
19
19
19
windows
8-9
8-9
8-9
8-9
8-9
8-9
Table 7.6. Groups from the single timeframes T8 and T9 contained
in the group G19 extracted from the joint graph T8,9.
Group1
Time
window1
Group2
Time
window2
Overlap
68
68
68
83
83
83
102
102
102
8
8
8
8
8
8
8
8
8
23
26
49
23
26
49
23
26
49
9
9
9
9
9
9
9
9
9
13%
8%
53%
6%
69%
8%
0%
50%
4%
Table 7.7. All possibilities of matching groups presented in Table 7.6.
In bold the highest overlapping for each group from time window1.
Then pairs can be sorted based on overlap in descending order and only the highest
overlap for each group is taken. In Table 7.8 green colour marks final matching, each group
from timeframe T8 has assigned one group in T9. Colour red marks the group from timeframe
T9 which is not assigned to any of the groups from previous timeframe. Authors of the method
did not describe how to treat groups like this. Moreover, Palla et al. in did not explain how to
choose best match for the community, which in the next timeframe has the highest
overlapping value with two different groups. The authors only defined case when there is
single highest overlapping for each group.
43
Group1
Time
window1
Group2
Time
window2
Overlap
83
68
102
68
83
68
83
102
102
8
8
8
8
8
8
8
8
8
26
49
26
23
49
26
23
49
23
9
9
9
9
9
9
9
9
9
69%
53%
50%
13%
8%
8%
6%
4%
0%
Table 7.8. Final matching of groups based on the highest overlap. Groups marked with green
are matched, G23 marked with red is not assigned to any group from previous timeframe.
The total number of matched pairs found by Palla et al. method is 9797, from which
4183 pairs have overlap higher than 0%. The authors did not specify how to interpret the
groups matched with overlap equal 0%, but intuition suggests to omit these records, since
they do not share any nodes. There are 90 cases when matched pairs have overlap equal
100%, which corresponds to continuation event in Asur et al. method.
7.2.5. GED Method vs. Palla et al. Method
As noted before, the method by Palla et al. needed additional preparations to run the
experiment, which lasted almost week, therefore GED method, despite the fact that it requires
calculated social position, is incomparable faster.
Great advantage of method by Palla et al. is catching all matched pairs of groups. As
in case when comparing GED method with algorithm by Asur et al., Palla et al. method found
more matched pairs than GED method run with thresholds equal 50%. Again, it is not treated
as a lack in GED's results since all these events have both inclusions below 50%, Table 7.9.
To confirm that, results obtained with GED on thresholds equal 10% were compared, and this
time all matched pairs found by Palla et al. method have both inclusions below 10%. What is
more, GED method found 308 events which method by Palla et al. has not. These events are
forming and dissolving.
Group1
Time
window1
Group2
Time
window2
Overlap
I1
I2
65
44
78
81
72
117
91
1
6
12
9
10
3
9
115
78
94
54
96
23
3
2
7
13
10
11
4
10
45%
40%
31%
20%
13%
7%
1%
40%
19%
13%
11%
2%
11%
10%
25%
46%
27%
7%
11%
0%
0%
Table 7.9. Events found with method by Palla et al. omitted by GED method because of low
inclusions values.
44
Another problem with Palla et al. method is lack of algorithm for assigning events. It
is very difficult and time consuming to determine event for the group in the next timeframe,
not to mention all fourteen, Table 7.6, Table 7.7, Table 7.8. So, the GED method with its fully
automatic algorithm for assigning events is much more useful and convenient.
Summing up, GED method is beyond compare when it comes to execution time, it is
also definitely more specific in assigning events and therefore much more effective for
tracking group evolution. Method by Palla et al. was helpful only to check if GED method
found all events between groups.
Additionally, Palla et al. method requires usage of CPM method which is big
disadvantage because it cannot be utilized with other community extraction method, while
GED method may be applied for any existing group extraction algorithms.
7.3. Experiment Based on Disjoint Groups Extracted by Blondel
In the second experiment Blondel et al. method was used for community detection.
The algorithm is implemented for example in a Workbench for Network Scientists (NWB).
The groups were discovered, again, for the directed and unweighted social network. NWB
extracted from 46 to 209 groups for the timeframe (average 88 per timeframe, Table 7.10).
Algorithm by Blondel et al. works very fast, time required to extract single time window on
computer 1. from Table 7.1 was below 30 seconds. All timeframes were extracted in less than
7 minutes. The average size of the group this time was 64 nodes (Table 7.10), the smallest
groups had size 2, and the biggest one was 750 in time window 8.
Time
window
No of nodes
in network
Number of
Avg size of
groups
a group
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Avg
4479
4502
4382
4456
4527
4856
4893
4950
4965
4904
4870
4771
4670
4414
4689
55
82
95
117
103
72
64
64
47
57
61
73
139
210
89
82,9
55,6
46,6
38,4
44,4
68,4
77,7
78,6
108
87,6
81,2
66,3
33,8
21,1
63,6
Table 7.10. Results of Blondel et al. method extraction.
7.3.1. GED Method.
As previously for data grouped with CPM method, the GED method have been run
with different value of α and β thresholds, the results are presented in Table 7.11. The time
needed for single run was about 13 minutes. The thresholds for the forming and dissolving
event was again set to 10%.
Threshold
Number of
45
α
β
form
dissolve
shrink growth continue
merge
total
1231
50 50
1192
50 60
1150
50 70
1105
50 80
1046
50 90
1010
50 100
1198
60 50
1158
60 60
1110
60 70
1063
60 80
1003
60 90
963
60 100
1174
70 50
1129
70 60
1076
70 70
1025
70 80
955
70 90
907
70 100
1139
80 50
1087
80 60
1025
80 70
968
80 80
885
80 90
831
80 100
1092
90 50
1036
90 60
967
90 70
899
90 80
788
90 90
721
90 100
1068
100 50
1009
100 60
938
100 70
868
100 80
737
100 90
100 100
663
Table 7.11. The results of GED computation on disjoint groups extracted by Blondel et al.
split
411
378
338
294
250
224
417
383
338
294
250
218
429
396
345
299
245
204
436
402
350
304
235
191
442
407
355
310
228
178
439
404
352
307
228
178
167
161
156
153
143
143
166
159
155
151
140
140
164
158
154
150
139
138
165
158
152
147
140
140
172
161
152
139
130
131
168
154
144
129
110
109
269
275
280
283
293
293
237
244
247
251
262
262
216
219
221
225
236
237
180
178
176
177
184
184
126
124
118
116
114
113
106
104
97
95
83
80
187
181
179
178
164
154
181
176
174
171
156
148
169
163
164
159
144
137
162
157
156
151
138
128
157
153
152
146
133
116
160
156
155
149
133
114
135
135
135
135
134
134
135
134
134
134
133
133
134
131
130
130
129
129
134
130
129
127
126
126
133
129
128
126
121
121
133
129
128
126
121
120
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
23
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
39
method.
The total number of events found with thresholds equal 50% was 1231, and with
thresholds equal 100% only 663. This indicates that parameters α and β influence on number
of events found even more than in case of CPM method. The linear relationship between
increase of α threshold and reduction in number of merging and growing events is preserved,
Figure 7.7 and Figure 7.8.
s
t
n
e
v
e
g
n
i
g
r
e
m
f
o
r
e
b
m
u
N
300
250
200
150
100
50
46
beta = 50
beta = 60
beta = 70
beta = 80
beta = 90
beta = 100
trendline
50
60
70
80
90
100
Threshold alpha
Figure 7.7. Number of merging events for different values of alpha and beta thresholds.
s
t
n
e
v
e
g
n
i
w
o
r
g
f
o
r
e
b
m
u
N
180
170
160
150
140
130
120
110
100
beta = 50
beta = 60
beta = 70
beta = 80
beta = 90
beta = 100
trendline
50
60
70
80
90
100
Threshold alpha
Figure 7.8. Number of growing events for different values of alpha and beta thresholds.
The linear relationship between increase of β threshold and reduction in number of
splitting and shrinking events is also preserved, Figure 7.9 and Figure 7.10.
s
t
n
e
v
e
g
n
i
t
t
i
l
p
s
f
o
r
e
b
m
u
N
450
400
350
300
250
200
150
alpha = 50
alpha = 60
alpha = 70
alpha = 80
alpha = 90
alpha = 100
trendline
50
60
70
80
90
100
Threshold beta
Figure 7.9. Number of splitting events for different values of beta and alpha thresholds.
s
t
n
e
v
e
g
n
i
k
n
i
r
h
s
f
o
r
e
b
m
u
N
190
180
170
160
150
140
130
120
110
alpha = 50
alpha = 60
alpha = 70
alpha = 80
alpha = 90
alpha = 100
trendline
50
60
70
80
90
100
Threshold beta
47
Figure 7.10. Number of shrinking events for different values of beta and alpha thresholds.
Opposed to the experiment with CPM method, this time dissolving event occurred less
times than forming event. The reason is design of method by Blondel et al., which detects
groups consisting even of only two members. Therefore it is hard for group to vanish
completely. Unless the threshold is set above 50%, slightly changes by few percent will not
generate more forming/dissolving events. GED method found 120 continue events when both
inclusions of groups are equal to 100%, which corresponds to continuation event in Asur et al.
method.
The experiment confirmed that GED method can be successfully used for both,
overlapping and disjoint groups. If one needs overlapping groups for a small network then
48
CPM can be used, but if one needs to extract groups very fast and for a big network then the
method proposed by Blondel et al. can be utilized. That is a big advantage because most
methods can be used only for either overlapping or disjoint groups.
7.3.2. Method by Asur et al.
The method provided by Asur et al. needed almost 6 hours to calculate events between
groups in all fourteen time windows. The overlapping threshold for merging and splitting
events was again set to 50%. The total number of events found by Asur et al. method is 747,
from which 120 are continuation, 23 are forming, 16 are dissolving, 255 are merging and 333
are splitting.
As previously, small number of continuing, forming, and dissolving events is caused
by too rigorous conditions. In turn, great number of merging (splitting) events is a result of
low overlapping threshold for merge (split) and lack of growing (shrinking) event.
In contrast to previous experiment, the number of events found on data grouped by Blondel et
al. method is not overestimated. This time method by Asur et al. has not generate any
anomalies, what confirms the assumption that the method is designed for disjoint groups.
in experiment with disjoint groups.
All other outcomes from experiment conducted on overlapping groups were confirmed
7.3.3. GED Method vs. Asur et al. Method
GED method needed less than 8 hours to calculate whole Table 7.11, while one run of
Asur et al. method was almost 6 hours. Single run of GED method was only 13 minutes, so it
is still much faster than method by Asur et al.
The GED method run with thresholds equals 50% found 613 events which method by
Asur et al. has not. Again, big lack in results obtained with Asur et al. method is caused
mostly by rigorous conditions for assigning events and almost no flexibility of the method.
Like in case of CPM method, Asur et al. method found events which GED method skipped
because of thresholds value. Reducing the thresholds effected in not omitting mentioned
groups.
for overlapping as well as for disjoint methods of grouping social network.
Provided considerations confirms that GED method is better than Asur et al. method
7.4. Experiment Based on Different User Importance Measures
In the last experiment GED method was run: (1) with degree centrality measure
instead of social position measure and (2) without any measure, in order to investigate
influence of the measure on calculations of inclusion values and also on results of the method.
Like in case of the first experiment, overlapping groups extracted with CPM were used.
The results obtained with degree centrality as a measure of user importance and results
derived without any measure are very similar to the results obtained with social position
measure, Table 7.12.
Measure
Execution
time [min]
Social Position
Degree Centrality
No measure
6
5:55
5:30
Events
found
1470
1447
1483
Threshold
β
α
70
70
70
70
70
70
Table 7.12. Results of GED method with different user importance measures.
49
Execution time for GED with degree centrality was slightly better than for GED with
social position because degree centrality value is given as a integer, while the type for social
position value is float. Summing integers is faster than summing floats, thus the difference. Of
course the best execution time was for GED without a measure as a effect of less calculations
needed to proceed. Although, the number of events found in all three cases is more or less the
same, it can be observed that GED without user importance measure found more events than
GED with any of the measures. It is a consequence of the inclusion formula (see equation 4.2)
which consists of two fractions The second fraction is always present, whether GED is run
with or without user importance measure, but the first one occurs only when a measure is
used. Therefore when calculating inclusions of two groups with a measure, it is almost always
lower than without any measure. The exceptions are groups where inclusions are equal 100%
and groups which do not share any nodes (inclusions equals 0%). And here comes the
question again: why GED uses a measure of user importance, since it is obvious that it will
lower the inclusion? The answer already provided in Section 4.2 this time is supported by
clear evidences.
Figure 7.11. Events assigned by GED method with different user importance measures. a)
GED with social position measure, red colour marks the core of the group b) GED with
degree centrality c) GED without a measure.
50
As illustrated in the example in Figure 7.11, two communities G46 and G47 from
timeframe T6 overlaps by five members and both groups have the same size – seven members.
In the next timeframe T7 there is only one group G18 which consists of all members from the
group G47 from the previous timeframe, and one new member. Two members from the
community G46 vanished in the following time window.
GED method run with social position measure assigned growing event to the
community G47 and merging event to the group G46. GED method run with degree centrality
measure also assigned merging event to the group G47, but did not assign any event to the
community G46. Finally, GED without any user importance measure assigned growing events
to both groups from timeframe T6.
To have a closer look into the first case, social position of members is presented in
Table 7.13. It is clearly visible that the core of the blue group from timeframe T6 is identical
to the core of the blue group from the next time window T7. The situation is marked with red
colour in the Figure 7.11a and with red dots in the Table 7.13. Additionally, members
occurring in all the groups are marked green. Now it is obvious that GED with social position
measure assigned growing event to group G47 because it is almost identical to group G18, and
"only" merging event to group G46 because the cores of both groups have nothing in common.
It has to be mentioned once again that, thanks to the user importance measure, GED method
takes into account both the quantity and quality of the group members providing very accurate
and specified results.
Group
Time
window
Node
SP Rank
46
46
46
46
46
46
46
47
47
47
47
47
47
47
18
18
18
18
18
18
18
18
6
6
6
6
6
6
6
6
6
6
6
6
6
6
7
7
7
7
7
7
7
7
1443
3145
7564
1326
11999
14151
1,48
1,33
0,96
0,86
0,85
0,77
0,75
621
1,31
2066•
1,30
7328•
1,28
7564•
11999• 1,04
0,80
1326
0,67
14151
0,60
621
1,49
2066•
1,35
7328•
1,29
7564•
11999• 1,24
0,75
1326
0,71
14151
0,66
0,51
621
4632
1
2
3
4
5
6
7
1
2
3
4
5
6
7
1
2
3
4
5
6
7
8
Table 7.13. Social position of members presented in Figure 7.11a.
GED method run with degree centrality measure was even more strict in the studied
case, Figure 7.11b. Low degree centrality within the group G46 causes that no event was
assigned. In turn, similar structure between groups G47 and G18 effects in assigning merging
event. Structure of all groups and degree centrality of all members is presented in Table 7.14.
Again, green colour marks members occurring in all groups.
Group
Time
window
Node DC Rank
51
46
46
46
46
46
46
46
47
47
47
47
47
47
47
18
18
18
18
18
18
18
18
6
6
6
6
6
6
6
6
6
6
6
6
6
6
7
7
7
7
7
7
7
7
11999
14151
1443
3145
7564
1326
621
2066
7328
7564
11999
1326
14151
621
7564
7328
2066
11999
1326
14151
621
4632
3
3
2
2
2
2
2
5
5
4
4
4
3
3
7
5
5
5
5
4
4
3
1
1
3
3
3
3
3
1
1
3
3
3
6
6
1
2
2
2
2
6
6
8
Table 7.14. Degree centrality of members presented in Figure 7.11a.
Figure 7.11c expresses in the best way how GED method without a user importance
measure understands the communities. There is no core, all members are equal and relations
between them are not considered at all. Such simplification causes that events assigned to the
groups are not the most adequate to situation (but only when comparing with events assigned
by GED with user importance measure). Having only information about members in the
groups, not about their relations, events are assigned correctly. So, if researchers investigating
group evolution are not interested in groups structure and relations between members, a
simpler and faster version of GED method may be successfully used. However, if there is
enough time and possibility to calculate any user importance measure, it is recommended to
use GED method in the original version.
52
8. Conclusions and Future Work
The number of social systems in which people are communicating with each other is
rising at an unprecedented rate. That creates endless need to analyse them. One part of such
analysis is communities detection and investigation of their evolution over time in order to
understand the mechanisms governing the development and variability of social groups.
The research in area of extracting social groups showed that dozens of methods are
existing, and depending on the characteristic of the social network one or several of them can
be successfully used to detect groups. As Section 7.3 shows, methods based on fast
modularity are much faster than methods based on cliques for detecting groups from large
datasets. The problem was formulated in the research question no. 1.
Thereby, groups are prepared for further analysis in which their tendencies and
behaviour may be studied. To do so, proper methods or techniques are required. The research
in this area revealed gap in the knowledge since the existing methods are either computational
too expensive or too less accurate or simply not able to explore basic types of social networks
such as overlapping networks and disjoint networks. To meet most demanding needs of
researchers facing problem of tracking changes in community life the new method called
GED (Group Evolution Discovery) was proposed and evaluated in this thesis. Answering the
research question no 2. whole process of tracking evolution is described in Section 4.3. Based
on the information about social network at succeeding intervals of time, especially based on
the social position of members within communities extracted from these networks method
assigns events to the groups indicating changes. A set of the events assigned to a single
community throughout several timeframes represents the history of evolution of this group.
Such history allows to study birth (forming), death (dissolving), splitting and merging,
shrinking and growing, and finally stagnation (continuing) of the community, which are the
most common event types occurring in social group evolution – the research question no. 3.
be accurate – catch all possible evolutions of a group,
be flexible – allows to adjust method to the ones needs,
work fast and with low computational costs,
be easily in implementation,
be intuitive.
The results of experiments and comparison with the existing methods for discovering
changes in community life (Section 7) leads to the conclusion that desired features were
achieved exemplary, and the new method may become one of the best method for tracking
group evolution.
In order to answer research question no. 4, two experiments based on both types of
groups were conducted and Sections 7.2 and 7.3 presents results obtained with various
methods for tracking group evolution. More specifically, GED method is incredibly faster and
flexible than methods by Palla et al. and by Asur et al. Additionally, GED method is more
accurate than method by Asur et al. and much more specific when it comes to naming changes
of a group than method by Palla et al.
Experiments conducted on Asur et al. method (Section 7.2.2 and Section 7.3.2)
showed that this method is barely flexible and therefore skips evolutions, what disqualifies the
method for any studies regarding group evolutions. Furthermore, the method generates
anomalies, when working on overlapping groups, which implies that method is designed for
working only on disjoint groups – the research question no. 5. Other investigated aspects:
computation cost, ease of implementation and execution time, came out promising, however
in comparison with GED method they were much worst.
The requirements for the new method were substantial, the method had to:
53
Experiment run with Palla et al. method (Section 7.2.4) demonstrated that great idea
and unique design of the method are wasted by the lack of formula for assigning events and
by few smaller ambiguities in the method. Despite the fact that method by Palla et al. is
computationally extremely expensive and can be use only on groups extracted by CPM, the
method is still considered the best algorithm tracking evolution for overlapping groups – the
research question no. 5. Although, straight comparison with GED method revealed that
method by Palla et al. is very cumbersome and useful only to test accuracy of GED method.
The last experiment demonstrates usefulness of the social position measure and
convinces that GED method should be always run with user importance measure in order to
fully benefit all features of the algorithm.
Summing up, the GED method was designed to be as much flexible as possible and
fitted to both, overlapping and disjoint groups but also to have low and adjustable
computational complexity. The GED method, described and analysed in this paper, uses not
only the group size and comparison of groups members, but also takes into account their
position and importance in the group to determine what happened with the group.
The first results of GED method were presented in [70] and [71]. Next, more
exhaustive analysis was conducted within this thesis, but the method is still in the
development phase. In the next step method will be extended by migration event, which
focuses on the core of the group (the most important members – leaders) and tracks whether
members outside the core followed the leaders or not.
Acknowledgement
This work was supported by MSc. Piotr Bródka, Ph.D. Przemysław Kazienko –
Wrocław University of Technology, Institute of Informatics and Social Network Group –
Wrocław University of Technology.
54
55
9. References
[1] Adamcsek B., Palla G., Farkas I. J., Derényi I., and Vicsek T. CFinder: Locating cliques
and overlapping modules in biological networks. Bioinformatics 22, 2006, 1021-1023.
[2] Agarwal N., Galan M., Liu H., and Subramanya S., WisColl: Collective Wisdom based
Blog Clustering. Information Sciences, vol. 180, no. 1, 2010, 39-61.
[3] Ahlawat R., Market Penetration: One percent to 5 percent of target audience. Hype Cycle
for Wireless Networking, 2006.
[4] Amaral L. A. N., Scala A., Barthelemy M., and Stanley H. E., Classes of small–world
networks. In Proceedings of the National Academy of Sciences, USA, vol. 97, 2000,
11149-11152.
[5] Asur S., Parthasarathy S., and Ucar D., An event-based framework for characterizing the
evolutionary behaviour of interaction graphs. ACM Trans. Knowl. Discov. Data. 3, 4,
Article 16, November 2009, 36 pages.
[6] Blondel V. D., Guillaume J-L., Lambiotte R., and Lefebvre E., Fast unfolding of
communities in large networks. Journal of Statistical Mechanics, P10008, 2008.
[7] Carrington P. J., Scott J., and Wasserman S., Models and Methods in Social Network
Analysis. Eds. Cambridge University Press, 2005.
[8] Cattell V., Poor people, poor places, and poor health: the mediating role of social
networks and social capital. Social Science and Medicine, vol. 52, no. 10, 2001, 1501-
1516.
[9] Chakrabarti D., Kumar R., and Tomkins A., Evolutionary Clustering. In KDD '06:
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery
and data mining (ACM, New York, NY, USA), 2006, 554-560.
[10] Charron C., Favier J., and Li C., Social Computing: How Networks Erode Institutional
Power, and What to Do about It. Forrester Customer Report, 2006.
[11] Cheng X., Dale C., and Liu J., Statistics and social networking of ,YouTube videos. In
Proceedings of the 16th International Workshop on Quality of Service, IEEE, 2008, 229-
238.
[12] Chiu P. Y., Cheung C. M. K., and Lee M. K. O., Online Social Networks: Why Do "We"
Use Facebook?. In Proceedings of the First World Summit on the Knowledge Society,
Communications in Computer and Information Science, vol. 19, Springer, 2008, 67-74.
[13] Clauset A., Newman M. E. J., and Moore C., Finding community structure in very large
networks. Phys. Rev. E 70, 066111, 2004.
[14] Coleman J. S., An Introduction to Mathematical Sociology. London, UK, Collier-
Macmillan, 1964.
[15] Derényi I., Palla G., and Vicsek T., Clique percolation in random networks. Phys. Rev.
Lett. 94, 160202, 2005.
[16] Donetti L., and Muñoz M. A., Detecting network communities: a new systematic and
efficient algorithm. Journal of Statistical Mechanics P10012, 2004.
[17] Ellison N. B., Steinfield C., and Lampe C., The benefits of Facebook "friends:" Social
capital and college students' use of online social network sites. Journal of Computer-
Mediated Communication, vol. 12, no. 4, article 1, 2007.
[18] Fortunato S., Community detection in graphs. Physics Reports, Volume 486, Issues 3-5,
February 2010, 75-174.
56
[19] Freeman L. C., The Development of Social Network Analysis: A Study in the Sociology of
Science. BookSurge Publishing, 2004.
[20] Garton L., Haythorntwaite C., and Wellman B., Studying Online Social Networks. Journal
of Computer-Mediated Communication, vol. 3, no. 1, 1997, 75-105.
[21] Girvan M., and Newman M. E. J., Community structure in social and biological networks.
In Proceedings of the National Academy of Sciences, USA, vol. 99, no. 12, 2002, 7821-
7826.
[22] Gliozzo A. M., Bonafede C. E., and D'agata A., State of the art in social network analysis
and its applications to the BONy's use case. BONy project, 2009.
[23] Golbeck J., and Hendler J., FilmTrust: movie recommendations using trust in web-based
social networks. In Proceedings of Consumer Communications and Networking
Conference, IEEE Conference Proceedings, vol. 1, 2006, 282-286.
[24] Granovetter M., The strength of weak ties: Network theory revisited. American Journal of
Sociology, 78, 1973, 279-288.
[25] Hanneman R., and Riddle M., Introduction to social network methods. Published in digital
form at http://faculty.ucr.edu/~hanneman/, Riverside, CA: University of California, 2005.
[26] http://cfinder.org/.
[27] http://en.wikipedia.org/wiki/Social_network – 2011.05.30.
[28] Huberman B., Romero D., and Wu F., Social networks that matter: Twitter under the
microscope. First Monday, 2009, 1-5.
[29] Huisman M., and van Duijn M. A. J., Software for Social Network Analysis. In Models
and Methods in Social Network Analysis, Carrington, P. J., Scott, J., and Wasserman, S.
Eds. Cambridge University Press, 2005, 270-316.
[30] Jung J. J., Juszczyszyn K., and Nguyen N. T., Centrality Measurement on Semantically
Multiplex Social Networks: Divide-and-Conquer Approach. International Journal of
Intelligent Information and Database Systems, vol. 1, no. 3/4, 2007, 277-292.
[31] Kazienko P., and Musiał K., Sieci Społeczne
i Analiza Sieci. Available:
http://www.zsi.pwr.wroc.pl/~sna/prezentacje/SN_SNA_25.10.2007.pdf
[32] Kazienko P., Musial K., and Kajdanowicz T., Multidimensional Social Network and Its
Application to the Social Recommender System. IEEE Transactions on Systems, Man and
Cybernetics - Part A: Systems and Humans, March 2011.
[33] Kazienko P., Ruta D., and Bródka P., The Impact of Customer Churn on Social Value
Dynamics. International Journal of Virtual Communities and Social Networking, vol. 1,
no. 3, 2009, 60-72.
[34] Kim M.-S., and Han J., A Particle and Density Based Evolutionary Clustering Method for
Dynamic Networks. In Proceedings of 2009 International Conference on Very Large Data
Bases, Lyon, France, 2009.
[35] Kottak C. P., Cultural Anthropology. New York, USA, McGraw-Hill, 2004.
[36] Krebs V., The Social Life of Routers. Internet Protocol Journal, 3, December 2000, 14-25.
[37] Kullback S., and Leibler R. A., On Information and Sufficiency. Annals of Mathematical
Statistics 22, 49, 1951.
[38] Lancichinetti A., and Fortunato S., Community detection algorithms: A comparative
analysis. Phys. Rev. E 80, 056117, 2009, 11 pages.
[39] Lancichinetti A., Fortunato S., and Kertész J., Detecting the overlapping and hierarchical
community structure in complex networks. New Journal of Physics 11, 033015, 2009.
57
[40] Lazega E., The Collegial Phenomenon. The Social Mechanism of Co–operation Among
Peers in a Corporate Law Partnership. Oxford, Oxford University Press, 2001.
[41] Lin Y.-R., Chi Y., Zhu S., Sundaram H., and Tseng B. L., FacetNet: A Framework for
Analyzing Communities and Their Evolutions in Dynamic Networks. In WWW '08:
Proceedings of the 17th international conference on the World Wide Web (ACM, New
York, NY, USA), 2008, 685-694.
[42] Montgomery J., Social Networks and Labor-Market Outcomes: Toward an Economic
Analysis. American Economic Review 81, vol. 5, 1991, 1407-1418.
[43] Moody J., and White D. R., Structural cohesion and embeddedness: A hierarchical
concept of social groups. American Sociological Review. 68(1), 2003, 103.
[44] Morris M., Sexual network and HIV. AIDS, vol. 11, 1997, 209-216.
[45] Musiał K., Kazienko P., and Bródka P., User position measures in social networks. In
Proceedings of the 3rd Workshop on Social Network Mining and Analysis (SNA-KDD
'09). ACM, New York, NY, USA, , Article 6 , 9 pages, 2009.
[46] Newman M. E. J., and Girvan M., Finding and evaluating community structure in
networks. Phys. Rev. E 69, 026113, 2004.
[47] Newman M. E. J., and Leicht E. A., Mixture models and exploratory analysis in networks.
Proceedings of the National Academy of Sciences of the United States of America,
104(23), 2007, 9564-9569.
[48] Newman M. E. J., The structure of scientific collaboration networks. In Proceedings of
the National Academy of Sciences, USA, vol. 98, 2001, 404-409.
[49] NWB Team. (2006). Network Workbench Tool. Indiana University, Northeastern
University, and University of Michigan, http://nwb.slis.indiana.edu
[50] Otte E., and Rousseau R., Social network analysis: a powerful strategy, also for the
information sciences. Journal of Information Science 28, 2002, 441.
[51] Pagel M., Erdly W., and Becker J., Social networks: we get by with (and in spite of) a
little help from our friends. Journal of Personality and Social Psychology, vol. 53, no. 4,
1987, 793-804.
[52] Palla G., Barabási A. L., and Vicsek T., Quantifying social group evolution. Nature 446,
2007, 664-667.
[53] Palla G., Barabási A. L., and Vicsek T., Quantifying social group evolution.
Supplementary information. Nature 446, 2007.
[54] Palla G., Derényi I., Farkas I., and Vicsek T., Uncovering the overlapping community
structure of complex networks in nature and society. Nature 435, 2005, 814-818.
[55] Radicchi F., Castellano C., Cecconi F., Loreto V., and Parisi D., Defining and identifying
communities in networks. PNAS, vol. 101 , 2 March 2004, 2658-2663.
[56] Rémy C., Frédéric A., and Chihab H., Detection of overlapping communities in dynamical
social networks. In Proceedings of the 2010 IEEE International Conference on Social
Computing, Minneapolis, USA, 2010.
[57] Robins G. L., and Alexander M., Small Worlds Among Interlocking Directors: Network
Structure and Distance in Bipartite Graphs, Computational & Mathematical Organization
Theory, vol. 10, no. 1, Kluwer Academic Publisher, 2004, 69-94.
[58] Ronhovde P., and Nussinov Z., Local resolution-limit-free Potts model for community
detection. Phys. Rev. E 80, 016109, 2009.
58
[59] Rosvall M., and Bergstrom C. T., An information-theoretic framework for resolving
community structure in complex networks. Proceedings of the National Academy of
Sciences USA 104, 2007, 7327-7331.
[60] Rosvall M., and Bergstrom C. T., Maps of random walks on complex networks reveal
community structure. Proceedings of the National Academy of Sciences USA. 105, 2008,
1118-1123.
[61] Scott J., Social Network Analysis: A Handbook. London, UK, SAGE Publications, 2000.
[62] Stark D., and Vedres B., Social times of network spaces: Network sequences and foreign
investment in Hungary. (No. 2005-06-023). Santa Fe, NM: Santa Fe Institute, 2005.
[63] Sun J., Faloutsos C., Papadimitriou S., and Yu P. S., GraphScope: Parameter-free Mining
of Large Time-evolving Graphs. In KDD '07: Proceedings of the 13th ACM SIGKDD
international conference on Knowledge discovery and data mining 103 (ACM, New York,
USA), 2008, 687-696.
[64] Traud A. L., Kelsic E.D ., Mucha P. J., and Porter M. A., Community structure in online
collegiate social networks. Eprint arXiv:0809.0690, 2009.
[65] Tyler J. R., Wilkinson D. M., and Huberman B. A., Email as spectroscopy: Automated
In Communities and
discovery of community structure within organizations.
Technologies, Kluwer, B. V., Deventer E., The Netherlands, 2003, 81-96.
[66] Van Dongen S., Performance criteria for graph clustering and Markov cluster
experiments. Ph.D. thesis, Dutch National Research Institute for Mathematics and
Computer Science, University of Utrecht, Netherlands, 2000.
[67] Wasserman S., and Faust K., Social network analysis: Methods and applications. New
York: Cambridge University Press, 1994.
[68] Watts D. J., and Strogatz S., Collective dynamics of 'small-world' networks. Nature, vol.
393, 1998, 440-444.
[69] Wellman B., Salaff J., Dimitrova D., Garton L., Gulia M., and Haythornthwaite C.,
Computer Networks as Social Networks: Collaborative Work, Telework, and Virtual
Community. Annual Review of Sociology, vol. 22, no. 1, 1996, 213-238.
[70] Bródka P., Saganowski S., and Kazienko P., Group Evolution Discovery in Social
Networks. ASONAM 2011, The 2011 International Conference on Advances in Social
Network Analysis and Mining, Kaohsiung, Taiwan, 25-27 July 2011, IEEE Computer
Society, 2011.
[71] Bródka P., Saganowski S., and Kazienko P., Tracking Group Evolution in Social
Networks. SocInfo 2011, The Third International Conference on Social Informatics,
Singapore, 6-8 October 2011. Under review.
|
1205.3212 | 1 | 1205 | 2012-05-14T22:57:15 | SportSense: Real-Time Detection of NFL Game Events from Twitter | [
"cs.SI",
"physics.soc-ph"
] | We report our experience in building a working system, SportSense (http://www.sportsense.us), which exploits Twitter users as human sensors of the physical world to detect events in real-time. Using the US National Football League (NFL) games as a case study, we report in-depth measurement studies of the delay and post rate of tweets, and their dependence on other properties. We subsequently develop a novel event detection method based on these findings, and demonstrate that it can effectively and accurately extract game events using open access Twitter data. SportSense has been evolving during the 2010-11 and 2011-12 NFL seasons and is able to recognize NFL game big plays in 30 to 90 seconds with 98% true positive, and 9% false positive rates. Using a smart electronic TV program guide, we show that SportSense can utilize human sensors to empower novel services. | cs.SI | cs | SportSense: Real-Time Detection of NFL Game Events from Twitter
Technical Report TR0511-2012
Siqi Zhao* Lin Zhong* Jehan Wickramasuriya§ Venu Vasudevan§ Robert LiKamWa* Ahmad Rahmati*
*Department of Electrical & Computer Engineering, Rice University, Houston, Texas, USA
§Betaworks, Applied Research Center, Motorola Mobility, Libertyville, Illinois, USA
ABSTRACT
We report our experience in building a working system,
SportSense, which exploits Twitter users as human sensors
of the physical world to detect events in real-time. Using
the US National Football League (NFL) games as a case
study, we report in-depth measurement studies of the delay
and post rate of tweets, and their dependence on other
properties. We subsequently develop a novel event
detection method based on these findings, and demonstrate
that it can effectively and accurately extract game events
using open access Twitter data. SportSense has been
evolving during the 2010-11 and 2011-12 NFL seasons and
is able to recognize NFL game big plays in 30 to 90
seconds with 98% true positive, and 9% false positive rates.
Using a smart electronic TV program guide, we show that
SportSense can utilize human sensors to empower novel
services.
1. Introduction
Twitter has over 200 million users, who can be can be
collectively regarded as human sensors that provide quick,
brief output for whatever motivates them to tweet. Many
have attempted to interpret the output of these human
sensors, including efforts that detect major social and
physical events such as earthquakes [1], celebrity deaths
[2], and presidential elections [3]. However, these work
have significant delays and usually perform
their
processing off-line.
In this work, we answer a complementary question: how
good are these human sensors for the real-time detection of
less significant but more frequent events, such as those
happening in a nationally televised sports game? The
insights gained from answering this question will fuel novel
applications that leverage the human sensors in real-time.
For example, TV program guide can be enhanced with real-
time game information before ESPN discloses game scores,
as we will show in Section 6. We envision other
applications as well, such as reporting traffic accidents.
the above question, we make
To answer
three
(i) We
contributions:
present
a
first-of-its-kind
measurement study of the key sensing properties of human
sensors, i.e., delay and post rate, and their dependency on
other properties such as device being used, user activeness,
and the length of tweets. We find that tweets from different
user categories had different properties in terms of delay
and post rate. (ii) We leverage these properties to devise a
novel detection algorithm that employs matched filter
1
detector and form different event templates for these three
(iii) Finally, we
fundamental categories of
tweets.
implement the solutions to improve an in-house built web
service, http://sportsense.us, to analyze tweets collected
during US National Football League (NFL) games to detect
big plays, such as scoring events and turnovers, tens of
seconds after
they happen. SportSense has been
continuously operational for the past two NFL seasons,
providing game information to NFL fans through web
browser as well as its API, usually faster than EPSN
website updates.
While SportSense was built for and tested through NFL
games, its techniques can be readily applied to other sports
games and even TV shows that have a similarly sized fan
population and similar frequencies of major events, e.g.,
soccer, baseball, and reality shows. The keyword-based
tweet retrieval method adopted by SportSense allows it to
be easily revised for detecting other events of the physical
world by updating the keywords.
2. Related Work
To the best of our knowledge, the measurements of human
sensor delay and its dependency on other properties are
novel. There has been extensive work done on related
topics, from topological properties, users’ properties, to
event and sentiment detection. None of the existing
solutions can detect or aim at detecting events in seconds.
Most of the solutions are intended to be used off-line,
instead of in real-time. Many of the existing solutions treat
tweets as text documents and apply text mining techniques
to extract
topics, classify and cluster
tweets, e.g.,
TwitterStand [2], Tweet the debates [3], and Topical
clustering of tweets [4]. Some have extracted information
about social and physical events using Twitter or similar
services [1, 5-11]. A particularly relevant work, TwitInfo
[12], presented a system for visualizing and summarizing
events on Twitter. None of the above work can detect
targeted events in seconds despite the “real-time” claim by
some. For example, TwitInfo has a delay in the magnitude
of minutes. The solution in [1] detects an earthquake from
Twitter in a matter of hours. In contrast, we are interested
in detecting events in seconds; and SportSense is able to
reliably detect touchdowns in a few tens of seconds, even
before ESPN updates the score on the web page.
Event detection for sports games has been studied by the
video
analysis
research
community
[6,
13-16].
Unfortunately, the video content and text information
irrelevant tweets. We found this to be very effective,
retrieving 60% of the game related tweets with a false
positive rate (percentage of irrelevant tweets with these
keywords) below 5% [20].
3.2 Ground Truth of Event Timing
To evaluate how quickly SportSense can detect an event,
we must know the ground truth of the timing of the event,
which is surprisingly not readily available. While many
media sources (e.g. ESPN, NFL Network) report game
events, they only offer game clock timestamps of events.
However, because the game clock pauses and resumes
during a game, we cannot use a game clock to determine
the passage of time between events.
Instead, we observed the broadcasts of 18 games,
spanning the 2011 Super Bowl, some 2011-12 regular
season games and the 2012 Super Bowl, which include 100
touchdowns. We monitored regular season games at
different times and cities, making our sample as random as
possible. We manually marked the real clock time of game
events. (Due to copyright issues of rebroadcasting games,
we were not able to crowdsource this task.)
4. Characterizing the Human Response to Events
In this section, we examine the properties of tweets from
various users after an event. We analyze the tweet
responses of 100 touchdown events across 18 NFL games,
investigating characteristics such as the device type,
location, user activeness, and the number of words in a
tweet. By modeling the nature of the tweets from these
groups, we can later develop a precise event detection
method (in Section 5).
To analyze this, we use a Human Delay metric.
Numerically,
this
is
the
interval between
the event
occurrence and the tweet’s timestamp. Human delay is
influenced by how fast users perceive an event, react to an
event, and type a tweet.
We show the tweet response following an event in Figure
1. The x-axis represents the human delay of the tweets,
while the y-axis represents the volume of tweets posted per
second. We use the error bar to present one standard
deviation of uncertainty to represent the variation between
the events. From the figure, we can see there are few tweets
in the first 50 seconds after an event happens, but the post
rates both increase to a peak at 75 seconds after the event
happens. Interestingly, among all the games we observed,
the first
touchdown-related
tweet arrived between 7
seconds and 50 seconds after events.
4.1 Mobile Devices Have Higher Post Rate
Many Twitter users post tweets from their mobile devices,
e.g., smartphones and tablets. Because of the immediate
availability of mobile devices and the significantly different
user interfaces, we expect tweets from these different
classes of devices to have different delay characteristics.
Figure 1: The tweet response among all tweets.
Figure 2: The tweet response from mobile and non-
mobile devices.
leveraged by the above work is not always available,
especially in real-time.
3. NFL Game Tweet Collecting and Event Tagging
During American football games, Twitter has a high
volume of tweets from football fans, tweeting about
football events
they find exciting or notable.
that
SportSense leverages this activity, associating particular
streams of tweets with game events (e.g. Touchdowns,
Field Goals) to perform robust event detection.
3.1 Collecting Related Twitter Data
Twitter provides various Application Programming
Interfaces (APIs) for third parties to retrieve tweets from
the general public. SportSense uses the free Streaming API
[17], which provides a continuous flow of tweets in real-
time. This API returns public tweets that match one or
more filter predicates (e.g. keyword, username, and
location). The latency from tweet creation to delivery on
the API is typically within one second [18].
The Streaming API is subject to a few limitations.
According to Twitter, excessive connection attempts result
in an IP address ban. Additionally, broad predicates retrieve
a sampled stream with only ~1% sample rate [19]. During
the 2011 and 2012 Super Bowl, we discovered an
undocumented limit of about 50 tweets per second [20].
Therefore, when analyzing tweets in real-time for a topic
of interest, it is of utmost importance to focus on only
relevant tweets. Irrelevant tweets not only take up precious
collection space, but also incur computation cost in our
analysis, where speed is critical to achieve real-time
performance. To avoid these issues, SportSense employs
team names and game event keywords
to suppress
2
Figure 3: The tweet responses for active and inactive
users.
We compare mobile and non-mobile responses as shown
in Figure 2. The response magnitude on mobile device is
twice as large. The peak delays are close; mobile devices
reached the peak 2 seconds earlier, but their average delay
was longer by 4 seconds. More importantly, we find that
the event response on non-mobile devices
is more
consistent, as evident by the smaller deviation.
To identify tweets posted from mobile devices, we
examined the client source information enclosed in the
tweet metadata. Approximately 40% of the game-related
tweets are posted from Twitter clients on recognizable
mobile devices, i.e., iPhone, BlackBerry, Android, HTC,
MOTO, as well as mobile browsers and short messages
(txt). Tweets on non-mobile clients comprise 30% of the
game-related tweets. The remaining 30% tweets are posted
from clients that exist in both non-mobile and mobile form.
Thus, we do not consider them here.
We hypothesize that typing speed and device/network
delay influence the different delays. The typing speed on
mobile devices is still lower than that on PC or laptops.
Often, users need to unlock the device and open the Twitter
application before tweeting. In addition, mobile devices
may suffer from slow network conditions [21]. However,
mobile devices are more portable and convenient to use
when in front of a TV, at home, in bars, etc.
4.2 Active Users Post Slower
During NFL games, we find that users have diversified
activeness. While most users post fewer than 5 tweets in a
game, some post dozens of tweets. We define the
activeness as how many tweets the user has posted since
the beginning of the game. During the game, we track how
many tweets a user has posted and compute the average
number of tweets per user. At a certain time, if the user has
posted more tweets than the average, they are considered
active users. Otherwise, they are considered inactive users.
Next we compare the tweet responses of active and
inactive users and illustrate it in Figure 3. For both active
and inactive users, the post rates start increasing rapidly
from 30 seconds after event happens and reach the peak at
the same time. They have similar errors between the
template signal and actual signals, but the errors increase
3
Figure 4: The tweet responses of short and long
tweets.
when the post rate decreases. Overall, the average and
median delays for active users are about 5 seconds longer
than for inactive users. Thus, although active users post
more frequently than inactive users, their responses are
typically more delayed.
4.3 More Short Tweets after an Event
In this section we focus on the word count of tweets after
an event happens. We observed that users often post short
tweets with exclamation marks and repeated letters to
e.g., New York
Jets
express
their
excitement.
Touchdownnnnn!!! Therefore, we expect tweets with few
words to correlate with the event. In our data, we found that
the tweet word count decreased shortly after an event. In
particular, the average word count of tweets decreases from
12 words to 6 words within 60 seconds after an event.
To leverage this result, we categorize tweets into long
and short tweets by comparing the tweet word count with
the average word count value during a game. The average
value fluctuates, as tweets are collected in real-time. If a
tweet contains more words than the average word count, it
will be considered as long tweet. Otherwise, it will be
considered as short tweet. Figure 4 shows the tweet
response based on tweet word count. The average and
median delay of long tweets is 3 and 10 seconds more than
short tweets, respectively. More significantly, the post rate
of short tweets is twice that of the long tweets.
In addition to the device, activeness, and tweet length, we
also attempted to analyze tweets posted from verified users
and users in stadiums. However, due to data unavailability
(verified and in-stadium users are less than 0.5% of total
users), we could not obtain representative results.
5. Event Detection
A key technical contribution of the paper is to detect
events, such as touchdowns and field goals, from our
streams of game-related
tweets. SportSense utilizes
matched filtering to detect game events. To improve the
fidelity of the detector, we create a separate template for
different groups of Twitter users, and perform the matched
filter separately for each group’s tweets. We combine the
results of all of the matched filters to achieve accurate and
timely event detection. We also elaborate on the proper
Figure 5: The tradeoff between the event detection
delay and the true positive rate.
window size and threshold parameters to achieve the best
tradeoff between detection delay and true positive rate.
5.1 Event Detection with Matched Filtering
Our event detection strives to analyze Twitter streams to
detect events. An event occurrence is routinely followed by
a patterned volume of event-related
time
tweets as
progresses. In Section 3.1, we consider tweets that contain
a specific event keyword or its variant, e.g., “touchdown”
and “TD”, as event-related tweets. By aggregating a history
of previous events, we can determine the shape of the
pattern of tweets that follows an event, i.e., the event
template. For our event template, we use the tweet response
(Figure 1). Our event template accounts for the tweet
volume until a certain amount of time has passed after an
event. We call this amount of time the window size of our
event template. To improve the fidelity of the detector, we
create a separate template for the different groups of
Twitter users that were explored in Section 4.
Once the event templates are established, to perform
detection, we adopt matched filtering, a technique widely
used in signal detection theory to correlate a received signal
with a given template. Matched filtering is proven to be the
optimal linear filter when dealing with dealing with
independent additive noise, and is known to perform well
in other scenarios as well [22], The matched filter is
applied separately for each user group. The matched
filtering process is as follows:
(1) Take our event template V over the window W and
take its time-reversed conjugate to form our matched
filter H.
H(t)=V*(W - t)
(2) Convolve the current window of the ongoing tweet
stream X with the matched filter H.
m = X * H
(3) If the resulting signal m rises above a threshold, our
system detects an event occurred at that time.
In our dataset, the interval between two adjacent events is
always larger than 5 minutes. If m remains above the
4
Figure 6: Tradeoff between true positive rate and false
positive rate in threshold selection
threshold within 5 minutes after a detected event, we
consider it is the same event to prevent repetitive reports of
the same event.
5.2 Addressing User Diversity
As noted in section 4, we found that tweets from different
user categories had different properties. In particular,
mobile and inactive users typically exhibit less of a delay of
tweeting about an event than non-mobile and active users.
Furthermore, users usually post shorter tweets with event
keyword after event happened. Noting these characteristic
differences, we form different event templates from their
unique tweet responses. Thus, the event templates can be
seen in Figure 2, Figure 3, and Figure 4
In order to combine the outputs of the various matched
filters, mi(t), to form the output, mcomb(t), we evaluated three
prominent combination mechanisms; the Maximum Rule,
the Mean Rule, and the Product Rule. The Maximum Rule
calculates the outcome as the maximum of the matched
filters. Formally,
mmax(t) = max { mi(t) }
The Mean Rule calculates the outcome as the average of
the three matched filters. Formally,
mmean(t) = 1/3 · Σ{mi(t)}
The Product Rule calculates the outcome as the product of
the three matched filters. Formally,
mprod(t) = Π{mi(t)}
In addition to these three prominent mechanisms, we also
evaluated the combination of inactive users and short
tweets which exhibit shorter delay.
mdelay(t) = 1/2 · ( minactive(t) + mshort(t) )
We compared the performance of these four methods, and
found that the Mean Rule performs best. Indeed, the Mean
Rule is known to be especially resilient to noise [23], and
useful when inputs are highly correlated. We use mmean(t) in
the remainder of the paper, and define m(t) = mmean(t)
Figure 7: Architecture of SportSense web service
implementation.
5.3 Parameter Selection
To obtain the optimal window size and threshold, we iterate
this matched filter detector method with different window
sizes and thresholds through our history of events.
An appropriate window size should be chosen to reduce
detection delay while maintaining high accuracy. A short
window will not allow for robust event detection; a lengthy
time-series is needed to form a pattern for an event
template, and the window should be no shorter than this
pattern. However, as the window size increases, the delay
of event detection also increases, as we need to sample
more tweets before a decision can be made about a
particular time. Figure 5 shows the effects of window-size
on the accuracy and delay of touchdown detection.
Likewise, the choice of threshold parameter impacts the
accuracy of the event detection. A low threshold will
recognize events when there are none (false negatives),
while a high threshold will fail to recognize events (false
positives). The tradeoff in threshold choice is shown in
Figure 6. An appropriate threshold must be found to
balance this tradeoff to fulfill accuracy requirements.
We rely on historical event data to perform optimal
parameter selection. With our Touchdown data, we find the
optimal window size to be 30 and threshold to be 8. With
these parameters, we achieve 97% true positive rate and
less than 4% false positives rate, which confirms the
efficacy of our Touchdown event detection.
6. Implementation and Evaluation
We have implemented SportSense as a real-time web
service that visualizes event detection. In this section, we
present the details of our web service followed by the
thorough evaluation of the performance of SportSense.
Finally, we present SportEPG, a sample EPG application
built on SportSense. We present the results based on the
2010-11 and 2011-12 NFL seasons.
6.1 Web Service Realization
We have implemented the SportSense web service in PHP.
It consists of the backend for data collection and analysis,
5
Figure 8: The RoC curves for different combination
mechanisms of matched filter detectors. The mean rule
outperforms the others.
and the frontend for web visualization, as illustrated in
Figure 7. We host the web service on Amazon EC2, a
reliable and reasonably priced cloud computing platform.
The backend consists of a MySQL database and two
modules. The data collection module collects game-related
tweets through the Twitter Streaming API. The event
detection module retrieves tweets from the database,
assigns them to unique games, and detects game events.
The frontend retrieves the results from the event detection
module, and visualizes them. We implemented the website
frontend using the JavaScript drawing library and Google
Charts API. SportSense also provides an API to enable
others to leverage analysis results for novel applications.
The API provides detected events with timestamps, the
temporal trend of posting volume, and the ranking of the
most discussed game according to the tweets volume.
The SportSense website has been running for 2 years
monitoring NFL games in 2010-11 and 2011-12 Seasons.
The event detection method has also been evolving during
this period. The original SportSense utilizes
the
temperature-based method to detect peaks in tweet volume
which is similar to existing methods in the related work [1,
12]. However, because our new goal is to achieve event
detection within seconds, we devised variable window sizes
to reduce detection delay. SportSense starts from the
shortest window size and measures (i) the percentage
increase of the volumes in a sliding window (ii) the post
volume in the window. If the percentage increase of post
volume is high enough and there are enough event-
indicative tweets to make a reliable decision, it declares an
event has happened. Otherwise, SportSense increments the
window size until an event is detected or the largest
window size is reached. This method can detect events
around 40 seconds after an event happens, with 90% true
positive rate and 8% false positive rate [20].
6.2 Evaluation
To evaluate the effectiveness of the matched filter detector
of SportSense, we use
leave-one-out cross-validation
(LOOCV) on all the 18 games that we have ground truth as
Figure 9: RoC curves for basic temperature based and
matched filter detectors. Matched filter performs
better for touchdowns and field goals.
introduced in Section 3.2. LOOCV uses a single game as
the validation data, and the remaining games as the training
data. There are in total 100 touchdowns, an average of 5 or
6 touchdowns per game. We show that the combination of
matched filter detector of different user types can achieve
98% true positive rate and 9% false positive rate.
Figure 8 shows the Receiver Operating Characteristics
(RoC) Curves for our single matched filter detector and the
combination of matched filter detectors for different user
groups. The single matched filter detector approach
achieves 96% true positive rate and has 13% false positive
rate. On the other hand, the combination matched filter
detectors performs better, achieving 98% true positive rate
and has 9% false positive rate. Figure 9 shows the
performance of the basic temperature based method and
matched filter method for touchdowns and field goals. The
basic temperature-based method performs significantly
poorer than the matched filter methods.
We also examine the delay of our detection, which is
introduced from two parts, our system and the detection
stage. To minimize the system delay, we use parallel data
collection and data analysis in our implementation. The
delay from the detection stage includes computation delay
and the delay due to the matched filter window size. The
computation as introduced in Section 5.1 is mainly a
convolution operation, which is very fast. Figure 10 shows
the delay of events detected. All three methods have an
average delay around 45 seconds. The median value of the
temperature-based method is 5 seconds shorter than the
other two methods but the temperature-based method
detects fewer events due to the tradeoff between accuracy
and window size. Interestingly, the combination of inactive
and short tweets does not outperform the matched filter
method. Both have similar detection delay distribution. For
the purpose of comparison, we note that EPSN takes about
90 seconds to update their webpage. SportSense detects
60% of events within 40 seconds which is mainly because
of the window size. All detected events have delay less
than 90 seconds. As a result, SportSense can update results
faster than ESPN updates their web page.
6
Figure 10: The distribution of event detection delay.
6.3 SportSense Powered EPG Application
We have developed
the SportEPG application
to
demonstrate the effectiveness of the SportSense system and
its APIs. A primary function of electronic program guides,
or EPGs, is to assist users in selecting their desired channel.
SportEPG achieves this goal by using the SportSense API
to identify and highlight the most tweeted programs in real
time. Thanks to the flexibility of the keyword-based data
collection method, we feed TV program names to the
Streaming API to support general TV content. Our event
detection is still focused on NFL games. When events take
place in sports game, an event icon will show up in the
corresponding grid. We leverage AJAX (Asynchronous
JavaScript And XML) methods to retrieve analysis results
from
the SportSense server asynchronously, without
interfering with the existing page.
One of the benefits of a real-time updating EPG is that it
is accessed frequently and presumably in most cases on a
companion device such as a smartphone or a tablet. In turn,
the frequent, constant attention to the EPG can be exploited
through relevant advertising.
7. Conclusion
In this work, we pushed the limit of Twitter as a real-time
human sensor. We demonstrated that moderately frequent
and diverse social and physical events like those of NFL
games can be reliably recognized within 90 seconds using
tweets properly collected in real-time. Our results also
suggest that the keyword-based method is effective in
Twitter-based event detection and the Twitter API limits
can be overcome using proper scoping and event detection
keywords. We hope this new capability will inspire more
applications in the pervasive computing community.
On the other hand, our work is limited to events for
which keywords can be predetermined, such as for NFL
games. What would be more useful and challenging is to
recognize events that are not anticipated, and therefore do
not have predefined keywords. Leveraging the work
reported here, we are actively pursuing this goal.
[2]
8. References
[1] T. Sakaki, M. Okazaki, and Y. Matsuo, "Earthquake
shakes Twitter users: real-time event detection by
social sensors," presented at the ACM World wide
web, Raleigh, North Carolina, USA, 2010.
J. Sankaranarayanan, H. Samet, B. E. Teitler, M. D.
Lieberman, and J. Sperling, "TwitterStand: news in
tweets," presented at the ACM SIGSPATIAL
Advances in Geographic Information Systems, Seattle,
Washington, 2009.
[3] D. A. Shamma, L. Kennedy, and E. F. Churchill,
"Tweet the debates: understanding community
annotation of uncollected sources," presented at the
SIGMM workshop on Social media, Beijing, China,
2009.
[4] K. D. Rosa, R. Shah, B. Lin, A. Gershman, and R.
Frederking, "Topical Clustering of Tweets," in ACM
SWSM, 2011.
J. Weng and B. S. Lee, "Event detection in twitter," in
AAAI, 2011.
[6] C. Xu, Y. Zhang, G. Zhu, Y. Rui, H. Lu, and Q.
Huang, "Using Webcast Text for Semantic Event
Detection in Broadcast Sports Video," Multimedia,
IEEE Transactions on, vol. 10, pp. 1342-1355, 2008.
[7] S. Vieweg, A. L. Hughes, K. Starbird, and L. Palen,
"Microblogging during two natural hazards events:
what twitter may contribute to situational awareness,"
presented at the ACM Human factors in computing
systems, Atlanta, Georgia, USA, 2010.
J. Hannon, K. McCarthy, J. Lynch, and B. Smyth,
"Personalized and automatic social summarization of
events in video," presented at the ACM Intelligent user
interfaces, Palo Alto, CA, USA, 2011.
[9] D. Chakrabarti and K. Punera, "Event summarization
using tweets," in AAAI ICWSM, 2011.
[10] S. A. Golder and M. W. Macy, "Diurnal and Seasonal
Mood Vary with Work, Sleep, and Daylength Across
Diverse Cultures," Science, vol. 333, pp. 1878-1881,
September 30, 2011 2011.
[11] J. Bollen, A. Pepe, and H. Mao, "Modeling public
mood and emotion: Twitter sentiment and socio-
economic phenomena," in AAAI ICWSM, 2009.
[12] A. Marcus, M. S. Bernstein, O. Badar, D. R. Karger, S.
Madden, and R. C. Miller, "Twitinfo: aggregating and
[5]
[8]
visualizing microblogs for event exploration,"
presented at the ACM Human factors in computing
systems, Vancouver, BC, Canada, 2011.
[13] A. Ekin, A. M. Tekalp, and R. Mehrotra, "Automatic
soccer video analysis and summarization," Image
Processing, IEEE Transactions on, vol. 12, pp. 796-
807, 2003.
[14] Y. Rui, A. Gupta, and A. Acero, "Automatically
extracting highlights for TV Baseball programs,"
presented at the ACM Multimedia, Marina del Rey,
California, United States, 2000.
[15] D. Zhang and S.-F. Chang, "Event detection in baseball
video using superimposed caption recognition,"
presented at the ACM Multimedia, Juan-les-Pins,
France, 2002.
[16] K. Petridis, S. Bloehdorn, C. Saathoff, N. Simou, S.
Dasiopoulou, V. Tzouvaras, S. Handschuh, Y. Avrithis,
Y. Kompatsiaris, and S. Staab, "Knowledge
representation and semantic annotation of multimedia
content," Vision, Image and Signal Processing, IEE
Proceedings -, vol. 153, pp. 255-262, 2006.
[17] B. R. Journal. The Twitter Streaming API -- How It
Works and Why It's A Big Deal, http://borasky-
research.net/2010/01/06/the-twitter-streaming-api-
how-it-works-and-why-its-a-big-deal/.
[18] M. Cha, H. Haddadi, F. Benevenuto, and K. P.
Gummadi, "Measuring user influence in Twitter: The
million follower fallacy," 2010.
[19] Twitter API Documentation. Streaming API Concept,
https://dev.twitter.com/docs/streaming-api/concepts.
[20] S. Zhao, L. Zhong, J. Wickramasuriya, and V.
Vasudevan, "Human as Real-Time Sensors of Social
and Physical Events: A Case Study of Twitter and
Sports Games," Arxiv preprint arXiv:1106.4300, 2011.
[21] Z. Wang, X. Lin, L. Zhong, and M. Chishtie, "Why are
web browsers slow on smartphones?," in HotMobile,
2011.
[22] R. D. Hippenstiel, Detection theory: applications and
digital signal processing: CRC, 2002.
[23] J. Kittler, M. Hatef, R. P. W. Duin, and J. Matas, "On
Combining Classifiers," IEEE Transactions on Pattern
Analysis and Machine Intelligence, vol. 20, pp. 226-
239, 1998.
7
|
1206.3963 | 1 | 1206 | 2012-06-18T15:23:37 | Small-world topology of functional connectivity in randomly connected dynamical systems | [
"cs.SI",
"physics.data-an",
"physics.soc-ph",
"q-bio.NC",
"stat.AP"
] | Characterization of real-world complex systems increasingly involves the study of their topological structure using graph theory. Among global network properties, small-world property, consisting in existence of relatively short paths together with high clustering of the network, is one of the most discussed and studied. When dealing with coupled dynamical systems, links among units of the system are commonly quantified by a measure of pairwise statistical dependence of observed time series (functional connectivity). We argue that the functional connectivity approach leads to upwardly biased estimates of small-world characteristics (with respect to commonly used random graph models) due to partial transitivity of the accepted functional connectivity measures such as the correlation coefficient. In particular, this may lead to observation of small-world characteristics in connectivity graphs estimated from generic randomly connected dynamical systems. The ubiquity and robustness of the phenomenon is documented by an extensive parameter study of its manifestation in a multivariate linear autoregressive process, with discussion of the potential relevance for nonlinear processes and measures. | cs.SI | cs |
Small-world topology of functional connectivity in randomly connected
dynamical systems
J. Hlinka,1 D. Hartman,1 and M. Palus1
Institute of Computer Science, Academy of Sciences of the Czech Republic, Pod vodarenskou vezi 2, 18207 Prague,
Czech Republic
(Dated: 1 May 2014)
Characterization of real-world complex systems increasingly involves the study of their topological structure
using graph theory. Among global network properties, small-world property, consisting in existence of rel-
atively short paths together with high clustering of the network, is one of the most discussed and studied.
When dealing with coupled dynamical systems, links among units of the system are commonly quantified by
a measure of pairwise statistical dependence of observed time series (functional connectivity). We argue that
the functional connectivity approach leads to upwardly biased estimates of small-world characteristics (with
respect to commonly used random graph models) due to partial transitivity of the accepted functional connec-
tivity measures such as the correlation coefficient. In particular, this may lead to observation of small-world
characteristics in connectivity graphs estimated from generic randomly connected dynamical systems. The
ubiquity and robustness of the phenomenon is documented by an extensive parameter study of its manifes-
tation in a multivariate linear autoregressive process, with discussion of the potential relevance for nonlinear
processes and measures.
PACS numbers: 89.75.Fb,07.05.Kf,05.45.Tp,87.19.L-
In the field of complex systems study, new mea-
surement and computational resources have lead
to increased interest in analysis of large networks.
These networks are observed across many disci-
plines spanning from social sciences through bi-
ology to climate research. For characterization of
the structure of these networks, graph-theoretical
measures have proven to be useful. These charac-
teristics capture some global features of the net-
work topology such as the density or level of clus-
tering (tendency of neighbors of a node to be also
neighbors to each other) as well as specific roles of
important nodes serving as ‘hubs’ in the network.
Among the interesting properties of many real-
world networks belongs the small-world property,
a global property of a network characterized by
a relatively high level of clustering while con-
serving on average short paths among nodes of
the network, compared to a random network of
corresponding density. This small-world prop-
erty has been related to some convenient prop-
erties of the network including efficiency of infor-
mation transfer, and therefore reports of small-
world architecture in real-world networks have
received much attention.
In some complex dy-
namical systems, including global climate or hu-
man brain, the knowledge of physical connections
among its subsystems is far from perfect, and
therefore other methods of characterizing interac-
tions among these have been extensively applied.
In particular, interactions among the areas are
commonly quantified by a dependence measure
such as the linear correlation between the local
time series of variables of interest. This gives
rise to the so-called functional connectivity ma-
trix of a system. Applying the graph-theoretical
approach to functional connectivity matrices has
lead to reports of small-world properties of many
real-world systems. However, as we document in
this report, even for a simplistic dynamical sys-
tem with linear dynamics and random coupling
matrix the functional connectivity approach gen-
erates networks with small-world characteristics.
These spurious detections of small-world topol-
ogy is related to partial transitivity of functional
connectivity measures such as the correlation co-
efficient.
I.
INTRODUCTION
Characterization of complex systems commonly in-
cludes the study of their structure using graph theory.
This typically involves identification of the systems sub-
units (nodes of a network) and assessment of existence
(or strength) of pair-wise relations among those, leading
to representation of the system by a (weighted) graph.
The local, mesoscale or global topology of the graph (or
alterations thereof) are subsequently studied using vari-
ous graph-theoretical measures with a goal of identifying
systems properties key to its function. Among the most
widely discussed properties are modularity, scale-freeness
or small-world topology.
Since the paradigmatic publication of Watts and Stro-
gatz in Nature1, the small-world property entailing rela-
tively short graph paths and high clustering has received
much attention in many application areas dealing with
complex systems. This includes such diverse fields as
neuroscience2 and climate science3.
When working with such complex dynamical systems,
for both practical and theoretical reasons, the links
among nodes are commonly quantified by the dependence
of the observed time series rather than the underlying
physical or coupling network of connections. In the neu-
roscience community, this corresponds to the distinction
between functional and structural (anatomical) connec-
tivity. We adopt this useful terminology in this paper and
suggest the general term functional connectivity approach
to construction of graph representation of complex dy-
namical system by deriving the links through quantifica-
tion (and potential thresholding) of the pair-wise statis-
tical dependence measure (typically correlation) among
the local time series of activity or other key variable of
the nodes of the studied system.
As the exact values of quantitative graph-theoretical
indices crucially depend on parameters such as network
size or density, the interpretation of graph-theoretical
properties of real-world networks is usually based on the
comparison with ‘corresponding’ random graph models
of Erdos–R´enyi4 or Maslov–Sneppen5.
Some complications with the outlined analysis ap-
proach have recently been suggested in literature, partic-
ularly discussing the biasing effects related to sampling
problems such as spatial oversampling6 and finite size
temporal samples and their autocorrelation7.
However, we argue that there is a more fundamen-
tal problem with intepretation of the graph-theoretical
properties of functional connectivity matrices. In partic-
ular, functional connectivity matrices are biased towards
a specific structure due to their construction method; ir-
respective of particular time series length and/or sam-
pling parameters. We focus particularly on functional
connectivity matrices constructed using linear correla-
tion as a measure of dependence. A specific example
of an in-built bias of a linear correlation matrix is its
‘weak’ transitivity property: for any three random vari-
ables X, Y, Z a strong positive correlation between two
pairs of them implies a positive correlation within the
third pair, including specific ‘hard limitations’, such as
that ρ2
Y Z > 1 implies ρXZ > 0, i.e. positivity of
the third correlation coefficient (for a proof of a general
form of this inequality see8). Such implicit dependence
among the entries of the correlation matrix has been com-
monly overlooked in the interpretation of graph analysis
of functional connectivity matrices.
XY + ρ2
In the presented study, we focus on the effects of this
dependence on the graph-theoretical properties of the
functional connectivity matrices. In particular, we show
that there are tendencies towards specific graph struc-
tures in functional connectivity matrices computed from
activity time-series of randomly structurally connected
networks. A prime example of such an effect is the in-
creased level of clustering, further affecting the estimates
of small-world indices, potentially leading to serious mis-
interpretation of real-world data.
2
II. METHODS
A. Functional connectivity
Functional connectivity is most commonly quantified
by the linear (Pearson’s) correlation coefficient. While
also non-linear connectivity measures are in use, for data
with approximately Gaussian distribution is linear cor-
relation practically sufficient9,10. The correlation ma-
trix can be subsequently transformed into an unweighted
graph (‘binarized’) by choosing a threshold and assign-
ing links only to pairs of nodes with over-threshold cor-
relation. In practice, the threshold is commonly chosen
adaptively to achieve a predefined density of the result-
ing graph, although statistical testing may be applied as
well11–13.
B. Graph-theoretical characteristics
Formally, in the graph-theoretical approach a network
is represented by an unweighted graph G = (V, E), where
V is the set of nodes of G, N = #V is the number of
nodes and E ⊆ (cid:0)V
2(cid:1) is the set of the edges of G. In some
cases a separate function w : E → R can be used to
extend the graph concept by defining a weighted graph
G = (V, E, w), however throughout the current paper we
only deal with unweighted graphs.
For any pair of nodes i, j ∈ V we define an edge indi-
cator ai,j = 1 if and only if {i, j} ∈ E (the graph con-
tains an edge linking nodes i and j), otherwise ai,j = 0,
node degree as ki = Pj∈V ai,j, and finally a path of
length ℓ from node i to node j as a sequence of edges
{m0 = i, m1}, {m1, m2}, . . ., {mℓ−1, mℓ = j} where all
mi ∈ V are distinct nodes of the graph. The length of
the shortest path between nodes i and j is denoted as
di,j.
A graph G can be characterized by its global proper-
ties, including the average path length
L =
1
N (N − 1) X
i,j
and the clustering coefficient
C =
1
N X
i∈V
ci,
di,j
(1)
(2)
where ci denotes the local clustering coefficient defined
for ki ≥ 2 as
ci = Pj,ℓ ai,jaj,ℓaℓ,i
ki(ki − 1)
(3)
and for ki ∈ {0, 1} as ci = 0.
Note that for disconnected graphs, some pairs of nodes
are not connected by a path and the respective di,j is not
well defined (or set to infinity). In this case we compute
the average path length by averaging only over pairs for
which a finite path exists, see also the discussion section.
In their original paper, Watts and Strogatz1 suggested
the term “small-world” for networks that have a similar
average path length, but an increased clustering coeffi-
cient compared to a corresponding random graph (which
corresponds to a relative average path length and clus-
tering coefficient λ = L
≫ 1) and
also provided a simple generative model for such net-
works. The small-world property has been more recently
proposed to be summarized in the small-world index
σ = γ
& 1, γ = C
Crand
Lrand
λ ≫ 114.
Although generally accepted, the interpretation of the
small-world index has been critically discussed for var-
ious reasons including the potential confounding effects
of spatial oversampling of the underlying system6, finite-
time estimation effects7 or unclear interpretation of paths
in the functional connectivity graphs15. In the following,
we show that the functional connectivity approach with
a common choice of dependence measure leads to a sub-
stantial upward bias in the small-world index σ. Under-
standing this phenomenon is key for accurate interpreta-
tion of experimental findings and their comparison across
methodologies.
3
matrix (diagonal elements of the FC matrix are first set
to zero). The respective matrices are shown in Figure 1.
A visual inspection shows that while the entries of the
structural connectivity matrix are random and mutually
independent, the functional connectivity matrix shows a
specific structure. This can be quantified by the graph-
theoretical measures.
In this particular realization, we
have LS = 2.157, LF = 2.308, CS = 0.1081, CF = 0.2355.
As SC and F C have the same densities, SC is effectively
a realization of the Erdos-R´enyi model corresponding to
the density of F C, and we obtain the relative graph mea-
sures: λ = 1.07, γ = 2.18, σ = 2.04. The values indicate
increased clustering and approximately conserved aver-
age path length with respect to a corresponding random
graph. Together this signifies a small-world like struc-
ture of the functional connectivity matrix, even though
the coupling structure of the generating system is com-
pletely random.
In view of the results of this simple experiment, it is
important to ask what the significance of the findings of
increased clustering and small-world structure in depen-
dence matrices of real-world data is.
For simplicity, consider an autoregressive process of
order 1 (AR(1)):
D. Asymptotic behavior of correlation matrix: Parametric
study settings
Xt = c + AXt−1 + et,
(4)
where c is a N × 1 vector of constants, A is a N × N
matrix and et is a N × 1 vector of error terms. For
simplicity we choose c = 0N,1 and et ∼ N (0, 1) and
A = s(SC + αI)/λmax, with the symmetric binary struc-
tural connectivity matrix SC = SC(N, p) generated as a
realization of the Erdos-R´enyi model G(N, p). In partic-
ular, each nondiagonal entry of the N × N SC matrix is
assigned randomly and independently either with value
1 (edge exists, with probability p) or value 0 (edge does
not exist, with probability 1 − p); diagonal elements are
set to 0. I here denotes the identity matrix. The pa-
rameter s ∈ (0, 1) modulates the relative strength of the
autoregressive and noise terms in (4) with the normaliza-
tion by λmax – the largest (in absolute value) eigenvalue
of the matrix SC + αI. The parameter α varies the re-
lation between the autocorrelation and cross-correlation
component of the AR process (4).
C. Finite time series example
As a motivational example, we generate a finite sample
of stochastic process with length T = 300 with parameter
setting pSC = 0.1, N = 100, s = 0.1, α = 2, and compute
the corresponding functional connectivity matrix F C by
binarizing the sample Pearson correlation matrix. The
binarization threshold is chosen such that the density
pF C of the binarized functional connectivity matrix is
equal to the density pSC of the structural connectivity
In the following we focus on investigating this effect in
a more detail, studying its strength as a function of some
of the most relevant parameters of the underlying pro-
cess. For the sake of tractability we still limit ourselves
to AR(1) process, but vary the following parameters: size
of the network N , density pSC of the coupling matrix SC,
balance of the autocorrelation and cross-correlation (by
parameter α), balance between the autoregressive and
noise terms by parameter s and the level of threshold-
ing by changing the required density pF C of the matrix
F C. While the strength of the effect is also dependent on
the length of the sample T , the finite size of the sample
is not crucial, as the upward bias does not vanish even
asymptotically. The covariance matrix Σ for the AR(1)
AiAiT
process (4) is given by the infinite sum Σ =
∞
X
i=0
(for derivation see e.g.16), which due to symmetry of the
matrix A = AT leads to a Neumann series that con-
verges to Σ = (I − A2)−1. From this expression the
correlation matrix is easily obtained by trivial normal-
izations using diagonal elements of Σ. Thus the choice of
the rather trivial AR(1) model gives us the possibility to
study asymptotic behavior of correlation matrices with-
out additional effects of sampling or series length which
are not negligible when the correlation matrices are esti-
mated from time series.
Notwithstanding the dimensionality of the investi-
the parameter ranges were
gated parameter space,
chosen to cover reasonably the parameter space,
in
particular we used values N ∈ {50, 200, 500}, s ∈
4
FIG. 1. An example of binary functional connectivity matrix (right) generated from random structural connectivity matrix
(left) by thresholding the correlation matrix of AR-model generated time series (center, light shades of gray indicate higher
correlation values). Network with N = 100 nodes shown. Note that the functional connectivity matrix shows a specific structure
although the entries of the generating structural connectivity matrix were chosen randomly. See text for further details.
{0.2, 0.5, 0.75, 0.9, 0.99}, α ∈ {0, 1}. We further varied
pSC and pF C logarithmically in 24 steps within the (0, 1)
interval – more exactly both variables are defined as 2n
where n is an arithmetic progression from 0 to −6.9 with
step −0.3. The lowest density was therefore smaller than
0.01.
For robustness of evidence, for each parameter setting
we compute 20 independent realizations of the coupling
matrix, and each of the resulting matrices F C is com-
pared to its own corresponding realization of the random
Erdos-R´enyi matrix G (and secondarily also to Maslov-
Sneppen random graph model5, see discussion). The
computations were carried out using the NDW-Graph
Toolbox (http://ndw.cs.cas.cz/software/ndw-graph), a
C++/MATLAB toolbox for complex network analysis
developed within the authors’ NDW group and available
to the public under GPL license.
III. RESULTS
The simulations have shown that the studied effect
(small-world property of functional connectivity matrix
of a randomly connected dynamical system) is present
throughout the covered parameter space, although with
a variable strength. A representative selection of results
is shown in Figure 2, obtained for network size N = 500
nodes, s = 0.75 and α = 1. The results for other investi-
gated parameter choices are qualitatively similar and are
summarized for completeness in Figures 1 and 2 of the
Supplemental Material17.
Within the studied parameter range, we have observed
values of small-world index σ up to the order of hun-
dreds. The effect has also proven statistically robust with
respect to different realizations of the structural matrix
SC. In particular, we observed relatively low spread of
the σ values, with σ > 1 in all 20 assessed realizations
of the process (4) for overwhelming majority of param-
eter vector values. This corresponds to robust statis-
tical significance in most cases (p-values < 10−5, sign
test of hypothesis of median equal to 1, no correction for
multiple comparisons; similar results obtained for t-test).
The only exceptions were observed for the case of exactly
equal densities of structural and functional connectivity
matrix, when this commong density was very low (e.g.
only for pF C = pSC . 0.03 for the specific settings in
Figure 2), where the σ values were relatively close to 1;
this special case is discussed later.
In general, σ increases with increasing thresholding
(that is decreasing density pF C of the F C matrix). The
dependence on the density of the underlying structural
connectivity pSC is not monotonous (see Figure 2). Ap-
proximately, the effect is weakest if the density of the
binarized functional connectivity matrix is the same as
of the underlying structural connectivity matrix, but the
depth of this minimum further depends on the value of
parameter α. The values of σ are comparable for both
α = 1 and α = 0, with the exception of the above-
described non-monotonicity being more pronounced with
α = 1. With other parameters fixed, network size N and
strength of coupling s do not affect σ strongly within the
sampled parameter region (see Supplemental Material17
Figure 1).
However, for small networks (especially N = 50) and
small densities of the F C matrix pF C < 0.1, the σ is often
not well defined, mostly due to zero values of the clus-
tering coefficient of the corresponding random matrix.
Moreover, in a part of the parameter space, the result-
ing graphs are not connected. This generally happens
for small density, however the exact threshold is further
modulated by network size and other network parame-
ters.
The interpretation of some graph-theoretical measures
for disconnected graphs and their comparison to con-
nected graphs is not straightforward.
In practice, for
disconnected graphs the average path length is computed
only for the largest component of the graph1, or rede-
fined as the mean of the finite elements of the distance
1.000
0.536
0.287
0.154
0.082
0.044
0.024
0.013
C
F
f
o
y
t
i
s
n
e
D
1.000
Density of SC
0.008
10
9
8
7
6
5
4
3
2
1
FIG. 2. Average values of the small-world index σ of the bi-
narized functional connectivity matrix F C generated by AR
model with random structural connectivity matrix SC.
In
most of the parameter space, σ ≫ 1, suggesting small-world
topology. Note marked dependence on values of the density
of SC and F C (the latter modulated by adjusting the bina-
rization threshold). Other parameter values: s = 0.75, α =
1, N = 500. Logarithmic scale used both for the ordinate
and the abscissa. Undefined values (for SC = 1; F C 6= 1) are
shown as 0 (in white). (Results for other parameter settings
are available in the Supplemental Material17.)
matrix, omitting the unconnected node pairs. In the cur-
rent study we adopt the latter approach, used previously
in similar context6.
However, from theoretical perspective it could be ar-
gued that this could potentially have biasing effects on
the small-world index estimates, supporting a conserva-
tive approach of only dealing with connected graphs. To
check that our results are not driven only by loss of con-
nectedness of the graphs with decreasing density or the
related redefinition of average path, we plot separately
the results obtained from connected graphs. While this
severely limits the parameter space, even within this area
σ values attained values up to ∼ 10 (see Supplemental
Material17, Figure 3).
As
the parameter
the admissible area of
space
monotonously grows with the network size, this docu-
ments that even the conservative connectedness require-
ment in principle does not limit the values of σ and there-
fore the strength of the confounding effect.
1.000
0.536
0.287
0.154
0.082
0.044
0.024
0.013
C
F
f
o
y
t
i
s
n
e
D
1.000
Density of SC
0.008
5
10
9
8
7
6
5
4
3
2
1
FIG. 3. Average values of the relative clustering coefficient
γ of the binarized functional connectivity matrix F C gener-
ated by AR model with random structural connectivity ma-
trix SC. In most of the parameter space, γ ≫ 1, contributing
to small-world topology. Note the similarity to Figure 2, sug-
gesting the critical role of increased clustering in the observed
small-world topology of F C. Parameter values as in Figure 2.
Logarithmic scale used both for the ordinate and the abscissa.
1.000
0.536
0.287
0.154
0.082
0.044
0.024
0.013
C
F
f
o
y
t
i
s
n
e
D
1.1
1
0.9
0.8
0.7
0.6
0.5
1.000
Density of SC
0.008
FIG. 4. Average values of the relative average path length λ of
the binarized functional connectivity matrix F C generated by
AR model with random structural connectivity matrix SC. In
most of the parameter space, λ ∼ 1, in agreement with small-
world topology. Parameter values as in Figure 2. Logarithmic
scale used both for the ordinate and the abscissa. See text for
more discussion.
The contributions of relative clustering coefficient γ
and relative average path length λ to the observed small-
world property is documented in Figures 3 and 4. The
results show that the observed small-world property is
mostly attributable to increased clustering with respect
to corresponding random graphs (note the similarity be-
tween Figure 2 and Figure 3).
In most of the studied
parameter space, λ is very close to 1 (i.e. L similar to
that of a random graph); lower values appear in general
for parameter values that lead to disconnected graphs,
typically with more components than random graph of
corresponding density.
Because the small-world index σ is computed by com-
parison with random networks, it is clear that the par-
ticular choice of the random network model may affect
the σ values. While Erdos-R´enyi model is still stan-
dard for these applications, several recent studies used
the Maslov-Sneppen model5 that conserves not only the
density but also degree distribution of the graph. We
have explored the σ values observed using the Maslov-
Sneppen random graph model using the same framework;
the general observation was that of weakening, but not a
complete mitigation of the effect (see Supplemental Ma-
terial17 Figure 4). This suggests that degree distribution
in functional-connectivity-based graphs is indeed differ-
ent from that of Erdos–R´enyi model, yet it does not fully
explain the specific properties of the functional connec-
tivity matrix, in particular the increased level of cluster-
ing.
With other parameters fixed, we commonly observe
the weakest effect if the resulting FC graph has the same
density as the generating SC. This can be understood
since in our model only the direct structural links are
likely to generate the strongest (and quite homogeneous)
temporal correlations.
If the number of the functional
connectivity links is set equal to that of structural links,
the indirect and therefore weaker links are very likely
to be discarded through the thresholding. The practi-
cal utilization of this fact is limited due to two points.
Firstly, the density of underlying structural connectivity
is typically not known in practice. Secondly, the strength
of the structural links is commonly not homogeneous.
Then, some indirect links can become stronger than some
weaker direct links, causing increase in the minimum σ
value. This effect was observed in separate runs of the
simulations that used Gaussian or uniform distribution
for the strengths of structural links (see Supplemental
Material17, Figure 5 and 6).
IV. DISCUSSION
We have shown that the approach of constructing net-
work connectivity graphs from correlations of activity
time series of local nodes leads to particular graph struc-
tures, characterized by increased clustering compared to
common random graph models. This may lead to at-
tribution of small-world properties to networks possess-
ing purely random structural connectivity. By extensive
mapping of strength of the effect as function of model
parameters, we documented that this phenomenon is not
a special theoretical case or a negligible effect, but is a
rather pronounced and general phenomenon. While the
coverage of parameter space was necessarily limited, it is
sufficient not only to demonstrate the existence of the ef-
fect, but also its potential strength and existence of com-
plex modulation by system parameters. The strength
of the effect suggests it is of a scale relevant for inter-
pretation of real-world results, considering that reports
of small-world properties of real-world networks show σ
values comparable to those observed in our model – from
the order of several units in smaller, relatively dense net-
works (e.g. σ ∼ 1.5 in18) to several tens in larger and
less dense networks (see e.g.19). Note that reports of
small-world network topology based on functional con-
nectivity analysis of measured time series is becoming
increasingly used not only in brain imaging (see20 and
references therein), but also in other fields such as cli-
6
mate science3,21 or economics22.
As one of the most widely discussed concepts in the
emerging field of complex network analysis, the small-
world phenomenon has already received some attention
regarding the methodology of its quantification. The
two most notable attempts in this direction focused on
the confounding effects of inadequate spatial sampling6
and finite-size temporal window estimation of correlation
coefficient7. Some other reasons for a careful interpreta-
tion of graph-theoretical analysis of functional connectiv-
ity matrices have been noted in recent reviews15,23,24.
In the current study we bring a direct theoretical
argument supported by extensive quantitative simula-
tions proving that the interpretation problems regard-
ing correlation-based small-world networks stem from the
intrinsic properties of commonly used functional connec-
tivity measures, rather than merely from inappropriate
sampling. Even without the finite sample size problem,
and with no spatial oversampling, functional connectiv-
ity matrices of randomly coupled trivial linear processes
show small-world properties.
The current study utilizes linear statistical dependence
measure (namely Pearson’s correlation coefficient) and
linear autoregressive model to study the consequences
of the functional connectivity approach to construction
of network graphs. A list of parameters of the model
was varied, covering a large portion of the parameter
space. Nevertheless, the computational requirements mo-
tivated some limitations of the parameter swipe. The in-
creased clustering was documented across a multidimen-
sional range of parameter values and for several choices of
random distributions of structural links. While the effect
was ubiquitous, its strength depended substantially on
parameter values – in particular, the highest values were
typically obtained for sparse networks, an observation in
line with results reported in literature (see25). The accu-
rate theoretical description of the parameter dependence
of the strength of the effect for a reasonably general class
of systems is a subject of future work, as it might help
taking the effect properly into account in data-analysis.
Indeed, the AR(1) process analyzed here may serve
only as a simplest first approximation for some real-world
systems studied with the above discussed functional con-
nectivity approach. We conjecture that since the origin
of the phenomenon is in the partial transitivity prop-
erty of correlation matrix of a dependent variable set, the
details of the stochastic process and even the fact that
the data are generated by a temporal stochastic process
are not central to the phenomenon.
In particular, the
potential for spurious small-world observations may be
also relevant to correlation-based networks constructed
from other than time series data. Moreover, based on
the elementary theoretical argument we conjecture that
the main qualitative result generalizes to other depen-
dence measures — to the extent to which these alterna-
tive measures hold a similar partial transitivity property
as the linear correlation. Moreover, if the linear corre-
lation is applied on nonlinear systems, the phenomenon
should also appear — linear correlation may not be able
to capture the dependences fully, but it will still show its
specific properties. The detailed treatment of the related
issues is a topic of further work.
Importantly, in the current paper, we do not challenge
the specific findings of small-world structure of the struc-
tural networks underlying systems such as human brain.
Rather, we only suggest that observations of small-world
observations in functional connectivity, although poten-
tially appealing, may not per se say much interesting
about the underlying system, as these are probably ubiq-
uitous in completely randomly connected dynamical sys-
tems, in a manner illustrated on a simplistic example
of a linear dynamical system in this paper. More gen-
erally, this small-world bias is a specific example of the
general notion that graph-theoretical properties of func-
tional connectivity matrices should be interpreted differ-
ently than those of structural matrices.
Considering our results, in order to properly support
the case that in a particular experimental dataset the
observed small-world functional connectivity properties
are significantly elevated, one would have to compare the
experimental data with appropriate specific null-model
(rather than that of Erdos–R´enyi or Maslov–Sneppen) or
provide a correction for the bias related to the functional
connectivity approach.
Unfortunately, the null model of independent linear
stochastic processes preserving length, frequency content,
and amplitude distribution of the original time series that
was proposed in Ref.7, may not be suitable for testing
hypothesis regarding network topology, since its alterna-
tive includes any set of dependent processes, irrespective
of the topology of the pattern of their dependence. Re-
jection of the null hypothesis according to Bialonski et
al.7 gives statistical support for any dependence struc-
ture from the small-world topology on one side, to the
randomly connected processes on the other side.
As clearly demonstrated in the simulations,
the
strength of the bias crucially depends on many param-
eters of the underlying system, including the density of
links and the distribution of their values.
On the other side, researchers commonly turn to com-
puting “at least” functional connectivity because they
consider the full structure of the underlying dynamical
system difficult (or impossible) to estimate from avail-
able data. Theferore the above named parameters of the
underlying system, necessary for determining the size of
the small-world bias, are not available in practical situa-
tions. This is why constructing a suitable test or correc-
tion procedure is not straightforward and constitutes on
open problem for further research.
Of course, in many situations, the functional connec-
tivity approach may still be suitable and remain in wide
use; it is just that the interpretation should take properly
into account the limitations of the approach.
V. CONCLUSIONS
7
the
In conclusion,
increasingly used functional-
connectivity approach to complex network graph con-
struction bears an inherent strong bias towards small-
world-like properties as measured by the conventional
criteria. This should be taken into account when analyz-
ing data using this approach in conjunction with graph-
theoretical analysis in order to avoid erroneous interpre-
tations. Ultimately, principled solutions should be sought
to overcome this bias as well as other complications con-
cerning the relation between structural and functional
connectivity26. Dynamical models of complex networks
are likely to play a key role in this challenge.
ACKNOWLEDGMENTS
This study was supported by the Czech Science Foun-
dation project No. P103/11/J068.
1D. Watts and S. Strogatz, “Collective dynamics of ‘small-world’
networks,” Nature 393, 440–442 (1998).
2D. S. Bassett and E. Bullmore, “Small-world brain networks,”
Neuroscientist 12, 512–523 (2006).
3A. Tsonis and P. Roebber, “The architecture of the climate net-
work,” Physica A 333, 497–504 (2004).
4P. Erdos and A. R´enyi, “On the evolution of random graphs,”
in Publication of the Mathematical Institute of the Hungarian
Academy of Sciences (1960) pp. 17–61.
5S. Maslov and K. Sneppen, “Specificity and stability in topology
of protein networks,” Science 296, 910–913 (2002).
6S. Bialonski, M.-T. Horstmann, and K. Lehnertz, “From brain
to earth and climate systems: Small-world interaction networks
or not?” Chaos 20, 013134 (2010).
7S. Bialonski, M. Wendler, and K. Lehnertz, “Unraveling spuri-
ous properties of interaction networks with tailored random net-
works,” PLoS One 6, e22826 (2011).
8E. Langford, N. Schwertman, and M. Owens, “Is the property
of being positively correlated transitive?” American Statistitian
55, 322–325 (2001).
9J. Hlinka, M. Palus, M. Vejmelka, D. Mantini, and M. Corbetta,
“Functional connectivity in resting-state fmri: Is linear correla-
tion sufficient?” NeuroImage 54, 2218–2225 (2011).
10D. Hartman, J. Hlinka, M. Palus, D. Mantini, and M. Corbetta,
“The role of nonlinearity in computing graph-theoretical proper-
ties of resting-state functional magnetic resonance imaging brain
networks,” Chaos 21, 013119 (2011).
11M. A. Kramer, U. T. Eden, S. S. Cash, and E. D. Kolaczyk,
“Network inference with confidence from multivariate time se-
ries,” Physical Review E 79 (2009).
12E. Bullmore and O. Sporns, “Complex brain networks: graph
theoretical analysis of structural and functional systems,” Nature
Reviews Neuroscience 10, 186–198 (2009).
13M. Palus, D. Hartman, J. Hlinka, and M. Vejmelka, “Discern-
ing connectivity from dynamics in climate networks,” Nonlinear
Processes in Geophysics 18, 751–763 (2011).
14M. D. Humphries and K. Gurney, “Network ‘small-world-ness’:
A quantitative method for determining canonical network equiv-
alence,” PLoS One 3, e0002051 (2008).
15M. Rubinov and O. Sporns, “Complex network measures of brain
connectivity: Uses and interpretations,” NeuroImage 52, 1059–
1069 (2010).
16H. Lutkepohl, New introduction to multiple time series analysis
(Springer, Berlin [u.a.], 2005).
8
17“See supplementary material available as an ancillary file for the
detailed results of parameter study with wide range of parameter
settings.” .
18Y. Liu, M. Liang, Y. Zhou, Y. He, Y. Hao, M. Song, C. Yu,
H. Liu, Z. Liu, and T. Jiang, “Disrupted small-world networks
in schizophrenia,” Brain 131, 945–961 (2008).
19M. P. van den Heuvel, C. J. Stam, M. Boersma, and H. E. H. Pol,
“Small-world and scale-free organization of voxel-based resting-
state functional connectivity in the human brain,” NeuroImage
43, 528–539 (2008).
20J. Wang, X. Zuo, and Y. He, “Graph-based network analysis of
resting-state functional mri,” Frontiers in Systems Neuroscience
4, e00016 (2010).
21J. F. Donges, Y. Zou, N. Marwan, and J. Kurths, “Complex
networks in climate dynamics,” European Physical Journal 174,
157–179 (2009).
22W. Deng, W. Li, X. Cai, and Q. A. Wang, “Self-similarity and
network perspective of the chinese fund market,” Physica A 390,
3826–3834 (2011).
23C. J. Honey, J.-P. Thivierge, and O. Sporns, “Can structure
predict function in the human brain?” NeuroImage 52, 766–776
(2010).
24M. Rubinov and O. Sporns, “Weight-conserving characterization
of complex functional brain networks,” NeuroImage 56, 2068–
2079 (2011).
25B. C. M. van Wijk, C. J. Stam, and A. Daffertshofer, “Com-
paring brain networks of different size and connectivity density
using graph theory,” PLoS One 5, e13701 (2010).
26S. Boccaletti, V. Latora, Y. Moreno, M. Chavez,
and D. U.
Hwang, “Complex networks: Structure and dynamics,” Physics
Reports 424, 175–308 (2006).
|
1511.09173 | 1 | 1511 | 2015-11-30T06:15:31 | Recognizing Temporal Linguistic Expression Pattern of Individual with Suicide Risk on Social Media | [
"cs.SI",
"cs.CL"
] | Suicide is a global public health problem. Early detection of individual suicide risk plays a key role in suicide prevention. In this paper, we propose to look into individual suicide risk through time series analysis of personal linguistic expression on social media (Weibo). We examined temporal patterns of the linguistic expression of individuals on Chinese social media (Weibo). Then, we used such temporal patterns as predictor variables to build classification models for estimating levels of individual suicide risk. Characteristics of time sequence curves to linguistic features including parentheses, auxiliary verbs, personal pronouns and body words are reported to affect performance of suicide most, and the predicting model has a accuracy higher than 0.60, shown by the results. This paper confirms the efficiency of the social media data in detecting individual suicide risk. Results of this study may be insightful for improving the performance of suicide prevention programs. | cs.SI | cs | Recognizing Temporal Linguistic Expression Pattern of Individual
with Suicide Risk on Social Media
Aiqi Zhang1,2, Ang Li3, Tingshao Zhu1,4*
1Institute of Psychology, Chinese Academy of Sciences, China
2University of Science and Technology of China, Hefei, Anhui, China
3Department of Psychology, Beijing Forestry University, Beijing, China
4Institute of Computing Technology, Chinese Academy of Sciences, China
*Corresponding author: Tingshao Zhu [email protected]
ABSTRACT
Suicide is a global public health problem. Early detection of individual suicide risk plays a key
role in suicide prevention. In this paper, we propose to look into individual suicide risk through
time series analysis of personal linguistic expression on social media (Weibo). We examined
temporal patterns of the linguistic expression of individuals on Chinese social media (Weibo).
Then, we used such temporal patterns as predictor variables to build classification models for
estimating levels of individual suicide risk. Characteristics of time sequence curves to linguistic
features including parentheses, auxiliary verbs, personal pronouns and body words are reported to
affect performance of suicide most, and the predicting model has a accuracy higher than 0.60,
shown by the results. This paper confirms the efficiency of the social media data in detecting
individual suicide risk. Results of this study may be insightful for improving the performance of
suicide prevention programs.
KEYWORDS: suicidal process, blogs, Chinese, classification model, fast Fourier
transformation
INTRODUCTION
Suicide is one of the leading causes of deaths worldwide. The World Health Organization (WHO)
reported that, on average, a suicide occurs in every 40 seconds (World Health Organization, 2014).
Furthermore, the effect of completed suicide on families and communities are often devastating
(Clark & D Goldney, 2000; Jordan & McIntosh, 2011). Many suicide deaths are preventable
(Bailey et al., 2011), which requires to detect individual suicide risk among populations in
real-time. However, traditional methods (e.g. self-report ratings, structured interview, and clinical
judgment) fail to meet the requirement of early detection (McCarthy, 2010), which suggests the
need to improve existing methods.
The development and prevalence of social media sheds new light on this direction. Social media
users are motivated to disclose themselves online, and some of them even have broadcasted their
suicide thoughts and behaviors on social media sites, such as Facebook and Sina Weibo (Murano,
2014). More importantly, social media data is publicly available and can be processed in real-time.
It implies that social media might be an efficient platform for detecting individual suicide risk.
Because the characteristics of the language use can be indicative of personal inner process (e.g.
thoughts, intentions, and motivations), conducting content analysis on personal linguistic materials
(e.g. suicide notes) is recognized as an important method for understanding suicidal thoughts and
behaviors (Pestian, et al, 2012; Cheung, et al, 2015). Many studies have confirmed correlations
between the frequency of any words in social media posts and individual scores on suicide risk,
suggesting the linguistic features of the language use can be used as valid indicators for detecting
individual suicide risk on social media (McCarthy, 2010; Sueki, 2015). However, few studies
focused on the temporal relationships between the changes in patterns of the language use and
levels of suicide risk, which may provide insight into the track of the suicidal process on social
media. Li et al (2014) used the Chinese Linguistic Inquiry and Word Count (CLIWC) program to
analyze a 13-year-old boy’s 193 blogs, which were posted during the year prior to his suicide
death. They found that the temporal analysis method can be helpful to understand the suicidal
process of completed suicides on social media. Although the temporal analysis on social media
data provides an opportunity to identify those at risk of suicide, computational methods of online
detection have not yet been fully established (Christensen, et al, 2014). Besides, due to the limited
sample size, the performance of the temporal analysis also needs to be tested on a larger
population.
This paper aims to examine the temporal patterns of suicidal users’ language use and then use of
such patterns to build classification models for differentiating people with higher and lower levels
of suicide risk.
METHOD
Because Weibo (weibo.com) is the most popular Chinese micrologging service provider in China,
this study was conducted on such platform. This study consists of two steps: Examining temporal
patterns of the suicidal language use and Building classification models for identifying people at
risk of suicide.
Examining temporal patterns of the suicidal language use: We examined temporal patterns of the
suicidal language use using a three-step procedure: (1) Collecting Weibo posts; (2) Extracting
linguistic features; (3) Exporting time series data; and (4) Conducting cluster analysis on time
series data.
To identify the unique use of language among suicidal users, we need to collect Weibo posts from
individuals with different levels of suicide risk (i.e. individuals who complete suicide, individuals
at high risk of suicide, and individuals at low risk of suicide), separately.
To find out users who complete suicide, we contacted with a user (逝者如斯夫 dead), who is
famous for collecting news reports about suicidal users. He advised us a list of suicidal users. We
confirmed the list by both double-checking relevant news reports and looking through comments
left on Weibo accounts of those suggested users. Then, we did a further scrutiny of those
confirmed suicidal users to exclude the following: (a) users who are not Chinese citizens; (b) users
who might update Weibo posts for business purposes (e.g. movie and sports stars); (c) users who
updated less than 20 posts. Finally, we got a total of 30 suicidal Weibo users (15 males and 15
females) and downloaded their Weibo posts since registration.
To find out users at high or low risk of suicide, we randomly selected 1,500 users from a
customized Weibo database composed of 1.06 million active Weibo users (Li, et al., 2014). All
1,500 users were administrated by Suicidal Possibility Scale (SPS), which is an effective
screening tool designed to assess suicide risk in adolescents and adults (Gençöz, 2006; Naud,
2010). SPS consists of 36 self-rating items. Participants rated themselves on each item by a
4-point Likert Scale (1=None or little of the time to 4=All of the time). High scores indicate high
suicide risk. The Chinese version of SPS was used in this study (Huang et al., 2012). The
Cronbach’s Alphas for the whole-questionnaire was ? in our data. All participants were divided
into high risk and low risk group based on scores of the test (Li, et al., 2014). In this study, we
randomly selected 30 users from each one group and got a total of 60 users. Then, we downloaded
Weibo posts of these 60 users since registration.
11540*102 curves of 11540 users
90*102 curves of 90 users
fast Fourier
transform
11540 periods
90 periods
re-extract
using
the
last period
groups of users
by
feature,
named 1, 2, 3…
clustering of users within each feature
new 11540*102 curves
new 90*102 curves
90 curves classified
into nearest groups
matrix of size 90*102, whose entries in the i-th column are names of
groups in the i-th feature
classification
DECISION TREES
and
PREDICTING MODELS
Pre-processing
We extracted linguistic features from collected Weibo posts using SCMBWC (Simplified Chinese
Micro-blog Word Count Dictionary) and TextMind, based on the Chinese version of LIWC
(CLIWC). This provides 80 psychologically meaningful language variables (e.g. emotion words)
and other 22 linguistic features indicating the frequency of using different punctuation marks and
words, such as the number of word-per-sentence and frequency of latin words. Finally, we got a
total of 102 linguistic features (80+22). For each user, we computed feature values per day and
produced a time vector (102 × number of observation days) composed of 102 time series data.
Sequences of 80 linguistic features and 11 kinds of punctuation were obtained by computing
frequency of certain features using day as unit, while sequences of the other 11 features described
counting of words and word-per-sentence, rates of Latin word, numbers of URLs and so on.
After producing individual time vectors, we found there existed differences in the length of time
vectors among different users. For example, among a total of 90 users, the maximum length of the
time vector was 1844 (days) and the minimum length was 42 (days). Because some users updated
their Weibo posts with few Chinese characters in the last 42 days of the observation period, we
cannot make the length of observation uniformly by selecting the minimum length of observation.
Besides, because of the different patterns of use, different users have personalized plans for
updating Weibo posts. In our dataset, we found that, among different users, the time period for
updating the last 100 Weibo posts ranges from 2 days to 2 years. Therefore, we also cannot
conduct analysis on a certain number of latest Weibo posts for all users.
To solve the problem, for each time series data, we used the algorithm of Fast Fourier
Transform (FFT) to compute the Discrete Fourier Transform (DFT), which was recognized as the
amplitudes of all possible frequencies. we viewed changes of values to the features by day as
personally fluctuations of mental or physical state and used Fourier transformation to compute the
period. A fast Fourier transform (FFT) is implemented to decompose the original time sequence as
several sin curves with different frequencies. With this we take periods to the maximal amplitudes
for the re-extracting of the time sequences. From each user we intercept the last period
of his sequence and use 1/12 of the period as time unit. 1/12 is defined because the shortest period
is 12 days. By this method we got sequences with fairly good consistency.
Besides, to cluster and classify the 90 users into clusters, 11,540 users were chosen randomly from
a specific group of Weibo users, of whom the total duration since the accounts opened was
between 50 - 1800, consistent with that of the 90’s. By conducting the same process to all the
users, we now obtained the final (11540 + 90)*102 time sequences of length 12 for learning and
predicting.
Smoothing and Fourier transforming
Missing values, referred particularly items equaling 0 in the sequences in our case, meant the user
didn't post any words in a certain period of time. The missing data effects statistical inference
much, since one didn’t post anything online never means that there was no linguistic behavior.
To deal with zero values in the sequences, we applied lpint (Martingale estimating equation local
polynomial estimator of counting process intensity function) in package lpint to the sequences.
Take social-life words (SLW), one of the typical patterns mentioned above, as an example, we
model the numbers of SLW by a doubly stochastic Poisson process N(t) with intensity process
Y(t)a(t), where Y(t) counts the words of Weibo posts at time t, and a(t) denotes the SLW rate at
time t. We estimated the intensity function with the local polynomial intensity estimator proposed
in (Chen, Yip, and Lam 2011), and the estimator for a(t) is given by
where
,
,
with the convention J(s)/Y(s) = 0 when Y(s) = 0 to protect against division by zero, and with the
notations introduced as follows. ei = (0, ..., 0, 1, 0, ..., 0)T is a (p+1)-dimensional unit vector with
1 as its i-th component, g(x) = (1, x, ..., xp/p!)T and Kb(·) = (1/b)K(·/b) is the scaled version of
the Epanechnikov kernel where bandwidth b is decided by a data-driven selector.
We got an output of a smoothed vector with length longer than length of the input vector by 2. The
smoothed sequence was obtained by excising the sub-sequence of the second to the last but one
items. By normalizing it we got the final sequence for later processing, while the same method
was implemented (11540 + 90) times, covering every user studied. (11540 + 90) smoothed and
normalized sequences were obtained.
Then we applied Fast Fourier Transformation again to the smoothed sequence to get the period
properties of them. For each of the 102 features, we combined descriptive statistics (mean values
and standard deviations) with fft coefficients and phase corresponding to the maximum amplitude,
which are extracted from the returned values of the fft function, and got a matrix
telling
characteristics about the given feature.Then we had a number of rows, each represented one of the
users with information of time sequence. So in all there were 204 matrices computed, 102 of them
based on the 11540 random users and other 102 based on 90 observations with labels 0,1 and 2.
K-means clustering
The 102 matrices of row number 11540 were for k-means clustering in our case. For each feature,
a proper value for the number of clusters k was found out by respectively calculating Silhouette
coefficient while k was possibly taken value between 1 and 7. We then applied function kmeans to
matrices and got 102 vectors with levels 1 to the selected number of k, each of length 11540,
describing nominally which cluster the subjects were in. Correspondingly we got 102 matrices of
cluster centers also.
Matrices telling properties of sequences of observations with labels were subtracted from the
centers obtained from kmeans clustering. Absolute values are calculated to show distances. We
classified each user into a certain cluster, which was noted by a number. From this we got a
90*102 matrix with every column nominal scales indicating several classes of time sequences. By
binding factor vector with levels 0,1 and 2 and length 90 with the 90*102 matrix we obtained a
matrix with 103 columns, the last column dependent variable. On this basis, classification could
be implemented and decision trees were to be drawn.
Drawing decision trees and predicting
We aimed at getting the relevant features to the labels and predicting by classifying and computing
decision trees. Two method were applied to do this work: rpart (Recursive Partitioning and
Regression Trees) in package rpart and train (Fit Predictive Models over Different Tuning
Parameters) gbm (Generalized Boosted Regression Modeling) in package caret.
In the rpart method, we draw regression tree based on random 3/4 of all the 90 observations with
the not chosen 1/4 used as test set, while by functions in package caret we remove variables whose
variance too small and apply function rfe to the training set for feature selection before modeling,
sampling as well. 3/4 random users for training and the rest 1/4 for testing.
Different from the first method, we set resampling method, the number of folds and the number of
complete sets of folds for cross validation and set the range of parameters needed in random forest
algorithm when building boosted models. The output of the modeling were selected variables,
confusion matrix out from the predicting process compared with the test set, resampling results
and computed relative influence of each variable in the gbm object, generated by function
summary.gbm.
From the two classification model we predicted the level of any unstudied time sequence of Weibo
users, corresponding to the factor vector label with levels 0, 1 and 2. Variables with the most
significant influence were also obtained, by running several times and finding the most frequently
appearing features in the summary part.
RESULTS
Since training set was random extracted, we got different models with different accuracy every
time. Here is a confusion matrix of the learning process using 10-folds.
Reference
Prediction 0 1 2
0 2 0 1
1 0 3 1
2 1 0 1
Accuracy : 0.6667
95% CI : (0.2993, 0.9251)
No Information Rate : 0.3333
P-Value [Acc > NIR] : 0.04242
Kappa : 0.5
Figure 1-5 are decision trees generated by rpart method, followed by confusion matrices
interpreting the effect of predicting.
----------------------------------
Confusion Matrix and Statistics
Reference
Prediction 0 1 2
0 2 1 0
1 0 3 0
2 1 0 2
Accuracy : 0.7778
95% CI : (0.3999, 0.9719)
No Information Rate : 0.4444
P-Value [Acc > NIR] : 0.04635
Kappa : 0.6667
To study which of the features influences most to the result, the following shows 3 independent
experiment of gbm fitting and summary.gbm.
--------------------------------------------
First 5 variables in the summary graph:
body words, auxiliary verbs, motion words, parenthesis, and time words
By counting frequency of variables during the computed relative influence, we get 10 most
significant ones:
punctuation_parenth, textmind_achieve, textmind_anx, textmind_auxverb, textmind_body,
textmind_feel, textmind_home, textmind_insight, textmind_motion, textmind_ppron
Discussion & Comparison with previous case studies
Previous studies worked on the correlation between suicide and LIWC features, selecting features
with small p values as significant ones (M. Fernández Cabana, 2012). Other reports show
comparison of factors like time career age and word type and conclude the most related treatment
(Stirman, 2001). Logistic regression is applied to some data as the independent variables were
viewed continuous (Masuda1, 2013). There are no studies on suicide dealing with a bunch of users
making use of LIWC before. In our case we classify the observations into several groups by
features and draw decision trees using group names made in classifying. Since all the features
expressed as nominal scales, there was no correlation test to be computed, and instead of p-value
showing the relationship between suicide and variables we obtained relatively most significant
ones in among all the features and statistics. Future studies, therefore, can start up in logistic
regression with Fourier coefficients of the sequences as independent variables.
Chinese materials were studied in our case, whereas most previous studies have only analyzed
materials written in or translated into English, while the writer’s original psychological meaning
and linguistic style may not be completely preserved after translation (Tim M.H. Li, 2014). Our
study differs from previous ones using Chinese version of the LIWC in that we studied a number
of social network site users and computed decision trees. Chinese-specific categories may further
reveal psychological cues of suicide that cannot be used in other languages (Tim M.H. Li, 2014).
Notice that we use cluster centers to notify properties of clusters, thus these centers should be
showed to demonstrate distinctive features for suicide groups. According to decision trees gained
from different training sets, among the 10 most significant features, we got 4 relative to group 0,
that is, users who committed suicide.
punctuation_parenth
AVG
SD
0
1
2
Arg1
1 15.13012161 14.51798345 0.395844657 0.287937124 0.205698385 0.031531324
2 2.741153902 2.866167462 0.382331809 0.310391627 0.192305825 0.019072178
3 8.239399639 6.85765465 0.42652605 0.295963262 0.197711739 0.033835113
textmind_auxverb
AVG
SD
0
1
2
Arg1
1 0.859780602 1.13359216 0.42544777 0.351378434 0.192942227 -0.030703143
2 0.45646321 0.643238929 0.381737123 0.360421457 0.198317093 -0.028562451
3 1.23507966 2.083186149 0.364611951 0.330547531 0.219752759 -0.016703396
4 1.569081052 0.761592293 0.495306702 0.273604439 0.168876502 0.101621611
5 2.746256923 5.222238298 0.300807037 0.307408881 0.230586356 0.007398932
6 2.288426194 2.067912902 0.457584683 0.305631784 0.191989699 0.044695307
7 0.035452023 0.099684427 0.09538323 0.127791217 0.076010697 0.011927493
textmind_ppron
AVG
SD
0
1
2
Arg1
1 4.886485982 5.88412429 0.390026292 0.309999442 0.20601711 -0.006538162
2 2.605513666 3.248422761 0.4117724 0.320524585 0.206776553 -0.002718911
3 1.357334981 1.392897273 0.410696572 0.324519575 0.187144587 0.005262552
4 3.547252654 1.608387298 0.497152643 0.275347883 0.168847521 0.063698304
textmind_body
AVG
SD
0
1
Arg1
1 2.395603793 4.59783583
0.301782598 0.318970376 0.037743009
2 0.129525066 0.263360931 0.228623388 0.266353604 -0.012259764
3 1.492920946 0.917740263 0.488347043 0.288160849 0.105404415
4 0.649327344 0.671164326 0.450879339 0.338566756 0.009294324
5 3.877760453 9.115389734 0.219022062 0.296123209 0.038607001
6 0.894588789 1.546070027 0.362208628 0.344195046 -0.012441021
7 1.666291015 2.568380012 0.360546753 0.324560843 0.027588917
From the decision trees we see that in the use of parentheses, the suicide group are matched with
time sequences in cluster 2. Relatively low average value, small standard deviation and phases
corresponding to max amplitudes near 0 are mainly observed to describe the characteristic of this
cluster of curves, among which phases near 0 mean that the sine waves with the largest amplitudes
start at somewhere near time 0. For use of auxiliary verbs, group of suicides were found high at
both FFT coefficient of 1 Hertz and average value (see at parameters of cluster 2, 4, 5, 6 and 7).
The large coefficients corresponding to 1 Hertz may imply that the time sequence curves are of
relatively significant property of forming one whole sine period.
Besides parentheses and auxiliary verbs we got personal pronouns also relative to classifying
groups. All the 4 clusters except the third one are divided to node with suicide group. Comparing
parameters we found that cluster 3 has got the lowest level of average value and the smallest
standard deviation, which means the suicide group is of relatively much use of personal pronouns,
which is in line with previous reports. Another result different from former studies is the use of
body words. Cluster 3, 4, 5 and 7 are claimed to be related to suicide group and most curves in
these clusters share a similarly high level of phase to the max amplitude. Also coefficients of 0
Hertz are distinctively larger than the other two matched groups, showing that tiny fluctuations are
recorded in the curves of suicide group.
CONCLUSION
Relationship between suicide and linguistic performance has been studied for long. Previous cases
used several methods, including method to treat posting frequency, and the studies focused on
materials in several languages, on and off-line. We didn’t get the consistent results with former
cases except use of pronouns. However there are limitations in our study. 90 is a rather small
sample size for classifying users with known labels 0, 1 or 2, and high-score group and low-score
group might not be exactly classified. Besides, the CLIWC categories shows only the originally
used meanings of the words with no other meanings like irony or sarcasm, not to mention the
meaning of the contents.
Still, it is an interesting field for future studies to deal with linguistic and behavioral characteristics
of suicides. Our work provides a new method to see into the problem and gives different results
from previous studies, which may help to the prediction and cure of psychological health.
REFERENCE
Bailey, R.K., Patel, T.C., Avenido, J., Patel, M., Jaleel, M., Barker, N.C., Khan, J.A., Ali, S.,
Jabeen, S., (2011). Suicide: current trends. J. Natl. Med. Assoc. 103, 614–617.
Cheung, G., Merry, S., & Sundram, F. (2015). Late-life suicide: Insight on motives and
contributors derived from suicide notes. Journal of affective disorders, 185, 17-23
Christensen, H., Batterham, P., O'Dea, B., 2014. E-health interventions for suicide prevention. Int.
J. Environ. Res. Public Health 11, 8193–8212.
Clark, S. E., & Goldney, R. D. (2000). The impact of suicide on relatives and friends. The
international handbook of suicide and attempted suicide, 467-484.
Fernández-Cabana, M., et al. (2013). "Suicidal Traits in Marilyn Monroe’s Fragments." Crisis
34(2).
Gao, Rui, et al. "Developing simplified Chinese psychological linguistic analysis dictionary for
microblog." Brain and Health Informatics. Springer International Publishing, 2013. 359-368.
Gençöz TOP. (2006). Associated factors of suicide among university students: importance of
family
environment.
Contemporary
Family
Therapy
28:
261-268.
DOI:
10.1007/s10591-006-9003-1.
Guan, L., et al. (2014). Identifying Chinese Microblog Users with High Suicide Probability using
Internet-based Profile and Linguistic Features: Classification Model.
Huang C, Chung C, Hui N, Lin Y, Seih Y, Lam B, Pennebaker J. (2012). The development of the
Chinese Linguistic Inquiry and Word Count Dictionary. Chinese Journal of Psychology 55:
185-201.
Jordan, J. R., & McIntosh, J. L. (2011). Suicide bereavement: Why study survivors of suicide loss.
Grief after suicide: Understanding the consequences and caring for the survivors, 3-17.
Li L, Li A, Hao B, Guan Z, Zhu T. (2014). Predicting active users' personality based on
micro-blogging behaviors. PLoS ONE9: e84997 DOI 10.1371/journal.pone.0084997.
Li, T. M., et al. (2014). "Temporal and computerized psycholinguistic analysis of the blog of a
Chinese adolescent suicide." Crisis 35(3).
Masuda, N., et al. (2013). "Suicide ideation of individuals in online social networks." 9(1).
McCarthy, M. J. (2010). Internet monitoring of suicide risk in the population. Journal of affective
disorders, 122(3), 277-279.
Murano G. (2014). 8 shocking suicide attempts posted on the Internet. Available at
http://www.oddee.com/item 98907.aspx (accessed 8 July 2015).
Naud H, Daigle M S. (2010). Predictive validity of the Suicide Probability Scale in a male inmate
population. Journal of Psychopathology and Behavioral Assessment 32: 333-342. DOI:
10.1007/s10862-009-9159-8.
Pestian, J. P., Matykiewicz, P., Linn-Gust, M., South, B., Uzuner, O., Wiebe, J., ... & Brew, C.
(2012). Sentiment analysis of suicide notes: A shared task.Biomedical informatics insights,
5(Suppl 1), 3.
Stirman, et al. (2001). "Word use in the poetry of suicidal and nonsuicidal poets." Psychosomatic
Medicine 63(4).
Sueki, H. (2015). The association of suicide-related Twitter use with suicidal behaviour: A
cross-sectional study of young internet users in Japan. Journal of affective disorders, 170,
155-160.doi: 10.1016/j.jad.2014.08.04
Tausczik, et al. (2010). "The Psychological Meaning of Words: LIWC and Computerized Text
Analysis Methods." Journal of language and social psychology 29(1).
World Health Organization, (2014). Preventing Suicide: A Global Imperative. World Health
Organisation, Geneva, Switzerland.
|
1308.6118 | 1 | 1308 | 2013-08-28T10:25:02 | Using tf-idf as an edge weighting scheme in user-object bipartite networks | [
"cs.SI",
"cs.IR",
"physics.soc-ph"
] | Bipartite user-object networks are becoming increasingly popular in representing user interaction data in a web or e-commerce environment. They have certain characteristics and challenges that differentiates them from other bipartite networks. This paper analyzes the properties of five real world user-object networks. In all cases we found a heavy tail object degree distribution with popular objects connecting together a large part of the users causing significant edge inflation in the projected users network. We propose a novel edge weighting strategy based on tf-idf and show that the new scheme improves both the density and the quality of the community structure in the projections. The improvement is also noticed when comparing to partially random networks. | cs.SI | cs |
Using tf-idf as an edge weighting scheme in
user-object bipartite networks
Sorin Alupoaie, P´adraig Cunningham
School of Computer Science & Informatics
University College Dublin
[email protected],[email protected]
May 11, 2014
Abstract
Bipartite user-object networks are becoming increasingly popular in rep-
resenting user interaction data in a web or e-commerce environment. They
have certain characteristics and challenges that differentiates them from other
bipartite networks. This paper analyzes the properties of five real world
user-object networks. In all cases we found a heavy tail object degree dis-
tribution with popular objects connecting together a large part of the users
causing significant edge inflation in the projected users network. We pro-
pose a novel edge weighting strategy based on tf-idf and show that the new
scheme improves both the density and the quality of the community struc-
ture in the projections. The improvement is also noticed when comparing to
partially random networks.
1
Introduction
Social networks are becoming increasingly popular for modeling interactions be-
tween nodes or individuals of the same kind (one-mode or unipartite) and there is
a large amount of work recently focusing on various aspects of social networks.
However some real-world networks have a more heterogeneous structure where
two kinds of individuals (or items) interact with each other with ties formed be-
tween individuals of different types only. Bipartite networks (two-mode) are a
natural fit for these sort of systems as they are represented as a graph with two
disjoint sets of nodes and edges exists only between nodes from different sets.
There are many examples of complex networks that have a bipartite structure,
1
such as actor-movie networks, where actors are linked to movies they played in
(Guillaume & Latapy, 2004), authoring or collaboration networks, where authors
are linked to the paper they published (Newman, 2001a), human sexual networks,
consisting of men an women (Liljeros et al., 2001) and the metabolic networks
between chemical reactions and metabolites (Jeong et al., 2000). Even though
there is a lot more focus on social networks in the scientific community, research
on bipartite or two-mode networks has moved forward in the last couple of years.
User-object networks are emerging as a special class of bipartite networks with
certain characteristics that are different than the relatively well studied author-
paper and actor-movie networks. Users interact continuously with objects, based
on their own selection and preference. This representation is appropriate for mod-
eling activities in web and e-commerce environments. For example the social tag-
ging, music listening activity or movie watching can be modelled as an user-object
network. In certain cases these networks can be also referred as consumer-product
networks where an edge links a consumer with a product when the former buys or
views that particular product (Huang et al., 2007).
One particular characteristic of user-object networks is the presence of a sig-
nificant number of highly popular objects reflected by the heavy tail distribution
of the objects degree (Shang et al., 2010). The heavy tail is believed to be formed
through preferential attachment (Barabasi et al., 2002), where users tend to inter-
act more with objects that are already popular. These popular objects have a sig-
nificant effect on the properties of both bipartite and projected networks, causing
significant link inflation in the latter. On the other side they are a poor indicator of
users interests, while unpopular objects are the best at describing common tastes
shared by users (Shang et al., 2010). In this paper we are proposing a method
of (re)assigning weights to edges in a bipartite user-object network based on the
popular tf-idf method that will reduce the effect of popular objects while taking
into account user’s preferences. We validate the new method by showing that both
density and community structure of the projected users network is improved com-
pared to both the original projected network and the network generated partially
in a random fashion.
The remainder of the paper is structured as follows. Next section reviews
the state of the art literature on bipartite and user-object networks. In section 3
we provide a comprehensive analysis of user-object networks and their properties
and challenges, including density and clustering. Section 4 proposes the new
weighting scheme based on tf-idf. In section 5 we validate the proposed approach
by comparing densities and modularities of the projected users network to the
random case. Finally, we conclude the paper in section 6 by summarizing our
findings and pointing out future research directions.
2
2 Related work
One popular approach when analyzing two-mode networks is to transform them
into one-mode networks through a method known as projection and then use
the methods available for social networks. Newman (2001a) and Barabasi et al.
(2002) study scientific collaboration networks between authors of scientific papers
by projecting the authoring network (author-paper) to an unweighted co-authoring
network (author-author). A tie is defined between two authors if they have at least
one collaboration together, without taking into account the frequency of collab-
oration between the authors. In order to avoid the loss of information through
unweighted projection, some authors proposed a weighting method. Ramasco &
Morris (2006) and Li et al. (2007) use a simple mechanism to assign weights,
based on the number of times those authors collaborated. Other papers propose
a different approach to weighting. In Newman (2001b) the contribution of a co-
authored article to the weight of an edge between two authors depends on the
degree of the article. This is based on the assumption that a low degree article
defines a stronger relationship between authors than a high degree one. Li et al.
(2005) considers a saturating effect where the increase in strength of a relationship
between two authors slows down when more articles are added, as they already
know each other well after writing some papers together.
In order to avoid loss of information through projection (weighted or un-
weighted), several features and methods have been proposed for bipartite net-
works, most of them borrowed from social networks. Borgatti & Everett (1997)
studies visualization techniques of bipartite networks and defines several proper-
ties for these type of networks like density and centrality. Latapy et al. (2008)
uses several statistics to analyze two-mode data and proposes new bipartite prop-
erties like clustering coefficient and redundancy coefficient. Lind et al. (2005)
and Zhang et al. (2008) redefine the clustering coefficient for bipartite networks
by considering squares (4-cycles) instead of triangles, which are not possible in
a two-mode configuration. Opsahl (2011) proposes a new measure of clustering
based on the notion of triadic closure defined between three nodes of the same
type. Several community detection methods have been proposed for bipartite net-
works (Fortunato, 2010). However most of these methods are not optimized for
large networks on the scale seen in web or e-commerce environment. Therefore
when detecting communities in bipartite networks a widely used approach is to
project them on one of the node sets and apply scalable community detection
methods from social networks on the projection.
The research work mentioned above focused either on specific networks like
collaboration network or generally on bipartite networks. They didn’t consider
user-object networks as a particular class of bipartite networks. On the other
side, especially in a web or online environment user-object networks with their
3
particularities are becoming increasingly popular in modeling the interaction be-
tween users (e.g. customers, listeners, watchers etc) and the online system (e.g.
e-commerce, music, video etc). Huang et al. (2007) is analyzing the bipartite
consumer-product graphs representing sales transactions in an e-commerce set-
ting. They found a larger than expected average path length and tendency of
customers to cluster according to their purchases. A new recommendation algo-
rithm is proposed based on these findings. Grujic et al. (2009) uses a bipartite
representation of interactions between users and web databases to study patterns
of clustering based on users common interests. They found a power law degree
distribution of objects and a disassortative mixing pattern with high degree (ac-
tive) users interacting mostly with low degree (unpopular) objects and low degree
(inactive) users interacting mostly with high degree objects (popular). The authors
applied a spectral clustering method on the weighted projected network and found
communities relevant to subjects of common interests.
Recently, Shang et al. (2010) did an empirical analysis of two web-based user-
object networks collected from two large-scale web sites and found the same
power law degree distribution for objects and disassortative mixing pattern. A
new property is proposed called collaborative similarity capturing the diversity of
tastes based on the collaborative selection. For the lower-degree objects the au-
thors found a negative correlation between object collaborative similarity (how
similar are the users interacting with a specific object) and the object degree.
Therefore unpopular (low degree) objects are considered a good indicator for the
users common interests, while popular objects are less relevant. Starting from
this observation we propose a new weighting scheme for user-object bipartite net-
works that will increase the relevance of unpopular object in the network and
decrease the importance of popular ones.
3 Characteristics of user-object networks
A user-object network can be represented as a graph G = (U, O, E), where U is
the users set, O is the objects set and E ⊆ (U × O) is the set of edges between
users and objects. We denote by nu = U and no = O the number of users and
the number of objects, respectively. We denote by m = E the number of links
or edges in the bipartite network. We define (cid:104)kU(cid:105) ((cid:104)kO(cid:105)) as the average degree of
users (objects) and the density of the network as δ(G) = m
nonu
In user object networks interactions between the two types of nodes, U and O,
are event-driven, occurring continuously, and often the same edge is reinforced
multiple times. This reinforcement can be represented as a weight assigned to
the edge between the two interacting nodes. On the other side, in most bipartite
networks there is only one interaction between two nodes (an actor can only play
.
4
Figure 1: Example of weighted bipartite network where users (blue nodes) are
connected with objects (red nodes).
once in a movie).
The behaviour of nodes is also particular. Users are active while objects are
passive. This is similar to author-paper networks but different than other bipartite
networks such as human sexual networks where both nodes are active (Shang
et al., 2010).
Figure 1 illustrates a small example of a weighted bipartite network where
five users (blue nodes) are interacting with six objects (red nodes). Thickness of
an edge shows how strong the interaction is between the user and the object (i.e.
how often the user ‘touches‘ the object). The degree of an user u ∈ U, denoted
by d(u), represents the number of objects connected to that user. Similarly, the
degree of an object o ∈ O, denoted by d(o), is the number of users interacting
with that object. In our example, user 1 interacts with three objects a, b and d
(has a degree of three). Out of these, objects a and b are local as they are only
connected to two users (1 and 2), while object d reaches most of the network by
being connected to four out of a total of five users. Therefore objects a and b are
more relevant to particular interests of user 1 than object d.
3.1 Data
We are using five real-world data sets and look at the characteristics of the related
user-object networks such as basic statistics, degree distributions and clustering.
The first one is a subset of the Last.fm Million Song Dataset (Bertin-Mahieux
et al., 2011), where users are connected to tags, with an edge defined between an
user and a tag if that user assigned the tag to an artist.
The second dataset was extracted from Twitter and includes tweets related to
US Politics, covering the period 01/01/2012 - 19/01/2012. This is a subset of
a bigger dataset including the US Presidential Campaign and Elections during
2012. The users in the data are the Presidential candidates, governors, senators,
5
political organisations, and journalists. The objects are the web domains included
in their tweets. An edge is formed between an user and a domain if the domain
was tweeted by that particular user.
The third dataset is a subset of a bigger database published by Audioscrob-
bler.com containing information about users and the music they listened. In the
network representation, an user is connected to an artist with edges weighted
based on how often they listen songs from that artist. The Movielens dataset
includes ratings (from 1 to 5) of movies by 2000 users, represented as a network.
For the purpose of this paper only edges with ratings 4 and 5 were considered
(movies that users actually liked). Finally, the last dataset comes from the popular
social bookmarking web site delicious.com and includes the network of 973 users
and the tags they used for bookmarking.
Data
Last.fm
Twitter
Audioscrobbler
Movielens
Delicious
nu
1,892
1,842
183
2,000
973
no
9,748
3,744
21,443
3,336
28,695
m
35,813
13,864
39,195
192,922
126,007
(cid:104)kU(cid:105)
18
7
214
96
129
(cid:104)kO(cid:105)
3
3
1
57
4
δ(G)
0.19%
0.2%
1%
2.9%
0.45%
Table 1: Statistics of the five real-world datasets.
The basic statistics for these networks are presented in Table 1. All networks
have relatively low density (they are sparse), between 0.19% and 2.9%. This is
important because it allows for optimization of clustering and community detec-
tion algorithms. As we will see below this is not the case for the projections of
these bipartite networks.
3.2 Projection
Due to the shortage in tools and notions available for two-mode networks a com-
mon approach is to transform such a network into its projection by using one of
its sets of nodes as a base. For example one can project the network on the users
U (objects O) by setting a (weighted) edge between two users (objects) that have
at least one object (user) in common. Based on the number of common objects
(users), weights can be assigned to edges in the projected network. We define
the users-projected network as GU = (U, EU ) and objects-projected network as
GO = (O, EO). The number of edges is mU = EU and mO = EO, respectively.
no(no−1),
The density of the projected networks is δ(GU ) = 2mU
respectively.
nu(nu−1) and δ(GO) = 2mO
6
One of the unwanted effects of projection is an inflation of the number of links
in the resulted network (Latapy et al., 2008), which can be noticed in random
networks as well. Newman et al. (2001) have shown that projecting a random
bipartite graph can result in very dense networks with high clustering coefficient.
In the real world case these dense networks are limiting the computations that
could be performed to extract properties and detect community structure.
Data
Last.fm
Twitter
Audioscrobbler
Movielens
Delicious
mU
686,536
446,892
10,453
1,786,647
395,835
mO
322,226
88,044
11,253,485
2,879,932
7,378,472
δ(GU )
δ(GO)
38.3% 0.6%
26.3% 1.2%
62.7% 4.9%
89.3% 51.7%
83.7% 1.8%
Table 2: Statistics of projections of the real-world bipartite networks.
For example, as shown in Table 2, the density is increasing when projecting the
real world networks on both user-nodes and object-nodes. However, the inflation
of links is considerably (up to 200 times) larger for the projection on user-nodes,
while the projection on object-nodes has a density in most cases only several times
higher than the original bipartite network. As we will see below this is caused by
the small number of very popular objects, the tail of the power law distribution of
object degrees.
3.3 Degree distributions
One of the most important structural property of networks is the degree distri-
bution. In the case of bipartite networks and users-objects networks specifically,
distributions of both types of nodes are considered. According to previous studies,
users degree generally follow an exponential distribution (Latapy et al., 2008), or
stretched exponential (Laherrere & Sornette, 1998) at most, as shown in Shang
et al. (2010) or Grujic et al. (2009). On the other side, according to the same
papers, the degree distribution of objects follow a heavy tail distribution (power
law or similar). This has important consequences on the structure of the projected
network and also on the process of clustering the user nodes. Other bipartite net-
works like author-paper or actor-movie doesn’t exhibit this property as there is an
inherent constraint on how many authors can write a paper or how many actors
can play in a movie.
Degree distributions of our sample user-object networks are shown in figures
2 and 3. In order to find the closest model that fits the data, for each such em-
pirical distribution we evaluate the goodness of fit of multiple distribution mod-
7
(a) Last.fm Users
(b) Twitter Users
(c) Audioscrobbler Users
(d) Movielens Users
(e) Delicious Users
Figure 2: Degree distributions of users for the real world data sets
els by using loglikelihood ratios as described in Clauset et al. (2009). The best
fit is found through comparing multiple models two by two: exponential, power
law, log-normal and stretched exponential. In each comparison we calculate the
loglikelihood ratio between two candidate distributions. This value will indicate
which model is a better fit for the data. Also a p-value is calculated for each
comparison showing how significant the result is.
In table 3 we show the best distribution fit and the related parameters for each
dataset. While degree distribution for users (active nodes) don’t expose a heavy
tail in most cases (exponential), the degree distribution for objects (passive nodes)
fits to one of the distribution models with a tail that is not exponentially bounded
(power law or lognormal). Due to the number of high degree values (highly pop-
ular objects), a heavy tail with heterogeneous distribution of degrees has a sig-
8
(a) Last.fm Tags
(b) Twitter Domains
(c) Audioscrobbler Artists
(d) Movielens Movies
(e) Delicious Tags
Figure 3: Degree distributions of objects for the real world data sets
Data
Last.fm
Twitter
Audioscr
Movielens
Delicious
Users
Objects
Best fit
Parameters
exponential
λ = 0.054
lognormal
µ = 1.41
exponential λ = 0.0046
lognormal
µ = 4.07
exponential λ = 0.0081
Best fit
Parameters
lognormal µ = −33.18
powerlaw
α = 2.05
µ = −2.75
lognormal
lognormal
µ = 2.84
µ = −9.34
lognormal
Table 3: Best fit for degree distributions, users and objects.
nificant impact on the structure of the projected network and consequently on the
community structure.
9
3.4 Clustering and impact of highly popular objects
Clustering or community structure (Newman & Girvan, 2004) is another property
of user-object or consumer-product networks. Users or consumers tend to cluster
together based on the common interests represented by the common objects they
are interacting with (Huang et al., 2007). This property sits at the core of the
recommender systems based on collaborative filtering (Breese et al., 1998). How-
ever, detecting communities in bipartite networks is somehow challenging with
few optimized options available at large scale (Fortunato, 2010).
A popular approach is to project the bipartite network on one of its node sets
(U or O) and apply the community detection algorithm on the projected network.
As seen above, the projection of user-object networks where degrees of objects
follow a power law distribution is causing edge inflation in the resulted network
by increasing significantly the density of edges (hundreds of times more). This
affects the clustering in two ways. First, it ‘dilutes‘ the clusters and decreases the
quality of the community structure because of a highly homogeneous distribution
of edges among the nodes (Fortunato, 2010). Second, it causes a drop in per-
formance of community detection algorithms, most of them optimized for sparse
networks. For example, popular algorithms like Clauset et al. (2004), Raghavan
et al. (2007) or Blondel et al. (2008) scale extremely well on sparse data but are
much less efficient when networks are very dense (number of links m are much
larger than number of nodes n).
In our case, due to the heavy-tail distributions of objects, user-projections of
all five real-world networks are extremely dense ranging from 26% to 89% (Table
2) causing difficulties such as those described above. For example, by looking at
the most popular objects in Table 4 one can see that the highest degree node in
each case connects together more than a third of users and in some cases even
50%.
On the other side, these highly popular objects contain very little or very high
level information about the particularities of the adjacent users and are not very
meaningful for grouping users together.
For example, while Last.fm tags like ’rock’, ’pop’ or ’alternative’ might con-
tain some high level information on the users groups, it doesn’t bring specific
information about these. In the meantime, unpopular (degree 5) tags like ’sym-
phonic rock’, ’david bowie’ or ’true norwegian black metal’ are showing nar-
row user interests. Also, highly popular tweeted domains like ’twitter.com’ or
’facebook.com’ are very broad with little clustering information, while unpopular
domains like ’radioamerica.org’ or ’seacoastonline.com’ are much more specific.
This is in line with Shang et al. (2010) who found that users connected to unpop-
ular objects have much higher similarity to each other than the average. Therefore
unpopular objects are considered a better indicator for users common interests
10
Tag
rock
pop
alternative
Degree Users
linked
35.5%
30.9%
28.1%
673
585
532
Domain
twitter.com
facebook.com
youtube.com
Degree Users
linked
33.2%
24.5%
17.6%
611
451
324
(a) Last.fm user-tag
(b) Twitter user-domain
Artist
Radiohead
Coldplay
The Beatles
Degree Users
linked
35.5%
30.6%
28.9%
65
56
53
Movie
American Beauty
Star Wars IV
Star Wars V
Degree Users
linked
50.4%
42.7%
42%
1009
855
841
(c) Audioscrobbler user-artist
(d) Movielens user-movie
Tag
design
video
google
Degree Users
linked
56.1%
55.8%
50.2%
546
543
489
(e) Delicious user-tag
Table 4: Top objects by degree with percentage of users each object connects.
than popular ones.
One simple way to handle this problem is to remove the objects with the high-
est degree, but this will result in loss of information overall, especially in cases
when these objects are reinforced frequently by some users. The proposed method
in section 4 will address this issue by trying to find a balance between how often
an user interacts with an object and how popular an object is in the network.
4 Edge weighting using tf-idf
One of the most common methods used in information retrieval is the term fre-
quency - inverse document frequency (or tf–idf ), a weighing scheme for quanti-
fying the importance of a term to a document in a collection (Salton & Buckley,
1988). The tf–idf weight is assigned to each term-document pair and is propor-
tional to the relative frequency of the word in the document, adjusted by the pro-
portion of that word over the entire collection. This method and variations of it
are used by search engines as a central component for ranking the relevance of a
11
document to a query, but also in other applications like text summarization and
classification.
The tf–idf weight of a term t for a document d in a collection D is defined as
the product of the term frequency and inverse document frequency:
wd(t) = fd(t) × log(
D
{d ∈ D : t ∈ d})
(1)
The term frequency fd(t) in equation 1 can be the raw or relative frequency
of the term t in the document d. The inverse document frequency (second part of
the product) measures whether the term is common or rare across all documents
in the collection D and is calculated by taking the logarithm of the fraction of the
size of the collection D to the number of documents containing the term t.
We propose a similar approach for (re)weighting a user-object bipartite net-
work in order to reduce the impact of highly popular objects on projection and
clustering. Let us replace the documents in the tf–idf scheme with users and terms
with objects, and define a weighting scheme as below:
U
d(o)
wnew(u, o) = f (u, o) × log(
)
(2)
The new weight (2) of an edge between an user and an object can be recal-
culated as the product of the normalized object frequency and the logarithm of
the inverse object frequency across all users. The former represents the number of
object-user interactions (edge weight) with some normalization technique applied.
Normalization is required to prevent a bias towards more active users. For exam-
ple one can normalize the weight of an edge between an user and an object by
taking the ratio of its value to the maximum weight of any given edge connected
to that user (3).
f (u, o) =
w(u, o)
max{w(u, p) : p ∈ N (u)}
(3)
The last part of the product in equation 2 is similar to the concept of inverse
document frequency and measures whether the object is common or rare across all
users. It is calculated by dividing the total number of users by the (unweighted)
degree of the object (number of users interacting with the object), and taking the
logarithm of this value.
The re-weighting scheme presented above assigns higher values to frequent
interactions between users and objects offset by how popular an object is within
the collection of users. Unpopular objects increases the weight of an interaction
while very popular ones make the interaction less significant.
Once the new weights have been calculated, thresholding can be applied to
filter out irrelevant edges. As we’ll see in section 5, this reduces significantly
12
(a) Example network with tf-idf weights
(b) Filtered network τ = 0.3
Figure 4: Example of user-object network with tf-idf weighting and filtering ap-
plied
the edge inflation in the projected networks while increasing the quality of par-
titions resulted from community detection and improving the performance of the
algorithms.
Figure 4 illustrates the network example from section 3 (figure 1) with the
proposed tf-idf method applied. Weights are assigned to edges based on their ini-
tial value and transformed through equation 2. In our example they vary between
0.1 and 2.3. The thickness of an edge is proportional to the resulted weight after
tfidf is applied. As illustrated in figure 4a, the lowest values are assigned to edges
pointing at the highest degree object d. This object is connected to four out of five
users. The highest weights are assigned to edges connecting users to unpopular
or local objects, for example a and b. The initial weight is also taken into consid-
eration with higher weights assigned to edges having higher initial value. In our
example, edge 1d has higher tfidf weight than 2d, even though both edges end in
the same node d.
After filtering out all edges with weights smaller than a threshold (in this case
τ = 0.3), the resulted network has a simpler and more intuitive structure, con-
taining only relevant edges (figure 4b). In the next section, we will validate the
proposed approach and confirm this observation on large real-world networks.
5 Evaluation
To illustrate the proposed method for user-objects network we apply it to Davis’s
Southern Women dataset (Davis et al., 1941) and the five real-world datasets pre-
sented in section 3. First we are going to analyse Davis’s data in more detail.
13
(a) Tf-idf weights
(b) Filtered network τ = 1
Figure 5: Southern Women dataset with tf-idf weights and filtering applied
5.1 Southern women
The Southern women data was collected by Davis et al. (1941) during the 1930s
and describes the participation of 18 women in 14 social events. It can be repre-
sented as a bipartite network (figure 5) whose nodes are women (blue nodes) and
social events (red nodes). Edges are participation of the women in the events.
This dataset and the related bipartite network was very well studied by social
scientists. Based on the ethnographic information Davis divided the 18 women
into two groups: women 1-9 in the first group, women 9-18 in the second. Later,
Freeman (2003) analyzed the outcome of 21 different studies, which generally
identified almost the same two groups, women 1-9 and 10-18. However in some
of these studies women 8, 9 and 16 were often identified as either belonging to
both groups or positioned at the periphery of a group.
We applied the proposed weighting scheme to the Southern women dataset
and represented the resulted network in Figure 5a. As in the previous example,
the thickness of an edge is proportional to the tfidf weight. From this figure it is
easy to notice that edges connected to very popular events (25, 26 and 27), where
most of women participated, were assigned lower weights than edges connected to
14
(a) Lastfm
(b) Twitter
(c) Audioscrobbler
(d) Movielens
(e) Delicious
Figure 6: Ratio of edges (green-triangle) deleted for each threshold and number
of users in the resulted real (blue-diamond) and random (red-square) networks
local events (19-24 and 28-32). By applying a threshold and removing the lower
weights, two core groups of women are emerging, as in Figure 5b: first group 1-9
and second 10-18. It can be easily noticed that women 8 and 9 have a weaker
connection to the first group comparing to the other nodes in the group, while
woman 16 remains isolated from both groups.
5.2 Experiments
Next we apply the following method to each of the real world datasets. We
(re)assign the weights of edges based on the tf-idf formula as in equation 2 and
define a range of thresholds τ ∈ {0.1, 0.5, 1, 1.5, . . . , 6}. For each value τ a new
network Gτ = (U τ , Oτ , Eτ ) is generated by removing the edges with tfidf weights
15
less than the threshold. Remaining nodes with no edges are removed as well. We
project the resulted network on user-nodes (Gτ
O) and apply the Louvain method
for community detection (Blondel et al., 2008) in the projection. The modularity
values of the resulted partition will show the quality of the community structure
(Newman & Girvan, 2004).
In order to demonstrate that the proposed weighting scheme for user-object
networks improves the quality of clustering in the projections while reducing sig-
nificantly their density, for each threshold value we generate 100 similar networks
with the same number of edges removed randomly. The resulted random networks
will have the same size (nodes and edges) as the one resulted after applying the
threshold, but instead of deleting edges with tf-idf weights smaller than a thresh-
old we remove them at random. We apply the same community detection method
on projections of each of these networks and compare the average modularity
across all randomly generated networks (random modularity) with the value re-
sulted from the network where a threshold was applied. If the random modularity
is smaller than the real value then the proposed method improves quality of the
community structure in the projected networks.
In figure 6 we represent the percentage of edges removed after applying each
threshold value as above along with the number of users remaining in both real
and random networks. The number of users for random networks was averaged for
all 100 generated instances. It is quite obvious from this figure that up to a certain
threshold value (which depends on the network) the number of user nodes remains
(almost) the same after filtering is applied, even though a significant number of
edges were removed. However, in most randomly generated networks the number
of user nodes decrease at a steeper rate with the threshold. This observation is
particularly visible in Twitter and Audioscrobbler networks where. after deleting
59% (threshold 1.5) and 97% (threshold 2) respectively of edges, the number of
user nodes remains the same. In the meantime, in the random case in both net-
works there are around 20% less user nodes at the same threshold values. Also, the
ratio of edges deleted by applying a threshold is much higher for Audioscrobbler
and Delicious networks comparing to the other networks. For example, for these
two networks 97%, respectively 96%, of edges are removed for a threshold value
of 2, while for the other three networks only 11% (Movielens), 62% (Lastfm) and
67% (Twitter) of edges were removed. This points to a different distribution of
tf-idf weights for various networks and this difference has to be considered when
selecting the most appropriate range of thresholds.
By applying the proposed method and filtering out edges up to a threshold
value we are preserving the same number of user nodes (assuming a limit for
the threshold), while significantly reducing the number of edges. The resulted
network will have a lower density and a more clear structure, reflecting users
most important interests.
16
(a) Lastfm
(b) Twitter
(c) Audioscrobbler
(d) Movielens
(e) Delicious
Figure 7: Density of user-projected network, real (blue-diamond) and random
(red-square)
Next we calculate the density of the user-projected networks resulted by ap-
plying the tfidf weighting scheme with threshold filtering to the original network
and projecting it on the user nodes (user-projected network). Both real and ran-
dom (edges removed randomly) cases are considered for multiple values of the
threshold between 0 and 6. As above, the random density is averaged for all 100
generated instances. As shown in figure 7, density in real networks is lower than in
random networks, for all datasets. This difference is particularly visible in Lasfm,
Twitter, Movielens and Delicious datasets, where, for some threshold values, den-
sity can be up to 60% less comparing to random. If we get the Twitter network for
example and select a threshold of 1.5 (no user nodes are removed by filtering) the
density of the user-projected network is 4.3, 82% less than the original projected
network before filtering (24.6) and 50% less than the averaged density for random
17
(a) Lastfm
(b) Twitter
(c) Audioscrobbler
(d) Movielens
(e) Delicious
Figure 8: Modularity values for partitions of user-projected network, real (blue-
diamond) and random (red-square)
network (8.67).
Finally, after applying the Louvain method for community detection on the
user-projected networks, we calculate the modularity of the resulted partitions
and compare the values for real and randomly generated networks (the latter av-
eraged over the 100 random instances). These values, for multiple thresholds, are
represented in figure 8. As mentioned earlier, thresholds have a bigger impact
on Audioscrobbler and Delicious networks with a large part of edges removed
(96-95%) for a value of 2 or higher. Therefore in these two cases we limit the
threshold to 2.5.
It’s easy to notice that modularity is constantly increasing when higher thresh-
old values are used and more edges are filtered out. Also, for all of our datasets
the modularity values are higher in real networks comparing to random networks,
18
with this difference being quite significant in most of the cases. For example, tak-
ing the same threshold value of 1.5 for Twitter dataset, the random modularity is
34% lower than the modularity for the real projected network. Similarly, in the
Lastfm dataset random modularity is up to 54% lower (theshold 2) comparing to
its value for the real network. The only exception is in Twitter case for the thresh-
old value of 3 where the two modularities (real and random) are almost the same.
However, we suspect this might be caused by the resolution limit in modularity
and perhaps relative instability of the Louvain method (Fortunato & Barthelemy,
2007).
From above we saw that applying the proposed tfidf method and filtering out
edges below a certain threshold significantly improves both the density of the bi-
partite and user-projected networks and the quality of the community structure of
the user-projected network as measured by modularity. This improvement is also
visibly better than filtering out edges randomly without using the tfidf weights.
Therefore the resulted network has a simpler and more intuitive structure, con-
taining only edges that are relevant in finding groups of similar users.
6 Conclusion
We analyzed the bipartite representation of interactions between users and objects
in web or e-commerce systems and shown that due to their scale such user-object
networks have certain characteristics and challenges differentiating them from
other bipartite networks such as collaboration or actor-movie networks. We ana-
lyzed the structural properties of five real world user-object networks and found a
heavy tail degree distribution for objects. This heterogeneity is responsible for hy-
perinflation of edges in the projected users network resulting in very high density
and diluted community structure in these projections. Also, popular objects are
connecting together a large number of users, but they contain little or high level
information about users interests.
In order to diminish the impact of higher degree objects we are proposing a
new weighting scheme based on the popular tf-idf method used in information
retrieval and text mining. With tf-idf the weight of interactions between users and
unpopular objects is amplified while popular objects will bring a lower contribu-
tion to the weight of an edge. Filtering can be applied to keep only the relevant
edges with higher tf-idf weights, starting from a specific threshold. We used the
proposed approach with five real world user-object networks and demonstrate a
decrease in density of both original and projected networks. We apply the Lou-
vain method (Blondel et al., 2008) to find communities in the projected users
network and calculate the modularity of each partition. We find that the quality
of the community structure as measured by modularity is significantly improved
19
when compared to the projections of the original networks. This improvement is
also observed with similar partially random networks where edges are filtered out
randomly.
We proposed a simple and efficient method of assigning weights in a bipartite
user-object network that will decrease the impact of popular objects and improve
density and community structure. Current work can be extended to develop new
network-based recommender systems. Data used by such systems has a natural
bipartite structure where users are interacting with items in an online environ-
ment. Our approach can also be applied to current community detection methods
for bipartite networks to improve both their scalability and the quality of results.
Further on, due to their simplicity, tf-idf weights can be easily adapted to suit
temporal networks that evolve over time. These evolving weighs can be moni-
tored and analyzed to detect trends and patterns in user-object event data.
References
Barabasi, A.L., Jeong, H., N´eda, Z., Ravasz, E., Schubert, A. & Vicsek, T. (2002).
Evolution of the social network of scientific collaborations. Physica A: Statisti-
cal Mechanics and its Applications, 311, 590–614.
Bertin-Mahieux, T., Ellis, D.P., Whitman, B. & Lamere, P. (2011). The million
song dataset. In Proceedings of the 12th International Conference on Music
Information Retrieval (ISMIR 2011).
Blondel, V.D., Guillaume, J.L., Lambiotte, R. & Lefebvre, E. (2008). Fast unfold-
ing of communities in large networks. Journal of Statistical Mechanics: Theory
and Experiment, 2008, P10008.
Borgatti, S.P. & Everett, M.G. (1997). Network analysis of 2-mode data. Social
networks, 19, 243–269.
Breese, J.S., Heckerman, D. & Kadie, C. (1998). Empirical analysis of predictive
algorithms for collaborative filtering. In Proceedings of the Fourteenth confer-
ence on Uncertainty in artificial intelligence, 43–52, Morgan Kaufmann Pub-
lishers Inc.
Clauset, A., Newman, M.E. & Moore, C. (2004). Finding community structure in
very large networks. Physical review E, 70, 066111.
Clauset, A., Shalizi, C.R. & Newman, M.E. (2009). Power-law distributions in
empirical data. SIAM review, 51, 661–703.
20
Davis, A., Gardner, B.B. & Gardner, M.R. (1941). Deep south. University of
Chicago Press Chicago.
Fortunato, S. (2010). Community detection in graphs. Physics Reports, 486, 75–
174.
Fortunato, S. & Barthelemy, M. (2007). Resolution limit in community detection.
Proceedings of the National Academy of Sciences, 104, 36–41.
Freeman, L.C. (2003). Finding social groups: A meta-analysis of the southern
women data. Dynamic social network modeling and analysis, 39–97.
Grujic, J., Mitrovic, M. & Tadic, B. (2009). Mixing patterns and communities on
bipartite graphs on web-based social interactions. In Digital Signal Processing,
2009 16th International Conference on, 1–8, IEEE.
Guillaume, J.L. & Latapy, M. (2004). Bipartite structure of all complex networks.
Information processing letters, 90, 215–221.
Huang, Z., Zeng, D.D. & Chen, H. (2007). Analyzing consumer-product graphs:
Empirical findings and applications in recommender systems. Management Sci-
ence, 53, 1146–1164.
Jeong, H., Tombor, B., Albert, R., Oltvai, Z.N. & Barab´asi, A.L. (2000). The
large-scale organization of metabolic networks. Nature, 407, 651–654.
Laherrere, J. & Sornette, D. (1998). Stretched exponential distributions in nature
and economy:fat tails with characteristic scales. The European Physical Journal
B-Condensed Matter and Complex Systems, 2, 525–539.
Latapy, M., Magnien, C. & Vecchio, N.D. (2008). Basic notions for the analysis
of large two-mode networks. Social Networks, 30, 31–48.
Li, M., Fan, Y., Chen, J., Gao, L., Di, Z. & Wu, J. (2005). Weighted networks
of scientific communication: the measurement and topological role of weight.
Physica A: Statistical Mechanics and its Applications, 350, 643–656.
Li, M., Wu, J., Wang, D., Zhou, T., Di, Z. & Fan, Y. (2007). Evolving model
of weighted networks inspired by scientific collaboration networks. Physica A:
Statistical Mechanics and its Applications, 375, 355–364.
Liljeros, F., Edling, C.R., Amaral, L.A.N., Stanley, H.E. & Aberg, Y. (2001). The
web of human sexual contacts. Nature, 411, 907–908.
21
Lind, P.G., Gonzalez, M.C. & Herrmann, H.J. (2005). Cycles and clustering in
bipartite networks. Physical review E, 72, 056127.
Newman, M.E. (2001a). Scientific collaboration networks. i. network construction
and fundamental results. Physical review E, 64, 016131.
Newman, M.E. (2001b). Scientific collaboration networks. ii. shortest paths,
weighted networks, and centrality. Physical review E, 64, 016132.
Newman, M.E. & Girvan, M. (2004). Finding and evaluating community structure
in networks. Physical review E, 69, 026113.
Newman, M.E., Strogatz, S.H. & Watts, D.J. (2001). Random graphs with arbi-
trary degree distributions and their applications. Physical Review E, 64, 026118.
Opsahl, T. (2011). Triadic closure in two-mode networks: Redefining the global
and local clustering coefficients. Social Networks.
Raghavan, U.N., Albert, R. & Kumara, S. (2007). Near linear time algorithm to
detect community structures in large-scale networks. Physical Review E, 76,
036106.
Ramasco, J.J. & Morris, S.A. (2006). Social inertia in collaboration networks.
Physical Review E, 73, 016122.
Salton, G. & Buckley, C. (1988). Term-weighting approaches in automatic text
retrieval. Information processing & management, 24, 513–523.
Shang, M.S., L, L., Zhang, Y.C. & Zhou, T. (2010). Empirical analysis of web-
based user-object bipartite networks. EPL (Europhysics Letters), 90, 48006.
Zhang, P., Wang, J., Li, X., Li, M., Di, Z. & Fan, Y. (2008). Clustering coefficient
and community structure of bipartite networks. Physica A: Statistical Mechan-
ics and its Applications, 387, 6869–6875.
22
|
1903.06277 | 1 | 1903 | 2019-03-14T21:59:01 | Syntgen: A system to generate temporal networks with user specified topology | [
"cs.SI",
"physics.soc-ph"
] | Network representations can help reveal the behavior of complex systems. Useful information can be derived from the network properties and invariants, such as components, clusters or cliques, as well as from their changes over time. The evolution of clusters of nodes (or communities) is one of the major focus of research. However, the time dimension increases complexity, introducing new constructs and requiring novel and enhanced algorithms. In spite of recent improvements, the relative scarcity of timestamped representations of empiric networks, with known ground truth, hinders algorithm validation. A few approaches have been proposed to generate synthetic temporal networks that conform to static topological specifications while in general adopting an ad-hoc approach to temporal evolution. We believe there is still a need for a principled synthetic network generator that conforms to problem domain topological specifications from a static as well as temporal perspective. Here we present such a system. The unique attributes of our system include accepting arbitrary node degree and cluster size distributions and temporal evolution under user control, while supporting tunable joint distribution and temporal correlation of node degrees. Theoretical contributions include the analysis of conditions for "graphability" of sequences of inter and intra cluster node degrees and cluster sizes and the development of a heuristic to search for the cluster membership of nodes that minimizes the shared information distance between clusterings. Our work shows that this system is capable of generating networks under user controlled topology with up to thousands of nodes and hundreds of clusters with strong topology adherence. Much larger networks are possible with relaxed requirements. The generated networks support algorithm validation as well as problem domain analysis. | cs.SI | cs |
Syntgen: A system to generate temporal networks with user specified
topology
Luis Ramada Pereira1*, Rui J. Lopes2, Jorge Lou¸ca3
1 ISTAR Instituto Universit´ario de Lisboa (ISCTE - IUL) Lisbon, Portugal
2 IT-IUL Instituto de Telecomunica¸coes (ISCTE - IUL) Lisbon, Portugal
3 ISTAR Instituto Universit´ario de Lisboa (ISCTE - IUL) Lisbon, Portugal
* [email protected]
Abstract
Network representations can help reveal the behavior of complex systems. Useful information can be
derived from the network properties and invariants, such as components, clusters or cliques, as well as
from their changes over time. In the last few years the study of temporal networks has progressed
markedly. The evolution of clusters of nodes (or communities) is one of the major focus of these studies.
However, the time dimension increases complexity, introducing new constructs and requiring novel and
enhanced algorithms. In spite of recent improvements, the relative scarcity of timestamped
representations of empiric networks, with known ground truth, hinders algorithm validation. A few
approaches have been proposed to generate synthetic temporal networks that conform to static
topological specifications while in general adopting an ad-hoc approach to temporal evolution. We
believe there is still a need for a principled synthetic network generator that conforms to problem
domain topological specifications from a static as well as temporal perspective. Here we present such a
system. The unique attributes of our system include accepting arbitrary node degree and cluster size
distributions and temporal evolution under user control, while supporting tunable joint distribution and
temporal correlation of node degrees. Theoretical contributions include the analysis of conditions for
"graphability" of sequences of inter and intra cluster node degrees and cluster sizes and the development
of a heuristic to search for the cluster membership of nodes that minimizes the shared information
distance between clusterings. Our work shows that this system is capable of generating networks under
user controlled topology with up to thousands of nodes and hundreds of clusters with strong topology
adherence. Much larger networks are possible with relaxed requirements. The generated networks
support algorithm validation as well as problem domain analysis.
1
Introduction
Networks are all around us: computer, telecommunication, biological and social systems are just a few
examples of systems of entities that interact and relate to one another in some specifiable way, producing
identifiable phenomena. Graph theory, which had its origins in the 18th century when Leonard Euler
published his "Seven Bridges of Konigsberg" problem and its negative solution [12], is the basis of the
field of study that has become network science. Network science is concerned with understanding
networked systems, describing their micro, meso and macro scale attributes and helping us predict their
behavior. Many networks exhibit groups of nodes that are more closely interconnected amongst
themselves than with the rest of the network. These groups, referred to as clusters in graph theory or
communities in network science, are usually of particular interest to network researchers. They may have
an over-sized impact on the network behavior and their identification is often highly useful.
1/22
From its origin in graph theory, network science has focused on static networks, that is, networks
"frozen in time" with link permanence. However, real world systems are rarely static: links on webpages
are added and removed everyday in the world wide web, amino acid interaction for protein folding occurs
over time, friendships are created, age, wither and renew. This realization led to major efforts to extend
existing science into temporal networks, with several authors proposing approaches that embed time
specific attributes. Communities are no exception, and several constructs have been proposed to
characterize the way a community develops over time. Although some of these constructs are
problematic since they cannot be derived solely from the network structure, they serve as a base that
allow us to build a commonly accepted vocabulary that helps advance this field of study.
Time stamped data of empiric systems with known ground truth about communities does not abound.
As extensively discussed elsewhere [25] even the concept of community membership is not without its
challenges. This makes it more difficult to test systems that effectively recover community node
membership over time. Having a system that generates a temporal network under user specified
topology, with known ground truth, can help alleviate these challenges. Syntgen1, as described in this
article, is such a system.
The input required by Syntgen at each time step is a multiset of community sizes and a bijection of
two n-tuples representing sequences of total and intra-community node degrees. Optionally the user can
specify preferences for joint node degree distributions, temporal node degree correlation and a set of
nodes to be eliminated at each time transition.
We developed a method which Syntgen uses to test user specifications for graphability and, if
successful, generate a compliant temporal network. The user does not specify node membership or edges,
these are generated by the system. As there is randomness in the process of network construction, both
on node community membership as well as in the network wiring, the same specifications will not
typically generate the same network. However, they should asymptotically converge to the same average
topology.
The user can loosely control the dynamics of the network by changing its input at chosen time steps,
with new nodes created and others killed to satisfy input specifications. Changing correlation and joint
distribution parameters will also impact the wiring of the network.
We provide example sequence generators that sample power laws, exponential and binomial
distributions, all of which have been found in empirical networks [26]. These generators include
parameters that specify community maximum and minimum size, maximum and minimum node degree,
distribution rate parameters and a ratio (r) of intra to total degree, which can be fixed or Bernoulli
distributed with P = r. The user can use or adapt these generators or provide their own. Obviously,
although the system will assign nodes to communities, these are only meaningful if the ratio of intra
links to total links is sufficiently high. This ratio varies depending on the network structure and on the
cardinalities of the communities. Larger communities are less stringent with their requirements. A
thorough discussion can be found in page 11 of [14].
With this input, Syntgen outputs a temporal network with known ground truth of its community
structure for every time interval. To minimize network changes beyond those specified by the user,
Syntgen tries to determine the node community membership across time steps that results in the
shortest shared information distance between clusterings. This is an NP-Hard problem for which we
develop an appropriate heuristic.
Our system works for simple networks. Syntgen generates temporal networks with no self loops or
multi-edges, non weighted and undirected, with no community membership overlap, with no isolated
nodes, in snapshot mode. A new instance is generated at each time step and the overall temporal
network is the sequence of generated snapshots. It would be possible to extend this model to a truly
continuous streaming network, although a principled approach for node and edge activation would need
to be devised to enforce node degree and community size affinities.
We believe Syntgen, as a temporal synthetic network generator, is unique in creating networks with
arbitrary community sizes and node degree distributions and providing ways to control node joint degree
distribution and node degree temporal correlation.
1code available on request from the authors
2/22
Figure 1. Time consecutive slices of a dynamic network as generated by Syntgen
This example is color coded according to community and has ≈ 200 nodes, 10 − 9 communities, with
multiple community events. A full description can be found in section 3.2.5.
In the remainder of this document we review in section 2 other work related to the function and
objective of our system. In section 3 we start by describing the general flow of the system, its modules
and functionality, followed in section 3.2 by a detailed description of the approach we took to generate a
network snapshot respecting the user topology. How we aim to reduce spurious noise when evolving the
communities at every timestep is covered in section 3.3, and we conclude with 3 additional sections
covering experiments, conclusion and future work.
A note on terminology conventions: In this subject area a vast array of terms are used to describe
very similar concepts, like communities vs clusters, or partitions vs clusterings. Throughout this
document, we adopt the following terminology and symbol conventions:
• "Community" refers to groups of nodes more tightly connected amongst themselves than to the
rest of the network (in lieu of terms like cluster, or partition)
• "Clustering" refers to the splitting of a network into communities (in lieu of partition). See formal
definition in 1.
• "Temporal" is an attribute of a network that changes over time (in lieu of dynamic or evolving)
• "Nodes and Links": Links are connections between nodes at the same time step. Nodes only exist
if they connect. There are no isolated nodes in Syntgen.
• We call the movement of nodes between communities across time steps, "Node flow".
• We define "Graphability" as the property of sequences of community sizes and bijective node total
and intra degrees that enable their graphical representation.
• We denote sets by an uppercase letter and individual elements by the corresponding lower case
letter, optionally subscripted for identification. Frequently used sets and variables have their own
dedicated symbol as per table 1.
2 Related Work
Work related to Syntgen falls into two categories:
• network science, theorems and algorithms that supported the development of our system
3/22
Table 1. Symbol convention
Symbol Definition
C
D
E
F
G
L
O
S
T
U
V
Clustering or community set, optionally with a superscript to
indicate time step
Degree sequence (or ordered total degree sequence, depending on
context, bijection with E, optionally with a superscript to indicate
community membership).
Intra degree sequence ( bijection with F ), optionally with a super-
script to indicate community membership.
Inter degree sequence , with n = D = E = F and fi +
ei = di ∀(1 ≤ i ≤ n), optionally with a superscript to indicate
community membership.
Network, optionally with a superscript to indicate time step
Link set
Kill node set (user specification)
Multiset of community sizes
Time step
Flow of nodes between time steps
Node set
• prior systems that have been developed with similar or related desiderata.
In the first category we cover clustering similarity and community lifecycle events, and in the second,
benchmarks for community detection algorithms and other temporal community network generators.
2.1 Benchmarks for community detection algorithms
Authors in [21] have drawn our attention to the fact that community detection algorithms that perform
well in a given network topology may be less accurate in a different topology. Prior to their work,
algorithms for community detection were validated mostly against the Girvan-Newman benchmark [25].
This a stochastic block model that only deviates from a typical random Erdos -- R´enyi model by the
introduction of a tunable parameter specifying the probabilities of intra and inter community links,
transforming the network from a pure random network to a random network of random networks (the
communities). From experience we know that empirical networks do not generally follow this model. As
an example, most networks generated by preferential attachment, that is networks where new nodes
attach to existing nodes with probability that is dependent on their degree [2], end up with long tail
distributions of node degrees and community sizes, reasonably approximated by power law distributions.
The benchmark introduced in [21] generates networks with power law distributions of community
sizes and node degrees, with tunable intra/total ratio (mixing parameter). This benchmark, commonly
known by the authors initials (LFR), has been widely accepted and used to test community detection
algorithms for static networks. For instance in [20, 32] a lengthy list of algorithms tested against this
benchmark can be found.
2.2 Comparing clusterings
A clustering, in our context, is the partition of the set V of nodes of a network into disjoint communities,
or formally
C = {c1,··· , ck} : (ci ∩ cj = ∅ ∀ (1 ≤ i, j ≤ k ∧ i (cid:54)= j) ∧ ∪ k
i=1 ci = V
(1)
Comparing communities at successive timesteps is a key requirement to understand community evolution.
Comparing clusterings, on the other hand, is critical in our system so that, after all the information
required to construct the network at successive time steps is gathered, we can flow nodes resulting in the
4/22
closest shared information distance between clusterings. Comparing clusterings is an open problem as
there is no standard way of measuring the distance between them. Popular methods include several
variations of node counting (like the Rand Index) and measures from information theory, like the
normalized mutual information and variation of information (VI). A good survey of different methods
can be found in [31]. We have selected VI, given its robustness, low computational complexity and the
fact that it is a true metric [23].
2.3 Temporal community graph generators
There have been some proposals to generate synthetic temporal networks. In [15] the authors propose a
generator for simple networks with a cyclic nature based on a variation of the stochastic block model.
In [16] the authors have adapted the LFR benchmark [21], while introducing over time ad-hoc
modifications to the network. In [28] the authors propose RDyn, a system to generate temporal networks
respecting a power-law distribution of community sizes and node degrees with tunable clustering and
injected lifecycle events that, while disrupting cluster quality, are subsequently re-balanced through
re-wiring of node links.
These systems have obvious affinity with Syntgen. The new contributions introduced by Syntgen
include:
• no prior specifications of node degree or community size distribution
• temporal evolution under user control by searching for the least noisy transition across time steps,
i.e. reducing partition artifacts as a result of node flow
• support for joint distribution of node degrees and node degree temporal correlation
3 Syntgen: Description, challenges and contributions
Syntgen is a system to create temporal networks exhibiting community structure that changes over time.
It is parametric and modular. The major modules are:
• User specifications. These fall into two separate categories: network topology and heuristics
execution.
• Node degree and community size sequence generators. The system includes functions that sample
parametric distributions for community size, intra and total node degree, but, as long as they are
realizable, any sequences can be provided.
• Network module. Deals with all aspects of network creation, including node to community
assignment, degree to node assignment and node to link assignment.
• Transition module. This module manages all aspects of temporal evolution, including heuristics for
node flow between timesteps and community lifecycle determination.
• Output module. This module generates all output, both textual as well as machine readable for
further analysis. In Table 2 we include a summary of all information generated.
In the remainder of this section we present the basic algorithmic logic of Syntgen in 3.1, the challenges
and solutions of building a static network according to user specifications in 3.2 and the problem of
finding a node flow across time steps that maximizes clustering similarity in 3.3.
5/22
i=1 si ∧(cid:80)n
-- an n-tuple of positive integers D = {d1,··· , dn} representing a sequence of node total degrees
with n =(cid:80)k
intra-community degrees with ei ≤ di : 1 ≤ ∀i ≤ n and(cid:80)n
-- an n-tuple of positive integers E = {e1,··· , en} representing a sequence of node
i=1 ei ∈ {2n : n ∈ N}
i=1 di ∈ {2n : n ∈ N}
Table 2. Textual Output of Syntgen
Content
Contingency Matrix
Assortativity Coefficient
Description
Contingency matrix of communities across time steps
Joint node degree distribution
Temporal Degree Correlation Average Pearsons correlation index for the whole net-
Variation of information
work
VI between clusterings across successive time steps
3.1 Syntgen basic logic
The general flow of Syntgen is a sequence of looping steps that produce network snapshots as time
progresses. It basically follows algorithm 1.
Syntgen requires from the user at each time step the following graph invariants and parameters:
• a multiset of k positive integers S = {s1,··· , sk}, representing a sequence of community sizes
• a bijection of total and intra community degree sequences:
• specifications for joint degree distribution and node degree correlation over time
• optionally, a set of nodes O to kill at a step boundary
boundary. Depending on the sign of(cid:80) S t −(cid:80) S t+1 − O new nodes are implicitly born or additional
The user can loosely control the dynamics of the network by changing S, D, E and O at each time step
nodes randomly killed. Correlation and joint distribution parameters have an impact on the wiring of
the network. As the data per timestep is gathered, Syntgen executes the following actions:
• A bootstrap static network is built. The input elements are independent (with the exception of the
number of nodes and the sum of community sizes, which must match) and it is up to the system to
assign edges and nodes to communities. We provide parameter-based examples of functions that
generate sequences which have been observed in empirical networks ( [8, 26, 27]), sampled from
discretized power laws, discretized exponential and binomial distributions, but the user is free to
provide his own as adequate to their problem domain.
Degree assortativity, a topology attribute that varies with the type of network (typically
assortative for social, while dissortative for biological networks [24]), is also parameter driven
allowing the user to request a random, weighted assortative or weighted dissortative network.
To construct the network we use a modified version of the configuration model [9] in a similar
approach to what is found in a popular benchmark for community detection in static networks [21],
but developed independently and extended to support joint node degree distributions as described
in 3.2.5.
Obviously, not all input specifications are possible and we verify feasibility before generating the
network. The problem of whether a given node degree distribution can be expressed as a graph has
been covered extensively in the literature [7, 11, 29, 30], and theorems, like the Erdos-Gallai
condition, can be expressed as an algorithm to test graph feasibility. However, with node degrees
as tuples of inter and intra-cluster degrees, different conditions apply. We extended the
Erdos-Gallai condition to address this problem, developing the corresponding algorithm to halt (or
request new input for) the network generation in case input specifications are infeasible.
• After generating the bootstrap network (T0 network) a T1 network is generated, again according to
user specifications. The user may select a different degree or community size sequences as well as
6/22
make changes to the network at the end of T0 (selecting nodes for deletion), according to the
requirements of the temporal network to be generated. An additional parameter provides the user
with the option of enforcing node degree assortativity across timesteps.
The system then tries to find the closest possible clusterings between successive timesteps. We
found the problem to be NP-hard and impossible to complete in a reasonable amount of time
beyond a very small number of communities. To address the inherent complexity, we developed a
heuristic based on a greedy anytime algorithm with taboo to search for a solution in an
appropriate solution subspace. The objective is to reduce the amount of change (noise) to a
minimum, reducing the necessary impact on user specifications. The solution will determine the
flow of nodes between communities in timesteps T0 and T1.
• This process is repeated for a user-specified number (n) of time steps, evolving the network over a
period from T0 to Tn.
• At each time step the contingency matrix of node/community evolution is produced, and, at the
end, the temporal network is created in a machine readable format for further analysis and
visualization.
Algorithm 1 General flow of Syntgen. Steps 2,3,6,10 are implemented in the "Network" module.
Build Communities assigns degrees to nodes and nodes to communities, while Build N etwork does all
the network wiring. Steps 7-9 are implemented in module "Transition".
1: Community Size Sequence, N ode Degree Sequence ← Sequences f rom U ser
2: Build Communities @ Tn ← Community Size Sequence, N ode Degree Sequence
3: Build N etwork@Tn ← Communities
4: while Remaining T imeSteps (cid:54)= 0 do
6: Build Communities @ Tn+1 ← Community Size Sequence, N ode Degree Sequence
7: N etwork @ Tn ← user Events
Community Size Sequence, N ode Degree Sequence ← Sequences f rom U ser
5:
F low N odes f rom Tn to Tn+1 ← Search M ost Similar T ransition
8:
9: Build N etwork @ Tn+1
10: Report Data f or Tn to Tn+1
11: N etwork @ Tn ← N etwork @ Tn+1
T imeSteps ← T imeSteps − 1
12:
13: end while
14: Output T emporal N etwork
Syntgen outputs textual information as the network is created overtime, including network metrics,
network events and other supporting information. Syntgen also produces the full temporal network in
machine readable format that can be input directly to the Gephi [4] visualization tool.
3.2 Creating a static network
Creating a T0 static network involves the following steps:
• Receiving community size and node degree sequences from the user .
• Testing for "graphability" and requesting from the user new sequences if they are determined not
to be "graphable".
• Randomly assigning nodes without substitution to communities from the bijection of intra (E) and
total degrees (D) with e ∈ E : e < c.
• Wiring nodes using a modified version of the configuration model both for intra links as well as
inter links respecting assortative specifications.
7/22
3.2.1 Community, node sequences
Syntgen does not impose specific restrictions on the user input sequences beyond a coherent total
number of nodes, and node intra community degrees that are less or equal to their respective total
degree. It follows that Syntgen does not enforce community structure per se. The user must provide a
ratio of intra to total degree that is conducive to community structure if a clustered network is preferred.
3.2.2 Supplied distribution samplers
The user may opt to generate community and node sequences resorting to functionality provided by
Syntgen. There are independent and identically distributed (I.I.D.) samplers of uniform, exponential and
power law distributions. All of our supplied samples of sequence generators accept a ratio (r) of intra to
total degree similar to the mixing parameter in the LFR benchmark [21]. To alleviate rounding artifacts
that are more pronounced for nodes with low degree, we employ stochastic rounding instead of rounding
to the nearest integer. The authors in [21] point out that allowing the ratio to change can lead to
communities containing nodes that have a higher inter than intra degree (due to random fluctuations),
but depending on usage, having a fixed intra to total degree ratio may be too restrictive on the desirable
network topologies. Therefore, we let the user choose between a fixed 0 ≤ r ≤ 1 or Bernoulli distributed
ratio with P = r.
Although we do not challenge if specifications as provided by the user or generated by the supplied
distribution samplers are conducive to community structure, we do test for disconnected components
inside communities by computing the algebraic multiplicity of the zero eigenvalue for the Laplacian of
the adjacency matrix of the community. If higher than one, we warn the user, giving the option to
continue or abort the network generation.
3.2.3 Testing for graphability
To test user specifications for graphability as a simple network, we make use of the Erdos-Gallai
condition [11] that states that a degree sequence D is graphable if:
D(cid:88)
di ∈ {2n : n ∈ N} ∧ k(cid:88)
di ≤ k(k − 1) +
min(di, k) ∀ (1 ≤ k ≤ D)
(2)
i=1
i=1
i=k+1
max(F ) ≤(cid:80) F
where d is degree and D the total number of nodes. We apply 2 to every single community using only
E, the nodes intra degrees. If completed successfully, we move on to test graphability of the inter degrees
sequence F . For this we reduce the network to a multi-graph where each community becomes a single
node and the multi-links are the aggregate inter community links of the base network. It is obvious that
i=1 di − max(F ) is a necessary condition for graphability, as otherwise there would be not
enough links to satisfy the requirements of the largest community inter degree. But it is also not hard to
see that if the total number of inter links is even, the condition above is not only necessary but also
sufficient, or formally:
fi ∈ {2n : n ∈ N} ∧ max(F ) ≤
fi − max(F )
(3)
i=1
i=1
To see why, consider a reduced network with 3 nodes (communities), c1, c2, c3 and their respective
inter node degree aggregation f1, f2, f3, with f1 ≥ f2 ≥ f3. If f1 = f2 + f3, the network is obviously
graphable. If f1 < f2 + f3 and if f1 ∈ {2n : n ∈ N} then
(f2 ∈ {2n : n ∈ N} ∧ f3 ∈ {2n : n ∈ N}) ∨ (f2 ∈ {2n + 1 : n ∈ N0} ∧ f3 ∈ {2n + 1 : n ∈ N0}) but as
f1 ≥ f2 one can always distribute links from c1 to c2 and c3 such that the remainder degrees to be
satisfied are equal. If f1 ∈ {2n + 1 : n ∈ N0} then (f2 ∈ 2n + 1 : n ∈ N0 ∨ f3 ∈ 2n + 1 : n ∈ N0) in which
case after one link is added between c1 and c2 or c3 we revert to the previous case.
The above is a proof for a 3 community clustering. To generalize the proof, let's consider the addition
of a community to the reduced network resulting in the clustering C = {c1,··· , c4}, with node degree
8/22
D(cid:88)
F(cid:88)
F(cid:88)
aggregation D = {f1,··· , f4}, and fi ≥ fi−1 : 2 < ∀i ≤ 4. If we use links from f1 to satisfy f4, we get:
f1 − f4 ≥ f2 ∨ f1 − f4 < f2. If f1 − f4 ≥ f2 we reduce to the previous proof as
f1 − f4 + f2 + f3 ∈ {2n : n ∈ N} and f1 − f4 ≤ f2 + f3 (remember that f3 ≥ f4).
If f1 − f4 < f2 then to reduce to the previous 3-community proof we should have f2 < f3 + (f1 − f4).
This is easy to prove by contradiction as f2 > f3 + (f1 − f4) is impossible, given that f1 > f2 would force
f3 − f4 < 0 which violates the problem statement. So by contradiction and induction we prove the
condition for graphability of the inter links part of the network.
In conclusion, a network with V nodes and C communities with size sequence S, each with a
bijection of intra and inter degree sequences respectively E ci , F ci ∀i ∈ {1,··· ,C} is graphable under
the condition in equation 4.
∀i ∈ {1,··· ,C} :
si(cid:88)
j=1
k(cid:88)
j ∈ {2n : n ∈ N} ∧ (
e ci
V (cid:88)
j=1
j ≤ k(k − 1) +
e ci
si(cid:88)
j=k+1
min(ei, k)∀(1 ≤ k ≤ si)
∧
(4)
V (cid:88)
fi ∈ {2n : n ∈ N} ∧ max(F ) ≤
fi − max(F )
i=1
i=1
3.2.4 Node assignment
Syntgen assigns nodes to communities randomly at time step T0 from the pool of available nodes,
avoiding communities with cardinality smaller than the node intra degree. From T1 onwards nodes keep
their community membership except to honour new community size sequences. The process of
minimizing membership changes is covered in section 3.3. The user can indirectly control node degree
temporal correlation by influencing degree selection from the supplied total degree sequence thru the
shape parameters of a beta distribution used to sample the ordered sequence. When α = β = 1 it reverts
back to the uniform distribution.
3.2.5 Configuration model
In Syntgen we based the generation of networks with user specified degree distributions on a modified
version of the configuration model (CM) [2]. We use this modified version to wire nodes inside
communities (one community at a time, as if they were separate networks) and to create inter
community links.
expands the sequence into a list of ((cid:80) D) node "stubs" that are randomly paired, creating links. See
The CM can create a network based on arbitrary sequences D of node degrees. To this end, it
figure 2 for an example.
randomly chosen and as long as(cid:80)n
Figure 2. Wiring the configuration model. Example of setting up a first link between node stubs
for a network with n = 10 nodes, 15 links and degree sequence D = {4, 4, 3, 3, 4, 3, 3, 2, 2, 2}. Stubs are
i=1 Di is even, the process always concludes, albeit with multi edges
and self loops.
For our purpose, the standard CM presents two difficulties. The first is that nothing prevents a stub
from linking back to another stub belonging to the same node, or linking the same nodes multiple times,
both of which are incompatible with our aim of building a simple network with no self loops and no
multi-links. The second is that we want to provide the user with some capacity to control joint degree
9/22
distribution, while the CM results in the following fixed joint distribution:
where kn is the number of stubs of node n and S the total number of stubs =(cid:80) D.
pij =
kikj
S − 1
(5)
As the network grows, the probability of self-loops and multi-links decreases. This probability varies
with the actual node degree distribution, but it is not unreasonable to disregard self-loops and
multi-edges when building the network (see figure 3 for an example), considering however that, (1) stub
pairing can fail before all stubs are assigned (that is, a node can have unlinked stubs with no candidate
stubs remaining), and (2) that equation 5 is no longer representative of the degree joint distribution.
(a) We use a modified CM, and apply it to one community at a time for intra-community links (full stroke
linestyle) and to the whole network for inter community links (dashed linestyle)
(b) Our modified version of the CM deletes from the link candidate list all the remaining stubs of the linking
node (double stroke linestyle) (1), and all the remaining stubs of the linked node for subsequent stubs from the
same node (2)
Figure 3. CM Plots of a network 3 communities (Blue, red and green), with community size sequence
{4, 4, 2} and total and intra degree sequences {4, 4, 4, 3, 3, 3, 3, 2, 2, 2},{3, 3, 3, 2, 2, 2, 2, 1, 1, 1}.
(c) Example of the fully connected network
The first problem can be circumvented by selectively rewiring nodes randomly from a pool of
candidate nodes (those that could satisfy the outstanding stubs but are otherwise taken elsewhere). As
we test for graphability beforehand, this completes successfully.
The second problem is less relevant as we aim to generate networks with tunable joint degree
distribution. We modified the CM so that instead of connecting stubs I.I.D. over a uniform distribution,
we connect them I.I.D. over a beta distribution from the ordered node degree sequence. As the
10/22
probability density function (pdf) increases towards the rightmost side of the distribution domain,
correlation increases, and vice-versa. The α and β shape parameters of the Beta distribution are
specified by the user and enable flexible pdf shapes. Using these parameters, the user can influence the
level of the network correlation, subject to structural cutoffs [6, 24].
3.3 Minimizing Shared Information Distance
Once we have constructed the network at time t, injected user changes, created the network N t+1 (all
based on user specifications), and created adjustment communities for dead and new nodes, so that the
number of nodes across steps remains the same, all that is left is to flow surviving nodes from one
network to the next. We want to perform this node flow in such a way that the clusterings C t and C t+1
are as similar as possible, in this way minimizing the changes beyond the user specifications. To measure
the changes, we need a way of comparing clusterings. As mentioned previously, there are several
approaches to this problem, from node pair counting to information based distance measures.
There is no best approach as explained in [23], and we have selected the metric therein proposed, the
variation of information (VI) (see figure 4) for its algorithmic simplicity and the fact that it is a true
metric [19], respecting positivity, symmetry, and the triangle inequality.
V I(X; Y ) = − k(cid:88)
l(cid:88)
i=1
j=1
[log(
rij
pi
) + log(
rij
qj
)]
(6)
Figure 4. Variation of Information V I(X; Y ) where X = {x1,··· , xk} and Y = {y1,··· , yl} are
clusterings of a given set S, with n = S, and rij = xi∩yj
xi
n and qj =
n , pi =
yi
n
But let's set briefly aside the proposed method of comparing clusterings and consider the search
space of feasible node flows between Nt and Nt+1. One way of looking at the problem is to coalesce Nt
and Nt+1 into the weighted bipartite network G(Ct, Ct+1, U ), where the nodes are the communities at
successive timesteps and the U the weighted links representing the node flows between them.
It is easy to see that the search space consists of the solutions to an under-determined system of
Diophantine equations Ax = B where A is the incidence matrix of the fully connected bipartite network
i k
G = (C t, C t+1, L) and B is the vector {C t
i=1 ∪ C t+1
l
j=1}. As rank(A) = B − 1, one line of matrix
A and the corresponding entry of vector B can be removed. Dimensionality can be further reduced as
sum[x] is known, and thus one element of x can be determined from the others. Every solution in the
solution space is a vector x whose elements are the number of nodes (u) that should be transferred from
communities in C t to communities in C t+1.
j
Formally we want to find C t+1 s.t. min(V I(C t, C t+1)) with Ax = B as defined above.
In topological terms, the space of the solution is a lattice contained in an n − 1 dimensional polytope,
where n = C t × C t+1, bounded by n − 1 positive halfspaces (as xi ≥ 0 : ∀i), and by
C t + C t+1 − 1 hyperplanes defined by the equations in Ax = B. The number of solutions is equal to
the number of lattice points. Counting lattice points in such a polytope is not an easy task [22] and
quickly becomes intractable. Barvinok proposed an algorithm for lattice point counting in [3] that has
been implemented in systems like Latte [1], software that counts lattice points and performs integration
inside convex polytopes. Some experiments we ran in Latte that illustrate the size of the problem can be
seen in table 3.
The solutions that are of interest to us will have a high degree of sparsity as we are looking for similar
clusterings and, intuitively (and experimentally), a high dispersion of nodes across communities will not
be conducive to similarity. Higher sparsity solutions correspond to surface features of the polytope
lattice, that is, in decreasing sparsity order: vertices, edges, ridges, cells, facets and so on, basically the
1,··· , n − 1 elements of an n-dimensional polytope. We based our heuristic on this intuition, limiting
our search space to the hull of the polytope (see figure 5) This can reduce the space significantly
depending on the polytope geometry.
11/22
Clustering @ T
{20, 16, 12}
{16, 16, 16}
{13, 11, 10, 10}
{13, 11, 10, 10, 9}
{1300, 1100, 1000, 1000}
Clustering @ T+1
{24, 13, 11}
{16, 16, 16}
{14, 12, 9, 9}
{14, 12, 9, 9, 9}
{1400, 1200, 900, 900}
{1300, 1100, 1000, 1000, 900}
{1400, 1200, 900, 900, 900}
Number of solutions
6.46000E + 03
1.17810E + 04
7.80605E + 06
1.58534E + 24
1.09501E + 11
3.18145E + 41
Table 3. Solution space, as reported by the count function of Latte, for 6 examples of clustering pairs.
As can be seen, flowing even a small number of communities generates a search space that is for all
purposes intractable.
Figure 5. Comparing Clusterings similarity as a function of spacial location Plot of all
the 16,799,002 solutions of flowing a clustering with community size sequence of {13, 13, 12, 10} to
{15,11,11,11}. We compare similarity, as measured by the variation of information, against distance to
polytope center and number of polytope surface coordinates in the solution vector. The polytope "center"
(cid:18)
(cid:80)f
max(xi)×n
j=1 max(xj )
(cid:19)f
i=1
is computed as the vector
, where the vector x is the number of nodes flowing between
communities (the sequence of edges weights of the fully connected bi-partite network), n is the total
number of nodes, f the number of possible flows and max (x) the maximum number of nodes flowing
between two communities. It is clearly visible that there is a strong positive correlation between these
quantities.
To scan the space we find the nullspace of A, formally ker(A) = {x ∈ Nn : Ax = 0}, where
n = Ct × Ct+1, and one solution xi to Ax = B. By linearly combining xi with ker(A) we can span
the set of solutions to Ax = B. Finding a single solution is trivial, all that is needed is to flow nodes
from Ct to Ct+1 until no more nodes are left in Ct. In fact, although the problem as stated is NP-Hard
(it is not difficult to reduce it to the partition problem, a well documented NP-complete problem [18])
there are easy ways of finding good solutions with a low VI value.
We have implemented a pool of these simple algorithms, with polynomial complexity on the number
of communities, that were experimentally best performers amongst themselves. We have built a pool of 5
simple one-pass greedy heuristics with an objective function related either to sparsity or similarity and
12/22
experimentally verified that, although any one of the 5 may achieve best performance, one of them
clearly outperforms the others as the number of communities increase (see figure 6).
Figure 6. Relative performance of a pool of 5 simple algorithms to select a starting point
for a space scan All algorithms achieve top VI-based similarity in some of the 1,000 random runs, but
one (MI, based on minimizing the increment of mutual information) vastly outperforms all others as the
number of communities increases.
In our space scan heuristic, we use these solutions (or the best of them) as starting points for our
space search. This is accomplished by an anytime algorithm that greedily searches the solution polytope
hull for the lowest VI avoiding previously visited solutions (see algorithm 2). To halt the algorithm, the
user can specify thresholds for search restart after a certain number of failed improvement trials and a
certain number of failed restarts.
Although searching the hull of the polytope vastly reduces the search space in most circumstances, as
the network grows the probability of improving on the results from the pool of simple algorithms
decreases. For very large networks the user may select to proceed with the best result from the pool and
forego the heuristic search for the sake of expediency.
In figure 7 an example of an exhaustive search of a very simple temporal network with a total of 279
solutions can be found to illustrate the method.
4 Experiments
Syntgen can generate many variants of temporal networks with community structure respecting user
defined distributions of community sizes and node degree. In this section we present and discuss network
metrics from generated networks according to varying input parameters. Given the time-slicing nature of
Syntgen, most of the experiments highlight results from a single point in time, with the understanding
that input parameters can be changed by the user on every time slice.
Sample Distributions
Syntgen provides distribution samplers of node degrees and community sizes. In figure 8 we can see an
example of a power-law degree distribution and the effects of different rounding approaches.
13/22
Algorithm 2 Anytime greedy algorithm with taboo
1: currBest ← min(Solution(SimpleAlgorithmP ool))
2: bestV I ← V I(currBest)
3: globalT ries ← 0
4: visited ← ∅
5: while globalT ries ≤ globalT riesT hreshold do
6:
7:
8: while localT ries ≤ localT riesT hreshold do
localT ries ← 0
globalT ries ← globalT ries + 1
localT ries ← localT ries + 1
localBest ← M AXF LOAT
for all v = vector ∈ ker(A) do
n ← ((na × v + currBest ∈ solutionSpace) ∧ ((n + 1) × v + currBest /∈ solutionSpace)
newSol ← n × v + currBest
if newSol /∈ visited then
if V I(newSol) ≤ localBest then
localBest ← V I(newSol)
newSolLocal ← newSol
end if
end if
n ← ((n × v + currBest ∈ solutionSpace) ∧ ((n − 1) × v + currBest /∈ solutionSpace)
newSol ← n × v + currBest
if newSol /∈ visited then
if V I(newSol) ≤ localBest then
localBest ← V I(newSol)
newSolLocal ← newSol
end if
end if
end for
if localbest = M AXF LOAT then
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
28:
29:
30:
31:
32:
33:
34:
35:
36:
else
Break Global Tries (Dead end)
visited ← visited ∪ newSolLocal
if V I(newSolLocal) ≥ bestV I then
else
localT ries ← localT ries + 1
bestV I ← V I(newSolLocal)
currBest ← newSolLocal
localT ries ← globalT ries ← 0
37:
38:
39:
40:
41:
42: end while
end if
end while
end if
14/22
Figure 7. Example of a heuristic search to minimize information distance. Example of
heuristic search of a small network transition from {10, 8, 6} to {12, 10, 2}. Note that vertex points of the
solution lattice have higher than average similarity as measured by the Rand Index.
Mix Ratio
We studied experimentally the impact of using a fixed vs Bernoulli distributed mix ratio (µ). As
expected we did not observe significant differences between both approaches when run over 11 time steps,
as can be seen on figure 9.
Joint Degree Assortativity
As discussed in section 3.2.5, joint degree is tunable by the user thru the shape parameters of the Beta
distribution, affecting link generation. However, dependent on network structure, it may be impossible
to generate a network with positive correlation. In figure 10 we plot all links of a network with 10,000
nodes and power-law distribution of node degrees and community size on a two-dimensional graph
showing the degrees of their connected nodes. As the network is non directional the plots are
symmetrical when reflected about the diagonal. The result of applying shape parameters to influence
correlation can be clearly seen. We confirm previous findings, noting additionally that clustering has a
strong influence on correlation behaviour, potentially limiting the possibility of generating a positively
degree correlated network.
15/22
(a) Rounding to nearest integer
(b) Stochastic rounding
Figure 8. Node degree distribution of networks generated with 100,000 nodes, mix ratio of 0.7, and
total node degree varying from 10 to 150. The artifact minimizing effect of stochastic rounding can
clearly be seen in these examples.
Figure 9. Fixed versus Bernoulli distribute mix ratio Two networks averaged over 11 time steps,
with 10,000 nodes, mix ratio µ = .7, power law distribution of community size (Kc = 1.5) and node
degree (Kn = 2.5), displaying ground truth modularity and modularity as computed by the community
multilevel algorithm [5]. Differences in modularity between experiments are negligible. The differences in
number of communities found between the ground truth and the community detection algorithm can be
attributed to the resolution limits of the algorithm used for detection [13].
Temporal Correlation
We use the same technique of sampling a beta distribution to influence the evolution of node degree. The
user can change the distribution shape parameters to sustain a temporally homogeneous node degree, or
to generate nodes that are cyclically active. Figure 11 shows the impact of varying shape parameters on
the temporal node degree correlation.
Sample Network
Currently Syntgen outputs machine readable networks in CSV format adequate for loading into
Gephi [4]. In figure 12 an example of a Syntgen generated temporal network with lifecycle events can be
seen. A simple analysis of the transition from T2 to T3 can be found in table 4. The events were
16/22
(a) Uncorrelated network (α = 1, β = 1, D =
20)
(b) Assortative network (α = 21, β = 1, D =
20)
(c) Dissortative network (α = 1, β = 21, D =
20)
(d) Failed assortative network (α = 21, β =
1, D = 25)
Figure 10. Assortative Experiments on power-law networks with 10,000 nodes, varying the average
degree from 20 to 25 and maximum degree from 100 to 500, with an average community size of ≈ 168.
Every point on the chart is a link with (x, y) coordinates representing the connecting nodes degrees. The
point size is directly proportional to the total number of links with equal coordinates. As can be seen, as
we increase the average node degree from 20 to 25 by increasing maximum node degree from 100 to 500,
it is no longer possible to generate a correlated network with stated metrics even with aggressive beta
distribution shape parameters.
categorized as a function of the Jaccard Index [17] between communities, based on an external threshold
to indicate community continuation.
5 Remarks, Discussion and Conclusion
Syntgen is a network generator with constraints. Links between nodes are created I.I.D. over explicit and
implicit user specifications. Although a single instance may deviate from the required specifications, the
average of a set of generations will converge asymptotically to those specifications.
When using the supplied distribution samplers for node degree and community size, the size of the
network has an impact on how closely specifications can be followed. For example, a network with a low
average number of communities, will have community size distributions that are likely not recognizable
17/22
Figure 11. Temporal node degree correlation as a function of the Beta Distribution shape
parameters Evolution of the node degree Pearson's correlation at 11 successive time steps for different
specifications of the Beta distribution shape parameters.
Community Event @ end of time T2
Continues shrinking in 3
Continues shrinking in 10
Continues shrinking in 2
Continues growing in 6
Continues growing in 9
Split into [12, 11]
Merged Into 11
Continues shrinking in 1
Continues growing in 4
Continues in 5
Merged Into 11
3
10
2
6
9
8
8
1
4
5
7
Community Event @ beginning of time T3
12
2
3
10
9
6
1
4
5
11
11
from Split 8
Continued shrinking from 2
Continued shrinking from 2
Continued shrinking from 10
Continued growing from 9
Continued growing from 8
Continued shrinking from 1
Continued growing from 4
Continued from 5
from Split 8
Merged from [8, 7]
Table 4. Community events on time step transition
Note community 8 as it splits into 12 and merges into 11 continuing in both communities
when compared to parameter derived expectations.
It is also of note that, although Syntgen proceeds basically I.I.D. when wiring the network, every time
a "dead-end" is encountered on graphable specifications, the affected process is restarted after re-wiring
adjustments. For instance, if, while generating intra links inside a community, a node exhausts its list of
candidate nodes before satisfying its degree, other established links will be broken so that the process
can proceed to satisfaction. This, in practice, "breaks" the I.I.D. aspect of the system, although for most
specifications the impact will be marginal depending on the density of the communities and of the
18/22
(a) Network at time T2 with 10 communities, numerically and color identified.
(b) Network at time T3 with 9 communities with merge and split events.
Figure 12. Nodes marked "X" are examples of nodes to be killed across the transition to T3. Nodes
with a spiral are example of nodes that changed communities, and nodes marked "B" are examples of
new born nodes. Community 8 split from T2 to T3 into community 12 and split-merged with community
5 to community 11.
network.
Joint degree distribution specifications and node affinity over time is influenced by user parameters,
19/22
but is also restricted by network wiring requirements and structural cutoffs [10]. This is the reason why
it is not possible to directly specify node joint degrees or temporal correlation.
The ratio of intra to total node degree has a direct impact on the clustering modularity at any given
time. The only node information kept by Syntgen is the intra-community and inter-community node
degree that the user provides, and its linked nodes and community membership, generated by Syntgen.
If specifications are not conducive to a clustered network, community membership will not be recovered
from the network structure.
In fact, modularity is affected not only by the above ratio, but also by assortativity specifications. In
a highly correlated network it is possible that the clustering generated by Syntgen does not exhibit
maximum modularity, which can be verified experimentally. The intuition is that, as nodes exhibit
connection preferences, communities within communities may appear, resulting in improved modularity
with a larger number of communities.
The main aim of Syntgen is to provide researchers in network science a tool flexible enough to
generate temporal networks that approximates the topology observed in empirical networks. Syntgen can
help where real data is not easily accessible, but whose structure and topology is known. In the process
of building Syntgen, we developed a method to determine the graphability of intra and inter node degree
and community size sequences, and a heuristic to find the node flow that results in the closest clusterings
at successive time steps, given a network and a community size sequence.
We plan to use the developed search heuristic to determine change points in temporal networks with
community structure. The intuition is that change points are correlated with a peak in community
activity which would be detected as an increase in the dissimilarity gap between successive snapshots of
the network. The gap to the (near) optimal flow would be a proxy of intensive change.
Other extensions to our work include the usage of Syntgen to evaluate community detection
algorithms on temporal networks and analysing syntgen capabilities to reproduce empirical systems.
Acknowledgment
This project was partially supported by FCT (Funda¸cao para a Ciencia e Tecnologia) through project
UID/Multi/04466/2019. Rui Jorge Lopes was partly supported by the Funda¸cao para a Ciencia e
Tecnologia, under Grant UID/EEA/50008/2019 to Instituto de Telecomunica¸coes. The authors are
thankful to Gergeley Palla and his team for relevant topical discussions and to Maria J. Pereira for
careful review of the draft manuscript.
References
1. Baldoni, V., Berline, N., De Loera, J. A., Dutra, B., Koppe, M., Moreinis, S., Pinto,
G., Vergne, M. & Wu, J. (2014) A User 's Guide for LattE integrale v1.7.2. .
2. Barab´asi, A.-L. (2015) NETWORK SCIENCE. 4. The scale-free property. Network Science, pp.
1 -- 57.
3. Barvinok, A. & Pommersheim, J. E. (1999) An Algorithmic Theory of Lattice Points in
Polyhedra. 38, 91 -- 147.
4. Bastian, M., Heymann, S. & Jacomy, M. (2009) Gephi: An Open Source Software for
Exploring and Manipulating Networks. Third International AAAI Conference on Weblogs and
Social Media, pp. 361 -- 362.
5. Blondel, V. D., Guillaume, J.-l. & Lefebvre, E. (2008) Fast unfolding of communities in
large networks. Journal of Statistical Mechanics: Theory and Experiment.
6. Boguna, M., Pastor-Satorras, R. & Vespignani, A. (2003) Cut-offs and finite size effects
in scale-free networks. (1), 1 -- 5.
20/22
7. Choudum, S. A. (1986) A simple proof of the Erdos-Gallai theorem on graph sequences. Bulletin
of the Australian Mathematical Society, 33(1), 67 -- 70.
8. Clauset, A., Shalizi, C. R. & Newman, M. E. J. (2009) Power-law distributions in empirical
data.. SIAM Review, 51(4), 661 -- 703.
9. Clauset, A. S. F. I. (2013) The configuration model. Network Analysis and Modeling, CSI 5352,
Lecture 11, (October), 1 -- 6.
10. Dorogovtsev, S. N. & Mendes, J. F. (2002) Evolution of networks. Advances in Physics,
51(4), 1079 -- 1187.
11. Erdos, P. & Gallai, T. (1960) Gr´afok elo´ırt fok´u pontokkal. Matematikai Lapok, 11, 264 -- 274.
12. Euler, L. (1736) Solutio problematis ad geometrian situs pertinentis. Comentarii academiae
scientarum Petropolitanae, 8, 128 -- 140.
13. Fortunato, S. & Barth´elemy, M. (2007) Resolution limit in community detection.. Pnas,
104(1), 36 -- 41.
14. Fortunato, S. & Hric, D. (2016) Community detection in networks: A user guide. Physics
Reports, 659, 1 -- 44.
15. Granell, C., Darst, R. K., Arenas, A., Fortunato, S. & G??mez, S. (2015) Benchmark
model to assess community structure in evolving networks. Physical Review E - Statistical,
Nonlinear, and Soft Matter Physics, 92(1), 1 -- 11.
16. Greene, D. (2010) Tracking the Evolution of Communities in Dynamic Social Networks. 2010
International Conference on Advances in Social Network Analysis and Mining : ASONAM 2010 :
proceedings 2010.
17. Jaccard, P. (1912) THE DISTRIBUTION OF THE FLORA IN THE ALPINE ZONE.1. New
Phytologist, 11(2), 37 -- 50.
18. Korf, R. E. (1998) A complete anytime algorithm for number partitioning. Artificial Intelligence,
106(2), 181 -- 203.
19. Kraskov, A., Stogbauer, H., Andrzejak, R. G. & Grassberger, P. (2003) Hierarchical
Clustering Based on Mutual Information. arXiv:q-bio/0311039v2.
20. Lancichinetti, A. & Fortunato, S. (2009) Community detection algorithms: A comparative
analysis. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 80(5), 1 -- 12.
21. Lancichinetti, A., Fortunato, S. & filippo Radicchi (2008) Benchmark graphs for testing
community detection algorithms. Physical Review E.
22. Loera, J. A. D. (2005) The Many Aspects of Counting Lattice Points in Polytopes.
Mathematische Semesterberichte, 52(2), 175 -- 195.
23. Meila, M. (2007) Comparing clusterings-an information based distance. Journal of Multivariate
Analysis, 98(5), 873 -- 895.
24. Newman, M. E. (2003) Mixing patterns in networks. Physical Review E - Statistical Physics,
Plasmas, Fluids, and Related Interdisciplinary Topics, 67(2), 13.
25. Newman, M. E. J. (2004) Algorithms for graph partitioning: A survey. Social Networks, 6(2),
1 -- 34.
26. Newman, M. E. J., Strogatz, S. H. & Watts, D. J. (2000) Random graphs with arbitrary
degree distributions and their applications. .
21/22
27. Palla, G., Barab´asi, A.-L. & Vicsek, T. (2007) Quantifying social group evolution. Nature,
446(7136), 664 -- 667.
28. Rossetti, G. (2017) RD YN : graph benchmark handling community dynamics. Journal of
Complex Networks, (January), 893 -- 912.
29. Stanton, I. & Pinar, A. (2011) Prescribed Joint Degree Distribution. CoRR, abs/1103.4,
1 -- 29.
30. Tripathi, A., Venugopalan, S. & West, D. B. (2010) A short constructive proof of the
Erdo{double acute}s-Gallai characterization of graphic lists. Discrete Mathematics, 310(4),
843 -- 844.
31. Wagner, S. & Wagner, D. (2007) Comparing Clusterings - An Overview. KITopen,
4769(001907), 1 -- 19.
32. Yang, Z., Algesheimer, R. & Tessone, C. J. (2016) A Comparative Analysis of Community
Detection Algorithms on Artificial Networks. Scientific Reports, 6(August), 30750.
22/22
|
1908.02575 | 1 | 1908 | 2019-07-27T06:49:47 | Alternative Blockmodelling | [
"cs.SI",
"cs.LG",
"stat.ML"
] | Many approaches have been proposed to discover clusters within networks. Community finding field encompasses approaches which try to discover clusters where nodes are tightly related within them but loosely related with nodes of other clusters. However, a community network configuration is not the only possible latent structure in a graph. Core-periphery and hierarchical network configurations are valid structures to discover in a relational dataset. On the other hand, a network is not completely explained by only knowing the membership of each node. A high level view of the inter-cluster relationships is needed. Blockmodelling techniques deal with these two issues. Firstly, blockmodelling allows finding any network configuration besides to the well-known community structure. Secondly, blockmodelling is a summary representation of a network which regards not only membership of nodes but also relations between clusters. Finally, a unique summary representation of a network is unlikely. Networks might hide more than one blockmodel. Therefore, our proposed problem aims to discover a secondary blockmodel representation of a network that is of good quality and dissimilar with respect to a given blockmodel. Our methodology is presented through two approaches, (a) inclusion of cannot-link constraints and (b) dissimilarity between image matrices. Both approaches are based on non-negative matrix factorisation NMF which fits the blockmodelling representation. The evaluation of these two approaches regards quality and dissimilarity of the discovered alternative blockmodel as these are the requirements of the problem. | cs.SI | cs | Alternative Blockmodelling
Oscar Fabian Correa Guerrero
Student number: 594842
Supervisors: Dr. Jeffrey Chan and Dr. Vinh Nguyen
Number of credit points: 75
Current research unit: COMP60002 Computer Science Research Project
Department of Computer Science and Software Engineering
THE UNIVERSITY OF MELBOURNE
November 2014
Abstract
Many approaches have been proposed to discover clusters within networks. Community
finding field encompasses approaches which try to discover clusters where nodes are tightly
related within them but loosely related with nodes of other clusters. However, a community
network configuration is not the only possible latent structure in a graph. Core-periphery and
hierarchical network configurations are valid structures to discover in a relational dataset.
On the other hand, a network is not completely explained by only knowing the membership of
each node. A high level view of the inter-cluster relationships is needed. Blockmodelling
techniques deal with these two issues. Firstly, blockmodelling allows finding any network
configuration besides to the well-known community structure. Secondly, blockmodelling is a
summary representation of a network which regards not only membership of nodes but also
relations between clusters.
Finally, a unique summary representation of a network is unlikely. Networks might hide more
than one blockmodel. Therefore, our proposed problem aims to discover a secondary
blockmodel representation of a network that is of good quality and dissimilar with respect to a
given blockmodel.
Our methodology is presented through two approaches, (a) inclusion of cannot-link constraints
and (b) dissimilarity between image matrices. Both approaches are based on non-negative
matrix factorisation NMF which fits the blockmodelling representation. The evaluation of these
two approaches regards quality and dissimilarity of the discovered alternative blockmodel as
these are the requirements of the problem.
i
Contents
Abstract .......................................................................................................................................... i
Chapter 1 ....................................................................................................................................... 1
1.1.
Background.................................................................................................................... 2
1.2.
Contributions of the Thesis ........................................................................................... 4
1.2.1.
Proposal of the Alternative Blockmodelling problem in relational data............... 4
Approach to discover a different and plausible alternative blockmodel
1.2.2.
representation with respect to a given one .......................................................................... 4
Insights into challenges and problems presented when approaching the
1.2.3.
proposed problem by using instance-based constraints ...................................................... 5
Chapter 2 ....................................................................................................................................... 6
2.1.
Alternative clustering in non-relational data ................................................................ 6
2.1.1.
Information-theoretic approaches ........................................................................ 6
2.1.2.
Instance-level constraint-based approaches ........................................................ 7
2.2.
Community finding within networks ........................................................................... 10
2.3.
Blockmodelling ............................................................................................................ 12
2.4.
Conclusions ................................................................................................................. 13
Chapter 3 ..................................................................................................................................... 14
3.1.
Fundamental concepts ................................................................................................ 15
3.1.1.
Non-negative matrix factorisation NMF ............................................................. 15
3.1.2.
Solving SNMTF ..................................................................................................... 18
3.1.3.
Normalisation vs. Iterative Lagrangian Solution ................................................. 20
3.2. Outline of our Methodology ....................................................................................... 22
3.3.
Approach 1: Inclusion of cannot-link constraints ........................................................ 23
3.4.
Approach 2: Dissimilarity between image matrices .................................................... 25
3.4.1.
Generalised form ................................................................................................. 26
3.5.
Evaluation .................................................................................................................... 27
Chapter 4 ..................................................................................................................................... 29
4.1.
The novel Alternative Blockmodelling problem .......................................................... 29
4.2.
Approaches to solve this problem .............................................................................. 38
4.2.1.
Effect of 𝜷 parameter on both approaches ........................................................ 43
4.3.
Considerations about instance-level constraints ........................................................ 44
Chapter 5 ..................................................................................................................................... 47
References ................................................................................................................................... 49
List of Figures
Figure 1-1: Blockmodelling ............................................................................................................ 3
Figure 2-1: Cannot link constraints ............................................................................................... 7
Figure 2-2: COALA ......................................................................................................................... 8
Figure 2-3: Communities and Blockmodelling ............................................................................ 10
Figure 2-4: Structural Equivalence .............................................................................................. 12
Figure 3-1: Symmetric Non-negative Matrix Tri-Factorisation SNMTF ....................................... 16
Figure 3-2: Two-mode graph of students and subjects [34] ....................................................... 17
Figure 3-3: iVAT graphic which shows some alternative blockmodels ....................................... 28
Figure 4-1: Zachary's karate club. ............................................................................................... 30
Figure 4-2: Zachary's karate club blockmodel representation of the actual division. ................ 30
Figure 4-3: Alternative Blockmodels for Zachary's karate club dataset. .................................... 31
Figure 4-4: Chosen alternative network division for Zachary's karate club. .............................. 32
Figure 4-5: Core-periphery alternative blockmodel solution for Zachary's karate club. ............ 33
Figure 4-6: Original karate club's blockmodel discovered as alternative. .................................. 34
Figure 4-7: Actual division of books on American politics dataset. ............................................ 35
Figure 4-8: Blockmodel representation of the actual division of books on American politics. .. 36
Figure 4-9: Alternative blockmodels for Books on American politics dataset. ........................... 37
Figure 4-10: Chosen alternative network division for Books on American politics..................... 37
Figure 4-11: Original Adjacency Matrix which was created from mixing two blockmodel
structures. ................................................................................................................................... 38
Figure 4-12: Quality measurements with different 𝜷 values for both approaches. ................... 40
Figure 4-13: Dissimilarity measurements with different 𝜷 values for both approaches. ........... 41
Figure 4-14: Similarity measures with respect to the core-periphery blockmodel structure with
different 𝜷 values for both approaches. ..................................................................................... 42
Figure 4-15: Number of occurrences of the most common alternative blockmodel with
different 𝜷 values for both approaches. ..................................................................................... 43
List of Tables
Table 1: Iterative Lagrangian solution [12] ................................................................................. 22
Table 2: Outline of our algorithm ................................................................................................ 22
Table 3: P-value from ANOVA of the linear models of the variables 𝜷 (explanatory) vs. metrics
(response).................................................................................................................................... 44
Table 4: P-value from ANOVA of the multiple-regression models of the variables 𝜷 and
percentage of correct constraints (explanatory) vs. metrics (response) .................................... 45
Chapter 1
Introduction
When an individual is confronted to raw data, among her first reactions would be trying to
make sense of them somehow. Getting patterns from data could end being a painful task
especially if the amount of data is massive and/or these data has many features. Furthermore,
appreciation of the data and their grouping might be correct for certain users, but it may not
make sense for others. Therefore, thinking about the existence of a unique grouping of the
data is not adequate and even limiting.
Extensive research has been carried out on alternative clusterings in non-relational data [1-
7]. When datasets have many features, it is tempting to think that data objects can be
clustered regarding a different subset of features each time an alternative solution is searched.
For instance, a document repository may contain millions of documents where each of them
has metadata and topic features. Then, an algorithm can find a candidate clustering of these
documents by taking into account the metadata in first place, and it can also find an
alternative clustering by regarding the topic-based features in second place.
On the other hand, with respect to relational data, community finding has been a widely
studied field which focuses on discovering hidden structures within a network. These
structures are called communities and consist of nodes that are tightly related between them
but loosely related with the ones of other communities. Nonetheless, unlike non-relational
data, most algorithms in community finding do not offer an alternative solution even when
another clustering of communities could be more suitable to a determined user.
Moreover, a totally different hidden structure can be found since community structure is not
the only possible latent configuration. In fact, many real networks follow a power-law degree
distribution -- at least asymptotically- where there is a small number of central or "core" nodes
with lots of connections and a heavy tail of "periphery" nodes with a few connections. This is
the case of social networks, e.g. Twitter®, which has a limited number of very active users with
lots of friends and a considerable amount of passive -- not as active as the former- users with
fewer connections. Thus, a community structure would be difficult to discover in this kind of
networks.
Discovering an alternative community clustering or a completely different network structure
may be more convenient for certain purposes. A user would rather have more options when
she is facing a clustering problem, especially when it is related with a decision-making process.
It should be said that the expected alternative solution must be as good as the initial
proposed clustering that is, it ought to show a coherent division of the network. However, a
trade-off situation might arise between quality and dissimilarity since as dissimilarity
increases quality could be affected and vice versa.
1
Besides to the possibility of discovering different network structures, an alternative clustering
finding approach in graphs might offer more information. Knowing the structure and cluster
membership of the nodes can yield a good understanding of the network, yet it is incomplete.
Relationships between clusters help learn how clusters interact, what role each of them plays
within the whole. This is deeply true in social network analysis where relations -- block within
social analysis jargon- explicitly exist apart of clusters -- position1 is the social term used instead
of clusters. For example, within a trade network, consumers and producers are sound
candidate positions but there also exists a marked consumer-producer relationship which is
needed to explain the network completely.
Therefore, this thesis presents a novel approach which overcomes these issues by combining
blockmodelling techniques [8] and an efficient and well-proved optimisation approach called
non-negative matrix tri-factorisation [9-11]. Firstly, through blockmodelling, it is suitable to
represent an entire network by two basic matrices: position membership matrix and an image
matrix, i.e. the matrix which shows the relations between clusters. Moreover, blockmodelling
manages to summarise a complex network through a smaller comprehensible representation
that can encompass different network structures such as communities, core-periphery, and so
on. Thus, community finding is a special case of blockmodelling where the image matrix is a
diagonal matrix. Secondly, the clustering process can be regarded as a non-convex
optimisation problem where a local optimum might be found by decomposing the network
adjacency matrix2 into three sub-matrices factors: position membership matrix -- twice- and
image matrix. This process is carried out iteratively through multiplicative update rules [11,
12]. Finally, the proposed objective functions enclose both quality and dissimilarity of the
alternative blockmodel.
The rest of this chapter presents brief background information of relevant terms within the
context of this work. Finally, it also highlights the contributions of this research, yet future
work is possible.
1.1. Background
important related concepts are briefly explained. Graphs, clustering,
In this section,
blockmodelling and optimisation are terms used intensively throughout this thesis and thus,
they need to be explained. Furthermore, contributions of this work are presented.
Graphs consist of nodes, edges and their attributes. A node is also known as vertex and may
represent any entity within a network, e.g. a Facebook® user, a protein within a protein
interaction network or a computer in a LAN3. A node is connected to other nodes through
edges. Both, nodes and edges might have attributes. A node attribute could be its name in the
1 Terms position and cluster can be used interchangeably.
2 Adjacency matrix 𝐴 ∈ ℝ𝑛 𝑥 𝑛 is the representation of a network of 𝑛 nodes where each cell 𝑎𝑖𝑗 ∈ ℝ
corresponds to the weight of the edge between the 𝑖𝑡ℎ and 𝑗𝑡ℎ nodes.
3 LAN = Local Area Network
2
case of a Facebook® user, whereas an edge attribute could be the level of friendship between
two Facebook® users.
Clustering is an application of data mining whose aim is to group similar entities within a
dataset. In order to complete its task, clustering does not count on user supervision. That is,
there is no extra information which would guide its task. However, a recent research field
called semi-supervised clustering can lean on the existence of a small number of labelled
entities which may help guide the clustering process per se. Furthermore, similarity between
entities is an application-dependent measure -- the reader will see that a special similarity
criteria is regarded within this work.
Blockmodelling (See Figure 1-1) aims to summarise the whole structure of the network --
adjacency matrix- through two matrices: (a) position membership matrix, and (b) image matrix.
In the position membership matrix, each row corresponds to a node and each column to a
cluster. The resulting cells have either one or zero4, depending on whether the node belongs
or not to the cluster. On the other hand, the image matrix has the clusters as both rows and
columns, and the cells represent the relation between clusters. Each cell in the image matrix is
known as a block and it has a value of one if there is a relation between clusters or zero
otherwise5. Both matrices form a blockmodel [8].
Figure 1-1: Blockmodelling
An adjacency matrix (left) can be summarised through two matrices (right): position membership matrix and image
matrix. In the position membership matrix, each position corresponds to a column and each node to a row. In the
image matrix, each cell is called block. A block shows if a relation between two positions does exist (1) or not (0).
This is a distinctive characteristic of blockmodelling since it allows a better comprehension of the whole network.
Optimisation is a field in mathematics and computer science where the best element is
searched within many possible alternatives and it may be bounded by one or more constraints.
4 The values of the position membership matrix are not actually 1 or 0, but within [0-1] range. This is
because the matrix factorization process is an approximation of the original adjacency matrix. More
details in Chapter 3.
5 Image matrix will also have values within [0-1] range. More details in Chapter 3.
3
1111112345678123456781111111111111111P1P2P3P1P2P3111P1P2P3P1P2P31234567811111111P1P2P3P1P2P3ADJACENCY MATRIXPOSITION MEMBERSHIP MATRIXIMAGE MATRIXCOMMUNITYHIERARCHYChapter 3 shows our approaches that count on optimisation to find a local minimum for the
proposed objective function.
1.2. Contributions of the Thesis
This section presents the contributions of this thesis:
1.2.1. Proposal of the Alternative Blockmodelling problem in relational data
As far as we know, alternative clustering of a graph through blockmodelling techniques has not
been introduced as a problem in the field. There has been extensive research in alternative
clustering upon non-relational data [1-7]. There are also many algorithms to discover latent
communities within networks [13-23]. However, alternative clustering of relational data in
conjunction with its summary through blockmodel representation is a brand-new problem.
Thus, the proposed problem consists of not only finding an alternative clustering in a graph
given an initial clustering but also revealing interrelations between its clusters through a
blockmodel representation. Throughout this thesis, valuable characteristics related with
blockmodels are presented.
the problem also requires discovering a different alternative blockmodel
Finally,
representation in relation with a given one, yet preserving a plausible division of the network.
1.2.2. Approach to discover a different and plausible alternative blockmodel
representation with respect to a given one
We approach the problem based on the clustering potentiality that matrix factorisation has
[24]. Moreover, matrix factorisation ends up to be closely
linked to a blockmodel
representation of a network since the original adjacency matrix is decomposed into two lower-
rank matrices. These two matrices correspond to the position cluster membership and image
matrices which are the basis of blockmodelling (See Figure 1-1.) Then, a candidate clustering
will be the best approximation to the matrix factorisation. Therefore, the problem becomes an
optimisation problem.
However, this part of the approach would only allow discovering a block model which could
even be the same initial clustering. Then, the optimisation problem demands to be bounded
somehow such that the discovered clustering is dissimilar to the given one. Hence, the
objective function6 requires taking into account the given clustering.
6 Objective function is the equation to be optimized -- minimised or maximised given certain constraints.
4
1.2.3. Insights into challenges and problems presented when approaching the
proposed problem by using instance-based constraints
Our first approach focused on matrix factorisation and semi-supervised clustering by including
instance-level constraints [25]. These constraints were built upon the given clustering in such a
way that the discovered alternative blockmodel is dissimilar to it. Although, this approach
looks promising since semi-supervised clustering has been successful by benefiting of the
presence of very limited supervisory information -- in this case, the given clustering-, it also
presents some challenges. These challenges are especially related with their construction and
identification.
Therefore, we offer some insights into the problems, challenges and future work within the
application of instance-level constraints when finding a dissimilar clustering. Chapter 5 shows
some conclusions about this approach, but more
its challenges and
considerations.
importantly
5
Chapter 2
Literature Survey
Discovering an alternative blockmodel within a graph is related with alternative clustering in
non-relational data, community finding within networks and blockmodelling techniques.
Nonetheless, none of them strictly finds an alternative blockmodel representation of a
network based on a given one. This chapter surveys these techniques and explains why they
are different from the proposed problem.
2.1. Alternative clustering in non-relational data
Alternative clustering approaches in non-relational data are techniques which discover
alternative groupings within multidimensional datasets, e.g. document repositories, protein
databases, etc. Alternative clustering has been approached from different perspectives from
which we survey two of them: information-theoretic-based and instance-level-constraint-
based methods.
2.1.1. Information-theoretic approaches
Conditional Information Bottleneck -- CIB- [6] is an information-theoretic approach that
minimises the mutual information between the data objects and the cluster labels and
maximises the mutual information between the features and cluster labels given the side
information -- initial clustering. According to [1], CIB is the most relevant work in alternative
clustering field. However, CIB makes some assumptions when estimating the distribution of
the random variables, i.e. data objects, features, cluster labels and side information.
In contrast to CIB, another information-theoretic approach called minCEntropy offers the
possibility of finding a clustering or an alternative clustering without being provided a
probability distribution [7]. minCEntropy works in an unsupervised manner which allows
discovering a clustering, whereas minCEntropy+ and minCEntropy++, semi-supervised versions
of minCEntropy, find alternative clusterings with respect to a given clustering.
Similarly to CIB, minCEntropy is an objective-function-oriented approach which minimises the
conditional entropy based on the intuition that entropy is the inverse of mutual information.
By using mutual information, an algorithm tries to maximise the information between the data
and the clustering. Then, clustering by using entropy will minimise it, which is the principle of
this approach.
6
A very similar approach to minCEntropy is proposed in [4]. The authors called their method
Non-linear Alternative Clustering with Information theory -- NACI-. It is also an information-
theoretic method that maximises the information between the clustering and the data objects
while minimises the information between the sought alternative and the reference clustering.
NACI is oriented to find alternative clusterings on non-linear datasets, that is, it is not limited
to spherically shaped clusterings. minCEntropy and NACI benefit from a kernel density
estimation tool known as Parzen windows which allows them to estimate the probability
densities of their random variables. In this way, the pitfall encountered in CIB, associated with
its probability distribution assumption, can be avoided. However, both approaches need to be
provided the standard deviation -- width- 𝜎 for the kernel function since they use a Gaussian
kernel.
Clustering for Alternatives with Mutual Information -- CAMI- is a neat and mathematically well
founded information-theoretic approach which has an unsupervised nature [3]. Its objective
function is conceived in such a way both clusterings are found at the same time, i.e. the
reference and the alternative clusterings, through a Gaussian mixture where each cluster is a
multivariate Gaussian distribution. Although CAMI looks similar to CIB, CAMI proved to be
more accurate. The explanation resides on CAMI's explicit quality assurance -- likelihood
maximisation- which CIB clearly lacks.
2.1.2. Instance-level constraint-based approaches
Besides to information-theoretic approaches, there are methods which encode the side
information, i.e. the given clustering, as the so called instance-level constraints.
Figure 2-1: Cannot link constraints
The figure shows two subgraphs within the given
clustering. In the first one (top,) one cluster is depicted
with blue colour. From these three nodes, 3 cannot-link
constraints were created and they are shown in the top
of the table. Similarly, in the second subgraph, two
clusters are depicted and their cannot-link constraints
are also included in the table.
An instance-level constraint encapsulates the relationship between two data objects --
instances- within the given clustering. Let 𝑥𝑖, 𝑥𝑗 𝑤ℎ𝑒𝑟𝑒 𝑖 ≠ 𝑗 be two instances in a dataset. If
both instances belong to the cluster 𝑐𝑘, a cannot-link constraint is created. Cannot-link
constraints identify instances that cannot-be-linked -- cannot belong to the same cluster- in the
alternative clustering since they are already linked in the given clustering (See Figure 2-1).
7
13246758CANNOT-LINK121323456778From Figure 2-1, it can be inferred that every possible cannot-link constraint has been
created which is not an appropriate approach since not all of them can be fulfilled when the
number of clusters is fixed (See Chapter 5.)
On the other hand, it is important to emphasise that the side information -- reference
clustering- has been given a negative connotation. In other words, while in the given clustering
the known associations between instances of the same clusters may be regarded as positive,
they become the contrary when finding an alternative solution, i.e. the constraints negate that
link.
Nonetheless, cannot-link constraints are not the only possible kind of constraints may be
inferred from the given clustering. Must-link constraints indicate the pairs of instances that
need to belong to the same cluster. Must-link constraints negate the lack of link between two
instances in the given clustering. Let 𝑥𝑖, 𝑥𝑗 𝑤ℎ𝑒𝑟𝑒 𝑖 ≠ 𝑗 be two instances in a dataset. If, in the
given clustering, both instances belong to clusters 𝑐𝑘, 𝑐𝑙 respectively where 𝑘 ≠ 𝑙, a must-link
constraint is created showing the aim 𝑥𝑖, 𝑥𝑗 end up belonging to the same cluster in the
alternative solution. Although this approach looks plausible, issues can arise. Chapter 5
analyses them deeply.
Constrained Orthogonal Average Link Algorithm -- COALA- is an instance-level constraint
approach which ensures the dissimilarity between the given and the alternative clusterings by
including cannot-link constraints in their algorithm [1]. However, dissimilarity of the alternative
clustering is not the only aim of this method. Like the previous presented approaches, it also
intends to discover a high-quality alternative solution. This is achieved by imposing a lowest
quality threshold the alternative clustering must have. Thus, this approach also comprises a
trade-off between two competitive objectives: dissimilarity and quality.
Figure 2-2: COALA
COALA is a hierarchical agglomerative algorithm which starts its execution by considering every data object as an
individual cluster -- only one member. Then, an iterative process merge -- agglomerates- the clusters. Each iteration
of this process is depicted in this figure. Pair (q1, q2) corresponds to the pair of clusters that has the minimum
distance between them. Pair (o1, o2) refers to the pair of clusters that has the minimum distance between them
and also satisfies the constraints created in a pre-processing stage. A ratio is computed and compared against a pre-
specified threshold ω. If this ratio is greater or equal than ω, the clusters containing instances q1 and q2 are
merged. On the contrary, if the ratio is less than ω, clusters containing instances o1 and o2 are merged.
8
Get pair(q1, q2)Get pair(o1, o2)d(q1, q2) / d(o1, o2)>= ω Mergecq1, cq2Mergeco1, co2YNIn COALA, a set 𝐿 of cannot-link constraints is generated previous the clustering process as
such. This set contains every possible cannot-link constraint, that is, it contains the nodes that
cannot be linked -- cannot belong to the same cluster- in the alternative clustering since they
are already linked in the given clustering. Afterwards, a customised hierarchical agglomerative
clustering process is carried out. This algorithm is represented in Figure 2-2.
As a hierarchical agglomerative algorithm, it starts its execution by considering every data
object as an individual cluster, that is, it has only one member. The notion of dissimilarity in
COALA corresponds to the distance between clusters. Average-linkage7 is the chosen
technique to compute such distance. Then, within an iterative process, pairs (q1, q2) and (o1,
o2) are computed. The first refers to the pair of clusters that has the minimum distance
between them. The second corresponds to the pair of clusters that has the minimum distance
between them and also satisfies the constraints in set 𝐿. A ratio between these two distances
is computed and compared against the quality threshold ω. If the result is greater or equal, the
algorithm merges the first pair of clusters -- ensuring quality. Otherwise, it merges the second --
ensuring dissimilarity.
Besides to this algorithm, [1] propose: COALACat, which is a variant of the original COALA
algorithm that can be used with categorical datasets; and, a new metric to measure both
dissimilarity and quality through a unique score.
It is important to mention that since COALA has been built upon a hierarchical clustering
method, it suffers from the same limitations of that approach. For example, it cannot handle
overlapping clusters and its quadratic running time might be a concern for large datasets.
Alternative Distance Function Transformation -- ADFT- is another instance-level constraint-
based approach which deals with the side information in a different manner. Instead of
negating the links, in the case of instances of the same cluster, this approach does create a set
of must-link constraints. Likewise, instead of negating the lack of links between instances that
belong to different clusters, it also creates a set of cannot-link constraints. Hence, it is actually
characterising the provided information through instance-level constraints.
The characterisation process is conceived as a transformation from dataset 𝑋 into clustering 𝐴.
From the sets of constraints, a distance function 𝐷 is learnt. Finally, an alternative
transformation function 𝐷′ is computed which converts the original dataset from which an
alternative clustering 𝐴' is found through any algorithm.
Obviously, this is not an exhaustive list and it only focuses on two perspectives. What is
important to rescue is that the presented alternative clustering approaches include a trade-off
between two competitive objectives: quality and dissimilarity. On the other hand, they are
not suitable to find alternative clusterings within relational data since they do not take into
account structural characteristics of networks.
7 Average-linkage computes the average distance of all pairwise objects between clusters.
9
2.2. Community finding within networks
Community finding tries to discover network latent structures called communities for which
there is not a universally accepted definition. Nonetheless, most work on the field consider
communities as network structures whose nodes are tightly related within them but loosely
related with nodes of other clusters, i.e. there are a noticeable greater number of edges
between nodes within a community than the number of edges between nodes of different
communities. This conception of communities becomes relevant to our work because
communities can be regarded as a special case of blockmodelling where the image matrix is a
diagonal matrix.
Figure 2-3: Communities and Blockmodelling
When communities are considered as structures with densely interconnected nodes within them but with sparse
connections between nodes of different communities, community finding
is a sub-problem within the
blockmodelling field. In this figure, the adjacency matrix has three communities of vertices. Recall that the image
matrix shows the relationships between positions -- communities- through blocks. Thus, the image matrix is a
diagonal matrix since there is no interrelations between positions in a community finding scheme.
Figure 2-3 shows an adjacency matrix which could be partitioned into three communities. In
section 1.1, it was mentioned the role image matrix has within a blockmodel representation.
Recall that it shows the relationships between positions -- in this case: communities- through
blocks. Conceptually, a community does not have relations with other communities -- which
actually does not happen. Thus, the image matrix in community finding is a diagonal matrix.
By far, communities have been the most studied network structure. It has been approached
from different perspectives, however, it has not been solved satisfactorily yet [15]. We briefly
explain some of them which we consider important within the field and for our work.
An information-theoretic approach known as InfoMod is presented in [26], which considers
community detection as a problem of finding an efficient compression of the network. It is
worth to notice that this approach is oriented to find communities by maximising mutual
10
1111112345678123456781P1P2P3P1P2P3P1P2P3P1P2P31234567811111111P1P2P3P1P2P3ADJACENCY MATRIXPOSITION MEMBERSHIP MATRIXIMAGE MATRIXCOMMUNITIES11111111111DIAGONALMATRIXinformation between a model and the actual network. However, [26] mention that
constraining the approach to find only communities will not necessarily maximise mutual
information. In a second experiment they remove those constraints and find an alternative
clustering.
Regarding optimisation methods, simulated annealing algorithms, greedy algorithms, spectral
methods, extremal optimisation algorithms and so on, have showed noticeable results in the
field of community detection [27]. Many of these approaches are based on the optimisation of
a widely accepted metric called modularity Q introduced by [20]. Modularity Q can have values
within the range [-1, 1] where 1 represents a network with a strong community structure --
good quality. This metric is useful in divisive methods like [20] and [14] where a higher value of
Q indicates a satisfactory split. It does not happen in hierarchical divisive clustering methods
where it is not well determined when to stop the splitting process.
Nonetheless, [16] showed that optimising the modularity Q metric enforces to find clusters at
a coarse level. It means that some clusters which are smaller than a certain threshold might
not be discovered. Furthermore, the approach proposed in [20] shows an important
shortcoming related with its complexity. It takes 𝑂(𝑛3) time on sparse graphs where 𝑛 stands
for the number of nodes.
Therefore, [13] considered improving approach's complexity in [20] by applying an iterative
greedy local algorithm which maximise the modularity Q of the communities in each iteration.
[13] demonstrated the computational efficiency of their approach by identifying language
communities in a mobile phone network of 118 million nodes and more than one billion of
links. Moreover, due also to its high quality results, it has become widely used [27].
[19] proposed a different approach based on modularity but using spectral principles of the
network. This new approach takes 𝑂(𝑛2 log(𝑛)) which is considerably better. This method and
many other linear approaches based on spectral clustering such as Principal Component
Analysis -- PCA-, Independent Component Analysis -- ICA- and eigenvalue decomposition allow
the existence of negative values in the resulting matrices after the factorisation process.
[22] introduced another information-theoretic algorithm based on random walks called
InfoMap also known as Map equation method. This is a remarkable work within community
finding field since it outperforms by far many of the proposed algorithms [17, 21]. Moreover,
its rationale and its reduced time and space complexities make it a very attractive method.
This approach tries to minimise the description length -- MDL8- by using firstly a greedy search
algorithm and then, a simulated annealing approach.
Although community finding approaches now deal with relational datasets, they are limited to
only one possible network structure, the so-called communities. Moreover, none of these
approaches tries to find an alternative community structure.
8 Minimum description length is a principle in which the best hypothesis for a given set of data is the one
that leads to the best compression of the data.
11
2.3. Blockmodelling
Within blockmodelling and Social Network Analysis contexts, similarity between nodes is
determined by the so-called structural equivalence. Structural equivalence considers that
nodes within a network are structurally equivalent, that is, belong to the same position, if they
have exactly the same set of incoming and outgoing relations (See Figure 2-4). However, most
real datasets do not contain nodes that are structurally equivalent in the strict sense of the
definition. Therefore, the basic objective is to divide the network into positions, each of which
contains nodes that are approximately structurally equivalent. For example, when comparing
two pairs of nodes, the pair that is more approximately structural equivalent will be the one
that has more common relations.
Figure 2-4: Structural Equivalence
(A) Nodes 1, 2, and nodes 3, 4, 5 are two clusters of
structurally equivalent nodes. For example, nodes 1 and 2
can represent two teachers and nodes 3, 4 and 5 can
represent their students. In this case, the teachers have the
same group of students and this group of students is taught
by the same two teachers. Therefore, both teachers and
students are two clusters of structurally equivalent nodes.
(B) None of the nodes are structurally equivalent. For
instance, Twitter users 6 and 8 follow user 7, but user 8 also
follows user 9. Thus, these users are not structurally
equivalent.
[28] proposed a novel framework called FactorBlock to discover blockmodels that are present
in noisy and sparse networks. [28] show that a repeated number of experiments using the
algorithms introduced by [29] yield incorrect results as the factorisation algorithms penalise
equally the edges and non-edges9 -this is especially noticeable in sparse datasets. Therefore,
the introduced approach includes a weighting scheme in the objective function. Likewise,
noisiness is dealt by including more constraints into the function.
The problem of evolving blockmodels has also been studied, yet unlike static blockmodels, the
rules to define the structural equivalence within dynamic blockmodels are not well defined.
Also, within dynamic graphs is not clear what the best blockmodel is. There is a risk of
representing each change with a blockmodel -- overfitting- or only one block model for the
whole evolutionary process -- inaccuracy. Therefore, in [30], two definitions of evolving
structural equivalence and an information theoretic approach to determine when a new
blockmodel is necessary are proposed.
In [28], blockmodelling is related with Non-negative matrix factorisation -- NMF-, an essential
concept within our work (See section 3.1.1). In fact, [28] shows how the decomposition of an
adjacency matrix could lead to the blockmodel representation. Our methodology (See Chapter
3) is based on this effective clustering process.
9 Adjacency matrices of sparse datasets have many blank cells which correspond to non-edges.
12
6789(B)12345(A)Nonetheless, any of the surveyed blockmodelling approaches deals with the problem of
discovering an alternative blockmodel representation.
2.4. Conclusions
Our survey has presented different approaches to solve problems related to alternative
blockmodelling. From these methods, some valuable conclusions can be stated:
- Quality and dissimilarity between reference and alternative clusterings are opposite
objectives so that a trade-off parameter allows controlling their effect on the whole
objective.
- Community finding is a special case of blockmodelling where the image matrix is a
diagonal matrix.
- Blockmodelling techniques identify positions -- clusters- by evaluating structural
characteristics of the nodes within a network. The most important equivalence metric
in this field is called structural equivalence.
13
Chapter 3
Methodology
Based on the proposed problem (See section 1.2.1,) our approach must find an alternative
blockmodel representation of a network. This representation is a summary of the adjacency
matrix of the network through two sub-matrices: position membership matrix and image
matrix. Then, decomposition of the adjacency matrix into factor matrices of lower rank can be
thought as a plausible approach to find a summary of the adjacency matrix. For example, PCA
is a widely used method for dimensionality reduction by performing either eigenvalue
decomposition10 of a data covariance matrix11 or Singular Value Decomposition -- SVD- of a data
matrix.
Nonetheless, PCA or SVD do not constrain the range of the values within the factor matrices. In
other words, the factor matrices might have negative values. Let 𝑋 ∈ ℝ𝑝 𝑥 𝑛 be the adjacency
matrix of a network of 𝑛 vertices. Then,
𝑋 ≈ 𝑈𝛴𝑉∗
is the singular value decomposition of 𝑋 into two sub-matrices 𝑈 ∈ ℝ𝑝∗𝑘 and 𝑉 ∈ ℝ𝑛∗𝑘 where
𝑘 is chosen to hold: 𝑘 ∗ (𝑝 + 𝑛) ≪ 𝑝 ∗ 𝑛.
Although a summary of the adjacency matrix is achieved through the dimensionality reduction,
the presence of negative values in any of the factor sub-matrices makes interpretation harder
within a clustering context. Then, a positive matrix factorisation process would accomplish this
requirement. But first,
Can we consider matrix factorisation of the adjacency matrix a clustering process?
How is matrix factorisation related with blockmodelling?
Does matrix factorisation identify structural characteristics of the nodes in order to
determine similarity/dissimilarity between them?
The next section presents fundamental concepts to our methodology which can answer these
questions.
10 Eigenvalue decomposition is the factorization of a matrix into eigenvalues and eigenvector matrices.
11 Covariance matrix 𝐶 ∈ ℝ𝑛 𝑥 𝑛 has each cell 𝑐𝑖𝑗 = 𝑐𝑜𝑣(𝑖𝑡ℎ 𝑣𝑒𝑐𝑡𝑜𝑟, 𝑗𝑡ℎ 𝑣𝑒𝑐𝑡𝑜𝑟) where 𝑖𝑡ℎ and 𝑗𝑡ℎ are
column vectors within dataset 𝐷 ∈ ℝ𝑚 𝑋 𝑛.
14
3.1. Fundamental concepts
3.1.1. Non-negative matrix factorisation NMF
Non-negative matrix factorisation -- NMF- decomposes a matrix into factor sub-matrices with
non-negativity constraints. Therefore, NMF is an approximation of the form
𝑋 ≈ 𝑌𝑍𝑇
where 𝑋 ∈ ℝ+
𝑝∗𝑛, 𝑌 ∈ ℝ+
𝑝∗𝑘 and 𝑍 ∈ ℝ+
𝑛∗𝑘
𝑋 is a matrix with non-negative values that could be mapped to the adjacency matrix of a
network. Then, the factorisation process becomes an optimisation problem which minimises
the error of the approximation 𝑋 ≈ 𝑌𝑍𝑇.
In [10], the authors present NMF with its non-negativity constraints. In fact, they demonstrate
the importance NMF constraints have as they guide to a parts-based representation of a
whole. By restraining to non-negative values, only additive combinations would be present.
Hence, NMF is indeed more appropriate when it is compared against linear methods such as
PCA and SVD. However, the question arises again:
Can we consider NMF of the adjacency matrix a clustering process?
Experiments carried out by [31] and [32] showed the effectiveness of NMF in clustering and
pattern recognition. Moreover, [9] demonstrated that NMF is related to k-means clustering
and graph partitioning methods. Therefore, NMF is an appropriate clustering tool of relational
data which has the added value of being interpretable.
Nevertheless, the approximation 𝑋 ≈ 𝑌𝑍𝑇 does not resemble the blockmodel configuration.
Thus:
How is NMF related with blockmodelling?
[29] and [33] propose non-negative matrix tri-factorisation -- NMTF- as an option to deal with
the blockmodel problem. NMTF is the decomposition of a matrix into three factor sub-
matrices. Its general form is shown below:
𝑋 ≈ 𝐹𝑀𝐺𝑇
where 𝑋 ∈ ℝ+
more common that 𝑘 = 𝑙 [9].
𝑝 𝑥 𝑛, 𝐹 ∈ ℝ+
𝑝 𝑥 𝑘, 𝑀 ∈ ℝ+
𝑘 𝑥 𝑙 and 𝐺 ∈ ℝ+
𝑛 𝑥 𝑙. In this case, 𝑘 ≠ 𝑙 but it is
However, this general form does not map to the blockmodel configuration. In order to
overcome this issue, a useful consideration is that 𝑋 = 𝑋𝑇 = 𝐴 since 𝑋 represents the
15
adjacency matrix and thus, it is symmetric12. As a consequence 𝐹 = 𝐺 = 𝐶. Then, the
symmetric non-negative matrix tri-factorisation -- SNMTF- form follows:
𝐴 ≈ 𝐶𝑀𝐶𝑇
𝑨 represents the adjacency matrix, 𝑪 the position membership matrix and 𝑴 the image
matrix. Hence, SNMTF maps nicely to the blockmodel configuration (See Figure 3-1).
Figure 3-1: Symmetric Non-negative Matrix Tri-Factorisation SNMTF
This figure shows a graphical representation of the symmetric nonnegative matrix tri-factorization approximation.
An adjacency matrix is decomposed into three sub-matrices.
Does SNMTF
similarity/dissimilarity between them?
identify structural characteristics of the nodes
in order to determine
As stated in section 2.3, structural equivalence is the most used criteria in Social Network
Analysis when evaluating common structural characteristics of nodes within a network. Recall
that structural equivalence considers that two nodes within a network are structurally
equivalent if they have exactly the same set of incoming and outgoing relations. This
conception of equivalence between nodes imposes a challenge to conventional clustering
algorithms on networks. For instance, let's consider a two-mode network of students and
subjects taken by these students. A graph of this example is shown in Figure 3-2.
In this example, traditional clustering algorithms could not be able to discover clusters of only
students or clusters of only subjects. The reason is because there are no explicit relations
between students neither between subjects. However, S1, S2 and S3 are structurally
equivalent since they have the same set of taken subjects -- incoming and outgoing relations.
The good news is that NMF is able to deal with structural equivalence as it is demonstrated by
[34] on several real network datasets.
Therefore, NMF and its special case SNMTF are the appropriate tools in order to face the
proposed problem (See section 1.2.1.) These tools have the competence for clustering
relational data. They also fit nicely with the blockmodelling configuration; and, they can deal
12 WARNING: We are considering in our work only undirected networks.
16
TabcdefghijklmnopabcdefghijklmnopP1P2P3P4P1P2P3P41001010000000011P1P2P3P4P1P2P3P4abcdefghijklmnopP1P2P3P4abcdefghijklmnopP1P2P3P4ACCTMwith the challenge of equivalence in networks. Furthermore, their ability to handle structural
equivalence allows them to discover network structures other than communities.
Figure 3-2: Two-mode graph of students and subjects [34]
Finally, it is worth to mention NMF offers advantages as a clustering process:
- NMF can be used in different types of networks such as non-directional, e.g. a social
network like Facebook®; and, directional, e.g. email network.
- NMF is able to manage soft and hard13 clustering. In the case of soft clustering, due to
the fact that NMF is an approximation of an adjacency matrix through the
multiplication of three sub-matrices, the real values within the position membership
matrix could be normalised as probabilities of membership of each cluster. On the
contrary, to achieve hard clustering, it is only necessary to include orthogonality
constraints between the columns of the position membership matrix. Afterwards, NMF
is applied with no variation.
13 In soft clustering, nodes within a network can belong to more than one cluster. Hard clustering allows
nodes to belong to only one cluster.
17
3.1.2. Solving SNMTF
In [11], NMF is regarded as an optimization problem of either the conventional least squares
error or the Kullback-Leibler divergence14 -𝐷𝐾𝐿-. Similarly, [29] consider NMTF as a least
squares error problem. In both cases, the problem is solved by minimising the corresponding
loss function -- least squares error or 𝐷𝐾𝐿
Since our methodology is based on SNMTF, we present the initial objective function that
minimises the least squares error between the adjacency matrix and its approximation -the
multiplication of three sub-matrices.
min
𝐶≥0,𝑀≥0
2
‖𝐴 − 𝐶𝑀𝐶𝑇‖𝐹
(1)
2 is the square of the Frobenius norm15, 𝐴 ∈ ℝ+
𝑛 𝑥 𝑛, 𝐶 ∈ ℝ+
𝑛 𝑥 𝑘 and
where ‖∙‖𝐹
𝑘 𝑥 𝑘.
𝑀 ∈ ℝ+
[11] observed that the optimisation problem is convex if one of the two matrices 𝐶 or 𝑀 is
fixed; otherwise, when both 𝐶 and 𝑀 are variable, the problem becomes not convex. Thus,
SNMTF is a not convex optimisation problem for which only a local optimum solution can be
found. [11] also presented a relative efficient iterative algorithm called multiplicative update
rules to estimate a local optimum. These rules can be thought as a rescaled gradient descent16
algorithm. They guarantee the accomplishment of the non-negativity constraints since no
subtraction is present -- which does not happen in the gradient descent algorithm where
variable values might change by subtraction.
In our methodology, multiplicative update rules are obtained by restating the objective
function (1). Since this optimisation problem encompasses inequality constraints -- non
negativity constraints-, Karush-Kuhn-Tucker -- KKT- multipliers are introduced as new variables
into (1). Hence, the initial SNMTF objective function becomes:
𝐹(𝐶, 𝑀, 𝜇1, 𝜇2) = ‖𝐴 − 𝐶𝑀𝐶𝑇‖𝐹
2 − 𝑡𝑟(𝜇1𝐶𝑇) − 𝑡𝑟(𝜇2𝑀𝑇)
(2)
where 𝑡𝑟(∙) is the trace17 of a matrix and 𝜇1 and 𝜇2 are the KKT multipliers.
The introduction of KKT multipliers is a strategy to find a local optimum of a function subject to
inequality constraints. KKT multipliers are variables within a system of equations
14 Kullback-Leibler divergence 𝐷𝐾𝐿(𝑃𝑄) measures the dissimilarity between two probability
distributions 𝑃 and 𝑄: 𝐷𝐾𝐿(𝑃𝑄) = ∑ 𝑙𝑛 (𝑃(𝑖)
15 Frobenius norm is also called Euclidean distance norm and it is obtained as follows: ‖𝐴‖𝐹 =
𝑃(𝑖)
𝑄(𝑖)
)
𝑖
.
𝑛
𝑖=1
𝑚
𝑗=1
2
√∑ ∑ 𝑎𝑖𝑗
16 Gradient descent is an optimisation algorithm which finds a local minimum. First of all, the gradient of
the objective function at the current point is obtained -- if it is possible, otherwise, it is estimated. Then,
the independent variables changes in the direction of the negative gradient.
17 Trace of a matrix 𝐴: 𝑡𝑟(𝐴) = ∑ 𝑎𝑖𝑖
𝑖
18
corresponding to conditions -- KKT conditions- for a solution to be optimal. An analytical
solution to this system of equations is not trivial, thus the multiplicative update rules provide a
mechanism to find an approximation.
For convenience, in Equation (2), ‖∙‖𝐹
2 can be expressed by using 𝑡𝑟(∙) as:
𝐹(𝐶, 𝑀, 𝜇1, 𝜇2) = 𝑡𝑟(𝐴𝑇𝐴) − 2𝑡𝑟(𝐴𝑇𝐶𝑀𝐶𝑇) + 𝑡𝑟(𝐶𝑀𝑇𝐶𝑇𝐶𝑀𝐶𝑇) − 𝑡𝑟(𝜇1𝐶𝑇)
− 𝑡𝑟(𝜇2𝑀𝑇)
The partial derivatives of function (3) with respect to 𝐶 and 𝑀 are:
𝜕𝐹
𝜕𝑪
= 2(𝐶𝑀𝑇𝐶𝑇𝐶𝑀 + 𝐶𝑀𝐶𝑇𝐶𝑀𝑇) − 2(𝐴𝑇𝐶𝑀 + 𝐴𝐶𝑀𝑇) − 𝜇1
𝜕𝐹
𝜕𝑴
= 2(𝐶𝑇𝐶𝑀𝐶𝑇𝐶) − 2(𝐶𝑇𝐴𝐶) − 𝜇2
The partial derivatives of function (3) with respect to the KKT multipliers are:
𝜕𝐹
𝜕𝝁𝟏
= −𝐶;
𝜕𝐹
𝜕𝝁𝟐
= −𝑀
(3)
(4)
(5)
When 𝜕𝐹
𝜕𝝁𝟏
and 𝜕𝐹
𝜕𝝁𝟐
are equalled to zero, the resulting equations refer to the boundaries of the
inequality constraint functions. Thus, these derivatives are not regarded as part of the system
of equations from which the multiplicative update rules are defined.
The multiplicative update rules for solving equation (3) are shown below:
𝐴𝑇𝐶𝑀 + 𝐴𝐶𝑀𝑇
𝐶𝑖𝑗 ← 𝐶𝑖𝑗 [
𝐶𝑀𝑇𝐶𝑇𝐶𝑀 + 𝐶𝑀𝐶𝑇𝐶𝑀𝑇]
𝑖𝑗
(6)
(7)
𝑀𝑖𝑗 ← 𝑀𝑖𝑗 (
𝐶𝑇𝐴𝐶
𝐶𝑇𝐶𝑀𝐶𝑇𝐶
)
𝑖𝑗
Equations (6) and (7) are computed iteratively until a stop criterion is reached. Normally, this
criterion is the extent of change of the value of the objective function from the previous to the
current iteration. If the change is less than a threshold, e.g. < 10-5, it is reasonable to think that
the algorithm has converged; then, the algorithm can stop.
However, NMF is an initialisation-sensitive algorithm. Its efficiency depends mostly on which
point in the search space the matrices 𝐶 and 𝑀 start off. Therefore, in our methodology, the
algorithms are run many times with random starting points for those matrices.
19
Up to this point, no alternative-blockmodelling-related strategy has been included in the
equations. In this chapter, as part of our methodology we derive two different approaches
which append new objectives to the main objective function (1): (a) inclusion of cannot-link
constraints, and (b) dissimilarity between image matrices.
But before diving into our approaches, let's discuss two possible normalisation strategies.
3.1.3. Normalisation vs. Iterative Lagrangian Solution
Random initialisation of the matrices 𝐶 and 𝑀 at the beginning of the algorithm injects
uncertainty on finding a local minimum for the objective function. But, this is not the only
reason why many different possible solutions could be found after running iteratively the
multiplicative update rules. As noticed by [35], in the simpler NMF configuration
𝐹 = 𝐶𝐻𝑇
where 𝐹 ∈ ℝ+
𝑛 𝑥 𝑚, 𝐶 ∈ ℝ+
𝑛 𝑥 𝑘 and 𝐻 ∈ ℝ+
𝑚 𝑥 𝑘.
there exist a large number of matrices (𝐴, 𝐵) such that 𝐴𝐵𝑇 = 𝐼, 𝐶𝐴 ≥ 0, 𝐻𝐵 ≥ 0. Hence,
(𝐶𝐴, 𝐻𝐵) is a possible solution since it has the same function value 𝐹. Normalisation of the
factor matrices is an action to remove part of the uncertainty.
Regarding the SNMTF configuration
𝐴 = 𝐶𝑀𝐶𝑇
where 𝐴 ∈ ℝ+
𝑛 𝑥 𝑚, 𝐶 ∈ ℝ+
𝑛 𝑥 𝑘 and 𝑀 ∈ ℝ+
𝑘 𝑥 𝑘.
Intuitively, the position membership matrix 𝐶 represents the probability of the nodes to belong
to each cluster 𝑐𝑙, 1 ≤ 𝑙 ≤ 𝑘. Therefore, matrix 𝐶 is a right stochastic18 matrix where
𝑘
∑ 𝐶𝑖𝑙
𝑙=1
= 1; ∀𝑖, 1 ≤ 𝑖 ≤ 𝑛
(8)
Therefore, because of removing uncertainty and following the intuition of stochasticity, factor
matrices must be normalised. [12] propose two methods besides to conventional
normalisation since the authors demonstrate that conventional normalisation suffers from
leading to potential poor local optimum and slow convergence rate.
From those two methods, our methodology uses the relaxation version of the stochasticity
constraints. Then, the objective function (1) becomes
18 There are also left and vectorised stochastic matrices. In a left stochastic matrix, the values of the
column 𝑖 sum up to 1 for all 𝑖. In a vectorised stochastic matrix, all values sum up to 1.
20
2
min‖𝐴 − 𝐶𝑀𝐶𝑇‖𝐹
subject to ∑ 𝐶𝑖𝑙
𝑘
𝑙=1
= 1; ∀𝑖, 1 ≤ 𝑖 ≤ 𝑛
(9)
𝐶 ≥ 0, 𝑀 ≥ 0
In order to deal with the inequality constraints and the new set of equality constraints, KKT
and Lagrange multipliers are introduced into the objective function (9). Then, this function,
with its constraints, is equivalent to
𝑛
𝑘
𝐹(𝐶, 𝑀, {𝜆𝑖}𝑖=1
𝑛 , 𝜇1, 𝜇2) = ‖𝐴 − 𝐶𝑀𝐶𝑇‖𝐹
2 + ∑ 𝜆𝑖 (∑ 𝐶𝑖𝑙 − 1
)
− 𝑡𝑟(𝜇1𝐶𝑇) − 𝑡𝑟(𝜇2𝑀𝑇)
(10)
where {𝜆𝑖}𝑖=1
𝑛 are the Lagrange multipliers.
𝑖
𝑙=1
The partial derivative of function (10) with respect to 𝑀 remains the same (See equation (5)),
whereas there is a slight variation in the partial derivative of the function with respect to 𝐶
(See equation (4)) as follows:
𝜕𝐹
𝜕𝑪
= 2(𝐶𝑀𝑇𝐶𝑇𝐶𝑀 + 𝐶𝑀𝐶𝑇𝐶𝑀𝑇) − 2(𝐴𝑇𝐶𝑀 + 𝐴𝐶𝑀𝑇) − 𝜦 − 𝜇1
(11)
where 𝜦 = [𝜆𝑖𝑗] is the matrix of Lagrange multipliers.
Following the iterative Lagrangian solution proposed in [12], variables of function 𝐹 can be
solved as follows:
a. A preliminary update rule
′ ← 𝐶𝑖𝑗
𝐶𝑖𝑗
− + 𝜆𝑖
∇𝑖𝑗
+
∇𝑖𝑗
where
∇+= (𝐶𝑀𝑇𝐶𝑇𝐶𝑀 + 𝐶𝑀𝐶𝑇𝐶𝑀𝑇); ∇−= 𝐴𝑇𝐶𝑀 + 𝐴𝐶𝑀𝑇
b. This preliminary update rule replaces the corresponding term in the equality constraint
𝑘
∑
𝑏=1
𝐶𝑖𝑏
= 1
c. Solving for 𝜆𝑖
𝑘
∑ 𝐶𝑖𝑏
𝑏=1
𝑘
−
∇𝑖𝑏
+ + 𝜆𝑖 ∑
∇𝑖𝑏
𝑏=1
𝐶𝑖𝑏
+
∇𝑖𝑏
= 1
−
∇𝑖𝑏
+
∇𝑖𝑏
𝜆𝑖 =
𝑘
1 − ∑
𝑏=1
𝐶𝑖𝑏
𝑘
∑
𝑏=1
𝐶𝑖𝑏
+
∇𝑖𝑏
21
d.
In the preliminary update rule, 𝜆𝑖 is replaced
𝐶𝑖𝑗 ← 𝐶𝑖𝑗
− 𝐺𝑖𝑗 + 1
∇𝑖𝑗
+ 𝐺𝑖𝑗 + 𝐻𝑖𝑗
∇𝑖𝑗
where
(12)
𝐺𝑖𝑗 = ∑
𝑏
𝐶𝑖𝑏
+
∇𝑖𝑏
; 𝐻𝑖𝑗 = ∑ 𝐶𝑖𝑏
𝑏
−
∇𝑖𝑏
+
∇𝑖𝑏
Table 1: Iterative Lagrangian solution [12]
Equation (12) is the new multiplicative update rule for 𝐶 using the iterative Lagrangian
approach. It is worth to mention that the "moving term" trick [36] was applied in step (d).
The multiplicative update rule for 𝑀 remains the same (See equation (7)).
3.2. Outline of our Methodology
Once we have presented both the suitability of NMF -- particularly SNMTF- to solve the
proposed problem (See section 1.2.1) and the algorithm -- multiplicative update rules- to
optimise it, we outline our algorithm at a high level,:
Step 1: Uniform random initialisation of matrices 𝑀 and 𝐶 with nonnegative values.
Step 2: Update 𝑀
Step 3: Update 𝐶
Step 4: Verify the stop
criterion
Table 2: Outline of our algorithm
Iterative multiplicative update rules DEPEND ON THE
CHOSEN APPROACH. Our methodology comprises
two approaches:
cannot-link
constraints (See section 3.3), and (b) dissimilarity
between image matrices (See section 3.4)
inclusion of
(a)
If the change of the objective function value -- from
previous to current iteration- is less than a threshold, e.g.
< 10-5, the loop ends; otherwise a new iteration starts from
Step 2.
In each of our two approaches, the objective function stated in (9) is expanded by adding
different objectives which encode the alternative blockmodelling purpose.
Finally, evaluation of the alternative blockmodelling solution is carried out in order to show the
achievement of the quality and dissimilarity requirements.
22
3.3. Approach 1: Inclusion of cannot-link constraints
As mentioned in section 2.1.2, instance-level constraints encode side-information as pairs of
instances -- nodes in relational data- in the form of cannot-link and must-link constraints. With
respect to our problem, side-information refers to the given or reference clustering. Thus,
instance-level constraints translate the information provided by the reference clustering into
cannot-link and must-link constraints.
Nonetheless, in this approach, we decided to work only with cannot-link constraints (See
Chapter 5 for details.) Moreover, we regard the reference clustering as negative information
about the sought alternative clustering. That is, this approach is similar to the one proposed by
[1] where a pair of instances that belong to the same cluster in the reference clustering
becomes a cannot-link constraint. In this way, the clustering process is guided to discover a
dissimilar clustering with respect to the given one.
Therefore, cannot-link constraints can be included into the objective function (9) in such a way
that violation of these constraints is penalised, i.e.
min
𝐶≥0,𝑀≥0
‖𝐴 − 𝐶𝑀𝐶𝑇‖𝐹
2 + 𝒕𝒓(𝜷𝑪𝑻𝚯𝑪)
subject to ∑ 𝐶𝑖𝑙
𝑘
𝑙=1
= 1; ∀𝑖, 1 ≤ 𝑖 ≤ 𝑛
(13)
𝐶 ≥ 0, 𝑀 ≥ 0
where Θ corresponds to the cannot-link constraints matrix and 𝛽 is a trade-off
2 and the dissimilarity term
parameter between the quality term ‖𝐴 − 𝐶𝑀𝐶𝑇‖𝐹
𝑡𝑟(𝛽𝐶𝑇Θ𝐶).
The effect of the new term 𝑡𝑟(𝐶𝑇Θ𝐶) within the objective function (13) is shown in Example 1:
0 𝜃 0
𝜃 0 0
0 0 0
] , 𝐶𝑡 = [
1 0
1 0
0 1
]
Example 1:
Θ = [
This example shows a cannot-link constraints matrix Θ that is built based on the
reference clustering. This matrix states the aim of break the link between nodes 1 and
2 since a value 𝜃 > 0 was placed in positions (1, 2) and (2, 1). It also shows a position
membership matrix obtained at time 𝑡 through the multiplicative update rules. Thus, if
at this time 𝑡 the objective function (13) is evaluated, the expression
𝑡𝑟 (𝐶𝑡𝑇
Θ𝐶𝑡) = 𝑡𝑟 ([
1 1 0
0 0 1
] [
0 𝜃 0
𝜃 0 0
0 0 0
] [
1 0
1 0
0 1
]) = 𝑡𝑟 ([
2𝜃 0
0
0
]) = 2𝜃
23
Whereas, if at time 𝑡 + 1
Then, the expression
𝐶𝑡+1 = [
1 0
0 1
0 1
]
𝑡𝑟 (𝐶𝑡+1𝑇
Θ𝐶𝑡+1) = 𝑡𝑟 ([
1 0 0
0 1 1
] [
0 𝜃 0
𝜃 0 0
0 0 0
] [
1 0
0 1
0 1
]) = 𝑡𝑟 ([
0 𝜃
𝜃 0
]) = 0
Hence, the effect of 𝑡𝑟(𝐶𝑇Θ𝐶) is indeed the expected, i.e. it penalises the violation of
the cannot-link constraint by incrementing the value of the objective function at time 𝑡
by 2𝜃.
This approach presents two opposite objectives that represent quality and dissimilarity
respectively. Hence, a trade-off parameter 𝛽 is needed to balance the effect of the
dissimilarity term on the whole objective.
After the inclusion of the new term, the partial derivative (11) shifts to
𝜕𝐹
𝜕𝑪
= 2(𝐶𝑀𝑇𝐶𝑇𝐶𝑀 + 𝐶𝑀𝐶𝑇𝐶𝑀𝑇) − 2(𝐴𝑇𝐶𝑀 + 𝐴𝐶𝑀𝑇) − 𝛬 − 𝜇1 + 𝟐𝚯𝑪
(14)
Whereas, the partial derivative (5) remains the same.
Consequently, the multiplicative update rules for matrices 𝐶 and 𝑀 are
where
𝐶𝑖𝑗 ← 𝐶𝑖𝑗
− 𝐺𝑖𝑗 + 1
∇𝑖𝑗
+ 𝐺𝑖𝑗 + 𝐻𝑖𝑗
∇𝑖𝑗
𝐺𝑖𝑗 = ∑
𝑏
𝐶𝑖𝑏
+
∇𝑖𝑏
; 𝐻𝑖𝑗 = ∑ 𝐶𝑖𝑏
𝑏
−
∇𝑖𝑏
+
∇𝑖𝑏
∇+= (𝐶𝑀𝑇𝐶𝑇𝐶𝑀 + 𝐶𝑀𝐶𝑇𝐶𝑀𝑇 + 𝜷𝚯𝑪); ∇−= 𝐴𝑇𝐶𝑀 + 𝐴𝐶𝑀𝑇
𝑀𝑖𝑗 ← 𝑀𝑖𝑗 (
𝐶𝑇𝐴𝐶
𝐶𝑇𝐶𝑀𝐶𝑇𝐶
)
𝑖𝑗
24
(15)
(16)
3.4. Approach 2: Dissimilarity between image matrices
Quality and dissimilarity are the objective functions that compete within the alternative
clustering scheme as it was shown in [1, 3, 4, 7]. Our first approach also leverages that
concept. This second approach inherits this idea but within the context of blockmodelling.
Thus, quality is assured by the least squares error, whereas dissimilarity is addressed by the
intuition of differences between image matrices. Recall that image matrix in blockmodelling
shows the relationships between positions -- clusters-, that is, an image matrix shows the
network structure as a sort of summary. Then, a different image matrix would correspond to a
different network structure. For example, if our given clustering has a community structure
represented by its image matrix, it would make sense to "negate" that structure through an
objective function that maximises the difference between the image matrices.
Therefore, the term representing the dissimilarity between the given and the alternative
image matrices is included into the base objective function (9) as follows
min‖𝐴 − 𝐶𝑀𝐶𝑇‖𝐹
2 − 𝜷‖𝑴(𝟎) − 𝑴‖
𝟐
𝑭
subject to ∑ 𝐶𝑖𝑙
𝑘
𝑙=1
= 1; ∀𝑖, 1 ≤ 𝑖 ≤ 𝑛
(17)
𝐶 ≥ 0, 𝑀 ≥ 0
where 𝑀(0) ∈ ℝ+
is a trade-off parameter between the quality term ‖𝐴 − 𝐶𝑀𝐶𝑇‖𝐹
term ‖𝑀(0) − 𝑀‖
𝑘 𝑥 𝑘 corresponds to the image matrix of the given clustering. Again, 𝛽
2 and the dissimilarity
.
2
𝐹
After the inclusion of the new term, the partial derivative (5) shifts to
𝜕𝐹
𝜕𝑴
= 2(𝐶𝑇𝐶𝑀𝐶𝑇𝐶) − 2(𝐶𝑇𝐴𝐶) − 𝜇2 + 𝟐𝜷(𝑴(𝟎) − 𝑴)
(18)
The partial derivative with respect to 𝐶 does not change (See equation (11)). As a
consequence, the multiplicative update rules for matrices 𝐶 and 𝑀, for our second approach
are
25
𝐶𝑖𝑗 ← 𝐶𝑖𝑗
− 𝐺𝑖𝑗 + 1
∇𝑖𝑗
+ 𝐺𝑖𝑗 + 𝐻𝑖𝑗
∇𝑖𝑗
where
𝐺𝑖𝑗 = ∑
𝑏
𝐶𝑖𝑏
+
∇𝑖𝑏
; 𝐻𝑖𝑗 = ∑ 𝐶𝑖𝑏
𝑏
−
∇𝑖𝑏
+
∇𝑖𝑏
∇+= (𝐶𝑀𝑇𝐶𝑇𝐶𝑀 + 𝐶𝑀𝐶𝑇𝐶𝑀𝑇); ∇−= 𝐴𝑇𝐶𝑀 + 𝐴𝐶𝑀𝑇
𝑀𝑖𝑗 ← 𝑀𝑖𝑗 (
𝐶𝑇𝐴𝐶 + 𝜷𝑴
𝐶𝑇𝐶𝑀𝐶𝑇𝐶 + 𝜷𝑴(𝟎))
𝑖𝑗
(19)
(20)
3.4.1. Generalised form
This second approach can be generalised to find an alternative blockmodel which is different
from a set of given blockmodels. This set of reference clusterings might be constructed
incrementally by using even any other approach. Hence, the generalised form of the objective
function (17) is as follows
𝕭
min‖𝐴 − 𝐶𝑀𝐶𝑇‖𝐹
2 − ∑ 𝜷𝒑‖𝑴(𝒑) − 𝑴‖
𝟐
𝑭
𝒑=𝟎
subject to ∑ 𝐶𝑖𝑙
𝑘
𝑙=1
= 1; ∀𝑖, 1 ≤ 𝑖 ≤ 𝑛
𝐶 ≥ 0, 𝑀 ≥ 0
where 𝔅 corresponds to the number of given blockmodels -- image matrices.
The multiplicative update rule for matrix 𝑀 is
𝑀𝑖𝑗 ← 𝑀𝑖𝑗 (
𝜷𝒑
𝜷𝒑
𝕭
𝐶𝑇𝐴𝐶 + 𝑴 ∑
𝒑=𝟎
𝕭
𝒑=𝟎 𝑴(𝒑)
𝐶𝑇𝐶𝑀𝐶𝑇𝐶 + ∑
)
𝑖𝑗
The multiplicative update rule for matrix 𝐶 remains the same as (19).
26
(21)
(22)
3.5. Evaluation
Now, how can we evaluate the effectiveness of our approaches?
Since the objective function of both approaches comprise a trade-off between quality and
dissimilarity, the discovered alternative blockmodel must be quantitatively evaluated from
these two perspectives.
With respect to quality, external evaluation might be hard to be carried out because the gold-
standard is unlikely to be known, especially when we are trying to discover a novel blockmodel
representation. On the other hand, current internal evaluation measures are not well-suited to
blockmodelling as a fitting model of the data. However, in [30] the concept of MDL is adapted
to the blockmodelling problem. It regards that a blockmodel is a suitable model if its encoding
cost is low. The total encoding cost of a blockmodel is determined by the aggregate of the
costs of its positions and its blocks, and it is called Individual Snapshot Encoding in [30]. Then,
the total encoding cost of a blockmodel 𝔅 is
𝐶𝑖𝑛𝑑(𝔅) = 𝐶(𝑛) + 𝐶(𝒞) + 𝐶(𝒢𝒞)
where 𝐶(𝑛) is the cost of sending the number of vertices 𝑛 -- it is necessary for
reconstruction reasons19-, 𝐶(𝒞) is the cost of encoding the positions, and 𝐶(𝒢𝒞) is
the cost of encoding the blocks.
We refer to [30] for details on computation of the partial costs.
In the case of dissimilarity, as stated by [37], there are plenty of metrics that might be used
when comparing two clusterings. However, all of them fail to consider particular structural
characteristics of blockmodels. For instance, when comparing two clusterings by computing
the Normalised Mutual Information20 -- NMI-, this metric might consider them as similar when
actually, the density of the blocks between certain positions is quite different. Therefore, [37]
proposes some structure-aware distance measures from which we are using the one called
Kullback-Leibler Reconstruction Measure. It is based on the Kullback-Leibler divergence
between matrices. Therefore, this measure is asymmetric and it can be regarded as using the
edge distributions in the second blockmodel to encode the edge distributions in the first. The
edge reconstruction KL distance is defined as
𝑑𝑅𝐾𝐿(𝔅(0), 𝔅(1)) = ∑ ∑ 𝐴
(0) ∗ log (
𝑖,𝑗
𝑖
𝑗
(0)
𝐴
𝑖,𝑗
(1)) −
𝐴
𝑖,𝑗
(0) + 𝐴
𝐴
𝑖,𝑗
(1)
𝑖,𝑗
where 𝐴 is the adjacency matrix approximation, that is, 𝐴 = 𝐶𝑀𝐶𝑇.
19 MDL, as an information theory concept, regards that the data is being compressed to be sent through
a communication channel and reconstructed at the destination.
20 NMI is a measure of mutual dependence between two random variables.
27
As our approaches are based on NMF, they are initialisation-sensitive methods, thus many
runs are needed to find out a tendency in the clustering process. We support our evaluation
process by using a tool called Enhanced Visual Analysis for Cluster Tendency -- iVAT-, which
presents those many alternative blockmodels -- one for each run- in a graphical form. iVAT was
proposed by [38] and is used to estimate the number of possible clusters prior to the clustering
process as such by using the pairwise dissimilarity matrix of objects to be clustered. This tool
reorders the rows and columns of this dissimilarity matrix in such a way that the least
dissimilar -- most similar- objects appear as a set of dark blocks along the diagonal of this
matrix.
As a variation of this form of using iVAT, we run 𝑛 possible blockmodel solutions by using any
of our approaches and instead of creating a dissimilarity matrix of objects; we create a
dissimilarity matrix of blockmodels. This meta-clustering dissimilarity matrix is reordered by
iVAT and shows potential alternative solutions to be exploited along its diagonal. Figure 3-3
shows an example.
Figure 3-3: iVAT graphic which shows some alternative
blockmodels
In this dissimilarity matrix, each column and row
corresponds to a blockmodel solution obtained from
any of our two approaches. The blockmodels can be
compared by using any "distance" metric.
Therefore, our whole evaluation process consists of computing two quantitative metrics for
the quality and dissimilarity requirements. Low 𝑪𝒊𝒏𝒅 and high 𝒅𝑹𝑲𝑳 values are sought. Finally,
iVAT is used as support in order to verify if the chosen alternative blockmodel is likely to be
obtained. It is worth to mention that we are not regarding that the chosen solution needs to
be statistically significant within this "sampling" process of 100 runs. At the end, which really
matters, is to find a dissimilar and good quality solution even if it its occurrence is small.
28
Chapter 4
Experiments
In this section, we show experiments carried out on real and synthetic sets of relational data.
These experiments are focused on reinforcing the contributions stated in section 1.2.
First of all, we show the importance of the proposed problem, "Discovering an alternative
blockmodel solution in a graph", on two real datasets: Zachary's karate club [39] and Books on
American politics [19]. Zachary's karate club dataset is the compilation of the relations
between members of a karate club in an American university where there was an internal
conflict. The instructor and the president of the club had a confrontation which caused the
division of the members into 2 groups -- 2 communities. This dataset consists of 34 members --
nodes- whose relations -- edges- are undirected and unweighted. On the other hand, Books on
American politics is a dataset of books bought on-line in Amazon.com. In this real network,
books are nodes and an edge between two books appears if these two books were purchased
by the same buyer. There are 105 books which span the American political alignments, i.e.
liberal, conservative or centrist.
Secondly, we compare the performance of our two approaches, (1) Inclusion of cannot-link
constraints (See section 3.3), and (2) Dissimilarity between image matrices (See section 3.4);
on a synthetic dataset which has 50 nodes and whose edges are undirected and weighted.
Thirdly, through the application of our second approach on the same synthetic dataset, we
give some insights into the difficulties of this approach and end up with some interesting
conclusions.
Finally, all the experiments were run on an Intel Core i7 2.00GHz PC with 8GB of memory and
running Windows 7.
4.1. The novel Alternative Blockmodelling problem
Zachary's karate club has been adopted as a benchmark in community finding field since it
offers a neat community network structure. It comprises two well defined communities which
align with either the instructor or the president of the club. Figure 4-1 shows this real network
where communities are depicted with different colours.
On the other hand, Figure 4-2 shows the blockmodel representation of the network. Again,
this representation corresponds to the actual division of the network. Note that the dense
blocks are aligned through the diagonal of the matrix.
29
Therefore, by using any of our two approaches, the goal would be to discover an alternative
blockmodel representation of Zachary's karate club regarding the actual blockmodel
representation in Figure 4-2 as the reference clustering. For convenience, we are using the
second approach on this section.
Figure 4-1: Zachary's karate club.
This network shows two well defined communities. Recall that a community is a cluster of nodes where they are
densely connected, but less connected with nodes of other communities.
Figure 4-2: Zachary's karate club
blockmodel representation of the
actual division.
(A) This blockmodel representation of
Zachary's karate club shows the
actual division of the network into
two well defined communities.
Note that the two dense blocks
are aligned through the diagonal
of the matrix. These two dense
blocks not only represent the
communities within the network
but also the lack of relation of
these clusters with other clusters.
the
At
experimental
this
blockmodel is regarded as the
given blockmodel 𝔅(0).
Image matrix corresponding to
this blockmodel representation.
beginning
the
of
stage,
(
0.4643
2.1947𝑒 − 24
2.1931𝑒 − 24
0.4508
)
(B)
30
5101520253051015202530𝔅(0) (A)(B)Hence, the initial image matrix 𝑀(0) 𝑖𝑠 (
2.1931𝑒 − 24
0.4508
0.4643
2.1947𝑒 − 24
). Approach 2 balances
the effect of the dissimilarity term on the whole objective function by using a trade-off
parameter 𝜷. Therefore, the algorithm is run with different values for this parameter. Figure
4-3 shows alternative blockmodel representations of the Zachary's karate club network with
respect to the given image matrix 𝑀(0) for different values of the 𝜷 parameter.
Figure 4-3: Alternative Blockmodels for Zachary's karate club dataset.
31
5101520253051015202530dRKL(𝔅(0), 𝔅(1)) = 2020.4108Cind(𝔅(1)) = 570.9592(A) β = 15101520253051015202530dRKL(𝔅(0), 𝔅(1)) = 1808.67Cind(𝔅(1)) = 610.11905101520253051015202530dRKL(𝔅(0), 𝔅(1)) = 2006.6508Cind(𝔅(1)) = 633.7090(B) β = 55101520253051015202530dRKL(𝔅(0), 𝔅(1)) = 1808.67Cind(𝔅(1)) = 668.11905101520253051015202530dRKL(𝔅(0), 𝔅(1)) = 2006.6508Cind(𝔅(1)) = 633.7090(C) β = 10Alternative blockmodels for different values of β parameter after running our second approach 100 times. An iVAT
plot helps assess the cluster tendency. 𝑑𝑅𝐾𝐿(𝔅(0), 𝔅(1)) corresponds to the Edge Reconstruction Kullback-Leibler
Distance between the given blockmodel 𝔅(0) and the one discovered 𝔅(1) for the corresponding β parameter.
𝐶𝑖𝑛𝑑(𝔅(1)) corresponds to the Individual Snapshot Encoding of 𝔅(1). Both measurements are shown next to each
alternative blockmodel. (A) β = 1. iVAT plot shows consistency across 100 runs. Just one alternative blockmodel can
be discovered whose 𝑑𝑅𝐾𝐿(𝔅(0), 𝔅(1)) is the highest and 𝐶𝑖𝑛𝑑(𝔅(1)) is the lowest. (B) β = 5. iVAT plot shows that
while β increases, a second blockmodel tends to occur more frequently. (C) β = 10. The alternative blockmodels are
very similar to the ones with β = 5. It seems the cluster tendency will not change.
In Figure 4-3, iVAT helps assess the cluster tendency within the 100 runs for each β value. The
Edge Reconstruction Kullback Leibler distance 𝑑𝑅𝐾𝐿 (See section 3.5) between the given
blockmodel 𝔅(0) and the one discovered for the corresponding 𝛽 parameter, that is 𝔅(1), is
shown next to each alternative blockmodel solution. Besides to the dissimilarity measurement,
the quality measurement Individual Encoding Cost is also presented. For 𝛽 = 1 just one
alternative blockmodel is discovered. It happens that this is the chosen alternative blockmodel
since it has the highest 𝑑𝑅𝐾𝐿 value and the lowest 𝐶𝑖𝑛𝑑.
Now, let's find out if this alternative blockmodel representation makes sense. First of all, the
chosen representation resembles a core-periphery network structure where the nodes of one
position -- core- are linked with many nodes of the same and/or other positions. Figure 4-4
shows the network division corresponding to the chosen alternative blockmodel. Core nodes
are depicted with red colour whereas periphery with blue.
Figure 4-4: Chosen alternative network division for Zachary's karate club.
Blue nodes correspond to the core position whereas red nodes to the periphery.
Figure 4-5 shows how our second approach was able to find an alternative blockmodel
solution which corresponds to a different network structure.
32
𝑀(0) = (
0.4643
2.1947𝑒 − 24
2.1931𝑒 − 24
0.4508
)
𝑀(1) = (
7.4898𝑒 − 86
0.6521
0.6521
1.2794𝑒 − 51
)
Figure 4-5: Core-periphery alternative blockmodel solution for Zachary's karate club.
The image matrix M(1) of the core-periphery structure is totally different from M(0) since the algorithm maximised
the dissimilarity between image matrices (See section 3.4.)
We can even regard the alternative blockmodel shown at the right part in
Figure 4-5 as the initial blockmodel 𝕭(𝟎) and try to discover the original blockmodel presented
in Figure 4-2 as its alternative solution.
33
51015202530510152025305101520253051015202530Community StructureCore-Periphery Structure
Figure 4-6: Original karate club's blockmodel discovered as alternative.
iVAT and blockmodels for different 𝛽 parameter values. Note the much higher value for 𝛽 with respect to the value
needed when the discovering process was in the other way (Compare with Figure 4-3.)
34
Figure 4-6 shows the process of discovering an alternative blockmodel when the given
blockmodel 𝔅(0) is the alternative solution found previously. It is interesting to see the value 𝛽
parameter took to discover the original blockmodel. This 𝛽 value is much higher than the 𝛽
value needed in the other way. One possible explanation is that our approach actually tends to
find a solution which is different to the actual division of this particular dataset. Then, the
dissimilarity parameter does not need to be big (𝛽 = 1), whereas if the approach is forced to
find a very different solution to the one it is used to, it demands much more effort (𝛽 = 300).
On the other hand, the behaviour of the dissimilarity measure 𝑑𝑅𝐾𝐿 confirms the effect of the
trade-off parameter on the whole objective function. The bigger the trade-off parameter is set
-- which means more effect of the dissimilarity term-, the bigger the value of the measurement
is. However, there is a kind of plateau that spans from small to big values of 𝛽 where 𝑑𝑅𝐾𝐿 is
roughly equal to 100. It can be thought that the objective function reached a local optimum
from which it could jump off somehow when the trade-off parameter increased.
Now, let's have a look at another real dataset which refers to Books on American politics. The
nodes within this dataset can be clustered according to their political alignment, i.e. liberal,
conservative or centrist. In fact, in the original dataset every book came classified as one of
those tendencies. Figure 4-7 shows the actual division accordingly.
Figure 4-7: Actual division of books on American politics dataset.
In this figure, liberal books are depicted with green, centrist with blue and conservative with red. Any resemblance
to reality is pure coincidental.
Therefore, the initial blockmodel 𝔅(0) with its corresponding image matrix 𝑀(0) are shown in
Figure 4-8.
35
Figure 4-8: Blockmodel representation
of the actual division of books on
American politics.
(A) A blockmodel representation of
the community structure within
the dataset.
Image matrix 𝑀(0) used as input
in our second approach.
(B)
𝑀(0) = (
0.2759
3.21𝑒 − 63 2.20𝑒 − 27
3.59𝑒 − 63
1.80𝑒 − 28
0.3581
0
0
)
0.4514
Our second approach is run over the image matrix 𝑀(0) of Figure 4-8 (B). Figure 4-9 shows
alternative blockmodels for different values of 𝛽 parameter. In this figure, we have dropped
iVAT plots due to space reasons. However, in some cases, we have chosen more than one
alternative solution for an individual parameter value since their occurrence within the 100
runs is similar -- this would have been more obvious by observing iVAT plots.
36
𝔅(0)(A)(B)
Figure 4-9: Alternative blockmodels for Books on American politics dataset.
iVAT plots have been dropped, yet, in some cases, more than one alternative blockmodel is shown for each 𝛽
parameter. At the bottom of each blockmodel, 𝑑𝑅𝐾𝐿 and 𝐶𝑖𝑛𝑑 are also presented. The chosen blockmodel is the one
resulting when 𝛽 = 20.
From the alternative blockmodels in Figure 4-9, we have chosen the one with better quality
(𝛽 = 20) which shows an interesting core-periphery structure of two tiers (See Figure 4-10.)
Figure 4-10: Chosen alternative network division for Books on American politics.
In this figure, the cores of the liberal and conservative ideologies are depicted with green and blue respectively,
whereas the periphery nodes are shown in red.
Again, a core-periphery structure is discovered given a community configuration as input. In
both datasets, the algorithm is prone to discover dense positions with a small number of
nodes. In other words, these positions contain the nodes with the highest degree within the
network which leads to the core-periphery network structures.
37
Furthermore, it is also interesting to see that some alternative blockmodel solutions present
less number of positions with respect to the reference blockmodel. In Figure 4-9, 𝛽 = 5, 𝛽 =
10 and 𝛽 = 50 show blockmodels with two positions. In these cases, the image matrix keeps
its original dimensions, i.e. 3 x 3, yet the position membership matrix presents a column vector
which has the smallest values among the columns for every row.
4.2. Approaches to solve this problem
In the previous section, in order to present the problem, we have showed experiments by
using exclusively our second approach. Therefore, in this section, we are going to focus on
making comparisons between both approaches by applying them on a synthetic dataset.
This synthetic dataset was constructed by mixing two pre-defined clusterings. Each clustering
has three positions, yet their network structure is different. The first clustering has a well-
defined community structure, whereas the second is core-periphery.
Figure 4-11 shows at the left the original weighted adjacency matrix. It has 50 nodes and the
edge occurrence is sampled from a binomial distribution and the weights were from a
lognormal distribution. At the right side, the figure shows the constructed clusterings which
are sought through the application of our both approaches. Nevertheless, it does not mean
that the optimisation process will not be able to find other alternatives. In fact, other plausible
solutions were discovered by our approaches as it will be shown below.
Figure 4-11: Original Adjacency Matrix which was created from mixing two blockmodel structures.
38
The adjacency matrix has 50 nodes and the weights of the edges were sampled from a lognormal distribution with
mean = 5 and standard deviation = 0.5. An edge between two nodes corresponds to a successful occurrence within
a binomial distribution of 𝑪𝒓 ∗ 𝑪𝒄 elements and probability equal to a pre-defined density for the block (block
resulting from the intersection of the positions 𝑪𝒓 and 𝑪𝒄).
Our first set of experiments within this section regards the community structure blockmodel
as the given information. Thus, our goal is to eventually find the core-periphery structure as
an alternative blockmodel.
Both approaches depend on a user parameter 𝛽 which controls either the effect of the cannot-
link constraints matrix or the effect of the dissimilarity between image matrices on the whole
objective function. This effect is illustrated from four different perspectives.
It is important to mention that the magnitude of the 𝜷 parameter is different for each
approach. Hence, it is not correct to compare the approaches based on it. However, we have
experimentally defined the ranges of this parameter for each approach so that plausible
alternative blockmodels were found within them.
For each 𝛽 value we have run each approach 100 times. The most occurring alternative
blockmodel is chosen as representative for that 𝜷 value. The four perspectives from which
this chosen alternative blockmodel is evaluated are:
a) Quality: Individual Snapshot Encoding Cost 𝐶𝑖𝑛𝑑 is calculated for the chosen alternative
blockmodel.
b) Dissimilarity: Kullback-Leibler Reconstruction Measure 𝑑𝑅𝐾𝐿 with respect to the given
blockmodel.
c) Similarity to a target: Recall that our goal is to eventually find the core-periphery or
community structure as an alternative blockmodel with respect to a given community
or core-periphery structure, respectively. Although we have discussed about the
inaccuracy of measures like NMI when evaluating similarity between blockmodels, we
use it since the familiarity of researchers with this metric.
d) Occurrence: The number of times out of 100 runs the chosen alternative blockmodel
appeared.
Figure 4-12 shows that our second approach has alternative blockmodels with encoding costs
less than 1700, whereas the minimum cost in our first approach is not less than 1850 as the
first measure cannot be taken into account since it was with 𝛽 = 0. Furthermore, the first
approach has measures close to 1950 which does not happen with approach 2. It is also
interesting to see that "best" alternative solution for the second approach which, despite of
keeping a community structure, corresponds to a plausible solution as one of the communities
in the alternative blockmodel brings together two communities of the given one. In other
words, although we could not find the target alternative blockmodel -- core-periphery-, we
were able to find a good quality alternative blockmodel.
39
Figure 4-12: Quality measurements with different 𝜷 values for both approaches.
The scenario is different for dissimilarity. Now, approach 1 shows a sort of plateau of 0.65,
whereas for approach 2 there are even measures of dissimilarity equal to 0. Our second
approach also shows several measures less than 0.4. Thus, lack of better quality alternative
blockmodels in approach 1 is compensated by more dissimilar solutions in this particular
situation (See Figure 4-13.)
40
APPROACH 1APPROACH 2
Figure 4-13: Dissimilarity measurements with different 𝜷 values for both approaches.
The third perspective is the similarity with respect to the target blockmodel. Since we ran the
approaches regarding that the given clustering is the one with the community structure, our
target becomes the core-periphery. We show how close/far we are from this goal by NMI.
41
APPROACH 1APPROACH 2
Figure 4-14: Similarity measures with respect to the core-periphery blockmodel structure with different 𝜷 values
for both approaches.
From this perspective, our first approach shows a much better performance. Approach 2
roughly reaches 0.4 of similarity with respect to the core-periphery structure while approach 1
could discover it several times. Nonetheless, the alternative blockmodel found by our second
approach (𝑵𝑴𝑰~𝟎. 𝟒,) perhaps presents a better core-periphery structure than the target
(See Figure 4-14.)
The fourth perspective tries to show how likely an alternative solution could be for each
approach with different values of 𝛽. There are two noticeable facts shown in Figure 4-15: (a)
the average number of occurrences in our first approach is much lower than in our second
approach; and (b) there is a positive linear association between this number and 𝛽 in approach
2 which has not been clearly observed in the other perspectives. Then, it is necessary to have
enough evidence to reject the null hypothesis of no effect of this parameter within both
approaches.
42
APPROACH 1APPROACH 2
Figure 4-15: Number of occurrences of the most common alternative blockmodel with different 𝜷 values for both
approaches.
4.2.1. Effect of 𝜷 parameter on both approaches
In order to conclude with respect to the influence that 𝛽 has on both approaches, we
performed analysis of variance -- ANOVA- of the linear model of the variables. The metrics for
the mentioned perspectives -- quality, dissimilarity, similarity w.r.t. the target and number of
occurrences- are regarded as dependent variables, whereas 𝛽 corresponds to the explanatory
variable. In this study we have taken the 100 observations already made in the previous
43
APPROACH 1APPROACH 2section for each approach. We have also adopted the widely used threshold for P-value < 0.05
to consider a statistic as significant -- statistically significant21.
Approach
𝐶𝑖𝑛𝑑 w.r.t. given
𝑑𝑅𝐾𝐿 w.r.t. given
blockmodel
blockmodel
𝑁𝑀𝐼 w.r.t.
target
blockmodel
No. occurrences
most common
alternative
blockmodel
P-value
Instance-level
constraints
Dissimilarity
between
matrices
image
0.5333
0.3832
0.7216
0.05988 .
3.64e-05 ***
0.0008532 ***
0.0003873 ***
2.2e-16 ***
Signif. codes: 0 '***' 0.001 '**' 0.01 '*' 0.05 '.' 0.1 ' ' 1
Table 3: P-value from ANOVA of the linear models of the variables 𝜷 (explanatory) vs. metrics (response)
From Table 3, we can conclude that there is strong evidence to reject the null hypothesis of
no effect of the trade-off parameter only for our second approach. Our first approach is not
sensitive to 𝜷. This conclusion implies that our metrics, in the first approach, are correlated
with a confounding variable which is the number of constraints. Therefore, the next section
explains the level of influence of this variable on the performance of approach 1.
4.3. Considerations about instance-level constraints
The experiments carried out in the previous section for approach 1 used a "special" cannot-link
constraints matrix. What we mean with special is that this matrix contains the perfect set of
pairs of constraints. In this set, every constraint was constructed taking into account not only
the given blockmodel but also the target. For example, if nodes i and j belong to the same
position in the given blockmodel but not in the target, a constraint is constructed; otherwise,
not. This procedure has three properties:
a) Every constraint is correct. It tries to break a link between two nodes in the given
blockmodel if and only if there is not a link between them in the target. Sadly, the
likelihood of constructing an incorrect constraint is very high since we do not know the
target beforehand.
b) The clustering process is feasible. Although the feasibility problem for cannot-link
constraints is NP-complete [40], knowing the target allows constructing a set of
21 P-value is the probability of observing a value of a statistic -- in this case: F statistic- as or more
extreme than the one actually observed, assuming that the null hypothesis is true. Recall that the null
hypothesis corresponds to the case of no effect of the trade-off parameter over the metrics.
44
constraints which makes the clustering process feasible. In other words, there exists a
partition of the network which satisfies the whole set of cannot-link constraints which
is evidently the target.
c) The number of constraints is appropriate. We show below how important the role of
the number of constraints is in guiding the clustering process.
However, the target blockmodel is unknown beforehand, or at least we cannot count on
knowing the whole structure of a target solution. Nonetheless, some information besides to
the given clustering might be unveiled. Therefore, instead of using the whole perfect set of
constraints, we experiment with a gradually changed percentage of them. In this way we are
keeping properties (a) and (b) which are quite important as we will show below.
Now, let's see what the behaviour of approach 1 is when only a portion of correct cannot-link
constraints is provided. The following experiments also include the trade-off 𝛽 parameter in
order to see if both variables interact with each other. Thus, the experiments consist of the
observations of the four metrics for each of the 180 combinations of the percentage of correct
constraints and 𝛽 parameter -- 10 values of the percentage and 18 values of 𝛽.
Multiple-regression models were fit to these observations and ANOVA was performed on them
to discover whether the interaction of the factors is statistically significant.
% correct
constraints
𝛽 parameter
Interaction of
both factors
𝐶𝑖𝑛𝑑 w.r.t. given
𝑑𝑅𝐾𝐿 w.r.t. given
blockmodel
blockmodel
𝑁𝑀𝐼 w.r.t.
target
blockmodel
No. occurrences
most common
alternative
blockmodel
8.569e-08 ***
<2e-16 ***
< 2e-16 ***
<2e-16 ***
0.2469
0.2675
0.34124
0.2178
0.5282
0.7416
0.03861 *
0.3916
Signif. codes: 0 '***' 0.001 '**' 0.01 '*' 0.05 '.' 0.1 ' ' 1
Table 4: P-value from ANOVA of the multiple-regression models of the variables 𝜷 and percentage of correct
constraints (explanatory) vs. metrics (response)
From Table 4, we can conclude that we do not have enough evidence to reject the null
hypothesis of no interaction between the factor variables to explain the variation of the
quality, dissimilarity and number of occurrences of the most common blockmodel. As
concluded in the previous section, the main effect of 𝜷 parameter over the variation of the
metrics is not statistically significant. Finally, the percentage of correct constraints do
influence on the dependent variables. The greater the number of correct constraints, the
greater the possibility of finding a good alternative blockmodel.
45
Therefore, the existence of correct side information about any alternative blockmodel would
improve the performance of our first approach dramatically. It is obvious we cannot count
on the whole target, yet any information would be quite useful.
46
Chapter 5
Discussion and Conclusions
This chapter summarises the most important findings in this work and also analyses the usage
of instance-level constraints with negative connotation.
From Chapter 2 we can conclude that the relevant work within the field of alternative
clustering only considers non-relational data. When the dataset represents a network, only
community structures have been sought. There are not attempts to summarise the structure
of a network through alternative blockmodels based on given information, that is, initial
blockmodels. Therefore, our two approaches are a novel contribution within both graph
clustering and blockmodelling fields.
Our approaches presented in Chapter 3 are based on two important techniques: (a) SNMTF,
and (b) Iterative Lagrangian Solution [12]. SNMTF has been proved to be an effective clustering
tool within undirected graphs and it also fits nicely with the blockmodelling problem. In turn,
the Iterative Lagrangian Solution is a convenient normalisation technique which follows the
stochastic nature of the position membership matrix and avoids the uncertainty caused when
the factor matrices -- position membership and image matrices- have different magnitudes.
The inclusion of cannot-link constraints to guide the clustering process has been shown to be a
powerful tool but very sensitive to the number and quality of constraints (See Chapter 4.) We
have enough evidence to conclude that the number of constraints has a statistically significant
effect on the values of the evaluation metrics. Furthermore, when experiments regarding
"incorrect" constraints were carried out, the evaluation metrics were not satisfactory22.
Incorrect constraints were constructed taking into account no target information, that is, they
only considered the given blockmodel. The quality of the constraints is dubious because there
is no guarantee that at least one feasible division of the network exists that holds all the
constraints. For instance, if the cannot-link constraints 𝑐1(𝑎, 𝑏), 𝑐2(𝑏, 𝑐) and 𝑐3(𝑎, 𝑐) were
created as 𝑎, 𝑏 𝑎𝑛𝑑 𝑐 belong to the same position in the given blockmodel, there is no feasible
alternative blockmodel with three positions that holds these constraints. What would it have
happened if we would know that 𝑎 𝑎𝑛𝑑 𝑐 belong to the same position in the target alternative
blockmodel beforehand? The answer is that 𝑐3 would not have been created and the
clustering process would be feasible. Therefore, side information of the target alternative
blockmodel is quite valuable for our first approach.
Experiments in Chapter 4 also showed that only our second approach is sensitive to the trade-
off parameter 𝛽. Moreover, there is no interaction between factors: trade-off parameter and
number of constraints.
22 These experiments are not included in Chapter 4 because their results did not show any pattern.
47
On the other hand, our second approach does not have to deal with the complexity of
construction and identification of correct constraints. It is a single-parameter approach which
is able to find a good quality alternative blockmodel. However, it does not seem to be as
powerful as our first approach as it was shown in Chapter 4.
Both approaches were able to find dissimilar and good quality alternative blockmodels with a
common characteristic: they are prone to find "small" positions. In other words, they tend to
discover positions with nodes that have lots of connections, i.e. central nodes. It means that
core-periphery structures are very likely to be found. This trait is inherited from the Iterative
Lagrangian technique as it was discovered while we were in the experimental stage.
We also found empirically that the inclusion of must-link constraints made the clustering
process harder. Identification of "correct" must-link constraints and their number had the
same difficulties as with cannot-link constraints. Moreover, when they were included,
randomness of the alternative solutions increased.
Future work is needed for identification and construction of instance-level constraints as they
are an effective tool in guiding the clustering process. Unfeasibility due to over-constraining
and complexity in the construction are the main disadvantages when dealing with cannot-link
constraints.
48
References
Bae, E. and J. Bailey. Coala: A novel approach for the extraction of an alternate
clustering of high quality and high dissimilarity. in Data Mining, 2006. ICDM'06. Sixth
International Conference on. 2006. IEEE.
Cui, Y., X.Z. Fern, and J.G. Dy. Non-redundant multi-view clustering via
orthogonalization. in Data Mining, 2007. ICDM 2007. Seventh IEEE International
Conference on. 2007. IEEE.
Dang, X.H. and J. Bailey. Generation of Alternative Clusterings Using the CAMI
Approach. in SDM. 2010. SIAM.
Dang, X.-H. and J. Bailey. A hierarchical information theoretic technique for the
discovery of non linear alternative clusterings. in Proceedings of the 16th ACM SIGKDD
international conference on Knowledge discovery and data mining. 2010. ACM.
Davidson, I. and Z. Qi. Finding alternative clusterings using constraints. in Data Mining,
2008. ICDM'08. Eighth IEEE International Conference on. 2008. IEEE.
Gondek, D. and T. Hofmann. Conditional information bottleneck clustering. in 3rd ieee
international conference on data mining, workshop on clustering large data sets. 2003.
Citeseer.
Vinh, N.X. and J. Epps. minCEntropy: a novel information theoretic approach for the
generation of alternative clusterings. in Data Mining (ICDM), 2010 IEEE 10th
International Conference on. 2010. IEEE.
Wasserman, S., Social network analysis: Methods and applications. Vol. 8. 1994:
Cambridge university press.
Ding, C., et al. Orthogonal nonnegative matrix t-factorizations for clustering. in
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery
and data mining. 2006. ACM.
Lee, D.D. and H.S. Seung, Learning the parts of objects by non-negative matrix
factorization. Nature, 1999. 401(6755): p. 788-791.
Lee, D.D. and H.S. Seung. Algorithms for non-negative matrix factorization. in Advances
in neural information processing systems. 2001.
Zhu, Z., Z. Yang, and E. Oja, Multiplicative updates for learning with stochastic
matrices, in Image Analysis. 2013, Springer. p. 143-152.
Blondel, V.D., et al., Fast unfolding of communities in large networks. Journal of
Statistical Mechanics: Theory and Experiment, 2008. 2008(10): p. P10008.
Duch, J. and A. Arenas, Community detection in complex networks using extremal
optimization. Physical review E, 2005. 72(2): p. 027104.
Fortunato, S., Community detection in graphs. Physics Reports, 2010. 486(3): p. 75-
174.
Fortunato, S. and M. Barthelemy, Resolution limit in community detection. Proceedings
of the National Academy of Sciences, 2007. 104(1): p. 36-41.
Lancichinetti, A. and S. Fortunato, Community detection algorithms: a comparative
analysis. Physical review E, 2009. 80(5): p. 056117.
Newman, M., Community detection and graph partitioning. EPL (Europhysics Letters),
2013. 103(2): p. 28003.
Newman, M.E., Modularity and community structure in networks. Proceedings of the
National Academy of Sciences, 2006. 103(23): p. 8577-8582.
Newman, M.E. and M. Girvan, Finding and evaluating community structure in
networks. Physical review E, 2004. 69(2): p. 026113.
49
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
Orman, G.K., V. Labatut, and H. Cherifi, Qualitative comparison of community detection
algorithms, in Digital Information and Communication Technology and Its Applications.
2011, Springer. p. 265-279.
Rosvall, M. and C.T. Bergstrom, Maps of random walks on complex networks reveal
community structure. Proceedings of the National Academy of Sciences, 2008. 105(4):
p. 1118-1123.
Xie, J., S. Kelley, and B.K. Szymanski, Overlapping community detection in networks:
The state-of-the-art and comparative study. ACM Computing Surveys (CSUR), 2013.
45(4): p. 43.
Ding, C.H., X. He, and H.D. Simon. On the Equivalence of Nonnegative Matrix
Factorization and Spectral Clustering. in SDM. 2005. SIAM.
25. Wang, F., T. Li, and C. Zhang. Semi-Supervised Clustering via Matrix Factorization. in
26.
27.
28.
SDM. 2008. SIAM.
Rosvall, M. and C.T. Bergstrom, An information-theoretic framework for resolving
community structure in complex networks. Proceedings of the National Academy of
Sciences, 2007. 104(18): p. 7327-7331.
Newman, M., Communities, modules and large-scale structure in networks. Nature
Physics, 2012. 8(1): p. 25-31.
Chan, J., et al. Discovering latent blockmodels in sparse and noisy graphs using non-
negative matrix factorisation. in Proceedings of the 22nd ACM international conference
on Conference on information & knowledge management. 2013. ACM.
29. Wang, F., et al., Community discovery using nonnegative matrix factorization. Data
30.
31.
32.
33.
34.
35.
36.
37.
Mining and Knowledge Discovery, 2011. 22(3): p. 493-521.
Chan, J., et al. SeqiBloc: mining multi-time spanning blockmodels in dynamic graphs. in
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery
and data mining. 2012. ACM.
Hoyer, P.O., Non-negative matrix factorization with sparseness constraints. The Journal
of Machine Learning Research, 2004. 5: p. 1457-1469.
Li, S.Z., et al. Learning spatially localized, parts-based representation. in Computer
Vision and Pattern Recognition, 2001. CVPR 2001. Proceedings of the 2001 IEEE
Computer Society Conference on. 2001. IEEE.
Long, B., Z. Zhang, and S.Y. Philip, A general framework for relation graph clustering.
Knowledge and information systems, 2010. 24(3): p. 393-413.
Brusco, M., Analysis of two-mode network data using nonnegative matrix
factorization. Social Networks, 2011. 33(3): p. 201-210.
Ding, C., T. Li, and W. Peng, On the equivalence between non-negative matrix
factorization and probabilistic latent semantic indexing. Computational Statistics &
Data Analysis, 2008. 52(8): p. 3913-3927.
Yang, Z. and E. Oja, Linear and nonlinear projective nonnegative matrix factorization.
Neural Networks, IEEE Transactions on, 2010. 21(5): p. 734-749.
Chan, J., et al., Structure-Aware Distance Measures for Comparing Clusterings in
Graphs, in Advances in Knowledge Discovery and Data Mining. 2014, Springer. p. 362-
373.
38. Wang, L., et al., iVAT and aVAT: enhanced visual analysis for cluster tendency
assessment, in Advances in Knowledge Discovery and Data Mining. 2010, Springer. p.
16-27.
Zachary, W.W., An information flow model for conflict and fission in small groups.
Journal of anthropological research, 1977: p. 452-473.
Davidson, I. and S. Ravi, The complexity of non-hierarchical clustering with instance and
cluster level constraints. Data mining and knowledge discovery, 2007. 14(1): p. 25-61.
50
39.
40.
|
1203.1378 | 1 | 1203 | 2012-03-06T01:52:30 | Epidemic Intelligence for the Crowd, by the Crowd (Full Version) | [
"cs.SI",
"cs.CY",
"physics.soc-ph"
] | Tracking Twitter for public health has shown great potential. However, most recent work has been focused on correlating Twitter messages to influenza rates, a disease that exhibits a marked seasonal pattern. In the presence of sudden outbreaks, how can social media streams be used to strengthen surveillance capacity? In May 2011, Germany reported an outbreak of Enterohemorrhagic Escherichia coli (EHEC). It was one of the largest described outbreaks of EHEC/HUS worldwide and the largest in Germany. In this work, we study the crowd's behavior in Twitter during the outbreak. In particular, we report how tracking Twitter helped to detect key user messages that triggered signal detection alarms before MedISys and other well established early warning systems. We also introduce a personalized learning to rank approach that exploits the relationships discovered by: (i) latent semantic topics computed using Latent Dirichlet Allocation (LDA), and (ii) observing the social tagging behavior in Twitter, to rank tweets for epidemic intelligence. Our results provide the grounds for new public health research based on social media. | cs.SI | cs | Epidemic Intelligence for the Crowd, by the Crowd∗
[Full Version]
Ernesto Diaz-Aviles1, Avar´e Stewart1, Edward Velasco2,
Kerstin Denecke1, and Wolfgang Nejdl1
1L3S Research Center / University of Hannover. Hannover, Germany.
{diaz, stewart, denecke, nejdl}@L3S.de
2Robert Koch Institute. Berlin, Germany.
[email protected]
2
1
0
2
r
a
M
6
]
I
S
.
s
c
[
1
v
8
7
3
1
.
3
0
2
1
:
v
i
X
r
a
Abstract
Tracking Twitter for public health has shown great po-
tential. However, most recent work has been focused
on correlating Twitter messages to influenza rates, a
disease that exhibits a marked seasonal pattern. In the
presence of sudden outbreaks, how can social media
streams be used to strengthen surveillance capacity? In
May 2011, Germany reported an outbreak of Enterohe-
morrhagic Escherichia coli (EHEC). It was one of the
largest described outbreaks of EHEC/HUS worldwide
and the largest in Germany. In this work, we study the
crowd's behavior in Twitter during the outbreak. In par-
ticular, we report how tracking Twitter helped to detect
key user messages that triggered signal detection alarms
before MedISys and other well established early warn-
ing systems. We also introduce a personalized learning
to rank approach that exploits the relationships discov-
ered by: (i) latent semantic topics computed using La-
tent Dirichlet Allocation (LDA), and (ii) observing the
social tagging behavior in Twitter, to rank tweets for
epidemic intelligence. Our results provide the grounds
for new public health research based on social media.
1 Epidemic Intelligence Based on Twitter
In May 2011, an outbreak of enterohaemorrhagic Es-
cherichia coli (EHEC) occurred in northern Germany. It was
one of the largest described outbreaks of EHEC/HUS world-
wide and the largest in Germany (Frank et al. 2011).
Day 1: May 19, 2011, the Robert Koch Institute (RKI),
Germany's Federal Public Health Authority, was invited by
the Health and Consumer Protection Agency in Hamburg to
assist in the investigation of three cases of Hemolytic-uremic
syndrome (HUS), a life-threatening illness caused by EHEC.
Day 2: May 20, alarmed by the type of persons affected and
the rapid spread of EHEC, an investigation was initiated by
RKI, involving all levels of public-health and food-safety
authorities to identify the cause of the outbreak, and to pre-
vent further cases of disease. On day 5: May 23, RKI asked
all health departments to expedite procedures, by immedi-
ately forwarding all case reports of suspected or confirmed
EHEC/HUS, to the Federal Public Health Authority, relying
*A short version of this work has been accepted for publication at
the International AAAI Conference on Weblogs and Social Media
(ICWSM 2012).
directly on the diagnoses of notifying clinicians (Frank et al.
2011; RKI ).
Based on this five-day timeline of EHEC/HUS 2011 out-
break in Germany, one can see that public health officials
are faced with new challenges for outbreak alert and re-
sponse. This is due to the continuous emergence of infec-
tious diseases and their contributing factors such as demo-
graphic change, or globalization. Early reaction is necessary,
but often communication and information flow through tra-
ditional channels is slow. Can additional sources of infor-
mation, such as social media streams, provide complements
to the traditional epidemic intelligence mechanisms?
Epidemic Intelligence (EI) encompasses activities related
to early warning functions, signal assessments and outbreak
investigation. Only the early detection of disease activity,
followed by a rapid response, can reduce the impact of
epidemics. Recently, modern disease surveillance systems
have started to also monitor social media streams, with the
objective of improving their timeliness to detect disease
outbreaks, and producing warnings against potential pub-
lic health threats (e.g., (Corley et al. 2010)). The real-time
nature of Twitter makes it even more attractive for public
health surveillance.
Recent works have shown the potential of using Twitter
for public health. These works have either focused on: the
text classification and filtering of tweets (Sofean et al. 2012;
Sriram et al. 2010); or finding predictors for diseases that
exhibit a seasonal pattern (i.e., influenza-like illnesses) by
correlating selected keywords with official influenza statis-
tics and rates (Culotta 2010; Lampos and Cristianini 2010;
Signorini, Segre, and Polgreen 2011). Still others have fo-
cused on mining Twitter content for topic (Paul and Dredze
2011a; 2011b) or sentiment analysis (Chew and Eysenbach
2009). Furthermore, these existing approaches have all fo-
cused on countries where the tweet density is known to be
high (e.g., the UK, or U.S.).
In this paper, we seek to address the issues that can help
deliver a public health surveillance system based on Twitter,
by taking into account two important stages in epidemic in-
telligence: Early Outbreak Detection and Outbreak Analysis
and Control, and take up the following questions:
1. Early Outbreak Detection: Is it possible, by only using
Twitter, to find early cases of an outbreak, before well es-
tablished systems?
2. Outbreak Analysis and Control: Is it possible to use Twit-
ter to understand the potential causes of contamination
and spread? and How can we provide support for pub-
lic health official to analyze and assess the risk based on
the available social media information?
In contrast, to the aforementioned studies, ours focuses
on a sudden outbreak of a disease that does not involve any
seasonal pattern. Moreover, our work shows the potential of
Twitter in countries where the tweet density is significantly
lower, such as Germany. The contributions of this paper are
summarized as follows:
• We provide an example of the application of standard
surveillance algorithms on Twitter data collected in real-
time during a major outbreak of EHEC/HUS in Germany,
and provide insights showing the potential of Twitter for
early warning.
• For outbreak analysis and control, many studies have been
made for systems that return documents in response to a
query, little effort has been devoted to exploiting learning
to rank in a personalized setting, specially in the domain
of epidemic intelligence. This paper presents an innova-
tive personalized ranking approach that offers decision
makers the most relevant and attractive tweets for risk
assessment, by exploiting latent topics and social hash-
tagging behavior in Twitter.
The rest of the paper is organized as follows: In Section 2,
we show how an early warning based on Twitter is possible,
we present the data collection used in our experiments and
analysis, and the standard biosurveillance methods applied.
In Section 3, we introduce a personalized learning to rank
approach, based on Twitter, to support the task of analysis
and control in the presence of a sudden outbreak. Related
works are discussed in Section 4. Finally, in Section 5, we
summarize our findings, point to future directions, and con-
clude the paper.
2 Twitter for Early Warning
The continuous emergence of infectious diseases and their
contributing factors impose new challenges to public health
officials. Early reaction is necessary, but often communi-
cation and information flow through traditional channels is
slow. Additional sources of information, such as social me-
dia streams, provide complements to the traditional report-
ing mechanisms.
For example, if we observe Figure 1 , we can see two
plots, one of them corresponds to the relative frequency of
EHEC cases as reported by RKI (RKI ), and the other to
the relative frequency of mentions of the keyword "EHEC"
in the tweets collected during the months of May and June
2011. We can appreciate the high correlation of the curves,
which corresponds to a Pearson correlation coefficient of
0.864. We can also observe the inertia of the crowd that con-
tinued tweeting about the outbreak, even though the number
of cases were already declining (e.g., June 5 to 11).
Twitter has shown potential as a source of information
for public health event monitoring (e.g., (Paul and Dredze
Table 1: Data collected from Twitter related to the
HUS/EHEC outbreak in Germany during May and
June, 2011.
Description
Number of tweets collected related to
medical conditions during May and June,
2011
Tweets
the
EHEC/HUS outbreak out of the ones
collected
Distinct users that produced the tweets re-
lated to the outbreak
extracted
related
to
Amount
7,710,231
456,226
54,381
2011b; Sofean et al. 2012)), but could it be possible to gener-
ate an early warning signal before well established systems
by only tracking Twitter?
In this section, we have a closer look to the time period
of the EHEC/HUS outbreak in Germany, and address this
question.
2.1 Data Collection
We incrementally collected tweets using Twitter's API, cur-
rently we monitor over 500 diseases and symptoms, which
include "EHEC". One of the challenges we face collecting
data from Twitter, besides the API restrictions, is the level
of noise with respect to medical domain content. Straightfor-
ward techniques relying on regular expressions, even though
they exhibit high recall, are difficult to maintain and prone to
high false positive rates. For example, consider the follow-
ing two tweets collected by a combination of regular expres-
sions, and a dictionary of diseases that includes the medical
conditions EHEC and fever:
1. RKI warns against north German vegetables: Experts
looking feverishly EHEC source http://bit.ly/itGpJx
2. I've definitely Bieber-fever. There's no doubt. but who
hasn't got bieber fever? @justinbieber is soo damn
rawwwr
Tweet number one is of obvious importance for epidemic
intelligence, but number two is not.
Instead of simple keyword matching to filter out irrelevant
tweets, our data collection strategy includes text classifica-
tion methods and a multi-level filtering based on supervised
learning, following the approach of Stewart et al. (Stewart,
Smith, and Nejdl 2011).
Table 1 summarizes the data collected related to the out-
break that was used in our analysis.
2.2 Detection Methods
The surveillance algorithms we used are well documented in
the disease aberration literature e.g. (Khan 2007; Hutwagner
et al. 2003; Basseville and Nikiforov 1993). The objective
of these algorithms is to detect aberration patterns in time
series data when the volume of an observation variable ex-
ceeds an expected threshold value. In our case, for example,
the observation variable corresponds to mentions of medical
condition "EHEC" withing the tweets.
Figure 1: Relative frequency of cases reported to RKI and the number of tweets mentioning the name of the disease:
EHEC. The Pearson correlation coefficient is 0.864. Monitoring Twitter allowed us to generate the first signal on Friday,
May 20th, 2011, using standard biosurveillance methods, before well established early warning systems (triangle on the
time axis).
Table 2: Detection method parameters and alarm dates
Detection
Method
C1
The five biosurveillance algorithms we used for early de-
tection are: the Early Aberration Reporting System (EARS)
(1) C1, (2) C2, and (3) C3 algorithms, (4) F-statistic, and (5)
Exponential Weighted Moving Average (EWMA). Please
refer to (Khan 2007) for a detailed introduction.
We signal an alarm if the test statistic reported by the de-
tection methods exceeds a threshold value, which is deter-
mined experimentally. The larger the amount by which the
threshold is exceeded, the greater the severity of the alarm.
Table 2 summarizes the alarm dates and detection meth-
ods parametrization, which follows the guidelines of N. Col-
lier (Collier 2010).
Using any of the detection methods (Table 2), a daily
count less than five tweets was enough to signal an alert
on May 20th, 2011. The Early Warning and Response Sys-
tem (EWRS) 1 of the European Union received a first com-
munication by the German authorities on Sunday May 22.
MedISys 2 detected the first media report in the German
newspaper Die Welt 3 on Saturday May 21 (Linge et al.
2011) and ProMED-mail 4 and all other major early alert-
ing systems (e.g., ARGUS, Biocaster, GPHIN, HealthMap,
PULS) covered the event on Monday May 23.
Why was this early detection possible with respect to well
established early warning systems? We tracked only Twitter
as source of information, in contrast to MedISys for exam-
ple, that tracks hundreds of news sources on the Internet. We
consider Twitter's diversity was the key element that helped
1EWRS: ewrs.ecdc.europa.eu
2MedISys: medusa.jrc.it/medisys
3Die Welt: welt.de
4ProMED-mail: promedmail.org
Parametrization (Khan
2007; Collier 2010)
Training window = 15 days;
buffer = 5 days; upper control
limit = µ + 3σ
Training window = 15 days;
buffer = 5 days; upper control
limit = µ + 3σ; alarm thresh-
old=0.2
Training window = 15 days;
buffer = 5 days; upper control
limit = µ + 3σ; alarm thresh-
old=0.3
Training window =15 days;
buffer = 5 days; alarm thresh-
old=0.6
Training window =15 days;
buffer = 5 days; alarm thresh-
old=4, ω = 0.24
C2
C3
F-statistic
EWMA
Alarm
Dates
May 20 to
May 28
May 20 to
May 28
May 20 to
May 24
May 20 to
June 30
May 20 to
May 30
in the earlier detection of the event.
Twitter is a diverse stream of multiple sources. In Twit-
ter converges the contribution from the crowd - millions of
individual users obscure and renown; big and small media
outlets; global and local newspapers, etc. Our work and that
of MedISys focus on an analysis at a national level, but there
are cases where support for the local perspective is impor-
tant, for example local and smaller news papers reaching a
broader audience through Twitter.
DateKeyword ehecRKI Cases EHEC/STEC Apr 27, 20112700.00060132Apr 28, 20112800Apr 29, 20112900.00120265Apr 30, 20113000.00060132May 1, 2011100.00060132May 2, 2011200.00060132May 3, 2011300.00060132May 4, 2011400.00060132May 5, 2011500.00090198May 6, 2011600.00030066May 7, 2011700.00030066May 8, 2011800.00060132May 9, 2011900.00030066May 10, 20111000.00030066May 11, 20111100.00150331May 12, 20111200.00090198May 13, 20111300.00180397May 14, 20111400.00150331May 15, 20111500.00030066May 16, 20111600.00360794May 17, 20111700.00210463May 18, 20111800.00360794May 19, 20111900.00270595May 20, 2011200.000060.00330728May 21, 2011210.000684260.00180397May 22, 2011220.002628990.00300661May 23, 2011230.019435310.04389657May 24, 2011240.051283280.0405893May 25, 2011250.040179110.04389657May 26, 2011260.088401240.04269393May 27, 2011270.054332430.03998797May 28, 2011280.033300520.04149128May 29, 2011290.028246620.04119062May 30, 2011300.045281030.04690319May 31, 2011310.04654150.04149128Jun 1, 201110.039326790.0460012Jun 2, 201120.040911380.038184Jun 3, 201130.042495980.0444979Jun 4, 201140.044080570.03788334Jun 5, 201150.045665170.04179194Jun 6, 201160.059698450.02675887Jun 7, 201170.049362560.02615755Jun 8, 201180.049950780.02705953Jun 9, 201190.038978660.0249549Jun 10, 2011100.047513870.02014432Jun 11, 2011110.017730670.02585689Jun 12, 2011120.013144940.03006615Jun 13, 2011130.012892850.01413109Jun 14, 2011140.015761930.01683704Jun 15, 2011150.005642120.01022249Jun 16, 2011160.005438040.01202646Jun 17, 2011170.005245970.01473241Jun 18, 2011180.00504190.01443175Jun 19, 2011190.004837820.0171377Jun 20, 2011200.004633740.01052315Jun 21, 2011210.004441670.00871918Jun 22, 2011220.004237590.00691521Jun 23, 2011230.004033520.0078172Jun 24, 2011240.003793430.00932051Jun 25, 2011250.003385270.00601323Jun 26, 2011260.004009510.00841852Jun 27, 2011270.00372140.00932051Jun 28, 2011280.004069530.01142514Jun 29, 2011290.003073160.01022249Jun 30, 2011300.006506450.0066145500.010.020.030.040.050.060.070.080.090.102728293012345678910111213141516171819202122232425262728293031123456789101112131415161718192021222324252627282930EHEC: Tweets and Cases ReportedRelative FrequencyApril May June Tags from LDA Topics and #-Tags in Week 21, 2011#bacteria #cucumbers #berlin #bremen #diarrhea #EHEC #hamburg #hus #intestinalInfection #nordGermany #tomatoes Twitter : tweets with keyword 'EHEC'RKI : EHEC Cases ReportedA closer look to day May 20, reveals that the first alarm
was triggered based on five tweets, the actual messages are
shown in Figure 2, all of them generated from sources not
far from where the first cases of the outbreak were reported.
Those users acted as local sensors, producing tweets that
spread the news faster than major newspapers.
Figure 2: The 5 tweets that triggered the first signal for
disease EHEC on May 20, 2011.
3 Twitter for Outbreak Analysis and Control
For public health officials, who are participating in the in-
vestigation of an outbreak, the millions of documents pro-
duced over social media streams represent an overwhelming
amount of information for risk assessment.
To reduce this overload we explore to what extent rec-
ommender systems techniques can help to filter informa-
tion items according to the public health users' context and
preferences (e.g., disease, symptoms, location). In particu-
lar, we focus on a personalized learning to rank approach
that ultimately offers the user the most relevant and attrac-
tive tweets for risk assessment. In this section, we introduce
our approach and report an experimental evaluation on the
EHEC/HUS dataset collected from Twitter.
3.1 Background: Learning to Rank for IR
Learning to rank for Information Retrieval (L2R) is an ac-
tive area of recent research (Qin et al. 2010). L2R is set
as a supervised learning task that considers fundamentally
two phases: learning and retrieval. In learning (training), a
collection of queries and their corresponding retrieved doc-
uments are given. Furthermore, the labels (i.e., relevance
judgments) of the document with respect to the queries are
also available. The relevance judgments, provided by human
annotators, can represent ranks (e.g., categories in a total or-
der) or binary labels (e.g., relevant or not-relevant). The ob-
jective of learning is to construct a ranking model (cid:126)w, e.g.,
a ranking function, that achieves the best result on test data
in the sense of optimization of a performance measure (e.g.,
error rate, degree of agreement between the two rankings,
classification accuracy or mean average precision).
In retrieval (test phase), given a query-document pair,
the learned ranking function is applied, returning a ranked
list of documents in descending order of their relevance
Table 3: Learning to Rank: Summary of Notations
Notations
Q = {q1,··· , qQ}
qi ∈ Q
D = {d1,··· , dD}
dj ∈ D
Y = {y1,··· , yY }
yij ∈ Y
Explanations
Set of queries
Query
Set of documents
Document
Set of relevance judgments
Relevance judgment of
query-document pair
(qi, dj) ∈ Q × D
Feature vector w.r.t. (qi, dj)
kth dimension of φ(qi, dj)
Training set
φ(qi, dj)
φk(qi, dj)
T = {(qi, dj), φ(qi, dj), yij}
1≤i≤Q
1≤j≤D
scores. More formally, suppose that Q = {q1,··· , qQ}
is the set of queries, and D = {d1,··· , dD} the set of
documents, the training set is created as a set of query-
document pairs, (qi, dj) ∈ Q × D, upon which a rele-
vance judgment (e.g., a label) indicating the relationship be-
tween qi and dj is assigned by an annotator. Suppose that
Y = {y1,··· , yY } is the set of labels and yij ∈ Y de-
notes the label of query-document pair (qi, dj). A feature
vector φ(qi, dj) is created from each query-document pair
(qi, dj), i = 1, 2,··· ,Q; j = 1, 2,··· ,D. The training
set is denoted as T = {(qi, dj), φ(qi, dj), yij}. The ranking
model is a real valued function of features:
f (q, d) = (cid:126)w · φ(q, d)
(1)
where (cid:126)w denotes a weight vector. In ranking, for query qi the
model associates a score to each of the documents dj as their
degree of relevance with respect to query qi using f (qi, dj),
and sort the documents based on their scores.
Table 3 gives a summary of notations described above.
Pairwise approaches, such as Ranking SVM (Joachims
2002) or Stochastic Pairwise Descent (Sculley 2009), have
proved successful in addressing the L2R task. A compre-
hensive study on different learning to rank techniques can
be found in (Liu 2009).
Although much work has been carried out on L2R tech-
niques for systems that return documents in response to a
query, little effort has been devoted to exploiting L2R in a
personalized setting, specially in the domain of epidemic in-
telligence.
3.2 Our Approach:
Ranking Tweets for Epidemic Intelligence
We propose to use the user context as implicit criteria to se-
lect tweets of potential relevance, that is, we will rank and
derive a short list of tweets based on the user context. The
user context Cu is defined as a triple
Cu = (t, M Cu, Lu) ,
(2)
where t is a discrete time interval, M Cu the set of medical
conditions, and Lu the set of locations of user interest.
We define three concepts that will help us to discuss our
approach in rest of the section:
Algorithm 1 Personalized Tweet Ranking algorithm for
Epidemic Intelligence (PTR4EI)
Input: User Context Cu = (t, M Cu, Lu),
Inverted index T of tweets collected for epidemic intel-
ligence before time t
Output: Ranking Function fCu for User Context Cu
1: Compute LDA topics (topicsLDA) on T
2: Consider each mc ∈ M Cu as a hash-tag, and extract
from T all co-occurring hash-tags: coHashT ags
3: Classify the terms in topicsLDA and the hash-tags in
coHashT ags as Medical Condition M Cx, Location Lx
or Complementary Context CCx
4: Build a set of queries as follows:
Q = {q q ∈ M Cu × P({Lu ∪ M Cx ∪ Lx ∪ CCx})}
5: For each query qi ∈ Q obtain tweets D from the collec-
tion T
6: Elicit relevance judgments Y on a subset Dy ⊂ D
7: For each tweet dj ∈ D, obtain the feature vector
φ(qi, dj) w.r.t. (qi, dj) ∈ Q × D
the user context Cu: fCu (q, d) = (cid:126)w · φ(q, d)
8: Apply learning to rank to obtain a ranking function for
9: return fCu (q, d)
Medical Condition is a string that describes a human
medical condition, such as a disease, disorder or syndrome.
We represent the set of medical conditions as M C.
Location is a string that is used to identify a point or an
area on the Earth's surface, which can be mapped to a spe-
cific pairing of latitude and longitude. The set of locations is
denoted as L.
Complementary Context is defined as the set of nouns,
which are neither Locations nor Medical Conditions. Com-
plementary Context may include named entities such as
names of persons, organizations, affected organisms, expres-
sions of time, quantities, etc. We denote the set of named
entities that represents the complementary context as CC,
where CC ∩ (L ∪ M C) = ∅.
Out Personalized Tweet Ranking for Epidemic Intelli-
gence algorithm or PTR4EI is shown in Algorithm 1. The
algorithm extends a learning to rank framework (Section 3.1
by considering a personalized setting that exploits user's in-
dividual context.
More precisely, we consider the context of the user, Cu,
and prepare a set of queries, Q, for a target event (e.g., a dis-
ease outbreak). We first compute LDA (Blei, Ng, and Jordan
2003) on an indexed collection T of tweets for epidemic in-
telligence, where not all tweets are necessarily interesting
for the target event.
We also extract the hash-tags that co-occur with the user
context by considering the medical conditions and locations
in Cu as hash-tags themselves, and find which other hash-
tags co-occur with them within a tweet, and how often they
co-occur, which will help us to select the most representative
Table 4: Four LDA topics (columns) computed weekly
during the main period of the outbreak: from May 23
to June 19, 2011. We classify terms within each topic as
Medical Condition (MC), Location (L), or Complementary
Context (CC).
EHEC (MC)
cucumbers (CC)
Spain (L)
tomatoes (CC)
salad (CC)
EHEC (MC)
dead (MC)
Germany (L)
people (-)
live (-)
Week 21
fever (MC)
pain (MC)
headache (MC)
sniff (MC)
pain (MC)
EHEC (MC)
casualty (-)
women (CC)
intestinal germ (MC)
panic (MC)
Week 22
EHEC (MC)
intestinal germ (MC)
source (-)
search (-)
Hamburg (L)
EHEC (MC)
cucumbers (CC)
pathogen (MC)
Spain (L)
farmers (CC)
Week 23
EHEC (MC)
pathogen (MC)
Northern Germany (L)
diarrhea (MC)
dead (MC)
EHEC (MC)
cucumbers (CC)
salad (CC)
pain (MC)
women (CC)
EHEC (MC)
sprout (CC)
source (-)
suspicion (-)
hus (MC)
pain (MC)
bellyache (MC)
cough (MC)
throat (CC)
sniff (MC)
EHEC (MC)
cucumber (CC)
eu (CC)
crisis management (-)
farmers (CC)
EHEC (MC)
germ (MC)
sprout (CC)
health (MC)
all-clear (CC)
headache (MC)
pain (MC)
fever (MC)
people (-)
cough (MC)
headache (MC)
fever (MC)
slept (-)
sniff (MC)
head (CC)
Week 24
EHEC (MC)
cucumbers (CC)
sprout (CC)
pathogen (MC)
salad (CC)
stomach ache (MC)
sniff (MC)
pain (MC)
regions (-)
examined (-)
hash-tags for the target event.
The set Q is constructed by expanding the original terms
in Cu with the ones in the LDA topics and co-occurring
hash-tags, which are previously classified as medical con-
dition, location or complementary context.
We build the set D of tweets by querying index T using
q ∈ Q as query terms. Next, we elicit judgments from ex-
perts on a subset of the tweets retrieved, in order to construct
Dy ⊂ D.
We then obtain for each tweet dj ∈ D its features vector
φ(qi, dj) with respect to the pair (qi, dj) ∈ Q × D.
Finally and with these elements, we apply a learning to
rank algorithm to obtain the ranking function for the given
user context.
In the rest of the section, we evaluate our approach con-
sidering as event of interest the EHEC/HUS outbreak in Ger-
many, 2011.
Experiments and Evaluation To support users in the
assessment and analysis during the EHEC/HUS outbreak,
we set the user context (Eq. 2) as Cu = (t, M Cu, Lu) =
([2011-05-23; 2011-06-19],{"EHEC"},{"Lower Saxony"}),
in this way, we are taking into account the main period of
the outbreak 5, the disease of interest, and the German state
with more cases reported.
Following Algorithm 1, we computed LDA and extracted
the co-occurring hash-tags using the indexed collection T
described in Section 2.1. Table 4 shows four LDA topics for
each week of the time period of interest, and Table 5 presents
the hash-tags co-occurring with #EHEC.
We asked three experts: one from the Robert Koch Insti-
tute and the other two from the Lower Saxony State Health
5Please note, that even though the main period of the outbreak
is considered for the evaluation, nothing prevents us to build the
model during the ongoing outbreak, and recompute it periodically
(e.g., weekly).
Table 5: Hash-tags co-occurring with #EHEC during
May 23 and June 19, 2011, the main period of the
outbreak. The hash-tags are classified as entities of type
Medical Condition, Location, or Complementary Context,
hash-tags out of these categories are discarded.
Medical Condition
Location
Complementary Context
bacteria
diarrhea
ehec victim
hus
intestinal infection
bacteria
diarrhea
ehec pathogen
hus
intestinal infection
bacteria
diarrhea
ehec pathogen
hus
Week 21
bremen
cuxhaven
hamburg
munster
northern germany
Week 22
berlin
germany
hamburg
lubeck
spain
bavaria
berlin
germany
hamburg
Week 23
intestinal infection
lower saxony
Week 24
lower saxony
bacteria
died
health
hus
cdu
edeka
fdp
merkel
rki
bild
fdp
n24
rki
rtl
ehec freei
fdp
merkel
n24
rki
cucumber salad
cucumbers
ehec vegetable
tomatoes
vegetables
cucumbers
obst
salad
terror
tomatoes
cucumbers
salad
sojasprout
sprout
donate blood
ehec free
sojasprout
Department (NLGA) 6 to provide their individual judgment
on a subset Dy of 240 tweets, evaluating for each tweet, if it
was relevant or not to support their analysis of the outbreak.
Any disagreement in the assigned relevance scores were re-
solved by majority voting.
We selected these tweets from the index T as follows: 30
were obtained using as query the term "EHEC", i.e., M Cu,
together with the medical conditions identified using LDA,
and 30 using the medical conditions from the hash-tags. We
used a similar procedure combining query "EHEC" with the
locations and complementary context extracted from LDA
and hash-tag co-occurrence, obtaining 30 tweets at every
step, for a total of 120 tweets. For the rest 60, we used the
query term "EHEC" alone, then we ordered the result set
chronologically based on the tweets' publication date, and
selected the most recent ones.
We prepared five binary features for each tweet as fol-
lows:
Feature Value = True
FM C
FL
F#-tag
FCC
If a medical condition is present in the
tweet
If a location is present in the tweet
If a hash-tag is present in the tweet
If a complementary context
present in the tweet
If a URL is present in the tweet
term is
FU RL
For learning the ranking function, we used Stochas-
tic Pairwise Descent
(SPD) algorithm (Sculley 2009),
which solves the same optimization problem as Ranking
6NLGA: nlga.niedersachsen.de
SVM (Joachims 2002), but using stochastic gradient de-
scent, whose characteristics make it more appealing to scale
to larger datasets (e.g., (Bottou 2010)).
We compared our approach, that expand the user context
with latent topics and social generated hash-tags, against two
ranking methods:
• RankMC: It learns a ranking function using only medi-
cal conditions as feature, i.e., FM C. Please note, that this
baseline also considers related medical conditions to the
ones in M Cu, which makes it stronger than non-learning
approaches, such as BM25 or TF-IDF scores, that use
only the M Cu elements as query terms.
• RankMCL: It is similar to RankMC, but besides the med-
ical conditions, it uses a local context to perform the rank-
ing (i.e., features: FM C and FL). We expect this method
to perform better than RankMC, since it does not only
take into account the spatial information from the user
context, but also additional locations in the collection.
We conducted 10-fold cross validation experiments. For
each fold, we used 80% of the tweets for training and the
remaining 20% for testing. The test set is used to evaluate the
ranking methods. The reported performance is the average
over the ten folds.
Evaluation Measures For evaluation, we used three eval-
uation measures widely used in information retrieval,
namely precision at position n (P @n), mean average pre-
cision (MAP), and normalized discount cumulative gain
(NDCG). Their definitions are as follows.
Precision at Position n (P @n)
(Baeza-Yates and
Ribeiro-Neto 2011) measures the relevance of the top n doc-
uments in the ranking list with respect to a given query:
P @n =
# of relevant docs in top n results
n
(3)
Mean Average Precision (MAP) The average precision
(AP) (Baeza-Yates and Ribeiro-Neto 2011) of a given query
is calculated as Eq. (4), and corresponds to the average of
P @n values for all relevant documents:
(cid:80)N
n=1 (P @n ∗ rel(n))
AP =
# of relevant docs for this query
(4)
where N is the number of retrieved documents, and
rel(n) is a binary function that evaluates to 1 if the nth doc-
ument is relevant, and 0 otherwise. Finally, MAP (Baeza-
Yates and Ribeiro-Neto 2011) is obtained averaging the AP
values over the set of queries.
Normalized Discount Cumulative Gain (NDCG) For
a single query, the NDCG (Jarvelin and Kekalainen 2002)
value of its ranking list at position n is computed by Eq. (5):
N DCG@n = Zn
2r(j) − 1
log(1 + j)
(5)
n(cid:88)
j=1
where r(j) is the rating of the the j-th document in the
ranking list, and the normalization constant Zn is chosen so
that the perfect list gets NDCG score of 1.
(Chew and Eysenbach 2009). They showed that the con-
cise and timely nature of tweets can provide health officials
with the a means to become aware, and respond to concerns
raised by the public.
Culotta applied text classification to filter out tweets that
are not reporting about influenza-like illnesses. Further, they
modeled influenza rates by regression models and compared
to U.S. Center of Disease Control statistics (Culotta 2010).
Lampos and Cristianini also presented a monitoring tool
for social media that is based on the textual analysis of
micro-blog content (Lampos and Cristianini 2010), (Lam-
pos, Bie, and Cristianini 2010). Their study focused on
influenza-like illnesses in the UK and showed a correlation
with data from the Health Protection Agency. Another study
of Twitter content concentrated on influenza-like illnesses
in the U.S. (Signorini, Segre, and Polgreen 2011). Paul and
Dredze (Paul and Dredze 2011a; 2011b) introduced a new
aspect topic model for Twitter that associates symptoms,
treatments and general words with diseases. Their focus is
on general public health, not necessarily infectious diseases
or disease outbreaks.
In contrast to these systems, we seek to not only detect
and monitor potential public health threats, but also provide
support for public health officials to asses the potential risk
associated with the volume of information that is available
within Twitter streams. Moreover, our proposed approach
shows the potential of using Twitter for monitoring non-
seasonal outbreaks in and geo-spacially sparse tweet loca-
tions.
Our work is similar to that of (Linge et al. 2011), were
media reports on the 2011 EHEC outbreak in Germany are
tracked. Although in their work no early warning was possi-
ble, they identified key aspects of developing outbreak sto-
ries. In contrast to this work, our approach exploits social
media data and we show that a system can help to get early
warnings on public health threats.
Although some works exist that address the task of rank-
ing tweets, little effort has been devoted to explore person-
alized ranking of tweets in the domain of epidemic intel-
ligence. For example Duan et al. rank individual generic
tweets according to their relevance to a given query (Duan
et al. 2010). The features used include content relevance
features, Twitter specific features and account authority fea-
tures. In contrast, our is a personalized learning to rank ap-
proach for epidemic intelligence, that exploits an expanded
user context by means of latent topics and on social hash-
tagging behavior.
5 Conclusion and Future Directions
To show the potential of Twitter for early warning, we fo-
cused on the recent EHEC/HUS outbreak in Germany, and
monitor the social stream. We applied several biosurveil-
lance methods on a set of tweets collected in real time dur-
ing the time of the event using Twitter API. All the detection
methods triggered an alarm on May 20, a day ahead of well
established early warning systems, such as MedISys.
After the detection of the outbreak, authorities investi-
gating the cause and the impact in the population were in-
terested in the analysis of micro-blog data related to the
Figure 3: MAP and NDCG Results
Method
Table 6: Ranking Performance in terms of P@{1, 3, 5, 10}
P@1
P@10
90 % 73.34 % 64 % 69 %
90 % 83.33 % 88 % 85 %
100 % 90 % 94 % 96 %
RankMC (baseline)
RankMCL (baseline)
PTR4EI
P@5
P@3
For the training dataset, we define two ratings {1, 0} cor-
responding to "relevant to the outbreak" and "not-relevant
to the outbreak" in order to compute NDCG scores.
Results The ranking performance in terms of precision
is presented in Table 6, MAP and NDCG results are
shown in Figure 3. As we can appreciate PTR4EI outper-
forms both baselines. Local information helps RankMCL
to beat RankMC, for example MAP improves from 71.96%
(RankMC) up to 81.82% (RankMCL). PTR4EI, besides lo-
cal features, exploits complementary context information
and particular Twitter features, such as the presence of hash-
tags or URLs in the tweets, this information allows it to
improve its ranking performance even further, reaching a
MAP of 91.80%. A similar behavior is observed for preci-
sion and NDCG, where PTR4EI is statistically significantly
better than RankMC and RankMCL.
4 Related Work
In order to detect public health events, supervised (Stew-
art, Smith, and Nejdl 2011), unsupervised (Fisichella et al.
2011) and rule-based approaches have been used to extract
public health events from social media and news. For ex-
ample, PULS (Steinberger et al. 2008) identify the disease,
time, location and cases of a news-reported event. It is in-
tegrated into MedISys, which automatically collects news
articles concerning public health in various languages, and
aggregates the extracted facts according to pre-defined cate-
gories, in a multi-lingual manner.
Other systems have sought to use the web and social me-
dia as a predictor to monitor and gauge the seasonal patterns
of influenza. These systems correlate the queries used in
search behavior with the infection rates of influenza-like ill-
nesses statistics (Polgreen et al. 2008; Ginsberg et al. 2009).
Monitoring analysis has also been carried out on Twitter.
The work of Chew et al. focused on the use of the terms
"H1N1" and "swine flu" during the H1N1 2009 outbreak
ROUNDP @ 1P @ 2P @ 3P @ 4P @ 5P @ 6P @ 7P @ 8P @ 9P @ 10MAPallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesAVERAGEmcmcmcmcmcmcmcmcmcmcAVERAGEmc_locmc_locmc_locmc_locmc_locmc_locmc_locmc_locmc_locmc_locAVERAGE01.00001.00001.00001.00001.00001.00001.00001.00001.00000.90000.907111.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.980521.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.900831.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.907441.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.989551.00000.50000.66670.75000.80000.83330.85710.87500.88890.90000.841161.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.944571.00001.00000.66670.75000.80000.83330.85710.87500.88890.90000.906581.00001.00000.66670.75000.80000.83330.85710.87500.88890.90000.820691.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.98151.00000.95000.90000.92500.94000.95000.95710.96250.96670.96000.918001.00001.00001.00000.75000.60000.50000.42860.50000.44440.50000.647111.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.874021.00000.50000.66670.50000.60000.66670.71430.75000.77780.80000.747031.00001.00000.66670.50000.60000.50000.57140.62500.66670.60000.656041.00000.50000.66670.50000.40000.50000.57140.62500.66670.70000.671951.00001.00000.66670.75000.60000.50000.42860.50000.55560.50000.576261.00001.00001.00001.00000.80000.83330.85710.87500.88890.90000.822670.00000.00000.00000.25000.40000.50000.57140.50000.55560.50000.677281.00000.50000.66670.75000.60000.66670.71430.62500.66670.60000.702491.00001.00001.00000.75000.80000.83330.85710.87500.88890.80000.82180.90000.75000.73340.67500.64000.65000.67140.68750.71110.69000.719601.00000.50000.33330.50000.60000.66670.71430.75000.66670.70000.714911.00001.00001.00001.00001.00001.00001.00000.87500.88890.90000.905621.00001.00001.00001.00001.00001.00000.85710.87500.77780.80000.829431.00001.00001.00001.00000.80000.66670.71430.75000.66670.70000.772141.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.857051.00000.50000.33330.50000.60000.66670.71430.75000.77780.80000.701861.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.896771.00001.00001.00001.00001.00001.00001.00001.00000.88890.90000.835680.00000.50000.66670.75000.80000.83330.85710.75000.77780.80000.770491.00001.00001.00001.00001.00000.83330.85710.87500.88890.90000.89830.90000.85000.83330.87500.88000.86670.87140.86250.83340.85000.8182ROUNDNDCG @ 1NDCG @ 2NDCG @ 3NDCG @ 4NDCG @ 5NDCG @ 6NDCG @ 7NDCG @ 8NDCG @ 9NDCG @ 10AVERAGE NDCGallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesAVERAGEmcmcmcmcmcmcmcmcmcmcAVERAGEmc_locmc_locmc_locmc_locmc_locmc_locmc_locmc_locmc_locmc_locAVERAGE01.00001.00001.00001.00001.00001.00001.00001.00001.00000.94270.944211.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.989021.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.941031.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.947041.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.993751.00000.50000.61990.68060.71920.74670.76770.78440.79810.80970.824561.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.968071.00001.00000.76020.79850.82290.84020.85340.86400.87260.87990.904881.00001.00000.76020.79850.82290.84020.85340.86400.87260.87990.851391.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.99061.00000.95000.91400.92780.93650.94270.94750.95120.95430.95120.935401.00001.00001.00000.84030.73870.66630.61120.63910.59840.62140.700111.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.918221.00000.50000.61990.52090.57880.62010.65150.67660.69720.71450.728231.00001.00000.76020.63880.68250.61560.64740.67280.69360.65390.696841.00000.50000.61990.52090.45790.51100.55150.58370.61020.63260.665451.00001.00000.76020.79850.70190.63320.58080.61090.63570.59930.668661.00001.00001.00001.00000.87910.89090.90000.90710.91310.91800.878970.00000.00000.00000.15970.26130.33370.38880.36090.40160.37860.526281.00000.50000.61990.68060.59830.63770.66760.61970.64390.60700.691591.00001.00001.00000.84030.85960.87340.88380.89220.89910.84760.87140.90000.75000.73800.70000.67580.67820.68830.69630.70930.69730.734501.00000.50000.38010.47910.54210.58690.62110.64840.60710.62960.685011.00001.00001.00001.00001.00001.00001.00000.92810.93270.93660.935221.00001.00001.00001.00001.00001.00000.91730.92320.86440.87220.888031.00001.00001.00001.00000.87910.79290.81010.82370.77130.78440.835541.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.915951.00000.50000.38010.47910.54210.58690.62110.64840.67070.68960.700661.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.937671.00001.00001.00001.00001.00001.00001.00001.00000.93630.94000.890780.00000.50000.61990.68060.71920.74670.76770.71250.73080.74620.749691.00001.00001.00001.00001.00000.90200.91010.91660.92190.92640.93400.90000.85000.83800.86390.86830.86150.86470.86010.84350.85250.8472RankMC (baseline)RankMCL (baseline)PTR4EIMAPNDCG@1NDCG@3NDCG@5NDCG@100.71960.90000.73800.67580.69730.81820.90000.83800.86830.85250.91801.00000.91400.93650.9512MethodP @ 1P @ 3P @ 5P @ 10RankMC (baseline)RankMCL (baseline)PTR4EI0.90000.73340.64000.69000.90000.83330.88000.85001.00000.90000.94000.960000.200.400.600.801.00MAPNDCG@1NDCG@3NDCG@5NDCG@10Ranking Performance : MAP and NDCG@{1, 3, 5, 10}RankMC (baseline)RankMCL (baseline)PTR4EIevent. Thousands of tweets were produced every day, which
made this task overwhelming for the experts. We proposed
in this work a Personalized Tweet Ranking algorithm for
Epidemic Intelligence (PTR4EI) that provides users a per-
sonalized short list of tweets that meets the context of their
investigation. PTR4EI exploits features that go beyond the
medical condition and location (i.e., user context), but in-
cludes complementary context information, extracted using
LDA and the social hash-tagging behavior in Twitter, plus
additional Twitter specific features. Our experimental evalu-
ation showed the superior ranking performance of PTR4EI.
We are currently working closely with German and global
public health institutions to help them integrate the monitor-
ing of social media to their existing surveillance systems.
As future work, we plan to scale up our experiments, and
to apply techniques of online ranking in order to update the
model more efficiently as the outbreak develops.
We have shown the potential of Twitter to trigger early
warnings in the case of sudden outbreaks and how personal-
ized ranking for epidemic intelligence can be achieved. We
believe our work can serve as a building block for an open
early warning system based on Twitter, and hope that this
paper provides some insights into the future of epidemic in-
telligence based on social media streams.
References
1993. Detection of Abrupt
Baeza-Yates, R., and Ribeiro-Neto, B. 2011. Modern Information
Retrieval. Addison Wesley, 2nd edition.
Basseville, M., and Nikiforov, I.
changes: Theory and Application. Prentice Hall.
Blei, D. M.; Ng, A. Y.; and Jordan, M. I. 2003. Latent dirichlet
allocation. J. Mach. Learn. Res. 3:993–1022.
Bottou, L. 2010. Large-scale machine learning with stochastic
gradient descent. In COMPSTAT'2010.
Chew, C., and Eysenbach, G. 2009. Pandemics in the age of twitter:
Content analysis of tweets during the 2009 h1n1 outbreak. PLoS
ONE 5(11):e14118.
Collier, N. 2010. What's unusual in online disease outbreak news?
Journal of Biomedical Semantics 1(1):2.
Corley, C. D.; Cook, D. J.; Mikler, A. R.; and Singh, K. P. 2010.
Text and structural data mining of influenza mentions in web and
social media. Int J Environ Res Public Health 7(2):596–615.
Culotta, A. 2010. Towards detecting influenza epidemics by ana-
lyzing twitter messages. In First Workshop on Social Media Ana-
lytics.
Duan, Y.; Jiang, L.; Qin, T.; Zhou, M.; and Shum, H.-Y. 2010. An
empirical study on learning to rank of tweets. In Coling 2010.
Fisichella, M.; Stewart, A.; Cuzzocrea, A.; and Denecke, K. 2011.
Detecting health events on the social web to enable epidemic intel-
ligence. In SPIRE'11.
Frank, C.; Werber, D.; Cramer, J. P.; Askar, M.; Faber, M.; Heiden,
M. a. d.; Bernard, H.; Fruth, A.; Prager, R.; Spode, A.; Wadl, M.;
Zoufaly, A.; Jordan, S.; Stark, K.; and Krause, G. 2011. Epidemic
Profile of Shiga-Toxin-Producing Escherichia coli O104:H4 Out-
break in Germany - Preliminary Report. New England Journal of
Medicine.
Ginsberg, J.; Mohebbi, M. H.; Patel, R. S.; Brammer, L.; Smolin-
ski, M. S.; and Brilliant, L. 2009. Detecting influenza epidemics
using search engine query data. Nature.
Hutwagner, L.; Thompson, W.; Seeman, G. M.; and Treadwell, T.
2003. The bioterrorism preparedness and response early aberration
reporting system (ears). Journal of urban health bulletin of the New
York Academy of Medicine 80(2 Suppl 1):i89–i96.
Jarvelin, K., and Kekalainen, J. 2002. Cumulated gain-based eval-
uation of ir techniques. ACM Trans. Inf. Syst. 20(4):422–446.
Joachims, T. 2002. Optimizing search engines using clickthrough
data. In KDD '02, KDD '02.
Khan, S. A. 2007. Handbook of biosurveillance, m.m. wagner, a.w.
moore, r.m. aryel (eds.). elsevier inc. isbn-13: 978-0-12-369378-5.
Journal of Biomedical Informatics.
Lampos, V., and Cristianini, N. 2010. Tracking the flu pandemic
by monitoring the social web. In IAPR 2nd Workshop on Cognitive
Information Processing (CIP 2010).
Lampos, V.; Bie, T. D.; and Cristianini, N. 2010. Flu detector
tracking epidemics on twitter. In ECML PKDD 2010.
Linge, J.; Mantero, J.; Fuart, F.; Belyaeva, J.; Atkinson, M.; and
Van Der Goot, E. 2011. Tracking media reports on the shiga toxin-
producing escherichia coli o104:h4 outbreak in germany. In ICST
Conference on eHealth, 2011.
Liu, T.-Y. 2009. Learning to rank for information retrieval. Found.
Trends Inf. Retr. 3:225–331.
Paul, M. J., and Dredze, M. 2011a. A model for mining public
health topics from twitter. Technical report, Johns Hopkins Uni-
versity.
Paul, M. J., and Dredze, M. 2011b. You are what you tweet: Ana-
lyzing twitter for public health. In ICWSM'11.
Polgreen, P. M.; Chen, Y.; Pennock, D. M.; Nelson, F. D.; and We-
instein, R. 2008. Using internet searches for influenza surveillance.
Clinical Infectious Diseases 47(11):1443–48.
Qin, T.; Liu, T.-Y.; Xu, J.; and Li, H. 2010. Letor: A benchmark
collection for research on learning to rank for information retrieval.
Information Retrieval 13:346–374. 10.1007/s10791-009-9123-y.
Technical report.
Sculley, D. 2009. Large Scale Learning to Rank. In NIPS 2009
Workshop on Advances in Ranking.
Signorini, A.; Segre, A. M.; and Polgreen, P. M. 2011. The use of
twitter to track levels of disease activity and public concern in the
u.s. during the influenza a h1n1 pandemic. PLoS ONE.
Sofean, M.; Stewart, A.; Denecke, K.; and Smith, M. 2012. Med-
ical case-driven classification of microblogs: Characteristics and
annotation. In ACM IHI 2012.
Sriram, B.; Fuhry, D.; Demir, E.; Ferhatosmanoglu, H.; and Demir-
bas, M. 2010. Short text classification in twitter to improve infor-
mation filtering. In ACM SIGIR'10.
Steinberger, R.; Fuart, F.; Goot, E. V. D.; and Best, C. 2008. Text
mining from the web for medical intelligence. Mining massive data
sets for security Advances in data mining search social networks
and text mining and their applications to security 19.
Stewart, A.; Smith, M.; and Nejdl, W. 2011. A transfer approach
to detecting disease reporting events in blog social media. In ACM
HT '11.
|
1612.08207 | 1 | 1612 | 2016-12-24T17:32:48 | Ideology Detection for Twitter Users with Heterogeneous Types of Links | [
"cs.SI"
] | The problem of ideology detection is to study the latent (political) placement for people, which is traditionally studied on politicians according to their voting behaviors. Recently, more and more studies begin to address the ideology detection problem for ordinary users based on their online behaviors that can be captured by social media, e.g., Twitter. As far as we are concerned, however, the vast majority of the existing methods on ideology detection on social media have oversimplified the problem as a binary classification problem (i.e., liberal vs. conservative). Moreover, though social links can play a critical role in deciding one's ideology, most of the existing work ignores the heterogeneous types of links in social media. In this paper we propose to detect \emph{numerical} ideology positions for Twitter users, according to their \emph{follow}, \emph{mention}, and \emph{retweet} links to a selected set of politicians. A unified probabilistic model is proposed that can (1) explain the reasons why links are built among people in terms of their ideology, (2) integrate heterogeneous types of links together in determining people's ideology, and (3) automatically learn the quality of each type of links in deciding one's ideology. Experiments have demonstrated the advantages of our model in terms of both ranking and political leaning classification accuracy. It is shown that (1) using multiple types of links is better than using any single type of links alone to determine one's ideology, and (2) our model is even more superior than baselines when dealing with people that are sparsely linked in one type of links. We also show that the detected ideology for Twitter users aligns with our intuition quite well. | cs.SI | cs | Ideology Detection for Twitter Users with Heterogeneous
Types of Links
Yupeng Gu Ting Chen Yizhou Sun
University of California, Los Angeles, CA
{ypgu,tingchen,yzsun}@cs.ucla.edu
ABSTRACT
The problem of ideology detection is to study the latent (po-
litical) placement for people, which is traditionally studied
on politicians according to their voting behaviors. Recently,
more and more studies begin to address the ideology detec-
tion problem for ordinary users based on their online behav-
iors that can be captured by social media, e.g., Twitter. As
far as we are concerned, however, the vast majority of the ex-
isting methods on ideology detection on social media have
oversimplified the problem as a binary classification prob-
lem (i.e., liberal vs. conservative). Moreover, though social
links can play a critical role in deciding one's ideology, most
of the existing work ignores the heterogeneous types of links
in social media. In this paper we propose to detect numer-
ical ideology positions for Twitter users, according to their
follow, mention, and retweet links to a selected set of politi-
cians. A unified probabilistic model is proposed that can
(1) explain the reasons why links are built among people
in terms of their ideology, (2) integrate heterogeneous types
of links together in determining people's ideology, and (3)
automatically learn the quality of each type of links in de-
ciding one's ideology. Experiments have demonstrated the
advantages of our model in terms of both ranking and politi-
cal leaning classification accuracy. It is shown that (1) using
multiple types of links is better than using any single type of
links alone to determine one's ideology, and (2) our model is
even more superior than baselines when dealing with people
that are sparsely linked in one type of links. We also show
that the detected ideology for Twitter users aligns with our
intuition quite well.
Keywords
Ideology detection, heterogeneous network, social network
analysis
1.
INTRODUCTION
Ideology detection, i.e., ideal point estimation, dates back
to early 1980s, where political scientists first cast light on
6
1
0
2
c
e
D
4
2
]
I
S
.
s
c
[
1
v
7
0
2
8
0
.
2
1
6
1
:
v
i
X
r
a
ACM ISBN 978-1-4503-2138-9.
DOI: 10.1145/1235
Bingyu Wang
Northeastern University, Boston, MA
[email protected]
ways of revealing politicians' political affiliation using their
roll call voting data [22]. Ideal points can be regarded as em-
beddings of political figures into a latent Euclidean space,
and the positions are good representations of their political
ideologies. Decades later, the estimation of ideal points has
attracted interest from the computer science domain. Re-
searchers begin to use more complicated, statistical models
to conduct the estimation on roll call data [7, 8, 12].
Recently, more and more studies pay attention to ideol-
ogy detection for users on social media, which captures rich
information for ordinary citizens in addition to political fig-
ures. For example, based on text information, topic models
and sentiment analysis approaches are utilized to classify
users based on their opinions on different topics [21, 10],
and sometimes text features are directly fed into standard
classification models such as support vector machines and
boosted decision trees to classify users' political affiliations
[6, 25, 20]. Based on users' public profile information, such
as marriage status, age and income, classifiers are trained to
get users' ideology category [1]. Based on link information,
various network-based methods are proposed to infer user's
ideology [9, 27, 26, 29, 2].
However, there are two major limitations of the existing
literature. First, most of these approaches oversimplify the
ideology detection problem as a binary classification prob-
lem, i.e., classify people as liberal or conservative, ignoring
the fact that people's ideology lies in a very broad spectrum.
For example, from our estimations in Fig. 1 we can see that
Anderson Cooper (@andersoncooper) is almost in the mid-
dle and only a little bit to the left, while Rachel Maddow
(@maddow) is much more liberal. Second, despite the suc-
cessful utilization of link information in determining one's
ideology, most of the works ignore the heterogeneous link
types in social media, which leads to significant information
loss. As shown in Fig. 1, by looking only at the follow links,
there is no way to differentiate the ideology between Rachel
Maddow (@maddow) and Megyn Kelly (@megynkelly); how-
ever from their retweet links, it is quite clear the two have
very different ideology. Take Glenn Greenwald (@ggreen-
wald) as another example: he has equal number of links to
Barack Obama (@BarackObama) and Rand Paul (@Rand-
Paul) in our network. Only by knowing retweet is a more im-
portant link type than follow, we are able to predict Green-
wald's ideology as liberal. It requires a model that can inte-
grate various link types (i.e., relations) and assign them with
different weights to provide a better overall ideology estima-
tion. Admittedly, we may pre-define weights on different
link types so as to obtain an integrated weighted graph,
but it either requires strong domain knowledge on defining
the link weights, or takes huge amount of time to do multi-
ple rounds of training and select the set of weights with the
best held-out performance, which makes it infeasible for real
world networks.
Figure 1: An illustration of ideology detection prob-
lem in Twitter network.
In this paper, we propose a unified probabilistic model,
ML-IPM (Multi-Link Ideal Point Estimation Model), to de-
tect numerical
ideology positions for a subset of Twitter
users, according to their follow, mention, and retweet links.
Our approach has several advantages. First, it utilizes so-
cial choice theory to explain the reasons why links are built
among people in terms of their ideology. Second, it is able to
combine heterogeneous types of links in determining people's
ideology, with different weights for each link type. Third, the
strength of each link type can be automatically learned ac-
cording to the observed network. Experiments demonstrate
the advantages of our model in terms of both ranking and
political leaning prediction accuracy.
It is shown that (1)
using multiple types of links is better than using any single
type of links alone to determine one's ideology, and (2) our
model is even better than baselines when dealing with people
that are sparsely linked in one type of links. We also show
that the detected ideology for Twitter users aligns with our
intuition quite well. The main contributions of our work
are summarized as below:
• We propose to detect numerical ideology for Twitter
users using link information only. In particular, het-
erogeneous types of links including follow, mention,
and retweet are considered.
• We propose a unified probabilistic model, ML-IPM, to
solve the problem, which can (1) explain why links are
built according to social choice theory and (2) consider
different types of links by modeling their strength in
determining one's ideology.
• A scalable learning algorithm is provided to learn both
the ideology of users and the strength of each link type.
Experimental results on a Twitter subnetwork demon-
strate the advantages of our model over the state-of-
the-art approaches.
2. PRELIMINARIES AND PROBLEM DEF-
INITION
In this section, we introduce some preliminaries and define
our problem.
2.1
Ideal Point / Ideology
Ideal point (also known as political ideology) is a political
term which indicates the political leaning of politicians and
provides quantitative measures of congressmen across time
[22, 23, 24]. It is a real-valued vector which refers to the po-
sition on the political spectrum, a real line or a high dimen-
sional space that symbolizes political dimensions.
In U.S.
people usually refer "left" as democracy or liberality, and
"right" as conservatism. Therefore, in one dimensional case,
a person whose ideal point is negative (left of the origin) is
treated as liberal. The more negative a person's ideal point
is, the more liberal he/she is considered to be. Ideology is
believed to be an important measure of political behaviors,
and ideology estimation is essential in many political science
applications.
2.2 Problem Definition
Before the definition of our problem, we first look at some
vivid cases in order to motivate our work. Suppose P1 and
P2 are two political parties in the following examples.
Case 1. User U is a fan of politics and she is extremely
interested in political news. Because politicians in P1 tweet
more frequently and U wants to keep track of the latest news
and policies, she decides to follow most of the politicians of
party P1 but a small fraction of politicians in P2. However,
most of her retweets come from people in P2, as she is more
happy about their words and opinions. Given the follow
and retweet links from U to these politicians, can we predict
which party does she agree with more? More specifically,
can we provide U's relative position among all the users
that appeared in the network?
Case 2. User V hates P1, and he will argue with politi-
cians of P1 by mentioning them on Twitter to show his dis-
pleasure. Sometimes he also mentions politicians in P2 to
support their policies. As expected, V follows most politi-
cians in P2, but few politicians in P1. In this scenario, can
we predict that the position of V lies close to the positions of
people in P2 on the political spectrum, based on the follow
and mention links issued by him?
In this work, we focus on the problem of ideology detection
for Twitter users. Formally, given a heterogeneous Twitter
subnetwork with R types of links (R = 3 in our case), our
goal is to (1) learn the multidimensional ideology for all users
presented in the network and (2) determine the strength of
each type of links in the process of ideology detection, which
can best explain the observed network. Although defined on
Twitter network, our approach is very general to other social
networks.
3. APPROACH
In this section, we introduce our solution to the proposed
problem. We start from ideology model under a single link
type, then introduce how to extend the model when mul-
tiple types of links exist, and finally introduce the learning
algorithm.
3.1
Ideology Estimation Model via Single Link
Type
As in traditional ideal point models, each user has a po-
sition in a K-dimensional space, which represents his/her
ideology. For a politics-related network, ideology can help
explain the reason for link generation, which is a reflection
followmentionretweet@maddow@andersoncooper@megynkelly@BarackObama@RandPaulInput: a subset of Twitter networkIdeology@ggreenwaldOutput: Ideology & relation weightsof people's online behaviors. Take follow link as an exam-
ple: the proximity of two users' positions in the latent ideol-
ogy space indicates a high probability that they have many
politician friends (followees) in common, and vice versa. Be-
cause Twitter users are free to follow anyone they like, we
assume that each possible follow link from ui to vj is the
outcome of ui's choice of following vj or not. Each choice
corresponds to a utility function which measures a user's
preference over the two choices. Rational users are expected
to make the decision that maximizes their utility. Intuitively,
the utility function should consider the distance between the
positions of two users in the latent ideology space, since peo-
ple are more likely to follow others whose political opinions
are close to themselves. We discuss why a link is formed
from both the link-sender and link-receiver's points of view:
The role of link-sender. From a link-sender's (say user
ui) point of view, one has to make a choice on whether
to follow user vj or not, which depends on the two utility
functions defined on the two options. She will choose the
option that maximizes her utility function, which is related
to her ideology position pi ∈ RK .
The role of link-receiver. From a link-receiver's (say
user vj) point of view, each of them is associated with two
placements, corresponding to the two options of whether she
will receive a link from a link sender or not. We use ψj ∈ RK
and ζj ∈ RK to denote the positions of the two placements,
which can be observed by other users.
We now define the utility functions for a user ui's choice
of (1) "following" a target user vj (Ui(ψj)) and (2) not "fol-
lowing" a target user j (Ui(ζj)), by extending the model in
[5] to the scenario of social networks:
Ui(ψj ) = ui(ψj ) + ηij , if ui follows vj
Ui(ζj ) = ui(ζj ) + νij , if ui does not follow vj
(1)
where ui(ψj) = −pi − ψj2, ui(ζj) = −pi − ζj2, and
ηij, νij are random noises drawn from the standard Gumbel
distribution, which is commonly used in discrete choice the-
ory [3]. In other words, the two utility functions are defined
as the negative of squared distance function between user
ui's ideology position and the positions of the two possible
placements of user vj, plus a random noise.
According to the utility functions, user ui will follow vj if
Ui(ψj) > Ui(ζj). Using the same manipulation in [5], the
probability that user ui decides to follow user vj is given by
p(ui → vj ) = P (Ui(ψj ) > Ui(ζj )) = σ(pi · qj + bj )
(2)
1
where qj = 2(ψj − ζj), bj = ζj2 − ψj2 and σ(x) =
1+e−x is the sigmoid function. qj can be interpreted as the
image of user vj viewed by others, and bj can be regarded
as a bias term for vj. Usually we can only estimate qj and
bj instead of ψj and ζj, and it is adequate since we are
interested in the ideology pi and the probability of a link
can be calculated based on qj and bj.
After the probability of a directed link between two users
is determined, we are able to write down the log-likelihood
of observing a network G as
l(G) = log
I[i→j]
ij
σ
(cid:16) (cid:89)
(cid:88)
(i,j)
=
log σij +
(i,j):i→j
(i,j):i(cid:57)j
(1 − σij )1−I[i→j]
(cid:88)
log(1 − σij )
(3)
(cid:17)
where I[·] is the indicator function, i → j means there is a
link from ui to vj, and i (cid:57) j means there are no links from
ui to vj. Here σij is short for σ(pi · qj + bj) in Eq. 2.
Obviously not every pair of people has a link in between.
In fact, links in social networks are rather sparse. Therefore
we will not go through every possible pair of links in the like-
lihood above. Instead, we select all the existing links and
sample the same number of non-existing links. We denote
the set of existing links as S+ and the sampled set of non-
existing links as S−.
In addition, in the case where multiple
links may exist between users (e.g., a user can mention an-
other user several times), our model can be generalized by
simply treating multiple links as multiple occurrences of a
single edge. Suppose e+
ij is the number of links from ui to
−
ij is the number of sampled non-existing links from
vj and e
−
ui to vj (typically e
ij = 1), then the log-likelihood above
becomes
ij · log σij +
e+
e−
ij · log(1 − σij )
(4)
(cid:88)
l(G) =
(i,j)∈S+
(cid:88)
(i,j)∈S−
3.2
Ideology Estimation Model via Multiple
Link Types
We now address the challenge of utilizing multiple types
of links for ideology detection. In a heterogeneous network,
nodes can be connected via different types of relations. On
Twitter, people can follow, mention or retweet others.
It
naturally forms three different types of links, and different
link types certainly have different interpretations.
In order to utilize the knowledge in the heterogeneous net-
work across all kinds of relations, our ultimate model is a
weighted combination of models using all types of links. Ac-
cording to our previous assumption, a link-sender ui will
have the same intrinsic ideal points pi across all link types.
However we posit that the roles of link-receivers are differ-
ent for different relations, as the images of users will change
when observed by different types of behaviors. For example,
ui can easily decide to follow vj but hesitates to retweet from
vj. Therefore we use the same pi for user ui for all types
of links, and modify ψj, ζj to ψ(r)
j which are specific
to the relation r. As a result, qj and bj will be changed to
q(r)
as well. In consideration of the heterogeneity
j
in different types of links, we also add a relation weight wr
which represents the relative importance of the links in the
corresponding relation type r. Besides, we will use the av-
erage log likelihood of each link in each type of relation in
order to balance the scale of different link types.
j } and B = {b(r)
j }, we define
Denoting P = {pi}, Q = {q(r)
and b(r)
, ζ(r)
j
j
our objective as
l(GP , Q, B)
(cid:80)
(i,j)∈S
(r)
+
wr ·
R(cid:88)
r=1
=
e+
r,ij log σr,ij + (cid:80)
(cid:80)
r,ij + (cid:80)
(i,j)∈S
e+
(r)−
(i,j)∈S
(r)
+
(i,j)∈S
(r)−
−
r,ij
e
−
r,ij log (1 − σr,ij )
e
(5)
where e+
r,ij is the number of existing links from ui to vj
−
r,ij is the number of sampled non-existing
via relation r, e
links from ui to vj via relation r and σr,ij = σ(pi · q(r)
j +
b(r)
j ) for short. We will use these notations in the remain-
ing of this section. The constraint we put on wr is wr >
r=1 wr = 1, which forces the geomet-
0, r = 1,··· , R and(cid:81)R
ric mean1 of w1,··· , wR to be 1. In the remaining of the pa-
per we will use the R-dimensional vector w = (w1,··· , wR)
to denote the vector of network weights. For succinctness,
−
r,ij, i.e.,
we will use Nr to denote (cid:80)
r,ij + (cid:80)
e+
e
(i,j)∈S
(r)
+
(i,j)∈S
(r)−
the total number of links in relation r.
Identification. Because the probability in Eq. 2 involves
the product of two sets of parameters, there would be an
identifiability issue where the objective will be exactly the
same if we multiply every pi by a non-zero constant c and
divide every q(r)
by the same constant. In other words we
need to control the scale of model parameters P and Q.
In
our work we add an l2 regularization term on P and Q. We
also add the same regularization on B to avoid overfitting.
Therefore Eq. (5) becomes
j
l(GP , Q, B)
(cid:80)
r,ij log σr,ij + (cid:80)
e+
−
r,ij log (1 − σr,ij )
e
(r)−
(i,j)∈S
R(cid:88)
r=1
=
− µ
2
(cid:16)(cid:80)
wr ·
(i,j)∈S
(r)
+
F +
R(cid:88)
(cid:0)P 2
(cid:17)1/2
r=1
Q(r)2
F +
Nr
b(r)2
2
(cid:1)
R(cid:88)
r=1
Here ·F denotes the Frobenius norm of a matrix: AF =
and µ > 0 is a parameter that controls the
m,n A2
mn
(6)
effect of regularization terms.
3.3 Optimization
We propose a two-step algorithm to optimize the model
parameters. The first step is updating w fixing all other
parameters. The second step is updating P , Q, B given w.
The two steps will run iteratively until convergence.
Update w. Fortunately we are able to find a closed form
solution for network weights {wr}R
r=1. Maximizing the ob-
jective function (Eq. 6) w.r.t wr is equivalent to minimizing
J(w) =
where
(cid:80)
(i,j)∈S
(r)
+
Lr = −
R(cid:88)
r=1
wr · Lr
R(cid:88)
r,ij log σr,ij + (cid:80)
s.t.
r=1
e+
(i,j)∈S
(r)−
Nr
log wr = 0
(7)
e−
r,ij log (1 − σr,ij )
> 0
(8)
is a constant with respect to wr, which can be considered as
the loss function associated with relation r. We can find the
optimal value of wr by setting the derivative of Lagrangian
w.r.t. wr to zero, which leads to
(9)
(10)
and
wr =
((cid:81)R
r=1 Lr)1/R
, ∀r = 1, · · · , R
Lr
The value of wr in each round can be interpreted as the
geometric mean of the loss for all link types divided by the
loss for link type r. Intuitively, in order to minimize the ob-
jective function, we should assign small weights to relations
with big loss (Lr), namely smaller average log likelihood. In
1The
w1,··· , wR is given by ((cid:81)R
several positive variables
geometric mean of
r=1 wr)1/R.
(cid:17)1/R
(cid:16) R(cid:89)
r=1
λ =
Lr
other words, we will assign a big weight to a relation that is
consistent with the current model (i.e., with a big average
log likelihood function), which agrees with our intuition.
Update P , Q, B. Given w, all other parameters are up-
dated using gradient ascent algorithm.
ity of updating w is O(K ·(cid:80)R
requires O(K ·(cid:80)R
Time complexity. In each iteration the time complex-
r=1 Nr), and updating P , Q, B
r=1 Nr)operations as well, where K is the
dimension of the ideology vector. Therefore the time com-
plexity of our model is linear to the number of edges in the
network in particular. Hence, our proposed algorithm is ef-
ficient and can be scaled to large networks.
4. EXPERIMENTS
In this section we will show the experimental results based
on a subset of Twitter network. We will first introduce how
to construct the subnetwork. Then we will compare our
method with several baselines, in terms of both ranking ac-
curacy and political leaning classification. Finally, we con-
duct extensive case studies to show the estimated ideology
is meaningful and agrees with our intuition very well.
4.1 Data Preparation
In order to prepare our dataset, we start from politicians
and track the users that are connected to them. We first
collect the list of all the members of the 113th U.S. congress
(2013-2015). We manually search their names on Twitter
and match a name to an account if the account is verified
and we have enough confidence to show he/she is the corre-
sponding congressman/congresswoman. This step will pro-
vide us a list of 487 politicians.
We then use Twitter's streaming API and REST API to
collect their followees and followers. In consideration of ef-
ficiency, we collect at most 5,000 followers and followees for
every congressman. On one hand, in order to select politics-
related users, we set a threshold t = 20 where we only keep
users who follow at least t congressmen or are followed by
at least t congressmen. These accounts are likely to be en-
thusiastic about political issues. On the other hand, we also
include around 10,000 random users who follow 3∼5 politi-
cians to include more peripheral (less politics-related) Twit-
ter users. Our approach will be evaluated on this Twitter
subnetwork with these users as vertices.
There are various reasons apart from ideology why peo-
ple interact with each other on Twitter, such as they know
each other in real life. Therefore, preparing the set of link-
receivers is crucial in that the decision to follow them or not
should reveal other users' political interests. In order to al-
leviate the effect of random factors in our model, we restrict
the set of link-receivers to be U.S. congress members;
in
other words, the social links between two ordinary citizens
will not be taken into consideration. This strategy allows
us to minimize other social factors behind link generation in
our model, and it will make our model more accurate.
Here is how we construct the social network for different
relations: for follow link type, we will add an edge from ui
to vj to the network if a user ui follows a politician vj. For
mention and retweet link types, we collect part2 of recent
tweets for all the users.
If ui posts a tweet which men-
tions/retweets from a politician vj, we add an edge from
2At most 3,200 tweets for each user are available due to API
limits.
ui to vj to the mention/retweet network.
If a user does
not mention (retweet from) any politician, he/she will be an
isolated node and we will simply remove the user from the
corresponding network. Note that in contrast to the follow
links, a user can mention or retweet another user for multi-
ple times. In this case we simply assume multiple edges exist
between them, as discussed in Section 3.1. More details of
our dataset can be found in Table 1.
Relation
Number of links
Total number of users
follow
1,764,956
46,477
mention
2,395,813
34,775
retweet
718,124
30,990
Table 1: Statistics for Twitter Dataset
4.2 Performance Evaluation
4.2.1 Baseline Methods
We compare our Multiple Link Types Ideal Point Estima-
tion Model (ML-IPM) with the following baseline methods:
• The simplest baseline where the ideology of a user is
the average score of her outgoing neighbors. Each Re-
publican is assigned an ideology score of 1, and each
Democrat is assigned a score of -1. We denote this
baseline method as AVER.
• The Bayesian Ideal Point Estimation Model (B-IPM)
[2] to be introduced in Section 5. Although the author
does not mention their generalization to relations other
than follow, we adopt the model for other types of links
for comparison.
• Our Single Link Type Ideal Point Estimation Model
(SL-IPM) where only one type of link is present in the
social network, as introduced in Section 3.1.
• A special case of our model ML-IPM where the weights
for different types of links are fixed (ML-IPM-fixed).
In this case the weights for different link types are uni-
formly distributed, namely w1 = w2 = ··· = wR = 1.
The research problem in [27] is also similar to our task
(with single link type), however their approach is not scal-
able to the size of our dataset (the time complexity is O(n2)
for each iteration, where n is the number of users). There-
fore we will not consider their method for comparison.
4.2.2 Evaluation Measures
In our experiments, we will evaluate the ranking and clas-
sification accuracy to demonstrate the effectiveness of our
ideal point estimation model.
Ranking. In order to evaluate the effect of continuous
ideology, we design the ranking evaluation based on 100
manually labeled users, with integer labels from 1 (most
liberal) to 5 (most conservative). Here we evaluate the pair-
wise accuracy between Twitter users, where a pair of users
is considered correct if the order of their 1-dimensional ide-
ologies aligns with the order of manual labels (for example,
a pair of users (ua, ub) where ua is labeled as "1" and has an
ideology of −0.9, and ub is labeled as "4" and has an ideology
of 0.2). We use five different sets of random initialization for
the model parameters, and report the mean and standard
deviation on a total of 3,857 pairs of users.
Classification.
In the classification task, we will clas-
sify users as liberal or conservative based on the ideology
we have inferred from the dataset. To obtain the ground
truth of some users in our dataset, we crawl congress peo-
ple's party affiliation from the Internet (which is open to
public). In addition, we collect the political bias for 100 pop-
ular newspaper accounts3, and we also take advantage of the
labeled users in our previous task. These multi-dimensional
ideal points are used to train a logistic regression classifier.
The classification performance is measured by the Area Un-
der ROC Curve (AUC), and is averaged over 10 different
runs by sampling different training data. For all the experi-
ments, we use five different sets of random initialization for
the model parameters.
Method
Ranking Accuracy Classification AUC
AVER (follow )
AVER (mention)
AVER (retweet)
B-IPM (follow )
B-IPM (mention)
B-IPM (retweet)
SL-IPM (follow )
SL-IPM (mention)
SL-IPM (retweet)
ML-IPM-fixed
ML-IPM
0.427
0.446
0.474
0.443 ± 0.102
0.433 ± 0.183
0.501 ± 0.127
0.626 ± 0.011
0.623 ± 0.027
0.637 ± 0.005
0.655 ± 0.008
0.663 ± 0.007
0.523
0.558
0.587
0.868 ± 0.021
0.558 ± 0.064
0.561 ± 0.066
0.953 ± 0.015
0.951 ± 0.018
0.958 ± 0.005
0.930 ± 0.035
0.986 ± 0.013
Table 2: Experimental Results
Discussion. We report the ranking accuracy and classifi-
cation AUC in Table 2, where the relation in the bracket rep-
resents the type of link used in the corresponding method.
From the above table we can see our advantage over the
baseline methods in terms of user ranking and classification
accuracy. The comparison on a single link type between our
approach (rows 7-9) and existing work (rows 1-3,4-6) illus-
trates our considerable improvement for both tasks. Nev-
ertheless, information from a single network may not be
adequate in determining one's ideology: people may follow
well-known political figures for reasons other than political
proximity, and it is not rare that a user keeps criticizing oth-
ers by mentioning them, or retweets ironically. Therefore,
integrating heterogeneous types of links becomes necessary,
and the results are always better if we automatically update
the weight for each link type (rows 10-11). In addition, our
method is not sensitive to initialization as the standard de-
viation is small (row 11). In sum, our learned ideology has
a higher quality when we combine heterogeneous types of
links together, with learned weights of all link types.
4.2.3 Cold-start Problem
Cold start problem is known as the issue in a system where
the inference for users without sufficient information will
suffer. Our unified approach is also able to tackle the cold-
start problem by integrating knowledge from other types of
links: users that are sparsely linked by one type of link may
be active in other networks. Thus we are able to have a
significantly better understanding of the users by utilizing
all types of links.
3Source:
usatop100.html
http://www.mondotimes.com/newspapers/usa/
To prepare the candidate users, we select all users whose
number of outgoing links is less than or equal to a given
threshold in the training dataset, and we use classification
AUC (as in previous subsection) and link prediction as eval-
uation measures.
In the link prediction task, we observe
some social links in the network and predict a set of unob-
served links of the same type. In the experiments, we also
use five different initializations and 90% of the links (both
existing and non-existing) are chosen uniformly at random
as training. For the baseline method AVER, we simply de-
fine the probability of a link using a modified version of Eq.
2 without bias. In Fig. 2 we compare our unified ML-IPM
model (in solid red line) with (1) our model where weights
are fixed (in regular dashed green line); (2) SL-IPM (in dot-
ted blue line); (3) B-IPM (in dash-dotted black line); and
(4) AVER (in bold dashed magenta line). We can see our
unified approach is the best among all baseline methods,
especially when the users are extremely sparsely linked.
4.2.4 Parameter Study
Here we study how ideology dimension K affects our model.
The effect of K is shown in Table 3. Our method is not sen-
sitive to the choice of K, and the best K should be around
5. For above approaches and experiments, we use K = 5 as
the dimension of ideology, if not mentioned otherwise.
Dimension K
1
3
5
7
Classification AUC
0.979
0.981
0.986
0.977
Table 3: Effect of ideology dimension
4.3 Case Studies
We will analyze the relation weights w = {wr} and visu-
alize Twitter users' ideology in this subsection.
It is interesting to study the relative weights w for dif-
ferent types of links.
Intuitively, a larger wr implies the
relation r is more important in our task. The automatically
learned weights are shown in Table 4. We can observe the
weight for retweet is the highest among all types of links,
while the weight for follow is the lowest. This is reasonable
as following someone on social network is common and does
not stand for a very close relationship. For the other two
relations, a retweet is likely to show the endorsement of the
author of the original tweet; on the other hand, people are
free to mention anybody and this behavior might indicate ei-
ther pleasant or hostility. Therefore mention behaviors may
not indicate a strong homophily as retweet does. In sum, a
larger weight represents the significance of the corresponding
source of information, and for the specific task of detecting
Twitter users' ideology based on their social links, retweet
is the most crucial relation among all kinds of relations.
Relation r
Weight wr
follow mention
0.866
1.035
retweet
1.117
Table 4: Weights of different link types
To further demonstrate the meaning of our learned weights,
we randomly add 1,000,000 links between pairs of Twitter
user and politician to our dataset. We denote this type of
link as "random" and apply our model to the heterogeneous
network with four relations (follow, mention, retweet and
random). As a result, the weights of four types of links
become 1.02, 1.23, 1.33, 0.59, respectively. The random re-
lation has the least importance score, and the trend of other
three relations agrees with our previous result. This result
shows our model is robust against noise and the learned
weights reflect the importance of relations quite well.
(a) Ideology distribution for core users
(b) Ideology distribution for peripheral users
Figure 4: Ideology Distribution
In the remaining of this section we will visualize the latent
ideology position of Twitter users. For visualization pur-
poses we use K = 1 in all figures below. Fig. 4 shows the
distribution of ideology for all Twitter users in our dataset.
We can observe three peaks around x = −0.5, x = 0 and
x = 0.5 in Fig. 4(a), which represent the three clusters of
liberal, neutral and conservative users respectively. Most of
the users with less political interests (Fig. 4(b)) will stay in
the middle and form only one cluster. The statistics are rea-
sonable because the distribution of peripheral users is more
similar to the public, who are distributed more uniformly
along the political spectrum. It is noteworthy that Twitter
users are a biased sample of the public: they may be younger
and more active on the Internet. Therefore skewness in our
detected ideology may exist.
Twitter users may also indicate their locations on their
personal profiles. We collect all users in our dataset who
claim themselves to live in one of the 50 states in the U.S.
(or Washington, D.C.), and calculate the average ideology
for each area. Then we are able to map the average score to
a color between red and blue. As a result, 9,362 users are
identified and 29 states are labeled as red (conservative),
as shown in Fig. 5. Note that our colored map may differ
from political polls or election results, given the population
of Twitter users and the sample variance in the dataset.
In Fig. 6, we also visualize the ideology for some popular
media, magazine, newspaper accounts and a few political
figures including president Barack Obama, Hillary Clinton
and Donald Trump, the two presidential candidates in 20164
and so on. The length of each line (x-axis) represents the
value of our detected ideology. The text on the y-axis de-
notes their Twitter screen name, and the color represents
the political leaning provided by Mondo Times5: red rep-
4The ideology for Hillary Clinton and Donald Trump is es-
timated based on their most recent tweets and friends.
5http://www.mondotimes.com/, a worldwide news media
mention network
retweet network
Figure 2: Classification AUC for sparsely linked users in different types of networks.
mention network
retweet network
Figure 3: Link prediction AUC for sparsely linked users in different types of networks.
It is also worth analyzing the obvious exceptions in the re-
sults. Opposite to the label provided by Mondo Times, Wall
Street Journal (WSJ) is considered as a media source leaning
to the left in our study. When we investigate the social links
of WSJ in our dataset, we find its links to politicians from
two parties are balanced. Besides, our estimation refers to
only the behaviors of their Twitter account (i.e. whom they
follow/mention/retweet) instead of the editorial contents of
the journal itself. This mainly explains the reason why our
algorithm does not label it as a conservative account. Inter-
estingly, WSJ is shown to be one of the most liberal online
media outlets in some other studies [11, 27, 17].
5. RELATED WORK
5.1
Ideology Detection in Roll Call Voting Data
Ideal point models attempt to estimate the position of
each lawmaker in the latent political space. Legislative vot-
ing is one of the sources for quantitative estimation of law-
makers' ideal points. Poole and Rosenthal [22] were among
the first few researchers in political science domain to pro-
vide a thorough and rigorous approach for ideology estima-
tion. Afterwards, political scientists have proposed numer-
ous methods to infer political ideology from roll call voting
records [23, 13, 24, 16, 15, 5]. Researchers study the pub-
lic voting record of lawmakers and model the probability of
each vote, which is usually described as the interaction of the
lawmaker's ideal point and the position of the bill. Along
this line of research, computer science researchers extend the
ideal point model to a variety of aspects, including applying
Figure 5: Average ideology for Twitter users in each
state. Darker red means more conservative, while
darker blue means more liberal.
resents a conservative account; blue stands for a liberal ac-
count; and black represents an account with no bias. From
this vivid example we can see the position of those accounts
on a unidimensional spectrum, and we are able to compare
them with politicians. Again, there may be slight difference
between the detected ideology and the actual political lean-
ing, as the ideology is detected according to the behavior of
these Twitter accounts instead of the editorial content.
directory.
23456789Threshold (degree in the training dataset)0.30.40.50.60.70.80.91.0Classification AUCML-IPMML-IPM-fixedSL-IPM (mention)B-IPM (mention)AVER (mention)23456789Threshold (degree in the training dataset)0.30.40.50.60.70.80.91.0Classification AUCML-IPMML-IPM-fixedSL-IPM (retweet)B-IPM (retweet)AVER (retweet)01234567Threshold (degree in the training dataset)0.450.500.550.600.650.700.750.800.85Link Prediction AUCML-IPMML-IPM-fixedSL-IPM (mention)B-IPM (mention)AVER (mention)01234567Threshold (degree in the training dataset)0.450.500.550.600.650.700.750.800.85Link Prediction AUCML-IPMML-IPM-fixedSL-IPM (retweet)B-IPM (retweet)AVER (retweet)measure of ideology is often desired for real world applica-
tions and our goal in the paper is to detect real-valued ideal
points for users in social networks, those classification and
clustering methods cannot be directly applied in our task.
With respect to the work on estimating continuous polit-
ical ideology, researchers have been mining the rich infor-
mation in network structures to obtain an accurate ideology
score for users on social networks. Typically, inference of
a user's ideal point is made by exploring her neighbors and
her relationship with labeled users (such as politicians whose
party affiliation is clearly known to the public). Therefore, a
simple yet intuitive approach would be calculating the ratio
of the number of Democrats and Republicans that a user
follows on the social network [9]. Wong et al.
[27, 26] as-
sume liberal people tend to tweet more about liberal events
and the same for conservative users. Given the political
leaning of social events by labeling associated tweets, they
are able to infer the ideology of users who have engaged.
Barber´a [2] proposes a probabilistic model to describe the
likelihood of the social network, in which the probability
to observe a link between two users is defined as a func-
tion of their ideal points. Although most of the existing
methods have utilized the homophily phenomenon [18, 28]
in network generation and made appropriate assumptions of
the network structure, they neglect the fact that most so-
cial networks contain multiple types of interactions between
people. Those methods fail to define how close two nodes
are when different link types are present. Although experts
can pre-define weights for different link types, it is almost
impossible to exhaustively list all possible combinations of
link weights given the scale of real world data. Moreover, ex-
periments show that the performance of existing approaches
will suffer when a user is sparsely linked to others. Our ap-
proach, on the other hand, is able to automatically learn the
weights for different types of links according to the network
structure and determine how important each link type is in
an ideology detection task. The cold start problem is also
overcome by transferring information learned from one type
of link to other link types.
6. CONCLUSION AND FUTURE WORK
In this paper we present a novel approach for ideology
detection on Twitter using heterogeneous types of links. In-
stead of predicting binary party affiliations to users, our
work focuses on detecting the continuous ideal points for
Twitter users, which is more comprehensive. In addition, we
improve over traditional ideology estimation models by inte-
grating information from heterogeneous link types in social
networks. Specifically, our model is able to automatically
update the importance scores of various relations on Twit-
ter, and these weights are incorporated in the unified frame-
work to achieve an outstanding performance. Moreover, our
algorithm has an even better performance for sparsely linked
users in separate networks. Finally, we evaluate our model
on a subnetwork of Twitter, and the results show our advan-
tage over the baseline methods. Extensive case studies also
demonstrate our model's alignment with human intuitions.
One limitation of this work is that we only take links into
consideration when deciding one's ideology. In the future,
we plan to integrate other content information, such as text,
into the current framework, to better understand people's
ideology.
Figure 6: One dimensional
users. Red: conservative; Blue:
bias. Color labels are provided by Mondo Times.
ideology for selected
liberal; Black: no
natural language processing and topic modeling techniques
on bills [7, 8, 12, 14, 19].
5.2
Ideology Detection in Social Networks
Apart from voting data, recently some approaches have
been using information from social networks to analyze user's
political leaning. These approaches can be further grouped
into two categories according to the task they are dealing
with: classification/clustering and continuous ideology es-
timation. Classification and clustering tasks predict which
political party a user belongs to (or congregate users into
several clusters), and can be handled from various aspects.
When users interact with each other via messages, especially
when they have discussions or arguments, methods from nat-
ural language processing can be applied to analyze the topics
and people's sentiment. Pla and Hurtado [21] analyze users'
tweets on Twitter, extract features such as hashtags and
punctuations, and determine the polarity of a tweet, and a
user's political leaning is simply a weighted average of her
tweets. Boutet et al. [4] analyze the characteristics of three
main parties in UK election, and predict which party a user
supports by the amount of Twitter messages referring to po-
litical accounts. Based on debate records on various political
topics, Gottipati et al. [10] adopt a matrix factorization ap-
proach to discover users' attitudes towards different political
issues, and use k-means on the user feature vector to con-
gregate users into several clusters. Some researchers extract
text features such as hashtags and latent semantic analysis
of a conversion and feed them into a standard classifier in
order to classify users [25, 6, 20]. Users' public profile in-
formation (such as marriage status, age et al.) can also be
utilized as inputs of classification models [1]. However, apart
from classification tasks, it is also important to make infer-
ence about the continuous ideal points, which can be applied
to rank ordering and demonstrate the relative difference be-
tween people in the same political party. Since a continuous
1.00.50.00.51.0Ideology@RepSamFarr@repdonnaedwards@PeterWelch@HillaryClinton@latimes@YahooNews@washingtonpost@MSNBC@BarackObama@CBSNews@ProPublica@WSJ@cspan@Newsweek@npr@ABC@politico@HuffingtonPost@USATODAY@ForeignPolicy@Forbes@CNN@CNBC@time@usnews@realDonaldTrump@FoxNews@WashTimes@RandPaul@Newsmax_Media@RepTrentFranks@SteveScalise7. REFERENCES
[1] F. Al Zamal, W. Liu, and D. Ruths. Homophily and
latent attribute inference: Inferring latent attributes
of twitter users from neighbors. ICWSM, 270, 2012.
[2] P. Barber´a. Birds of the same feather tweet together:
Bayesian ideal point estimation using twitter data.
Political Analysis, 23(1):76–91, 2015.
[3] M. E. Ben-Akiva and S. R. Lerman. Discrete choice
analysis: theory and application to travel demand,
volume 9. MIT press, 1985.
[4] A. Boutet, H. Kim, E. Yoneki, et al. What's in your
tweets? i know who you supported in the uk 2010
general election. In ICWSM, 2012.
[5] J. Clinton, S. Jackman, and D. Rivers. The statistical
analysis of roll call data. American Political Science
Review, 98(02):355–370, 2004.
[6] M. D. Conover, B. Gon¸calves, J. Ratkiewicz,
A. Flammini, and F. Menczer. Predicting the political
alignment of twitter users. In Privacy, Security, Risk
and Trust and 2011 IEEE Third Int. Conf. on Social
Computing, pages 192–199. IEEE, 2011.
[18] M. McPherson, L. Smith-Lovin, and J. M. Cook.
Birds of a feather: Homophily in social networks.
Annual review of sociology, pages 415–444, 2001.
[19] V.-A. Nguyen, J. Boyd-Graber, P. Resnik, and
K. Miler. Tea party in the house: A hierarchical ideal
point topic model and its application to republican
legislators in the 112th congress. In Proc. of ACL,
2015.
[20] M. Pennacchiotti and A.-M. Popescu. A machine
learning approach to twitter user classification.
ICWSM, 11:281–288, 2011.
[21] F. Pla and L. Hurtado. Political tendency
identification in twitter using sentiment analysis
techniques. In Proceedings of COLING, pages
183–192, 2014.
[22] K. T. Poole and H. Rosenthal. A spatial model for
legislative roll call analysis. American Journal of
Political Science, pages 357–384, 1985.
[23] K. T. Poole and H. Rosenthal. Patterns of
congressional voting. American Journal of Political
Science, 35(1):pp. 228–278, 1991.
[7] S. Gerrish and D. M. Blei. Predicting legislative roll
[24] K. T. Poole and H. Rosenthal. Congress: A
calls from text. In Proc. of the 28th Int. Conf. on
Machine Learning (ICML'11), pages 489–496, 2011.
[8] S. Gerrish and D. M. Blei. How they vote:
Issue-adjusted models of legislative behavior. In
Advances in Neural Information Processing Systems
(NIPS'12), pages 2762–2770, 2012.
[9] J. Golbeck and D. Hansen. Computing political
preference among twitter followers. In Proceedings of
the SIGCHI Conference on Human Factors in
Computing Systems, pages 1105–1108. ACM, 2011.
Political-Economic History of Roll Call Voting. Oxford
University Press, 1997.
[25] D. Rao, D. Yarowsky, A. Shreevats, and M. Gupta.
Classifying latent user attributes in twitter. In Proc.
of the 2nd Int. workshop on Search and mining
user-generated contents, pages 37–44. ACM, 2010.
[26] F. Wong, C. W. Tan, S. Sen, and M. Chiang. Media,
pundits and the us presidential election: Quantifying
political leanings from tweets. In Proc. of the Int.
Conf. on Weblogs and Social Media, 2013.
[10] S. Gottipati, M. Qiu, L. Yang, F. Zhu, and J. Jiang.
[27] F. M. F. Wong, C. W. Tan, S. Sen, and M. Chiang.
Quantifying political leaning from tweets and retweets.
In ICWSM, 2013.
[28] S. Wu, J. M. Hofman, W. A. Mason, and D. J. Watts.
Who says what to whom on twitter. In Proc. of the
20th Int. Conf. on World wide web, pages 705–714.
ACM, 2011.
[29] D. X. Zhou, P. Resnick, and Q. Mei. Classifying the
political leaning of news articles and users from user
votes. In ICWSM, 2011.
Predicting user's political party using ideological
stances. In Social Informatics, pages 177–191.
Springer, 2013.
[11] T. Groseclose and J. Milyo. A measure of media bias.
The Quarterly Journal of Economics, pages
1191–1237, 2005.
[12] Y. Gu, Y. Sun, N. Jiang, B. Wang, and T. Chen.
Topic-factorized ideal point estimation model for
legislative voting network. In Proceedings of the 20th
Int. Conf. on Knowledge discovery and data mining
(KDD'14), pages 183–192, 2014.
[13] J. J. Heckman and J. M. Snyder Jr. Linear probability
models of the demand for attributes with an empirical
application to estimating the preferences of legislators.
Technical report, National Bureau of Economic
Research, 1996.
[14] M. Iyyer, P. Enns, J. Boyd-Graber, and P. Resnik.
Political ideology detection using recursive neural
networks. In Association for Computational
Linguistics, 2014.
[15] S. Jackman. Multidimensional analysis of roll call data
via bayesian simulation: identification, estimation,
inference, and model checking. Political Analysis,
9(3):227–241, 2001.
[16] J. Londregan. Estimating legislators' preferred points.
Political Analysis, 8(1):35–56, 1999.
[17] J. R. Lott Jr and K. A. Hassett. Is newspaper
coverage of economic events politically biased? Public
Choice, 160(1-2):65–108, 2014.
|
1104.4418 | 2 | 1104 | 2011-10-27T16:31:49 | Internal links and pairs as a new tool for the analysis of bipartite complex networks | [
"cs.SI",
"physics.soc-ph"
] | Many real-world complex networks are best modeled as bipartite (or 2-mode) graphs, where nodes are divided into two sets with links connecting one side to the other. However, there is currently a lack of methods to analyze properly such graphs as most existing measures and methods are suited to classical graphs. A usual but limited approach consists in deriving 1-mode graphs (called projections) from the underlying bipartite structure, though it causes important loss of information and data storage issues. We introduce here internal links and pairs as a new notion useful for such analysis: it gives insights on the information lost by projecting the bipartite graph. We illustrate the relevance of theses concepts on several real-world instances illustrating how it enables to discriminate behaviors among various cases when we compare them to a benchmark of random networks. Then, we show that we can draw benefit from this concept for both modeling complex networks and storing them in a compact format. | cs.SI | cs |
Internal links and pairs as a new tool
for the analysis of bipartite complex networks
Oussama Allali, Lionel Tabourier, Cl´emence Magnien and Matthieu Latapy
LIP6, Universit´e Pierre et Marie Curie, 4 Place Jussieu, F-75252 Paris, France
[email protected]
Abstract
Many real-world complex networks are best modeled as bipartite (or 2-mode) graphs, where
nodes are divided into two sets with links connecting one side to the other. However, there is cur-
rently a lack of methods to analyze properly such graphs as most existing measures and methods are
suited to classical graphs. A usual but limited approach consists in deriving 1-mode graphs (called
projections) from the underlying bipartite structure, though it causes important loss of information
and data storage issues. We introduce here internal links and pairs as a new notion useful for such
analysis: it gives insights on the information lost by projecting the bipartite graph. We illustrate the
relevance of theses concepts on several real-world instances illustrating how it enables to discrim-
inate behaviors among various cases when we compare them to a benchmark of random networks.
Then, we show that we can draw benefit from this concept for both modeling complex networks and
storing them in a compact format.
1 Introduction
Many real-world networks have a natural bipartite (or 2-mode) structure and so are best modeled by
bipartite graphs: two kinds of nodes coexist and links are between nodes of different kinds only. Typical
examples include biological networks in which proteins are involved in biochemical reactions, occur-
rence of words in sentences of a book, authoring of scientific papers, file-provider graphs where each
file is connected to the individuals providing it, and many social networks where people are members of
groups like directory boards. See [Newman et al. 2001, Latapy et al. 2008] for more examples.
The classical approach for studying such graphs is to turn them into classical (non-bipartite) graphs
using the notion of projection: considering only one of the two types of nodes and linking any two nodes
if they share a neighbor in the bipartite graph. This leads for instance to cooccurrence graphs, where two
words are linked if they appear in a same sentence, coauthoring graphs, where two researchers are linked
if they are authors of a same paper, interest graphs where individuals are linked together if they provide
a same file, etc.
This approach however has severe drawbacks [Latapy et al. 2008]. In particular, it leads to huge pro-
jected graphs, and much information is lost in the projection. There is therefore much interest in methods
that would make it possible to study bipartite graphs directly, without resorting to projection. Despite
previous efforts to develop such methods [Lind et al. 2005, Latapy et al. 2008, Zweig et al. 2011], much
remains to be done in this direction.
We propose in this paper a new notion, namely internal links and pairs, useful for the analysis of
real-world bipartite graphs. We introduce it in Section 2, then present some datasets in Section 3 that we
use as typical real-world cases which we analyze in Section 4 with regard to our new notion. We explore
a more algorithmic perspective in Section 5.
1
2 Internal pairs and links
Let us consider a bipartite graph G = (⊥, ⊤,E), with E ⊆ ⊥ × ⊤. We call nodes in ⊥ (resp. ⊤) the
bottom (resp. top) nodes. We denote by N(u) = {v ∈ (⊥ ∪ ⊤), (u,v) ∈ E} the neighborhood of any node
u. We extend this notation to any set S of nodes as follows: N(S) = ∪v∈SN(v).
The ⊥-projection of G is the graph G⊥ = (⊥,E⊥) in which (u,v) ∈ E⊥ if u and v have at least one
neighbor in common (in G): N(u) ∩ N(v) 6= /0. We will denote by N⊥(u) the neighborhood of a node u in
G⊥: N⊥(u) = {v ∈ ⊥, (u,v) ∈ E⊥} = N(N(u)). The ⊤-projection G⊤ is defined dually.
For any pair of nodes (u,v) /∈ E, we denote by G + (u,v) the graph G′ = (⊥, ⊤,E ∪ {(u,v)}) obtained
by adding the new link (u,v) to G. For any link (u,v) ∈ E, we denote by G − (u,v) the graph G′ =
(⊥, ⊤,E \ {(u,v)}) obtained by removing link (u,v) from G.
Definition 1 (internal pairs) A pair of nodes (u,v) with (u,v) /∈ E is a ⊥-internal pair of G if the ⊥-
projection of G′ = G + (u,v) is identical to the one of G. We define ⊤-internal pairs dually.
i
j
k
l
i
j
k
l
C
A
B
C
G
D
E
A
C
B
D
G′ = G + (B,l)
E
A
D
E
B
G′
⊥ = G⊥
Figure 1: Example of ⊥-internal pair. Left to right: a bipartite graph G, the bipartite graph G′ obtained
by adding link (B,l) to G, and the ⊥-projection of these two graphs. As G′
⊥ = G⊥, (B,l) is a ⊥-internal
pair of G.
Definition 2 (internal links) A link (u,v) ∈ E is a ⊥-internal link of G if the ⊥-projection of G′ = G −
(u,v) is identical to the one of G. We define ⊤-internal links dually.
i
j
k
i
j
k
C
A
B
C
G
D
E
A
C
B
D
G′ = G − (B, j)
E
A
D
E
B
G′
⊥ = G⊥
Figure 2: Example of ⊥-internal link. Left to right: a bipartite graph G, the bipartite graph G′ obtained
by removing link (B, j) from G, and the ⊥-projection of these two graphs. As G′
⊥ = G⊥, (B, j) is a
⊥-internal link of G.
In other words, (u,v) is a ⊥-internal pair of G if adding the new link (u,v) to G does not change its
⊥-projection; it is a ⊥-internal link if removing link (u,v) from G does not change its ⊥-projection. See
Figure 1 and 2 for examples.
The notion of internal link is related to the redundancy of a node [Latapy et al. 2008], defined for
any node v as the fraction of pairs in N(v) that are still linked together in the projection of the graph G′
obtained from G by removing v and all its links (all these pairs are linked in G⊥). There is however no
direct equivalence between the two notions. The redundancy is a node-oriented property: it gives a value
for each node, while the notion of internal links and pairs is link-oriented. As illustrated on Figure 3,
nodes exhibiting the same fraction of internal links may have different redundancies, and conversely
2
two nodes having the same redundancy may correspond to different internal connectivity patterns. It is
possible to classify the links of each node as ⊥ and ⊤-internal or not; this induces a notion of ⊥-internal
degree of a node (resp. ⊤-internal degree), which is its number of internal links (see next section).
i
j
k
l
m
n
o
A
B
C
D
E
F
Figure 3: Redundancy versus internal links. In this graph, B and D have the same fraction of ⊥-internal
links ( 2
3 ) while having different redundancies (resp. 1
3 and 2
15).
We now give a characterization of internal links, which does not explicitly rely on the projection
anymore and provides another point of view on this notion.
Lemma 1 A link (u,v) of G is ⊥-internal if and only if N(v) \ {u} ⊆ N(N(u) \ {v}).
Proof: Let us consider a link (u,v) ∈ E and let G′ = G − (u,v) be the bipartite graph obtained by
removing the link (u,v) from G. Then, by definition, E⊥ = E ′
⊥ ∪ {(u,x), x ∈ N(v) \ {u}}.
Suppose that (u,v) is a ⊥-internal link, i.e. E⊥ = E ′
⊥. Then all links (u,x) in the expression above
already belong to E ′
⊥. Therefore, for each x ∈ N(v) \ {u}, ∃ y 6= v ∈ ⊤ such that y ∈ N(u) ∩ N(x). By
symmetry, x ∈ N(y) and y ∈ N(u) \ {v} therefore, x ∈ N(N(u) \ {v}) and so N(v) \ {u} ⊆ N(N(u) \ {v}).
Suppose now that N(v) \ {u} ⊆ N(N(u) \ {v}). Then for each node x ∈ N(v) \ {u}, ∃ y ∈ N(u) \ {v}
⊥ and the link
such that x ∈ N(y). Thus, by definition of the projection, (u,x) ∈ E ′
(u,v) is ⊥-internal.
⊥. Therefore E⊥ = E ′
(cid:3)
3 Datasets
Our aim is to evaluate the importance of internal pairs and links in large real-world graphs, rather than
obtain specific conclusions in a particular context. That is why we study various instances of real-world
bipartite graphs, expecting to observe different behaviors. We present in this section the datasets we will
use and summarize their general features (number of nodes and links). The graphs under consideration
are social ones connecting people (⊥-nodes) through events, groups or similar interests (⊤-nodes).
• Imdb-movies [Barab´asi et al. 1999] is obtained from the Internet Movie Database (www.imdb.com):
it features actors connected to the movies they played in. ⊥ = 127,823 actors, ⊤ = 383,640
movies, E = 1,470,418.
• Delicious-tags [Gorlitz et al. 2008] consists of Delicious (www.delicious.com) users connected
⊥ = 532,924 users, ⊤ = 2,474,234 tags,
to the tags they use for indexing their bookmarks.
E = 37,421,585.
• Flickr-tags [Prieur et al. 2008] consists of Flickr (www.flickr.com) users connected to the tags
they use for indexing their photos. ⊥ = 319,675 users, ⊤ = 1,607,879 tags, E = 13,336,993.
• Flickr-comments: same as above, except that Flickr users are linked to the photos they comment.
⊥ = 760,261 users, ⊤ = 12,678,244 photos, E = 41,904,158.
• Flickr-favorites: same as above, except that users are linked to the photos they pick up as favorites.
⊥ = 321,312 users, ⊤ = 6,450,934 photos, E = 17,871,828.
3
• Flickr-groups: same as above, except that users are linked to the groups they belong. ⊥ = 72,875
users, ⊤ = 381,076 groups, E = 5,662,295.
• P2P-files [Aidouni et al. 2009] is obtained from peer-to-peer file exchange eDonkey: users are
linked to the files they provide. ⊥ = 122,599 peers, ⊤ = 1,920,353 files, E = 4,502,704.
• PRL-papers has been extracted from the Web of Science database (www.isiwebofknowledge.com),
collecting papers and authors of Physical Review Letters from 2004 to 2007. ⊥ = 15,413 authors,
⊤ = 41,633 papers, E = 249,474.
4 Analysis of real-world cases
In this section, we use the notions of internal links and pairs introduced in Section 2 to describe the
real-world cases presented in Section 3. Let us insist on the fact that our aim is not to provide accurate
information on these specific cases, but to illustrate how internal links and pairs may be used to analyze
real-world data. We first show that there are many internal links in typical data, then study the number
of internal links of each node and the correlation of this number with the node's degree.
Since the links attached to ⊤-nodes (resp. ⊥-nodes) of degree 1 are all ⊥-internal (resp. ⊤-internal),
and since there may be a large fraction of nodes with degree 1 in real-world graphs, we only study in the
sequel links attached to nodes with degree at least 2.
4.1 Amount of internal links and pairs
In order to capture how redundant is the bipartite structure, we compute the number of ⊤- and ⊥-internal
pairs and links. The fraction of internal links, denoted fEI and presented in Table 1 seems in general
not negligible. A quantitative analysis of these values however requires the definition of a benchmark.
That is why we compare the measures to the corresponding amounts on random bipartite graphs with the
same sizes and degree distributions, which is a typical random model to evaluate the deviation from an
expected behavior -- see for example [Newman et al. 2001, Newman et al. 2003]. The measures related
to this model will be referred to with the symbol *.
We denote by PI(⊥) (resp. PI(⊤)) the set of ⊥-internal pairs (resp. ⊤-internal pairs) and by EI(⊥)
(resp. EI(⊤)) the set of ⊥-internal links (resp. ⊤-internal links). We normalize the number of internal
pairs and links measured on real graphs to the values obtained with the model described above. The
corresponding results are also presented in Table 1.
Imdb-movies
Delicious-tags
Flickr-tags
Flickr-comments
Flickr-groups
Flickr-favorites
P2P-files
PRL-papers
fEI (⊥) PI (⊥)
P∗
I (⊥)
0.031
0.441
0.972
0.112
0.920
0.117
0.398
0.258
0.491
0.228
0.574
0.172
0.082
0.337
0.718
0.033
EI(⊥)
E ∗
I (⊥)
47.0
1.47
1.51
4.22
2.21
2.02
8.53
7.17
fEI (⊤) PI (⊤)
P∗
I (⊤)
0.026
0.491
1.823
0.104
1.040
0.048
0.002
0.151
0.249
0.015
0.704
0.002
0.092
0.136
0.487
0.001
EI(⊤)
E ∗
I (⊤)
147
5.31
2.50
22.0
2.86
12.4
1430
11.2
Table 1: Fraction of internal links ( fEI ), number of internal pairs (PI) and internal links (EI) of real-
world graphs normalized to the values on random bipartite graphs with the same size and same degree
distributions.
4
We first notice that the behaviors in regards to the amount of internal links are very heterogeneous.
Still some general trends can be underlined: in the random case, ⊥- and ⊤-internal links are underesti-
mated. So, the probability of having nodes sharing the same neighborhood is higher in real graphs than
in random ones. We may indeed expect, for instance, that people participating to the same paper have a
higher probability to be coauthors of another one than a random pair of authors.
Meanwhile the numbers of internal pairs are generally overestimated in random networks. To under-
stand this effect, let us consider the extreme case where two ⊥-nodes in a graph have either exactly the
same neighborhood, or no common neighbors. Then all links are ⊥-internal, and the graph does not con-
tain any internal pair. This example suggests that the number of internal pairs is probably anti-correlated
to the number of internal links.
In general, there is a correlation between the fact that the number of internal links is underestimated
in random graphs and the fact that the number of internal pairs is overestimated, but this correlation does
not hold in all cases. Moreover, there is no direct link between these observations and the sizes or average
degrees of the considered graphs.
Finally, we observe a specific behavior for the two graphs which correspond to tagging databases, i.e.
Delicious-tags and Flickr-tags. For these graphs we observe the lowest gaps between the real and random
cases for ⊥-internal links and the amounts of ⊥-internal pairs are very close in the real and random
cases. Conversely, they are the only graphs for which the amount of ⊤-internal pairs is underestimated
in random graphs.
Since we can observe a wide range of behaviors both for ⊤- and ⊥- internal links and pairs, we will
restrict our analysis in the following to ⊥- internal links and pairs for the sake of brevity. We will see
that this allows enlightening observations.
4.2 Distribution of internal links among nodes
The notion of internal links partitions the links of each node into two sets: the internal ones and the
others. We now study how the fraction of internal links is distributed among nodes. On Figure 4, we
plot the complementary cumulative distribution of the fraction of internal links per node for the datasets
under study. We also plot the complementary cumulative distribution for random graphs.
Imdb-movies:
Delicious-tags:
Flickr-tags:
Flickr-comments:
100
10-1
10-2
10-3
10-4
10-5
10-6
10-3
random
real
10-2
10-1
100
10-1
10-2
10-3
10-4
10-5
10-3
random
real
10-2
10-1
100
100
10-1
10-2
10-3
10-4
10-5
10-6
10-3
random
real
10-2
10-1
100
100
10-1
10-2
10-3
10-4
10-5
10-6
10-3
random
real
10-2
10-1
100
Flickr-groups:
Flickr-favorites:
P2P-files:
PRL-papers:
100
10-1
10-2
10-3
10-4
10-5
10-3
random
real
10-2
10-1
100
100
10-1
10-2
10-3
10-4
10-5
10-6
10-3
random
real
10-2
10-1
100
100
10-1
10-2
10-3
10-4
10-5
10-3
random
real
10-2
10-1
100
100
10-1
10-2
10-3
10-4
10-5
10-2
random
real
10-1
100
Figure 4: Complementary cumulative distribution of the fraction of internal links per node.
One of the most noticeable differences between both curves lies in the probability of having a node
5
whose links are all internal (x = 1): this fraction is indeed much higher in real than in random graphs.
We also observe that real graphs exhibit fewer nodes with very low (or null) fractions of internal links
(though the fraction of nodes with no internal link is high in both cases). In this respect too, the datasets
behave differently: for Imdb-movies the probability of having a 10−2 fraction of internal links is more
than one order of magnitude larger in the random than in the real graph, while Flickr-tags curves are
close to be superimposed at low fractions. Notice that this is not directly related to the fact that the
number of internal links is underestimated or not in random graphs: for Delicious-tags the ratio between
the number of ⊥-internal links in the real and in the random case is smaller than for Flickr-tags, but the
difference between the distributions of the fraction of internal links per node are larger for Delicious-tags
than for Flickr-tags.
Finally, the very low fractions that we observe are associated to nodes with high degree: to have a
10−4 fraction of internal links, a node has to have a degree of at least 104. Therefore, we study in the
following the correlation between the degree of a node and its number of internal links.
4.3 Correlation of internal links with node degrees
As stated before, the number of (⊥-)internal links of a node is called its (⊥-)internal degree, its total
number of links being its degree. We investigate in this section the relationship between both quantities,
plotting on Figure 5 the average degree of a node in regards its (⊥-)internal degree for the real datasets
and the randomized ones.
Imdb-movies:
Delicious-tags:
Flickr-tags:
Flickr-comments:
103
102
101
100
100
106
105
104
103
102
101
102
100
100
random
real
slope=0.48
101
random
real
slope=0.75
slope=0.74
101
102
103
104
105
105
104
103
102
101
100
100
101
105
104
103
102
101
104
100
100
random
real
slope=0.70
slope=0.73
103
102
random
real
slope=0.86
slope=0.66
101
102
103
104
105
Flickr-groups:
Flickr-favorites:
P2P-files:
PRL-papers:
105
104
103
102
101
100
100
random
real
slope=0.69
slope=0.64
101
102
103
104
105
105
104
103
102
101
100
100
random
real
slope=0.75
slope=0.67
101
102
103
104
105
105
104
103
102
101
100
100
101
random
real
slope=0.63
103
102
104
103
102
101
104
100
100
101
random
real
slope=0.93
slope=0.78
102
103
Figure 5: Average degree as a function of the internal degree (for users projection).
We observe that both real and random curves in several cases can be approximated by a sub-linear
law on several decades. However, this model is unsatisfactory on P2P-files database, and questionable
on cases where the values are too rare or too scattered: most noticeably Imdb-movies and Flickr-groups.
The dispersion observed at large degrees is a consequence of the heterogeneous degree distribution, the
number of nodes with high degree being low.
If the fact that a given link is internal or not was independent from the node's degree, these curves
would be linear. As random graphs have a sublinear behavior, that means that nodes with large degrees
have on average a higher fraction of internal links. This effect can be explained qualitatively: increasing
the degree of a node u - everything being otherwise unchanged - implies increasing the probability that
one of his neighbors v is such that N(v) \ {u} ⊆ N(N(u) \ {v}).
6
On the other hand, the slope for real graphs is in most cases larger than for the random ones - again
tagging datasets exhibit a different behavior. So there is an additional effect leading high degree nodes
to have not as high an internal degree as expected by considering only the degree distributions. This is
consistent with previous observations: the real case provides more internal links and fewer nodes with a
low (but not null) fraction of such links, which must be high degree nodes. This stems from the fact that
if nodes u and v are neighbors, the probability that N(v) \ {u} ⊆ N(N(u) \ {v}) is all the more important
if v has a small degree and u a large one. Therefore we expect that degree-correlated graphs yield larger
slopes than degree-anticorrelated ones. Yet, a more quantitative understanding of these phenomena calls
for a study of the degree correlations in real-world graphs.
5 Removing internal links
When modeling complex networks using bipartite graphs [Newman et al. 2001, Guillaume et al. 2004],
the presence of internal links may be a problem as they are poorly captured by models. To this re-
gard, removing internal links before generating a random bipartite graph may lead to better models.
Moreover, internal links are precisely these links in a bipartite graph which may be removed without
changing the projection. As the bipartite graph may be seen as a compact encoding of its projection
[Latapy et al. 2008], one then obtains an even more compressed encoding. Considering the example of
the P2P-files dataset, it demands 30 MB if stored as a usual 2-mode table of lists, while the corresponding
⊥-projection (i.e. users) demands 213 MB and the ⊤-projection: 4.6 GB if stored as table of edges.
However, removing internal links is not trivial, as removing one specific link (u,v) may change the
nature of other links: while they were internal in the initial graph, they may not be internal anymore after
the removal of (u,v). See Figure 6 for an example. Therefore, in order to obtain a bipartite graph with
no internal link but still the same projection (and so a minimal graph to this regard), it is not possible in
general to delete all initial internal links since this would alter dramatically the structure of the projection.
The set of internal links must therefore be updated after each removal. Going further, there may exist
removal strategies which maximize the number of removals, whereas other may minimize it.
i
j
k
l
i
j
k
l
A
B
C
D
A
B
C
D
G
G′ = G − (A,i)
C
B
A
D
G′
⊥ = G⊥
Figure 6: Influence of the deletion process on internal links. {(A,i), (B, j), (C,k), (D,l)} are ⊥-internal
links of G, yet deleting (A,i) leads to G′ where {(B, j), (C,k), (D,l)} are no longer ⊥-internal links, as
they are the only links in G′ ensuring that A is connected to respectively B, C and D in G⊥.
To explore these questions, let us consider a random removal process, where each step consists in
choosing an internal link at random and removing it, and we iterate such steps until no internal link
remains. Figure 7 presents the number of remaining internal links as a function of the number of internal
link removed for typical cases. We also plot the upper bound EI − x (where x denotes the number of link
removals), which represents the hypothetical case where all links initially internal remain internal during
the whole process.
This random deletion process leads to a pruned bipartite graph, containing the information of the 1-
mode graph. Going back to the example of the P2P dataset, the obtained 2-mode storage graph demands
12 MB for the related ⊥-projection and 22 MB for the ⊤ one, thus enabling a compression to 0.40 (resp.
0.73) when compared to the standard 30 MB bipartite representation of the graph -- which is itself a
7
Imdb-movies:
P2P-files:
⊥-internal links:
⊤-internal links:
⊥-internal links:
⊤-internal links:
5.104
4.104
3.104
2.104
104
4.104
3.104
2.104
104
6.105
4.105
2.105
0
0
104
2.104
3.104
4.104
5.104
0
0
104
2.104
3.104
4.104
0
0
2.105
4.105
6.105
16.105
14.105
12.105
10.105
8.105
6.105
4.105
2.105
0
0
4.105
8.105
12.105
16.105
Figure 7: Number of internal links remaining as a function of the number of deletions. Red thick line:
random deletion process, blue thin line: theoretical upper bound.
compact encoding of the projections.
To go further, one may seek strategies that remove as many internal links as possible, for instance
using a greedy algorithm selecting at each step the internal link leading to the lowest decrease of the
number of remaining internal links. This is however out of the scope of this paper.
6 Conclusion
We introduced the notion of internal links and pairs in bipartite graphs, and proposed it as an important
notion for analyzing real-world 2-mode complex networks. Using a wide set of real-world examples, we
observed that internal links are very frequent in practice, and that associated statistics are fruitful mea-
sures to point out similarities and differences among real-world networks. This makes them a relevant
tool for analysis of bipartite graphs, which is an important research topic. Moreover, removing internal
links may be used to compact bipartite encodings of graphs and to improve their modeling.
We provided a first step towards the use and understanding of internal links and pairs. Further
investigations could bring us more precise information about the role of internal links, in particular
regarding the dynamics. We suspect for instance that internal pairs may become internal links with high
probability in future evolution of the graph. One may also study these links (and pairs) which are both
⊥- and ⊤-internal, as they may have a special importance in a graph.
Acknowledgements
This work is supported in part by the French ANR MAPE project.
References
[Aidouni et al. 2009] F. Aidouni, M. Latapy and C. Magnien: Ten weeks in the life of an eDonkey
server. Proceedings of the Sixth International Workshop on Hot Topics in Peer-to-Peer Sys-
tems (2009).
[Barab´asi et al. 1999] A.L. Barab´asi and R. Albert: Emergence of scaling in random networks. Science,
286 (1999), p 509.
[Gorlitz et al. 2008] O. Gorlitz, S. Sizov and S. Staab: PINTS: Peer-to-Peer Infrastructure for Tagging
Systems. Proceedings of the Seventh International Workshop on Peer-to-Peer Systems (2008).
8
[Guillaume et al. 2004] J.L. Guillaume and M. Latapy: Bipartite structure of all complex networks. In-
formation Processing Letters, 90 (2004), pp 215 -- 221.
[Latapy et al. 2008] M. Latapy, C. Magnien and N. Del Vecchio: Basic notions for the analysis of large
two-mode networks. Social Networks, 30 (2008), pp 31 -- 48.
[Lind et al. 2005] P.G. Lind, M.C. Gonzalez and H.J. Herrmann: Cycles and clustering in bipartite net-
works. Physical Review E, 72 (2005).
[Newman et al. 2003] M.E.J. Newman and J. Park: Why social networks are different from other types
of networks. Physical Review E, 68 (2003).
[Newman et al. 2001] M.E.J. Newman, S.H. Strogatz and D.J. Watts: Random graphs with arbitrary
degree distributions and their applications. Physical Review E, 64 (2001).
[Prieur et al. 2008] C. Prieur, D. Cardon, J.S. Beuscart, N. Pissard and P. Pons: The stength of weak
cooperation: a case study on Flickr. Computing Research Repository (2008).
[Zweig et al. 2011] K. Zweig and M. Kaufmann: A systematic approach to the one-mode projection of
bipartite graphs. Social Network Analysis and Mining (2011), pp 1 -- 32.
9
|
1709.05584 | 3 | 1709 | 2018-04-10T15:26:32 | Representation Learning on Graphs: Methods and Applications | [
"cs.SI",
"cs.LG"
] | Machine learning on graphs is an important and ubiquitous task with applications ranging from drug design to friendship recommendation in social networks. The primary challenge in this domain is finding a way to represent, or encode, graph structure so that it can be easily exploited by machine learning models. Traditionally, machine learning approaches relied on user-defined heuristics to extract features encoding structural information about a graph (e.g., degree statistics or kernel functions). However, recent years have seen a surge in approaches that automatically learn to encode graph structure into low-dimensional embeddings, using techniques based on deep learning and nonlinear dimensionality reduction. Here we provide a conceptual review of key advancements in this area of representation learning on graphs, including matrix factorization-based methods, random-walk based algorithms, and graph neural networks. We review methods to embed individual nodes as well as approaches to embed entire (sub)graphs. In doing so, we develop a unified framework to describe these recent approaches, and we highlight a number of important applications and directions for future work. | cs.SI | cs |
Representation Learning on Graphs: Methods and Applications
William L. Hamilton
[email protected]
Rex Ying
[email protected]
Jure Leskovec
[email protected]
Department of Computer Science
Stanford University
Stanford, CA, 94305
Abstract
Machine learning on graphs is an important and ubiquitous task with applications ranging from drug
design to friendship recommendation in social networks. The primary challenge in this domain is finding
a way to represent, or encode, graph structure so that it can be easily exploited by machine learning
models. Traditionally, machine learning approaches relied on user-defined heuristics to extract features
encoding structural information about a graph (e.g., degree statistics or kernel functions). However,
recent years have seen a surge in approaches that automatically learn to encode graph structure into
low-dimensional embeddings, using techniques based on deep learning and nonlinear dimensionality
reduction. Here we provide a conceptual review of key advancements in this area of representation
learning on graphs, including matrix factorization-based methods, random-walk based algorithms, and
graph neural networks. We review methods to embed individual nodes as well as approaches to embed
entire (sub)graphs. In doing so, we develop a unified framework to describe these recent approaches,
and we highlight a number of important applications and directions for future work.
1 Introduction
Graphs are a ubiquitous data structure, employed extensively within computer science and related fields. Social
networks, molecular graph structures, biological protein-protein networks, recommender systems-all of these
domains and many more can be readily modeled as graphs, which capture interactions (i.e., edges) between
individual units (i.e., nodes). As a consequence of their ubiquity, graphs are the backbone of countless systems,
allowing relational knowledge about interacting entities to be efficiently stored and accessed [2].
However, graphs are not only useful as structured knowledge repositories: they also play a key role in modern
machine learning. Many machine learning applications seek to make predictions or discover new patterns using
graph-structured data as feature information. For example, one might wish to classify the role of a protein in a
biological interaction graph, predict the role of a person in a collaboration network, recommend new friends to
a user in a social network, or predict new therapeutic applications of existing drug molecules, whose structure
can be represented as a graph.
Copyright 2017 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for
advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any
copyrighted component of this work in other works must be obtained from the IEEE.
Bulletin of the IEEE Computer Society Technical Committee on Data Engineering
1
Figure 1: Two different views of a character-character interaction graph derived from the Les Mis´erables novel, where two
nodes are connected if the corresponding characters interact. The coloring in the left figure emphasizes differences in the
nodes' global positions in the graph: nodes have the same color if they belong to the same community, at a global level.
In contrast, the coloring in the right figure denotes structural equivalence between nodes, or the fact that two nodes play
similar roles in their local neighborhoods (e.g., "bridging nodes" are colored blue). The colorings for both figures were
generated using different settings of the node2vec node embedding method [28], described in Section 2. Reprinted from
[28] with permission.1
The central problem in machine learning on graphs is finding a way to incorporate information about graph-
structure into a machine learning model. For example, in the case of link prediction in a social network, one
might want to encode pairwise properties between nodes, such as relationship strength or the number of common
friends. Or in the case of node classification, one might want to include information about the global position
of a node in the graph or the structure of the node's local graph neighborhood (Figure 1). The challenge-
from a machine learning perspective-is that there is no straightforward way to encode this high-dimensional,
non-Euclidean information about graph structure into a feature vector.
To extract structural information from graphs, traditional machine approaches often rely on summary graph
statistics (e.g., degrees or clustering coefficients) [6], kernel functions [58], or carefully engineered features
to measure local neighborhood structures [40]. However, these approaches are limited because these hand-
engineered features are inflexible-i.e., they cannot adapt during the learning process-and designing these
features can be a time-consuming and expensive process.
More recently, there has been a surge of approaches that seek to learn representations that encode structural
information about the graph. The idea behind these representation learning approaches is to learn a mapping that
embeds nodes, or entire (sub)graphs, as points in a low-dimensional vector space Rd. The goal is to optimize this
mapping so that geometric relationships in the embedding space reflect the structure of the original graph. After
optimizing the embedding space, the learned embeddings can be used as feature inputs for downstream machine
learning tasks. The key distinction between representation learning approaches and previous work is how they
treat the problem of representing graph structure. Previous work treated this problem as a pre-processing step,
using hand-engineered statistics to extract structural information. In contrast, representation learning approaches
treat this problem as machine learning task itself, using a data-driven approach to learn embeddings that encode
graph structure.
Here we provide an overview of recent advancements in representation learning on graphs, reviewing tech-
niques for representing both nodes and entire subgraphs. Our survey attempts to merge together multiple, dis-
1For this and all subsequent reprinted figures, the original authors retain their copyrights, and permission was obtained from the
corresponding author.
2
Community structureStructural equivalence / rolesFigure 2: A, Graph structure of the Zachary Karate Club social network, where nodes are connected if the corresponding
individuals are friends. The nodes are colored according to the different communities that exist in the network. B, Two-
dimensional visualization of node embeddings generated from this graph using the DeepWalk method (Section 2.2.2) [47].
The distances between nodes in the embedding space reflect similarity in the original graph, and the node embeddings are
spatially clustered according to the different color-coded communities. Reprinted with permission from [47, 49].
parate lines of research that have drawn significant attention across different subfields and venues in recent
years-e.g., node embedding methods, which are a popular object of study in the data mining community, and
graph convolutional networks, which have drawn considerable attention in major machine learning venues. In
doing so, we develop a unified conceptual framework for describing the various approaches and emphasize
major conceptual distinctions.
We focus our review on recent approaches that have garnered significant attention in the machine learning
and data mining communities, especially methods that are scalable to massive graphs (e.g., millions of nodes)
and inspired by advancements in deep learning. Of course, there are other lines of closely related and relevant
work, which we do not review in detail here-including latent space models of social networks [33], embedding
methods for statistical relational learning [43], manifold learning algorithms [38], and geometric deep learning
[7]-all of which involve representation learning with graph-structured data. We refer the reader to [33], [43],
[38], and [7] for comprehensive overviews of these areas.
1.1 Notation and essential assumptions
We will assume that the primary input to our representation learning algorithm is an undirected graph G = (V,E)
with associated binary adjacency matrix A.2 We also assume that the methods can make use of a real-valued
matrix of node attributes X ∈ Rm×V (e.g., representing text or metadata associated with nodes). The goal is to
use the information contained in A and X to map each node, or a subgraph, to a vector z ∈ Rd, where d << V.
Most of the methods we review will optimize this mapping in an unsupervised manner, making use of only
information in A and X, without knowledge of a particular downstream machine learning task. However, we will
also discuss some approaches for supervised representation learning, where the models make use of classification
or regression labels in order to optimize the embeddings. These classification labels may be associated with
individual nodes or entire subgraphs and are the prediction targets for downstream machine learning tasks (e.g.,
they might label protein roles, or the therapeutic properties of a molecule, based on its graph representation).
2Most of the methods we review are easily generalized to work with weighted or directed graphs, and we will explicitly describe how
to generalize certain methods to the multi-modal setting (i.e., differing node and edge types).
3
ABFigure 3: Overview of the encoder-decoder approach. First the encoder maps the node, vi, to a low-dimensional vector
embedding, zi, based on the node's position in the graph, its local neighborhood structure, and/or its attributes. Next, the
decoder extracts user-specified information from the low-dimensional embedding; this might be information about vi's
local graph neighborhood (e.g., the identity of its neighbors) or a classification label associated with vi (e.g., a community
label). By jointly optimizing the encoder and decoder, the system learns to compress information about graph structure
into the low-dimensional embedding space.
2 Embedding nodes
We begin with a discussion of methods for node embedding, where the goal is to encode nodes as low-dimensional
vectors that summarize their graph position and the structure of their local graph neighborhood. These low-
dimensional embeddings can be viewed as encoding, or projecting, nodes into a latent space, where geometric
relations in this latent space correspond to interactions (e.g., edges) in the original graph [33]. Figure 2 visualizes
an example embedding of the famous Zachary Karate Club social network [47], where two dimensional node
embeddings capture the community structure implicit in the social network.
2.1 Overview of approaches: An encoder-decoder perspective
Recent years have seen a surge of research on node embeddings, leading to a complicated diversity of notations,
motivations, and conceptual models. Thus, before discussing the various techniques, we first develop a uni-
fied encoder-decoder framework, which explicitly structures this methodological diversity and puts the various
methods on equal notational and conceptual footing.
In this framework, we organize the various methods around two key mapping functions: an encoder, which
maps each node to a low-dimensional vector, or embedding, and a decoder, which decodes structural information
about the graph from the learned embeddings (Figure 3). The intuition behind the encoder-decoder idea is the
following: if we can learn to decode high-dimensional graph information-such as the global positions of nodes
in the graph or the structure of local graph neighborhoods-from encoded low-dimensional embeddings, then,
in principle, these embeddings should contain all information necessary for downstream machine learning tasks.
Formally, the encoder is a function,
(1)
that maps nodes to vector embeddings zi ∈ Rd (where zi corresponds to the embedding for node vi ∈ V). The
decoder is a function that accepts a set of node embeddings and decodes user-specified graph statistics from
these embeddings. For example, the decoder might predict the existence of edges between nodes, given their
embeddings [1, 36], or it might predict the community that a node belongs to in the graph [29, 35] (Figure 3).
In principle, many decoders are possible; however, the vast majority of works use a basic pairwise decoder,
ENC : V → Rd,
DEC : Rd × Rd → R+,
4
(2)
that maps pairs of node embeddings to a real-valued node similarity measure, which quantifies the similarity of
the two nodes in the original graph.
When we apply the pairwise decoder to a pair of embeddings (zi,zj) we get a reconstruction of the similarity
between vi and vj in the original graph, and the goal is optimize the encoder and decoder mappings to minimize
the error, or loss, in this reconstruction so that:
DEC(ENC(vi), ENC(vj)) = DEC(zi, zj) ≈ sG(vi, vj),
(3)
where sG is a user-defined, graph-based similarity measure between nodes, defined over the graph G. In other
words, we want to optimize our encoder-decoder model so that we can decode pairwise node similarities in the
original graph sG(vi, vj) from the low-dimensional node embeddings zi and zj. For example, one might set
sG(vi, vj) (cid:44) Ai,j and define nodes to have a similarity of 1 if they are adjacent and 0 otherwise [1], or one
might define sG according to the probability of vi and vj co-occurring on a fixed-length random walk over the
graph G [28, 47]. In practice, most approaches realize the reconstruction objective (Equation 3) by minimizing
an empirical loss L over a set of training node pairs D:
(cid:96) (DEC(zi, zj), sG(vi, vj)) ,
(4)
(cid:88)
L =
(vi,vj )∈D
where (cid:96) : R × R → R is a user-specified loss function, which measures the discrepancy between the decoded
(i.e., estimated) similarity values DEC(zi, zj) and the true values sG(vi, vj).
Once we have optimized the encoder-decoder system, we can use the trained encoder to generate embeddings
for nodes, which can then be used as a feature inputs for downstream machine learning tasks. For example, one
could feed the learned embeddings to a logistic regression classifier to predict the community that a node belongs
to [47], or one could use distances between the embeddings to recommend friendship links in a social network
[3, 28] (Section 2.7 discusses further applications).
Adopting this encoder-decoder view, we organize our discussion of the various node embedding methods
along the following four methodological components:
1. A pairwise similarity function sG : V × V → R+, defined over the graph G. This function measures the
similarity between nodes in G.
2. An encoder function, ENC, that generates the node embeddings. This function contains a number of
trainable parameters that are optimized during the training phase.
3. A decoder function, DEC, which reconstructs pairwise similarity values from the generated embeddings.
This function usually contains no trainable parameters.
4. A loss function, (cid:96), which determines how the quality of the pairwise reconstructions is evaluated in order
to train the model, i.e., how DEC(zi, zj) is compared to the true sG(vi, vj) values.
As we will show, the primary methodological distinctions between the various node embedding approaches are
in how they define these four components.
2.1.1 Notes on optimization and implementation details
All of the methods we review involve optimizing the parameters of the encoder algorithm, ΘENC, by minimizing
a loss analogous to Equation (4).3 In most cases, stochastic gradient descent is used for optimization, though
some algorithms do permit closed-form solutions via matrix decomposition (e.g., [9]). However, note that we
will not focus on optimization algorithms here and instead will emphasize high-level differences that exist across
different embedding methods, independent of the specifics of the optimization approach.
3Occasionally, different methods will add additional auxiliary objectives or regularizers beyond the standard encoder-decoder objec-
tive, but we will often omit these details for brevity. A few methods also optimize parameters in the decoder, ΘDEC.
5
Table 1: A summary of some well-known shallow embedding embedding algorithms. Note that the decoders and similarity
functions for the random-walk based methods are asymmetric, with the similarity function pG(vjvi) corresponding to the
probability of visiting vj on a fixed-length random walk starting from vi.
Type
Method
Matrix
factorization
Random walk
Laplacian Eigenmaps [4]
Graph Factorization [1]
GraRep [9]
HOPE [45]
DeepWalk [47]
node2vec [28]
Decoder
(cid:107)zi − zj(cid:107)2
2
z(cid:62)
i zj
z(cid:62)
i zj
z(cid:62)
i zj
(cid:80)
ez(cid:62)
i zj
k∈V ez(cid:62)
(cid:80)
ez(cid:62)
i zj
k∈V ez(cid:62)
i
i
zk
zk
Similarity measure
Loss function ((cid:96))
Ai,j, A2
general
general
Ai,j
i,j, ..., Ak
i,j
DEC(zi, zj) · sG(vi, vj)
(cid:107)DEC(zi, zj) − sG(vi, vj)(cid:107)2
(cid:107)DEC(zi, zj) − sG(vi, vj)(cid:107)2
(cid:107)DEC(zi, zj) − sG(vi, vj)(cid:107)2
−sG(vi, vj) log(DEC(zi, zj))
pG(vjvi) (biased) −sG(vi, vj) log(DEC(zi, zj))
pG(vjvi)
2
2
2
2.2 Shallow embedding approaches
The majority of node embedding algorithms rely on what we call shallow embedding. For these shallow em-
bedding approaches, the encoder function-which maps nodes to vector embeddings-is simply an "embedding
lookup":
ENC(vi) = Zvi,
(5)
where Z ∈ Rd×V is a matrix containing the embedding vectors for all nodes and vi ∈ IV is a one-hot indi-
cator vector indicating the column of Z corresponding to node vi. The set of trainable parameters for shallow
embedding methods is simply ΘENC = {Z}, i.e., the embedding matrix Z is optimized directly.
These approaches are largely inspired by classic matrix factorization techniques for dimensionality reduc-
tion [4] and multi-dimensional scaling [37]. Indeed, many of these approaches were originally motivated as
factorization algorithms, and we reinterpret them within the encoder-decoder framework here. Table 1 summa-
rizes some well-known shallow embedding methods within the encoder-decoder framework. Table 1 highlights
how these methods can be succinctly described according to (i) their decoder function, (ii) their graph-based
similarity measure, and (iii) their loss function. The following two sections describe these methods in more de-
tail, distinguishing between matrix factorization-based approaches (Section 2.2.1) and more recent approaches
based on random walks (Section 2.2.2).
2.2.1 Factorization-based approaches
Early methods for learning representations for nodes largely focused on matrix-factorization approaches, which
are directly inspired by classic techniques for dimensionality reduction [4, 37].
Laplacian eigenmaps. One of the earliest, and most well-known instances, is the Laplacian eigenmaps (LE)
technique [4], which we can view within the encoder-decoder framework as a shallow embedding approach in
which the decoder is defined as
and where the loss function weights pairs of nodes according to their similarity in the graph:
Inner-product methods. Following on the Laplacian eigenmaps technique, there are a large number of recent
embedding methodologies based on a pairwise, inner-product decoder:
DEC(zi, zj) = (cid:107)zi − zj(cid:107)2
(cid:88)
2
L =
(vi,vj )∈D
DEC(zi, zj) · sG(vi, vj).
(cid:62)
i zj,
DEC(zi, zj) = z
6
(6)
(7)
Figure 4: The random-walk based methods sample a large number of fixed-length random walks starting from each node,
vi. The embedding vectors are then optimized so that the dot-product, or angle, between two embeddings, zi and zj, is
(roughly) proportional to the probability of visiting vj on a fixed-length random walk starting from vi.
where the strength of the relationship between two nodes is proportional to the dot product of their embeddings.
The Graph Factorization (GF) algorithm4 [1], GraRep [9], and HOPE [45] all fall firmly within this class. In
particular, all three of these methods use an inner-product decoder, a mean-squared-error (MSE) loss,
(cid:88)
(vi,vj )∈D (cid:107)DEC(zi, zj) − sG(vi, vj)(cid:107)2
2,
L =
(8)
and they differ primarily in the node similarity measure used, i.e. how they define sG(vi, vj). The Graph
Factorization algorithm defines node similarity directly based on the adjacency matrix (i.e., sG(vi, vj) (cid:44) Ai,j)
[1]; GraRep considers various powers of the adjacency matrix (e.g., sG(vi, vj) (cid:44) A2
i,j) in order to capture
higher-order node similarity [9]; and the HOPE algorithm supports general similarity measures (e.g., based on
Jaccard neighborhood overlaps) [45]. These various different similarity functions trade-off between modeling
"first-order similarity", where sG directly measures connections between nodes (i.e., sG(vi, vj) (cid:44) Ai,j [1]) and
modeling "higher-order similarity", where sG corresponds to more general notions of neighborhood overlap
(e.g., sG(vi, vj) = A2
i,j [9]).
We refer to these methods in this section as matrix-factorization approaches because, averaging over all
nodes, they optimize loss functions (roughly) of the form:
(9)
where S is a matrix containing pairwise similarity measures (i.e., Si,j (cid:44) sG(vi, vj)) and Z is the matrix of
node embeddings. Intuitively, the goal of these methods is simply to learn embeddings for each node such that
the inner product between the learned embedding vectors approximates some deterministic measure of node
similarity.
L ≈ (cid:107)Z
Z − S(cid:107)2
2,
(cid:62)
2.2.2 Random walk approaches
Many recent successful methods that also belong to the class of shallow embedding approaches learn the node
embeddings based on random walk statistics. Their key innovation is optimizing the node embeddings so that
nodes have similar embeddings if they tend to co-occur on short random walks over the graph (Figure 4). Thus,
instead of using a deterministic measure of node similarity, like the methods of Section 2.2.1, these random walk
methods employ a flexible, stochastic measure of node similarity, which has led to superior performance in a
number of settings [27].
4Of course, Ahmed et al. [1] were not the first researchers to propose factorizing an adjacency matrix, but they were the first to
present a scalable O(E) algorithm for the purpose of generating node embeddings.
7
1. Run random walks to obtain co-occurrence statistics.2. Optimize embeddings based on co-occurrence statistics.✓zizj/pG(vjvi)pG(vjvi)vivjDEC(zi, zj) (cid:44)
(cid:80)
ez(cid:62)
i zj
vk∈V ez(cid:62)
≈ pG,T (vjvi),
i zk
(cid:88)
(vi,vj )∈D − log(DEC(zi, zj)),
L =
(10)
(11)
Figure 5: A, Illustration of how node2vec biases the random walk using the p and q parameters. Assuming that the walk
just transitioned from vs to v∗, the edge labels, α, are proportional to the probability of the walk taking that edge at next
time-step. B, Difference between random-walks that are based on breadth-first search (BFS) and depth-first search (DFS).
BFS-like random walks are mainly limited to exploring a node's immediate (i.e., one-hop) neighborhood and are generally
more effective for capturing structural roles. DFS-like walks explore further away from the node and are more effective for
capturing community structures. Adapted from [28].
DeepWalk and node2vec. Like the matrix factorization approaches described above, DeepWalk and node2vec
rely on shallow embedding and use a decoder based on the inner product. However, instead of trying to decode a
deterministic node similarity measure, these approaches optimize embeddings to encode the statistics of random
walks. The basic idea behind these approaches is to learn embeddings so that (roughly):
where pG,T (vjvi) is the probability of visiting vj on a length-T random walk starting at vi, with T usually
defined to be in the range T ∈ {2, ..., 10}. Note that unlike the similarity measures in Section 2.2.1, pG,T (vjvi)
is both stochastic and asymmetric.
More formally, these approaches attempt to minimize the following cross-entropy loss:
where the training set D is generated by sampling random walks starting from each node (i.e., where N pairs
for each node vi are sampled from the distribution (vi, vj) ∼ pG,T (vjvj)). However, naively evaluating the
loss in Equation (11) is prohibitively expensive-in particular, O(DV)-since evaluating the denominator
of Equation (10) has time complexity O(V). Thus, DeepWalk and node2vec use different optimizations and
approximations to compute the loss in Equation (11). DeepWalk employs a "hierarchical softmax" technique
to compute the normalizing factor, using a binary-tree structure to accelerate the computation [47]. In contrast,
node2vec approximates Equation (11) using "negative sampling": instead of normalizing over the full vertex
set, node2vec approximates the normalizing factor using a set of random "negative samples" [28].
Beyond these algorithmic differences, the key distinction between node2vec and DeepWalk is that node2vec
allows for a flexible definition of random walks, whereas DeepWalk uses simple unbiased random walks over
the graph. In particular, node2vec introduces two random walk hyperparameters, p and q, that bias the random
walk (Figure 5.A). The hyperparameter p controls the likelihood of the walk immediately revisiting a node,
while q controls the likelihood of the walk revisiting a node's one-hop neighborhood. By introducing these
hyperparameters, node2vec is able to smoothly interpolate between walks that are more akin to breadth-first
or depth-first search (Figure 5.B). Grover et al. found that tuning these parameters allowed the model to trade
8
ABv⇤v1v2v3v4v5v6v7v8v9v1v2v3vsv⇤off between learning embeddings that emphasize community structures or embeddings that emphasize local
structural roles [28] (see also Figure 1).
Large-scale information network embeddings (LINE). Another highly successful shallow embedding ap-
proach, which is not based random walks but is contemporaneous and often compared with DeepWalk and
node2vec, is the LINE method [54]. LINE combines two encoder-decoder objectives that optimize "first-order"
and "second-order" node similarity, respectively. The first-order objective uses a decoder based on the sigmoid
function,
1
1 + e−z(cid:62)
i zj
DEC(zi, zj) =
,
(12)
and an adjacency-based similarity measure (i.e., sG(vi, vj) = Ai,j). The second-order encoder-decoder ob-
jective is similar but considers two-hop adjacency neighborhoods and uses an encoder identical to Equation
(10). Both the first-order and second-order objectives are optimized using loss functions derived from the KL-
divergence metric [54]. Thus, LINE is conceptually related to node2vec and DeepWalk in that it uses a prob-
abilistic decoder and loss, but it explicitly factorizes first- and second-order similarities, instead of combining
them in fixed-length random walks.
HARP: Extending random-walk embeddings via graph pre-processing. Recently, Chen et al. [13] in-
troduced a "meta-strategy", called HARP, for improving various random-walk approaches via a graph pre-
processing step. In this approach, a graph coarsening procedure is used to collapse related nodes in G together
into "supernodes", and then DeepWalk, node2vec, or LINE is run on this coarsened graph. After embedding the
coarsened version of G, the learned embedding of each supernode is used as an initial value for the random walk
embeddings of the supernode's constituent nodes (in another round of optimization on a "finer-grained" version
of the graph). This general process can be repeated in a hierarchical manner at varying levels of coarseness, and
has been shown to consistently improve performance of DeepWalk, node2vec, and LINE [13].
Additional variants of the random-walk idea. There have also been a number of further extensions of the
random walk idea. For example, Perozzi et al. [48] extend the DeepWalk algorithm to learn embeddings using
random walks that "skip" or "hop" over multiple nodes at each step, resulting in a similarity measure similar
to GraRep [9], while Chamberlan et al. [11] modify the inner-product decoder of node2vec to use a hyperbolic,
rather than Euclidean, distance measure.
2.3 Generalized encoder-decoder architectures
So far all of the node embedding methods we have reviewed have been shallow embedding methods, where the
encoder is a simply an embedding lookup (Equation 5). However, these shallow embedding approaches train
unique embedding vectors for each node independently, which leads to a number of drawbacks:
1. No parameters are shared between nodes in the encoder (i.e., the encoder is simply an embedding lookup
based on arbitrary node ids). This can be statistically inefficient, since parameter sharing can act as a
powerful form of regularization, and it is also computationally inefficient, since it means that the number
of parameters in shallow embedding methods necessarily grows as O(V).
2. Shallow embedding also fails to leverage node attributes during encoding. In many large graphs nodes
have attribute information (e.g., user profiles on a social network) that is often highly informative with
respect to the node's position and role in the graph.
3. Shallow embedding methods are inherently transductive [29], i.e., they can only generate embeddings for
nodes that were present during the training phase, and they cannot generate embeddings for previously
unseen nodes unless additional rounds of optimization are performed to optimize the embeddings for
these nodes. This is highly problematic for evolving graphs, massive graphs that cannot be fully stored in
memory, or domains that require generalizing to new graphs after training.
9
Figure 6: To generate an embedding for a node, vi, the neighborhood autoencoder approaches first extract a high-
dimensional neighborhood vector si ∈ RV, which summarizes vi's similarity to all other nodes in the graph. The si
vector is then fed through a deep autoencoder to reduce its dimensionality, producing the low-dimensional zi embedding.
Recently, a number of approaches have been proposed to address some, or all, of these issues. These approaches
still fall firmly within the encoder-decoder framework outlined in Section 2.1, but they differ from the shal-
low embedding methods of Section 2.2 in that they use a more complex encoders, often based on deep neural
networks and which depend more generally on the structure and attributes of the graph.
2.3.1 Neighborhood autoencoder methods
Deep Neural Graph Representations (DNGR) [10] and Structural Deep Network Embeddings (SDNE) [59]
address the first problem outlined above: unlike the shallow embedding methods, they directly incorporate graph
structure into the encoder algorithm using deep neural networks. The basic idea behind these approaches is that
they use autoencoders-a well known approach for deep learning [31]-in order to compress information about
a node's local neighborhood (Figure 6). DNGR and SDNE also differ from the previously reviewed approaches
in that they use a unary decoder instead of a pairwise one.
In these approaches, each node, vi, is associated with a neighborhood vector, si ∈ RV, which corresponds
to vi's row in the matrix S (recall that S contains pairwise node similarities, i.e., Si,j = sG(vi, vj)). The si
vector contains vi's similarity with all other nodes in the graph and functions as a high-dimensional vector
representation of vi's neighborhood. The autoencoder objective for DNGR and SDNE is to embed nodes using
the si vectors such that the si vectors can then be reconstructed from these embeddings:
In other words, the loss for these methods takes the following form:
DEC(ENC(si)) = DEC(zi) ≈ si.
(cid:88)
vi∈V (cid:107)DEC(zi) − si(cid:107)2
2.
L =
(13)
(14)
As with the pairwise decoder, we have that the dimension of the zi embeddings is much smaller than V
(the dimension of the si vectors), so the goal is to compress the node's neighborhood information into a low-
dimensional vector. For both SDNE and DNGR, the encoder and decoder functions consist of multiple stacked
neural network layers: each layer of the encoder reduces the dimensionality of its input, and each layer of the
decoder increases the dimensionality of its input (Figure 6; see [31] for an overview of deep autoencoders).
10
……sizisivi2.Compresssitolow-dimensionalembedding,zi(usingdeepautoencoder)(si2RVcontainsvi'sproximitytoallothernodes)1.Extracthigh-dimensionalneighborhoodvectorFigure 7: Overview of encoding in the neighborhood aggregation methods. To generate an embedding for node A, the
model aggregates messages from A's local graph neighbors (i.e., B, C, and D), and in turn, the messages coming from these
neighbors are based on information aggregated from their respective neighborhoods, and so on. A "depth-2" version of this
idea is shown (i.e., information is aggregated from a two-hop neighborhood around node A), but in principle these methods
can be of an arbitrary depth. At the final "depth" or "layer" the initial messages are based on the input node attributes.
SDNE and DNGR differ in the similarity functions they use to construct the neighborhood vectors si and also
in the exact details of how the autoencoder is optimized. DNGR defines si according to the pointwise mutual
information of two nodes co-occurring on random walks, similar to DeepWalk and node2vec. SDNE simply
sets si (cid:44) Ai, i.e., equal to vi's adjacency vector. SDNE also combines the autoencoder objective (Equation 13)
with the Laplacian eigenmaps objective (Equation 6) [59].
Note that the encoder in Equation (13) depends on the input si vector, which contains information about
vi's local graph neighborhood. This dependency allows SDNE and DNGR to incorporate structural information
about a node's local neighborhood directly into the encoder as a form of regularization, which is not possible
for the shallow embedding approaches (since their encoder depends only on the node id). However, despite
this improvement, the autoencoder approaches still suffer from some serious limitations. Most prominently, the
input dimension to the autoencoder is fixed at V, which can be extremely costly and even intractable for graphs
with millions of nodes. In addition, the structure and size of the autoencoder is fixed, so SDNE and DNGR are
strictly transductive and cannot cope with evolving graphs, nor can they generalize across graphs.
2.3.2 Neighborhood aggregation and convolutional encoders
A number of recent node embedding approaches aim to solve the main limitations of the shallow embedding and
autoencoder methods by designing encoders that rely on a node's local neighborhood, but not necessarily the
entire graph. The intuition behind these approaches is that they generate embeddings for a node by aggregating
information from its local neighborhood (Figure 7).
Unlike the previously discussed methods, these neighborhood aggregation algorithms rely on node features
or attributes (denoted xi ∈ Rm) to generate embeddings. For example, a social network might have text data
(e.g., profile information), or a protein-protein interaction network might have molecular markers associated
with each node. The neighborhood aggregation methods leverage this attribute information to inform their
embeddings. In cases where attribute data is not given, these methods can use simple graph statistics as attributes
(e.g., node degrees) [29], or assign each node a one-hot indicator vector as an attribute [36, 53]. These methods
are often called convolutional because they represent a node as a function of its surrounding neighborhood, in a
manner similar to the receptive field of a center-surround convolutional kernel in computer vision [35].5
In the encoding phase, the neighborhood aggregation methods build up the representation for a node in an
iterative, or recursive, fashion (see Algorithm 1 for pseudocode). First, the node embeddings are initialized
5These methods also have theoretical connections to approximate spectral kernels on graphs [18]; see [35] for a further discussion.
11
INPUT GRAPHTARGET NODEBDEFCAAAACFBEADBCaggregateAlgorithm 1: Neighborhood-aggregation encoder algorithm. Adapted from [29].
Input
: Graph G(V,E); input features {xv,∀v ∈ V}; depth K; weight matrices {Wk,∀k ∈ [1, K]};
non-linearity σ; differentiable aggregator functions {AGGREGATEk,∀k ∈ [1, K]};
neighborhood function N : v → 2V
Output: Vector representations zv for all v ∈ V
1 h0
v ← xv,∀v ∈ V ;
2 for k = 1...K do
(cid:16)
for v ∈ V do
3
4
hkN (v) ← AGGREGATEk({hk−1
Wk · COMBINE(hk−1
hk
v ← σ
5
u
v
(cid:17)
,∀u ∈ N (v)});
, hkN (v))
end
hk
v ← NORMALIZE(hk
v),∀v ∈ V
6
7
8 end
9 zv ← hK
v ,∀v ∈ V
to be equal to the input node attributes. Then at each iteration of the encoder algorithm, nodes aggregate the
embeddings of their neighbors, using an aggregation function that operates over sets of vectors. After this ag-
gregation, every node is assigned a new embedding, equal to its aggregated neighborhood vector combined with
its previous embedding from the last iteration. Finally, this combined embedding is fed through a dense neural
network layer and the process repeats. As the process iterates, the node embeddings contain information aggre-
gated from further and further reaches of the graph. However, the dimensionality of the embeddings remains
constrained as the process iterates, so the encoder is forced to compress all the neighborhood information into a
low dimensional vector. After K iterations the process terminates and the final embedding vectors are output as
the node representations.
There are a number of recent approaches that follow the basic procedure outlined in Algorithm 1, includ-
ing graph convolutional networks (GCN) [35, 36, 53, 56], column networks [50], and the GraphSAGE algo-
rithm [29]. The trainable parameters in Algorithm 1-a set of aggregation functions and a set weight matrices
{Wk,∀k ∈ [1, K]}-specify how to aggregate information from a node's local neighborhood and, unlike the
shallow embedding approaches (Section 2.2), these parameters are shared across nodes. The same aggregation
function and weight matrices are used to generate embeddings for all nodes, and only the input node attributes
and neighborhood structure change depending on which node is being embedded. This parameter sharing in-
creases efficiency (i.e., the parameter dimensions are independent of the size of the graph), provides regular-
ization, and allows this approach to be used to generate embeddings for nodes that were not observed during
training [29].
GraphSAGE, column networks, and the various GCN approaches all follow Algorithm 1 but differ primarily
in how the aggregation (line 4) and vector combination (line 5) are performed. GraphSAGE uses concatenation
in line 5 and permits general aggregation functions; the authors experiment with using the element-wise mean, a
max-pooling neural network and LSTMs [32] as aggregators, and they found the the more complex aggregators,
especially the max-pooling neural network, gave significant gains. GCNs and column networks use a weighted
sum in line 5 and a (weighted) element-wise mean in line 4.
Column networks also add an additional "interpolation" term before line 7, setting
(15)
and hk−1N (v). This interpolation term
where α is an interpolation weight computed as a non-linear function of hk−1
allows the model to retain local information as the process iterates (i.e., as k increases and the model integrates
,
v
hk(cid:48)
v = αhk
v + (1 − α)hk−1
v
12
information from further reaches of the graph).
In principle, the GraphSAGE, column network, and GCN encoders can be combined with any of the previ-
ously discussed decoders and loss functions, and the entire system can be optimized using SGD. For example,
Hamilton et al. [29] use an identical decoder and loss as node2vec, while Kipf et al. [36] use a decoder and loss
function similar to the Graph Factorization approach.
Neighborhood aggregation encoders following Algorithm 1 have been found to provide consistent gains
compared to their shallow embedding counterparts on both node classification [29, 35] and link prediction [56,
36, 53] benchmarks. At a high level, these approaches solve the four main limitations of shallow embeddings,
noted at the beginning of Section 2.3: they incorporate graph structure into the encoder; they leverage node
attributes; their parameter dimension can be made sub-linear in V; and they can generate embeddings for
nodes that were not present during training.
Incorporating task-specific supervision
2.4
The basic encoder-decoder framework described thus far is by default unsupervised, i.e., the model is optimized,
or trained, over set of node pairs to reconstruct pairwise similarity values sG(vi, vj), which depend only on the
graph G. However, many node embedding algorithms-especially the neighborhood aggregation approaches
presented in Section 2.3.2-can also incorporate task-specific supervision [29, 35, 53, 60]. In particular, it is
common for methods incorporate supervision from node classification tasks in order to learn the embeddings.6
For simplicity, we discuss the case where nodes have an associated binary classification label, but the approach
we describe is easily extended to more complex classification settings.
Assume that we have a binary classification label, yi ∈ Z, associated with each node. To learn to map nodes
to their labels, we can feed our embedding vectors, zi, through a logistic, or sigmoid, function yi = σ(z(cid:62)
i θ),
where θ is a trainable parameter vector. We can then compute the cross-entropy loss between these predicted
class probabilities and the true labels:
(cid:88)
vi∈V
L =
yi log(σ(ENC(vi)
(cid:62)θ)) + (1 − yi) log(1 − σ(ENC(vi)
(cid:62)θ)).
(16)
The gradient computed according to Equation (16) can then be backpropagated through the encoder to optimize
its parameters. This task-specific supervision can completely replace the reconstruction loss computed using the
decoder (i.e., Equation 3) [29, 35], or it can be included along with the decoder loss [60].
2.5 Extensions to multi-modal graphs
While we have focused on simple, undirected graphs, many real-world graphs have complex multi-modal, or
multi-layer, structures (e.g., heterogeneous node and edge types), and a number of works have introduced strate-
gies to cope with this heterogeneity.
2.5.1 Dealing with different node and edge types
Many graphs contain different types of nodes and edges. For example, recommender system graphs consist of
two distinct layers-users and content-while many biological networks have a variety of layers, with distinct
interactions between them (e.g., diseases, genes, and drugs).
A general strategy for dealing with this issue is to (i) use different encoders for nodes of different types [12]
and (ii) extend pairwise decoders with type-specific parameters [43, 53]. For example, in graphs with varying
6The unsupervised pairwise decoder is already naturally aligned with the link prediction task.
13
Figure 8: A, Example of a 4-layer graph, where the same nodes occur in multiple different layers. This multi-layer
structure can be exploited to regularize learning at the different layers by requiring that the embeddings for the same
node in different layers are similar to each other. B, Multi-layer graphs can exhibit hierarchical structure, where non-root
layers in the hierarchy contain the union of the edges present in their child layers-e.g., a biological interaction graph
derived from the entire human brain contains the union of the interactions in the frontal and temporal lobes. This structure
can be exploited by learning embeddings at various levels of the hierarchy, and only applying the regularization between
layers that are in a parent-child relationship. C-E, Example application of multi-layer graph embedding to protein-protein
interaction graphs derived from different brain tissues; C shows the hierarchy between the different tissue regions, while D
and E visualize the protein embeddings generated at the brainstem and whole-brain layers. The embeddings were generated
using the multi-layer OhmNet method and projected to two dimensions using t-SNE. Adapted from [61].
edge types, the standard inner-product edge decoder (i.e., z(cid:62)
i zj ≈ Ai,j) can be replaced with a bilinear form
[12, 43, 53]:
(cid:62)
(17)
Aτ z,
DECτ (zi, zj) = z
where τ indexes a particular edge type and Aτ is a learned parameter specific to edges of type τ. The matrix,
Aτ , in Equation (17) can be regularized in various ways (e.g., constrained to be diagonal) [53], which can be
especially useful when there are a large number of edge types, as in the case for embedding knowledge graphs.
Indeed, the literature on knowledge-graph completion-where the goal is predict missing relations in knowledge
graphs-contains many related techniques for decoding a large number of edge types (i.e., relations) [43].7
Recently, Dong et al. [19] also proposed a strategy for sampling random walks from heterogeneous graphs,
where the random walks are restricted to only transition between particular types of nodes. This approach allows
many of the methods in Section 2.2.2 to be applied on heterogeneous graphs and is complementary to the idea
of including type-specific encoders and decoders.
14
ABCDE2.5.2 Tying node embeddings across layers
In some cases graphs have multiple "layers" that contain copies of the same nodes (Figure 8.A). For example,
in protein-protein interaction networks derived from different tissues (e.g., brain or liver tissue), some proteins
occur across multiple tissues. In these cases it can be beneficial to share information across layers, so that a
node's embedding in one layer can be informed by its embedding in other layers. Zitnik et al. [61] offer one
solution to this problem, called OhmNet, that combines node2vec with a regularization penalty that ties the
embeddings across layers. In particular, assuming that we have a node vi, which belongs to two distinct layers
G1 and G2, we can augment the standard embedding loss on this node as follows:
(cid:48)
L(vi)
G2
G1
= L(vi) + λ(cid:107)z
i − z
i (cid:107)
G1
i and z
G2
i denote vi's embeddings in the two different layers, respectively.
(18)
where L denotes the usual embedding loss for that node (e.g., from Equation 8 or 11), λ denotes the regulariza-
tion strength, and z
Zitnik et al. further extend this idea by exploiting hierarchies between graph layers (Figure 8.B). For exam-
ple, in protein-protein interaction graphs derived from various tissues, some layers correspond to interactions
throughout large regions (e.g., interactions that occur in any brain tissue) while other interaction graphs are more
fine-grained (e.g., only interactions that occur in the frontal lobe). To exploit this structure, embeddings can be
learned at the various levels of the hierarchy, and the regularization in Equation (18) can recursively applied
between layers that have a parent-child relationship in the hierarchy.
2.6 Embedding structural roles
So far, all the approaches we have reviewed optimize node embeddings so that nearby nodes in the graph have
similar embeddings. However, in many tasks it is more important to learn representations that correspond
to the structural roles of the nodes, independent of their global graph positions (e.g., in communication or
transportation networks) [30]. The node2vec approach introduced in Section 2.2.2 offers one solution to this
problem, as Grover et al. found that biasing the random walks allows their model to better capture structural roles
(Figure 5). However, more recently, Ribeiro et al. [51] and Donnat et al. [20] have developed node embedding
approaches that are specifically designed to capture structural roles.
Ribeiro et al. propose struc2vec, which involves generating a a series of weighted auxiliary graphs G
(cid:48)
k, k =
(cid:48)
{1, 2, ...} from the original graph G, where the auxiliary graph G
k captures structural similarities between nodes'
k-hop neighborhoods. In particular, letting Rk(vi) denote the ordered sequence of degrees of the nodes that are
exactly k-hops away from vi, the edge-weights, wk(vi, vj), in auxiliary graph G(cid:48)
k are recursively defined as
wk(vi, vj) = wk−1(vi, vj) + d(Rk(vi), Rk(vj)),
(19)
where w0(vi, vj) = 0 and d(Rk(vi), Rk(vj)) measures the "distance" between the ordered degree sequences
Rk(vi) and Rk(vj) (e.g., computed via dynamic time warping [51]). After computing these weighted auxillary
graphs, struc2vec runs biased random walks over them and uses these walks as input to the node2vec optimiza-
tion algorithm.
Donnat et al. take a very different approach to capturing structural roles, called GraphWave, which relies on
spectral graph wavelets and heat kernels [20]. In brief, we let L denote the graph Laplacian-i.e., L = D − A
where D contains node degrees on the diagonal and A is the adjacency matrix-and we let U and λi, i = 1...V
denote the eigenvector matrix and eigenvalues of L, respectively. Finally, we assume that we have a heat kernel,
g(λ) = e−sλ, with pre-defined scale s. Using U and g(λ), GraphWave computes a vector, ψvi, corresponding
to the structural role of node, vi ∈ V, as
(cid:62)
(20)
ψvi = UGU
vi
7We do not review this literature in detail here, and refer the reader to Nickel et al. [43] for a recent review.
15
Figure 9: A, Synthetic barbell graph used as a test dataset for detecting structural roles, where nodes are colored according
to their structural roles. In this case, the structural roles (i.e., colors) are computed by examining the degrees of each node's
immediate neighbors, and their 2-hop neighbors, and so on (up to V-hop neighborhoods). B-D, Visualization of the output
of three role-detection algorithms on the barbell graph, where the model outputs are projected using principal components
analysis. RolX (B) [30] is a baseline approach based upon hand-designed features, while struc2vec (C) and GraphWave
(D) use different representation learning approaches. Note that all methods correctly differentiate the ends of the barbells
from the rest of the graph, but only GraphWave is able to correctly differentiate all the various roles. Note also that there
are fewer visible nodes in part D compared to A because GraphWave maps identically colored (i.e., structurally equivalent)
nodes to the exact same position in the embedding space. Reprinted from [20].
where G = diag([g(λ1), ..., g(λV)]) and vi is a one-hot indicator vector corresponding to vi's row/column
in the Laplacian.8 Donnat et al. show that these ψvi vectors implicitly relate to topological quantities, such
as vi's degree and the number of k-cycles vi is involved in. They find that-with a proper choice of scale,
s-WaveGraph is able to effectively capture structural information about a nodes role in a graph (Figure 9).
2.7 Applications of node embeddings
The most common use cases for node embeddings are for visualization, clustering, node classification, and link
prediction, and each of these use cases is relevant to a number of application domains, ranging from computa-
tional social science to computational biology.
Visualization and pattern discovery. The problem of visualizing graphs in a 2D interface has a long history,
with applications throughout data mining, the social sciences, and biology [17]. Node embeddings offer a pow-
erful new paradigm for graph visualization: because nodes are mapped to real-valued vectors, researchers can
easily leverage existing, generic techniques for visualization high-dimensional datasets [57, 55]. For example,
node embeddings can be combined with well-known techniques such as t-SNE [57] or principal components
analysis (PCA) in order to generate 2D visualizations of graphs [47, 54], which can be useful for discovering
communities and other hidden structures (Figures 2 and 8).
Clustering and community detection. In a similar vein as visualization, node embeddings are a powerful tool
for clustering related nodes, a task that has countless applications from computational biology (e.g., discovering
related drugs) to marketing (e.g., discovering related products) [23]. Again, because each node is associated with
real-valued vector embedding, it is possible to apply any generic clustering algorithm to the set of learned node
embeddings (e.g., k-means or DB-scan [22]). This offers an open-ended and powerful alternative to traditional
community detection techniques, and it also opens up new methodological opportunities, since node embeddings
can capture the functional or structural roles played by different nodes, rather than just community structure.
Node classification and semi-supervised learning. Node classification is perhaps the most common bench-
mark task used for evaluating node embeddings. In most cases, the node classification task is a form of semi-
supervised learning, where labels are only available for a small proportion of nodes, with the goal being to
label the full graph based only on this small initial seed set. Common applications of semi-supervised node
classification include classifying proteins according to their biological function [28] and classifying documents,
8Note that Equation (20) can be efficiently approximated via Chebyshev polynomials [20].
16
ABCDRolXStruc2vecGraphWavevideos, web pages, or individuals into different categories/communities [28, 35, 47, 54]. Recently, Hamilton et
al. [29] introduced the task of inductive node classification, where the goal is to classify nodes that were not
seen during training, e.g. classifying new documents in evolving information graphs or generalizing to unseen
protein-protein interaction networks.
Link prediction. Node embeddings are also extremely useful as features for link prediction, where the goal
is to predict missing edges, or edges that are likely to form in the future [3]. Link prediction is at the core of
recommender systems and common applications of node embeddings reflect this deep connection, including
predicting missing friendship links in social networks [54] and affinities between users and movies [56]. Link
prediction also has important applications in computational biology. Many biological interaction graphs (e.g.,
between proteins and other proteins, or drugs and diseases) are incomplete, since they rely on data obtained
from costly lab experiments. Predicting links in these noisy graphs is an important method for automatically
expanding biological datasets and for recommending new directions for wet-lab experimentation [41]. More
generally, link prediction is closely related to statistical relational learning [24], where a common task is to
predict missing relations between entities in a knowledge graph [43].
3 Embedding subgraphs
We now turn to the task of representation learning on (sub)graphs, where the goal is to encode a set of nodes
and edges into a low-dimensional vector embedding. More formally, the goal is to learn a continuous vector
representation, zS ∈ Rd, of an induced subgraph G[S] of the full graph G, where S ⊆ V. Note that these
methods can embed both subgraphs (S ⊂ V) as well as entire graphs (S = V). The embedding, zS, can then
be used to make predictions about the entire subgraph; for example, one might embed graphs corresponding to
different molecules to predict their therapeutic properties [21].
Representation learning on subgraphs is closely related to the design of graph kernels, which define a dis-
tance measure between subgraphs [58]. That said, we omit a detailed discussion of graph kernels, which is a
large and rich research area of its own, and refer the reader to [58] for a detailed discussion. The methods we
review differ from the traditional graph kernel literature primarily in that we seek to learn useful representations
from data, rather than pre-specifying feature representations through a kernel function.
Many of the methods in this section build upon the techniques used to embed individual nodes, introduced
in Section 2. However, unlike the node embedding setting, most subgraph embedding approaches are fully-
supervised, being used for subgraph classification, where the goal is to predict a label associated with a par-
ticular subgraph. Thus, in this section we will focus on the various different approaches for generating the zS
embeddings, with the assumption that these embeddings are being fed through a cross-entropy loss function,
analogous to Equation (16).
3.1 Sets of node embeddings and convolutional approaches
There are several subgraph embedding techniques that can be viewed as direct extensions of the convolutional
node embedding algorithms (described in Section 2.3.2). The basic intuition behind these approaches is that
they equate subgraphs with sets of node embeddings. They use the convolutional neighborhood aggregation
idea (i.e., Algorithm 1) to generate embeddings for nodes and then use additional modules to aggregate sets of
node embeddings corresponding to subgraphs. The primary distinction between the different approaches in this
section is how they aggregate the set of node embeddings corresponding to a subgraph.
17
3.1.1 Sum-based approaches
For example, "convolutional molecular fingerprints" introduced by Duvenaud et al. [21] represent subgraphs in
molecular graph representations by summing all the individual node embeddings in the subgraph:
zS =
zi,
(21)
(cid:88)
vi∈S
where the embeddings, {zi,∀vi ∈ S}, are generated using a variant of Algorithm 1.
Dai et al. [16] employ an analogous sum-based approach but note that it has conceptual connections to mean-
field inference: if the nodes in the graph are viewed as latent variables in a graphical model, then Algorithm 1
can be viewed as a form of mean-field inference where the message-passing operations have been replaced
with differentiable neural network alternatives. Motivated by this connection, Dai et al. [16] also propose a
modified encoder based on Loopy Belief Propagation [42]. Using the placeholders and notation from Algorithm
1, the basic idea behind this alternative is to construct intermediate embeddings, ηi,j, corresponding to edges,
(i, j) ∈ E:
ηk
i,j = σ(WkE · COMBINE(xi, AGGREGATE(ηk−1
l,i
These edge embeddings are then aggregated to form the node embeddings:
,∀vl ∈ N (vi) \ vj})).
(22)
zi = σ(WkV · COMBINE(xi, AGGREGATE({ηK
i,l,∀vl ∈ N (vi)})).
(23)
Once the embeddings are computed, Dai et al. [16], use a simple element-wise sum to combine the node em-
beddings for a subgraph, as in Equation (21).
3.1.2 Graph-coarsening approaches
Defferrard et al. [18] and Bruna et al. [8] also employ convolutional approaches, but instead of summing the
node embeddings for the whole graph, they stack convolutional and "graph coarsening" layers (similar to the
HARP approach in Section 2.2.2). In the graph coarsening layers, nodes are clustered together (using any graph
clustering approach), and the clustered node embeddings are combined using element-wise max-pooling. After
clustering, the new coarser graph is again fed through a convolutional encoder and the process repeats.
Unlike the convolutional approaches discussed in 2.3.2, Defferrard et al. [18] and Bruna et al. [8] also
place considerable emphasis on designing convolutional encoders based upon the graph Fourier transform [15].
However, because the graph Fourier transform requires identifying and manipulating the eigenvectors of the
graph Laplacian, naive versions of these approaches are necessarily O(V3). State-of-the-art approximations
to these spectral approaches (e.g.
, using Chebyshev polynomials) are conceptually similar to Algorithm 1,
with some minor variations, and we refer the reader to Bronstein et al. [7] for a thorough discussion of these
techniques.
3.1.3 Further variations
Other variants of the convolutional idea are proposed by Neipert et al. [44] and Kearnes et al. [34]. Both
advocate alternative methods for aggregating sets of node embeddings corresponding to subgraphs: Kearnes et
al. aggregate sets of nodes using "fuzzy" histograms instead of a sum, and they also employ edge embedding
layers similar to [16]. Neipart et al. define an ordering on the nodes-e.g. using a problem specific ordering or by
employing an off-the-shelf vertex coloring algorithm-and using this ordering, they concatenate the embeddings
for all nodes and feed this concatenated vector through a standard convolutional neural network architecture.
18
3.2 Graph neural networks
In addition to the convolution-inspired embedding approaches discussed above, there is a related-and chrono-
logically prior-line of work on "graph neural networks" (GNNs) [52]. Conceptually, the GNN idea is closely
related to Algorithm 1. However, instead of aggregating information from neighbors, the intuition behind GNNs
is that graphs can be viewed as specifying scaffolding for a "message passing" algorithm between nodes.
In the original GNN framework [52] every node vi is initialized with a random embedding h0
i , and at each
iteration of the GNN algorithm nodes accumulate inputs from their neighbors according to
h(hj, xi, xj),
(24)
(cid:88)
hk
i =
vj∈N (vi)
where h is an arbitrary differentiable function of the form h : Rd×Rm×Rm → Rd. Equation (24) is repeatedly
applied in a recursive fashion until the embeddings converge, and special care must be taken to ensure that h
is a contraction map. Once the embeddings have converged after K iterations, the final output embeddings are
computed as zvi = g(hK
i ), where g is an arbitrary differentiable function of the form g : Rd → Rd. Scarselli
et al. [52] discuss various parameterizations of h and g based on multi-layer perceptrons (MLPs), though they
are limited by the need to iterate the message passing to convergence and by the restriction that f must be a
contraction map.
Li et al. [39] extend and modify the GNN framework to use Gated Recurrent Units and back propagation
through time [14], which removes the need to run Equation (24) to convergence. Adapting the GNN framework
to use modern recurrent units also allows Li et al. to leverage node attributes for initialization and to use the
output of intermediate embeddings of subgraphs. In particular, Li et al.'s Gated Graph Neural Networks initialize
the h0
i = xi) and have update equations of the form
i vectors using node attributes (i.e., h0
where W ∈ Rd×d is a trainable weight matrix and GRU denotes the Gated Recurrent Unit introduced by Cho et
al. [14].
Finally, Gilmer et al. [25] discuss another abstraction of GNNs, considering models of the form
hk−1
i
,
(cid:88)
vj∈N (vi)
,
Whk−1
j
hk
i = GRU
hk−1
i
,
(cid:88)
vj∈N (vi)
hk
i = U
q(hk−1
i
, hk−1
j
)
,
(25)
(26)
where q : Rd × Rd → Rd(cid:48)
is a differentiable function that computes the incoming "messages" from neighbors
and U : Rd×Rd(cid:48)
→ Rd is a differentiable "update" function. This framework-termed Message Passing Neural
Networks (MPNNs)-generalizes Li et al.'s Gated Graph Neural Networks as well as a number of the earlier
mentioned convolutional approaches. Gilmer et al. discuss a number of variants and extensions of MPNNs (e.g.,
incorporating edge features) from the perspective of predicting the properties of molecules based on their graph
structure.
All of these graph neural network approaches can in principle be used for node-level embedding tasks,
though they are more often used for subgraph-level embeddings. To compute subgraph embeddings, any of the
aggregation procedures described in Section 3.1 could be employed, but Scarselli et al. [52] also suggest that
the aggregation can be done by introducing a "dummy" super-node that is connected to all nodes in the target
subgraph.
19
3.3 Applications of subgraph embeddings
The primary use case for subgraph embeddings is for subgraph classification, which has important applications
in a number of areas. The most prominent application domain is for classifying the properties of graphs cor-
responding to different molecules [16, 21, 44, 34]. Subgraph embeddings can be used to classify or predict
various properties of molecular graphs, including predicting the efficacy of potential solar cell materials [16],
or predicting the therapeutic effect of candidate drugs [34]. More generally, subgraph embeddings have been
used to classify images (after converting the image to a graph representation) [8], to predict whether a computer
program satisfies certain formal properties [39], and to perform logical reasoning tasks [39].
4 Conclusion and future directions
Representation learning approaches for machine learning on graphs offer a power alternative to traditional fea-
ture engineering. In recent years, these approaches have consistently pushed the state of the art on tasks such
as node classification and link prediction. However, much work remains to be done, both in improving the per-
formance of these methods, and-perhaps more importantly-in developing consistent theoretical frameworks
that future innovations can build upon.
4.1 Challenges to future progress
In this review, we attempted to unify a number of previous works, but the field as a whole still lacks a consistent
theoretical framework-or set of frameworks-that precisely delineate the goals of representation learning on
graphs. At the moment, the implicit goal of most works is to generate representations that perform well on a
particular set of classification or link prediction benchmarks (and perhaps also generate qualitatively pleasing
visualizations). However, the unchecked proliferation of disparate benchmarks and conceptual models presents a
real risk to future progress, and this problem is only exacerbated by the popularity of node and graph embedding
techniques across distinct, and somewhat disconnected, subfields within the machine learning and data mining
communities. Moving forward as a field will require new theoretical work that more precisely describes the
kinds of graph structures that we expect the learned representations to encode, how we expect the models to
encode this information, and what constraints (if any) should be imposed upon on these learned latent spaces.
More developed theoretical foundations would not only benefit researchers in the field-e.g., by informing
consistent and meaningful benchmark tasks-these foundations would also allow application domain-experts to
more effectively choose and differentiate between the various approaches. Current methods are often evaluated
on a variety of distinct benchmarks that emphasize various different graph properties (e.g., community structures,
relationship strengths between nodes, or structural roles). However, many real-world applications are more
focused, and it is not necessary to have representations that are generically useful for a wide variety of tasks. As
a field, we need to make it clear what method should be used when, and prescribing such use-cases requires a
more precise theoretical understanding of what exactly our learned representations are encoding.
4.2
Important open problems
In addition to the general challenges outlined above, there are a number of concrete open problems that remain
to be addressed within the area of representation learning on graphs.
Scalability. While most of the works we reviewed are highly scalable in theory (i.e., O(E) training time), there
is still significant work to be done in scaling node and graph embedding approaches to truly massive datasets
(e.g., billions of nodes and edges). For example, most methods rely on training and storing a unique embedding
for each individual node. Moreover, most evaluation setups assume that the attributes, embeddings, and edge
lists of all nodes used for both training and testing can fit in main memory-an assumption that is at odds with
20
the reality of most application domains, where graphs are massive, evolving, and often stored in a distributed
fashion. Developing representation learning frameworks that are truly scalable to realistic production settings
is necessary to prevent widening the disconnect between the academic research community and the application
consumers of these approaches.
Decoding higher-order motifs. While much work in recent years has been dedicated to refining and improving
the encoder algorithm used to generate node embeddings, most methods still rely on basic pairwise decoders,
which predict pairwise relations between nodes and ignore higher-order graph structures involving more than
two nodes. It is well-known that higher-order structural motifs are essential to the structure and function of
complex networks [5], and developing decoding algorithms that are capable of decoding complex motifs is an
important direction for future work.
Modeling dynamic, temporal graphs. Many application domains involve highly dynamic graphs where timing
information is critical-e.g., instant messaging networks or financial transaction graphs. However, we lack
embedding approaches that can cope with the unique challenges presented by temporal graphs, such as the
task of incorporating timing information about edges. Temporal graphs are becoming an increasingly important
object of study [46], and extending graph embedding techniques to operate over them will open up a wide range
of exciting application domains.
Reasoning about large sets of candidate subgraphs. A major technical limitation of current subgraph em-
bedding approaches is that they require the target subgraphs to be pre-specified before the learning process.
However, many applications seek to discover subgraphs with certain properties, and these applications require
models that can reason over the combinatorially large space of possible candidate subgraphs. For example, one
might want to discover central subgraphs in a gene regulatory network, or uncover nefarious sub-communities
in a social network. We need improved subgraph embedding approaches that can efficiently reason over large
sets of candidate subgraphs, as such improvements are critical to expand the usefulness of subgraph embeddings
beyond the task of basic subgraph classification.
Improving interpretability. Representation learning is attractive because it relieves much of the burden of
hand designing features, but it also comes at a well-known cost of interpretability. We know that embedding-
based approaches give state-of-the-art performance, but the fundamental limitations-and possible underlying
biases-of these algorithms are relatively unknown. In order to move forward, care must be taken to develop new
techniques to improve the interpretability of the learned representations, beyond visualization and benchmark
evaluation. Given the complexities and representational capacities of these approaches, researchers must be
ever vigilant to ensure that their methods are truly learning to represent relevant graph information, and not just
exploiting statistical tendencies of benchmarks.
Acknowledgments
The authors thank Marinka Zitnik, Zoubin Ghahramani, Richard Turner, Stephen Bach, and Manan Ajay Shah
for their helpful discussions and comments on early drafts. This research has been supported in part by NSF IIS-
1149837, DARPA SIMPLEX, Stanford Data Science Initiative, and Chan Zuckerberg Biohub. W.L.H. was also
supported by the SAP Stanford Graduate Fellowship and an NSERC PGS-D grant. The views and conclusions
expressed in this material are those of the authors and should not be interpreted as necessarily representing the
official policies or endorsements, either expressed or implied, of the above funding agencies, corporations, or
the U.S. and Canadian governments.
References
[1] A. Ahmed, N. Shervashidze, S. Narayanamurthy, V. Josifovski, and A.J. Smola. Distributed large-scale natural graph
factorization. In WWW, 2013.
21
[2] R. Angles and C. Gutierrez. Survey of graph database models. ACM Computing Surveys, 40(1):1, 2008.
[3] L. Backstrom and J. Leskovec. Supervised random walks: predicting and recommending links in social networks. In
WSDM, 2011.
[4] M. Belkin and P. Niyogi. Laplacian eigenmaps and spectral techniques for embedding and clustering. In NIPS, 2002.
Science,
[5] A.R. Benson, D.F. Gleich, and J. Leskovec. Higher-order organization of complex networks.
353(6295):163–166, 2016.
[6] S. Bhagat, G. Cormode, and S. Muthukrishnan. Node classification in social networks. In Social Network Data
Analytics, pages 115–148. 2011.
[7] M. M. Bronstein, J. Bruna, Y. LeCun, A. Szlam, and P. Vandergheynst. Geometric deep learning: Going beyond
euclidean data. IEEE Signal Processing Magazine, 34(4):18–42, 2017.
[8] J. Bruna, W. Zaremba, and Y. Szlam, A.and LeCun. Spectral networks and locally connected networks on graphs. In
ICLR, 2014.
[9] S. Cao, W. Lu, and Q. Xu. Grarep: Learning graph representations with global structural information. In KDD, 2015.
[10] S. Cao, W. Lu, and Q. Xu. Deep neural networks for learning graph representations. In AAAI, 2016.
[11] B.P. Chamberlain, J. Clough, and M.P. Deisenroth. Neural embeddings of graphs in hyperbolic space. arXiv preprint
arXiv:1705.10359, 2017.
[12] S. Chang, W. Han, J. Tang, G. Qi, C.C. Aggarwal, and T.S. Huang. Heterogeneous network embedding via deep
architectures. In KDD, 2015.
[13] H. Chen, B. Perozzi, Y. Hu, and S. Skiena. Harp: Hierarchical representation learning for networks. arXiv preprint
arXiv:1706.07845, 2017.
[14] K. Cho, B. Van Merrienboer, C. Gulcehre, D. Bahdanau, F. Bougares, H. Schwenk, and Y. Bengio. Learning phrase
representations using rnn encoder-decoder for statistical machine translation. In EMNLP, 2014.
[15] Fan RK Chung. Spectral Graph Theory. Number 92. American Mathematical Soc., 1997.
[16] H. Dai, B. Dai, and L. Song. Discriminative embeddings of latent variable models for structured data. In ICML,
2016.
[17] M.C.F. De Oliveira and H. Levkowitz. From visual data exploration to visual data mining: a survey. IEEE Transac-
tions on Visualization and Computer Graphics, 9(3):378–394, 2003.
[18] M. Defferrard and P. Bresson, X.and Vandergheynst. Convolutional neural networks on graphs with fast localized
spectral filtering. In NIPS, 2016.
[19] Y. Dong, N.V. Chawla, and A. Swami. metapath2vec: Scalable representation learning for heterogeneous networks.
In KDD, 2017.
[20] C. Donnat, M. Zitnik, D. Hallac, and J. Leskovec. Learning structural node embeddings via diffusion wavelets. arXiv
preprint arXiv:1710.10321, 2017.
[21] D. Duvenaud, D. Maclaurin, J. Iparraguirre, R. Bombarell, T. Hirzel, A. Aspuru-Guzik, and R.P. Adams. Convolu-
tional networks on graphs for learning molecular fingerprints. In NIPS, 2015.
[22] M. Ester, H. Kriegel, J. Sander, X. Xu, et al. A density-based algorithm for discovering clusters in large spatial
databases with noise. In KDD, 1996.
[23] S. Fortunato. Community detection in graphs. Physics Reports, 486(3):75–174, 2010.
[24] L. Getoor and B. Taskar. Introduction to Statistical Relational Learning. MIT press, 2007.
[25] J. Gilmer, S.S. Schoenholz, P.F. Riley, O. Vinyals, G.E. Dahl. Neural Message Passing for Quantum Chemistry. In
ICML, 2017.
[26] M. Gori, G. Monfardini, and F. Scarselli. A new model for learning in graph domains. In IEEE International Joint
Conference on Neural Networks, 2005.
22
[27] P. Goyal and E. Ferrara. Graph embedding techniques, applications, and performance: A survey. arXiv preprint
arXiv:1605.09096, 2017.
[28] A. Grover and J. Leskovec. node2vec: Scalable feature learning for networks. In KDD, 2016.
[29] W.L. Hamilton, R. Ying, and J. Leskovec.
Inductive representation learning on large graphs. arXiv preprint,
arXiv:1603.04467, 2017.
[30] K. Henderson, B. Gallagher, T. Eliassi-Rad, H. Tong, S. Basu, L. Akoglu, D. Koutra, C. Faloutsos, and L. Li. Rolx:
structural role extraction & mining in large graphs. In KDD, 2012.
[31] G. Hinton and R. Salakhutdinov. Reducing the dimensionality of data with neural networks. Science, 313(5786):504–
507, 2006.
[32] S. Hochreiter and J. Schmidhuber. Long short-term memory. Neural Computation, 9(8):1735–1780, 1997.
[33] P. Hoff, A.E. Raftery, and M.S. Handcock. Latent space approaches to social network analysis. JASA, 97(460):1090–
1098, 2002.
[34] S. Kearnes, K. McCloskey, M. Berndl, V. Pande, and P. Riley. Molecular graph convolutions: moving beyond
fingerprints. Journal of Computer-Aided Molecular Design, 30(8):595–608, 2016.
[35] T.N. Kipf and M. Welling. Semi-supervised classification with graph convolutional networks. In ICLR, 2016.
[36] T.N. Kipf and M. Welling. Variational graph auto-encoders. In NIPS Workshop on Bayesian Deep Learning, 2016.
[37] J.B. Kruskal. Multidimensional scaling by optimizing goodness of fit to a nonmetric hypothesis. Psychometrika,
29(1):1–27, 1964.
[38] J.A. Lee and M. Verleysen. Nonlinear dimensionality reduction. Springer Science & Business Media, 2007.
[39] Y. Li, D. Tarlow, M. Brockschmidt, and R. Zemel. Gated graph sequence neural networks. In ICLR, 2015.
[40] D. Liben-Nowell and J. Kleinberg. The link-prediction problem for social networks. Journal of the Association for
Information Science and Technology, 58(7):1019–1031, 2007.
[41] Q. Lu and L. Getoor. Link-based classification. In ICML, volume 3, pages 496–503, 2003.
[42] K. Murphy, Y. Weiss, and M. Jordan. Loopy belief propagation for approximate inference: An empirical study. In
UAI, 1999.
[43] M. Nickel, K. Murphy, V. Tresp, and E. Gabrilovich. A review of relational machine learning for knowledge graphs.
Proceedings of the IEEE, 104(1):11–33, 2016.
[44] M. Niepert, M. Ahmed, and K. Kutzkov. Learning convolutional neural networks for graphs. In ICML, 2016.
[45] M. Ou, P. Cui, J. Pei, Z. Zhang, and W. Zhu. Asymmetric transitivity preserving graph embedding. In KDD, 2016.
[46] A. Paranjape, A. R. Benson, and J. Leskovec. Motifs in temporal networks. In WSDM, 2017.
[47] B. Perozzi, R. Al-Rfou, and S. Skiena. Deepwalk: Online learning of social representations. In KDD, 2014.
[48] B. Perozzi, V. Kulkarni, and S. Skiena. Walklets: Multiscale graph embeddings for interpretable network classifica-
tion. arXiv preprint arXiv:1605.02115, 2016.
[49] Bryan Perozzi. Local Modeling of Attributed Graphs: Algorithms and Applications. PhD thesis, Stony Brook
University, 2016.
[50] T. Pham, T. Tran, D.Q. Phung, and S. Venkatesh. Column networks for collective classification. In AAAI, 2017.
[51] L.F.R. Ribeiro, P.H.P. Saverese, and D.R. Figueiredo. struc2vec: Learning node representations from structural
identity. In KDD, 2017.
[52] F. Scarselli, M. Gori, A.C. Tsoi, M. Hagenbuchner, and G. Monfardini. The graph neural network model. IEEE
Transactions on Neural Networks, 20(1):61–80, 2009.
[53] M. Schlichtkrull, T.N. Kipf, P. Bloem, R. van den Berg, I. Titov, and M. Welling. Modeling relational data with graph
convolutional networks. arXiv preprint arXiv:1703.06103, 2017.
23
[54] J. Tang, M. Qu, M. Wang, M. Zhang, J. Yan, and Q. Mei. Line: Large-scale information network embedding. In
WWW, 2015.
[55] J. Tenenbaum, V. De Silva, and J. Langford. A global geometric framework for nonlinear dimensionality reduction.
Science, 290(5500):2319–2323, 2000.
[56] R. van den Berg, T.N. Kipf, and M. Welling. Graph convolutional matrix completion.
arXiv:1706.02263, 2017.
arXiv preprint
[57] L. van der Maaten and G. Hinton. Visualizing data using t-sne. JMLR, 9:2579–2605, 2008.
[58] S.V.N. Vishwanathan, N.N. Schraudolph, R. Kondor, and K.M. Borgwardt. Graph kernels. JMLR, 11:1201–1242,
2010.
[59] D. Wang, P. Cui, and W. Zhu. Structural deep network embedding. In KDD, 2016.
[60] Z. Yang, W. Cohen, and R. Salakhutdinov. Revisiting semi-supervised learning with graph embeddings. In ICML,
2016.
[61] M. Zitnik and J. Leskovec. Predicting multicellular function through multi-layer tissue networks. Bioinformatics,
2017.
24
|
1104.4296 | 1 | 1104 | 2011-04-21T15:46:11 | Collaboration in computer science: a network science approach. Part II | [
"cs.SI",
"cs.DL",
"physics.soc-ph"
] | We represent collaboration of authors in computer science papers in terms of both affiliation and collaboration networks and observe how these networks evolved over time since 1960. We investigate the temporal evolution of bibliometric properties, like size of the discipline, productivity of scholars, and collaboration level in papers, as well as of large-scale network properties, like reachability and average separation distance among scientists, distribution of the number of scholar collaborators, network clustering and network assortativity by number of collaborators. | cs.SI | cs |
Collaboration in computer science:
a network science approach. Part II
Massimo Franceschet
Department of Mathematics and Computer Science, University of Udine
Via delle Scienze 206 -- 33100 Udine, Italy
[email protected]
Abstract
We represent collaboration of authors in computer science papers in terms of both affiliation
and collaboration networks and observe how these networks evolved over time since 1960.
We investigate the temporal evolution of bibliometric properties, like size of the discipline,
productivity of scholars, and collaboration level in papers, as well as of large-scale network
properties, like reachability and average separation distance among scientists, distribution of
the number of scholar collaborators, network clustering and network assortativity by number
of collaborators.
Key words: Bibliometrics; Research collaboration; Affiliation networks; Collaboration
networks; Network science
1. Introduction
The process of scholarly publication of research achievements leaves behind itself a trail
of footprints that can be weaved into densely intertwined bibliographic networks. Examples
of such networks that have been extensively studied are citation networks, which are webs
of bibliographic references among academic papers or journals, and collaboration networks,
where scholars are connected if they co-authored a paper together. The field of network
science -- the holistic analysis of complex systems through the study of the structure of
networks that wire their components -- is an optimal solution for the study of these (and
many other) networks (Newman, 2010).
We take advantage of the network science paraphernalia and make a longitudinal (time-
resolved) study of properties that emerge from co-authorship in conference and journal pub-
lications in computer science. We represent co-authorship in terms of two differently grained
networks. The first representation is an author-paper affiliation network, that is a bipartite
graph with two series of nodes representing authors and papers, and links running from au-
thors to papers they authored. With the support of this network we investigate bibliometric
properties like the number of published papers, the number of active scholars, the average
number and the distribution of papers per author, and the average number and the distri-
bution of authors per paper. We study how these properties changed over time in the last
50 years of computer science.
Preprint submitted to arXiv.org
January 24, 2020
The second representation of co-authorship that we take advantage of is a coarser network,
known in the literature as collaboration network, which is obtained from the earlier mentioned
affiliation network by an operation of projection on the set of author nodes. A collaboration
network is a social network in which the actors are the scholars and the ties represent the
collaborations in papers among scholars.
In most cases, two authors that have written a
paper together do know each other quite well, at least from a scientific perspective, and
hence they are tied by a social relationship. This calls for the investigation of typical large-
scale properties of social networks, like reachability and average separation distance among
scholars, distribution of the number of scholar collaborators, network clustering and network
assortativity by number of collaborators. Again, these properties are analysed in a temporal
perspective, observing how they varied since the 1960s. Putting together the affiliation
and the collaboration network analyses, we get a dynamic picture of how bibliometric and
collaboration patterns evolved in the last half-century of computer science.
This is the second part of our investigation of collaboration in computer science using a
network science approach. The first part of the study is atemporal: we investigate biblio-
metric and collaboration properties of the cumulative affiliation and collaboration networks
considering all papers published in computer science since 1936 (Franceschet, 2011). While
the first investigation provides a static picture of the collaboration in computer science,
the present analysis gives a dynamic perspective on how collaboration in computer science
evolved over time.
2. Related literature
Academic collaboration has been extensively studied in bibliometrics, the branch of in-
formation and library science that quantitatively investigates the process of publication of
research achievements; see Franceschet and Costantini (2010) and references therein. Col-
laboration intensity varies across disciplines: it is fundamental in the sciences, moderate in
the social sciences, and mostly negligible in the arts and humanities. Collaborative works are
generally valued higher by peer experts and they receive more citations from other papers.
Collaboration has been also investigated in the context of network science. The notion
of academic collaboration network first appeared in a brief note by mathematician Goffman
(1969). Newman was the first to experimentally study large-scale collaboration networks
with the aid of modern network analysis toolkit. He analysed the structural properties
of collaboration networks for biomedicine, physics (Newman, 2001b,c), and mathematics
(Newman, 2004), as well as the temporal evolution of collaboration networks in physics and
biomedicine (Newman, 2001a). Barab´asi et al. (2002) studied the evolution in time of collab-
oration networks in neuroscience and mathematics. The temporal dynamics of mathematics
collaboration networks is also investigated by Grossman (2002). Moody (2004) studied the
structure and the temporal evolution of a social science collaboration network.
As for studies concerning computer science collaboration networks, Huang et al. (2008)
considered publications from 1980 to 2005 extracted from the CiteSeer digital library. The
authors studied properties at both the network level and the community level and how they
evolve in time. Bird et al. (2009) focused on the structure and dynamics of collaboration in
research communities within computer science. They isolated 14 computing areas, selected
the top tier conferences for each area, and extracted publication data for the chosen confer-
ences from DBLP 2008. They used network analysis metrics to find differences in the research
2
styles of the areas and how these areas interrelate in terms of author overlap and migration.
Menezes et al. (2009) made a geographical analysis of collaboration patterns using network
analysis. They considered publications from 1954 to 2007 for members of 30 research in-
stitutions (8 from Brazil, 16 from North America, and 6 from Europe) and focused on the
differences in collaboration habits among these geographical areas.
Our investigation differs from the mentioned previous studies on computer science for the
following reasons:
• we use the most complete dataset and build the largest affiliation and collaboration
networks ever investigated for computer science;
• with the support of the affiliation network representation of collaboration, we study
the temporal evolution of bibliometric properties for computer science, like size of the
discipline in terms of papers and scholars, author productivity, and collaboration level
on papers;
• with the aid of the collaboration network we study the evolution of meaningful large-
scale network properties; in particular the size of biconnected components and the
concentration of collaboration using the Gini coefficient have never been examined
before for computer science.
3. Methodology
Data were collected from The DBLP Computer Science Bibliography (DBLP, for short)
(Ley, 2011). The DBLP literature reference database was developed within the last 15 years
by Dr. Michael Ley at Trier University, Germany. DBLP is internationally respected by
informatics researchers for the accuracy of its data. As of today, DBLP contains more than
1.6 million entries covering computer and information science.
Each publication record in DBLP has a key that uniquely identifies the publication and
a property that represents the publication type, such as journal article, conference article,
book, book chapter, and thesis. Moreover, it contains a semi-structured list of bibliographic
attributes describing the publication, like authors, title, and year of publication. This list
veries according to the publication type (Ley, 2009).
In particular the publication year
attribute was fundamental to make the present time-resolved study.
DBLP is particularly careful with respect to the quality of its data, and is especially sensi-
ble to the name problem, which includes the cases of a scholar with several names (synonyms)
and of several scholars with the same name (homonyms) (Reuther et al., 2006). DBLP uses
full names and avoids initials as much as possible. This reduces, but does not eliminate, the
name problem. Furthermore, it uses effective heuristics on the collaboration graph to identify
possible cases of synonyms or homonyms. For instance, if two lexicographically similar names
are assigned to authors that have a distance of two in the collaboration graph, that is, these
authors never directly collaborated in a paper but they have a common collaborator, then
these names are identified as possible synonyms and they are further manually investigated.
Furthermore, if the list of co-authors of an author splits in two or more clusters of highly
interconnected authors, but with no collaborations among authors of different clusters, then
we might have a case of homonym, and an additional manual check is performed.
3
DBLP can be used free of charge. Data can be accessed using a Web interface or through
automatic HTTP requests, and the entire dataset can be downloaded in XML format to run
experiments on top of it.
We downloaded the XML version of DBLP bibliographic dataset in early 2010 (637.9
MB) and filtered all publications from 1936 to 2008 inclusive.1 On top of this database we
built the following networks:
• Author-paper affiliation network. This is a bipartite graph with two types of nodes:
authors and papers. There is an edge from an author to a paper if the author has writ-
ten the paper. See an example in Figure 1. Affiliation networks are the most complete
representations for the study of collaboration (Newman, 2010); unfortunately, this bi-
partite representation for collaboration has received few attention in the literature. For
each year Y from 1960 to 2008, we study the yearly author-paper affiliation network
AN (Y ), which contains bibliographic data for all papers published in year Y . We ex-
cluded years before 1960 since the number of database records for these early years of
computer science is not significant.2
• collaboration network. A collaboration network is an undirected graph obtained from
the projection of the author-paper affiliation network on the author set of nodes. Nodes
of the collaboration network represent authors and there is an edge between two authors
if they have collaborated in at least one paper. An example is given in Figure 1. Clearly,
the collaboration network is a coarser representation with respect to the affiliation
network; for instance, if three authors are mutually linked in the collaboration network,
then it is not clear, from the analysis of the collaboration network alone, whether
they have collaborated in a single paper or in three different ones. Nevertheless, the
collaboration network is highly informative since many collaboration patterns can be
captured by analysing this form of representation. Furthermore, the collaboration
network is the main (mostly unique) representation of collaboration that has been
studied in the network science literature. For each year Y from 1960 to 2008, we study
the cumulative collaboration network CN (Y ), which contains collaboration data for all
papers published until year Y .
We saved the collaboration networks in GraphML format (an XML syntax for graphs).
We loaded them in the R environment for statistical computing (R Development Core Team,
2008) and analysed the structure of the networks using the R package igraph developed by
G´abor Cs´ardi and Tam´as Nepusz. On the other hand, we never materialized the (much
larger) affiliation networks. Instead, we used XQuery, the standard XML query language,
and BaseX (DBIS Research Group, 2011), a light-speed native XML database, to extract the
relevant properties from the XML version of the DBLP database.
1We excluded year 2009 since for it the bibliography has not reached the same level of completeness as for
previous years.
2For instance, DBLP contains 259 records for year 1959, 23 records for year 1949, and 12 records for year
1936.
4
P
Q
R
A
C
B
D
A
B
C
D
Figure 1: A toy example of an author-paper affiliation network (left graph). Authors (circle nodes) match the
papers (square nodes) that they wrote. We also show the corresponding collaboration network (right graph).
In this case, two authors are connected if they wrote at least one paper together.
4. Affiliation network properties
In this section we investigate properties of the author-paper affiliation network of com-
puter science. We recall that the computer science author-paper affiliation network is a
bipartite graph with two node types representing authors and papers; edges match authors
with papers they wrote. For each year from 1960 to 2008, we study the yearly affiliation net-
work build from all papers published in that year. In particular, with the aid of the affiliation
network, we investigate the temporal evolution of the following bibliometric properties for
computer science: number of published papers, number of active authors, average number of
papers per author, and average number of authors per paper.
Figure 2 depicts the size of the computer science discipline in terms of number of papers
that are published for each year since 1960. With respect to the author-paper affiliation
network, this is the number of nodes of type paper in the network. The computer science
field is steadily expanding in terms of number of published papers. However, the proportion
of conference and journal papers changed over years. Until 1983, the volume of journal papers
dominates that of conference papers. However, since 1984 conferences are the most popular
publication venue in computer science, and in the recent years computer science published
almost two conference papers every one journal paper (Franceschet, 2010).
What are the reasons of the growth of the computer science field? We investigated, for
each year, the number of active authors, which are authors that published at least one paper
in the year, and the author productivity, defined as the average number of papers published
by an active author in the year. With respect to the author-paper affiliation network, the
number of active authors is the number of nodes of type author in the network, and the
author productivity is the average degree of nodes of type author. Indeed, the degree of a
node of type author on the author-paper bipartite network is precisely the number of papers
published by the author.
Figure 3 shows the temporal evolution of both variables (number of active authors and
their productivity). Both variables are growing over time, although the author productivity
shows some oscillations during the 1960s. Hence, the expansion over time of computer science
in terms of number of papers is justified by an increase in the number of active authors and
by a rise of the author productivity. Substantially, the discipline grows since there are more
active scholars and these scholars write more papers.
5
conference
journal
0
0
0
8
0
0
0
4
0
1960
1970
1980
1990
s
r
e
p
a
p
f
o
r
e
b
m
u
N
0
0
0
0
8
0
0
0
0
6
0
0
0
0
4
0
0
0
0
2
0
1960
1970
1980
1990
2000
2008
Year
Figure 2: The size of the computer science discipline in terms of number of conference papers (solid line)
and number of journal papers (dashed line) that are published for each year. The inset refers to the shorter
period from 1960 to 1990.
Finally, we observed, for each year, the average collaboration level in papers, defined as
the average number of authors per paper published in the year. With respect to the author-
paper affiliation network, the average collaboration level is the average degree of nodes of
type paper. Indeed, the degree of a paper node is the number of authors that signed the
paper. Figure 4 shows that collaboration in papers increased over time. The average paper
in 2008 has 2.95 authors, while the average one in 1960 had 1.30 authors.3
5. Collaboration network properties
In this section we study large-scale properties of the collaboration network of computer
science. Recall that the computer science collaboration network is a graph with nodes rep-
resenting the computer science scholars and edges representing the collaborations between
scholars in research papers. For each year from 1960 to 2008, we study the cumulative collabo-
ration network build from all papers published until that year. Specifically, we investigate the
temporal evolution of the following properties of the computer science collaboration network:
connectivity of the network, average separation distance among scholars, distribution of the
3Recent bibliometric studies have shown that computer science papers jointly written by two authors are
generally of better quality (as judged by peer experts) that single-author papers, and the number of citations
received from other papers grows with the number of authors of the paper (Franceschet and Costantini, 2010).
6
y
t
i
v
i
t
c
u
d
o
r
P
8
.
1
4
.
1
0
.
1
0
0
0
0
0
2
0
0
0
0
5
1
0
0
0
0
0
1
0
0
0
0
5
0
s
r
o
h
t
u
a
f
o
r
e
b
m
u
N
1960
1980
2000
1960
1970
1980
1990
2000
2008
Year
Figure 3: The size of the computer science discipline in terms of number of active authors for each year. The
inset shows the author productivity in terms of the average number of papers published by an author.
number of scholar collaborators, network clustering and network assortativity by number of
collaborators.
It is reasonable to assume that scientific information flows through paths of the collab-
oration networks; we expect, indeed, that two authors that collaborated in some paper are
willing to exchange scientific information with a higher probability than two scholars that
never met. A reasonable question is: is there a collaboration path between any two scholars
of the network? If not, what is the largest component of the graph that has the desirable
property that any two scholars of the component are connected by at least one path?
A connected component of an undirected graph is a maximal subset of nodes such that
any node in the set is reachable from any other node in the set by traversing a path of
intermediate nodes. A connected component of a collaboration graph is hence a maximal set
of authors that are mutually reachable through chains of collaborators.
A large connected component in the collaboration graph, of the order of the number
of scholars, is a desirable property for a discipline that signals its maturity: theories and
experimental results can reach, via collaboration chains, the great majority of the scholars
working in the field, and thus scholars are scientifically well-informed and can incrementally
build new theories and discover new results on top of established knowledge. Of course,
collaboration represents only one way to spread scientific information; the processes of journal
publishing and conference attendance make also notable contributions in this direction.
A useful generalization of the concept of connected component in the k-connected compo-
nent (or simply k-component). A k-component is a maximal set of vertices such that each is
reachable from each of the others by at least k node-independent paths. Two paths are said
7
0
.
3
5
.
2
0
.
2
5
.
1
r
e
p
a
p
r
e
p
s
r
o
h
t
u
A
1960
1970
1980
1990
2000
2008
Year
Figure 4: The average collaboration level in papers for each year.
node-independent if they do not share any intermediate node. For the common case k = 2,
k-components are called bicomponents. An interesting property of k-components is that they
remain connected (in the usual sense) as soon as less than k nodes (and the incident edges)
are removed. For instance, a bicomponent is still connected if we remove one of its nodes.
For this reason, the idea of k-component is associated with the idea of network robustness.
Hence, a bicomponent in a collaboration graph is more robust than an ordinary connected
component, since the removal on any scholar with all their collaborators does not destroy
the possibility of going from any scholar to any other one via a collaboration path.
Figure 5 plots the temporal evolution of the share of the largest connected component
and of the largest biconnected component of the collaboration network. The fraction of the
collaboration network that is taken by the largest connected component grows steadily since
1970. This fraction is below half of the network until 1990, and it covers a share of 80% in
2004. The figure for the last year, 2008, is 85%. Notice that the slope of the curve decreases
in the last few years, that is the increase of the share of the largest connected component
in a given year with respect to the previous year is less noticeable in the recent years. This
pattern can be interpreted as a convergence of the collaboration network toward a steady
state, where the largest part of the network, although not the entire graph, is connected
by paths of collaborations. The line for the largest biconnected component follows a trend
similar to the curve for the largest connected component. Not surprisingly, the bicomponent
line is below the connected component curve, since any bicomponent is embedded into a
connected component. The share of the largest biconnected component continuously grows
from the 1970s and reaches half of the collaboration network in 2003, and 61% of the whole
graph in 2008.
8
s
t
n
e
n
o
p
m
o
c
t
s
e
g
r
a
l
f
o
e
r
a
h
S
8
.
0
6
.
0
4
.
0
2
.
0
0
.
0
1960
1970
1980
1990
2000
2008
Year
Figure 5: The temporal evolution of the share of the largest connected component (solid line) and of the
largest biconnected component (dashed line) of the collaboration network.
The fact that two scholars are connected on a collaboration graph means that there exists
at least one path of collaborators between them. However, how long is this path, on average?
There exists a substantial difference if the average path connecting two scholars has length,
say, six edges, or one hundred links. If we assume that information flows on the network
along collaboration ties, then the length of the average path is fundamental to understand
how fast the information spreads on the network.
We may assume that information preferentially flows along geodesics, which are shortest
paths in terms of number of edges on a graph. The geodesic distance, also known as degree of
separation, between two nodes is defined as the number of edges of any geodesic connecting
the nodes. The average geodesic distance is the mean geodesic distance among all pairs of
connected nodes of a graph. The largest geodesic distance in the graph is called the diameter
of the graph. It tells us how far are two connected nodes in the worst case.
Figure 6 shows the temporal evolution of the average degree of separation between schol-
ars (main plot) and of the maximum degree of separation (inset plot) in the collaboration
network. We can neatly distinguish two phases. The first phase goes from 1960 to 1983. It is
characterised by the alternation of periods in which the geodesic distance expands followed by
shorter periods in which it shrinks, drawing a curve with a series of ridges. We will see next in
this section that the collaboration density among computer scientists, measured as the mean
number of collaborators per scholar, continuously increases since 1960. In this initial phase
from 1960 to 1983, the collaboration graph is split up in many relatively small connected
components, one of them, the largest, collect an increasing share of nodes, from 8% in 1960
to 36% in 1983. As the collaboration density increases, it may happen that some of these
9
n
o
i
t
a
r
a
p
e
s
f
o
e
e
r
g
e
D
9
8
7
6
5
4
3
2
r
e
t
e
m
a
D
i
5
2
5
1
5
1960
1980
2000
1960
1970
1980
1990
2000
2008
Year
Figure 6: The temporal evolution of the average degree of separation between scholars (main plot) and of the
maximum degree of separation (inset plot) in the collaboration network.
components glue together to form bigger components, with the effect of raising the average
geodesic distance between nodes. These expansion periods are followed by shorter periods in
which the collaboration density increases but no significant merging of components occurs,
and hence the average geodesic distance between nodes remains stable or more frequently
it declines. Since the expansion periods are longer than the contraction ones, in this initial
phase the overall average geodesic distance increases, with a maximum of 8.73 reached in year
1977. Also, in this phase, the largest geodesic distance (the diameter) increases, reaching its
peak of 28 in year 1983.
The first phase from 1960 to 1983 is followed by a second phase, from 1983 to 2008, in
which the average geodesic distance almost continuously decreases, drawing a valley that
gently slopes, as opposed to the sharp ridges of the previous phase. Moreover, the diameter
oscillates in a short range (from 23 to 28). In this second phase, there exists a large connected
component that contains an important share of the network; this share contains the majority
of the nodes starting from 1991. The pairs of nodes in this giant component dominate the
computation of the average geodesic distance. Since the collaboration density inside this
component becomes higher and higher, the collaboration distances get lower and lower. In
2008, the average degree of separation between computer science scholars in 6.41, a figure
that matches well the legendary six degrees of separation found by the experimental psychol-
ogist Stanley Milgram in the 1960s with his today highly celebrated small-world experiment
(Milgram, 1967). We conjecture that the computer science collaboration network is slowly
converging toward a steady state, where the majority of pairs of scholars are connected by
short paths (of six or less edges).
10
e
e
r
g
e
d
x
a
M
0
0
6
0
0
3
0
e
e
r
g
e
d
e
d
o
n
e
g
a
r
e
v
A
6
5
4
3
2
1960
1980
2000
1960
1970
1980
1990
2000
2008
Year
Figure 7: The temporal evolution of the average number of collaborators of a scholar (main plot) and of the
maximum number of collaborators of a scholar (inset plot).
In the following we investigate how the density and the distribution of the collaboration
among computer scientists evolved in time. A measure of the density of collaboration is
the average number of collaborators per scholar. This is the average degree of a node in
the collaboration graph. Figure 7 depicts the temporal evolution of the average number
of collaborators of a scholar (main plot) and of the maximum number of collaborators of a
scholar (inset plot). The mean number of collaborators is stable in the 1960s, with an average
of 1.9 co-authors per scholar. From 1970 it steadily increases: the average computer scientist
has 2.2 collaborators in the 1970s, 2.9 collaborators in the 1980s, 4 collaborators in the 1990s,
and 5.7 collaborators in the 2000s. The mean number of collaborators in the last year 2008
is 6.6, more than three times the number of collaborators a computer scientists had in the
1970s. The maximum number of collaborators of a scholar, although a less significative figure,
is also increasing with time, reaching the impressive maximum amount of 595 collaborators
for a single scholar in 2008.4
We have just noticed that the number of collaborations increased over time. However,
did the distribution of collaborations among scientists change over time? Concentration
measures how the character (in our context, the collaborations) is equally distributed among
the statistical units (the scholars). The two extreme situations are equidistribution, in which
each statistical unit receives the same amount of character (each scholar has the same number
4As a comparison, the most prolific and the most collaborative among mathematicians, Paul Erdos, wrote
more than 1400 papers cooperating with more than 500 co-authors (Grossman, 1997).
11
n
o
i
t
a
r
o
b
a
l
l
o
c
f
o
n
o
i
t
a
r
t
n
e
c
n
o
C
5
5
.
0
0
5
.
0
5
4
.
0
0
4
.
0
5
3
.
0
1960
1970
1980
1990
2000
2008
Year
Figure 8: The temporal evolution of the collaboration concentration measured with the Gini concentration
coefficient.
of collaborators) and maximum concentration, in which the total amount of the character is
attributed to a single statistical unit (there exists a super-star collaborator that co-authored
with all other scholars, and each other scholar collaborated only with this collaboration
super-star). Since a collaboration is represented with an edge in the collaboration graph, the
concentration of collaborations among computer scientists corresponds to the concentration
of edges among nodes in the collaboration graph.
A numerical indicator of concentration is the Gini concentration coefficient, which ranges
between 0 and 1 with 0 representing equidistribution and 1 representing maximum con-
centration. Figure 8 shows how this coefficient varied with time in the computer science
collaboration network. From 1970 the concentration of collaboration among our peers moved
away from the equidistribution toward a more concentrated scenario. The Gini collaboration
coefficient for the last surveyed year is 0.56. In this year, the most collaborative 1% of the
scholars harvest 13% of the collaborations, the 5% of them collect one-third (33%) of the
collaborations, and the 10% of them attract almost half (46%) of the collaborations. Most of
the collaborations are achieved by few vital scholars, with the majority of scholars collecting
the minority of the collaborations. Hence the distribution of collaborations over scholars is
highly skewed, as expected, and the distribution skewness has increased over time.
Finally, we focus on the topological structure of the computer science collaboration net-
work. To this end we use two apparently unrelated measures: the transitivity coefficient and
the assortativity coefficient. The transitivity coefficient, also known as clustering coefficient,
measures the average probability that a collaborator of my collaborator is also my collabo-
rator, and it can be computed as the ratio of the number of loops of length three and the
12
number of paths of length two in the collaboration graph. The coefficient ranges from 0 to
1; a value of 1 implies perfect transitivity, i.e., a network whose components are all cliques.5
A value of 0 implies no closed path of length two, which happens for various topologies, such
as a tree or a square lattice.
Assortative mixing by degree is the tendency of nodes to connect to other nodes with a
similar degree. In our context, we have assortative mixing by degree if scholars collaborate
preferentially with other scholars with similar number of collaborators. We have disassorta-
tive mixing by degree if collaborative scholars co-author with hermits and vice versa. We
have no mixing at all if none of these patterns is clearly visible. A quantitative measure
of the magnitude of mixing by degree is the assortativity coefficient, which is the Pearson
correlation coefficient applied to the degree sequences of nodes connected by an edge. The
coefficient ranges between -1 and 1, where negative values indicate disassortative mixing,
positive values indicate assortative mixing, and values close to 0 indicate no mixing.
Figure 9 illustrates the transitivity coefficient (main plot) and of the assortativity co-
efficient (inset plot) of the collaboration network. Substantially, the transitivity coefficient
is decreasing in time, ranging from a value of 0.76 in 1960 to a value of 0.24 in 2008.6 In
1960 it holds that 3 times over 4 two scholars sharing a common collaborator are themselves
co-authors. After 50 years of computer science, the same phenomenon happens only 1 time
over 4.
As to assortativity, in the early years, the collaboration network is strongly assortative by
degree, with an assortativity coefficient of 0.73. The collaboration network remains assorta-
tive by degree in the following years, but the strength of assortativity decreases, and reaches
its minimum in 2008 with an assortativity coefficient of 0.17.7
Interestingly, the assortativity coefficient and the transitivity coefficient follow very similar
trends and seem to be highly correlated. Indeed, the Pearson correlation coefficient between
the two variables is 0.98, which means almost perfect positive correlation.8 The synchronous
behaviour of the transitivity and of the assortativity coefficients reveals an interesting change
in the topology of the collaboration network over time. In the early times of computer science,
the collaboration network had a clear core-periphery structure, with a core of interconnected
high-degree nodes surrounded by a less dense periphery of nodes with lower degree.
In
particular, the periphery of the network is composed of small clusters of nodes, which are
internally highly connected, but disconnected from the other small groups and from the core
of the network. See Figure 10, depicting the collaboration network as it was in 1964, for an
example. This kind of network has both a high clustering coefficient and a high assortativity
coefficient. Indeed, the core of the network is highly clustered, and so are also the peripheral
small clusters, and hence the clustering coefficient is high. Moreover, the central high-degree
5A clique is a graph in which each pair of nodes is connected by an edge.
6Notice, however, that the transitivity coefficient of 0.24 for the 2008 collaboration network is still a rather
high probability, especially when compared with non-social networks or with random networks. As a com-
parison, the transitivity coefficient for a network with the same degree distribution of the 2008 collaboration
network but otherwise random is 0.00014.
7The assortativity coefficient of 0.17 is still a large one if compared with non-social networks, which
typically show null or negative assortativity coefficients.
8To the knowledge of the writer, this is the first time that such strong association between transitivity
and degree assortativity is observed in the evolution of real networks.
13
y
t
i
v
i
t
a
t
r
o
s
s
A
5
.
0
2
.
0
1960
1980
2000
i
t
n
e
c
i
f
f
e
o
c
y
t
i
v
i
t
i
s
n
a
r
T
7
.
0
6
.
0
5
.
0
4
.
0
3
.
0
1960
1970
1980
1990
2000
2008
Year
Figure 9: The temporal evolution of the transitivity coefficient (main plot) and of the assortativity coefficient
(inset plot) of the collaboration network.
nodes of the core are interconnected, and the peripheral low-degree nodes match with other
similar nodes, making the network highly assortative by degree.
The computer science collaboration network progressively lost this peculiar core-periphery
structure over time, or at least this structure is not so clear in the years of modern computer
science. The modern structure of the collaboration network is dominated by the largest con-
nected component of the network, which covers the majority of the nodes. The disconnected
periphery is still composed of small clusters of nodes, but, unlike in the early years, this part
of the graph contains an insignificant share of nodes. The nodes in the largest component are
not as highly linked as were the nodes in the core component of early networks. Moreover,
highly collaborative scholars in the modern collaboration network are more willing to collab-
orate with those with few collaborators (as in the typical relationship supervisor-student).
Figure 11 shows the largest component for the 1980 collaboration network. Notice that, to a
certain degree, the core-periphery structure is still noticeable, although it is less clear than
in the core component of Figure 10.
6. Conclusions
We have analysed how collaboration in computer science evolved in the last half-century
using a network science approach. Computer science is expanding since 1960 both in terms
of number of published papers and number of active authors. Moreover, computer scientists
became more productive and collaborative. Productivity and collaboration are mutually re-
inforcing, since more collaborative authors generally write more papers and more productive
14
Figure 10: The computer science collaboration networks in 1964.
scholars typically attract more collaborations. Collaboration changed not only in intensity,
but also in concentration: the gap between the richest and the poorest scholars, in terms
of collaborations, is increasing. The temporal evolution of the collaboration network is ap-
proaching a steady state, where most of the scholars belong to a giant connected component
and are separated by few collaboration links. Finally, the collaboration network moved from
a clear core-perithery topology to a more balanced one, with lower transitivity and lower
homophily by number of collaborators. In particular, the lower transitivity with respect to
the early times of computer science might indicate a higher propensity for collaborations
among different research institutes, among different countries, and among different sub-fields
of computer science. Triads involving such heterogeneous collaborations, indeed, are less
likely to be closed in a collaboration triangle. Recent bibliometric studies have shown that
papers involving collaborations over different institutes, countries, or research fields generally
enjoy a higher visibility and attract more citations than papers with homogeneous authors,
making these types of collaborations more appealing (Franceschet and Costantini, 2010).
References
Barab´asi, A. L., Jeong, H., N´eda, Z., Ravasz, E., Schubert, A., Vicsek, T., 2002. Evolution
of the social network of scientific collaborations. Physica A: Statistical Mechanics and its
Applications 311 (3-4), 590 -- 614.
Bird, C., Barr, E. T., Nash, A., Devanbu, P. T., Filkov, V., Su, Z., 2009. Structure and
dynamics of research collaboration in computer science. In: SIAM International Conference
on Data Mining. pp. 826 -- 837.
15
Figure 11: The computer science collaboration networks in 1980 (only the largest component is shown).
DBIS Research Group, 2011. Basex -- Processing and visualizing XML with a native XML
database. Available at http://www.inf.uni-konstanz.de/dbis/basex/.
Franceschet, M., 2010. The role of conference publications in CS. Communications of the
ACM 53 (2), 129 -- 132.
Franceschet, M., 2011. Collaboration in computer science: a network science approach. Part
I. Retrieved April 21, 2011, from http://arxiv.org/abs/1010.4747.
Franceschet, M., Costantini, A., 2010. The effect of scholar collaboration on impact and
quality of academic papers. Journal of Informetrics 4 (4), 540 -- 553.
Goffman, C., 1969. And what is your Erdos number? The American Mathematical Monthly
76 (7), 791.
Grossman, J. W., 1997. Paul Erdos: The master of collaboration. In: The mathematics of
Paul Erdos. Springer-Verlag, pp. 467 -- 476.
Grossman, J. W., 2002. The evolution of the mathematical research collaboration graph.
Congressus Numerantium 158, 201 -- 212.
Huang, J., Zhuang, Z., Li, J., Giles, C. L., 2008. Collaboration over time: characterizing and
modeling network evolution. In: International Conference on Web Search and Web Data
Mining. pp. 107 -- 116.
16
Ley, M., 2009. DBLP - some lessons learned. Proceedings of the VLDB Endowment 2 (2),
1493 -- 1500.
Ley, M.,
2011. The DBLP Computer
Science Bibliography. Available
at
http://www.informatik.uni-trier.de/~ley/db/.
Menezes, G. V., Ziviani, N., Laender, A. H. F., Almeida, V. A. F., 2009. A geographical
analysis of knowledge production in computer science. In: International Conference on
World Wide Web. pp. 1041 -- 1050.
Milgram, S., 1967. The small world problem. Physiology Today 2, 60 -- 67.
Moody, J., 2004. The structure of a social science collaboration network: Disciplinary cohe-
sion from 1963 to 1999. American Sociological Review 69 (2), 213 -- 238.
Newman, M. E. J., 2001a. Clustering and preferential attachment in growing networks. Phys-
ical Review E 64 (2), 025102.
Newman, M. E. J., 2001b. Scientific collaboration networks: I. Network construction and
fundamental results. Physical Review E 64 (1), 016131.
Newman, M. E. J., 2001c. Scientific collaboration networks: II. Shortest paths, weighted
networks, and centrality. Physical Review E 64 (1), 016132.
Newman, M. E. J., 2004. Coauthorship networks and patterns of scientific collaboration.
Proceedings of the National Academy of Sciences of the United States of America 101,
5200 -- 5205.
Newman, M. E. J., 2010. Networks: An introduction. Oxford University Press.
R Development Core Team, 2008. R: A Language and Environment for Statistical Computing.
R Foundation for Statistical Computing, Vienna, Austria, ISBN 3-900051-07-0.
URL http://www.R-project.org
Reuther, P., Walter, B., Ley, M., Weber, A., Klink, S., 2006. Managing the quality of person
names in DBLP. In: European Conference on Digital Libraries. pp. 508 -- 511.
17
|
1805.08030 | 1 | 1805 | 2018-05-21T13:01:56 | Polarization Rank: A Study on European News Consumption on Facebook | [
"cs.SI"
] | The advent of WWW changed the way we can produce and access information. Recent studies showed that users tend to select information that is consistent with their system of beliefs, forming polarized groups of like-minded people around shared narratives where dissenting information is ignored. In this environment, users cooperate to frame and reinforce their shared narrative making any attempt at debunking inefficient. Such a configuration occurs even in the consumption of news online, and considering that 63% of users access news directly form social media, one hypothesis is that more polarization allows for further spreading of misinformation. Along this path, we focus on the polarization of users around news outlets on Facebook in different European countries (Italy, France, Spain and Germany). First, we compare the pages' posting behavior and the users' interacting patterns across countries and observe different posting, liking and commenting rates. Second, we explore the tendency of users to interact with different pages (i.e., selective exposure) and the emergence of polarized communities generated around specific pages. Then, we introduce a new metric -- i.e., polarization rank -- to measure polarization of communities for each country. We find that Italy is the most polarized country, followed by France, Germany and lastly Spain. Finally, we present a variation of the Bounded Confidence Model to simulate the emergence of these communities by considering the users' engagement and trust on the news. Our findings suggest that trust in information broadcaster plays a pivotal role against polarization of users online. | cs.SI | cs |
Polarization Rank: A Study on European News
Consumption on Facebook
Ana Luc´ıa Schmidt
Dept. of Environmental Sciences, Informatics and Statistics
Ca' Foscari University of Venice, Venice, Italy
Fabiana Zollo
Dept. of Environmental Sciences, Informatics and Statistics &
Center for the Humanities and Social Change
Ca' Foscari University of Venice, Venice, Italy
Antonio Scala
ISC-CNR, Rome, Italy
Walter Quattrociocchi
Dept. of Environmental Sciences, Informatics and Statistics
Ca' Foscari University of Venice, Venice, Italy
Abstract
The advent of WWW changed the way we can produce and access information.
Recent studies showed that users tend to select information that is consistent
with their system of beliefs, forming polarized groups of like-minded people
around shared narratives where dissenting information is ignored. In this envi-
ronment, users cooperate to frame and reinforce their shared narrative making
any attempt at debunking inefficient. Such a configuration occurs even in the
consumption of news online, and considering that 63% of users access news di-
rectly form social media, one hypothesis is that more polarization allows for
further spreading of misinformation. Along this path, we focus on the polariza-
tion of users around news outlets on Facebook in different European countries
(Italy, France, Spain and Germany). First, we compare the pages' posting be-
havior and the users' interacting patterns across countries and observe different
Email address: [email protected] (Ana Luc´ıa Schmidt)
Preprint submitted to Elsevier
May 22, 2018
posting, liking and commenting rates. Second, we explore the tendency of users
to interact with different pages (i.e., selective exposure) and the emergence of
polarized communities generated around specific pages. Then, we introduce a
new metric – i.e., polarization rank – to measure polarization of communities
for each country. We find that Italy is the most polarized country, followed
by France, Germany and lastly Spain. Finally, we present a variation of the
Bounded Confidence Model to simulate the emergence of these communities by
considering the users' engagement and trust on the news. Our findings suggest
that trust in information broadcaster plays a pivotal role against polarization
of users online.
Keywords: Facebook, News Consumption, Misinformation, Polarization,
Social Media
1. Introduction
The advent of social media changed the way we get informed and shape our
opinion. In 2016, post-truth was selected by the Oxford Dictionaries as the word
of the year. The definition reads "relating to or denoting circumstances in which
objective facts are less influential in shaping public opinion than appeals to
emotion and personal belief", that is, we select information and interpretations
adhering to our system of beliefs (confirmation bias).
This phenomenon is not new, our cognitive abilities have always been lim-
ited, and social media and the consequent disintermediated access to an unprece-
dented amount of information solely exacerbated the process. Recent studies on
massive datasets (376 million users) [1] showed that major disintermediated ac-
cess to information is creating segregation of users into communities where they
share a specific worldview and ignore dissenting information. Confirmation bias
dominates news consumption and informational cascades foster the emergence
of polarized groups around shared narratives [2, 3, 4, 5, 6].
Important results (that served to inform the Global risk report of the World
Economic Forum in 2016 and 2017) pointed out the pivotal role of confirmation
2
bias –i.e., the attitude of acquiring information coherently with the individ-
ual system of belief– in viral processes as well as in the collective framing of
narratives. In particular, one of these works [6], showing the inefficacy of de-
bunking, convinced the Washington Post to close its weekly column dedicated
to debunking false rumors [7].
The process of acceptance of a claim (whether documented or not) may be
altered by normative social influence or by the coherence with the individual
system of beliefs as well-documented in the literature on cognitive and social
psychology of communication [8, 9]. At the extreme of the spectrum, conspiracy
theorists tend to explain significant social or political aspects as plots conceived
by powerful individuals or organizations, and with the so-called urban legends
they share an important characteristic: the object of the narratives are in-
evitably threatening the established social order or well-being and are always
an indicator of what communities and social groups deeply fear [10]. These
phenomena are evidently of great interest and can be considered as a sort of
"thermometer" of social mood. Since these kinds of arguments can sometimes
involve the rejection of science, alternative explanations are invoked to replace
the scientific evidence. For instance, people who reject the link between HIV
and AIDS generally believe that AIDS was created by the U.S. Government to
control the African American population.
In this paper we focus on the interplay between users and news outlet on
Facebook by comparing four European countries: France, Germany, Italy and
Spain. First, we compare the pages' posting behavior and the users' interacting
patterns across countries and observe different posting, liking and commenting
rates. Second, we explore the tendency of users to interact with a variety of
pages (i.e., selective exposure) and the polarized communities of pages that
emerge from the users' consumption habits. Then, we introduce a new method
to calculate the percentage of polarized users when more than two communities
are involved and thus rank the four countries accordingly. We find that Italy
is the most polarized country, followed by France, Germany and lastly Spain.
Finally, we present a variation of the Bounded Confidence Model [11] to simulate
3
the emergence of these communities by considering the users' engagement and
trust on the news.
2. Materials and Methods
2.1. Ethics Statement
The data collection process was carried out using the Facebook Graph API
[12], which is publicly available. The pages from which we downloaded data are
public Facebook entities and can be accessed by anyone. Users' content con-
tributing to such pages is public unless users' privacy settings specify otherwise,
and in that case their activity is not available to us.
2.2. Data Collection
We generated a list of top news sources, in their official language, of France,
Germany, Italy and Spain. The list for each country was compiled considering
the Reuters Digital News Reports [13][14][15]. We then obtained the official
Facebook page of each news outlet and proceeded to download all the posts
made from 1st January 2015 to 31st December 2016, as well as all likes and
comments that have been made on those posts. The exact breakdown of the
data can be seen in Tab. 1, while the complete set of downloaded pages is
reported in Tab. 8 in the Supporting Information.
2.3. Preliminaries and Definitions
In this section we provide a brief description of the main concepts and tools
used in the analysis.
2.3.1. Projection of Bipartite Graphs
A bipartite graph is a triple G = (A, B, E) where A = {ai i = 1 . . . nA} and
B = {bj j = 1 . . . nB} are two disjoint sets of vertices, and E ⊆ A × B is the
set of edges, i.e. edges that exist only between vertices of sets A and B. The
bipartite graph G is described by the rectangular matrix M where Mij = 1, if
an edge exits between ai and bj, and Mij = 0 otherwise.
4
France
Germany
Italy
Spain
Pages
Posts
Likes
Likers
65
49
54
57
1, 008, 018
749, 805
1, 554, 817
1, 372, 805
419, 371, 366
183, 599, 003
409, 243, 176
333, 698, 985
21, 647, 888
14, 367, 445
14, 012, 658
32, 812, 007
Comments
47, 225, 675
31, 881, 407
51, 515, 121
34, 336, 356
Commenters
5, 755, 268
5, 338, 195
4, 086, 351
6, 494, 725
Users
22, 560, 889
15, 564, 360
14, 587, 622
34, 383, 820
Population
66M
81M
62M
46M
Table 1: Dataset Breakdown. Population according to the Reuters Digital News Report
(2017) [15]. Likers is the number of people that gave at least one like. Commenters is the
number of people that gave at least one comment. Users is the number of people that gave
at least a like or comment.
We consider bipartite networks in which the two disjointed set of nodes are
users and Facebook pages. That is Gκ = (Pκ, U, E) where Pκ is the set of
Facebook pages of country κ and U is the set of users active on pages belonging
to Pκ. Edges represent interactions among users and pages, that is, either likes
or comments.
As an example, a like given to a post on page p constitutes a link between
the user u and the page p so Mp,u = 1. We can then build the co-occurrence
matrices C Pκ = M M T and C U = M T M that quantify, respectively, the number
of common neighbors between two vertices of Pκ or U .
Only two graphs per country will be relevant for the analyses, Gκ
L and Gκ
C.
These are the result from the projection C Pκ of two bipartite graphs: one con-
sidering the users' liking activity (Gκ
(Gκ
C).
L) and another considering the comments
2.3.2. Community Detection Algorithms
Community detection algorithms serve to identify groups of nodes in a net-
work. In this work we apply three different community detection algorithms.
5
1. FastGreedy (FG). It takes an agglomerative bottom-up approach: initially
each vertex belongs to a separate community and, at each iteration, the
communities are merged in a way that yields the largest increase in the
current value of modularity [16]. The algorithm stops when it is no longer
possible to further increase the modularity. Due to its speed and its lack
of parameters in need of tuning, this algorithm will be the main reference
to compare against the partitions resulting from the application of other
community detection algorithms.
2. Multilevel (ML). It uses a multi-level optimization procedure for the modu-
larity score [17]. It takes a bottom-up approach where each vertex initially
belongs to a separate community and in each step, unlike FastGreedy, ver-
tices are reassigned in order to achieve the highest modularity.
3. Spinglass (SG). It interprets the problem of community detection as one of
finding the ground state of an infinite range spin-glass. In this algorithm,
the community structure of the network would be the spin configuration
that minimizes the energy of the spin glass, with the spin states being the
community indices [18][19].
To compare the various community partitions and the similarity between
different clustering methods, we use the Rand index [20], where a comparison
between two partitions yields a value between 0 and 1, such that 0 indicates
that there is no agreement on any vertex between the two partitions, whereas 1
indicates that the partitions are exactly the same.
3. Results and Discussion
3.1. Attention Patterns
As a first step we characterize how different countries consume news on
Facebook. We focus particularly on the allowed users' actions through the
entire period of the data collection:
likes, shares and comments. Naturally,
each action has a prescribed meaning. A like represents a positive feedback to
a post; a share expresses the user's desire to increase the visibility of a given
6
piece of information; and a comment is the way in which online collective debates
take form. Therefore, comments may contain negative or positive feedback with
respect to a post.
In Fig. 1 we show the distribution of the number of likes, comments and
shares received by the posts belonging to each country. As seen from the plots,
all the distributions are heavy-tailed, that is, they are best fitted by power laws
(as shown in Tab. 2) and possess similar scaling parameters with some notable
differences when looking at the number of comments and likes (Tab. 3).
Action
Poisson
FR comment
DE
comment
IT
ES
FR
DE
IT
ES
FR
DE
IT
ES
comment
comment
like
like
like
like
share
share
share
share
−81, 474, 887
−53, 857, 610
−92, 959, 791
−64, 633, 469
−716, 163, 037
−336, 233, 651
−732, 132, 678
−625, 371, 478
−302, 119, 999
−100, 787, 846
−399, 573, 409
−456, 628, 686
Log-Normal Exponential PowerLaw
−10, 467
−4, 094, 569
−124, 780
−3, 208, 655
−5, 353, 204
−9, 815
−28, 449
−4, 192, 227
−9, 793
−6, 463, 931
−243, 938
−4, 429, 366
−9, 034, 577
−12, 514
−34, 532
−7, 905, 112
−68, 981
−5, 029, 592
−2, 972, 740
−37, 466
−24, 265
−6, 760, 982
−5, 852, 126
−128, 667
−5, 042, 908
−3, 692, 816
−7, 158, 219
−5, 896, 527
−7, 135, 298
−4, 906, 736
−10, 276, 500
−8, 978, 996
−6, 102, 954
−3, 809, 317
−8, 902, 324
−7, 960, 407
Table 2: Maximum-Likelihood fit of the actions received by the posts of each
country. FR: France, DE: Germany, IT: Italy, ES: Spain.
Comments
Xmin
α
Likes
Shares
Xmin
α
Xmin
α
FR 1, 929
3.44
23, 338
3.09
2, 498
2.63
DE
315
2.63
1, 132
2.25
1, 084
2.45
IT 1, 736
3.63
15, 519
3.71
5, 753
2.79
ES
733
3.10
8, 491
2.89
1, 508
2.47
Table 3: Powerlaw fit of the actions received by the posts of each country.
7
Figure 1: Complementary Cumulative Distribution Function of the comments,
likes and shares received by the posts of each country.
We continue our analysis by examining how users from each country interact
with the pages. In Fig. 2, we show the distribution of the number of likes and
comments given by the users according to each country. Once again, all the
distributions are heavy-tailed, as seen in Tab. 4, with some notable differences
in their scaling parameters when considering the commenting activity of the
users of the different countries (Tab. 5).
Figure 2: Complementary Cumulative Distribution Function of the users' likes and
comments of each country.
8
Action
Poisson
FR comment
DE comment
IT
ES
FR
DE
IT
ES
comment
comment
like
like
like
like
−96, 157, 561
−57, 870, 795
−114, 865, 937
−62, 141, 913
−1, 042, 576, 644
−377, 979, 910
−985, 441, 955
−720, 112, 905
Log-Normal Exponential
−17, 869, 083
−13, 916, 586
−14, 878, 272
−11, 951, 470
−10, 972, 733
−14, 442, 076
−17, 309, 835
−13, 638, 119
−85, 808, 958
−63, 945, 214
−50, 972, 666
−40, 766, 648
−45, 609, 241
−61, 296, 249
−108, 917, 647
−83, 156, 334
PowerLaw
−2, 433
−1, 268, 430
−81, 786
−11, 920, 701
−643, 618
−13, 788
−26, 385
−48, 326
Table 4: Maximum-Likelihood fit of the users' different actions by country. FR:
France, DE: Germany, IT: Italy, ES: Spain.
Comments
Xmin
α
Likes
Xmin
α
FR 2, 378
4.07
648
2.45
DE
IT
ES
18
2.17
3, 156
3.02
529
2.70
5, 473
3.26
1
1.90
1, 876
3.24
Table 5: Power law fit of users' attention patterns.
3.2. Selective Exposure
The overall number of likes given by each user is a good proxy for their
level of engagement with the Facebook news pages. The lifetime of a user,
meaning the period of time where the user started and stopped interacting with
our set of pages, can be approximated by the time difference between the time-
stamp of their latest and earliest liked post. These measures could provide
important insights about news consumption patterns, specifically, the variety of
news sources consumed over time.
We say that a user has consumed a page in a given time window, if the
user has at least one positive interaction with that page in that period, that
is, the user liked a post made by that page. We do not consider comments
as a valid interaction for regular consumption because they have very diverse
9
meanings and, dissimilar from the likes, they do not unambiguously represent
positive feedback. Thus, we can measure the collection of pages consumed in
a weekly, monthly and quarterly basis while taking into account the activity
(total number of likes) and lifetime time difference of their first and last liked
post) of the users of each country.
Fig. 3 shows the number of news sources a user interacts with considering
their lifetime and for increasing levels of engagement for each country. For a
comparative analysis, we standardized between 0 and 1 the number of pages
present in each country, as well as the lifetime and engagement over the entire
user set. The results were calculated considering the quarterly (right), monthly
(middle) and weekly (left) rates.
Figure 3: Selective Exposure. Maximum number of unique news sources that users with
increasing levels of standardized lifetime (top) or standardized activity (bottom) interact
with weekly, monthly and quarterly for each country. The user's lifetime corresponds to the
normalized time difference between the time-stamp of their latest and earliest liked post. The
user's activity corresponds to the number of likes given in their lifetime.
Note that, for all countries, users usually interact with a small number of
news outlets and that higher levels of activity and longer lifetime correspond
to a smaller variety of news sources being consumed. We can also observe
clear differences between the countries. When considering the users' lifetime,
France has clearly a more varied news consumption diet than the rest; and when
considering the users' activity users in Germany consume consistently the less
10
diverse set of news sources. We can conclude that there is a natural tendency of
the users to confine their activity to a limited set of pages, news consumption on
Facebook is indeed dominated by selective exposure [1] and users from different
countries display different rates for the decreasing variety of news outlets they
consume.
3.3. Emerging Communities
User tendency to interact with few news sources might elicit page clus-
ters. To test this hypothesis, we first characterize the emergent community
structure of pages according to the users' activity for each country κ with
κ = {F R, DE, IT, ES}. We project the users' page likes to derive the weighted
graph Gκ
C) in which nodes are pages and two pages are connected if a
user likes (or comments on) both of them. The weight of a link on a projected
L (and Gκ
graph is determined by the number of users the two pages have in common.
L
L
G
GF R
GDE
GIT
GES
GF R
GDE
GIT
GES
C
C
L
L
C
C
κ - Country
Type
ML
SG
France
Germany
Italy
Spain
Likes
Likes
Likes
Likes
0.795
0.796
0.771
0.838
0.982
0.851
0.923
0.981
France
Comments
0.918
0.969
Germany
Comments
0.836
0.925
Italy
Spain
Comments
0.871
0.903
Comments
0.828
0.817
Table 6: Algorithm comparison. Comparison between the FastGreedy (FG) communities
against the MultiLevel (ML) and SpinGlass (SG) communities for both likes and comments
projections for every country.
We then apply the FastGreedy community detection algorithm to see if there
are well-defined communities for each case. To validate the community parti-
tioning, we then compare the membership of other community detection algo-
11
rithms using the Rand method [20] and find high level of similarity for all four
countries (see Tab. 6).
We also compared the communities of Gκ
C against each other using
different community detection algorithms and find, overall, low levels of sim-
L and Gκ
ilarity (see Tab. 7). This indicates that, for all four countries, the set pages
users generally approve of (like), differ from the set of pages where they debate
(comment).
Comparing
L -GF R
GF R
GDE
L -GDE
L -GIT
GIT
L -GES
GES
C
C
C
C
κ - Country
FG ML
SG
France
0.514
0.522
0.545
Germany
0.528
0.537
0.518
Italy
Spain
0.562
0.560
0.619
0.555
0.554
0.625
Table 7: Likes and comments projections comparison. Comparison of the communities
detected in Gκ
(SG).
C of each country with FastGreedy (FG), MultiLevel (ML) and SpinGlass
L and Gκ
3.4. User Polarization
By examining the activity of users across the various clusters and measuring
how they span across news outlets, we find that most users remain confined
within specific groups of pages. To understand the relationship between page
groupings and user behavior, we measure the polarization of users with respect
to the communities found for each country κ where κ = {F R, DE, IT, ES}.
For a user with K likes with (cid:80)
i ki = K such that each ki belongs to the
ith community (i = 1 . . . N , where N equals the number of communities). The
probability φi that the user belongs to the i-th community will then be φi =
ki/K. We can define the localization order parameter L as:
(cid:33)2
φ2
i
(cid:32)(cid:88)
(cid:88)
i
i
12
L [φ] =
φ4
i
(1)
Thus, in the case in which the user only has likes in one community, L =
1.
If a user, on the other hand, interacts equally with all the communities
(φi = 1/N ) then L = N ; hence, L counts the communities. Since we are
considering many users, each with their likes ki and their frequency φi, we can
plot the probability distribution and the complementary cumulative distribution
function of Lκ along the user set of each country κ. This would allow for a fair
comparison of the polarization of the users between countries.
Figure 4: Probability Density Function of L for each country. The dotted vertical line
indicates the median value.
For each country, Fig. 5 shows the Complementary Cumulative Distribu-
tion Function of the localization L, and Fig. 4 shows the Probability Density
Function. Both figures consider only users with at least 10 likes.
As we can see in Fig. 4, the densities are well behaved, that is, present a single
13
Figure 5: Complementary Cumulative Distribution Function of L for each country.
peak around 1. By looking at the CCDF of each country, we can rank the four
countries from the one with least polarized users to the one with the most: Spain
(median = 1.01653), Germany (median : 1.00274), France (median : 1.00222)
and Italy (median : 1.00001).
3.5. The Model.
In this section we provide a simple model of users' preferential attachment
to specific sources that considers the users' trust on the media as a parameter
and reproduces the observed community structure.
The entities of our model are pages p ∈ P and users u ∈ U . Each page p is
characterized by a set of opinions (an editorial line) modelled as a real number
cp that ranges [0, 1]. We assume that the cp values are uniformly distributed.
Each user u has an initial opinion that is modelled as a real number θu, which
ranges between [0, 1] and it is uniformly distributed. Each users u also has a
measure of trust in the media modelled by the real number τu, which ranges
between [0, 1]. User's trust will follow a truncated normal distribution.
We suppose cp and θu to be homogeneous such that the quantity cp − θu is
the distance between the opinion of user u and the editorial line of page p. We
mimic confirmation bias by assuming that if user u interacts with a page p and
14
the opinion distance cp − θu is less than a given tolerance parameter ∆, the
preference of user u will converge toward the editorial line of page p according
to the modified BCM [11] equation:
u = (1 − τu) · θu + τu · cp
θ(cid:48)
(2)
To mimic user activity we give each user u an activity coefficient au that
represents the number of pages a user can visit. Thus, the final opinion of a
user will average the editorial lines of the pages the user likes. If Ω is the set of
Ω pages that matches the preferences of user u, then the average opinion will
be:
θu = (1 − τu) θu + τu Ω−1(cid:88)
= Ω−1(cid:88)
p∈Ω
cp
p∈Ω
cp
To mimic the long tail distribution of our data we set the activity distribution
to be power law distributed p(a) ∼ a−γ with exponent γ = 3.
We use numerical simulation to study our model. A user randomly selects a
subset of P with which to interact. The user likes a page only when cp−θu < ∆.
When this occurs, the feedback mechanism reinforces the user's page preference
using the trust parameter τu to control the extent of the feedback. Thus the
final opinion of a user will be the average of the editorial lines of the pages the
user likes.
When a user's opinion converges, we build in the bipartite graph Gsim =
(I, P, Esim) where the set of edges Esim are the couplings (u, p) with which
user u likes page p. Hence, Gsim represents users interacting with their favorite
pages, and from Gsim we can build the projected graph Gp
sim that links the pages
according their common users.
Figure 6 shows an analysis of Gp
sim as a function of the mean values used
for the truncated normal distribution that models the trust τ , with different
15
Figure 6: Analysis of the synthetic pages-to-pages graph Gp
sim. It shows the number
of communities as a function of the mean user trust.
standard deviations and tolerance. Each point of the simulation is averaged
over 100 iterations.
We can see that increasing the tolerance ∆ leads to a reduction of the num-
16
ber of communities, that is, agreement is reached faster and polarization takes
place. Very low and very high values of user trust also display similar behavior.
Absolute trust or no trust in the media leads to fast polarization, either the
user will trust what they read fully and change their opinion accordingly, or
they won't.
The simulation displays an interesting behavior at τ = 0.1 where the number
of communities formed by the users' consumption habits seem to peak. This
indicates that some skepticism might actually factor against polarization. Users'
who distrust the news they interact with, even when their opinions were similar,
are more reluctant to further change their own beliefs. Perhaps a solution for
the issue of false and misleading narratives could be found by fostering critical
readers.
4. Discussion
In this paper we use quantitative analysis to understand and compare the
news consumption patterns of four European countries: France, Germany, Italy
and Spain. We show that while there are similarities in the consumption be-
haviours between the four countries, the posting and consumption behavior is
not universal.
The results also show that all users, regardless of country, display selective
exposure, that is, the more active a user is on Facebook the less variety of
news sources they tend to consume. This behavior is seen in all four countries,
with different rates of selective exposure for each case. News consumption on
Facebook is dominated by selective exposure.
Additionally, we studied the cluster of news pages that emerge from the
user's activity, and found that users, regardless of their nationality, are polar-
ized. We then measure the polarization of the users of each country, and ranked
them accordingly, finding that Italy presents the most polarized users, followed
by France, Germany and finally Spain. Further studies might gain insights into
the reasons behind the slight variations in consumption habits.
17
Finally, we introduce a variation on the Bonded Confidence Model [11] that
mimics the users' behavior of selective exposure taking into account user trust.
The simulation seems to indicate that users' who have some distrust of the news
they interact with, even when the narrative presented conforms to their beliefs,
are more reluctant to further change their own beliefs. Thus, a tentative solution
to mitigate user polarization might be found by fostering critical readers.
References
References
[1] A. L. Schmidt, F. Zollo, M. Del Vicario, A. Bessi, A. Scala, G. Caldarelli,
H. E. Stanley, W. Quattrociocchi, Anatomy of news consumption on face-
book, Proceedings of the National Academy of Sciences (2017) 201617052.
[2] W. Quattrociocchi, A. Scala, C. R. Sunstein, Echo chambers on facebook,
Available at SSRN.
[3] M. Del Vicario, A. Bessi, F. Zollo, F. Petroni, A. Scala, G. Caldarelli,
H. E. Stanley, W. Quattrociocchi, The spreading of misinformation online,
Proceedings of the National Academy of Sciences 113 (3) (2016) 554–559.
[4] M. Del Vicario, F. Zollo, G. Caldarelli, A. Scala, W. Quattrociocchi, Map-
ping social dynamics on facebook: The brexit debate, Social Networks 50
(2017) 6–16.
[5] W. Quattrociocchi, Inside the echo chamber, Scientific American 316 (4)
(2017) 60–63.
[6] F. Zollo, A. Bessi, M. Del Vicario, A. Scala, G. Caldarelli, L. Shekhtman,
S. Havlin, W. Quattrociocchi, Debunking in a world of tribes, PloS one
12 (7) (2017) e0181821.
[7] C. Dewey, What was fake on the internet this week: Why this is the final
column, The Washington Post.
URL https://www.washingtonpost.com
18
[8] A. Nowak, J. Szamrej, B. Latan´e, From private attitude to public opinion:
A dynamic theory of social impact., Psychological Review 97 (3) (1990)
362.
[9] S. Moscovici, The coming era of representations, in: Cognitive analysis of
social behavior, Springer, 1982, pp. 115–150.
[10] B. Franks, A. Bangerter, M. Bauer, Conspiracy theories as quasi-religious
mentality: an integrated account from cognitive science, social representa-
tions theory, and frame theory, Frontiers in psychology 4 (2013) 424.
[11] G. Deffuant, D. Neau, F. Amblard, G. Weisbuch, Mixing beliefs among
interacting agents, Advances in Complex Systems 3 (01n04) (2000) 87–98.
[12] Facebook, Using the graph api, Website, last checked: 20.12.2017 (8 2013).
URL
https://developers.facebook.com/docs/graph-api/
using-graph-api/
[13] N. Newman, D. A. Levy, R. K. Nielsen, Reuters institute digital news report
2015, Reuters Institute for the Study of Journalism.
[14] N. Newman, D. Levy, R. K. Nielsen, Reuters institute digital news report
2016, Reuters Institute for the Study of Journalism.
[15] N. Newman, R. Fletcher, A. Kalogeropoulos, D. A. Levy, R. K. Nielsen,
Reuters institute digital news report 2017, Reuters Institute for the Study
of Journalism.
[16] A. Clauset, M. E. Newman, C. Moore, Finding community structure in
very large networks, Physical review E 70 (6) (2004) 066111.
[17] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, E. Lefebvre, Fast unfolding
of communities in large networks, Journal of statistical mechanics: theory
and experiment 2008 (10) (2008) P10008.
[18] M. E. Newman, M. Girvan, Finding and evaluating community structure
in networks, Physical review E 69 (2) (2004) 026113.
19
[19] J. Reichardt, S. Bornholdt, Statistical mechanics of community detection,
Physical Review E 74 (1) (2006) 016110.
[20] W. M. Rand, Objective criteria for the evaluation of clustering methods,
Journal of the American Statistical association 66 (336) (1971) 846–850.
20
Supporting Information
In this section we provide the list of all the downloaded pages. Table 8
contains the 225 news pages that form the dataset. Pages are identified by
their name, website and Facebook ID, followed by the country code of their
corresponding country. The countries are indicated with their ISO Alpha-2
international code (FR: France, DE: Germany, IT: Italy, ES: Spain).
Table 8: List of pages of each country in the dataset.
Name and Website
Facebook ID
Community
1
2
3
4
5
6
7
8
9
ARD - ard.de
48219766388
Augsburger Allgemeine Zeitung -
121104385783
augsburger-allgemeine.de
Badische Zeitung - badische-zeitung.de
177670301122
Berliner Morgenpost - morgenpost.de
46239931235
Berliner Zeitung - berliner-zeitung.de
137267732953826
Bild - bild.de
B.Z. - bz-berlin.de
Das Erste - daserste.de
Der Spiegel - spiegel.de
25604775729
57187632436
176772398231
38246844868
10
Der Tagesspiegel - tagesspiegel.de
59381221492
11
Der Westen - derwesten.de
243001859426137
12
Die Tageszeitung - taz.de
171844246207985
13
Die Welt - welt.de
14
Die Zeit - zeit.de
15
Express - express.de
16
Focus - focus.de
97515118114
37816894428
172718036608
37124189409
21
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
17
Frankfurter Allgemeine Zeitung - faz.net
346392590975
18
Frankfurter Rundschau - fr.de
134100583282150
19
Freie Presse - freiepresse.de
20
Freitag - freitag.de
375109771472
313744767921
21
GMX - gmx.net
187741777922914
22
Hamburger Abendblatt - abendblatt.de
121580125458
23
Hamburger Morgenpost - mopo.de
196072707519
24
Handelsblatt - handelsblatt.com
104709558232
25
Hannoversche Allgemeine Zeitung - haz.de
198530121257
26
Huffington Post DE - huffingtonpost.de
366193510165011
27
Junge Freiheit - jungefreiheit.de
13479664941
28
Kolner Stadt-Anzeiger - ksta.de
141063022950
29
Leipziger Volkszeitung - lvz.de
114360055263804
30 Mitteldeutsche Zeitung - mz-web.de
141558262607
31
n-tv online - n-tv.de
126049165307
32
Ostsee-Zeitung - ostsee-zeitung.de
374927701107
33
ProSieben Newstime - prosieben.de/tv/newstime
64694257920
34
Rheinische Post - rp-online.de
50327854366
35
RTL aktuell - rtluell.de
119845424729050
36
SAT1 Nachrichten - sat1.de/news
171663852895480
37
Schleswig-Holsteinischer Zeitungsverlag - shz.de
248528847673
38
Stern - stern.de
78766664651
39
Stuttgarter Nachrichten - stuttgarter-nachrichten.de
144537361776
40
Stuttgarter Zeitung - stuttgarter-zeitung.de
129349103260
22
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
DE
41
Suddeutsche Zeitung - sueddeutsche.de
215982125159841
42
tagesschau - tagesschau.de
43
t-online - t-online.de
44 WAZ - waz.de
45 WEB.DE - web.de
46 Wirtschafts Woche - wiwo.de
193081554406
24897707939
117194401183
56488242934
93810620818
47
Yahoo News DE - de.nachrichten.yahoo.com
166721106679241
48
ZDF - zdf.de
49
ZDF heute - heute.de
50
20 MINUTOS - 20minutos.es
51
ABC - abc.es
52
Antena 3 - antena3.com
53
Cadena Ser - cadenaser.com
54
Canarias 7 - canarias7.es
55
Cinco D´ıas - cincodias.elpais.com
56
COPE - cope.es
154149027994068
112784955679
38352573027
7377874895
55353596297
15658775846
85160277321
36280712574
15829535820
57
Cuatro news - cuatro.com/noticias
96876562265
58
Diario de C´adiz - diariodecadiz.es
128335533904779
59
Diario de Ibiza - diariodeibiza.es
255177630236
60
Diario de Mallorca - diariodemallorca.es
155352736257
61
Diario de Navarra - diariodenavarra.es
103384039711468
62
El Comercio - elcomercio.es
64673887657
63
El Confidencial - elconfidencial.com
63830851925
64
El Confidencial Digital - elconfidencialdigital.com
202726949863885
23
DE
DE
DE
DE
DE
DE
DE
DE
DE
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
65
El Correo - elcorreo.com
280982578099
66
El Correo Gallego - elcorreogallego.es
152802838075123
67
El D´ıa - eldia.es
68
ElDiario.es - eldiario.es
165210860204301
417471918268686
69
El Diario Montan´es - eldiariomontanes.es
109434489075314
70
El Diario Vasco - diariovasco.com
71
El Economista - eleconomista.es
91085818678
56760767000
72
El Espanol - elespanol.com
693292367452833
73
El Mundo - elmundo.es
10407631866
74
El Norte de Castilla - elnortedecastilla.es
98474974005
75
El Pa´ıs - elpais.com
76
El Peri´odico - elperiodico.com
77
Expansi´on - expansion.com
8585811569
93177351543
93983931918
78
Faro de Vigo - farodevigo.es
123746764304270
79
Heraldo de Arag´on - heraldo.es
130012437016272
80
Hoy - hoy.es
81
Ideal - ideal.es
85593393832
64258697112
82
Informaci´on - diarioinformacion.com
410523955526
83
La Gaceta de Salamanca - lagacetadesalamanca.es
319669591452311
84
La Nueva Espana - lne.es
51837272861
85
La Opini´on de M´alaga - laopiniondemalaga.es
80999977105
86
La Opini´on de Murcia - laopiniondemurcia.es
106647502704110
87
La Opini´on de Tenerife - laopinion.es
112238345503995
88
La Provincia - laprovincia.es
124641092828
24
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
89
La Raz´on - larazon.es
113080018770027
90
La Sexta - lasexta.com
91
Las Provincias - lasprovincias.es
39172614918
20810574989
92
La Vanguardia - lavanguardia.com
156552584408339
93
La Verdad - laverdad.es
120857625399
94
La Voz de Asturias - lavozdeasturias.es
101351926940208
95
La Voz De Galicia - lavozdegalicia.es
350393845757
96
Levante-EMV - levante-emv.com
106329485190
97
Libertad Digital - libertaddigital.com
141423087721
98 MSN Espana - msn.com/es-es
99
Onda Cero - ondacero.es
100
P´ublico - publico.es
101 QUE! - que.es
102 RTVE - rtve.es
103
Sur - diariosur.es
104 Telecinco - telecinco.es
35966491049
99040469027
75084861845
97090259641
133623265400
52107727250
50353113909
105
´Ultima Hora - ultimahora.es
114680095225282
106 Yahoo News ES - es.noticias.yahoo.com
284428852938
107
20 Minutes - 20minutes.fr
51555073310
108 Agence France-Presse - afp.com/fr
114100038626559
109 BFMTV - bfmtv.com
43896752783
110 Canal+ - canalplus.fr
144056732332683
111 Challenges - challenges.fr
79566127213
112 Charente Libre - charentelibre.fr
144375072241306
25
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
ES
FR
FR
FR
FR
FR
FR
113 Charlie Hebdo - charliehebdo.fr
106626879360459
114 CNES Matin - cnewsmatin.fr
181111805243991
115 CNEWS - cnews.fr
76952916976
116 Corse Matin - corsematin.com
107249929306302
117 Courrier international - courrierinternational.com
142114104887
118 Dernieres Nouvelles d'Alsace - dna.fr
19004867327
119
FranceInfo - francetvinfo.fr
135112586936434
120
France Soir - francesoir.fr
53638966652
121
France T´el´evisions - francetelevisions.fr
179086202130933
122 Huffington Post FR - huffingtonpost.fr
284129444969978
123
La Croix - la-croix.com
108828257010
124
La D´epeche du Midi - ladepeche.fr
271219815470
125
L'Alsace - Le Pays - lalsace.fr
181480351879611
126
La Montagne - lamontagne.fr
146949065315655
127
La Nouvelle R´epublique du Centre Ouest -
87693933163
lanouvellerepublique.fr
128
La Provence - laprovence.com
129
La R´epublique des Pyrenn´ees -
larepubliquedespyrenees.fr
119213845538
148446219817
130
La R´epublique du Centre - larep.fr
211082695569481
131
La Tribune - latribune.fr
18950434380
132
La Voix du Nord - lavoixdunord.fr
76635774021
133
Le Bien Public - bienpublic.com
106094599409
134
Le Courrier Picard - courrier-picard.fr
58080584133
135
Le Dauphin´e Lib´er´e - ledauphine.com
122601757780987
26
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
136
Le Figaro - lefigaro.fr
61261101338
137
Le Journal du Dimanche - lejdd.fr
246577183385
138
Le Monde - lemonde.fr
14892757589
139
Le Monde Diplomatique - monde-diplomatique.fr
34398236687
140
Le Nouvel Observateur - tempsreel.nouvelobs.com
198508090036
141
Le Parisien - leparisien.fr
142
Le Point - lepoint.fr
36550584062
49173930702
143
Le Populaire du Centre - lepopulaire.fr
240500052515
144
Le Progr`es - leprogres.fr
104985642868265
145
Le R´epublicain Lorrain - republicain-lorrain.fr
142638581774
146
Les ´Echos - lesechos.fr
123440511000645
147
L'Est R´epublicain - estrepublicain.fr
190366851765
148
Le T´el´egramme - letelegramme.fr
97539957978
149
L'Express - lexpress.fr
150
L'Humanit´e - humanite.fr
151
Lib´eration - liberation.fr
9359316996
254585183694
147126052393
152
L'Ind´ependant - lindependant.fr
52697519148
153
L'internaute - linternaute.com
156569814356922
154
L'Opinion - lopinion.fr
155
L'Union - lunion.fr
156 Marianne - marianne.net
157 Mediapart - mediapart.fr
445890365491209
100163350071823
369717525444
116070051527
158 Metro France - lci.fr
411124728976705
159 Midi Libre - midilibre.fr
183518182558
27
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
160 MSN France - msn.com/g00/fr-fr
136932803018290
161 Nice-Matin - nicematin.com
162 Nord-Littoral - nordlittoral.fr
163 Ouest France - ouest-france.fr
164
Paris Match - parismatch.com
388223307574
344969675415
270122530294
117714667328
165
Paris Normandie - paris-normandie.fr
195238257180091
166 R´evolution Permanente - revolutionpermanente.fr
732277203520737
167
Sud Oest - sudouest.fr
58305334711
168 T´el´erama - telerama.fr
109520835773096
169 TF1 news - tf1.fr/news
170 Var Matin - varmatin.com
34610502574
365009223614
171 Yahoo News FR - fr.news.yahoo.com
138207559575213
172 Alto Adige - altoadige.gelocal.it
447795960541
173 Ansa - ansa.it
158259371219
174 Avvenire - avvenire.it
128533807252295
175 Corriere Adriatico - corriereadriatico.it
431943793507773
176 Corriere della Sera - corriere.it
284515247529
177 Corriere del Mezzogiorno -
84805991975
corrieredelmezzogiorno.corriere.it
178 Gazzetta di Modena - gazzettadimodena.gelocal.it
131613613524326
179 Gazzetta di Reggio - gazzettadireggio.gelocal.it
102328739818445
180 Giornale di Brescia - giornaledibrescia.it
352193836938
181 Giornale di Sicilia - gds.it
211307618890745
182 Huffington Post IT - huffingtonpost.it
276376685795308
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
FR
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
28
183
Il Blog di Beppe Grillo - beppegrillo.it
56369076544
184
Il Centro - ilcentro.gelocal.it
261504285205
185
Il Fatto Quotidiano - ilfattoquotidiano.it
132707500076838
186
Il Foglio - ilfoglio.it
187
Il Gazzettino - ilgazzettino.it
188
Il Giornale - ilgiornale.it
61703722992
154142713068
323950777458
189
Il Giornale di Vicenza - ilgiornaledivicenza.it
154836331469
190
Il Manifesto - ilmanifesto.info
61480282984
191
Il Mattino - ilmattino.it
210639995470
192
Il Mattino di Padova - mattinopadova.gelocal.it
189556995002
193
Il Messaggero - ilmessaggero.it
124918220854917
194
Il Messaggero Veneto - messaggeroveneto.gelocal.it
195905383236
195
Il Piccolo - ilpiccolo.gelocal.it
341809745380
196
Il Resto del Carlino - ilrestodelcarlino.it
200174860861
197
Il Secolo XIX - ilsecoloxix.it
198
Il Sole 24 Ore - ilsole24ore.com
199
Il Tirreno - iltirreno.gelocal.it
200
LA7 - la7.it
36493277214
38812693516
75980429042
252449503661
201
L'Adige - ladige.it
134572506600855
202
La Gazzetta del Mezzogiorno -
184749620911
lagazzettadelmezzogiorno.it
203
La Gazzetta di Mantova - gazzettadimantova.gelocal.it
62769612287
204
La Gazzetta di Parma - gazzettadiparma.it
309928567597
205
La Nazione - lanazione.it
87812020989
29
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
206
La Nuova di Venezia e Mestre - nuovavenezia.gelocal.it
338049475695
207
La Nuova Sardegna - lanuovasardegna.gelocal.it
226626114877
208
La Provincia Pavese - laprovinciapavese.gelocal.it
57687391957
209
L'Arena - larena.it
108431819182401
210
La Repubblica - repubblica.it
211
La Stampa - lastampa.it
179618821150
63873785957
212
La Tribuna di Treviso - tribunatreviso.gelocal.it
243933437208
213
L'Eco di Bergamo - ecodibergamo.it
197197145813
214
L'Espresso - espresso.repubblica.it
259865949240
215
Libero Quotidiano - liberoquotidiano.it
188776981163133
216
L'Unione Sarda - unionesarda.it
231465552656
217
L'Unit`a - unita.tv
218 MSN Italia - msn.com/it-it
292449724097
232690009759
219 Nuovo Quotidiano di Puglia - quotidianodipuglia.it
119992291359480
220 RAI News - rainews.it
124992707516031
221 Rai.TV - raiplay.it
88988179171
222
Sky TG24 - tg24.sky.it
215275341879427
223 TgCom24 - tgcom24.mediaset.it
40337124609
224 Trentino - trentinocorrierealpi.gelocal.it
82383189226
225 Yahoo News IT - it.notizie.yahoo.com
81262596234
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
IT
30
|
1504.03275 | 2 | 1504 | 2015-07-29T16:46:24 | Wiggins: Detecting Valuable Information in Dynamic Networks Using Limited Resources | [
"cs.SI"
] | Detecting new information and events in a dynamic network by probing individual nodes has many practical applications: discovering new webpages, analyzing influence properties in network, and detecting failure propagation in electronic circuits or infections in public drinkable water systems. In practice, it is infeasible for anyone but the owner of the network (if existent) to monitor all nodes at all times. In this work we study the constrained setting when the observer can only probe a small set of nodes at each time step to check whether new pieces of information (items) have reached those nodes.
We formally define the problem through an infinite time generating process that places new items in subsets of nodes according to an unknown probability distribution. Items have an exponentially decaying novelty, modeling their decreasing value. The observer uses a probing schedule (i.e., a probability distribution over the set of nodes) to choose, at each time step, a small set of nodes to check for new items. The goal is to compute a schedule that minimizes the average novelty of undetected items. We present an algorithm, WIGGINS, to compute the optimal schedule through convex optimization, and then show how it can be adapted when the parameters of the problem must be learned or change over time. We also present a scalable variant of WIGGINS for the MapReduce framework. The results of our experimental evaluation on real social networks demonstrate the practicality of our approach. | cs.SI | cs | Wiggins: Detecting Valuable Information
in Dynamic Networks Using Limited Resources
Ahmad Mahmoody∗, Matteo Riondato, Eli Upfal
Department of Computer Science – Brown University
{ahmad,matteo,eli}@cs.brown.edu
5
1
0
2
l
u
J
9
2
]
I
S
.
s
c
[
2
v
5
7
2
3
0
.
4
0
5
1
:
v
i
X
r
a
“Have you found it, Wiggins?”
July 30, 2015
Abstract
[Sherlock Holmes in A Study in Scarlet]
Detecting new information and events in a dynamic network by probing individual nodes has many
practical applications: discovering new webpages, analyzing influence properties in network, and detect-
ing failure propagation in electronic circuits or infections in public drinkable water systems. In practice,
it is infeasible for anyone but the owner of the network (if existent) to monitor all nodes at all times.
In this work we study the constrained setting when the observer can only probe a small set of nodes at
each time step to check whether new pieces of information (items) have reached those nodes.
We formally define the problem through an infinite time generating process that places new items
in subsets of nodes according to an unknown probability distribution.
Items have an exponentially
decaying novelty, modeling their decreasing value. The observer uses a probing schedule (i.e., a probability
distribution over the set of nodes) to choose, at each time step, a small set of nodes to check for new items.
The goal is to compute a schedule that minimizes the average novelty of undetected items. We present
an algorithm, wiggins, to compute the optimal schedule through convex optimization, and then show
how it can be adapted when the parameters of the problem must be learned or change over time. We also
present a scalable variant of wiggins for the MapReduce framework. The results of our experimental
evaluation on real social networks demonstrate the practicality of our approach.
1 Introduction
Many applications require the detection of events in a network as soon as they happen or shortly thereafter,
as the value of the information obtained by detecting the events decays rapidly as time passes. For example,
an emerging trend in algorithmic stock trading is the use of automatic search through the Web and social
networks for pieces of information that can be used in trading decisions before they appear in the more
popular news sites [10, 14, 23, 26]. Similarly, intelligence, business and politics analysts are scanning online
sources for new information or rumors. While new items are often reblogged, retweeted, and posted on
a number of sites, it is sufficient to find an item once, as fast as possible, before it loses its relevance or
freshness. There is no benefit in seeing multiple copies of the same news item or rumor. This is also the case
when monitoring for intrusions, infections, or defects in, respectively, a computer network, a public water
system, or a large electronic circuit.
Monitoring for new events or information is a fundamental search and detection problem in a distributed
data setting, not limited to social networks or graph analysis. In this setting, the data is distributed among a
large number of nodes, and new items appear in individual nodes (for example, as the products of processing
∗Contact author
1
the data available locally at the node), and may propagate (being copied) to neighboring nodes on a physical
or a virtual network. The goal is to detect at least one copy of each new item as soon as possible. The
search application can access any node in the system, but it can only probe (i.e., check for new items on) a
few nodes at a time. To minimize the time to find new items, the search application needs to optimize the
schedule of probing nodes, taking into account (i) the distribution of copies of items among the nodes (to
choose which nodes to probe), and (ii) the decay of the items’ novelty (or relevance/freshness) over time (to
focus the search on most relevant items). The main challenge is how to devise a good probing schedule in
the absence of prior knowledge about the generation and distribution of items in the network.
Contributions
In this work we study the novel problem of computing an optimal node probing schedule
for detecting new items in a network under resource scarceness, i.e., when only a few nodes can be probed
at a time. Our contributions to the study of this problem are the following:
• We formalize a generic process that describes the creation and distribution of information in a network,
and define the computational task of learning this process by probing the nodes in the network according
to a schedule. The process and task are parametrized by the resource limitations of the observer and
the decay rate of the novelty of items. We introduce a cost measure to compare different schedules: the
cost of a schedule is the limit of the average expected novelty of uncaught items at each time step. On
the basis of these concepts, we formally define the Optimal Probing Schedule Problem, which requires
to find the schedule with minimum cost.
• We conduct a theoretical study of the cost of a schedule, showing that it can be computed explicitly and
that it is a convex function over the space of schedules. We then introduce wiggins,1 an algorithm to
compute the optimal schedule by solving a constrained convex optimization problem through the use
of an iterative method based on Lagrange multipliers.
• We discuss variants of wiggins for the realistic situation where the parameters of the process needs to
be learned or can change over time. We show how to compute a schedule which is (probabilistically)
guaranteed to have a cost very close to the optimal by only observing the generating process for a
limited amount of time. We also present a MapReduce adaptation of wiggins to handle very large
networks.
• Finally, we conduct an extensive experimental evaluation of wiggins and its variants, comparing
the performances of the schedules it computes with natural baselines, and showing how it performs
extremely well in practice on real social networks when using well-established models for generating
new items (e.g., the independence cascade model [17]).
To the best of our knowledge, the problem we study is novel and we are the first to devise an algorithm
to compute an optimal schedule, both when the generating process parameters are known and when they
need to be learned.
Paper Organization. In Sect. 2 we give introductory definitions, and formally introduce the settings and
the problem. We discuss related works in Sect. 3. In Sect. 4 we describe our algorithm wiggins and its
variants. The results of our experimental evaluation are presented in Sect. 5. We conclude by outlining
directions for future work in Sect. 6.
2 Problem Definition
In this section we formally introduce the problem and define our goal.
Let G = (V, E) be a graph with V = n nodes. W.l.o.g. we let V = [n]. Let F ⊆ 2V be a collection
of subsets of V , i.e., a collection of sets of nodes. Let π be a function from F to [0, 1] (not necessarily a
probability distribution). We model the generation and diffusion of information in the network by defining
a generating process Γ = (F, π). Γ is a infinite discrete-time process which, at each time step t, generates a
1In the Sherlock Holmes novel A study in scarlet by A. Conan Doyle, Wiggins is the leader of the “Baker Street Irregulars”,
a band of street urchins employed by Holmes as intelligence agents.
2
collection of sets It ⊆ F such that each set S ∈ F is included in It with probability π(S), independently of
t and of other sets generated at time t and at time t0 < t. For any t and any S ∈ It, the ordered pair (t, S)
represents an item - a piece of information that was generated at time t and reached instantaneously the nodes
in S. We choose to model the diffusion process as instantaneous because this abstraction accurately models
the view of an outside resource-limited observer that does not have the resources to monitor simultaneously
all the nodes in the network at the fine time granularity needed to observe the different stages of the diffusion
process.
Probing and schedule. The observer can only monitor the network by probing nodes. Formally, by probing
a node v ∈ V at time t, we mean obtaining the set I(t, v) of items (t0, S) such that t0 ≤ t and v ∈ S:2
I(t, v) := {(t0, S) : t0 ≤ t, S ∈ It0, v ∈ S} .
Let Ut be the union of the sets It0 generated by Γ at any time t0 ≤ t, and so I(t, v) ⊆ Ut.
We model the resource limitedness of the observer through a constant, user-specified, parameter c ∈ N,
representing the maximum number of nodes that can be probed at any time, where probing a node v returns
the value I(t, v).
The observer chooses the c nodes to probe by following a schedule. In this work we focus on memoryless
schedules, i.e., the choice of nodes to probe at time t is independent from the choice of nodes probed at
any time t0 < t. More precisely, a probing c-schedule p is a probability distribution on V . At each time t,
the observer chooses a set Pt of c nodes to probe, such that Pt is obtained through random sampling of V
without replacement according to p, independently from Pt0 from t0 < t.
Caught items, uncaught items, and novelty. We say that an item (t0, S) is caught at time t ≥ t0 iff
1. a node v ∈ S is probed at time t; and
2. no node in S was probed in the interval [t0, t − 1].
Let Ct be the set of items caught by the observer at any time t0 ≤ t. We have Ct ⊆ Ut. Let Nt = Ut \ Ct
be the set of uncaught items at time t, i.e., items that were generated at any time t0 ≤ t and have not been
caught yet at time t. For any item (t0, S) ∈ Nt, we define the θ-novelty of (t0, S) at time t as
fθ(t, t0, S) := θt−t0
,
where θ ∈ (0, 1) is a user-specified parameter modeling how fast the value of an item decreases with time if
uncaught. Intuitively, pieces of information (e.g., rumors) have high value if caught almost as soon as they
have appeared in the network, but their value decreases fast (i.e., exponentially) as more time passes before
being caught, to the point of having no value in the limit.
Load of the system and cost of a schedule. The set Nt of uncaught items at time t imposes a θ-load,
Lθ(t), on the graph at time t, defined as the sum of the θ-novelty at time t of the items in Nt:
Lθ(t) := X
(t0,S)∈Nt
fθ(t, t0, S) .
The quantity Lθ(t) is a random variable, depending both on Γ and on the probing schedule p, and as such
it has an expectation E[Lθ(t)] w.r.t. all the randomness in the system. The θ-cost of a schedule p is defined
as the limit, for t → ∞, of the average expected load of the system:
costθ(p) := lim
t→∞
= lim
t→∞
1
t
1
t
X
X
t0≤t
t0≤t
E[Lθ(t)]
X
E
(t00,S)∈Nt0
.
fθ(t0, t00, S)
2The set S appears in the notation for an item only for clarity of presentation: we are not assuming that when we probe a
node and find an item (t, S) we obtain information about S.
3
We now have all the necessary ingredients to formally define the problem of interest in this work.
Intuitively, the load at each time indicates the amount of novelty we did not catch at that time, and the cost
function measures the average of such loss over time. The limit above always exists (Lemma 1).
Problem definition. Let G = (V, E) be a graph and Γ = (F, π) be a generating process on G. Let c ∈ N
and θ ∈ (0, 1). The (θ, c)-Optimal Probing Schedule Problem ((θ, c)-OPSP) requires to find the optimal
c-schedule p∗, i.e., the schedule with minimum θ-cost over the set Sc of c-schedules:
p∗ = arg min
p
{costθ(p), p ∈ Sc} .
Thus, the goal is to design a c-schedule that discovers the maximum number of items weighted by their
novelty value (which correspond to those generated most recently). The parameter θ controls how fast the
novelty of an item decays, and influences the choices of a schedule. When θ is closed to 0, items are relevant
only for a few steps and the schedule must focus on the most recently generated items, catching them as soon
as they are generated (or at most shortly thereafter). At the other extreme (θ ≈ 1), an optimal schedule
must maximizes the total number of discovered items, as their novelty decays very slowly.
Viewing the items as “information” disseminated in the network, an ideal schedule assigns higher probing
probability to nodes that act as information hubs, i.e., nodes that receive a large number of items. Thus, an
optimal schedule p∗, identifies information hubs among the nodes. This task (finding information hubs) can
be seen as the complement of the influence maximization problem [17, 18]. In the influence maximization
problem we look for a set of nodes that generate information that reach most nodes. In the information hubs
problem, we are interested in a set of nodes that receive the most of information, thus the most informative
nodes for an observer.
In the following sections, we may drop the specification of the parameters from θ-novelty, θ-cost, θ-load,
and c-schedule, and from their respective notation, as the parameters will be clear from the context.
3 Related Work
The novel problem we focus on in this work generalizes and complements a number of problems studied in
the literature.
The “Battle of Water Sensor Network” challenge [29] motivated a number of works on outbreak detection:
the goal is to optimally place static or moving sensors in water networks to detect contamination [13, 20, 24].
The optimization can be done w.r.t. a number of objectives, such as maximizing the probability of detection,
minimizing the detection time, or minimizing the size of the subnetwork affected by the phenomena [24].
A related work [1] considered sensors that are sent along fixed paths in the network with the goal of gath-
ering sufficient information to locate possible contaminations. Early detection of contagious outbreaks by
monitoring the neighborhood (friends) of a randomly chosen node (individual) was studied by Christakis
and Fowler [7]. Krause et al. [21] present efficient schedules for minimizing energy consumption in battery
operated sensors, while other works analyzed distributed solutions with limited communication capacities
and costs [11, 19, 22]. In contrast, our work is geared to detection in huge but virtual networks such as the
Web or social networks embedded in the Internet, where it is possible to “sense” or probe (almost) any node
at approximately the same cost. Still only a restricted number of nodes can be probed at each steps but the
optimization of the probing sequence is over a much larger domain, and the goal is to identify the outbreaks
(items) regardless of their size and solely by considering their interest value.
Our methods complement the work on Emerging Topic Detection where the goal is to identify emergent
topics in a social network, assuming full access to the stream of all postings. Providers, such as Twitter or
Facebook, have an immediate access to all tweets or postings as they are submitted to their server [4, 25].
Outside observers need an efficient mechanism to monitor changes, such as the methods developed in this
work.
Web-crawling is another research area that study how to obtain the most recent snapshots of the web.
However, it differs from our model in two key points: our model allows items to propagate their copies, and
they will be caught if any of their copies is discovered (where snapshots of a webpage belong to that page
only), and all the generated items should be discovered (and not just the recent ones) [8, 32].
4
The goal of News and Feed Aggregation problem is to capture updates in news websites (e.g. by RSS
feeds) [3, 15, 28, 30]. Our model differs from that setting in that we consider copies of the same news in
different web sites as equivalent and therefore are only interested in discovering one of the copies.
4 The WIGGINS Algorithm
In this section we present the algorithm wiggins (and its variants) for solving the Optimal Probing Schedule
Problem (θ, c)-OPSP for generating process Γ = (F, π) on a graph G = (V, E).
We start by assuming that we have complete knowledge of Γ, i.e., we know F and π. This strong
assumption allows us to study the theoretical properties of the cost function and motivates the design of
our algorithm, wiggins, to compute an optimal schedule. We then remove the assumption and show how
we can extend wiggins to only use a collection of observations from Γ. Then we discuss how to recalibrate
our algorithms when the parameters of the process (e.g., π or F) change over time. Finally, we show an
algorithm for the MapReduce framework that allows us to scale to large networks.
4.1 Computing the Optimal Schedule
We first conduct a theoretical analysis of the cost function costθ.
Analysis of the cost function Assume for now that we know Γ, i.e., we have complete knowledge of F
and π. Under this assumption, we can exactly compute the θ-cost of a c-schedule.
Lemma 1. Let p = (p1, . . . , pn) be a c-schedule. Then
cost(p) := lim
t→∞
1
t
tX
t0=0
E[Lθ(t0)] = X
S∈F
π(S)
1 − θ(1 − p(S))c ,
(1)
where p(S) =P
v∈S pv.
Proof. Let t be a time step, and consider the quantity E[Lθ(t)]. By definition we have
where Nt is the set of uncaught items at time t. Let now, for any t0 ≤ t, Nt,t0 ⊆ Nt be the set of uncaught
items in the form (t0, S). Then we can write
X
(t0,S)∈Nt
E[Lθ(t)] = E
fθ(t, t0, S)
tX
X
E[Lθ(t)] = E
t0=0
(t0,S)∈Nt,t0
,
θt−t0
= E
(t0,S)∈Nt
X
.
θt−t0
Define now, for each S ∈ F, the random variable XS,t0,t which takes the value θt−t0 if (t0, S) ∈ Nt,t0, and 0
otherwise. Using the linearity of expectation, we can write:
E[Lθ(t)] = X
= X
S∈F
tX
tX
t0=0
S∈F
t0=0
E[XS, t0, t]
θt−t0 Pr(XS,t,t0 = θt−t0) .
(2)
The r.v. XS,t,t0 takes value θt−t0 if and only if the following two events E1 and E2 both take place:
5
• E1: the set S ∈ F belongs to It0, i.e., is generated by Γ at time t0;
• E2: the item (t0, S) is uncaught at time t. This is equivalent to say that no node v ∈ S was probed in
the time interval [t0, t].
We have Pr(E1) = π(S), and
Pr(E2) = (1 − p(S))c(t−t0) .
The events E1 and E2 are independent, as the process of probing the nodes is independent from the process
of generating items, therefore, we have
Pr(XS,t,t0 = θt−t0) = Pr(E1) Pr(E2) = π(S)(1 − p(S))c(t−t0) .
We can plug this quantity in the rightmost term of (2) and write
lim
t→∞
E[Lθ(t)] = lim
t→∞
θt−t0
tX
π(S)(1 − p(S))c(t−t0)
(θ(1 − p(S))c)t
t0=0
π(S)
= lim
t→∞
= X
S∈F
t0=0
π(S)
1 − θ(1 − p(S))c ,
(3)
tX
X
X
S∈F
S∈F
Pt
tX
t
t0=0
1
t
where we used the fact that θ(1 − p(S))c < 1. We just showed that the sequence (E[Lθ(t)])t∈N converges as
t → ∞. Therefore, its Cesàro mean, i.e., limt→∞ 1
t0=0 E[Lθ(t)], equals to its limit [12, Sect. 5.4] and we
have
E[Lθ(t)] = lim
t→∞
E[Lθ(t)]
costθ(p) = lim
t→∞
= X
S∈F
π(S)
1 − θ(1 − p(S))c .
We now show that costθ(p), as expressed by the r.h.s. of (1) is a convex function over its domain Sc, the
set of all possible c-schedules. We then use this result to show how to compute an optimal schedule.
Theorem 1. The cost function costθ(p) is a convex function over Sc.
Proof. For any S ∈ F, let
fS(p) =
1 − θ(1 − p(S))c .
1
The function costθ(p) is a linear combination of fS(p)’s with positive coefficients. Hence to show that costθ(p)
is convex it is sufficient to show that, for any S ∈ F, fS(p) is convex.
We start by showing that gS(p) = θ(1 − p(S))c is convex. This is due to the fact that its Hessian matrix
is positive semidefinite [2]:
Let vS be a n × 1 vector in Rn such that its i-th coordinate is (cid:2)c(c − 1)(1 − p(S))c−2(cid:3)1/2 if i ∈ S, and 0
∂pi∂pj
0
gS(p) =
∂
i, j ∈ S
otherwise
(cid:26) θc(c − 1)(1 − p(S))c−2
otherwise. We can write the Hessian matrix of gS as
and thus, ∇2gS is positive semidefinite matrix and g is convex. From here, we have that 1 − gS is a concave
function. Since fS(p) =
x is convex and non-increasing, then fS is a convex
function.
1−gS(p) and the function h(x) = 1
1
∇2gS = VS ∗ V T
S ,
6
so is fS.
If for every v ∈ V , S = {v} belongs to F, then the function gS in the above proof is strictly convex, and
We then have the following corollary of Thm. 1.
Corollary 1. Any schedule p with locally minimum cost is an optimal schedule (i.e., it has global minimum
cost). Furthermore, if for every v ∈ V , {v} belongs to F, the optimal schedule is unique.
The algorithm Corollary 1 implies that one can compute an optimal c−schedule p∗ (i.e., solve the (θ, c)-
OPSP) by solving the unconstrained minimization of costθ over the set Sc of all c-schedules, or equivalently
by solving the following constrained minimization problem on Rn:
min
p∈Rn
costθ(p)
nX
i=1
pi = 1
pi ≥ 0
∀i ∈ {1, . . . , n}
(4)
Since the function costθ is convex and the constraints are linear, the optimal solution can, theoretically, be
found efficiently [2]. In practice though, available convex optimization problem solvers can not scale well
with the number n of variables, especially when n is in the millions as is the case for modern graphs like
online social networks or the Web. Hence we developed wiggins, an iterative method based on Lagrange
multipliers [2, Sect. 5.1], which can scale efficiently and can be adapted to the MapReduce framework of
computation [9], as we show in Sect. 4.4. While we can not prove that this iterative method always converges,
we can prove (Thm. 2) that (i) if at any iteration the algorithm examines an optimal schedule, then it will
reach convergence at the next iteration, and (ii) if it converges to a schedule, that schedule is optimal. In
Sect. 5 we show our experimental results illustrating the convergence of wiggins in different cases.
wiggins takes as inputs the collection F, the function π, and the parameters c and θ, and outputs a
schedule p which, if convergence (defined in the following) has been reached, is the optimal schedule. It starts
i = 1/n for all 1 ≤ i ≤ n, and iteratively refines it until convergence (or
from a uniform schedule p(0), i.e., p(0)
until a user-specified maximum number of iterations have been performed). At iteration j ≥ 1, we compute,
for each value i, 1 ≤ i ≤ n, the function
Wi(p(j−1)) := X
S∈F
s.t. i∈S
θcπ(S)(1 − p(j−1)(S))c−1
(1 − θ(1 − p(j−1)(S))c)2
(5)
and then set
p(j)
i =
Pn
p(j−1)
i Wi(p(j−1))
z=1 p(j−1)
z Wz(p(j−1))
.
The algorithm then checks whether p(j) = p(j−1). If so, then we reached convergence and we can return
p(j) in output, otherwise we perform iteration j + 1. The pseudocode for wiggins is in Algorithm 1. The
following theorem shows the correctness of the algorithm in case of convergence.
Theorem 2. We have that:
1. if at any iteration j the schedule p(j) is optimal, then wiggins reaches convergence at iteration j + 1;
and
2. if wiggins reaches convergence, then the returned schedule p is optimal.
Proof. From the method of the Lagrange multipliers [2, Sect. 5.1], we have that, if a schedule p is optimal,
then there exists a value λ ∈ R such that p and λ form a solution to the following system of n + 1 equations
in n + 1 unknowns:
∇[costθ(p) + λ(p1 + . . . + pn − 1)] = 0,
(6)
7
where the gradient on the l.h.s. is taken w.r.t. (the components of) p and to λ (i.e., has n + 1 components).
For 1 ≤ i ≤ n, the i-th equation induced by (6) is
or, equivalently,
X
S∈F
s.t.i∈S
∂
∂pi
costθ(p) + λ = 0,
θcπ(S)(1 − p(S))c−1
(1 − θ(1 − p(S))c)2 = λ .
nX
pz = 1 .
The term on the l.h.s. is exactly Wi(p). The (n + 1)-th equation of the system (6) (i.e., the one involving
the partial derivative w.r.t. λ) is
Consider now the first claim of the theorem, and assume that we are at iteration j such that j is the
minimum iteration index for which the schedule p(j) computed at the end of iteration j is optimal. Then,
for any i, 1 ≤ i ≤ n, we have
Wi(p(j)) = λ
z=1
because p(j) is optimal and hence all identities in the form of (7) must be true. For the same reason, (8)
must also hold for p(j). Hence, for any 1 ≤ i ≤ n, we can write the value p(j+1)
computed at the end of
iteration j + 1 as
i
p(j+1)
i
=
Pn
p(j)
i Wi(p(j))
z=1 p(j)
z Wz(p(j))
= p(j)
i λ
1λ
= p(j)
i
,
which means that we reached convergence and wiggins will return p(j+1), which is optimal.
we have, for any 1 ≤ i ≤ n,
Consider the second claim of the theorem, and let j be the first iteration for which p(j) = p(j−1). Then
p(j)
i =
This implies
Pn
p(j−1)
i Wi(p(j−1))
z=1 p(j−1)
nX
z Wz(p(j−1))
Wi(p(j−1)) =
p(j−1)
z Wz(p(j−1))
= p(j−1)
i
.
(7)
(8)
(9)
and the r.h.s. does not depend on i, and so neither does Wi(p(j−1)). Hence we have W1(p(j−1)) = ··· =
Wn(p(j−1)) and can rewrite (9) as
z=1
nX
z=1
Wi(p(j−1)) =
p(j−1)
z Wi(p(j−1)),
which implies that the identity (8) holds for p(j−1). Moreover, if we set
λ = W1(p(j−1))
we have that all the identities in the form of (7) hold. Then, p(j−1) and λ form a solution to the system (6),
which implies that p(j−1) is optimal and so must be p(j), the returned schedule, as it is equal to p(j−1)
because wiggins reached convergence.
8
Algorithm 1: wiggins
input : F, π, c, θ, and maximum number T of iterations
output: A c-schedule p (with globally minimum θ-cost, in case of convergence)
Wi ← 0
pi ← 1/n
for i ← 1 to n do
end
for S ∈ F do
1 for i ← 1 to n do
2
3 end
4 for j ← 1 to T do
5
6
7
8
9
10
11
12
13
14
15
end
end
pold ← p
for i ← 1 to n do
piWi
pi ← piWiP
for i ∈ S do
break
16
17
18
19
20 end
21 return p
end
Wi ← Wi + θcπ(S)(1−p(S))c−1
(1−θ(1−p(S))c)2
i
end
if pold = p then // test for convergence
4.2 Approximation through Sampling
We now remove the assumption, not realistic in practice, of knowing the generating process Γ exactly through
F and π. Instead, we observe the process using, for a limited time interval, a schedule that iterates over all
nodes (or a schedule that selects each node with uniform probability), until we have observed, for each time
step t in a limited time interval [a, b], the set It generated by Γ, and therefore we have access to a collection
(10)
We refer to I as a sample gathered in the time interval [a, b]. We show that a schedule computed with
respect to a sample I taken during an interval of ‘(I) = b − a = O(ε−2 log n) steps has cost which is within
a multiplicative factor ε ∈ [0, 1] of the optimal schedule. We then adapt wiggins to optimize with respect
to such sample.
I = {Ia,Ia+1, . . . ,Ib}.
We start by defining the cost of a schedule w.r.t. to a sample I.
Definition 1. Suppose p is a c-schedule and I is as in Equation (10), with ‘(I) = b − a. The θ-cost of p
w.r.t. to I denoted by costθ(p,I) is defined as
For 1 ≤ i ≤ n, define now the functions
costθ(p,I) := 1
‘(I)
X
Wi(p,I) = 1
‘(I)
S∈I:i∈S
9
X
S∈I
1
1 − θ(1 − p(S))c .
θc(1 − p(S))c−1
(1 − θ(1 − p(S))c)2 .
We can then define a variant of wiggins, which we call wiggins-apx. The differences from wiggins
are:
1. the loop on line 8 in Alg. 1 is only over the sets that appear in at least one Ij ∈ I.
2. wiggins-apx uses the values Wi(p,I) (defined above) instead of Wi(p) (line 10 in Alg. 1);
If wiggins-apx reaches convergence, it returns a schedule with the minimum cost w.r.t. the sample I.
More formally, by following the same steps as in the proof of Thm. 2, we can prove the following result about
wiggins-apx.
Lemma 2. We have that:
at iteration j + 1; and
1. if at any iteration j the schedule p(j) has minimum cost w.r.t. I, then wiggins-apx reaches convergence
2. if wiggins-apx reaches convergence, then the returned schedule p has minimum cost w.r.t. I.
Let ‘(I) denote the length of the time interval during which I was collected. For a c-schedule p, costθ(p,I)
is an approximation of costθ(p), and intuitively the larger ‘(I), the better the approximation.
We now show that, if ‘(I) is large enough, then, with high probability (i.e., with probability at least
1 − 1/nr for some constant r), the schedule p returned by wiggins-apx in case of convergence has a cost
costθ(p) that is close to the cost costθ(p∗) of an optimal schedule p∗.
Theorem 3. Let r be a positive integer, and let I be a sample gathered during a time interval of length
‘(I) ≥ 3(r ln(n) + ln(4))
ε2(1 − θ)
.
(11)
Let p∗ be an optimal schedule, i.e., a schedule with minimum cost. If wiggins-apx converges, then the
returned schedule p is such that
costθ(p∗) ≤ costθ(p) ≤ 1 + ε
1 − ε
To prove Thm. 3, we need the following technical lemma.
costθ(p∗) .
Lemma 3. Let p be a c-schedule and I be a sample gathered during a time interval of length
‘(I) ≥ 3(r ln(n) + ln(2))
ε2(1 − θ)
,
(12)
where r is any natural number. Then, for every schedule p we have
Pr(costθ(p,I) − costθ(p) ≥ ε · costθ(p)) <
1
nr .
Proof. For any S ∈ F, let XS be a random variable which is
otherwise. Since p(S) ∈ [0, 1], we have
S∈F XS, then
1 ≤ XS ≤ 1
1 − θ
costθ(p) = E[X] = X
E[XS] ≥ X
1−θ(1−p(S))c with probability π(S), and zero
1
.
If we let X =P
Let Z =P
S∈F π(S). Then we have
S∈F
S∈F
π(S) .
(13)
Z ≤ X ≤ Z
1 − θ
.
10
S be the i-th draw of XS, during the time interval I it was sampled from, and define X i =P
S.
S∈F X i
Let X i
We have
Let now
X
i
X i .
costθ(p) .
costθ(p,I) = 1
‘(I)
µ = ‘(I)(1 − θ)
Z
By using the Chernoff bound for Binomial random variables [27, Corol. 4.6], we have
Pr (costθ(p,I) − costθ(p) ≥ εcostθ(p))
!
X i − ‘(I)costθ(p)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)X
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)1 − θ
(cid:18)
Z
− ε2‘(I)(1 − θ)costθ(p)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ≥ ε‘(I)costθ(p)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ≥ εµ
!
(cid:18)
(cid:19)
− ε2µ
(cid:19)
(cid:18)
3
− ε2‘(I)(1 − θ)
≤ 2 exp
X
i
≤ 2 exp
i
= Pr
= Pr
≤ 2 exp
X i − µ
3Z
3
(cid:19)
,
where the last inequality follows from the rightmost inequality in (13). The thesis follows from our choice of
‘(I).
We can now prove Thm. 3.
of Thm. 3. The leftmost inequality is immediate, so we focus on the one on the right. For our choice of ‘(I)
we have, through the union bound, that, with probability at least 1 − 1/nr, at the same time:
(1 − ε)costθ(p) ≤ costθ(p,I)
(1 − ε)costθ(p∗) ≤ costθ(p∗,I)
≤ (1 + ε)costθ(p), and
≤ (1 + ε)costθ(p∗)
(14)
Since we assumed that wiggins-apx reached convergence when computing p, then Thm. 3 holds, and p is
a schedule with minimum cost w.r.t. I. In particular, it must be
costθ(p,I) ≤ costθ(p∗,I) .
From this and (14), We then have
(1 − ε)costθ(p) ≤ costθ(p,I) ≤ costθ(p∗,I) ≤ (1 + ε)costθ(p∗)
and by comparing the leftmost and the rightmost terms we get the thesis.
4.3 Dynamic Settings
In this section we discuss how to handle changes in the parameters F and π as the (unknown) generating
process Γ evolves over time. The idea is to maintain an estimation π(S) of π(S) for each set S ∈ F that we
discover in the probing process, together with the last time t such that an item (t, S) has been generated
(and caught at a time t0 > t). If we have not caught an item in the form (t00, S) in an interval significantly
longer than 1/π(S), then we assume that the parameters of Γ changed. Hence, we trigger the collection of
a new sample and compute a new schedule as described in Sect. 4.2.
Note that when we adapt our schedule to the new environment (using the most recent sample) the
system converges to its stable setting exponentially (in θ) fast. Suppose L items have been generated since
we detected the change in the parameters until we adapt the new schedule. These items, if not caught, loose
their novelty exponentially fast, since after t steps their novelty is at most Lθt and decreases exponentially.
In our experiments (Sect. 5) we provide different examples that illustrate how the load of the generating
process becomes stable after the algorithm adapts itself to the changes of parameters.
11
4.4 Scaling up with MapReduce
In this section, we discuss how to adapt wiggins-apx to the MapReduce framework [9]. We denote the
resulting algorithm as wiggins-mr.
In MapReduce, algorithms work in rounds. At each round, first a function map is executed independently
(and therefore potentially massively in parallel) on each element of the input, and a number (or zero) key-
value pairs of the form (k, v) are emitted. Then, in the second part of the round, the emitted pairs are
partitioned by key and elements with the same key are sent to the same machine (called the reducer for that
key), where a function reduce is applied to the whole set of received pairs, to emit the final output.
Each iteration of wiggins-apx is spread over two rounds of wiggins-mr. At each round, we assume
that the current schedule p is available to all machines (this is done in practice through a distributed cache).
In the first round, we compute the values piWi, 1 ≤ i ≤ n, in the second round these values are summed to
get the normalization factor, and in the third round the schedule p is updated. The input in the first round
are the sets S ∈ I. The function map1(S) outputs, a key-value pair (i, vS) for each i ∈ S, with
vS =
θc(1 − p(S))c−1
‘(I)(1 − θ(1 − p(S))c)2 .
The reducer for the key i receives the pairs (i, vS) for each S ∈ I such that i ∈ S, and aggregates them to
output the pair (i, gi), with
X
gi = pi
vS = piWi .
The set of pairs (i, gi), 1 ≤ i ≤ n constitutes the input to the next round. Each input pair is sent to the
same reducer,3 which computes the value
nX
g =
gi =
nX
piWi
and uses it to obtain the new values pi = gi/g, for 1 ≤ i ≤ n. The reducer then outputs (i, pi). At this
point, the new schedule is distributed to all machines again and a new iteration can start.
The same results we had for the quality of the final schedule computed by wiggins-apx in case of
convergence carry over to wiggins-mr.
i=1
i=1
5 Experimental Results
In this section we present the results of our experimental evaluation of wiggins-apx.
Goals. First, we show that for a given sample I, wiggins-apx converges quickly to a schedule p∗ that mini-
mizes costθ(p,I) (see Thm. 2). In particular, our experiments illustrate that the sequence costθ(p(1),I), costθ(p(2),I), . . .
is descending and converges after few iterations. Next, we compare the output schedule of wiggins-apx to
four other schedules: (i) uniform schedules, (ii) proportional to out-degrees, (iii) proportional to in-degrees,
and (iv) proportional to undirected degrees, i.e., the number of incident edges. Specifically, we compute
the costs of these schedules according to a sample I that satisfies the condition in Lemma 3 and compare
them. Then, we consider a specific example for which we know the unique optimal schedule, and show that
for larger samples wiggins-apx outputs a schedule closer to the optimal. Finally, we demonstrate how our
method can adapt itself to the changes in the network parameters.
Environment and Datasets. We implemented wiggins-apx in C++. The implementation of wiggins-
apx never loads the entire sample to the main memory, which makes it very practical when using large
samples. The experiments were run on a Opteron 6282 SE CPU (2.6 GHz) with 12GB of RAM. We tested
our method on graphs from the SNAP repository4 (see Table 1 for details). We always consider the graphs
to be directed, replacing undirected edges with two directed ones.
3This step can be made more scalable through combiners, an advanced MapReduce feature.
4http://snap.stanford.edu
12
Datasets
Enron-Email
Brightkite
web-Notredame
web-Google
#nodes #edges
367662
428156
1497134
5105039
36692
58228
325729
875713
(V1K,V500,V100)
(9,23,517)
(2,7,399)
(43,80,1619)
(134,180,3546)
gen. rate
7.22
4.54
24.49
57.86
Table 1: The datasets, corresponding statistics, and the rate of generating new items at each step.
Generating process. The generating process Γ = (F, π) we use in our experiments (except those in
Sect. 5.1.1) simulates an Independent-Cascade (IC) model [17]. Since explicitly computing π(S) in this case
does not seem possible, we simulate the creation of items according to this model as follows. At each time
t, items are generated in two phases: a “creation” phase and a “diffusion” phase. In the creation phase, we
simulate the creation of “rumors” at the nodes: we flip a biased coin for each node in the graph, where the
bias depends on the out-degree of the node. We assume a partition of the nodes into classes based on their
out-degrees, and, we assign the same head probability for the biased coins of nodes in the same class, as
shown in Table 2. In Table 1, for each dataset we report the size of the classes and the expected number
of flipped coins with outcome head at each time (rightmost column). Let now v be a node whose coin had
Class
V1K
V500
V100
V0
Nodes in class
{i ∈ V : deg+(i) ≥ 1000}
{i ∈ V : 500 ≤ deg+(i) < 1000}
{i ∈ V : 100 ≤ deg+(i) < 500}
{i ∈ V : deg+(i) < 100}
Bias
0.1
0.05
0.01
0.0
Table 2: Classes and bias for the generating process.
outcome head in the most recent flip. In the “diffusion” phase we simulate the spreading of the “rumor”
originating at v through network according to the IC model, as follows. For each directed edge e = u → w we
fix a probability pe that a rumor that reached u is propagated through this edge to node w (as in IC model),
and events for different rumors and different edges are independent. Following the literature [5, 6, 16, 17, 31],
we use pu→w =
deg−(w). If we denote with S the final set of nodes that the rumor created at v reached
during the (simulated) diffusion process (which always terminates), we have that through this process we
generated an item (t, S), without the need to explicitly define π(S).
1
5.1 Efficiency and Accuracy
In Sect. 4.1 we showed that when a run of wiggins-apx converges (according to a sample I) the computed
c-schedule is optimal with respect to the sample I (Lemma 2). In our first experiment, we measure the rate
of convergence and the execution time of wiggins-apx. We fix = 0.1, θ = 0.75, and consider c ∈ {1, 3, 5}.
For each dataset, we use a sample I that satisfies (12), and run wiggins-apx for 30 iterations. Denote the
schedule computed at round i by pi. As shown in Figure 1, the sequence of cost values of the schedules pi’s,
costθ(pi,I), converges extremely fast after few iterations.
For each graph, the size of the sample I, the average size of sets in I, and the average time of each
iteration is given in Table 3. Note that the running time of each iteration is a function of both sample size
and sizes of the sets (informed-sets) inside the sample.
Next, we extract the 1-schedules output by wiggins-apx, and compare its cost to four other natural
schedules: unif, outdeg, indeg, and totdeg that probe each node, respectively, uniformly, proportional to
its out-degree, proportional to its in-degree, and proportional to the number of incident edges. Note that
for undirected graphs outdeg, indeg, and totdeg are essentially the same schedule.
13
Figure 1: The cost of intermediate c-schedules at iterations of wiggins-apx according to I.
14
iterations051015202530cost789101112131415ENRON-EMAILc=1c=3c=5iterations051015202530cost45678910BRIGHTKITEc=1c=3c=5iterations051015202530cost9192939495969798WEB-NOTREDAMEc=1c=3c=5iterations051015202530cost195200205210215220225230235WEB-GOOGLEc=1c=3c=5Datasets
Enron-Email
Brightkite
web-Notredame
web-Google
I
97309
63652
393348
998038
avg. item size
12941.33
17491.08
183.75
704.74
avg. iter. time (sec)
204.59
144.35
10.24
121.88
Table 3: Sample size, average size of items in the sample, and the running time of each iteration in wiggins-apx (for c = 1).
To have a fair comparison among the costs of these schedules and wiggins-apx, we calculate their costs
according to 10 independent samples, I1, . . . ,I10 that satisfy (12), and compute the average. The results
are shown in Table 4, and show that wiggins-apx outperforms the other four schedules.
Dataset
Enron-Email
Brightkite
web-Notredame
web-Google
wiggins-apx uniform
14.16
9.64
97.78
230.88
7.55
4.85
96.10
213.15
outdeg
9.21
6.14
97.37
230.48
indeg
9.21
6.14
97.43
230.47
totdeg
9.21
6.14
97.40
230.47
Table 4: Comparing the costs of 5 different 1-schedules.
5.1.1 A Test on Convergence to Optimal Schedule
Here, we further invetigate the convergence of wiggins-apx, using an example graph and process for which
we know the unique optimal schedule. We study how close the wiggins-apx output is to the optimal
schedule when (i) we start from different initial schedules, p0, or (ii) we use samples I’s obtained during
time intervals of different lengths.
Suppose G = (V, E) is the complete graph where V = [n]. Let Γ = (F, π) for F = {S ∈ 2[n] 1 ≤ S ≤ 2},
F. It is easy to see that costθ(p) is a symmetric function, and thus, the uniform schedule is
and π(S) = 1
optimal. Moreover, by Corollary 1 the uniform schedule is the only optimal schedule, since {v} ∈ F for
every v ∈ V . Furthermore, we let θ = 0.99 to increase the sample complexity (as in Lemma 3) and make it
harder to learn the uniform/optimal schedule.
In our experiments we run the wiggins-apx algorithm, using (i) different random initial schedules, and
(ii) samples I obtained from time intervals of different lengths. For each sample, we run wiggins-apx
10 times with 10 different random initial schedules, and compute the exact cost of each schedule, and its
variation distance to the uniform schedule. Our results are plotted in Figure 2, and as shown, by increasing
the sample size (using longer time intervals of sampling) the output schedules gets very close to the uniform
schedule (the variance gets smaller and smaller).
5.2 Dynamic Settings
In this section, we present experimental results that show how our algorithm can adapt itself to the new
situation. The experiment is illustrated in Fig. 3. For each graph, we start by following an optimal 1-
schedule in the graph. At the beginning of each “gray” time interval, the labels of the nodes are permuted
randomly, to impose great disruptions in the system. Following that, at the beginning of each “green” time
interval our algorithm starts gathering samples of Γ. Then, wiggins-apx computes the schedule for the
new sample, using 50 rounds of iterations, and starts probing. The length of each colored time interval is
R = 3(log(n)+log(2))
, = 0.5, motivated by Theorem 3.
2(1−θ)
Since the cost function is defined asymptotically (and explains the asymptotic behavior of the system
in response to a schedule), in Figure 3 we plot the load of the system Lθ(t) over the time (blue), and the
15
Figure 2: The cost of wiggins-apx outputs and their variation distance to the optimal schedule.
average load in the normal and perturbed time intervals (red). Based on this experiment, and as shown
in Figure 3, after adapting to the new schedule, the effect of the disruption caused by the perturbation
disappears immediately. Note that when the difference between the optimal cost and any other schedule is
small (like web-Notredame), the jump in the load will be small (e.g., as shown in Figure 1 and Table 4, the
cost of the initial schedule for web-Notredame is very close the optimal cost, obtained after 30 iteration).
6 Conclusions
We formulate and study the (θ, c)-Optimal Probing Schedule Problem, which requires to find the best probing
schedule that allows an observer to find most pieces of information recently generated by a process Γ, by
probing a limited number of nodes at each time step.
We design and analyze an algorithm, wiggins, that can solve the problem optimally if the parameters
of the process Γ are known, and then design a variant that computes a high-quality approximation of the
optimum schedule when only a sample of the process is available. We also show that wiggins can be adapted
to the MapReduce framework of computation, which allows us to scale up to networks with million of nodes.
The results of experimental evaluation on a variety of graphs and generating processes show that wiggins
and its variants are very effective in practice.
Interesting directions for future work include generalizing the problem to allow for non-memoryless sched-
ules and different novelty functions.
7 Acknowledgements
This work was supported by NSF grant IIS-1247581 and NIH grant R01-CA180776.
16
length of time interval51020501002005001K2K5K10K20Kcost405060708090length of time interval51020501002005001K2K5K10K20Kvariation distance00.10.20.30.40.50.60.70.80.9Figure 3: Perturbation, Sampling, and Adapting (For details see Section 5.2).
17
time50010001500200025003000load51015202530Enron-Emailtime50010001500200025003000load2468101214161820Brightkitetime5001000150020002500300035004000load180190200210220230240250260web-Googletime500100015002000250030003500load708090100110120web-NotredameReferences
[1] M. Agumbe Suresh, R. Stoleru, R. Denton, E. Zechman, and B. Shihada. Towards optimal event
detection and localization in acyclic flow networks.
In Proceedings of the 13th International Con-
ference on Distributed Computing and Networking, ICDCN’12, pages 179–196, Berlin, Heidelberg,
2012. Springer-Verlag.
ISBN 978-3-642-25958-6. doi: 10.1007/978-3-642-25959-3_13. URL http:
//dx.doi.org/10.1007/978-3-642-25959-3_13.
[2] S. Boyd and L. Vandenberghe. Convex optimization. Cambridge university press, 2004.
[3] L. Bright, A. Gal, and L. Raschid. Adaptive pull-based policies for wide area data delivery. ACM
Transactions on Database Systems (TODS), 31(2):631–671, 2006.
[4] M. Cataldi, L. Di Caro, and C. Schifanella. Emerging topic detection on Twitter based on temporal
and social terms evaluation. In Proceedings of the Tenth International Workshop on Multimedia Data
Mining, MDMKDD ’10, pages 4:1–4:10, New York, NY, USA, 2010. ACM. ISBN 978-1-4503-0220-3.
doi: 10.1145/1814245.1814249. URL http://doi.acm.org/10.1145/1814245.1814249.
[5] W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In Proceedings
of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD
’09, pages 199–208, New York, NY, USA, 2009. ACM. ISBN 978-1-60558-495-9. doi: 10.1145/1557019.
1557047. URL http://doi.acm.org/10.1145/1557019.1557047.
[6] W. Chen, C. Wang, and Y. Wang. Scalable influence maximization for prevalent viral marketing in large-
scale social networks. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining, KDD ’10, pages 1029–1038, New York, NY, USA, 2010. ACM. ISBN 978-1-
4503-0055-1. doi: 10.1145/1835804.1835934. URL http://doi.acm.org/10.1145/1835804.1835934.
[7] N. A. Christakis and J. H. Fowler. Social network sensors for early detection of contagious outbreaks.
PLoS ONE, 5(9):e12948, 2010.
[8] A. Dasgupta, A. Ghosh, R. Kumar, C. Olston, S. Pandey, and A. Tomkins. The discoverability of the
web. In Proceedings of the 16th international conference on World Wide Web, pages 421–430. ACM,
2007.
[9] J. Dean and S. Ghemawat. Mapreduce: simplified data processing on large clusters. Communications
of the ACM, 51(1):107–113, 2008.
[10] A. Delaney.
The Growing Role of News in Trading Automation, Oct. 2009.
http://www.
machinereadablenews.com/images/dl/Machine_Readable_News_and_Algorithmic_Trading.pdf.
[11] D. Golovin, M. Faulkner, and A. Krause. Online distributed sensor selection. In Proceedings of the 9th
ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN ’10, pages
220–231, New York, NY, USA, 2010. ACM. ISBN 978-1-60558-988-6. doi: 10.1145/1791212.1791239.
URL http://doi.acm.org/10.1145/1791212.1791239.
[12] G. H. Hardy. Divergent series, volume 334. American Mathematical Soc., 1991.
[13] W. Hart and R. Murray. Review of sensor placement strategies for contamination warning systems
in drinking water distribution systems. Journal of Water Resources Planning and Management, 136
(6):611–619, 2010. doi: 10.1061/(ASCE)WR.1943-5452.0000081. URL http://ascelibrary.org/doi/
abs/10.1061/%28ASCE%29WR.1943-5452.0000081.
[14] B. Hope. How computers trawl a sea of data for stock picks. The Wall Street Journal, Apr. 2015. http:
//www.wsj.com/articles/how-computers-trawl-a-sea-of-data-for-stock-picks-1427941801?
KEYWORDS=computers+trawl+sea.
18
[15] R. Horincar, B. Amann, and T. Artières. Online refresh strategies for content based feed aggregation.
World Wide Web, pages 1–35, 2014.
[16] K. Jung, W. Heo, and W. Chen. IRIE: Scalable and robust influence maximization in social networks.
arXiv preprint arXiv:1111.4795, 2011.
[17] D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network.
In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data
Mining, KDD ’03, pages 137–146, New York, NY, USA, 2003. ACM. ISBN 1-58113-737-0. doi: 10.
1145/956750.956769. URL http://doi.acm.org/10.1145/956750.956769.
[18] D. Kempe, J. Kleinberg, and E. Tardos. Influential nodes in a diffusion model for social networks. In Pro-
ceedings of the 32Nd International Conference on Automata, Languages and Programming, ICALP’05,
pages 1127–1138, Berlin, Heidelberg, 2005. Springer-Verlag. ISBN 3-540-27580-0, 978-3-540-27580-0.
doi: 10.1007/11523468_91. URL http://dx.doi.org/10.1007/11523468_91.
[19] A. Krause and C. Guestrin. Submodularity and its applications in optimized information gathering.
ACM Trans. Intell. Syst. Technol., 2(4):32:1–32:20, July 2011. ISSN 2157-6904. doi: 10.1145/1989734.
1989736. URL http://doi.acm.org/10.1145/1989734.1989736.
[20] A. Krause, J. Leskovec, C. Guestrin, J. VanBriesen, and C. Faloutsos. Efficient sensor placement
optimization for securing large water distribution networks. Journal of Water Resources Planning
and Management, 134(6):516–526, 2008. doi: 10.1061/(ASCE)0733-9496(2008)134:6(516). URL http:
//ascelibrary.org/doi/abs/10.1061/%28ASCE%290733-9496%282008%29134%3A6%28516%29.
[21] A. Krause, R. Rajagopal, A. Gupta, and C. Guestrin. Simultaneous placement and scheduling of
In Proceedings of the 2009 International Conference on Information Processing in Sensor
ISBN
sensors.
Networks, IPSN ’09, pages 181–192, Washington, DC, USA, 2009. IEEE Computer Society.
978-1-4244-5108-1. URL http://dl.acm.org/citation.cfm?id=1602165.1602183.
[22] A. Krause, C. Guestrin, A. Gupta, and J. Kleinberg. Robust sensor placements at informative and
ISSN 1550-
communication-efficient locations. ACM Trans. Sen. Netw., 7(4):31:1–31:33, Feb. 2011.
4859. doi: 10.1145/1921621.1921625. URL http://doi.acm.org/10.1145/1921621.1921625.
[23] N. L. Latar. The robot journalist in the age of social physics: The end of human journalism? In The
New World of Transitioned Media, pages 65–80. Springer, 2015.
[24] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. M. VanBriesen, and N. S. Glance. Cost-effective
outbreak detection in networks. In P. Berkhin, R. Caruana, and X. Wu, editors, KDD, pages 420–429.
ACM, 2007. ISBN 978-1-59593-609-7.
[25] M. Mathioudakis and N. Koudas. Twittermonitor: Trend detection over the twitter stream. In Proceed-
ings of the 2010 ACM SIGMOD International Conference on Management of Data, SIGMOD ’10, pages
1155–1158, New York, NY, USA, 2010. ACM. ISBN 978-1-4503-0032-2. doi: 10.1145/1807167.1807306.
URL http://doi.acm.org/10.1145/1807167.1807306.
[26] W. McKinney.
Structured Data Challenges in Finance and Statistics, Nov. 2011.
slideshare.net/wesm/structured-data-challenges-in-finance-and-statistics.
http://www.
[27] M. Mitzenmacher and E. Upfal. Probability and Computing: Randomized Algorithms and Probabilistic
Analysis. Cambridge University Press, 2005.
[28] M. Oita and P. Senellart. Deriving dynamics of web pages: A survey. In TWAW (Temporal Workshop
on Web Archiving), 2011.
19
[29] A. Ostfeld, J. Uber, E. Salomons, J. Berry, W. Hart, C. Phillips, J. Watson, G. Dorini, P. Jonker-
gouw, Z. Kapelan, F. di Pierro, S. Khu, D. Savic, D. Eliades, M. Polycarpou, S. Ghimire, B. Barkdoll,
R. Gueli, J. Huang, E. McBean, W. James, A. Krause, J. Leskovec, S. Isovitsch, J. Xu, C. Guestrin,
J. VanBriesen, M. Small, P. Fischbeck, A. Preis, M. Propato, O. Piller, G. Trachtman, Z. Wu,
and T. Walski. The battle of the water sensor networks (BWSN): A design challenge for engi-
neers and algorithms. Journal of Water Resources Planning and Management, 134(6):556–568, 2008.
doi: 10.1061/(ASCE)0733-9496(2008)134:6(556). URL http://ascelibrary.org/doi/abs/10.1061/
%28ASCE%290733-9496%282008%29134%3A6%28556%29.
[30] K. C. Sia, J. Cho, and H.-K. Cho. Efficient monitoring algorithm for fast news alerts. Knowledge and
Data Engineering, IEEE Transactions on, 19(7):950–961, 2007.
[31] Y. Tang, X. Xiao, and Y. Shi. Influence maximization: Near-optimal time complexity meets practical
efficiency. arXiv preprint arXiv:1404.0900, 2014.
[32] J. L. Wolf, M. S. Squillante, P. Yu, J. Sethuraman, and L. Ozsen. Optimal crawling strategies for web
search engines. In Proceedings of the 11th international conference on World Wide Web, pages 136–147.
ACM, 2002.
20
|
1706.10035 | 1 | 1706 | 2017-06-30T06:30:32 | Investigating the potential of social network data for transport demand models | [
"cs.SI",
"physics.soc-ph"
] | Location-based social network data offers the promise of collecting the data from a large base of users over a longer span of time at negligible cost. While several studies have applied social network data to activity and mobility analysis, a comparison with travel diaries and general statistics has been lacking. In this paper, we analysed geo-referenced Twitter activities from a large number of users in Singapore and neighbouring countries. By combining this data, population statistics and travel diaries and applying clustering techniques, we addressed detection of activity locations, as well as spatial separation and transitions between these locations. Kernel density estimation performs best to detect activity locations due to the scattered nature of the twitter data; more activity locations are detected per user than reported in the travel survey. The descriptive analysis shows that determining home locations is more difficult than detecting work locations for most planning zones. Spatial separations between detected activity locations from Twitter data - as reported in a travel survey and captured by public transport smart card data - are mostly similarly distributed, but also show relevant differences for very short and very long distances. This also holds for the transitions between zones. Whether the differences between Twitter data and other data sources stem from differences in the population sub-sample, clustering methodology, or whether social networks are being used significantly more at specific locations must be determined by further research. Despite these shortcomings, location-based social network data offers a promising data source for insights into activity locations and mobility patterns, especially for regions where travel survey data is not readily available. | cs.SI | cs | Investigating the potential of social network data for
transport demand models
Michael A.B. van Eggermond,1∗ Haohui Chen,2,3
Alexander Erath,1,4 Manuel Cebrian2
1Future Cities Laboratory, Singapore ETH Centre, Singapore
2Data61, Commonwealth Scientific and Industrial Research Organization, Australia
3Monash University, Australia
4IVT, ETH Zurich, Switzerland
∗To whom correspondence should be addressed; E-mail: [email protected].
June 30, 2017
7
1
0
2
n
u
J
0
3
]
I
S
.
s
c
[
1
v
5
3
0
0
1
.
6
0
7
1
:
v
i
X
r
a
Abstract
Location-based social network data offers the promise of collecting the data from a large
base of users over a longer span of time at negligible cost. While several studies have
applied social network data to activity and mobility analysis, a comparison with travel
diaries and general statistics has been lacking.
In this paper, we analyzed geo-referenced Twitter activities from a large number
of users in Singapore and neighboring countries. By combining this data, population
statistics and travel diaries and applying clustering techniques, we addressed detection of
activity locations, as well as spatial separation and transitions between these locations.
We had large numbers of Twitter users in the data set collected over a period of 8
months; however, due to the scattered nature of the data, only a group comparable to
a travel survey turned out to be useful for further analysis. Kernel density estimation
performs best to detect activity locations; more activity locations are detected per user
than reported in the travel survey.
The descriptive analysis shows that determining home locations is more difficult than
detecting work locations for most planning zones. Spatial separations between detected
activity locations from Twitter data - as reported in a travel survey and captured by
public transport smart card data - are mostly similarly distributed, but also show relevant
differences for very short and very long distances. This also holds for the transitions
between zones.
Whether the differences between Twitter data and other data sources stem from differ-
ences in the population sub-sample, clustering methodology, or whether social networks
are being used significantly more at specific locations must be determined by further
research.
Despite these shortcomings, location-based social network data offers a promising
data source for insights in activity locations and mobility patterns, especially for regions
where travel survey data is not readily available.
1
1
Introduction
The well-established four-step transport model, as well as state-of-the art agent-based
models, have relied on the same data sources over the last several decades. Traditional
data sources included, but were not limited to, travel diary surveys, population censuses,
business censuses, road networks and transit schedules.
Travel diary surveys collect information on individuals and their households; along
with trip information, they also cover information on activities and locations visited over
the course of one day. Population and business censuses provide insight into (aggregate)
population statistics by home and work location. These and other strands of data are
then combined to quantify travel demand for a general population used in transport
models.
Shortcomings of travel diaries include the common under-reporting of short trips; it
is also difficult to sample from all potential user groups over a longer time span in study
regions due to time and budget limitations. Furthermore, both travel diary surveys and
censuses were usually conducted every 5 to 10 years, with access for researchers and the
general public sometimes restricted.
Social network data offers the chance to observe users over a larger time span for very
low costs. Previous research investigated activity and mobility patterns [Hasan et al.,
2013] a) and focused on the recognition of mobility patterns in a range of cities [Noulas
et al., 2012]. These studies have shown the possibilities of using social network data;
however, a comparison with travel diaries or other transport related data sources was
lacking.
In this paper, we investigate the possibilities of using publicly available social network
data for transport planning purposes. More specifically, we try to investigate the possibil-
ity of using Twitter data's spatial and temporal information to complement, or replace,
travel diaries. We collected data from the social networking and micro-blogging service
Twitter for 8 months for Singapore and neighboring countries Malaysia, Indonesia and
Thailand. To test the validity of travel patterns derived from this data, we compared it
to Singapore's household interview travel survey and one week of public transport smart
card data. By merging these data sources and applying several clustering methods, we
addressed the following questions:
1. Is it possible to recognize activity locations from social network data and, if so, do
the detected activity locations correspond to activity locations reported in other,
more traditional transport data sources?
2. Is the spatial separation between detected activity locations comparable to distances
between reported activity locations from travel diaries?
3. Is it possible to derive origin destination matrices from social network data and how
do these matrices correspond to observed trips?
The remainder of this paper is structured as follows. Section 2 continues with a
literature review. Section 3 provides an overview of the used data sources, methodology
is presented in section 4and results are presented in section 5. Section 6 concludes with
the discussion and outlook.
2
2 Background
2.1 Data collection for transport planning and modeling
The normal method for obtaining travel behavior data was a one-day travel diary sur-
vey, which collected data for a representative day with the representative peak hour [e.g.
Ort´uzar and Willumsen, 2011]. In travel diaries, data is gathered about household, per-
son and travel behavior characteristics, including household income, residential location,
dwelling type, etc. Trip data includes a start time, end time, mode(s) used, number of
transfers and trip purpose. Activity duration is derived from the difference between the
trip end time and trip start time of subsequent trips.
In the case of the classic four-step model [e.g. Ort´uzar and Willumsen, 2011] and,
more recently, activity-based models [e.g. Axhausen and Garling, 1992], this data was
used for trip generation, activity chain generation, trip distribution, modal choice and
traffic assignment models. In addition to these models, information was required about
zonal productions and zonal attractions (e.g. number of household, workplaces, leisure
locations).
While travel diary data often effectively captured travel demand patterns, it is well
known that data collection method details (like exact departure time and arrival, route
taken and number of activity locations) hindered adequate surveys. To obtain more
detailed user data, state-of-the-art travel surveys included, or were supplemented by,
GPS data.
Subsequently, numerous studies have assessed the accuracy of one-day travel surveys.
Wolf [2004] reported that the rate of missing trips ranged from 11% to 81%, when com-
paring the results of computer assisted telephone surveys and GPS data in six household
surveys in the US. Forrest and Pearson [2005] found that the number of trips observed
in GPS data in their 2002 survey was much higher than the number of trips reported
by respondents. Home-based non-work and non-home-based trips suffered most from
under-reporting.
In both these studies, in-vehicle GPS units were used to assess the
accuracy of survey response. Stopher et al. [2007] found a lower percentage of missing
trips when comparing results of a travel survey conducted by face-to-face interviews and
hand-held GPS devices. In their analysis of missing trips, they found that people per-
forming many trips under-report them. Other problems occurred with trips conducted
after 5pm, non-motorized trips and activities with a duration under 10 minutes.
Transport planners and researchers know that one-day travel surveys do not capture
the full range of activities by individuals and households, such as social visits, leisure
activities and shopping.
Since the Uppsala Travel Survey of 1971, a number of multi-day and multi-week
travel surveys have been conducted, despite the higher costs, survey fatigue and low
response rates typical for longer surveys. Schlich and Axhausen [2003] introduced different
methods to measure the similarity of day-to-day travel behavior in a six-week travel
survey conducted in Karsruhe and Halle, Germany [Axhausen et al., 2002]. They showed
that behavior is neither totally repetitious, nor totally variable. The different methods
employed to measure similarity showed that travel is more stable on workdays and that
at least two weeks of data was required to measure similarity.
An increasing number of cities, regions and countries have adopted public transport
smart cards. While the main objective of these systems is to collect revenue, another
result is very detailed data of onboard transactions that can be used for numerous ap-
plications [Pelletier et al., 2011]. Depending on the type of implementation of the smart
3
card system, a trip start time and/or end time are available to the transport company.
Disadvantages of smart card data include the lack of trip purpose and the lack of knowl-
edge about exact origin and destination location of a public transport user's trip [Bagchi
and White, 2005]. Despite these disadvantages, it is still possible to extract trip distance,
trip duration (excluding waiting time) and an individual's approximate time spent at a
location [e.g. Chakirov and Erath, 2012].
Several studies have already explored the possibility of using mobile phone Call Detail
Records (CDR) to estimate origin destination matrices Calabrese et al. [2011], Wang et al.
[2011], Iqbal et al. [2014]. Iqbal et al. [2014] point out that, while it is possible to extract
trip patterns from mobile phone data, heterogeneity exists in call rates from different
locations, leading to biased results.
2.2 Social network data
Social network services build on the real-life social networks of people through online
platforms to share ideas, activities and interests; the increasing availability of location-
acquisition technology offers the extra possibility for people to add a location dimension
to existing social networks in various ways [Zheng, 2011].
Within the field of transport modeling, location-based social network data has been
used to classify users' activity patterns [Hasan and Ukkusuri, 2014], detected traffic
anomalies [Pan et al., 2013], reconstructed popular traffic routes [Wei et al., 2012], rec-
ognized mobility patterns in a range of cities [Noulas et al., 2012] and modeled human
location [Lichman and Smyth, 2014].
While an increasing number of studies use geo-tagged social network data, less atten-
tion is being paid to the social network data's representation of the general population
[Grossenbacher, 2014]. One analysis stated [Haklay, 2012]:
In digiplace the wealthy, powerful, educated and mostly male elite is amplified through
multiple digital representations. Moreover, the frequent decision of algorithm designers to
highlight and emphasise those who submit more media, and the level of 'digital cacophony'
that more active contributors create, means that a very small minority - arguably outliers
in every analysis of normal distribution of human activities - are super empowered.
However, location-based social network data comes with a larger sample size for a
longer period without any significant costs [Hasan and Ukkusuri, 2014]. Several disad-
vantages limit the use of traditional econometric tools for these data sets [Hasan and
Ukkusuri, 2014]: (i) they do not provide detailed descriptions of activities, such as start
and end times and activities can be either at static locations or en-route (ii) individuals
are recognized only by an identifier without additional information on individual socio-
economic characteristics; (iii) the data has missing activities, since the only activities
observed are those an individual shares in social media. In addition to this last point, it
should also be noted that only users active in social media are included.
3 Data collection & preparation
3.1 Study region
The availability of a travel diary survey, public transport smart card data and a broad
Twitter user base made Singapore an ideal case study to answer our research questions.
4
Singapore is located in Southeast Asia with a land area of 712 km2, a permanent residen-
tial population of 3.77 million and a total population of 5.08 million in 2010, compared
to respectively 697 km2, 3.27 million and 4.03 million in 2000. GNI per capita amounts
to US$ 54,580, 2013), which makes it one of the wealthiest countries in (Southeast) Asia.
3.2 Social network data
The social networking and microblogging service Twitter was launched in 2006. At the
end of March 2014, there were 255 million average monthly active users (MAUs), of which
198 million mobile MAUs [Twitter, 2014a]. Together, these users send 500 million tweets
per day [Twitter, 2014b].
As opposed to many other social networking sites, Twitter offers the opportunity to
download users' profiles and Twitter messages, or tweets, including the geo-location of
the tweet; it also includes an indicator whether it was sent from a mobile device, or from
a computer in real-time.
When downloading data from Twitter, one can specify a geographic area. For this
research, we have specified the bounding box 'Singapore', shown in Figure 1. In total,
4,121,433 tweets were collected during the period from September 10, 2013 to February
27, 2014. While a geographic bounding box has been specified, not all tweets are geo-
tagged with a longitude and latitude and not all tweets are located in Singapore. Table
1 lists the number of users, tweets, geo-tagged tweets and tweets in Singapore.
Additionally, an indicator has been included to see whether a user has tweeted 10
times or more within the time span specified earlier. One sees that only 29% of users
Tweet 10 times or more within this period, but that these users contribute over 90% of
the tweets. Table 1 highlights these statistics and provides a range of other figures on
smart card data, the Singaporean travel diary survey and Twitter data. These figures
will be discussed later in this section.
3.3 Smart card data
Singapore's public transport card was introduced in April 2002; smart cards can be used
island-wide for payment of all modes of public transport, regardless of operator. Though
cash payment of single fares at higher rates is still possible, e-payments using smart
cards account for 96% of all trips [Prakasam, 2008]. Smart card data records include the
boarding station, boarding time, end station and time. In this paper, we employ 7 days
of smart card data from trips made between April 6 to April 12, 2014.
3.4 Travel diary survey
Trip information is taken from the Household Interview Travel Survey (HITS) 2012. For
this survey, over 32,000 persons from over 9,000 households reported their travel behavior
on a single workday, corresponding to approximately 1% of households in Singapore.
The survey is conducted once every four years and is commissioned by the Singaporean
Land Transport Authority (LTA). HITS contains data on three levels of aggregation; the
highest level contains household characteristics.
In the second highest level, personal
characteristics are available, such as age, income, profession and employment type. On
the lowest level of aggregation, trip information is available for mode, purpose, cost and
time.
5
Table 1: Aggregates from different data sources
Data source / Indicator
All users
10 tweets or more Percentage
45,715
3,800,904
3,417,418
1,957,952
1,459,466
20,822
14,528
5,857
29.1
92.2
92.3
91.9
92.8
27.0
26.6
63.7
Twitter (from September 10, 2013 until February 27, 2014)
Number of users
Number of tweets
Number of geo-tagged tweets
Number of tweets in Singapore
Number of tweets outside Singapore
Number of users tweeting only in Singapore
Number of users tweeting only outside Singapore
Number of users tweeting in Singapore and overseas
Household interview travel survey 2012
Number of households
Number of persons
Smart card data (from April 6 to April 12, 2014)
Number of card identifiers in smart card data
Number of journeys over 7 days
Singapore statistics (2012 except where otherwise stated)
Total population
Total resident population (Singaporeans and Permanent Residents)
Singaporeans
Permanent resident
Total non-resident population (Workpass holders & dependents)
Land-area 2013 [km2]
Population density 2013 [persons per km2] (Based on total population)
Per capita GNI 2013 [US$]
157,043
4,121,433
3,703,425
2,129,930
1,573,495
77,234
54,682
9,189
9,635
35,714
3,475,574
23,994,771
5,312,400
3,818,200
3,285,100
533,100
1,494,200
716.1
7,540
54,580
Figure 1: Specified bounding box and planning zones. Background map: http:
//openstreetmap.org.
6
05101520 km3.5 Other data sources
We enriched the previous data sets with attributes from several other data sources, includ-
ing the 1,092 transport analysis zones (TAZ's) as used in Singapore's transport demand
model, the 55 land-use planning zones and land-use types. Singapore's populations statis-
tics [Department of Statistics, 2010] were included, as well as an estimated number of
work activities in Singapore by planning zone [Chakirov and Erath, 2012, Ord´onez Med-
ina and Erath, 2013].
4 Methodology
4.1 Identification of clusters
To assess the suitability of Twitter data for transport demand analysis, we wanted to
recognize stationary activity locations visited by an individual: his or her home loca-
tion, work location, education locations and locations where discretionary activities were
performed. As such, we did not touch on the fact that activities can also be performed
en-route. For instance, it is possible to work while commuting or maintain social contacts.
By observing an individual over a longer span of time it would be possible to capture more
activity locations than from a one or two day household travel survey. To differentiate
between stationary activities and activities performed en-route, we assumed that events
(tweets) posted at activity locations tended to be less geographically dispersed; en-route
events would be more geographically dispersed. Partitioning geographically close activi-
ties into clusters helped identify en-route activities, as their clusters should contain fewer
events.
4.2 K-means clustering
K-means clustering is one of the most popular clustering methods [Jain, 2010]. Since
K-means clustering was proposed in 1955, many studies have applied different variations
of the method in a wide range of domains. Finding the optimal number of clusters k is
a challenging, but necessary task. Various ways of obtaining the optimal k value were
discussed in Jain [2010], essentially trying different values of k and selecting the best
value based on predefined criteria, such as the minimum message length [Figueiredo and
Jain, 2002], minimum description length [Hansen and Yu, 2001], gap statistics [Tibshirani
et al., 2001] and Dirichlet process [Rasmussen and Nagel, 2000].
A more general and easy-to-implement method for validating clustering results was
the silhouette method [Rousseeuw, 1987]. The value of a silhouette measured (1) how well
an observation was assigned to its cluster and (2) how dissimilar that observation was to
its neighboring clusters, thus reflecting the clustering analysis performance. This paper
used the value of the silhouette to validate the clustering results of different k values and
selected the optimal value.
Clusters resulting from k-means clustering can be fairly large if measured by the
convex hull of all the events (tweets) included in the cluster. For this research, we
asserted that a large cluster cannot necessarily constitute a single activity location. We
defined a maximum threshold for the variance of 200 meters. Clusters which exceeded
this threshold were recursively broken down into more, smaller clusters by recursive k-
means clustering [Arnott and Starner, 2003]. This process is also illustrated in Figure
2.
7
Figure 2: K-means clustering procedure
4.3 Kernel density estimation and clustering
Kernel density estimation (KDE) provided us with another way of determining activity
locations that individuals frequently visited. It is a non-parametric method for estimating
a density function from a random sample of data [Silverman, 1986]. A user-defined pa-
rameter called bandwidth h specifies the standard deviation of the Gaussian distribution
function constructed around each data point to smooth the KDE result. A small value
for h may under-smooth the KDE result; a large value for h can result in over-smoothing.
The bandwidth h gives an indication of the area covered by the KDE result; 95% will be
located within 400 meters.
Two main methods for the selection of bandwidth exist: the fixed bandwidth and
the adaptive bandwidth method. Given that each location should be limited in area, a
universal fixed bandwidth for the KDE is assumed, which is the same as the k-means
clustering's maximum variance, namely h = 200 meters. To obtain clusters from the
estimation procedure, contour lines are constructed. All local peaks of the contour line
are regarded as clusters and contour levels are assigned to corresponding kernels. The
resulting levels are calculated per cluster per individual and provide an indication of
the relative importance of a single cluster among an individual's clusters; cluster levels
between different individuals cannot be directly compared.
KDE, by itself, is not a clustering method. However, as the clusters (peaks) are
impacted by neighboring activities, neighboring activities within a certain distance (h)
are grouped together. If an activity (tweet) belongs to more than one kernel, it is grouped
to the closest one. This situation is very rare in our data set and occurs in less than 0.01%
of cases.
8
Figure 3: Temporal classification of Tweets
4.4 Limitations of applied clustering methods
Not all recorded tweets can be assigned to a cluster. Individual tweets sent from locations
that are visited only rarely, for instance during a restaurant visits, or at a concert, would
typically not be assigned to a cluster. Therefore, our approach did not assign these tweets
to activity locations, just discarded them. Furthermore, the applied approach did not
make use of a tweet's temporal attribute; using this component provided an additional
challenge.
A possible approach would be to group the tweets in different subsets, as shown in
Figure 33. Six tweets are shown; three day-time tweets and three night-time tweets.
Using no temporal information, a single cluster will be detected. Clustering subsets of
tweets can lead to a higher number of users per cluster: tweets in each other vicinity
might yield more than one cluster, as they would be in different subsets. It is challenging
to determine whether clusters located in approximately the same location actually belong
to the same activity location.
5 Results
5.1 Detecting activity locations
Due to social network data's nature, recognition of user's locations differs fundamentally
from another frequently used location-based data source used in transport research: GPS
data collected through smart phones or dedicated GPS trackers. While the latter data
sources provide location and speed information, making it possible to perform not only
mode detection, but also to detect start and end times of trips activities, social network
data only shows when a user posts geo-tagged information to the social network.
In-
dividual locations could be obtained from social media by means of location check-ins;
this, however, leads to a limited subset of users and location types [Noulas et al., 2012,
Hasan and Ukkusuri, 2014]. The challenge with a data stream coming from Twitter is to
determine whether a user is at an activity location or en-route.
Figure 4 shows the tweets of an active user. The selected user has tweeted 1,405 times
over the course of the 8-month observation period. While the data might look similar
to GPS data in terms of detected trajectories, these tweets are not necessarily ordered
by time. The user's main locations have been identified by both k-means clustering and
kernel density estimation (KDE).
In k-means clustering, each data point (tweet) needs to be assigned to a cluster. A
cluster recognized by k-means clustering has a certain number of tweets belonging to
that cluster, which we will refer to as the cluster size. In the figure, clusters of different
sizes are depicted, as well as clusters recognized with kernel density estimation. Using
KDE, two clusters are recognized; with k-means clustering, more than 100 clusters are
9
(a) Kernel density estimation (KDE ¿ 10%)
(b) K-means cluster sizes 3, 4 and larger
than 5
Figure 4: This figure depicts 1,405 individual tweets of a randomly selected user and the
detected clusters by means of k-means clustering and kernel density estimation. Back-
ground map: http://openstreetmap.org.
recognized containing two tweets or more. Figure 11 in the appendix provides more detail
on the number of tweets required to detect a certain number of clusters.
To determine the merits of both the k-means clustering and KDE, both methods
are evaluated by the number of clusters recognized per user and each cluster's strength.
Currently, the strength of each cluster is evaluated as follows:
• For clusters recognized by k-means clustering, the strength is calculated as the
number of tweets belonging to each cluster; the size of the cluster. A distinction is
made between clusters having 1, 2, 3, 4 and 5 or more tweets.
• For clusters recognized by kernel density estimation, strength is calculated as the
contribution (the level) of a single cluster to the sum of the levels of each cluster of
a single user. Clusters contributing less than 5%, 10% and 20% respectively to the
sum of the levels are filtered out.
The results of the evaluation are presented in Figure 5; results only include users
tweeting in Singapore, or Singapore and overseas, tweeting 10 times or more. An intuitive
result is found; if threshold levels for a cluster's strength are set low, the number of clusters
found by both methods is high; when setting thresholds' value high, a lower number of
clusters is detected.
If a minimum cluster size of 4 is set for the k-means clustering,
47% of the users have only 1 cluster and 23% percent have 2 clusters. If a minimum
contribution level of 20% is set for KDE, 67% of the users have only 1 cluster; while with
a level of 5%, 80% of the users have more than one cluster. From this, the relationship
between the chosen threshold and the number of clusters becomes apparent. If the goal
is to determine the number of frequently visited locations, thresholds will need to be
set. However, if the goal is to determine a user's activity space, one can avoid setting
thresholds, thus not deleting user information.
10
0246810 kmKDE > 10%tweets0246810 kmk-means size >= 5k-means size = 4k-means size = 3tweetsFigure 5: Number of clusters detected with different cluster methodologies
K-means clustering can be considered the standard method for clustering. Visual
inspection of our results per user and inspection of histograms indicate that k-means
is not well suited to make a distinction between en-route events and activity locations.
This follows from the sparse nature of the data and the requirement that each data point
belongs to exactly one cluster. We will now proceed with clustering by means of kernel
density estimation and a contribution level of 10%. This means that at least 10% of the
tweets of a single user should be in a single cluster. This value was chosen, as it seemed
to strike a balance between the filtering of en-route activities and stationary activity
locations.
5.2 Comparison with travel survey data
Number of activity locations When comparing clusters detected from Twitter data with
reported activity locations from the travel diary survey, we assume each reported trip
indicates a separate activity location. Figure 6 allows for a comparison of one-day travel
survey data and Twitter data collected over a period of several months. Survey respon-
dents with only a single identified activity location (25%) included retirees, homemakers
and domestic workers. Over 50% of the survey respondents report two activity locations.
The applied cluster methodologies detect more activity locations than reported in the
survey. For activity locations recognized with KDE and a contribution level of 10%, 29%
of Twitter users have a single cluster, 28% of the users have two, 23% of the users have
three clusters, 13% of the users have four and 5% of the users have five clusters.
Figure 7 shows the number of Twitter clusters per planning zone versus the number
of respondents in travel survey data with an activity location in the planning zone. A
relatively high number of clusters was detected in the planning zones: Downtown Core,
Orchard, Singapore River, Marina South, Museum and Sentosa. These zones typically
contain numerous restaurants, as well as shopping opportunities and other leisure desti-
nations.
11
123456789k-means size > 0k-means size > 1k-means size > 2k-means size > 3k-means size > 4KDE 5%KDE 10%KDE 20%k-means size > 0k-means size > 1k-means size > 2k-means size > 3k-means size > 4KDE 5%KDE 10%KDE 20%k-means size > 0k-means size > 1k-means size > 2k-means size > 3k-means size > 4KDE 5%KDE 10%KDE 20%k-means size > 0k-means size > 1k-means size > 2k-means size > 3k-means size > 4KDE 5%KDE 10%KDE 20%k-means size > 0k-means size > 1k-means size > 2k-means size > 3k-means size > 4KDE 5%KDE 10%k-means size > 0k-means size > 1k-means size > 2k-means size > 3k-means size > 4KDE 5%KDE 10%k-means size > 0k-means size > 1k-means size > 2k-means size > 3k-means size > 4KDE 5%KDE 10%k-means size > 0k-means size > 1k-means size > 2k-means size > 3k-means size > 4KDE 5%KDE 10%k-means size > 0k-means size > 1k-means size > 2k-means size > 3k-means size > 4KDE 5%KDE 10%02,0004,0006,0008,00010,00012,00014,00016,00018,000Number of users27.2%39.8%47.4%19.6%28.7%67.0%0.9%8.8%14.6%22.6%28.4%26.0%23.3%13.8%28.5%29.7%10.8%20.1%15.4%12.2%10.6%13.2%22.8%3.2%10.6%14.8%12.6%13.0%9.5%7.1%6.2%0.1%12.3%10.7%11.7%6.2%4.8%4.1%5.1%12.7%10.4%8.3%4.8%3.6%3.1%1.6%13.5%6.1%3.4%2.8%2.1%8.5%0.3%13.0%4.7%2.8%2.1%1.6%6.2%0.0%11.5%4.0%2.4%1.6%1.5%4.0%0.0%Number of clustersLegendk-means size > 0k-means size > 1k-means size > 2k-means size > 3k-means size > 4KDE 5%KDE 10%KDE 20%Figure 6: Number of reported activity locations in travel survey as compared to the
number of clusters in Twitter by means of kernel density estimation
Figure 7: Comparison of clusters detected in Twitter and reported activity locations in
the 2012 household interview travel survey
12
123456789HITS2012TwitterKDE10%HITS2012TwitterKDE10%HITS2012TwitterKDE10%HITS2012TwitterKDE10%HITS2012TwitterKDE10%HITS2012TwitterKDE10%HITS2012TwitterKDE10%HITS2012TwitterKDE10%HITS2012TwitterKDE10%02,0004,0006,0008,00010,00012,00014,00016,00018,00020,00022,000Number of users20.1%28.7%67.2%28.5%10.0%22.8%13.0%2.1%0.5%5.1%0.1%1.6%0.0%0.3%0.0%0.0%0.0%0.0%Number of clustersLegendHITS 2012Twitter KDE 10%Planning zone nameBedokWoodlandsTampinesJurong WestBukit MerahQueenstownAng Mo KioHougangGeylangYishunBukit BatokChoa Chu KangToa PayohBukit PanjangDowntown CoreJurong EastSengkangSerangoonKallangPasir RisBukit TimahClementiSembawangBishanPunggolMarine ParadeNovenaOrchardOutramRochorChangiPioneerTuasWestern catchmentMarina SouthSungei KadutBoon LayNewtonSingapore RiverMuseumTanglinRiver ValleyJurong IslandSentosaPaya LebarSeletarCentral catchmentMandaiChangi BayLim Chu KangMarina EastPulau UbinSimpangStraits ViewTengah0%2%4%6%8%PercentageData SourceHITS 2012Number of unique usersFigure 8: Comparison of distances between reported activity locations in the household
interview travel survey 2012 and activity locations detected in Twitter using kernel den-
sity estimation (17,930 users).
Distance comparison
In addition to the visual inspection of clusters and assessing the total number of
clusters per user, we compared distances between clusters detected in Twitter and dis-
tances between reported activity locations in the Singapore travel diary survey. To assess
whether the distances between activity locations found in different data sources corre-
spond for both data sources, Euclidean distances between all unique reciprocal locations
per user were calculated. For example, if a user reported trips to three distinct locations
(e.g. home, work, leisure), we calculated the distances between home-work, home-leisure
and leisure-work. A similar procedure was followed for clusters detected in Twitter using
KDE with a threshold value of 10% as a reference case. In Figure 8, distance compari-
son results are presented, showing that distances between detected clusters and reported
activity locations match for most distance categories. In the household interview travel
survey, a higher number of cluster-pairs was reported that were separated by less than 1
kilometer. A closer analysis of HITS reveals that clusters separated by less than 1 kilo-
meter are often activity pairs 'home-education' (44%), 'home-pick up drop' (11%) and
'home-work' (10%). Furthermore, clusters detected in Twitter data are more separated
from each other than activity locations observed in travel survey data. This is especially
notable for clusters separated by more than 15 kilometers. To determine whether the two
distributions can be considered similar, we performed a Kolmogorov-Smirnov test. The
test revealed that the two distributions were similar, with a p-value of 0.93. s
13
Distance group [km]< 0.20.2 - 0.50.5 - 11-22-33-44-55-66-77-88-99-1010-1111-1212-1313-1414-1515-1616-1717-1818-1919-2020-2121-2222-2323-24> 240%1%2%3%4%5%6%7%8%9%10%11%12%Percent of total records3.73%0.00%8.73%0.19%8.97%3.42%10.42%10.77%7.66%9.97%6.40%7.45%5.33%6.47%5.07%7.71%4.65%5.71%4.58%4.62%3.99%3.96%3.98%3.48%3.64%3.39%3.08%3.67%3.05%3.43%2.78%3.45%2.63%3.05%2.21%3.47%1.99%4.17%1.74%3.36%1.33%2.61%0.97%1.18%0.73%0.93%0.44%1.39%0.42%0.75%0.32%0.37%1.16%1.05%Data sourceHITS 2012Twitter KDE 10%5.3 Comparison with aggregated statistics
Clusters detected through KDE and using a threshold of 10% were compared to Singa-
pore's population statistics [Department of Statistics, 2010] and estimated work locations
[Chakirov and Erath, 2012, Ord´onez Medina and Erath, 2013]. The results of the com-
parison are presented in Figure 9, showing the number of users with one or more clusters
in each respective planning zone against the population (top) and the number of work
locations (bottom). Bedok has a resident population of 589,038, according to the 2010
Singapore census; the number of detected work locations with smart card data in the
downtown core is 185,000. Because the order of magnitude differs from the number of
users found in Twitter, the population percentage residing and working in each zone is
shown and compared to the percentage of unique Twitter users with a cluster in this
zone.
A direct comparison between activity locations detected from Twitter data and resi-
dent population and work activity densities is challenging. While KDE clustering seemed
to reliably identify activity locations, it would require other analysis methods to deduce
the type of activity performed at the identified location. On the whole, identified activity
densities corresponded quite well with where people live or work.
The percentage of detected clusters in various zones matched the population percent-
age in several planning zones, most notably in the planning zones Bukit Timah, Novena,
Marine Parade, Kallang and Queenstown. The first three planning zones were charac-
terized by a high percentage of private property and correspondingly higher income. A
further distinction by age and income is necessary to further analyze Twitter clusters
and socio-demographics. The Pearson correlation between the number of unique users
and workplaces per zone is 0.29. The Downtown core has the highest number of work
locations and the second-highest percentage of Twitter users. A similar observation can
be made for other planning zones, such as Bukit Merah and Queenstown. The Pearson
correlation between the number of unique users and workplaces per zone is 0.70.
Several zones revealed a higher number of Twitter users compared to population
and workplace figures. These are: the shopping district Orchard, the airport Changi,
the leisure island Sentosa and the entertainment area Singapore River. This comparison
highlighted that clusters where users tweet are not limited to work, home or discretionary
activity locations, but occur in areas that are particularly popular for leisure activities.
5.4 Detecting transitions
The third comparison involved comparing origin-destination (OD) matrices derived from
public transport smart card data with transitions observed in Twitter data. OD matrices
from smart card data were derived from journey start and end transit stops; no attention
was paid to transfers. For instance, consider a user traveling from zone A to zone C with
a transfer in zone B. The travel from A to C is considered a journey. However, the user
could have transferred in zone B and is required to tap his card if the transfer involves a
bus trip. As we have multiple days of smart card data, it is possible to observe multiple
journeys from zone A to zone B. However, and to ensure comparability with Twitter
data, each distinct zonal pair was counted once per user. A transition is defined as the
relationship between zone A to zone C for a single public transport user.
To analyze Twitter data with similar definitions, we took - as a basis - clusters detected
with kernel density estimation and apply a threshold of 10%. Tweets located within the
kernel contour were considered to be part of the cluster. Subsequently, each user's total
14
Figure 9: Percentage of unique users with a cluster in planning zone i plotted against
the population (top) and work locations (bottom).
15
BedokJurong WestTampinesWoodlandsHougangYishunAng Mo KioChoa Chu KangSengkangBukit MerahBukit BatokPasir RisBukit PanjangSerangoonToa PayohGeylangPunggolKallangQueenstownClementiBishanJurong EastSembawangBukit TimahMarine ParadeNovenaOutramTanglinRochorRiver ValleyNewtonDowntown CoreSingapore RiverChangiMandaiBoon LayCentral catchmentChangi BayJurong IslandLim Chu KangMarina EastMarina SouthMuseumOrchardPaya LebarPioneerPulau UbinSeletarSentosaSimpangStraits ViewSungei KadutTengahTuasWestern catchment0%2%4%6%8%10%12%PercentageResident population versus unique Twitter users with a cluster in planning zone iDowntown CoreQueenstownBukit MerahGeylangTampinesOrchardToa PayohJurong EastJurong WestBedokKallangHougangOutramClementiSembawangSerangoonRochorNovenaWoodlandsAng Mo KioPioneerChangiYishunPasir RisBukit BatokBukit TimahSingapore RiverSungei KadutMarina SouthMuseumWestern catchmentBishanBoon LayChoa Chu KangSengkangTuasBukit PanjangMarine ParadeNewtonTanglinPaya LebarSeletarPulau UbinPunggolRiver ValleySentosaMandaiCentral catchmentLim Chu KangMarina EastTengahChangi BayJurong IslandSimpangStraits View0%2%4%6%8%10%12%PercentageWork locations versus unique Twitter users with a cluster in planning zone iUnique usersWorkplacesUnique usersPopulationtweets were ordered, by time, to determine common transitions between locations. A
transition occurred when two subsequent tweets stemmed from different clusters. For
instance, consider tweet x occurring at t1 in cluster 1, tweet y occurring at t2 in cluster
2 and tweet z occurring at t3 in cluster 1. The transition from cluster 1 to cluster 2 is
counted as a transition. Similar to studies using call detail records (CDR), we were faced
with the handling of the time between two subsequent events, the inter-event time. In
CDR data, a user's location is lost when the phone is not used and not all movement
can be captured. The origins and destinations that can be captured as are referred to as
transient origins and destinations Wang et al. [2012], Iqbal et al. [2014].
In order to analyze Twitter data according to similar definitions, we take as a basis
clusters detected with kernel density estimation and apply a threshold of 10%. Tweets
located within the contour of the kernel are considered to be part of the cluster. Sub-
sequently, all tweets of each user are ordered by time to determine common transitions
between locations. A transition occurs when two subsequent tweets stem from different
clusters. For instance, consider tweet x occurring at t1 in cluster 1, tweet y occurring at
t2 in cluster 2 and tweet z occurring at t3 in cluster 1. The transition from cluster 1 to
cluster 2 is counted as a transition. Similar to studies using call detail records (CDR), we
are faced with the handling of the time between two subsequent tweets, the inter-event
time. In CDR data, a user's location is lost when the phone is not used and not all move-
ment can be captured. The origins and destinations, that can be captured as transient
origins and destinations are referred to as transient origins and destinations Wang et al.
[2012], Iqbal et al. [2014].
Despite the fact that the exact OD pair might not be observed, it was still possible
to capture a portion of it.
In CDR data, different values for the median inter-event
time were given, varying from 260 minutes to 500 minutes Calabrese et al. [2011]. The
average inter-event time observed in the Twitter dataset was1576 minutes; the average
user median was 1954 minutes. Given this long time span between two events, we chose
not to use the inter-event time in this analysis. By discarding the time between two
subsequent tweets in this analysis, transitions of users that tweet less frequently were
included in this analysis. Also, locations where users tweet less frequently, such as the
home location, can be included in the transition analysis. As such, all spatial fingerprints
of users can be used, but the extracted OD-relations should be considered as trends and
not exact figures.
Per user, each distinct zonal pair is counted once. We thus assume that transitions
will occur from time to time between these activity locations. One limitation of this
approach was that other possible transitions of this user occurring outside the measured
location-based social network (tweets) were not measured.
In Figure 10, transitions are calculated from detected locations with KDE and a
threshold of 10% versus public transport smart card data (top) and household interview
travel survey data (HITS, bottom) per planning zone.
Intra-zonal and weekend trips
have been excluded; the latter were excluded because they do not occur often in travel
survey data.
To compare results from both data sources, the relative flow per OD-pair is shown.
Records were sorted by the percentage per OD-pair from smart card data and HITS data
respectively. This approach made it possible to compare trends and detect differences
between both data sources. In both cases, transitions derived from Twitter followed a
trend similar to both smart card data and HITS. The correlation coefficient between
HITS and smart card data was 0.859 and the p-value associated was less than 10−3; the
16
Figure 10: Transitions as calculated from Twitter versus weekday public transport smart
card data (top) and household interview travel survey data (bottom) journeys per plan-
ning zone pair.
Intra-zonal trips have been excluded. The relative flow per origin-
destination pair is shown. Records are sorted by the percentage per OD-pair from public
transport smart card data and household interview travel survey data, respectively. The
numbers indicate that the zonal numbers.
17
dgp pair33 4912 718 3817 3831 317 632 4426 1915 5715 5626 157 628 5238 5048 172 1326 3739 388 2642 56 2552 4846 187 11 379 5750 2817 2443 2412 2843 2850 343 55 3710 284 5350 4841 2232 511 5411 3313 1115 918 3920 1821 121 522 423 3124 4127 127 5129 243 2332 2134 2435 4536 4338 234 1940 2341 4743 4545 2846 3447 85 5351 4153 2354 1354 5255 476 239 140.0000.0020.0040.0060.008PercentagePublic transport card origin destinations vs Twitter cluster transitionsdgp pair49 151 168 756 1418 814 814 4238 4331 5215 575 5230 649 1835 1330 4919 1348 512 1957 137 101 2637 3024 528 4240 3727 496 2642 3712 3733 4653 5226 348 1918 5039 3353 2522 4939 185 3311 4323 834 1641 4452 99 4311 1312 2216 2120 1120 5421 4322 3623 3324 4626 5428 4729 4631 2033 5135 1436 3438 204 2241 1043 1245 3146 3648 2050 2551 3153 2154 4657 209 230.0000.0020.0040.0060.008PercentageHousehold interview travel survey origin destinations vs Twitter cluster transitionsSourceEZLINKTWITTERSourceHITSTWITTERTable 2: Breakdown of the number of users applying a kernel density estimation with a
threshold of 10%. The table shows if a user only has clusters in Singapore or both in
Singapore and overseas.
Country
Singapore
Malaysia
Indonesia
Thailand
Region Only Singapore Singapore and outside Singapore
14,628
Singapore - all
Johor Baharu
Other Malaysia
Batam
Other Indonesia
Thailand - all
3,944
1,517
39
426
27
67
correlation coefficient between HITS and Twitter was 0.512 and the p-value associated
was less than 10−3 and the correlation coefficient between smart card data and Twitter is
0.655 and the p-value associated is, again, less than 10−3. While the correlation between
HITS and smart card data is very high, the correlation between HITS and Twitter data
is substantially lower, but statistically still very significant. The time between transitions
in Twitter data can amount to multiple days. These transitions would not be recorded
in a single day travel survey.
An advantage of social network data is that the collection of data is not limited
by geographical boundaries. Number of users and tweets in Singapore and outside of
Singapore was presented earlier in (Table 1). In Table 2, a breakdown of user numbers
is presented with clusters only in Singapore, and in Singapore, Malaysia, Indonesia and
Thailand. Clusters are detected with KDE and a threshold of 10%. Almost 4,000 users
have a cluster in Singapore and outside of Singapore. The majority of these users have
one or more clusters in the province adjacent to Singapore, Johor Bahru. Johor Bahru,
a city, is across the border from Singapore in Malaysia and is accessible by foot, car,
motorcycle and frequent bus services; Batam is the most populated island within the
archipelago of the Indonesian province Riau and only accessible by ferry.
6 Discussion & Outlook
This paper highlighted the possibilities of using social network for transport demand
models. Factors including detection of an individual's activity locations, spatial sepa-
ration between these locations and transitions between these clusters were investigated.
Whereas previous work [Hasan et al., 2013, Noulas et al., 2012, Hasan and Ukkusuri,
2014]considered only a subset of this data -location check-ins - we included all available
data. Twitter is sometimes considered 'Big Data'. This can be considered relative to
other data sources such as the number of records obtained from dedicated GPS track-
ers. For Singapore, we counted approximately 45,000 unique users who tweet at least 10
times or more in a time span of 8 months and correspond to around 0.8% of Singapore's
resident population. These users tweet 2 million times in total. This number of users is
comparable to the usual sample size of a travel diary survey, but the observed time span
as compared to multi-day and multi-week survey and the number of activity location data
points is several orders of magnitudes larger and hence can be sensibly characterized as
'big'.
To determine an individual's locations, two clustering methodologies were applied. A
18
first challenge lay in the distinction between en-route Twitter events and Twitter events
at activity locations. The application of kernel density estimation for the detection of
clusters, as proposed by Lichman and Smyth [2014], yielded more promising results than
k-means clustering, which still can be considered the standard method for clustering. The
kernel density approach required a bandwidth h. Setting a high value for h can result
in over-smoothing. Translated to the detection of activity locations, this can result in a
lower amount of detected locations in each others proximity. In this study we applied
a bandwidth of 200 meters, roughly corresponding to an area of 500 meters around the
KDE result, considered a reasonable setting considering positioning errors in a dense
urban environment. In the case of GPS data, speed information can be used to detect
activity locations. In the case of Twitter data, no speed information is available.
Therefore, we determined the strength of a detected cluster relative to a user's other
clusters and apply a threshold. This threshold determined whether a detected cluster was
an activity location or en-route event. By applying this threshold, less frequently visited
locations were filtered out. Despite this filtering, more locations were detected with all
threshold settings than reported in survey data.
An important input for transport demand models was the distribution of trip dis-
tances. Spatial separation between detected clusters from Twitter and reported activity
location from travel survey diary data corresponded well. Short trips under 1 kilometer,
- 44% of which were home-school trips – were under-estimated. Whether this was due
to over-smoothing, or the fact that primary school students are not active on Twitter, is
open for discussion.
Theoretically, detected activity locations could be used for trip distribution purposes
(e.g. gravity model estimation). However, by just considering a user's Twitter locations,
no information on trip purpose was known. By combining the temporal component
of Tweets, rules incorporating time and text recognition the type of activity could be
inferred. Also, redefining the threshold definition for KDE clustering gave an indication
of the frequency with which a location was visited, an interesting topic for further research.
More difficult to infer would be an individual's mode and route choice. For very frequent
Twitters users, several paths can be observed between detected clusters. However, to
infer routes from these tracks would require a wide range of assumptions and rules.
An important input for activity-based models was the range of activity locations an
individual frequents. While it seemed promising to use the detected locations for activity
chain generation, inferring activity start time, activity end time, activity duration and
sequence can be challenging due to the scattered nature of social network data. However,
the number of locations detected besides main clusters such as 'home' and 'work' gave
insight in spatial dispersion (i.e. distances) of these additional clusters and opens up
possibilities for multi-day activity based models and the sampling of discretionary activ-
ity locations. Schonfelder and Axhausen [2004] discussed several methods to calculate
activity spaces. Despite the varying nature of different data sets, comparison of different
activity spaces offers another method to compare different data sources.
On an aggregated level, two comparisons were made. From the first comparison be-
tween the detected cluster and population statistics it was deduced that Twitter events
occur less frequently at home locations and/or that Twitter users form only a sub-sample
of the population; in several homogeneous planning zones, a good match between detected
clusters and population statistics was observed. A further distinction of population statis-
tics by age and income remains for further work. A similar trend could be observed when
comparing detected locations with work locations. The correlation between work loca-
19
tions and detected clusters was higher than the correlation with population statistics.
Several zones, the main shopping area Orchard, the airport Changi, the entertainment
area Singapore River and leisure island Sentosa showed more detected locations. An-
other topic for further work is the inclusion of the temporal component in the clustering
algorithm [e.g. Hasan and Ukkusuri, 2014]. By combining the temporal component and
a wider range of zonal statistics, it would be possible to estimate what contributes to
Twitter usage per zone.
The second comparison considered transitions between zones as detected in Twitter
data and transitions as observed in public transport smart card data and survey data.
The high correlation between the Twitter data and the two traditional data sets opens
promising avenues for future research. The time between two subsequent tweets was
not included in this analysis, as the time between two tweets - the inter-event time –
was high when compared to other data sources, such as call detail record data. The
latter data sources included more data points per user, as it contained voice and data
transactions, not just a subset of transactions, as is the case with Twitter data. However,
transitions computed with Twitter can be considered a proxy between a user's main
activity locations.
Because Twitter data is available throughout the world, it presents an opportunity
to compare how distances between activities are distributed for different cities and to
relate the findings to the respective spatial extents and population densities. Another
promising application could be the detection of long-distance and cross-border trips,
which are difficult to observe representatively in travel diary surveys and are seldom
covered in public transport smart card records. The availability of airline ticket records
would allow similar comparisons to those presented in this paper, to test how well Twitter
data represents actual long distance travel behavior.
Despite these unanswered questions, location-based social network data provides a
promising data source for the detection of activity locations and analysis of mobility pat-
terns, especially considering the potential to track users over a longer span of time against
negligible costs. Social network data can give a first impression about the prevalent dis-
tribution of activity locations and trips distances. This is particularly useful for regions
which lack mobility diary surveys, but feature an active Twitter user base. However,
Twitter data does not document socio-demographic user characteristics or context of the
observed activity locations. Although Twitter data allows identification of a user's main
activity locations, it can not replace traditional travel surveys or smart card data and
provide a similar level of understanding of travel behavior. However, given the limitations
of those approaches to represent cross-border flows and long distance trips, Twitter data
can still be considered a valuable supplement to more traditional travel surveys, espe-
cially as the accessible user base is many times larger. We also see potential to better
understand travel behavior in new mobile phone applications such as Strava, Moves, or
human.co, which are designed to track individual movement patterns.
References
Samiul Hasan, West Lafayette, and Satish Ukkusuri. Understanding urban human ac-
tivity and mobility patterns using large-scale location-based data from online social
media. In UrbComp, editor, ACM SIGKDD International Workshop on Urban Com-
puting, Chicago, August 2013. ACM Special Interest Group on Knowledge Discovery
and Data Mining.
20
Anastasios Noulas, Salvatore Scellato, Renaud Lambiotte, Massimiliano Pontil, and Ce-
cilia Mascolo. A tale of many cities: universal patterns in human urban mobility. PLoS
ONE, 7(5), 2012.
Juan de Dios Ort´uzar and Luis G. Willumsen. Modelling Transport. John Wiley & Sons,
Chichester, 4th edition, 2011.
Kay Werner Axhausen and Tommy Garling. Activity based approaches to travel analysis:
Conceptual frameworks, models and research problems. Transport Reviews, 12(4):323–
341, 1992.
Jean Wolf. Applications of new technologies in travel surveys. In ISCTSC, editor, 7th
International Conference on Survey Methods in Transport, Costa Rica, August 2004.
Timothy L. Forrest and David F. Pearson. Comparison of Trip Determination Methods
in Household Travel Surveys Enhanced by a Global Positioning System. Transportation
Research Record, 1917:63–71, 2005.
Peter R. Stopher, Camden FitzGerald, and Min Xu. Assessing the accuracy of the Sydney
Household Travel Survey with GPS. Transportation, 34(1):723–724, 2007.
Robert Schlich and Kay Werner Axhausen. Habitual travel behaviour: Evidence from a
six-week travel diary. Transportation, 30(1):13–36, 2003.
Kay Werner Axhausen, Andrea Zimmermann, Stefan Schonfelder, Guido Rindsfuser, and
Thomas Haupt. Observing the rhythms of daily life: A six-week travel diary. Trans-
portation, 29(2):95–124, 2002.
Marie-Pier Pelletier, Martin Tr´epanier, and Catherine Morency. Smart card data use
in public transit: A literature review. Transportation Research Part C: Emerging
Technologies, 19(4):557–568, 2011.
M. Bagchi and P.R. White. The potential of public transport smart card data. Transport
Policy, 12(5):464–474, 2005.
Artem Chakirov and Alexander L. Erath. Activity identification and primary location
modelling based on smart card payment data for public transport. In IATBR, editor,
13th International Conference on Travel Behaviour Research (IATBR), Toronto, July
2012.
Francesco Calabrese, Giusy di Lorenzo, Liang Liu, and Carlo Ratti. Estimating origin-
destination flows using mobile phone location data. Pervasive Computing, 11:36–44,
2011.
Jing Wang, WangDianghai, Xianmin Song, and Di Sun. Dynamic od expansion method
based on mobile phone location. In ICICTA, editor, Fourth International Conference
on Intelligent Computation Technology and Automation, Shenzhen, China, March 2011.
Md. Shahadat Iqbal, Charisma F. Choudhury, Pu Wang, and Marta C. Gonz´alez. De-
velopment of origin–destination matrices using mobile phone call data. Transportation
Research Part C: Emerging Technologies, 40:63–74, 2014.
Yu Zheng. Location-based social networks: Users.
In Yu Zheng and Xiaofang Zhou,
editors, Computing with Spatial Trajectories. Springer, New York, 2011.
21
Samiul Hasan and Satish Ukkusuri. Urban activity pattern classification using topic mod-
els from online geo-location data. Transportation Research Part C: Emerging Technolo-
gies, 44:363–381, 2014.
Bei Pan, Yu Zheng, David Wilkie, and Cyrus Shahabi. Crowd Sensing of Traffic Anoma-
lies based on Human Mobility and Social Media Categories and Subject Descriptors. In
ACM SIGPATIAL, editor, ACM SIGSPATIAL International Conference on Advances
in Geographic Information Systems 2013, Orlando, November 2013.
Ling-Yin Wei, Yu Zheng, and Wen-Chih Peng. Constructing popular routes from un-
In ACM SIGKDD, editor, 18th ACM SIGKDD Conference on
certain trajectories.
Knowledge Discovery and Data Mining (KDD '12), Beijing, August 2012.
Moshe Lichman and Padhraic Smyth. Modeling Human Location Data with Mixtures
In ACM SIGKDD, editor, 20th ACM SIGKDD Conference on
of Kernel Densities.
Knowledge Discovery and Data Mining (KDD '14), New York, August 2014.
Timo Grossenbacher. Studying Human Mobility Through Geotagged Social Media Con-
tent. Master's thesis, Department of Geography, University of Zurich, Zurich, 2014.
Haklay.
'nobody wants to do council estates' - digital divide, spatial justice and
outliers. webpage, 2012. URL http://povesham.wordpress.com/2012/03/05/
nobody-wants-to-do-council-estates-digital-divide-spatial-justice-and-outliers-aag-2012/.
Twitter. Twitter Reports First Quarter 2014 Results. webpage, 2014a. URL https:
//investor.twitterinc.com/releasedetail.cfm?ReleaseID=843245.
Twitter. About Twitter. webpage, 2014b. URL https://about.twitter.com/company.
S. Prakasam. The evolution of e-payments in public transport - singapore's experience.
Japan Railway & Transport Review, 50:36–39, 2008.
Department of Statistics.
2010.
Census of population 2010 - administrative
re-
URL http://www.singstat.gov.sg/publications/
port.
publications-and-papers/population/census10_admin.
webpage,
Sergio A. Ord´onez Medina and Alexander L. Erath. Estimating dynamic workplace
capacities by means of public transport smart card data and household travel survey
in Singapore. Transportation Research Record, 2344:20–30, 2013.
Anil K. Jain. Data clustering: 50 years beyond K-means. Pattern Recognition Letters,
31(8):651–666, 2010.
Mario A.T. Figueiredo and Anil K. Jain. Unsupervised Learning of Finite Mixture Mod-
els. IEEE Transactions on pattern analysis and machine intelligence, 24(5):381–396,
2002.
Mark H. Hansen and Bin Yu. Model selection and the principle of minimum description
length. Journal of the American Statistical Association, 96(454):746–774, 2001.
Robert Tibshirani, Guenther Walther, and Trevor Hastie. Estimating the number of
clusters in a data set via the gap statistic. Journal of the Royal Statistical Society:
Series B (Statistical Methodology), 63(2):411–423, 2001.
22
Carl Edward Rasmussen and Kai Nagel. The infinite gaussian mixture model. In S.A.
Solla, T.K. Leen, and K. R. Muller, editors, Advances in Neural Information Processing
Systems 12, pages 554–560. MIT Press, Boston, 2000.
P.J. Rousseeuw. Silhouettes: a graphical aid to the interpretation and validation of cluster
analysis. Journal of the ACM, 20:53–65, 1987.
Robert Arnott and Thad Starner. Using GPS to learn significant locations and predict
movement across multiple users. Personal and Ubiquitous Computing, 7(5):275–286,
2003.
B.W. Silverman. Density estimation for statistics and data analysis. Monographs on
Statistics and Applied Probability. Chapman & Hall, London, 1986.
Pu Wang, Timothy Hunter, Alexandre M. Bayen, Katja Schlechtner, and Marta C.
Gonz´alez. Understanding Road Usage Patterns in Urban Areas. Scientific Reports,
2(1001):1–6, 2012.
Stefan Schonfelder and Kay Werner Axhausen. On the variability of human activity
spaces. In Martina Koll-Schretzenmayr, Marco Keiner, and Gustav Nussbaumer, edi-
tors, The Real and Virtual Worlds of Spatial Planning, pages 237–262. Springer, Hei-
delberg, 2004.
Acknowledgements
The research conducted at the Future Cities Laboratory is co-funded by the Singaporean
National Research Fund and the ETH Zurich, and located at the Campus for Research
Excellence And Technological Enterprise (CREATE). Data61 is funded by the Australian
Government. The authors would like to thank Professor Kay W. Axhausen for his sugges-
tions and comments. We wish to express our gratitude to the Land Transport Authority
for providing us invaluable data sets on transport in Singapore. Also we are very thankful
to the Urban Redevelopment Authority for providing us with a wide range of data sets.
23
Figure 11: Depicted is the number of tweets versus the number of clusters detected; each
point represents a user. The left-most scatter plot shows the case where no threshold is
set for the contribution of a single cluster to the total level of user; the three other scatter
plots present the results for a 5%, 10% and 20% threshold respectively.
Appendix
One of the advantages of social network data is that the costs of collecting records for a
longer time span are virtually free. Figure 11 shows the number of tweets collected, as
a proxy for time, versus the number of clusters recognized with different thresholds for
the number of clusters when using KDE. Only users tweeting 10 times or more have been
included. The left-most plot shows a counter-intuitive result: despite the high number
of tweets not a high number of clusters is recognized. The three other plots show the
number of clusters detected with different thresholds for the level of contribution. While
a high number of tweets is required to detect 1 or more clusters, the effect of a high
number of tweets per user on detecting the number of clusters per user is limited.
24
0246810Number of clustersMinimum contribution 5%010203040Number of clusters050010001500200025003000Number of tweetsNo threshold0246810Number of clustersMinimum contribution 10%0246810Number of clustersMinimum contribution 20% |
1504.05351 | 1 | 1504 | 2015-04-21T09:30:34 | On the Role of Conductance, Geography and Topology in Predicting Hashtag Virality | [
"cs.SI",
"physics.soc-ph"
] | We focus on three aspects of the early spread of a hashtag in order to predict whether it will go viral: the network properties of the subset of users tweeting the hashtag, its geographical properties, and, most importantly, its conductance-related properties. One of our significant contributions is to discover the critical role played by the conductance based features for the successful prediction of virality. More specifically, we show that the first derivative of the conductance gives an early indication of whether the hashtag is going to go viral or not. We present a detailed experimental evaluation of the effect of our various categories of features on the virality prediction task. When compared to the baselines and the state of the art techniques proposed in the literature our feature set is able to achieve significantly better accuracy on a large dataset of 7.7 million users and all their tweets over a period of month, as well as on existing datasets. | cs.SI | cs |
On the Role of Conductance, Geography and
Topology in Predicting Hashtag Virality
Siddharth Bora, Harvineet Singh, Anirban Sen, Amitabha
Bagchi, and Parag Singla
Indian Institute of Technology, Delhi
{cs5090253,anirban,mt5100595,bagchi,parags}@cse.iitd.ac.in
September 26, 2018
Abstract
We focus on three aspects of the early spread of a hashtag in order
to predict whether it will go viral: the network properties of the subset
of users tweeting the hashtag, its geographical properties, and, most
importantly, its conductance-related properties. One of our significant
contributions is to discover the critical role played by the conductance
based features for the successful prediction of virality. More specif-
ically, we show that the first derivative of the conductance gives an
early indication of whether the hashtag is going to go viral or not. We
present a detailed experimental evaluation of the effect of our various
categories of features on the virality prediction task. When compared
to the baselines and the state of the art techniques proposed in the
literature our feature set is able to achieve significantly better accu-
racy on a large dataset of 7.7 million users and all their tweets over a
period of month, as well as on existing datasets.
1
Introduction
The ability to predict the emergence of virality of a hashtag has far-reaching
consequences in a number of domains. In the commercial domain knowledge
1
of potentially viral memes may present a variety of business opportunities
but the most important application of a robust prediction system would be
to provide the authorities with the capability of spotting the emergence of
harmful rumors and the organization of destructive mass action. For exam-
ple, the role of Twitter and Blackberry messenger in organizing looting and
spreading rumors was widely observed during the London riots of 2011 [5].
In 2008 live accounts of the Mumbai terror attacks went viral on Twitter
spreading panic and providing the attackers with a source of information
on police movements [28]. In both cases early detection of the spread of a
particular kind of meme could have helped arrest it and prevent disastrous
consequences. The nature of such settings is that they require a prediction
system to sift out important (potentially viral) content from the vast volume
of content in the network. The usual metrics, precision and recall, take on
special significance here. High recall ensures that we do not miss a poten-
tially harmful meme, while high precision ensures that expensive resources
are not expended on investigating false leads. In this paper we present pre-
diction algorithms for Twitter, although we feel that techniques using similar
features can be used on other social networks (like those derived from cellular
messaging or calling data) as well and so will have wide applicability.
Studying the factors that lead to virality in online systems has been an im-
portant theme in the literature over the last few years, pioneered by Leskovec,
Backstrom and Kleinberg's study of the evolution of memes in blogs [23]. The
phenomenon of virality wherein a particular meme -- a theme or topic or piece
of content -- spreads widely through the network has, in particular, attracted
a lot of attention. What has been largely missing is prediction that focuses
on the efficacy of structural properties of meme diffusion. The only efforts of
this nature are the two attempts by Weng et. al. [36, 35] and their work, on
a user network of about 0.6 million users is not conducted on a satisfactorily
large scale. We undertake a classification task on a large dataset that we
compiled containing 7.7 million Twitter users and all their tweets over a 35
day period. For every hashtag in our set that appears in a certain number
of tweets (we call this number the prediction threshold and set it to 1500 in
this paper) we try to predict, at the point when it reaches this number, if
it will reach a number of tweets about one order of magnitude larger. This
latter number, we call it the virality threshold, is set to 10,000.
In what
follows we will refer to this task as virality prediction. The features that we
use for this classification task deliberately ignore the content of the tweeted
hashtags, focusing instead on three aspects: network topology, geography,
2
and the isoperimetric properties of meme growth as expressed through the
conductance of the set of users tweeting on a hashtag. This should not be
seen as a claim that these characteristics are more important than semantic
aspects of the topics under study. We omit using semantic features to main-
tain a focus on the predictive power of structural properties of hashtags. It is
not our intention to present a "best possible" prediction algorithm; such an
algorithm would undoubtedly include semantic features along with our struc-
tural and geographic features. Our intention is primarily to demonstrate that
there is significant information contained in our new features based on con-
ductance, geography and network characteristics of early adopters, and that
this information can be effectively used in the important task of predicting
virality.
We view the evolution of the hashtag's spread across the network as a
graph process and derive a number of network-based features. The geograph-
ical spread of hashtags is also used for virality prediction for the first time,
enabled by a methodology that is successfully able to tag 90% of active users
with their time zones. We define features based on the isoperimetric quan-
tity conductance that is known to have a strong relationship to mixing times
in random walks [14], and find that these features greatly help improve our
predictions. We use the criteria of information gain to identify the top fea-
tures from each category providing us greater insight into the effectiveness
of various features for characterizing virality.
We perform an extensive experimental evaluation of our proposed set of
features for the task of predicting virality. Our experimental results clearly
demonstrate the effectiveness of our features for this task as well as their
supremacy over existing approaches proposed in the literature. We also
present some preliminary experimental analyses of virality prediction in in-
dividual geographies which corroborate our findings in the larger dataset.
Organization We survey the literature in Section 2, following that with a
description of our dataset and how it was compiled in Section 3. Our task
definition can be found in Section 4, followed by a detailed discussion of
our features in Section 5 and the results of our algorithms on two datasets
in Section 6. Finally we conclude with a discussion of the significance of
conductance and some future directions in Section 7.
3
2 Related Work
The problem of predicting which memes will grow in popularity has attracted
some amount of attention recently. To save space we ignore the research on
detecting popularity after it has been established and focus on the research on
identifying memes that will go viral before they have already spread far and
wide. Several aspects of this problem have been studied. Wu and Huberman,
in an early paper, highlighted the importance of novelty: new memes override
older ones [37]. In a similar vein, Weng et. al. [34] argued that finite user
attention coupled with the structure of the network can help identify the
ultimate popularity of a meme. Emotional, textual and visual features have
been studied as drivers of virality [4, 13, 12, 33, 15].
In the context of
viral marketing, Aral and Walker showed that personalization of promotional
messages helps make particular products more "contagious" [2].
While all these aspects are undoubtedly important, our work falls into
a different category of research which views the proliferation of memes as a
kind of contagion process on a network and relies on spatial and temporal
properties of the early evolution of this process to identify potentially viral
memes. Leskovec et. al.'s work on memes falls into this category, positing a
temporal growth model for viral memes [23]. With the growth of microblog-
ging it was natural that such phenomena be investigated on Twitter and
Kwak et. al. [21] performed the first analysis of information spreading on
Twitter at scale. Subsequently, several groups of researchers have investi-
gated the structural properties of rapidly spreading themes by looking at the
spread as a cascade or a tree (e.g. Ghosh and Lerman [10]). Others tried to
find the extent of external (or exogenous) influence on information diffusion
(e.g. Myers et. al. [27]). Szabo and Huberman tried to predict the long-
term popularity of a meme based on its nascent time series information [32].
Kitsak et. al. argued that the most efficient spreaders are those that exist
within the core of the network and the distance between such spreaders often
governs the maximum spread of topics [19]. The factors that govern a tweets
ability to draw retweets, a possible precursor to virality, has been studied by
Suh et. al. [31]. On the modeling front, Romero et. al. focused on the local
dynamics of hashtag diffusion [30]. Lermann et. al. [22] propose an approach
to predict popularity of news items in Digg using stochastic models of user
behavior. Rajyalakshmi et. al. defined a stochastic model for local dynamics
with implicit competition that was found to generate the global dynamics of
a Twitter-like network [29]. Finally we mention the work that is the major
4
take off point for our current paper: Ardon et. al. conducted a study of
information diffusion on a large data set and established that conductance
and geographical spread could significantly discriminate between topics that
went viral and those that did not [3]. Drawing on ideas from this work we
create suite of features and show that they can be used effectively to predict
virality.
Efforts to use machine learning techniques to predict virality have recently
begun to appear in the literature. Jenders et. al. use features very different
from ours, relying mainly on sentiment-related features, to predict which
tweets will go viral via the process of retweeting on a small data set of 15,000
users [17]. Zaman et. al. use a Bayesian approach to predict which tweets
will generate large retweet trees on a small set of 52 tweets [38]. Ma et.
al. combine a set of textual features with some network-based features to
predict the number of users tweeting a hashtag in subsequent time intervals,
a task somewhat different from ours since we focus on predicting an eventual
ascent to a threshold-based virality [25]. In a major recent work, Cheng et.
al. tried to predict which photo resharing cascades will grow past the median
cascade size using a variety of features that included demographic, structural
and temporal information [6]. The primary difference between that work and
ours is that we do not work with a cascade model, but look at the spread
of hashtags as a diffusion, i.e., the use of hashtag by a particular user need
not be explicitly attributable to the prior use of that hashtag by another
user in the neighborhood. This makes our work incomparable with that of
Cheng et. al. [6] and gives it a different flavour. Closer to our approach in
conception if the work of Weng et. al. who showed in a sequence of two
papers that inter-community spread in the early life of a Twitter meme can
be used to predict which meme will go viral and which will not [36, 35].
The main work against which our results should be compared is [35] where
a straightforward attempt to predict virality is made, as opposed to [36]
where a related but slightly different multi-label classification task is defined.
Our current work overcomes some of the severe shortcomings of [36, 35].
Firstly, we perform prediction on a user set of size 7.7 million and view their
interconnections as a directed graph. In [36, 35] the user set has size only 0.6
million and consists of edges only between those users who follow each other,
i.e. only bidirectional edges. Secondly, the small size of their network allows
Weng et. al. to run community detection algorithms which are prohibitively
expensive to run. We show that on our much larger data set, to the best of
our knowledge the largest on which virality prediction tasks have been run
5
so far, by leaving out community-based features and using computationally
tractable features based on geography and conductance we are able to give
better quality predictions than those in [35]. We also show that our feature
set performs better than the community-based features of Weng et. al. [35]
on their own data set, even though we do not have the geography information
for their users.
3 Dataset and Methodology
3.1 Dataset description
Our dataset is a complete snapshot of all tweets posted by 7.7 million users
of Twitter between 27th March 2014 and 29th April 2014. We also have the
follower-following information of all these users and have built the data set
(as explained below) to ensure that these users form a strongly connected
subnetwork of Twitter, i.e., for each pair of users u, v there is a directed path
u to v and a directed path from v to u. Rather than filtering out tweets based
on topical memes, we crawled all the tweets posted by our user set in the
time window with a view to capture all the phenomena, viral and non-viral,
present in the network at the time. Table 1 contains some basic statistics
Users
Average no. of followers
Users who tweet at least once
Filtered hashtags
Tweets for filtered hashtags
Hashtags with ≥ 10,000 tweets
7,695,882
450
3,008,496
8,793,155
220,012,557
177
Table 1: Dataset statistics
of our data set. The follower distribution curve of our data (see Figure 1)
follows the now familiar power law with a drooping tail that has been widely
reported in the literature.
From the tweets of our user set we extracted all the hashtags used, filtering
some persistent generic hashtags out (as explained in Sec 3.3.)
Additionally we geotagged all the users who have tweeted at least once
with their location information to an accuracy of 98%, not down to the
6
Figure 1: Plot of the distribution of the Number of followers
city level but down to the time zone level using the time zones that Twit-
ter requires users to fill through a dropdown menu at the time of account
creation. There were 141 time zones found in our data set. We note that
Twitter provides annotated time zones that are more numerous than the 40
different time offsets from UTC that are generally used for timekeeping. For
example, although all of India follows a single time (Indian Standard Time:
UTC +5:30), Twitter gives Indian users four choices -- Chennai, New Delhi,
Kolkata, Mumbai -- corresponding to four major metropolitan centres, all of
which are marked as GMT +05:30 in the dropdown.
3.2 Retrieving the data from Twitter
A seed set of approximately 108K users was shared with us by Pranay Agar-
wal who devised a methodology for differentiating users whose tweets were
informative from those users who used Twitter as a forum for chatting [1].
The seed set comprised users whose tweets were generally informative in na-
ture, ensuring that our user set is focussed on a subset of users who transact
emergent memes. We extracted the follower and following information of
this seed set and computed the strongly connected component that turned
out to be of size 64K. We then queried Twitter for all the users who were
either following or followed by these 64K users. This gave us an initial set of
7
9,188,701 users.
We then used the "GET followers" method of the Twitter API to extract
the follower and following information of these 9.1 million users. We were
successful in extracting this information for 8,379,871 users. The remaining
users had their accounts suspended or their follower and following informa-
tion was protected. We computed the strongly connected component of this
reduced set. Its size was found to be 8,047,811.
Using the "GET user timeline" method from Twitter's REST API (v 1.1)
we collected tweets from these 8.04 million users' timelines. The GET user
method provides the 3200 most recent tweets of each user and so in order to
build a dataset of at least a month's duration we repeated the crawl after
10 days. The first crawl began on 18th April and ended on 20th April. The
second crawl began on 30th April and ended on 2nd May. The two crawled
sets were then combined to finally obtain all the tweets posted from 27th
March to 29th April 2014, without duplication or omission. This process of
combination involved discarding 26,624 of the users whose high frequency
of tweeting made it impossible to guarantee that we had captured all their
tweets in this 35 day time span. After removing these 26,624 users we recom-
puted the strongly connected component of the remaining network and found
it to have size 7,695,882. These 7,695,882 users with their interconnections
formed our final user network.
3.3 Filtering the hashtags
On examination we found that the most frequently occurring hashtags in the
tweet dataset created were generic hashtags that persist on twitter with a
very high frequency of occurrence e.g. #rt, #tlot, #win, #giveaway and
#jobs.
In order to filter out these hashtags and obtain a set of hashtags
that are fresh in our time span and thereby refer to emergent phenomena we
filtered out all the hashtags that had more than 5 tweets in the first 12 hours
of our time duration. Table 2 shows the 5 most popular hashtags in our
dataset after filtering along with the number of tweets for each of them. The
first one, "bundyranch", refers to a major US news story of the time. The
second one commemorates a Twitter celebrity Nash Grier's follower count
reaching 2 Million. The third and fourth are related to voting prior to the
MTV Movie awards that were held on 13th April 2014, and the fifth one
"epnvsinternet" is part of a mass action by civil organizations in Mexico to
oppose a proposed legislation. These five demonstrate anecdotally that our
8
Hashtag
bundyranch
nashto2mil
votekatniss
votetris
epnvsinternet
Tweets
395,179
152,657
140,031
135,206
104,575
Table 2: Top 5 hashtags in our dataset
filtering process does generally capture emergent topics on Twitter and also
that endogenous topics generated from within Twitter like "nashto2mil" and
exogenous topics like "bundyranch" and "votekatniss" are both present in
our dataset.
3.4 Geolocating the users
Twitter users have the option of specifying their time zone, their country and
their location. The first two of these are populated from a dropdown menu
and the third is entered as a string and hence is often hard to map to an actual
geographical location. These three fields are part of the user's profile and are
embedded in the JSON object containing the user's tweet, which is where
we extracted them from. This JSON object also contains geo-coordinates
from tweets posted from GPS-enabled devices whose users have allowed this
information to be shared but we found that to be a rare occurrence and not
of much use. On examination we found that timezone was a widely present
Time Zone
Eastern Time (US & Canada)
Central Time (US & Canada)
Pacific Time (US & Canada)
London
Quito
Users
967,849
636,541
549,611
395,738
212,584
Table 3: Top 5 time zones in our dataset
attribute, missing only from 630,696, i.e., 11.9% of the 5.3 million users who
had posted at least one tweet in our initial set of 9.1 million users. About
a third of these users, 217,443, had tweeted from GPS-enabled devices and
9
so we were able to map them to time zones using the Google Time Zone
API. For the remaining users we extracted their location string and tried
to map it to a time zone by using common substring heuristics to match
their location strings with popular cities and with location strings of users
that have their time zones set. This helped us locate another 118,488 users.
Finally, we were left with 294,765 users. To these users we assigned the time
zone in which the maximum number of their neighbors were located. Testing
this heuristic on users whose location was known we obtained a 48% success
rate. So, in summary, we were able to correctly geolocate all but 294,765
users out of 5.3 million, i.e., 94.4% of our users. The remaining 5.6% were
tagged with a heuristic that we expect to perform correctly about half the
time. Even if we consider only the subset of 3 million users who tweet once
in our 35 day period and assume that the 294,765 users whose location we
guess all lie in this subset, we see that 90% of our users are correctly tagged
and the remaining 10% are tagged by a heuristic that has 48% accuracy. We
note that there have been several research efforts made to geolocate users
but they have been either at the country level e.g. [20] or at a fine-grained
level of tens of kilometers e.g. [26]. We adopt a simpler strategy here to
achieve geo-location at the intermediate granularity of Twitter time zones
since geo-location is not the primary focus of our paper. As reported we find
that the accuracy we achieve using our simple, and computationally efficient,
methods is significant and good enough for our purpose. Table 3 lists the
top five time zones by population in our user set. We see that along with
what we traditionally understand by time zones like "Eastern Time (US &
Canada)", we also have individual cities like "London" and "Quito."
4 Prediction Task
The goal of our study is to examine how successfully we can discriminate
viral topics from non-viral ones based on their early spreading pattern. In
this section we make this goal concrete. We undertake here a classification
task whose objective is to predict at a particular, early, point in the spread
of a hashtag whether that specific hashtag will, in the future, enter the class
that we define as viral.
Defining virality Various definitions of virality have been used in the
literature. One of them is based on calling a topic viral if it is among the top
10
k% (for some small value of k) of all the topics ranked by their total number
of tweets. This definition has been used by Weng et al. [35] for values of k
starting at 10. A drawback of this definition is that, because of its relative
nature, it is non-monotonic. In other words, a topic may become viral at a
given point of time, but then be declared non-viral at a later point in its life
when some other topics have surpassed it in terms of number of tweets and
it is no longer in the top k%. While it is definitely true that a viral topic
ceases to be viral after some time, to make this percentile-based definition
stick we would also have to provide some kind of time window within which
the topic must remain in the top k%. In order to avoid such complications
we decided to use an alternate definition based on an absolute threshold, i.e.,
we say a topic has become viral if its total number of tweets cross a certain
given threshold M . We call this the virality threshold. We used M = 10, 000
in our experiments. This number has no intrinsic significance. It is based
on the sizes of the spreads of various hashtags in our data set. Note that
while we saw in Table 2 that the 5 largest spreading tags had more than
100,000 tweets, choosing a virality threshold of 10,000 gives us only 6.29%
of hashtags. This top 6.29th percentile that we consider viral is significantly
smaller than the 10th percentile that is taken as viral by Weng et al. [35].
Prediction threshold Since we are interested in predicting the future
spread based on early history, we decided to extract features from the first
n = 1500 tweets. We call this value n the prediction threshold.
In other
words, for each hashtag, we examined its spread in the network upto the
point the 1500th tweet containing that hashtag was posted and extracted
various features based on this early spread. All the topics which did not
cross the n = 1500 tweet mark were ignored for the purpose of our study.
The total number of hashtags that we were left with was 2810, of which 177
crossed the virality threshold.
Choosing a very small value of n may not give us sufficient information
about the topic spread but a very large value of n will make the prediction
meaningless as the peak would already be reached (or be very close). So,
it is important to choose n in an appropriate manner. Further note that
the choice of appropriate n would also depend on the size of the dataset.
For a large dataset n would be higher compared to a smaller dataset simply
because of the sheer volume of tweets generated in the network. To put in
context our choice of n = 1500, another similar recent study by Weng et
11
Figure 2: Time taken to reach the prediction threshold.
al. [35] has used n = 50 tweets as their threshold. The size of their dataset
(in terms of the number of users) is about 5% of the size of the dataset that
we use (595K nodes vs 7.7 million nodes). In order to show that these two
prediction threshold values, Weng et. al's 50 and our 1500 are similar we
plotted the time taken to reach n = 1500 tweets for a particular hashtag
in our dataset and the time taken to reach n = 50 tweets in the dataset of
Weng et. al. [35]. In Figure 2 we have time on the x-axis and the fraction of
hashtags that take at most a given time to reach the prediction threshold for
our dataset (TwitDat) theirs (WengDat). The overlapping nature of the two
curves clearly demonstrates the similarity in the behavior of the topics at
the two prediction thresholds for the two datasets, respectively. The median
time taken to reach the prediction threshold is 12.38 days for our data set
and 13.03 days for Weng et al's. We interpret these results to mean that the
amount of information available at our prediction threshold for our dataset
closely aligns with the amount of information available in the other prediction
threshold for the other major study, and hence our results can be compared
with theirs.
5 Our features
The main contribution of this paper is the definition of a set of novel features
that are critical to the task of predicting virality. We propose a number
12
of new features and argue that one of the most important aspects of early
hashtag growth is the rate of change of the conductance of the subset of nodes
that are tweeting the hashtag. Our prediction algorithm is also the first to
incorporate a set of geography based features. Apart from our conductance
and geography based features we also use a set of temporal features (we
call these "evolution based features") and a set of features that capture the
network characteristics of the early tweeters of a hashtag. In total we have
experimented with 29 different features. The features are listed in Table 4.
We will refer to the users who tweet on a hashtag up to the prediction
threshold as adopters of that hashtag. Of these a special category are what we
call self-initiated adopters who tweet on a hashtag before any of the users that
they follow do so. In some places we will use the term "topic" interchangeably
with "hashtag". The term "geography" will be used to denote Twitter time
zones as described in Section 3 e.g., if we say "the average number of users
in a geography is X" we mean that the average number of users in a Twitter
time zone is X. Further, we will use the term weakly connected component in
the way it has come to be understood i.e. given a directed graph if we treat
each directed edge as undirected and compute the connected components of
the transformed graph, then each of these connected components is known
as a weakly connected component of the original directed graph.
5.1 Feature Categories
We divided our features in the following four categories: 1) Evolution based
features capture very basic analytics of the hashtag's evolution such as num-
ber of adopters, number of retweets, number of user mentions and growth
rate of the topic. Since these are very simple features we will be using them to
generate baselines. 2) Network based features include various network char-
acteristics of the adopters of the topic in terms of their followers, density,
self-initiated adopters and weakly connected component based features. 3)
Geography based features capture the geographical properties of the spread
such as number of infected geographies, intra and inter geography features,
number of self-initiated adopters in each geography etc. 4) Conductance
based features, though based on network properties, have been put in a sep-
arate category due to their prime importance for the task of characterizing
virality. These include conductance as well as its first and second derivative.
Next we discuss the features in each of the above categories.
13
Name
NumOfAdopters
NumOfRT
NumOfMention
TimeTakenToPredThr
HeavyUsers
NumFolAdopters
NumOfEdges
Density
SelfInitAdopters
SelfInitAdoptersFollowers
RatioOfSingletons
RatioOfConnectedComponents
LargestSize
RatioSecondToFirst
InfectedGeo
RatioSelfInitComm
RatioCrossGeoEdges
AdoptEntropy
TweetingEntropy
IntraGeoRT
IntraGeoMention
Description
Evolution based features
Number of adopters who tweeted on the hashtag
Number of retweets (RT) on tweets within the prediction thresh-
old
Number of user mentions (@) in tweets within the prediction
threshold
Growth rate of the hashtag measured in terms of time taken to
reach prediction threshold
Network based features
Number of adopters with at least 3000 followers
Total number of followers of adopters
Number of edges in the network spread, i.e., the subgraph in-
duced by the set of adopters
Subgraph density
Number of Self-initiated adopters
Total follower count of Self-initiated adopters
Ratio of Self-initiated adopters to number of adopters
Ratio of number of weakly connected components to number of
adopters
Size of the largest weakly connected component
Ratio of sizes of the second largest to the largest weakly con-
nected components
Geography based features
Number of infected geographies
Fraction of Self-initiated geographies
Fraction of edges across geographies in the induced subgraph of
adopters
Adoption Entropy measures the distribution of adopters across
ai log ai, where ai is the frac-
geographies and is defined as −(cid:80)
ographies and is defined as −(cid:80)
i
tion of adopters in each geography i
Tweeting Entropy measures the distribution of tweets across ge-
ti log ti, where ti is the fraction
i
of tweets in each geography i
Fraction of retweets occurring between users from the same ge-
ography
Fraction of user mentions occurring between users from the same
geography
Conductance based features
CummConductance
Conduct' k,
k = {20, 50, 100, 250}
Conduct"
Conduct' stdev, Conduct" stdev
Conductance of the subgraph induced by the set of adopters
First derivative of conductance for different values of smoothing
parameter k
Second derivative of conductance
Standard deviation of first and second derivative of conductance
Table 4: Feature descriptions. All features have been captured with respect
to tweets within the prediction threshold
14
(a) Evolution based features (E)
(b) Network based features (N)
(c) Geography based features (G)
(d) Conductance based features (C)
Figure 3: Change in correlation coefficient with increase in number of tweets.
Bars indicate the 95% confidence interval
5.1.1 Evolution-based features
These features include basic characteristics about the topic evolution and in-
clude the following 4 features: 1) Number of Adopters 2) Number of Retweets
3) Number of User Mentions 4) Growth Rate defined as the time taken to
reach the prediction threshold. We group these in two sets, denoting the first
and the fourth features as the set E1, and the second and third as E2. We
note that the first two features have been used before by Weng et. al. [36, 35].
Growth Rate was used, along with a number of variations thereof, by Cheng
et. al. [6]. Zaman et. al. [38] used the number of retweets and other aspects
of retweeting as features for their prediction task while Jenders et. al. [17]
used number of user mentions as a feature. For us, as mentioned earlier, this
set of features will be used to create non-trivial baselines. The first base-
line will use only the features E1 while the second baseline will use all four
features. The details of how these baselines will be used are discussed in
Section 6.
We plotted the change in Spearman's rank correlation coefficient, mea-
sured between feature values and total hashtag growth, with increasing num-
ber of tweets for all hashtags that had at least 5000 tweets (see Figure 3(a)).
15
For the feature set E we find the number of adopters and number of RTs
are positively correlated with hashtag growth but the correlation levels out,
while the time to prediction threshold is highly negatively correlated and
continues to grow in this direction. This latter observation is similar to that
of Cheng et. al. [6] who observed that successful cascades get many views in
a short amount of time.
5.1.2 Network-based features
We used the following 10 network based features (divided into 3 sub-categories)
for our study. The first subset includes features based on adopters and their
connections: 1) Number of Adopters with Heavy Following where a user with
at least 3000 followers is said to have a heavy following (recall that the average
number of followers in our dataset is 450). This discriminative significance of
this feature has been discussed by Ardon et. al. [3]. A related but somewhat
different feature, the average authority of users, was used by Ma et. al. [25].
2) Number of Followers of Adopters. 3) Number of Edges in the Network
Spread 4) Subgraph Density defined as the ratio of the number of edges to
the number of nodes in the network spread. Versions of these three feature
have been used by Cheng et. al. [6] and Jenders et. al. [17] and also discussed
by Ardon et. al. [3].
The second subset includes 3 features based on self-initiated adopters, i.e.,
adopters with no neighbors who have adopted the same hashtag before the
prediction threshold. These include 1) Number of Self-Initiated Adopters 2)
Follower Count of Self-Initiated Adopters 3) Ratio of Self-Initiated Adopters
to Number of Adopters. We note that the cascade setting of Cheng et. al. [6]
involves, by definition, just one "root" whereas we can have any number of
self-initiated adopters, reflecting the critical difference between that setting
and the setting we study here.
Lastly, we used 3 weakly connected component based features. These
include 1) Ratio of Number of Weakly Connected Components to Number of
Adopters 2) Size of the largest Weakly Connected Component 3) Ratio of the
Sizes of the Two Largest Weakly Connected Components. Ardon et. al. [3]
have posited a merging phenomenon in the growth of a hashtag to virality:
initially the growth of the meme takes place in small separate clusters that
begin merging for those memes that are moving towards virality, but remain
separate for those memes that are not. These three features attempt to
quantify this process. To the best of our knowledge they have never been
16
used for this kind of prediction task before.
For the network features of feature set N, we find that the correlation co-
efficient is generally positive and significant and remains stably so (Fig. 3(b)).
An important deviation is the ratio of the second largest to the largest com-
ponent which is negatively correlated with hashtag growth. This negative
correlation continues to increase as the number of tweets seen increases re-
flecting the fact that components merge to find a giant component as virality
approaches.
5.1.3 Geography-based features
Taking user geographies (time zones as defined by Twitter that we extracted
(see Section 3)) into account, we were able to define a set of 7 features. 1)
Number of Infected Geographies i.e. geographies with at least one tweet about
the topic. 2) Fraction of Self-Initiated Geographies i.e.
fraction of geogra-
phies where the first user tweeting was self-initiated. 3) Fraction of Edges
across Geographies i.e., fraction of total edges whose end points lie in different
geographies. We used 1) Adoption Entropy and 2) Tweeting Entropy across
geographies as two of our features. We captured intra-geography activity us-
ing the following two features: 1) Fraction of Intra-Geography Retweets and
2) Fraction of Intra-Geography Mentions. The fractions refer to the fraction
of total number of retweets and mentions to the intra-geography retweets
and mentions, respectively. Of these features, we note that the fraction of
edges across geographies has been highlighted as a discriminative metric by
Ardon et. al. [3]. The rest are similar in flavor to the community-based
features used by Weng et. al. [36, 35], except we use time zone as our notion
of community here. The exception to this is the feature Fraction of Self-
Initiated Geographies which is used for the first time here. We note that our
current work is the first time, to the best of our knowledge, that geographical
information is being used for virality or meme growth prediction.
Looking at the correlation coefficient evolution of the feature set G we
find that the number of infected geographies is positively correlated with
successful topics and remains stably so (Fig. 3(c)). Notable here is that the
tweeting entropy displays a high correlation with hashtag growth.
17
5.1.4 Conductance-based features
Given a graph G = (V, E) and a subset of nodes S ⊆ V , the conductance
φ(S) of the set S is defined as the ratio of the number of edges outgoing from
S (i.e. follower links of the nodes in the set S) that land outside S i.e.:
φ(S) =
{(u → v) : u ∈ S, v ∈ V \S}
{(u → v) : u ∈ S, v ∈ V }
(1)
Conductance is a isoperimetric quantity that has been shown to be closely
related to mixing times of random walks in graphs [18]. In a diffusion setting
more general than a random walk, Chierichetti et. al. showed that the time
taken for a rumor to spread through a network can be characterized in terms
of the conductance of the graph [7]. Empirical evidence linking conductance
with diffusion in graphs was provided by Ardon et. al. [3] who found that the
conductance of viral memes undergoes a sharp dip as they approach virality.
To visualize this in the network setting, we can think of it this way: When a
topic goes viral it saturates the structural community enveloping it, hitting
the low conductance boundary of that community. With this in mind we
chose to investigate a set of conductance based features for our prediction
problem.
We used 3 types of conductance based features in our study: the conduc-
tance, and its first and second derivatives. To calculate the first derivative
at prediction threshold n, the following methodology was used. Let us define
a time instant as the occurrence of a tweet event. Let ci denote the conduc-
tance value at the ith time instant. Then, for a given smoothing parameter
k, the conductance derivative (w.r.t. number of time instants elapsed) is
defined as
∆c
∆t
=
(cn − cn−k)
(tn − tn−k)
In words, the conductance derivative is the ratio of difference in the con-
ductance value at the prediction threshold (n) and the conductance value k
tweets prior to the prediction threshold to the difference in their correspond-
ing timestamps. The second derivative of conductance is calculated in a sim-
ilar manner using the values of the first derivative. For the first derivative,
we used the value of k as 20, 50, 100 and 250. For the second derivative, we
used the first derivative values at k = 50 and k = 100. We also measure the
standard deviation of the first and second derivatives of the conductance over
the last 100 tweets before the prediction threshold is reached. This resulted
18
in a total of 8 conductance based features (conductance, 5 first derivative
based features and 2 second derivative based feature).
The importance of the change in conductance as a feature becomes clear
when we look at the way the correlation coefficients of the derivatives of
conductance evolve with the number of tweets (Fig. 3(d)). In particular the
standard deviation of both the first and second derivatives grow continuously,
reaching a very high value of 0.4 when 5000 tweets have been seen. This
strong correlation foreshadows the striking effect on prediction results that
this feature set is found to have (see Section 6).
The intuition behind Conductance based features Our conductance-
based features should be compared to the "first surface" feature of Weng et.
al. [36, 35], or the "border users" of Ma et. al. [25], which are simply the
number of "uninfected" neighbors of users who have tweeted a hashtag i.e.
neighbors who have not yet tweeted that hashtag. This "first surface" (and
the similarly defined "second surface") is subtler than the features in the
flavor of "number of neighbors" used by Jenders et. al. [17] and Cheng et.
al. [6] which do not distinguish between neighbors that have already prop-
agated the meme and those that have not. But conductance goes a step
further. Conductance has been widely used to measure the quality of com-
munities produced by community detection algorithms (see e.g. [24] or, [16])
and even been shown to be tightly related to the clustering coefficient of a
graph [11]. In view of this, the correct way of interpreting the conductance
based features is by viewing the diffusion process in its early stages as mov-
ing inside communities. At the point of virality, a hashtag saturates each of
these communities, i.e., it reaches the boundary of the community and the
conductance falls since the edges leaving a community are a small fraction
of the total edges of the community, the majority of the edges being pointed
inward. Hence the ratio of the outward edges to the total edges is a much
more important feature than simply the number of outward edges because
it captures how clustered a certain set of nodes is. This intuition is borne
out by the fact that the derivatives of conductance are highly correlated with
topic growth (as we saw in Fig. 3(d) and by the strong impact these features
have on the quality of prediction (see Sec. 6).
Information gain of our features We further quantified the efficacy
of our proposed features for the purpose of prediction by computing the
19
information gain of each feature. This metric, roughly speaking, reflects
the amount of information the knowledge of a particular feature value of the
evolution of a hashtag upto the prediction threshold gives us about the class --
viral or non-viral -- to which the hashtag belongs. Given two random variables
X and Y , the information gain of Y with respect to X captures the reduction
in entropy of Y given X. Information gain is a symmetric metric that is also
known as the mutual information between X and Y and is represented as
I(X, Y ) = H(Y ) − H(Y X). Here H(Y X) is the conditional entropy of Y
given X and is defined analogous to the entropy, now using the conditional
i P (Y =
yi) log(P (Y = yi)) where P (Y = yi) is the probability that Y takes the ith
state/value. Intuitively, information gain captures the amount of information
that knowing X can give us about Y .
distribution of Y X. Recall that entropy is defined as H(Y ) = −(cid:80)
Table 5 shows the top 2 features from each category based on their in-
formation gain. Conductance-based features were found to have the highest
information gain among all the features across all the categories. The top
feature in this category is the first derivative of the conductance which im-
plies that the speed of the spreading process is a key indicator of its eventual
success. This validates our earlier thesis about conductance and its prop-
erties being very important features for characterizing virality. The highest
value of information gain that we have is 0.04527 for the first derivative of
the conductance. This is a non-trivial value but is relatively small, which
provides us a quantitative measure of the hardness of the prediction prob-
lem. We also note that computing the information gain of individual features
does not reveal the entire story since it does not take their dependence into
account. The joint effect of features comes out in our experimental results
(Section 6.)
6 Experiments
The goal of our experiments was to answer the following questions: a) How
effective is each set of features (and the combinations thereof) defined in
Section 5 in predicting hashtag virality? b) What is the impact of changing
prediction threshold on virality prediction? c) How does our approach com-
pare with existing approaches on existing datasets? In order to answer these
questions, we used the features defined in Section 5 in a machine learning
classification and learned a model to predict which hashtags go viral. Specif-
20
Feature
Set
1. Growth Rate
2. No. of Adopters
1. No. of Adopters
with Heavy Following
2. Number of Edges
E
E
N
N
Info.
Gain
0.02424
0.00979
Feature
1. Tweeting Entropy
2. No. Of Infected
Geographies
0.01175
1. 1st Derivative
0.0099
of Conductance (k=50)
2. Stdev of 2nd Derivative
of Conductance
Set
G
G
C
C
Info.
Gain
0.01249
0.00938
0.04527
0.03526
Table 5: Top Ranking Features Based on Information Gain
ically, the task was to predict whether the number of tweets containing a
hashtag will cross the virality threshold or not given its feature values at the
prediction threshold.
To answer the first two questions, we experimented on the dataset com-
piled by us as detailed in Section 3. In order to answer the last question, we
compared our approach with that of Weng et al. [35] on their dataset, under
the same experimental conditions.
6.1 Experimental Setup
We will refer to our dataset detailed in Section 3 as TwitDat. For experiments
on this data, we used the methodology defined in Section 4 for defining which
hashtags are declared to be viral. The prediction threshold was chosen to be
n = 1500. Only those hashtags which crossed the n = 1500 mark were used
for training and testing purposes. This left us with a total of 2810 hashtags.
Only about 6.3% of these hashtags were found to cross the virality threshold
of 10,000.
Algorithms We refer to our feature based approach for predicting viral-
ity as CGNP (Conductance Geography and Network topology based Pre-
dictor). We experimented with using various combinations of our feature
sub-categories defined in Section 5 i.e. 1) Evolution Based (E) which was
used to generate two baselines 2) Network Based (N) 3) Geography Based
(G) 4) Conductance Based (C). When using CGNP with a certain subset
of feature categories, we will append the names of categories used as fea-
tures. For example, CGNP(E+N) means that we are using evolution based
21
and network based features only. We compare CGNP using various feature
combinations with the following 3 baselines:
Random: This is the naıve algorithm which randomly (with 0.5 proba-
bility) predicts a hashtag to be viral.
CGNP(E1): This is the feature based prediction using the very basic
evolution features, i.e., number of adopters and number of retweets. We will
refer to these set of features as E1. This is used as a baseline because of the
very intuitive nature of these features for prediction and their prior use for
prediction in the past literature (see Sec. 5.1.1 for details).
CGNP(E): This is the feature based prediction using all the four evo-
lution based features described in Section 5. These features enhance the
feature set E1 but are still basic and have been used before (see Sec 5.1.1)
and so can be thought of as a baseline.
Learning Methodology We compare various prediction algorithms across
two primary metrics: AUC, i.e. area under the Precision Recall curve and
F-measure. We will also report Precision and Recall. For all our experi-
ments, we used Random Forests with 500 trees as our learning algorithm.
For training of each decision tree, (cid:100)log2 #f eatures(cid:101) number of random fea-
tures are used, where #f eatures is the total number of features considered in
the learning algorithm. We performed 10 fold cross validation over a random
split of the data for training and testing purposes.
We briefly describe the evaluation metrics used: AUC, Precision, Recall
and F-measure. The class probabilities assigned to each test data example
by the learning algorithm are subsequently compared with a threshold θ, to
transform the probability values to binary outputs (1, if the class probability
is greater than θ and 0, otherwise). These predicted labels for the examples
are compared with the corresponding actual class labels to get the number
of true positives (tp), false positives (fp), true negatives (tn) and false nega-
tives (fn), where positive refers to the virality class. Then, Precision= tp
tp+f p ,
Recall= tp
tp+f n , and F-measure, or F1-score is the harmonic mean of Preci-
sion and Recall, i.e., F-measure= 2.P recision.Recall
P recision+Recall . The Precision-Recall curve
is obtained by varying the value of the threshold, θ. AUC is calculated as
the numerical approximation of area under this curve. Thus, AUC gives a
threshold-independent measure of classifier performance and is often used in
cases of datasets with high class imbalance [8].
Note that class distribution is very skewed for our dataset with class size
22
ratio for the virality and non-virality classes being close to 1:15. Using the
ideas from literature to deal with high class imbalance [9], we undersampled
the majority (non-viral) class at a rate of about 0.3 to bring the class size
ratio to 1:4.5. Undersampling was done only on the training folds and test
distribution was kept as is.
6.2 Effect of Feature Sets
To answer the first question, Table 6 shows the values of AUC, F-Measure,
Precision and Recall for the baselines used as well as various combinations
of feature categories for CGNP. The best performing feaure combination has
been highlighted in bold for each of the metrics. Random has the highest
recall of 50% but has an extremely low precision. CGNP(E) is the strongest
baseline algorithm among the 3 compared. There is a gradual improvement in
both AUC and F-measure as more sophisticated features are added. Adding
both network (E+N) and geography (E+G) based features leads to some
improvement in prediction results, effect of geography being somewhat more
than that of network based features. Combining them together (E+N+G)
does not lead to any further improvement in results which probably means
that the two feature categories are capturing similar effects.
There is a significant improvement in Precision, Recall, F-measure as well
as AUC over the baseline using conductance based features. Conductance
results in both F-measure and AUC going up by more than 7% over the
baseline. This points to a very strong efficacy of conductance features in
predicting virality. This observation is in line with the correlation graphs and
information gain numbers presented in Section 5. Adding network based and
geography based features leads to a further improvement in results of about
1.5% for F-measure (E+N+C) and up to 3.5% for AUC (E+N+G+C). This
means that though conductance is the most effective feature for prediction,
there is some additional signal captured by network and geography based
features for this task. The best performing feature combination for F-measure
is (E+N+C) and for AUC is (E+N+G+C).
Both our F-measure and AUC numbers appear somewhat on the lower
side. This is because virality prediction is an extremely difficult task for
prediction. Nevertheless, what we really care about is capturing early on
a reasonable fraction of hashtags which would go viral with some accetable
number of false positives (hashtages predicted viral which were actually not).
With the (E+N+G+C) model, we have a recall of close to 40% with a pre-
23
cision of about 33%. This means that we are able to capture 2 out of every
5 hashtags that go viral, while paying the cost of sieving through 3 hashtags
for every truly viral hashtag output by the system. This seems reasonable
considering the difficutly of the task and a highly skewed positive class ratio
of less than 7 in 100.
Algorithm
Random
CGNP(E1)
CGNP(E)
CGNP(E+N)
CGNP(E+G)
CGNP(E+C)
CGNP(E+N+G)
CGNP(E+G+C)
CGNP(E+N+C)
CGNP(E+N+G+C)
Precision Recall F-meas. AUC
6.30
14.9
18.5
20.7
20.9
26.2
20.3
28.0
28.2
30.0
11.19
19.49
27.52
27.88
29.53
34.91
28.02
36.12
36.28
35.57
6.30
13.51
30.00
21.69
29.12
36.65
22.65
30.08
31.4
32.7
50.0
35.03
25.42
38.98
29.94
33.33
36.72
45.19
42.94
38.98
Table 6: Results comparing CGNP using various feature combinations and
baselines on TwitDat (all values in %)
6.3 Effect of Prediction Threshold
To answer the second question, we analyzed the performance of our al-
gorithms with varying prediction threshold. As explained in Section 4, a
small value of the prediction threshold may not give good prediction results,
whereas a large value of the threshold may not be very useful since we are not
able to make the prediction early enough in the hashtag evolution history.
Figure 4 plots the variation in AUC for different feature sets of CGNP. At any
given value of prediction threshold, adding more sophisticated features helps
improve the performance further (barring few minor exceptions). The most
improvement is obtained by adding conductance based features as observed
earlier.
As expected, the performance of all the models improves with increasing
prediction threshold. The maximum rate of increase is seen when prediction
threshold goes from 1000 to 1500 (which is the value of prediction threshold
in rest of our experiments) after which the gains seem to taper off. This
24
justifies our choice of prediction threshold by showing that 1500 tweets is the
earliest point at which a certain quality of prediction can be achieved.
Figure 4: AUC versus Prediction Threshold
6.4 Comparison on Existing Datasets
To answer the third question, we experimented on the dataset of 595K users
compiled by Weng et al. [35], made available on their website.1 We will refer
to their dataset as WengDat. For our results to be directly comparable with
Weng et al.'s approach on their dataset, we used their definition of virality,
i.e., a hashtag is declared to be viral if it lies in the top 10% of all the hashtags
in a ranking based on the total number of tweets for each hashtag at the end
of the observation period. We used their prediction threshold as used by
them, i.e., n = 50, and their learning setting as theirs i.e., Random Forests
with 500 trees and 10 fold cross validation over a random split of the data.
We did not perform any undersampling on this dataset. We compared our
feature combinations with Weng et al.'s feature based approach. We refer
to their approach as WFVP (Weng Feature based Virality Predictor). For
1http://carl.cs.indiana.edu/data/#virality2013
25
WFVP, we directly use the results reported by them in their paper using
their best combination of features.
Table 7 compares the performances of WFVP and CGNP using various
feature combinations. Weng et al. already demonstrated the superior perfor-
mance of their approach over a number of non-trivial baselines so we report
their final results here. We do not have AUC numbers for WFVP as they are
not reported by Weng et al. We did not have geography information for their
dataset so we used CGNP with only the three feature groups E, N and C.
First, note that as on TwitDat, adding sophisticated features to CGNP helps
improve performance. The most improvement is obtained by adding conduc-
tance based features as was the case with TwitDat. Compared to WFVP, we
are able to achieve a significantly high recall at the cost of a smaller loss in
precision. In a scenario where it is important not to miss a potentially viral
topic (as is the case with many of our motivating applications), obtaining a
high recall becomes important. Note that overall, our precision-recall com-
bination results in an F-measure which is 4.5% more than the best results
reported by Weng et al. A more fine grained comparison with WFVP throws
additional light. Using only evolution and network based features, CGNP
performs worse than WFVP in terms of F-measure. We attribute this pri-
marily to the community based features used by Weng et al. which have
been shown to be quite effective for prediction. Significantly, once conduc-
tance based features are added, CGNP starts outperforming WFVP, even
when we do not include network based features. Effectively, conductance
is able to make-up for the lack of community based features for the task
of virality prediction (and in fact, performs better). Further, we note that
our conductance based features are local in the sense that they can be com-
puted by examining the relevant portion of the network where the hashtag is
currently diffusing and does not require the entire network to be taken into
memory.
6.5 Geographical Trends
We also evaluated the performance of CGNP over hashtags based on their
spread within individual geographies, i.e., the graph of interest was restricted
to the nodes lying within individual geographies in the dataset. In particular,
we experimented with three different geographies, namely, London, India and
Quito. Since the number of users across each geography varies, we appropri-
ately scaled the prediction and virality thresholds for individual geographies.
26
Algorithm
Random
CGNP(E1)
CGNP(E)
CGNP(E+N)
CGNP(E+C)
CGNP(E+N+C)
WFVP
Precision Recall F-meas. AUC
10.0
28.7
33.8
39.1
52.5
53.1
16.66
36.28
37.28
39.94
49.91
51.08
46.58
10.00
26.07
29.50
32.22
46.12
43.61
66.00
50.0
59.59
50.65
52.51
54.37
61.63
36.00
-
Table 7: Results comparing CGNP using various feature combinations with
WFVP on WengDat (all values in %)
Geogr- # Active Prediction
aphy
London
India
Quito
Virality % of Viral
users Threshold Threshold Hashtags
3.56
226906
28935
8.67
3.14
91871
1500
1000
500
150
100
50
Table 8: Individual Geography Statistics
Virality threshold was maintained at 10 times the prediction threshold, in
line with the ratio used for the entire dataset. The prediction threshold was
hand tuned to ensure there was sufficient information in the data up to that
point. Table 8 presents the details about number of active users (i.e. those
who have tweeted at least once), prediction and virality thresholds, and %
of viral hashtags for each of the above geographies. Table 9 presents the
F-measure and AUC values for various feature combinations for each of the
geographies. Note that since we are already within individual geographies,
the feature category G is absent in the combination. As seen in case of the
full dataset, the performance increases with increasing sophistication in the
feature set. For London and India, maximum benefit is obtained using the
conductance based features. Network based features help improve this fur-
ther. For Quito, network based features seem to give a larger gain. Best
feature combination is still E+N+C.
27
Quito
London
F AUC
F AUC
Algorithm
3.1
5.9
3.6
6.7
Random
19.42
8.8
14.53
9.1
CGNP(E1)
9.0
17.69
10.4
15.38
CGNP(E)
17.1
22.52
9.3
14.21
CGNP(E+N)
9.7
14.8
CGNP(E+C)
17.42
20.19
15.5 42.03 36.2 23.56
CGNP(E+N+C) 22.17
17.3
India
F AUC
8.7
19.6
23.9
27.6
31.3
14.8
26.85
31.26
34.84
37.54
Table 9: Results on Individual Geographies.
7 Conclusions
In this work, we have carefully studied the effect of three different sets of
feature categories, i.e., network based, geography based and conductance
based, for the task of predicting hashtag virality in a large dataset. Our
main contribution is a novel feature set that includes new features based on
the network properties of the users tweeting a hashtag and the geographical
information contained in their profiles and in their tweets. Building on the
intuition that the spread of memes across communities is a critical discrimi-
nator of viral topics we have introduced a suite of conductance based features
for the prediction task. We found that all our three feature categories (apart
from the baseline evolution based features), have a significant impact on vi-
rality prediction, with conductance being the most effective. This justifies
the intuition regarding the relationships of communities and virality and sug-
gests that a more dynamic view of communities, centred around the diffusion
pattern of individual hashtags, is more appropriate and effective for the pre-
diction task. The fact that our feature set outperforms approaches relying
on static communities detected in the network (such as the work of [35]) is
doubly important in view of the fact that detecting static communities in
the entire network is very expensive computationally at scale.
Future research directions include further investigating the use of our
proposed feature sets for predicting spread of topics in individual geogra-
phies, more carefully examining the relative impact of community based and
conductance based features and incorporating semantic features in our frame-
work.
28
References
[1] Pranay Agarwal. Prediction of trends in online social network. Master's
thesis, Indian Institute of Technology, Delhi, 2013.
[2] Sinan Aral and Dylan Walker. Creating social contagion through vi-
ral product design: A randomized trial of peer influence in networks.
Manag. Sci., 57(9):1623 -- 1639, 2011.
[3] Sebastien Ardon, Amitabha Bagchi, Anirban Mahanti, Amit Ruhela,
Aaditeshwar Seth, Rudra Mohan Tripathy, and Sipat Triukose. Spatio-
temporal and events based analysis of topic popularity in Twitter. In
Proc. 22nd ACM Intl. Conf. on Information and Knowledge Manage-
ment (CIKM 2013), pages 219 -- 228. ACM, 2013.
[4] Jonah Berger and Katherine L Milkman. What makes online content
viral? J. Marketing Res., 49(2):192 -- 205, 2012.
[5] Peter Bright. How the london riots showed us two sides of social net-
working. Posted on http://arstechnica.com/, 11 August 2011, August
2011.
[6] Justin Cheng, Lada A. Adamic, P. Alex Dow, Jon M. Kleinberg, and
Jure Leskovec. Can cascades be predicted? In Proc. 23rd Intl. World
Wide Web Conference (WWW '14), pages 925 -- 936, 2014.
[7] F. Chierichetti, S. Lattanzi, and A Panconesi. Almost tight bounds
for rumour spreading with conductance. In Proc. 42nd ACM Symp. on
Theory of computing (STOC '10), pages 399 -- 408, 2010.
[8] Jesse Davis and Mark Goadrich. The relationship between precision-
recall and roc curves. In Proceedings of the 23rd international conference
on Machine learning, pages 233 -- 240. ACM, 2006.
[9] Chris Drummond and Robert C. Holte. C4.5, class imbalance, and
In ICML
cost sensitivity: Why under-sampling beats over-sampling.
Workshop on Learning from Imbalanced Datasets, pages 1 -- 8, 2003.
[10] R. Ghosh and K. Lerman. A framework for quantitative analysis of
cascades on networks. In Proc. 4th ACM International Conference on
Web search and data mining (WSDM '11), pages 665 -- 674, 2011.
29
[11] David F. Gleich and C. Seshadhri. Vertex neighborhoods, low conduc-
tance cuts, and good seeds for local community methods. In Proc. 18th
ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining
(KDD '12), pages 597 -- 605, 2012.
[12] Marco Guerini, Jacopo Staiano, and David Albanese. Exploring image
virality in Google Plus. In Proc. ASE/IEEE Intl. Conference on Social
Computing (SocialCom 2013), pages 671 -- 678, 2013.
[13] Marco Guerini, Carlo Strapparava, and Gozde Ozbal. Exploring text
virality in social networks. In Proc. Intl. AAAI Conf. on Weblogs and
Social Media (ICWSM 2011), 2011.
[14] Venkatesan
Guruswami.
A comparison
chains:
http://www.cs.cmu.edu/ venkatg/pubs/pubs.html, 2000.
of
Rapidly
techniques.
mixing
Markov
at:
Available
[15] Lars Kai Hansen, Adam Arvidsson, Finn Arup Nielsen, Elanor Colleoni,
and Michael Etter. Good friends, bad news-affect and virality in twitter.
In Future information technology, pages 34 -- 43. Springer, 2011.
[16] Steve Harenberg, Gonzalo Bello, L. Gjeltema, Stephen Ranshous, Ji-
tendra Harlalka, Ramona Seay, Kanchana Padmanabhan, and Nagiza
Samatova. Community detection in large-scale networks: a survey and
empirical evaluation. WIREs Comput Stat, 6:426 -- 439, 2014.
[17] Maximilian Jenders, Gjergji Kasneci, and Felix Naumann. Analyzing
and predicting viral tweets. In WWW (Companion Volume), pages 657 --
664, 2013.
[18] M. R. Jerrum and A. J. Sinclair. Approximating the permanent. SIAM
J. Comput., 18:1149 -- 1178, 1989.
[19] Maksim Kitsak, Lazaros K Gallos, Shlomo Havlin, Fredrik Liljeros, Lev
Muchnik, H Eugene Stanley, and Hern´an A Makse.
Identification of
influential spreaders in complex networks. Nature Phys., 6(11):888 -- 893,
2010.
[20] Juhi Kulshrestha, Farshad Kooti, Ashkan Nikravesh, and Krishna P.
In
Geographic Dissection of the Twitter Network.
Gummadi.
Proc. ICWSM 2012, 2012.
30
[21] H. Kwak, C. Lee, H. Park, and S. Moon. What is Twitter, a social
In Proc. 19th Intl. conference on World
network or a news media?
Wide Web (WWW '10), pages 591 -- 600, 2010.
[22] Kristina Lerman and Tad Hogg. Using a model of social dynamics to
predict popularity of news. In Proc. 19th Intl. conference on World Wide
Web (WWW '10), pages 621 -- 630. ACM, 2010.
[23] J. Leskovec, L. Backstrom, and J. Kleinberg. Meme-tracking and the
dynamics of the news cycle. In Proc. KDD '09, pages 497 -- 506. ACM,
2009.
[24] Jure Leskovec, Kevin J. Lang, and Michael W. Mahoney. Empirical com-
parison of algorithms for network community detection. In Proc. 19th
Intl. Conf. on World Wide Web (WWW '10), pages 631 -- 640, 2010.
[25] Zongyang Ma, Aixin Sun, and Gao Cong. On predicting the popularity
of newly emerging hashtags in twitter. J. Assoc. Inf. Sci. Technol.,
64(7):1399 -- 1410, 2013.
[26] J. McGee, J Caverlee, and Z. Cheng. Location prediction in social media
based on tie strength. In Proc. 22nd ACM Intl. Conf. on Information
and Knowledge Management (CIKM 2013), pages 459 -- 468, 2013.
[27] Seth A. Myers, Chenguang Zhu, and Jure Leskovec. Information diffu-
sion and external influence in networks. In Proc. KDD '12, pages 33 -- 41,
2012.
[28] Onook Oh, Manish Agrawal, and H Raghav Rao. Rumor and Commu-
nication in Asia in the Internet Age, chapter 8, pages 143 -- 155. Taylor
and Francis, 2013.
[29] S Rajyalakshmi, Amitabha Bagchi, Soham Das, and Rudra M Tripa-
thy. Topic diffusion and emergence of virality in social networks. arXiv
preprint arXiv:1202.2215, 2012.
[30] D. M. Romero, B. Meeder, and J. Kleinberg. Differences in the mechan-
ics of information diffusion across topics: idioms, political hashtags, and
complex contagion on twitter. In Proc. 20th Intl. conf. on World Wide
Web (WWW '11), pages 695 -- 704, 2011.
31
[31] Bongwon Suh, Lichan Hong, Peter Pirolli, and Ed H Chi. Want to be
retweeted? large scale analytics on factors impacting retweet in twitter
network. In IEEE/ASE SocialCom 2010, pages 177 -- 184. IEEE, 2010.
[32] Gabor Szabo and Bernardo A Huberman. Predicting the popularity of
online content. Comm. ACM, 53(8):80 -- 88, 2010.
[33] Luam Catao Totti, Felipe Almeida Costa, Sandra Eliza Fontes de Avila,
Eduardo Valle, Wagner Meira Jr., and Virgilio Almeida. The impact of
visual attributes on online image diffusion. In Proc. ACM Web Science
Conference (WebSci '14), pages 42 -- 51, 2014.
[34] Lilian Weng, Alessandro Flammini, Alessandro Vespignani, and Filippo
Menczer. Competition among memes in a world with limited attention.
Sci. Rep., 2, 2012.
[35] Lilian Weng, Filippo Menczer, and Yong-Yeol Ahn. Virality prediction
and community structure in social networks. Sci. Rep., 3, 2013.
[36] Lilian Weng, Filippo Menczer, and Yong-Yeol Ahn. Predicting success-
ful memes using network and community structure. In 8th Intl. AAAI
Conference on Weblogs and Social Media (ICWSM 2014), 2014.
[37] Fang Wu and Bernardo A Huberman. Novelty and collective attention.
Proc. Natl. Acad. Sci. U.S.A, 104(45):17599 -- 17601, 2007.
[38] T Zaman, E B Fox, and E T Bradlow. A bayesian approach for predicting
the popularity of tweets. Ann. Appl. Stat., 8(3):1583 -- 1611, 2014.
32
|
1205.6822 | 1 | 1205 | 2012-05-30T20:08:17 | Friendship networks and social status | [
"cs.SI",
"physics.soc-ph"
] | In empirical studies of friendship networks participants are typically asked, in interviews or questionnaires, to identify some or all of their close friends, resulting in a directed network in which friendships can, and often do, run in only one direction between a pair of individuals. Here we analyze a large collection of such networks representing friendships among students at US high and junior-high schools and show that the pattern of unreciprocated friendships is far from random. In every network, without exception, we find that there exists a ranking of participants, from low to high, such that almost all unreciprocated friendships consist of a lower-ranked individual claiming friendship with a higher-ranked one. We present a maximum-likelihood method for deducing such rankings from observed network data and conjecture that the rankings produced reflect a measure of social status. We note in particular that reciprocated and unreciprocated friendships obey different statistics, suggesting different formation processes, and that rankings are correlated with other characteristics of the participants that are traditionally associated with status, such as age and overall popularity as measured by total number of friends. | cs.SI | cs |
Friendship networks and social status
Brian Ball1 and M. E. J. Newman1, 2
1Department of Physics, University of Michigan, Ann Arbor, MI 48109, U.S.A.
2Center for the Study of Complex Systems, University of Michigan, Ann Arbor, MI 48109, U.S.A.
In empirical studies of friendship networks participants are typically asked, in interviews or ques-
tionnaires, to identify some or all of their close friends, resulting in a directed network in which
friendships can, and often do, run in only one direction between a pair of individuals. Here we
analyze a large collection of such networks representing friendships among students at US high and
junior-high schools and show that the pattern of unreciprocated friendships is far from random. In
every network, without exception, we find that there exists a ranking of participants, from low to
high, such that almost all unreciprocated friendships consist of a lower-ranked individual claiming
friendship with a higher-ranked one. We present a maximum-likelihood method for deducing such
rankings from observed network data and conjecture that the rankings produced reflect a measure of
social status. We note in particular that reciprocated and unreciprocated friendships obey different
statistics, suggesting different formation processes, and that rankings are correlated with other char-
acteristics of the participants that are traditionally associated with status, such as age and overall
popularity as measured by total number of friends.
Introduction
A social network, in the most general sense of the term,
consists of a group of people, variously referred to as
nodes or actors, connected by social interactions or ties
of some kind [1]. In this paper we consider networks in
which the ties represent friendship. Friendship networks
have been the subject of scientific study since at least
the 1930s. A classic example can be found in the stud-
ies by Rapoport and collaborators of friendship among
schoolchildren in the town of Ann Arbor, MI in the 1950s
and 60s [2], in which the investigators circulated ques-
tionnaires among the students in a school asking them
to name their friends. Many similar studies have been
done since then, with varying degrees of sophistication,
but most employ a similar questionnaire-based method-
ology. A counterintuitive aspect of the resulting networks
is that they are directed. Person A states that person B
is their friend and hence there is a direction to the ties
between individuals. It may also be that person B states
that person A is their friend, but it does not have to be
the case, and in practice it turns out that a remarkably
high fraction of claimed friendships are not reciprocated.
In the networks we study in this paper the fraction of
reciprocated ties rarely exceeds 50% and can be as low
as 30%.
This could be seen as a problem for the experimenter.
One thinks of friendship as a two-way street—a friend-
ship that goes in only one direction is no friendship at all.
How then are we to interpret the many unreciprocated
connections in these networks? Are the individuals in
question friends or are they not? One common approach
is simply to disregard the directions altogether and con-
sider two individuals to be friends if they are connected
in either direction (or both) [3]. In this paper, however,
we take a different view and consider what we can learn
from the unreciprocated connections.
It has been con-
jectured that, rather than being an error or an annoy-
ance, the pattern of connections might reflect underlying
features in the structure or dynamics of the community
under study [4–6].
Working with a large collection of friendship networks
from US schools, we find that in every network there is
a clear ranking of individuals from low to high such that
almost all friendships that run in only one direction con-
sist of a lower-ranked individual claiming friendship with
a higher-ranked one. We conjecture that these rankings
reflect a measure of social status and present a number
of results in support of this idea. For instance, we find
that a large majority of reciprocated friendships are be-
tween individuals of closely similar rank, while a signif-
icant fraction of unreciprocated friendships are between
very different ranks, an observation consistent with qual-
itative results in the sociological literature going back
several decades [5]. We also investigate correlations be-
tween rank and other individual characteristics, finding,
for example, that there is a strong positive correlation
between rank and age, older students having higher rank
on average, and between rank and overall popularity, as
measured by total number of friends.
The outline of the paper is as follows. First, we de-
scribe our method of analysis, which uses a maximum-
likelihood technique in combination with an expectation–
maximization algorithm to extract rankings from di-
rected network data. Then we apply this method to
school friendship networks, revealing a surprisingly uni-
versal pattern of connections between individuals in dif-
ferent schools. We also present results showing how rank
correlates with other measures. Finally we give our con-
clusions and discuss possible avenues for future research.
Inference of rank from network structure
Consider a directed network of friendships between n
individuals in which a connection running from person A
to person B indicates that A claims B as a friend. Sup-
pose that, while some of the friendships in the network
may be reciprocated or bidirectional, a significant frac-
tion are unreciprocated, running in one direction only,
and suppose we believe there to be a ranking of the in-
dividuals implied by the pattern of the unreciprocated
friendships so that most such friendships run from lower
to higher rank. One possible way to infer that ranking
would be simply to ignore any reciprocated friendships
and then construct a minimum violations ranking of the
remaining network [7, 8]. That is, we find the ranking of
the network nodes that minimizes the number of connec-
tions running from higher ranked nodes to lower ranked
ones.
for
the networks studied in this paper the minimum viola-
tions rankings have an average of 98% of their unrecipro-
cated friendships running from lower to higher ranks and
only 2% running the other way. By contrast, versions
of the same networks in which edge directions have been
randomized typically have about 10% of edges running
the wrong way. (Statistical errors in either case are 1%
or less, so these observations are highly unlikely to be the
results of chance.)
In practice this approach works quite well:
The minimum violations ranking, however, misses im-
portant network features because it focuses only on un-
reciprocated friendships. In most cases there are a sub-
stantial number of reciprocated friendships as well, as
many as a half of the total, and they contain significant
information about network structure and ranking. For
example, as we will see, pairs of individuals who report a
reciprocated friendship are almost always closely similar
in rank. To make use of this information we need a more
flexible and general method for associating rankings with
network structure. In this paper we use a maximum like-
lihood approach defined as follows.
Mathematically we represent the distinction between
reciprocated and unreciprocated friendships in the net-
work using two separate matrices.
The symmetric
matrix S will represent the reciprocated connections—
undirected edges in graph theory terms—such that Sij =
Sji = 1 if there are connections both ways between nodes
i and j, and zero otherwise. The asymmetric matrix T
will represent the unreciprocated (directed) edges with
Tij = 1 if there is a connection to node i from node j
(but not vice versa), and zero otherwise. The matrices
S and T are related to the conventional adjacency ma-
trix A of the network by A = S + T.
Now suppose that there exists some ranking of the in-
dividuals, from low to high, which we will represent by
giving each individual a unique integer rank in the range
1 to n. We will denote the rank of node i by ri and
the complete set of ranks by R. We have found it to
be a good approximation to assume that the probability
of friendship between two individuals is a function only
of the difference between their ranks. We specifically al-
low the probability to be different for reciprocated and
unreciprocated friendships, which acknowledges the pos-
sibility that the two may represent different types of rela-
tionships, as conjectured for instance in [5, 9]. We define
a function α(ri − rj) to represent the probability of an
2
undirected edge between i and j and another β(ri − rj )
for a directed edge to i from j. Since α(r) describes
undirected edges it must be symmetric α(−r) = α(r),
but β(r) need not be symmetric.
If we were not given a network but we were given
the probability functions α and β and a complete set
of rankings on n vertices, then we could use this model
to generate—for instance on a computer—a hypothetical
but plausible network in which edges appeared with the
appropriate probabilities.
In effect, we have a random
graph model that incorporates rankings. In this paper,
however, we want to perform the reverse operation: given
a network we want to deduce the rankings of the nodes
and the values of the functions α and β. To put that
another way, if we are given a network and we assume
that it is generated from our model, what values of the
rankings and probability functions are most likely to have
generated the network we observe?
This question leads us to a maximum likelihood for-
mulation of our problem, which we treat using an
expectation–maximization (EM) approach in which the
ranks R are considered hidden variables to be determined
and the functions α and β are parameters of the model.
Using a Poisson formulation of the random network gen-
eration process, we can write the probability of genera-
tion of a network G with rankings R, given the functions
α and β, as
P (G, Rα, β) = Y
i>j
[α(ri − rj )]Sij
Sij !
e−α(ri−rj )
[β(ri − rj)]Tij
Tij!
× Y
i6=j
e−β(ri−rj).
(1)
Note that we have excluded self-edges here, since indi-
viduals cannot name themselves as friends. We have also
assumed that the prior probability of R is uniform over
all sets of rankings.
The most likely values of the parameter functions α
and β are now given by maximizing the marginal like-
lihood P (Gα, β) = PR P (G, Rα, β), or equivalently
maximizing its logarithm, which is more convenient. The
logarithm satisfies the Jensen inequality
logX
R
P (G, Rα, β) ≥ X
R
q(R) log
P (G, Rα, β)
q(R)
,
(2)
for any set of probabilities q(R) such that PR q(R) = 1,
with the equality being recovered when
q(R) =
P (G, Rα, β)
PR P (G, Rα, β)
.
(3)
This implies that the maximization of the log-likelihood
on the left side of (2) is equivalent to the double max-
imization of the right side, first with respect to q(R),
which makes the right side equal to the left, and then
with respect to α and β, which gives us the answer we
are looking for. It may appear that expressing the prob-
lem as a double maximization in this way, rather than as
the original single one, makes it harder, but in fact that’s
not the case.
The right-hand side of
(2) can be written as
PR q(R) log P (G, Rα, β) − PR q(R) log q(R), but the
second term does not depend on α or β, so as far as α
and β are concerned we need consider only the first term,
which is simply the average L of the log-likelihood over
the distribution q(R):
L = X
q(R) log P (G, Rα, β).
(4)
R
Making use of Eq. (1) and neglecting an unimportant
overall constant, we then have
L = X
h 1
2 Sij log α(ri − rj) + Tij log β(ri − rj)
q(R)X
R
i6=j
− 1
2 α(ri − rj ) − β(ri − rj)i,
(5)
where we have used the fact that α(r) is a symmetric
function.
This expression can be simplified further. The first
term in the sum is
q(R)X
2 X
1
R
i6=j
Sij log α(ri − rj)
= 1
2 X
z
Sij q(ri − rj = z) log α(z),
(6)
X
i6=j
where q(ri − rj = z) means the probability within the
distribution q(R) that ri − rj = z. We can define
a(z) =
1
n − z X
i6=j
Sij q(ri − rj = z),
(7)
which is the expected number of undirected edges in the
observed network between pairs of nodes with rank dif-
ference z. It is the direct equivalent in the observed net-
work of the quantity α(z), which is the expected number
of edges in the model. The quantity a(z), like α(z), is
necessarily symmetric, a(z) = a(−z), and hence (6) can
be written as
1
2 X
R
q(R)X
i6=j
Sij log α(ri − rj) =
X
z=1
(n − z)a(z) log α(z).
n−1
Similarly, we can define
b(z) =
1
n − z X
i6=j
Tij q(ri − rj = z)
(8)
(9)
and
X
R
q(R)X
i6=j
Tij log β(ri − rj )
=
n−1
X
z=1
(n − z)(cid:2)b(z) log β(z) + b(−z) log β(−z)(cid:3),
(10)
3
where b(z) is the expected number of directed edges be-
tween a pair of nodes with rank difference z. Our final
expression for L is
n−1
L =
z=1
(n − z)(cid:2)a(z) log α(z) − α(z)
X
+ b(z) log β(z) − β(z) + b(−z) log β(−z) − β(−z)(cid:3).
(11)
Our approach involves maximizing this expression with
respect to α(z) and β(z) for given a(z) and b(z), which
can be done using standard numerical methods. (Note
that the expression separates into terms for the directed
and undirected edges, so the two can be maximized in-
dependently.) The values of a(z) and b(z) in turn are
calculated from Eqs. (3), (7), and (9), leading to an it-
erative method in which we first guess values for α(z)
and β(z), use them to calculate q(R) and hence a(z)
and b(z), then maximize L to derive new values of α
and β, and repeat to convergence. This is the classic
expectation–maximization approach to model fitting.
Two further elements are needed to put this scheme
into practice. First, we need to specify a parametrization
for the functions α and β. We have found the results to
be robust to the choice of parametrization, but in the
results reported here we find α to be well represented
by a Gaussian centered at the origin. The function β
takes a more complicated form which we parametrize as
a Fourier cosine series, keeping five terms and squaring to
enforce nonnegativity, plus an additional Gaussian peak
at the origin.
Second, the sum in the denominator of Eq. (3) is too
large to be numerically tractable, so we approximate it
using a Markov chain Monte Carlo method—we gener-
ate complete rankings R in proportion to the probabil-
ity q(R) given by Eq. (3) and average over them to cal-
culate a(z) and b(z).
Results
We have applied the method of the previous section to
the analysis of data from the US National Longitudinal
Study of Adolescent Health (the “AddHealth” study), a
large-scale multi-year study of social conditions for school
students and young adults in the United States [10]. Us-
ing results from surveys conducted in 1994 and 1995, the
study compiled friendship networks for over 90 000 stu-
dents in schools covering US school grades 7 to 12 (ages
12 to 18 years). Schools were chosen to represent a broad
range of socioeconomic conditions. High schools (grades
9 to 12) were paired with “feeder” middle schools (grades
7 and 8) so that networks spanning schools could be con-
structed.
To create the networks, each student was asked to
select, from a list of students attending the same mid-
dle/high school combination, up to ten people with whom
they were friends, with a maximum of five being male and
p
i
h
s
d
n
e
i
r
f
f
o
y
t
i
l
i
b
a
b
o
r
P
0.3
0.2
0.1
0
-1
(a)
(b)
0.4
(a)
(b)
p
i
h
s
d
n
e
i
r
f
f
o
y
t
i
l
i
b
a
b
o
r
P
0.3
0.2
0.1
0
0.1
0.05
0
1
0
1
-1
0
Rank difference z
-5
0
5
-5
0
5
Normalized rank difference
4
0.15
0.1
0.05
0
FIG. 1: (a) Probability of reciprocated friendships as a func-
tion of rank difference (normalized to run from −1 to 1). The
histogram shows empirical results for a single example net-
work; the solid curve is the fitted function α(z).
(b) The
equivalent plot for unreciprocated friendships.
FIG. 2: The fitted central peak of the friendship probabil-
ity distributions for (a) reciprocated and (b) unreciprocated
friendships. The horizontal axes are measured in units of ab-
solute (unrescaled) rank difference divided by average network
degree. Each blue curve is a network. The bold black curves
represent the mean.
five female. From these selections, 84 friendship networks
were constructed ranging in size from tens to thousands
of students, one for each middle/high school pair, along
with accompanying data on the participants, including
school grade, sex, and ethnicity. Some of the networks
divide into more than one strongly connected component,
in which case we restrict our analysis to the largest com-
ponent only. We perform the EM analysis of the previous
section on each network separately, repeating the itera-
tive procedure until the rankings no longer change.
Figure 1 shows results for a typical network.
In
panel (a), the histogram shows the measured value of
the quantity a(z), Eq. (7), the empirical probability of a
reciprocated friendship (technically the expected number
of undirected edges) between a vertex pair with rank dif-
ference z, with the horizontal axis rescaled to run from
−1 to 1 (rather than −n to n). As the figure shows
the probability is significantly different from zero only
for small values of z, with a strong peak centered on the
origin. The solid curve shows the fit of this peak by the
Gaussian function α(z), which appears good. The fit is
similarly good for most networks. The form of a(z) tells
us that most reciprocated friendships fall between indi-
viduals of closely similar rank: there is a good chance
that two people with roughly equal rank will both claim
the other as a friend, but very little chance that two peo-
ple with very different ranks will do so. This result seems
at first surprising, implying as it does that people must
be able to determine their own and others’ rank with
high accuracy in order to form friendships, but a num-
ber of previous studies have suggested that indeed this is
true [11].
Panel (b) of Fig. 1 shows b(z), Eq. (9), for the same net-
work, which is the probability of a directed edge between
nodes with rank difference z. Again there is a strong
central peak to the distribution, of width similar to that
for the undirected edges, indicating that many unrecipro-
cated friendships are between individuals of closely simi-
lar rank. However, the distribution also has a substantial
asymmetric tail for positive values of the rank difference,
indicating that in a significant fraction of cases individu-
als claim friendship with those ranked higher than them-
selves, but that those claims are not reciprocated. The
black curve in the panel shows the best fit to the func-
tion β(z) in the maximum-likelihood calculation.
The general forms of these distributions are similar
across networks from different schools. They also show
interesting scaling behavior. The widths of the cen-
tral peaks for both undirected and directed edges, when
measured in terms of raw (unrescaled) rank difference
are, to a good approximation, simply proportional to
the average degree of a vertex in the network. Fig-
ure 2 shows these peaks for 78 of the 84 networks on
two plots, for undirected edges (panel (a)) and directed
edges (panel (b)), rescaled by average degree, and the ap-
proximately constant width is clear. (The six networks
not shown are all small enough that the central peaks for
the directed edges can be fit by the other parameters of
the model and thus a direct comparison is not appropri-
ate.) This result indicates that individuals have, roughly
speaking, a fixed probability of being friends with others
close to them in rank, regardless of the size of the com-
munity as a whole—as the average number of friends in-
creases, individuals look proportionately further afield in
terms of rank to find their friends, but are no more likely
to be friends with any particular individual of nearby
rank.
Outside of the central peak, i.e., for friendships be-
tween individuals with markedly different ranks, there
y
t
i
l
i
b
a
b
o
r
p
p
i
h
s
d
n
e
i
r
f
d
e
z
i
l
a
m
r
o
N
1.5
1
0.5
0
-1
-0.5
0
0.5
1
Rank difference
FIG. 3: The fitted probability function for unreciprocated
friendships, minus its central peak. The horizontal axis mea-
sures rank difference rescaled to run from −1 to 1. Each blue
curve is a network. The bold black curve is the mean.
are, to a good approximation, only unreciprocated friend-
ships, and for these the shape of the probability distri-
bution appears by contrast to be roughly constant when
measured in terms of the rescaled rank of Fig. 1, which
runs from −1 to 1. This probability, which is equal to the
function β(z) with the central Gaussian peak subtracted,
is shown in Fig. 3 for the same 78 networks, rescaled
vertically by the average probability of an edge to ac-
count for differing network sizes, and again the similarity
of the functional form across networks is apparent, with
low probability in the left half of the plot, indicating few
claimed friendships with lower-ranked individuals, and
higher probability on the right. The roughly constant
shape suggests that, among the unreciprocated friend-
ships, there is, for example, a roughly constant probabil-
ity of the lowest-ranked student in the school claiming
friendship with the highest-ranked, relative to other stu-
dents, no matter how large the school may be.
The emerging picture of friendship patterns in these
networks is one in which reciprocated friendships appear
to fall almost entirely between individuals of closely sim-
ilar rank. A significant fraction of the unreciprocated
ones do the same, and moreover show similar scaling to
their reciprocated counterparts, but the remainder seem
to show a quite different behavior characterized by differ-
ent scaling and by claims of friendship by lower-ranked
individuals with substantially higher-ranked ones.
Discussion
Taking the results of the previous section as a whole,
we conjecture that the rankings discovered by the anal-
ysis correlate, at least approximately, with social status.
If we assume that reciprocated friendships—almost all of
which fall in the central peak—correspond to friendships
in the conventional sense of mutual interaction, then a
further conjecture, on the basis of similar statistics, is
that the unreciprocated friendships in the central peak
5
are also mutual but, for one reason or another, only one
side of the relationship is represented in the data. One
explanation why one side might be missing is that re-
spondents in the surveys were limited to listing only five
male and five female friends, and so might not have been
able to list all of their friendships.
On the other hand, one might conjecture that the un-
reciprocated claims of friendship with higher-ranked in-
dividuals, those in the tail of the distribution in Fig. 1b,
correspond to “aspirational” friendships, hopes of friend-
ship with higher-ranked individuals that are, at present
at least, not returned. Note also how the tail falls off with
increasing rank difference:
individuals are more likely
to claim friendship with others of only modestly higher
rank, not vastly higher.
One way to test these conjectures is to look for corre-
lations between the rankings and other characteristics of
individuals in the networks. For instance, it is generally
thought that social status is positively correlated with
the number of people who claim you as a friend [9, 12].
Figure 4a tests this by plotting average rank over all indi-
viduals in all networks (averaged in the posterior distri-
bution of Eq. (1)) as a function of network in-degree (the
number of others who claim an individual as a friend). As
the figure shows, there is a strong positive slope to the
curve, with the most popular individuals being nearly
twice as highly ranked on average as the least popular.
Figure 4b shows the corresponding plot for out-degree,
the number of individuals one claims as a friend, and
here the connection is weaker, as one might expect—
claiming many others as friends does not automatically
confer high status upon an individual—although the cor-
relation is still statistically significant. Figure 4c shows
rank as a function of total degree, in-degree plus out-
degree, which could be taken as a measure of total social
activity, and here again the correlation is strong. For all
three panels the correlations are significant, with p-values
less than 0.001.
In addition to the network structure itself, we have
additional data about each of the participants, including
their age (school grade), sex, and ethnicity. The distri-
butions of rank for each sex and for individual ethnicities
turn out to be close to uniform—a member of either sex
or any ethnic group is, to a good approximation, equally
likely to receive any rank from 1 to n, indicating that
there is essentially no effect of sex or ethnicity on rank.
(A Kolmogorov–Smirnov test does reveal deviations from
uniformity in some cases, but the deviations are small,
with KS statistics D < 0.08 in all instances.) Age, how-
ever, is a different story. Figure 5 shows the rescaled
rank of individuals in each grade from 7 to 12, averaged
over all individuals in all networks, and here there is a
clear correlation. Average rank increases by more than
a factor of two from the youngest students to the oldest
(a one-way ANOVA gives p < 0.001). Since older stu-
dents are generally acknowledged to have higher social
status [13], this result lends support to the identification
of rank with status. A further interesting wrinkle can
1
(a)
(b)
(c)
k
n
a
r
e
g
a
r
e
v
A
0.5
1.0
0.75
0
0
5
10
15
0
2
4
6
8
0
5
10
15
20
In-degree
Out-degree
Degree
k
n
a
R
0.5
FIG. 4: Plots of rescaled rank versus degree, averaged over all
individuals in all networks for (a) in-degree, (b) out-degree,
and (c) the sum of degrees. Measurement errors are compa-
rable with or smaller than the sizes of the data points and are
not shown.
0.25
0
6
Shape
Grade
7
8
9
10
11
12
Form
Edge Type
Directed
Undirected
1.0
0.8
0.6
0.4
0.2
k
n
a
r
e
g
a
r
e
v
A
8
9
10
7
11
12
Grade
FIG. 6: A sample network with (rescaled) rank on the vertical
axis, vertices colored according to grade, and undirected edges
colored differently from directed edges. Rank is calculated
as an average within the Monte Carlo calculation (i.e., an
average over the posterior distribution of the model), rather
than merely the maximum-likelihood ranking. Note the clear
correlation between rank and grade in the network.
FIG. 5: Rescaled rank as a function of school grade, averaged
over all individuals in all schools.
Conclusions
be seen in the results for the 8th and 9th grades. Unlike
other pairs of consecutive grades, these two do not have a
statistically significant difference in average rank (a t-test
gives p > 0.95). This may reflect the fact that the 8th
grade is the most senior grade in the feeder junior-high
schools, before students move up to high school. When
they are in the 8th grade, students are temporarily the
oldest (and therefore highest status) students in school
and hence may have a higher rank than would be ex-
pected were all students in a single school together.
Finally, in Fig. 6 we show an actual example of one of
the networks, with nodes arranged vertically on a scale
of inferred rank and colored according to grade. The
increase of rank with grade is clearly visible, as is the
fact that most undirected edges run between individuals
of similar rank (and hence run horizontally in the figure).
In this paper, we have analyzed a large set of net-
works of friendships between students in American high
and junior-high schools, focusing particularly on the dis-
tinction between friendships claimed by both participat-
ing individuals and friendships claimed by only one in-
dividual. We find that students can be ranked from low
to high such that most unreciprocated friendships con-
sist of a lower-ranked individual claiming friendship with
a higher-ranked one. We have developed a maximum-
likelihood method for inferring such ranks from complete
networks, taking both reciprocated and unreciprocated
friendships into account, and we find that the rankings so
derived correlate significantly with traditional measures
of social status such as age and overall popularity, sug-
gesting that the rankings may correspond to status. On
the other hand, rankings seem to be essentially indepen-
dent on average of other characteristics of the individuals
involved such as sex or ethnicity.
There are a number of questions unanswered by our
analysis. We have only limited data on the personal
characteristics of participants. It would be interesting to
test for correlation with other characteristics. Are rank-
ings correlated, for instance, with academic achievement,
number of siblings or birth order, number of Facebook
friends, after-school activities, personality type, body
mass index, wealth, or future career success? There is
also the question of why a significant number of appar-
ently close friendships are unreciprocated. One idea that
has appeared in the literature is that some directed edges
may correspond to new, temporary, or unstable friend-
ships, which are either in the process of forming and will
become reciprocated in the future, or will disappear over
time [12, 14]. Evidence suggests that in practice about a
half of the unreciprocated friendships do the former and
a half the latter, and it is possible that the two behav-
iors correspond to the two classes of directed edges we
identify in our analysis. A test of this hypothesis, how-
7
ever, would require time-resolved data—successive mea-
surements of friendship patterns among the same group
of individuals—data which at present we do not possess.
Finally, there are potential applications of the statistical
methods developed here to other directed networks in
which direction might be correlated with ranking, such
as networks of team or individual competition [15, 16] or
dominance hierarchies in animal communities [17, 18].
Acknowledgments
The authors thank Carrie Ferrario, Brian Karrer, Cris
Moore, Jason Owen-Smith, Bethany Percha, and Claire
Whitlinger for useful comments and suggestions. This
work was funded in part by the National Science Foun-
dation under grant DMS–1107796 and by the James S.
McDonnell Foundation.
[1] S. Wasserman and K. Faust, Social Network Analysis.
Cambridge University Press, Cambridge (1994).
[2] A. Rapoport and W. J. Horvath, A study of a large so-
ciogram. Behavioral Science 6, 279–291 (1961).
[3] E. M. Airoldi, D. S. Choi, and P. J. Wolfe, Confidence
sets for network structure. Statistical Analysis and Data
Mining 4, 461–469 (2011).
[4] G. C. Homans, The Human Group. Harcourt, Brace, and
Co., New York (1950).
[5] J. A. Davis and S. Leinhardt, The structure of positive
interpersonal relations in small groups. Sociological The-
ories in Progress 2, 218–251 (1972).
[6] P. Doreian, V. Batagelj, and A. Ferligoj, Symmetric-
acyclic decompositions of networks. Journal of Classi-
fication 17, 3–28 (2000).
[7] G. Reinelt, The Linear Ordering Problem: Algorithms
and Applications. Heldermann, Berlin (1985).
[8] I. Ali, W. D. Cook, and M. Kress, On the minimum vi-
olations ranking of a tournament. Management Science
32, 660–672 (1986).
[9] J. K. Dijkstra, A. H. N. Cillessen, S. Lindenberg, and
R. Veenstra, Basking in reflected glory and its limits:
Why adolescents hang out with popular peers. Journal
of Research on Adolescents 20, 942–958 (2010).
[10] This work uses data from Add Health, a program project
designed by J. Richard Udry, Peter S. Bearman, and
Kathleen Mullan Harris, and funded by a grant P01-
HD31921 from the National Institute of Child Health and
Human Development, with cooperative funding from 17
other agencies. Special acknowledgment is due Ronald
R. Rindfuss and Barbara Entwisle for assistance in the
original design. Persons interested in obtaining data files
from Add Health should contact Add Health, Carolina
Population Center, 123 W. Franklin Street, Chapel Hill,
NC 27516–2524 ([email protected]).
[11] C. Anderson, S. Srivastava, J. S. Beer, S. E. Spataro, and
J. A. Chatman, Knowing your place: Self-perceptions of
status in face-to-face groups. Journal of Personality and
Social Psychology 91, 1094–1110 (2006).
[12] M. T. Hallinan and W. N. Kubitschek, The effect of indi-
vidual and structural characteristics on intransitivity in
social networks. Social Psychology Quarterly 51, 81–92
(1988).
[13] J. S. Coleman, The Adolescent Society: The Social Life
of the Teenager and its Impact on Education. Greenwood
Press, Westport, Conn. (1961).
[14] A. B. Sørensen and M. T. Hallinan, A stochastic model
for change in group structure. Social Science Research 5,
43–61 (1976).
[15] R. Stefani, Survey of the major world sports rating sys-
tems. Journal of Applied Statistics 24, 635–646 (1997).
[16] J. Park and M. E. J. Newman, A network-based rank-
ing system for American college football. J. Stat. Mech.
P10014 (2005).
[17] C. Drews, The concept and definition of dominance in
animal behaviour. Behaviour 125, 283–313 (1993).
[18] H. De Vries, Finding a dominance order most consistent
with a linear hierarchy: A new procedure and review.
Animal Behaviour 55, 827–843 (1998).
|
1904.04690 | 1 | 1904 | 2019-03-25T16:57:27 | Guidelines for Experimental Algorithmics in Network Analysis | [
"cs.SI"
] | The field of network science is a highly interdisciplinary area; for the empirical analysis of network data, it draws algorithmic methodologies from several research fields. Hence, research procedures and descriptions of the technical results often differ, sometimes widely. In this paper we focus on methodologies for the experimental part of algorithm engineering for network analysis -- an important ingredient for a research area with empirical focus. More precisely, we unify and adapt existing recommendations from different fields and propose universal guidelines -- including statistical analyses -- for the systematic evaluation of network analysis algorithms. This way, the behavior of newly proposed algorithms can be properly assessed and comparisons to existing solutions become meaningful. Moreover, as the main technical contribution, we provide SimexPal, a highly automated tool to perform and analyze experiments following our guidelines. To illustrate the merits of SimexPal and our guidelines, we apply them in a case study: we design, perform, visualize and evaluate experiments of a recent algorithm for approximating betweenness centrality, an important problem in network analysis. In summary, both our guidelines and SimexPal shall modernize and complement previous efforts in experimental algorithmics; they are not only useful for network analysis, but also in related contexts. | cs.SI | cs |
Article
Guidelines for Experimental Algorithmics in
Network Analysis
, Moritz von Looz1,‡, Henning
Eugenio Angriman1,‡, Alexander van der Grinten1,‡
Meyerhenke1,‡,∗ , Martin Nöllenburg2,‡
, Maria Predari1,‡ and Charilaos Tzovas1,‡
1 Department of Computer Science, Humboldt-Universität zu Berlin, Germany; {angrimae, avdgrinten,
loozmori, meyerhenke, predarim, charilat}@hu-berlin.de
Institute of Logic and Computation, Vienna University of Technology, Austria; [email protected]
2
* Correspondence: [email protected]
‡ These authors contributed equally to this work.
Version April 10, 2019 submitted to Algorithms
Abstract: The field of network science is a highly interdisciplinary area; for the empirical analysis of
network data, it draws algorithmic methodologies from several research fields. Hence, research procedures
and descriptions of the technical results often differ, sometimes widely.
In this paper we focus on methodologies for the experimental part of algorithm engineering for network
analysis -- an important ingredient for a research area with empirical focus. More precisely, we unify
and adapt existing recommendations from different fields and propose universal guidelines -- including
statistical analyses -- for the systematic evaluation of network analysis algorithms. This way, the behavior
of newly proposed algorithms can be properly assessed and comparisons to existing solutions become
meaningful. Moreover, as the main technical contribution, we provide SimexPal, a highly automated tool
to perform and analyze experiments following our guidelines. To illustrate the merits of SimexPal and our
guidelines, we apply them in a case study: we design, perform, visualize and evaluate experiments of a
recent algorithm for approximating betweenness centrality, an important problem in network analysis.
In summary, both our guidelines and SimexPal shall modernize and complement previous efforts in
experimental algorithmics; they are not only useful for network analysis, but also in related contexts.
Keywords: Experimental algorithmics, network analysis, applied graph algorithms, statistical analysis
of algorithms
1. Introduction
The traditional algorithm development process in theoretical computer science typically involves (i)
algorithm design based on abstract and simplified models and (ii) analyzing the algorithm's behavior
within these models using analytical techniques. This usually leads to asymptotic results, mostly regarding
the worst-case performance of the algorithm. (While average-case [1] and smoothed analysis [2] exist
and gained some popularity, worst-case bounds still make up the vast majority of running time results.)
Such worst-case results are, however, not necessarily representative for algorithmic behavior in real-world
situations, both for NP-complete problems [3,4] and poly-time ones [5,6]. In case of such a discrepancy,
deciding upon the best-fitted algorithm solely based on worst-case bounds is ill-advised.
Algorithm engineering has been established to overcome such pitfalls [7 -- 9]. In essence, algorithm
engineering is a cyclic process that consists of five iterative phases: (i) modeling the problem (which
Submitted to Algorithms, pages 1 -- 38
www.mdpi.com/journal/algorithms
Version April 10, 2019 submitted to Algorithms
2 of 38
usually stems from real-world applications), (ii) designing an algorithm, (iii) analyzing it theoretically, (iv)
implementing it, and (v) evaluating it via systematic experiments (also known as experimental algorithmics).
Note that not all phases have to be reiterated necessarily in every cycle [10]. This cyclic approach aims at
a symbiosis: the experimental results shall yield insights that lead to further theoretical improvements and
vice versa. Ideally, algorithm engineering results in algorithms that are asymptotically optimal and have
excellent behavior in practice at the same time. Numerous examples where surprisingly large improvements
could be made through algorithm engineering exist, e. g., routing in road networks [11] and mathematical
programming [12].
In this paper, we investigate and provide guidance on the experimental algorithmics part of algorithm
engineering -- from a network analysis viewpoint. It seems instructive to view network analysis, a subfield
of network science, from two perspectives: on the one hand, it is a collection of methods that study the
structural and algorithmic aspects of networks (and how these aspects affect the underlying application).
The research focus here is on efficient algorithmic methods. On the other hand, network analysis can be the
process of interpreting network data using the above methods. We briefly touch upon the latter; yet, this
paper's focus is on experimental evaluation methodology, in particular regarding the underlying (graph)
algorithms developed as part of the network analysis toolbox.1
In this view, network analysis constitutes a subarea of empirical graph algorithmics and statistical
analysis (with the curtailment that networks constitute a particular data type) [13]. This implies that, like
general statistics, network science is not tied to any particular application area. Indeed, since networks are
abstract models of various real-world phenomena, network science draws applications from very diverse
scientific fields such as social science, physics, biology and computer science [14]. It is interdisciplinary
and all fields at the interface have their own expertise and methodology. The description of algorithms
and their theoretical and experimental analysis often differ, sometimes widely -- depending on the target
community. We believe that uniform guidelines would help with respect to comparability and systematic
presentation. That is why we consider our work (although it has limited algorithmic novelty) important for
the field of network analysis (as well as network science and empirical algorithmics in general). After all,
emerging scientific fields should develop their own best practices.
To stay focused, we concentrate on providing guidelines for the experimental algorithmics part of the
algorithm engineering cycle -- with emphasis on graph algorithms for network analysis. To this end, we
combine existing recommendations from fields such as statistical analysis and data mining / machine learning
and adjust them to fit the idiosyncrasies of networks. Furthermore, and as main technical contribution, we
provide SimexPal, a highly automated tool to perform and analyze experiments following our guidelines. For
illustration purposes, we use this tool in a case study -- the experimental evaluation of a recent algorithm
for approximating betweenness centrality, a well-known network analysis task. The target audience we
envision consists of network analysts who develop algorithms and evaluate them empirically. Experienced
undergraduates and young PhD students will probably benefit most, but even experienced researchers in
the community may benefit substantially from SimexPal.
1 We use the terms network and graph interchangeably.
Version April 10, 2019 submitted to Algorithms
3 of 38
2. Common Pitfalls (and How to Avoid Them)
2.1. Common Pitfalls
Let us first of all consider a few pitfalls to avoid.2 We leave problems in modeling the underlying
real-world problem aside and focus on the evaluation of the algorithmic method for the problem at hand.
Instead, we discuss a few examples from two main categories of pitfalls: (i) inadequate justification of
claims on the paper's results and (ii) repeatability/replicability/reproducibility3 issues.
Clearly, a paper's claims regarding the algorithm's empirical behavior need an adequate justification
by the experimental results and/or their presentation. Issues in this regard may happen for a variety of
reasons; not uncommon is a lack of instances in terms of their number, variety and/or size. An inadequate
literature search may lead to not comparing against the current state of the art or if doing so, choosing
unsuitable parameters. Also noteworthy is an inappropriate usage of statistics. For example, arithmetic
averages over a large set of instances might be skewed towards the more difficult instances. Reporting only
averages would not be sufficient then. Similarly, if the difference between two algorithms is small, it is
hard to decide whether one of the algorithms truly performs better than the other one or if the perceived
difference is only due to noise. Even if no outright mistakes are made, potential significance can be wasted:
Coffin and Saltzmann [15] discuss papers whose claims could have been strengthened by an appropriate
statistical analysis, even without gathering new experimental data.
Reproducibility (the algorithm is implemented and evaluated independently by a different team) is a
major cornerstone of science and should receive sufficient attention. Weaker notions include replicability
(different team, same source code and experimental setup) and repeatability (same team, same source code
and experimental setup). An important weakness of a paper would thus be if the description does not allow
the (independent) reproduction of the results. First of all, this means that the proposed algorithm needs
to be explained adequately. If the source code is not public, it is all the more important to explain all
important implementation aspects -- the reader may judge whether this is the current community standard.
Pseudocode allows to reason about correctness and asymptotic time and space complexity and is thus very
important. But the empirical running time of a reimplementation may deviate from the expectation when
the paper omitted crucial implementation details.
Even the repetition of one's own results (which is mandated by major funding organizations for time
spans such as 10 years) can become cumbersome if not considered from the beginning. To make this task
easier, not only source code needs to documented properly, but also input and output data of experiments
as well as the scripts containing the parameters. Probably every reader has heard about this one project
where this documentation part has been neglected to some extent...
2.2. Outline of the Paper
How do we avoid such pitfalls? We make this clear by means of a use case featuring betweenness
approximation; it is detailed in Section 3. A good start when designing experiments is to formulate a
hypothesis (or several ones) on the algorithm's behavior (see Section 4.1). This approach is not only
part of the scientific method; it also helps in structuring the experimental design and evaluation, thereby
decreasing the likelihood of some pitfalls. Section 4.2 deals with how to select and describe input instances
2
Such pitfalls are probably more often on a reviewer's desk than one might think. Note that we do not claim that we never
stumbled into such pitfalls ourselves, nor that we always followed our guidelines in the past.
3 The terms will be explained below; for more detailed context please visit ACM's webpage on artifact review and badging:
https://www.acm.org/publications/policies/artifact-review-badging.
Version April 10, 2019 submitted to Algorithms
4 of 38
to support a certain generality of the algorithmic result. With a similar motivation, Section 4.3 provides
guidance on how many instances should be selected. It also discusses how to deal with variance in case of
non-determinism, e. g., by stating how often experiments should be repeated.
If the algorithm contains a reasonable amount of tunable parameters, a division of the instances into a
tuning set and an evaluation set may be advisable, which is discussed in Section 4.4.
In order to compare against the best competitors, one must have defined which algorithms and/or
software tools constitute the state of the art. Important aspects of this procedure are discussed in Section 4.5.
One aspect can be the approximation quality: while an algorithm may have the better quality guarantee in
theory, its empirical solution quality may be worse -- which justifies to consider not only the theoretical
reference in experiments. The claim of superiority refers to certain measures -- typically related to resources
such as running time or memory and/or related to solution quality. Several common measures of this kind
and how to deal with them are explained in Section 4.6. Some of them are hardware-independent, many of
them are not.
A good experimental design can take you far -- but it is not sufficient if the experimental pipeline is
not efficient or lacks clarity. In the first case, obtaining the results may be tedious and time-consuming. Or
the experiments simply consume more computing resources than necessary and take too long to generate
the results. In the second case, in turn, the way experimental data are generated or stored may not
allow easy reproducibility. Guidelines on how to setup your experimental pipeline and how to avoid these
pitfalls are thus presented in Section 5. The respective subsections deal with implementation issues (5.1),
repeatability/replicability/reproducibility (5.2), job submission (5.3), output file structure for long-term
storage (5.4), retrieval and aggregation of results (5.5).
As mentioned, betweenness approximation and more precisely the KADABRA [16] algorithm will serve
as our prime example. We have implemented this algorithm as part of the NetworKit toolbox [17]. As part
of our experimental evaluation, a meaningful visualization (Section 6) of the results highlights many major
outcomes to the human reader. Since visualization is typically not enough to show statistical significance
in a rigorous manner, an appropriate statistical analysis (Section 7) is recommended. Both, visualization
and statistical analysis, shall lead to a justified interpretation of the results.
3. Use Case
Typically, algorithmic network analysis papers (i) contribute a new (graph) algorithm for an already
known problem that improves on the state of the art in some respect or (ii) they define a new algorithmic
problem and present a method for its solution. To consider a concrete example contribution, we turn
towards betweenness centrality, a widely used and very popular measure for ranking nodes (or edges) in
terms of their structural position in the graph [18].
3.1. Betweenness Approximation as Concrete Example
Betweenness centrality [19] measures the participation of nodes in shortest paths. More precisely, let
G = (V , E) be a graph; the (normalized) betweenness centrality of a node v ∈ V is defined as
X
b(v) :=
1
n(n − 1)
s,t∈V ,s6=v6=t
σst(v)
σst
,
(1)
where σst is the number of shortest paths from s to t, and σst(v) is the number of shortest paths from
s to t that cross v (as intermediate node). Computing the exact betweenness scores for all nodes of an
unweighted graph can be done in O(nm) time with Brandes's algorithm [20], where n is the number of
nodes and m the number of edges in G. Since this complexity is usually too high for graphs with millions
Version April 10, 2019 submitted to Algorithms
5 of 38
ex(v) ← 0
if f (ex(v)/τ, δL(v), ω, τ ) < and g(ex(v)/τ, δU (v), ω, τ ) < then
Algorithm 1 KADABRA algorithm (absolute error variant)
1: procedure KADABRA(G = (V , E), , δ)
ω ← non-adaptive number of iterations
2:
compute δL, δU from δ
3:
τ ← 0
4:
for all v ∈ V do
5:
6:
end for
7:
while τ < ω do
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22: end procedure
s, t ← samplePair(G)
π ← sampleShortestPath(G, s, t)
for all v ∈ π do
end for
τ ← τ + 1
ex(v) ←ex(v) + 1
end if
for i ∈ {1, . . . , c} do
end for
end while
return ex/τ
break
. Requires upper bound of the diameter.
. Number of sampled paths.
. Occurrences of v in sampled paths.
. Approximation is already good enough.
. Draw c samples per round.
. Uniformly at random.
. Uniformly at random.
. Betweenness centrality is estimated as: eb =ex/τ.
of nodes and edges, several approximation algorithms have been devised [16,21 -- 24]. These algorithms trade
solution quality for speed and can be much faster.
For illustration purposes, we put ourselves now in the shoes of the authors of the most recent of the
cited algorithms, which is called KADABRA [16]: we describe (some of) the necessary steps in the process
of writing an algorithm engineering paper on KADABRA4 -- with a focus on the design and evaluation of
the experiments.
3.2. Overview of the KADABRA Algorithm
The KADABRA algorithm approximates the betweenness centrality of (un)directed graphs within a
given absolute error of at most with probability (1 − δ) [16]. The main rationale of the algorithm is to
iteratively select two nodes s, t uniformly at random and then sample a shortest path π from s to t (again
uniformly at random). This leads to a sequence of randomly selected shortest paths π1, π2, . . . , πτ. The
betweenness centrality of each node v ∈ V is then estimated as:
eb(v) =
where exi is 1 iff v occurs in πi and 0 otherwise.
1
τ
τX
i=1
exi(v),
Compared to earlier approximation algorithms that employ similar sampling techniques (e. g., [23]),
the novelty of KADABRA relies on the clever stopping condition, used to determine the number of rounds τ.
(2)
4 We select KADABRA not because the authors of the original paper did a bad job in their presentation -- au contraire. Our
main reasons are (i) the high likelihood that the betweenness problem is already known to the reader due to its popularity
in the field and (ii) the fact that approximation algorithms display important aspects of experimental algorithmics quite
clearly.
Version April 10, 2019 submitted to Algorithms
6 of 38
Pr(cid:16)
b(v) ≤eb(v) − f
and Pr(cid:16)
Clearly, there is a number ω, depending on the input size but not the graph itself, such that if τ ≥ ω, the
algorithm achieves the desired solution quality with probability (1− δ).5 KADABRA, however, avoids to run
a fixed number of ω rounds by using adaptive sampling. At each round of the algorithm, it is guaranteed
that
(cid:17) ≤ δL(v)
where f = f (eb(v), δL(v), ω, τ ) and g = g(eb(v), δU (v), ω, τ ) are (rather lengthy) expressions depending on
eb(v), per-vertex probabilities δL(v) and δU (v), the current number of rounds τ and the static round count
ω. δL(v) and δU (v) are chosen such thatP
b(v) ≥eb(v) + g
2. Once f, g < during some round, the
algorithm terminates.6 Algorithm 1 displays the corresponding pseudocode with some expository comments.
Besides adaptive sampling, KADABRA relies on a balanced bidirectional BFS to sample shortest paths. For
details we refer the interested reader to the original paper.
v∈V δL(v) + δU (v) ≤ δ
(cid:17) ≤ δU (v),
(3)
4. Guidelines for the Experimental Design
Now, we want to set up experiments that give decisive and convincing empirical evidence whether
KADABRA is better than the state of the art. This section discusses the most common individual steps of
this process.
4.1. Determining Your Hypotheses
Experiments are mainly used for two reasons; as an exploratory tool to reveal unknown properties
and/or as a means to answer specific questions regarding the proposed algorithm. The latter suggests the
development of certain hypotheses on the behavior of our algorithm that can be confirmed or contradicted
by experiments. In the following, we group common hypotheses of algorithm engineering papers in network
analysis into two categories:
1. Hypotheses on how our algorithm performs compared to the state of the art in one of the following
metrics: running time, solution quality or (less often) memory usage. Ideally, an algorithm is deemed
successful when it outperforms existing algorithms in terms of all three metrics. However, in practice,
we are content with algorithms that exhibit a good tradeoff between two metrics, often running time
performance and solution quality. As an example, in real-time applications, we may be willing to
sacrifice the solution quality (until a certain threshold), in order to meet running time bounds crucial
for the application.
2. Hypotheses on how the input instances or a problem-/algorithm-specific parameter affects our
algorithm in terms of the aforementioned metrics. For example, a new algorithm might only
outperform the existing algorithms on a certain type of graphs or an approximation algorithm might
only be fast(er) if the desired approximation quality is within a certain range. If a hypothesis involves
such restrictions, it should still be general enough for the algorithmic result to be relevant -- overtuning
of algorithms to uninteresting classes of inputs should be avoided. Other aspects of investigation
may be decoupled from the state of the art to some extent and explore the connection between
instance and algorithm properties: for instance, a hypothesis on how the empirical approximation
error behaves over a range of input sizes.
than that.
5 For example, if ω is chosen so that almost all vertex pairs are sampled. In reality, ω can be chosen to be much smaller
6 Note also that for each round, the algorithm draws a number of samples and performs occurrence updates without checking
the stopping condition. This number is determined by parameter c. In the original implementation of KADABRA (but not
reported in the paper), c is fixed to 10 (without further explanation).
Version April 10, 2019 submitted to Algorithms
7 of 38
KADABRA Example
In the context of our betweenness approximation study, we formulate three basic hypotheses:
1. KADABRA has a better running time and scalability (with respect to the graph size) than other
algorithms, specifically the main competitor RK [23].
2. There is a significant difference between the solution quality of KADABRA and that of RK. (In
Section 4.6, we explain how to evaluate the solution quality for approximation algorithms in more
detail.)
3. The diameter of input graphs has an effect on the running time of KADABRA: The KADABRA
algorithm computes the betweenness values faster for graphs with low diameter than for graphs with
large diameter.
The first two hypotheses belong to the first category, since we compare our implementation of the
KADABRA algorithm to a number of related algorithms. The other hypothesis belongs to the second category
and is related to the performance of the KADABRA algorithm itself. Namely, we test how a data-specific
parameter may influence the running time in practice. To evaluate these hypotheses experimentally, we
need to select instances with both low and high diameter values, of course.
4.2. Gathering Instances
Selecting appropriate data sets for an experimental evaluation is a crucial design step. For sake of
comparability, a general rule is to gather data sets from public sources; for network analysis purposes,
well-known repositories are KONECT [25], SNAP [26], DIMACS10 [27], SuiteSparse [28], LWA [29] and
Network Repository [30].
An appropriate data collection contains the type(s) of networks which the algorithm is designed for,
and, for every type, a large enough number of instances to support our conclusions [7]. For instance, the
data collection of an influence maximization algorithm should include social networks rather than street
networks; a data collection to evaluate distributed algorithms should include instances that exceed the
memory of a typical shared-memory machine.
The selection of an appropriate subset of instances for our experimental analysis is simpler if we first
categorize the available networks in different classes. There exist several ways to do this: first, we can
simply distinguish real-world and synthetic (= (randomly) generated) networks. Even though network
analysis algorithms generally target real-world networks, one should also use synthetic networks, e. g., to
study the asymptotic scalability of an algorithm, since we can easily generate similar synthetic networks of
different scales.
Classification of real-world networks generally follows the phenomena they are modeling. Common
examples are social networks, hyperlink networks or citation networks, which also fall under the umbrella of
complex networks.7 Examples of real-world non-complex networks are certain infrastructure networks such
as road networks. If our algorithm targets real-world data, we want to carefully build a diverse collection
of instances that is representative of the graph classes we are targeting.
Another interesting classification is one based on specific topological features of the input data such as
the diameter, the clustering coefficient, the triangle count, etc. Classifying based on a certain property
and reporting it should definitely be done when the property in question is relevant to the algorithm and
7 As the name suggests, complex networks have highly non-trivial (complex) topological features. Most notably, such
features include a small diameter (small-world effect) and a skewed degree distribution (many vertices with low degree
and a few vertices with high degree).
Version April 10, 2019 submitted to Algorithms
8 of 38
Table 1. Graphs (taken from KONECT) for our evaluation of the betweenness approximation algorithms.
Network name
moreno_blogs
petster-hamster
ego-facebook
openflights
opsahl-powergrid
p2p-Gnutella08
advogato
wiki-Vote
p2p-Gnutella05
p2p-Gnutella04
foldoc
twin
cfinder-google
ca-AstroPh
ca-cit-HepTh
subelj_cora
ego-twitter
ego-gplus
p2p-Gnutella24
ca-cit-HepPh
cit-HepPh
facebook-wosn-wall
edit-frwikibooks
dblp-cite
loc-brightkite_edges
edit-frwikinews
dimacs9-BAY
dimacs9-COL
roadNet-PA
roadNet-TX
# of nodes # of edges Diameter
8
10
9
13
46
9
9
7
9
10
8
25
7
14
9
20
15
8
11
9
14
18
8
2
18
7
837
1 255
794
1 064
16 715
16 631
2 981
19 256
6 594
20 777
39 285
100 762
31 839
39 994
91 471
20 573
148 585
198 050
2 444 798
89 157
32 831
39 194
65 369
3 148 447
420 877
183 412
139 141
49 759
214 078
157 970
397 415
521 200
1 541 898
1 921 660
1 224
2 426
2 888
3 425
4 941
6 301
6 539
7 115
8 846
10 876
13 356
14 274
15 763
18 771
22 908
23 166
23 370
23 628
26 518
28 093
34 546
46 952
47 905
49 789
58 228
59 546
321 270
435 666
1 088 092
1 379 917
Class
Hyperlink
Social
Social
Infrastructure
Infrastructure
Peer-to-peer
Social
Social
Peer-to-peer
Peer-to-peer
Hyperlink
Intl. Relations
Hyperlink
Coauthorship
Coauthorship
Citation
Social
Social
Peer-to-peer
Citation
Citation
Social
Authorship
Citation
Social
Authorship
Road
Road
Road
Road
may have an impact on its behavior. For instance, reporting the clustering coefficient could help with the
interpretation of results concerning algorithms that perform triangle counting.
A source of instances especially suited for scalability experiments are synthetic graphs generated with
graph generators [31]. An advantage is easier handling especially for large graphs, since no large files need
to be transferred and stored. Also, desired properties can often be specified in advance and in some models,
a ground truth beneficial to test analysis algorithms is available. Important drawbacks include a lack of
realism, especially when choosing an unsuitable generative model.
KADABRA Example
In a real-world scenario, we want to show the improvement of the KADABRA algorithm with respect
to the competition. Clearly, the graph class of highest relevance should be most prominent in our data
collection. With this objective in mind, we show a collection for the KADABRA experiments in Table 1.
Note that in Table 1 we report the diameter of each graph, along with its size and application class. We
include the diameter because it is part of our hypotheses, i. e., the performance of KADABRA depends
on the diameter of the input graph (see Section 4.1). In a different scenario, such as triangle counting or
community detection, a more pertinent choice would be the average local clustering coefficient. Finally, we
Version April 10, 2019 submitted to Algorithms
9 of 38
focus on complex networks, but include a minority of non-complex infrastructure networks. All of these
instances were gathered from one of the aforementioned public repositories.
4.3. Scale of Experiments
Clearly, we cannot test all possible instances, even if they are small [32]. On the other hand, we want
to draw significant conclusions about our new algorithm (and here not about a particular data set). This
means that our experimental results should justify the later conclusions and allow to clearly distinguish
between hypotheses. While Section 4.2 discusses which instances to select, we proceed with the question
"how many?". Also, if the results are affected by randomness, how many repeated runs should we make for
each?
Too few instances may be insufficient to support a conclusion. Plots then look sparse, hypothesis tests
(Section 7.3.1) are inconclusive and inferred parameters are highly uncertain, which is reflected in unusably
wide confidence and credible intervals (Sections 7.3.2 and 7.4). Choosing too many instances, though,
costs unnecessary time and expense. As a very rough rule of thumb reflecting community custom, we
recommend at least 10-15 instances for an experimental paper. If you want to support specific conclusions
about algorithmic behavior within a subclass of instances, you should have that many instances in that
subclass. Yet, the noisier the measurements and the stronger the differences of output between instances,
the more experiments are needed for a meaningful (statistical) analysis. More formally, the uncertainty of
s2
n , where s2 is the sample variance. Generally
many test statistics and inferred parameters8 scales with
speaking, if we want a result that is twice as precise, we need to quadruple the number of measurements.
The same applies for the number of repetitions for each instance. When plotting results affected by
randomness, it is often recommended to average over the results of multiple runs. The expected deviation
of such an average from the true mean9 is called the standard error and also scales with s2√
[34]. For
plotting purposes, we suggest that this standard error for the value of one plotted point (i. e., the size of
the error bars) should be one order of magnitude smaller than the variance between plotted points. In the
companion notebook, we give an example of code which calculates the number of repetitions required for
a desired smoothness. Frameworks exist that automate the repeated measurements, for example Google
Benchmark.10
q
n
In the context of binary hypothesis tests, the statistical power of a test is the probability that it
correctly distinguishes between hypotheses, i. e., rejects a false null hypothesis in the classical approach. A
larger sample size, a stronger effect or less variance in measurements all lead to a more powerful test. For
further reading, see the extensive literature about statistical power [35,36].
All these calculations for the number of necessary experiments require an estimate of the variance of
results -- which might be unavailable before conducting the experiments. It might thus be necessary to
start with a small initial set of instances to plan and prepare for the main experiments.11
4.4. Parameter Tuning
Experiments are not only a necessary ingredient to validate our hypothesis, but also a helpful discovery
tool in a previous stage [9]. Some algorithm's behavior depends on tunable parameters. For example, the
8 Most importantly the t-statistic used in confidence intervals and t-tests. In Bayesian statistics, the marginal posterior
distribution of a parameter with a Gaussian likelihood also follows a t-distribution, at least when using a conjugate
prior [33].
9 The mean that would result given infinite samples.
10 https://github.com/google/benchmark.
11 Also called pilot study, as opposed to the main experiments called workhorse study, see [37] and [38].
Version April 10, 2019 submitted to Algorithms
10 of 38
well-known hybrid implementation of Quicksort switches between Insertionsort and Quicksort depending
on whether the current array size is above or below a tunable threshold M [39]. An example from
network analysis includes a plethora of approximation methods that calculate some centrality measure
using sampling [22,23,40]. In such cases the number of selected samples may highly impact the performance
of the algorithm. Experiments are thus used to determine the adequate number of samples that achieves a
good approximation.
The KADABRA algorithm consists of two phases, in which bounds for a sampling process are first
computed (Line 3 in Algorithm 1 of Section 3.2) and then used (when checking the stopping condition
in line 9). Tighter bounds are more expensive to compute but save time in the later phase; their quality
is thus an important tradeoff. When evaluating a newly developed algorithm, there is the risk (or even
temptation) to tune its parameters for optimal performance in the experiments while using general default
parameters for all competitors. This may often happen with no ill intent -- researchers usually know their
own algorithm best. To ensure generalizability of results, we recommend to split the set of instances into a
tuning set and an evaluation set. The tuning set is used to find good tuning parameters for all algorithms,
while the main experiments are performed on the evaluation set. Only results from the evaluation set
should be used to draw and support conclusions. Note that the tuning set can also be used to derive an
initial variance estimate, as discussed in Section 4.3.
How to Create the Tuning Set and the Evaluation Set
The tuning set should be structurally similar to the whole data set, so that parameter tuning yields
good general performance and is representative for the evaluation set.12 Tuning and evaluation sets should
be disjoint. For large data sets, simple random sampling (i. e., simply picking instances from the data set
uniformly at random and without replacement) yields such a representative split in expectation. Stratified
sampling (i. e., partitioning the data set, applying simple random sampling to each partition and merging
the result) [41] guarantees it.
In our example, note that our data set is already partitioned into different classes of networks (hyperlink,
social, infrastructure, etc.), and that those classes are fairly balanced (see Table 2). We can thus select a
certain fraction of instances in each network class as tuning set.
In case of computationally expensive tuning, it is advantageous to keep the tuning set small, for large
data sets it can be much smaller than the evaluation set. In our example, we select a single instance per
network class, as seen in Table 3. Note that these considerations are similar to the creation of training,
test and validation sets in machine learning. While some other sampling methods are equally applicable,
more sophisticated methods like statistical learning theory optimize for different objectives and are thus
not considered here [42 -- 44].
4.5. Determining Your Competition
Competitor algorithms solve the same or a similar problem and are not dominated in the relevant
metrics by other approaches in the literature. Since we focus on the design of the experimental pipeline, we
consider only competitors that are deemed implementable. The best ones among them are considered the
state of the art (SotA), here with respect to the criteria most relevant for our claims about KADABRA.
Other considerations are discussed next.
12 Due to symmetry, this also requires that the tuning set is structurally similar to the evaluation set.
Version April 10, 2019 submitted to Algorithms
11 of 38
Table 2. Network class frequency of the data set in Table 1
Class
Social
Citation
Peer-to-peer
Road
Hyperlink
Infrastructure
Coauthorship
Authorship
Intl. Relationship
Frequency
26.67 %
13.33 %
13.33 %
13.33 %
10.00 %
6.67 %
6.67 %
6.67 %
3.33 %
Table 3. Split of instances into tuning and evaluation set.
Tuning set
Evaluation set
Network name
opsahl-powergrid
advogato
foldoc
p2p-Gnutella24
dblp-cite
edit-frwikinews
dimacs9-BAY
V
4 941
6 539
13 356
26 518
12 591
25 042
321 270
E
6 594
43 277
91 471
65 369
49 635
68 679
397 415
Network name
moreno_blogs
petster-hamster
ego-facebook
openflights
p2p-Gnutella08
wiki-Vote
p2p-Gnutella05
p2p-Gnutella04
twin
cfinder-google
ca-AstroPh
ca-cit-HepTh
subelj_cora
ego-twitter
ego-gplus
edit-frwikibooks
ca-cit-HepPh
cit-HepPh
loc-brightkite_edges
dimacs9-COL
roadNet-PA
roadNet-TX
V
1 224
2 426
2 888
3 425
6 301
7 115
8 846
10 876
14 274
15 763
18 771
22 908
23 166
23 370
23 628
27 754
28 093
34 546
58 228
435 666
1 088 092
1 379 917
E
16 718
16 631
19 257
2 981
20 777
100 762
31 839
39 994
20 573
149 456
198 050
2 444 798
89 157
32 831
39 194
67 584
3 148 447
420 921
214 078
521 200
1 541 898
1 921 660
Version April 10, 2019 submitted to Algorithms
12 of 38
Unavailable Source Code
The source code of a competing algorithm may be unavailable and sometimes even the executable
is not shared by its authors. If one can implement the competing algorithm with reasonable effort (to
be weighted against the importance of the competitor), you should do so. If this is not possible, a viable
option is to compare experimental results with published data. For a fair comparison, the experimental
settings should then be replicated as closely as possible. In order to avoid this scenario, we recommend
open-source code; it offers better transparency and replicability (also see 5.2).
Solving a Different Problem
In some cases, the problem our algorithm solves is different from established problems and there is
no previous algorithm solving it. Here, it is often still meaningful to compare against the SotA for the
established problem. For example, if we consider the dynamic case of a static problem for the first time
[45 -- 47] or an approximation version for an exact problem [21,22,48] or provide the first parallel version of
an algorithm [49]. Another example can be an optimization problem with a completely new constraint.
While this may change optimal solutions dramatically compared to a previous formulation, a comparison
to the SotA for the previous formulation may still be the best assessment. If the problem is so novel that
no comparison is meaningful, however, there is no reason for an experimental comparison.13
Comparisons on Different Systems
Competitors may be designed to run on different systems. Recently, many algorithms take advantage
of accelerators, mainly GPUs, and this trend has also affected the algorithmic network analysis community
[50 -- 52]. A direct comparison between CPU and GPU implementations is not necessarily meaningful due to
different architectural characteristics and memory sizes. Yet, such a comparison may be the only choice
if no other GPU implementation exists. In this case, one should compare against a multithreaded CPU
implementation that should be tuned for high performance as well. Indirect comparisons can, and should,
be done using system independent measures (4.6).
KADABRA Example
The most relevant candidates to compare against KADABRA are the SotA algorithms RK [23] and
ABRA [24]. The same algorithms are chosen as competitors in the original KADABRA paper. However, in
our paper we focus only on a single comparison, the one between KADABRA and RK. This is intended in
order to highlight the main purpose of our work -- to demonstrate the benefits of a thoughtful experimental
design for meaningful comparisons of network-related algorithms. Reporting the actual results of such
a comparison is of secondary importance. Furthermore, RK and ABRA exhibit similar behavior in the
original KADABRA paper, with RK being overall slightly faster. Again, for the purpose of our paper, this is
an adequate reason to choose RK over ABRA.14
4.6. Metrics
The most common metric for an algorithm's performance is its wall-clock running time. For solution
quality, the metrics are usually problem-specific; often, the gap between an algorithm's solution and the
13 Nonetheless, experiments can still reveal empirical insights into the behavior of the new algorithm.
14 Of course, if we were to perform experiments for a new betweenness approximation algorithm, we would include all relevant
solutions in the experiments.
Version April 10, 2019 submitted to Algorithms
13 of 38
optimum is reported as a percentage (if known). In the following, we highlight situations that require more
specific metrics. First, we discuss metrics for evaluating an algorithm's running time.
4.6.1. Running Time
CPU Time vs. Wall-clock Time
For sequential algorithms, evaluations should prefer CPU time over wall-clock time. Indeed, this is
the running time metric that we use in our KADABRA experiments. Compared to wall-clock time, CPU
time is less influenced by external factors such as OS scheduling or other processes running on the same
machine. The exception to this rule are algorithms that depend on those external factors such as external
memory algorithms (where disregarding the time spent in system-level I/O routines would be unfair). In
the same line of reasoning, evaluations of parallel algorithms would be based on wall-clock time as they
depend on specifics of the OS scheduler.
Architecture-specific Metrics
CPU and wall-clock times heavily depend on the microarchitecture of the CPU the algorithm is executed
on. If comparability with data generated on similar CPUs from other vendors or microarchitectures is desired,
other metrics should be taken into account. Such metrics can be accessed by utilizing the performance
monitoring features of modern CPUs: these allow determining the number of executed instructions, the
number of memory accesses (both are mostly independent of the CPU microarchitecture) or the number of
cache misses (which depends on the cache size and cache strategy, but not necessarily the CPU model). If
one is interested in how efficient algorithms are in exploiting the CPU architecture, the utilization of CPU
components can be measured (example: the time spent on executing ALU instructions compared to the
time that the ALU is stalled while waiting for results of previous instructions or memory fetches). Among
some common open-source tools to access CPU performance counters are the perf profiler, Oprofile (on
linux only) and CodeXL.
System-independent Metrics
It is desirable to compare different algorithms on the same system. However, in reality, this is not
always possible, e. g., because systems required to run competitors are unavailable. For such cases, even if
we do not run into such issues ourselves, we should also consider system-independent metrics. For example,
this can be the speedup of a newly proposed algorithm against some base algorithm that can be tested on all
systems. As an example, for betweenness centrality, some papers re-implement the Brandes [20] algorithm
and compare their performance against it [24,45,53]. As this metric is independent of the hardware, it can
even be used to compare implementations on different systems, e. g., CPU versus GPU implementations.
System-independent metrics also include algorithm-specific metrics, like the number of iterations of an
algorithm or the number of edges visited. Those are particularly useful when similar algorithms are
compared, e. g., if the algorithms are iterative and only differ in their choice of the stopping condition.
Aggregation and Algorithmic Speedup
Running time measurements are generally affected by fluctuations, so that the same experiment is
repeated multiple times. To arrive at one value per instance, one usually computes the arithmetic mean
over the experiments (unless the data are highly skewed). A comparison between the running times
(or other metrics) of two algorithms A and B on different data sets may result in drastically different
values, e. g., because the instances differ in size or complexity. For a concise evaluation, one is here also
interested in aggregate values. In such a case it is recommended to aggregate over ratios of these metrics;
Version April 10, 2019 submitted to Algorithms
14 of 38
regarding running time, this would mean to compute the algorithmic speedup15 of A with respect to B.16
To summarize multiple ratios, one can use the geometric mean [55]:
# of valuesY
i=1
GM(speedup) =
speedup on instance i
1
# of values
as it has the fundamental property that GM(speedup) =
appropriate for which aggregation is a matter of some discussion [56 -- 58].
GM(running times of A)
GM(running times of B). Which mean is most
4.6.2. Solution Quality
Next, we discuss metrics for solution quality. Here, the correct measurements are naturally
problem-specific; often, there is no single quality indicator but multiple orthogonal indicators are used.
Empirical vs. Worst-case Solution Quality
As mentioned in the introduction, worst-case guarantees proven in theoretical models are rarely
approached in real-world settings. For example, the accuracy of the ABRA algorithm for betweenness
approximation has been observed to be always below the fixed absolute error, even in experiments where
this was only guaranteed for 90% of all instances [24]. Thus, experimental comparisons should include also
metrics for which theoretical guarantees are known.
Comparing Against (Unknown) Ground Truth
For many problems and instances beyond a certain size, ground truth (in the sense of the exact value of
a centrality score or the true community structure of a network) is neither known nor feasible to compute.
For betweenness centrality, however, AlGhamdi et al. [59] have computed exact scores for large graphs by
investing into considerable supercomputing time. The absence of ground truth or exact values, in turn,
clearly requires the comparison to other algorithms in order to evaluate an algorithm's solution quality.
5. Guidelines for the Experimental Pipeline
Organizing and running all the required experiments can be a time-consuming activity, especially if
not planned and carried out carefully. That is why we propose techniques and ideas to orchestrate this
procedure efficiently. The experimental pipeline can be divided into four phases. In the first one, we finalize
the algorithm's implementation as well as the scripts/code for the experiments themselves.17 Next, we
submit the experiments for execution (even if the experiments are to be executed locally, we advise to
use some scheduling/batch system). In the third phase, the experiments run and create the output files.
Finally, we parse the output files to gather the information about the relevant metrics.
15 The parallel speedup of an algorithm A is instead the speedup of the parallel execution of A against its sequential execution,
more precisely the ratio of the running time of the fastest sequential algorithm and the running time of the parallel
algorithm. It can be used to analyze how efficiently an algorithm has been parallelized.
16 To achieve a fair comparison of the algorithmic aspects of A and B, the algorithmic speedup is often computed over their
sequential executions [54]. In view of today's ubiquitous parallelism, this perspective may need to be reconsidered, though.
17 It is important to use scripts or some external tool in order to automate the experimental pipeline. This also helps to
reduce human errors and simplifies repeatability and replicability.
Version April 10, 2019 submitted to Algorithms
15 of 38
5.1. Implementation Aspects
Techniques for implementing algorithms are beyond the scope for this paper; however, we give an
overview of tooling that should be used for developing algorithmic code.
Source code should always be stored in version control systems (VCS); nowadays, the most commonly
used VCS is Git [60]. For scientific experiments, a VCS should also be used to version scripts that drive
experiments, valuable raw experimental data and evaluation scripts. Storing instance names and algorithm
parameters of experiments in VCS is beneficial, e. g., when multiple iterations of experiments are done due
to the AE cycle.
The usual principles for software testing (e. g., unit tests and assertions) should be applied to ensure
that code behaves as expected. This is particularly important in growing projects where seemingly local
changes can affect other project parts with which the developer is not very familiar. It is often advantageous
to open-source code.18 The Open Source Initiative keeps a list19 of approved open source licenses. An
important difference is whether they require users to publish derived products under the same license. If
code is open-sourced, we suggest well-known platforms like Github [61], Gitlab [62], or Bitbucket [63] to
host it. An alternative is to use a VCS server within one's own organization, which reduces the dependence
on commercial interests. In an academic context, a better accessibility can have the benefit of a higher
scientific impact of the algorithms. For long-term archival storage, in turn, institutional repositories may
be necessary.
Naturally, code should be well-structured and documented to encourage further scientific participation.
Code documentation highly benefits from documentation generator tools such as Doxygen.20 Profiling is
usually used to find bottlenecks and optimize implementations, e. g., using tools such as the perf profiler
on Linux, Valgrind [64] or a commercial profiler such as VTune [65].
5.2. Repeatability, Replicability and Reproducibility
Terminology differs between venues; the Association of Computing Machinery defines repeatability as
obtaining the same results when the same team repeats the experiments, replicability for a different team
but the same programs and reproducibility for the case of a reimplementation by a different team. Our
recommendations are mostly concerned with replicability.
In a perfect world scenario, the behavior of experiments is completely determined by their code version,
command line arguments and configuration files. From that point of view, the ideal case for replicability,
which is increasingly demanded by conferences and journals21 in experimental algorithms, looks like this:
A single executable program automatically downloads or generates the input files, compiles the programs,
runs the experiments and recreates the plots and figures shown in the paper from the results.
Unfortunately, in reality some programs are non-deterministic and give different outputs for the
same settings. If randomization is used, this problem is usually avoided by fixing an initial seed of a
pseudo-random number generator. This seed is just another argument to the program and can be handled
like all others. However, parallel programs might still cause genuine non-determinism in the output, e. g., if
the computation depends on the order in which a large search space is explored [66,67] or on the order
18 We acknowledge that open-sourcing code is not always possible, e. g., due to intellectual property or political reasons.
19 https://opensource.org/licenses/alphabetical.
20 http://www.doxygen.nl.
21 For example, see the Replicated Computational Results Initiative of the Journal on Experimental Algorithms, http:
//jea.acm.org.
Version April 10, 2019 submitted to Algorithms
16 of 38
instances:
konect:
- 'advogato'
- 'ego-twitter'
- 'ego-facebook'
- 'ego-gplus'
# ... (more instances follow)
configurations:
- name: kadabra-1t
args: ['./run', '--threads=1', 'kadabra', '@INSTANCE@']
output: stdout
- name: kadabra-2t
args: ['./run', '--threads=2', 'kadabra', '@INSTANCE@']
output: stdout
# ... (more configurations follow)
- name: rk
args: ['./run', 'rk', '@INSTANCE@']
output: stdout
Figure 1. SimexPal configuration (experiments.yml) for KADABRA
in which messages from other processors arrive.22 If these effects are of a magnitude that they affect the
final result, these experiments need to be repeated sufficiently often to cover the distribution of outputs.
A replication would then aim at showing that its achieved results are, while not identical, equivalent in
practice. For a formal way to show such practical equivalence, see Section 7.4.1.
Implementations often depend on libraries or certain compiler versions. This might lead to complications
in later replications when dependencies are no longer available or incompatible with modern systems.
Providing a virtual machine image or container addresses this problem.
5.3. Running Experiments
Running experiments means to take care of many details: Instances need to be generated or downloaded,
jobs need to be submitted to batch systems23 or executed locally, running jobs need to be monitored,
crashes need to be detected, crashing jobs need to be restarted without restarting all experiments, etc.
To avoid human errors, improve reproducibilty and accelerate those tasks, scripts and tooling should be
employed.
To help with these recurring tasks, we provide as a supplement to this paper SimexPal, a command-line
tool to automate the aforementioned tasks (among others).24 This tool allows the user to manage instances
and experiments, launch jobs and monitor the status of those jobs. While our tool is not the only possible
way to automate these tasks, we do hope that it improves over the state of writing custom scripts for
each individual experiment. SimexPal is configured using a simple YAML [69] file and only requires a
minimal amount of user-supplied code. To illustrate this concept, we give an example configuration in
Figure 1. Here, run is the only piece of user-supplied code that needs to be written. run executes the
algorithm and prints the output (e.g. running times) to stdout. Given such a configuration file, the graph
instances can be downloaded using simex instances download. After that is done, jobs can be started
using the command simex experiments launch. SimexPal takes care of not launching experiments twice
and never overwrites existing output files. simex experiments list monitors the progress of all jobs. If
22 As an example, some associative calculations are not associative when implemented with floating point numbers [68]. In
such a case, the order of several, say, additions, matters.
23 Note that the exact submission mechanism is beyond the scope of this paper, as it heavily depends on the batch system in
question. Nevertheless, our guidelines and tooling suggestions can easily be adapted to all common batch system, such as
Slurm (https://slurm.schedmd.com/) or PBS (https://www.pbspro.org/).
24 SimexPal can be found at https://github.com/hu-macsy/simexpal.
Version April 10, 2019 submitted to Algorithms
17 of 38
a job crashes, simex experiments purge can be used to remove the corresponding output files. The next
launch command will rerun that particular job.
5.4. Structuring Output Files
Output files typically store three kinds of data: (i) experimental results, e. g., running times and
measures of solution quality, (ii) metadata that completely specify the parameters and the environment
of the run, so that the run can be replicated (see Section 5.2), and (iii) supplementary data, e. g., the
solution to the input problem that can be used to understand the algorithm's behavior and to verify its
correctness. Care must be taken to ensure that output files are suitable for long-term archival storage
(which is mandated by good scientific practices [70]). Furthermore, carefully designing output files helps to
accelerate experiments by avoiding unnecessary runs that did not produce all relevant information (e. g., if
the focus of experiments changes after exploration).
Choosing which experimental results to output is problem-specific but usually straightforward. For
metadata, we recommend to include enough information to completely specify the executed algorithm
version, its parameters and input instance, as well as the computing environment. This usually involves the
following data: The VCS commit hash of the implementation and compiler(s) as well as all libraries the
implementation depends on25 name (or path) of the input instance, values of parameters of the algorithm
(including random seeds26), host name of the machine and current date and time.27 Implementations that
depend on hardware details (e. g., parallel algorithms or external-memory algorithms) want to log CPU,
GPU and/or memory configurations, as well as versions of relevant libraries and drivers.
The relevance of different kinds of supplementary data is highly problem-dependent. Examples include
(partial) solutions to the input problem, numbers of iterations that an algorithm performs, snapshots of
the algorithm's state at key points during the execution or measurements of the time spent in different
parts of the algorithm. Such supplementary data is useful to better understand an algorithm's behavior, to
verify the correctness of the implementation or to increase confidence in the experimental results (i. e., that
the running times or solution qualities reported in a paper are actually correct). If solutions are stored,
automated correctness checks can be used to find and debug problems or to demonstrate that no such
problems exist.
The output format itself should be chosen to be both human readable and machine parsable. Human
readability is particularly important for long-term archival storage, as parsers for proprietary binary
formats (and the knowledge of how to use them) can be lost over time. Machine parsability enables
automated extraction of experimental results; this is preferable over manual extraction, which is inefficient
and error-prone. Thus, we recommend structured data formats like YAML (or JSON [71]). Those formats
can be easily understood by humans; furthermore, there is a large variety of libraries to process them in any
commonly used programming language. If plain text files are used, we suggest to ensure that experimental
results can be extracted by simple regular expressions or similar tools.
KADABRA Example
Let us apply these guidelines to our example of the KADABRA algorithm using SimexPal with the
YAML file format. For each instance, we report KADABRA's running time, the values of the parameters
25 Experiments should never run uncommitted code. If there are any uncommitted changes, we suggest to print a comment
to the output file to ensure that the experimental data in question does enter a paper.
26 If the implementation's behavior can be controlled by a large number of parameters, it makes sense to print command line
arguments as well as relevant environment variables and (excerpts from) configuration files to the output file.
27 Date and time help to identify the context of the experiments based on archived output data.
Version April 10, 2019 submitted to Algorithms
18 of 38
info:
commit: fef6c5ca
date: '2018-09-14T12:21:55.497368'
host: erle
iterations: 12598
parameters:
delta: 0.1
epsilon: 0.015
seed: 0
run_time: 1.6034371852874756
topk_nodes:
- 156
- 45
- 596
# ... (more nodes follow)
topk_scores:
- 0.0651690744562629
- 0.04643594221304969
- 0.0349261787585331
# ... (more scores follow)
Figure 2. Output of KADABRA example in YAML format
import simex
import yaml
cfg = simex.config_for_dir('.')
res = cfg.collect_successful_results(yaml.load)
for algo in 'kadabra', 'rk':
rts = [r['run_time'] for r in res if r['algo'] == algo and r['threads'] == 1]
print(algo, sum(rts)/len(rts))
Figure 3. Script to collect KADABRA output
and δ, the random seed that was used for the run, the number τ of samples that the run required and the
top-25 nodes of the resulting betweenness centrality ranking and their betweenness scores. The number 25
here is chosen arbitrarily, as a good balance between the amount of information that we store to verify
the plausibility of the results and the amount of space consumed by the output. To fully identify the
benchmark setting, we also report the hostname, our git commit hash, our random generator seed and the
current date and time. Figure 2 gives an example how the resulting output file looks like.
5.5. Gathering Results
When the experiments are done, one has to verify that all runs were successful. Then, the output data
has to be parsed to extract the desired experimental data for later evaluation. Again, we recommend the
use of tools for parsing. In particular, SimexPal offers a Python package to collect output data. Figure 3
depicts a complete script that computes average running times for different algorithms on the same set of
instances, using only seven lines of Python code. Note that SimexPal takes care of reading the output files
and checking that all runs indeed succeeded (using the function collect_successful_results()).
In our example, we assume that the output files are formatted as YAML (thus we use the function
yaml.load() to parse them). In case a custom format is used (e. g., when reading output from a competitor
where the output format cannot be controlled), the user has to supply a small function to parse the output.
Fortunately, this can usually be done using regular expressions (e. g., with Python's regex module).
Now would also a good time to aggregate data appropriately (unless this has been taken care of before,
also see Section 4.6).
6. Visualizing Results
After the experiments have finished, the recorded data and results need to be explored and analyzed
before they can finally be reported. Data visualization in the form of various different plots is a helpful tool
both in the exploration phase and also in the final communication of the experimental results and the formal
Version April 10, 2019 submitted to Algorithms
19 of 38
statistical analysis. The amount of data collected during the experiments is typically too large to report in
its entirety and hence meaningful and faithful data aggregations are needed.28 While descriptive summary
statistics such as means, medians, quartiles, variances, standard deviations, or correlation coefficients, as
well as results from statistical testing like p-values or confidence intervals provide a well-founded summary
of the data, they do so, by design, only at a very coarse level. The same statistics can even originate from
very different underlying data: a famous example is Anscombe's quartet [72], a collection of four sets of
eleven points in R2 with very different point distributions, yet (almost) the same summary statistics such
as mean, variance, or correlation.29 It is a striking example of how important it can be not to rely on
summary statistics alone, but to visualize experimental data graphically. A more recent example is the
datasaurus.30
Here we discuss a selection of plot types for data visualization with focus on algorithm engineering
experiments, together with guidelines when to use which type of plot depending on the properties of the
data. For a more comprehensive introduction to data visualization, we refer the reader to some of the
in-depth literature on the topic [73 -- 75]. Furthermore, there are many powerful libraries and tools for
generating data plots, e. g., R31 and the ggplot2 package32, gnuplot33, matplotlib.34 Also mathematical
software such as MATLAB35 (or even spreadsheet tools) can generate various types of plots from your
data. For more details about creating plots in one of these tools, we refer to the respective user manuals
and various available tutorials.
When presenting data in two-dimensional plots, marks are the basic graphical elements or geometric
primitives to show data. They can be points (zero-dimensional), lines (1D), or areas (2D). Each mark
can be further refined and enriched by visual variables or channels such as their position, size, shape,
color, orientation, texture, etc. to encode different aspects of the data. The most important difference
between those channels is that some are more suitable to represent categorical data (e. g., graph properties,
algorithms, data sources) by assigning different shapes or colors to them, whereas others are well suited
for showing quantitative and ordered data (e. g., input sizes, timings, quantitative quality measures) by
mapping them to a spatial position, size, or lightness. For instance, in Figure 6 we use blue circles as marks
for one of the algorithms, while for the other we use orange crosses. Using different shapes makes sure that
the plots are still readable if printed in grey-scale. Not all channels are equally expressive and effective in
encoding information for the human visual system, so that one has to carefully select which aspects of the
data to map to which channels, possibly also using redundancy. For more details see the textbooks [76]
and [77].
As discussed in Section 4.6, the types of metrics from algorithmic experiments comprise two main
aspects: running time data and solution quality data. Both types of metrics can consist of absolute or relative
values. Typically, further attributes and parameters of the experimental data, of the algorithms, and of the
input instances are relevant to include in a visualization to communicate the experimental findings. These
can range from hardware-specific parameters, over the set of algorithms and possible algorithm-specific
parameters, to instance-dependent parameters such as certain graph properties. Depending on the
experiment's focus, one needs to decide on the parameters to show in a plot and on how to map them
28 For future reference and repeatability, it may make sense to include relevant raw data in tables in the appendix. But raw
data tables are rarely good for illustrating trends in the data.
29 For example plots of the four point sets see https://commons.wikimedia.org/w/index.php?curid=9838454.
30 https://www.autodeskresearch.com/publications/samestats.
31 https://www.r-project.org.
32 https://ggplot2.tidyverse.org.
33 http://www.gnuplot.info.
34 https://matplotlib.org.
35 https://www.mathworks.com/products/matlab.html.
Version April 10, 2019 submitted to Algorithms
20 of 38
Figure 5. The running time speedup of KADABRA over RK for all the instances in the evaluation set for
c = 4375. Every bar is the ratio of the arithmetic means for 5 repeated runs per instance. The smallest
speedup is 4.5 for instance roadNet-PA (rdPA) and the largest speedup is 478.7 for instance ca-AstroPh
(caAs). The geometric mean for all speedups is around 145.1. Instances are sorted by their number of
nodes. The y-axis is in log scale.
to marks and channels. Typically, the most important metric to answer the guiding research question
(e. g., running time or solution quality) is plotted along the y-axis. The x-axis, in turn, is used for the
most relevant parameter describing the instances (e. g., instance size for a scalability evaluation or a graph
parameter for evaluating its influence on the solution quality). Additional parameters of interest can then
be represented by using distinctly colored or shaped marks for different experimental conditions such as
the respective algorithm, an algorithmic parameter or properties of the used hardware, see for example
that, in Figures 6 instance roadNet-TX is plotted differently because RK did not finish within the allocated
time frame of 7 hours.
Before starting to plot the data, one needs to decide whether raw absolute data should be visualized
(e. g., running times or objective function values) or whether the data should be shown relative to some
baseline value, or be normalized prior to plotting. This decision typically depends on the specific algorithmic
problem, the experimental setup and the underlying research questions to be answered. For instance, when
the experiment is about a new algorithm for a particular problem, the algorithmic speedup or possible
improvement in solution quality with respect to an earlier algorithm may be of interest; hence, running
time ratios or quality ratios can be computed as a variable to plot -- as shown in Figure 5 with respect
to KADABRA and RK. Another possibility of data preprocessing is to normalize certain aspects of the
experimental data before creating a plot. For example, to understand effects caused by properties of the
hardware, such as cache sizes and other memory effects, one may normalize running time measurements
by the algorithm's time complexity in terms of n and m, the number of vertices and edges of the input
graph, and examine if the resulting computation times are constant or not. A wide range of meaningful
data processing and analysis can be done before showing the resulting data in a visualization. While we
just gave a few examples, the actual decision of what to show in a plot needs to be made by the designers
of the experiment after carefully exploring all relevant aspects of the data from various perspectives. For
the remainder of this section, we assume that all data values to be visualized have been selected.
mrnbpetsegfbopenGn08wkVoGn05Gn04twincfincaAscaThsubctwitegplcaPhciPhfbwowkbolocbdCOLrdPA23252729algorithmic speedup145.1geometric mean=145.1Version April 10, 2019 submitted to Algorithms
21 of 38
Figure 6. Scatter plot for running times of KADABRA for c = 4375 and RK for all instances in the
evaluation set. Both axes are in log scale. Every point is the (arithmetic) mean running time for
5 repeated runs for each instance. The one square represents the run of KADABRA for the network
roadNet-TX for which RK did not finish within the cutoff time of 7 hours.
A very fundamental plot is the scatter
plot, which maps two variables of the data
(e. g., size and running time) onto the x- and
y-axis, see Figure 6. Every instance of the
experiment produces its own point mark in
the plot, by using its values of the two chosen
variables as coordinates. Further variables
of the data can be mapped to the remaining
channels such as color, symbol shape, symbol
size, or texture. If the number of instances
is not too large, a scatter plot can give an
accurate visualization of the characteristics
and trends of the data. However, for large
numbers of instances, overplotting can quickly
lead to scatter plots that become hard to read.
In such cases, the data needs to be
aggregated before plotting, by grouping similar
instances and showing summaries instead. The
simplest way to show aggregated data, such as repeated runs of the same instances, is to plot a single point
mark for each group, e. g., using the mean or median, and then optionally putting a vertical error bar on
top of it showing one standard deviation or a particular confidence interval of the variable within each
group. Such a plot can be well suited for showing how running times scale with the instance size. If the
sample sizes in the experiment have been chosen to cover the domain well, one may amplify the salience of
Figure 4. Tuning parameter search. Every point is the
(arithmetic) mean running time for all the instances in the
tuning set. Experiments on each instance are repeated 3 times
for the respective value of the parameter. The value that gives
the best results is picked; here it is 4375 as it provides the lowest
running time of about 142 seconds.
222528211214217tunning parameter value200300400running time (secods)211212213140150best tuning valuefor c=4375Version April 10, 2019 submitted to Algorithms
22 of 38
(a) A violin plot for running time deviation of
KADABRA.
(b) A box plot for running time deviation of RK. The
orange line indicates the median.
Figure 7. Plots on variance of running times. For each instance in the evaluation set, we perform 5
repeated runs and calculate the mean. Shown in the plot are, for each run, the distance to the mean,
divided by the mean. This way we get the relative running time variance for every instance. Here, we
use a box and a violin plot for illustration purposes; in a scientific paper one of the two should be chosen.
Notice also that instance roadNet-TX is missing for RK since it did not finish within the 7 hours limit.
the trend in the data by linking the point marks by a line plot. However, this visually implies a linear
interpolation between neighboring measurements and therefore should only be done if sufficiently many
sample points are included and the plot is not misleading. Obviously, if categorical data are represented on
the x-axis, one should never connect the point marks by a line plot.
At the same time, the scale of the two coordinate axes is also of interest. While a linear scale is the
most natural and least confusing for human interpretation, some data sets contain values that may grow
exponentially. On a linear scale, this results in the large values dominating the entire plot and the small
values disappear in a very narrow band. In such cases, axes with a logarithmic scale can be used; however,
this should always be made explicit in the axis labeling and the caption of the plot.
A more advanced summary plot is the box plot (or box-and-whiskers plot), where all repeated runs
of the same instance or sets of instances with equal or similar size form a group, see Figure 7a. This
group is represented as a single glyph showing simultaneously the median, the quartiles, the minimum and
maximum values or another percentile, as well as possibly outliers as individual marks. If the x-axis shows
an ordered variable such as instance size, one can still clearly see the scalability trend in the data as well as
the variability within each homogeneous group of instances.
Violin plots take the idea of box plots even further and draw the contour of the density distribution of
the variable mapped to the y-axis within each group, see Figure 7b. It is thus visually more informative
than a simple box plot, but also more complex and thus possibly more difficult to read. When deciding
for a particular type of plot, one has to explore the properties of the data and choose a plot type that is
neither oversimplifying them nor more complex than needed.
Data from algorithmic experiments may also often be aggregated by some attribute into groups of
different sizes. In order to show the distribution of the instances into these groups, bar charts (for categorical
data) or histograms (for continuous data) can be used to visualize the cardinality of each group. Such
diagrams are often available in public repositories like KONECT.36 For a complex network, for example,
one may want to plot the degree distribution of its nodes with the degree (or bins with a specific degree
range) on the x-axis and the number of vertices with a particular degree (or in a particular degree range)
36 For example, one can find this information for moreno_blogs in http://konect.uni-koblenz.de/networks/moreno_blogs.
mrnbpetsegfbopenGn08wkVoGn05Gn04twincfincaAscaThsubctwitegplcaPhciPhfbwowkbolocbdCOLrdPArdTX-16.0%-12.0%-8.0%-4.0%0.0%4.0%8.0%12.0%16.0%relative deviation in running timemrnbpetsegfbopenGn08wkVoGn05Gn04twincfincaAscaThsubctwitegplcaPhciPhfbwowkbolocbdCOLrdPA-4.0%-3.0%-2.0%-1.0%0.0%1.0%2.0%3.0%4.0%relative deviation in running timeVersion April 10, 2019 submitted to Algorithms
23 of 38
on the y-axis. Such a histogram can then quickly reveal how skewed the degree distribution is. Similarly,
histograms can be useful to show solution quality ratios obtained by one or more algorithms by defining
bins based on selected ranges of quality ratios. Such a plot quickly indicates to the reader what percentage
of instances could be solved within a required quality range, e. g., at least 95% of the optimum. of the
algorithm(s) and the y-axis displays the quality. This allows
A single plot can contain multiple experimental conditions simultaneously. For instance, when showing
running time behavior and scalability of a new algorithm compared to previous approaches, a single plot
with multiple trend lines in different colors or textures or with visually distinct mark shapes can be very
useful to make comparisons among the competing algorithms. Clearly, a legend needs to specify the
mapping between the data and the marks and channels in the plot. Here it is strongly advisable to use the
same mapping if multiple plots are used that all belong together. But, as a final remark, bear in mind the
size and resolution of the created figures. Avoid clutter and ensure that your conclusion remains clearly
visible!
7. Evaluating Results with Statistical Analysis
Even if a result looks obvious37, it can benefit from a statistical analysis to quantify it, especially if
random components or heuristics are involved. The most common questions for a statistical analysis are:
• Do the experimental results support a given hypothesis, or is the measured difference possibly just
random noise? This question is addressed by hypothesis testing.
• How large is a measured effect, i. e., which underlying real differences are plausible given the
experimental measurements? This calls for parameter estimation.
• If we want to answer the first two questions satisfactorily, how many data points do we need? This is
commonly called power analysis. As this issue affects the planning of experiments, we discussed it
already in Section 4.3.
The two types of hypotheses we discussed in Section 4.1 roughly relate to hypothesis tests and
parameter estimation. Papers proposing new algorithms mostly have hypotheses of the first type: The
newly proposed algorithm is faster, yields solutions with better quality or is otherwise advantageous.
In many empirical sciences, the predominant notion has been null hypothesis significance testing
(NHST), in which a statistic of the measured data is compared with the distribution of this statistic under
the null hypothesis, an assumed scenario where all measured differences are due to chance. Previous works
on statistical analysis of experimental algorithms, including the excellent overviews of McGeoch [37] and
Coffin and Saltzmann [15], use this paradigm.
Due to some limitations of the NHST model, a shift towards parameter estimation [78 -- 81] and also
Bayesian methods [82 -- 84] is taking place in the statistical community.
We aim at applying the current state of the art in statistical analysis to algorithm engineering, but
since no firm consensus has been reached [80], we discuss both frequentist and Bayesian approaches. As an
example for null hypothesis testing, we investigate whether the KADABRA and the RK algorithms give
equivalent results for the same input graphs. While this equivalence test could also be performed using
Bayesian inference, we use a null hypothesis test for illustration purposes.
It is easy to see from running time plots (e. g., Figure 6) that KADABRA is faster than RK. To quantify
this speedup, we use Bayesian methods to infer plausible values for the algorithmic speedup and different
scaling behavior. We further evaluate the influence of the graph diameter on the running time.
37 It fulfills the "inter-ocular trauma test", as the saying goes, the evidence hitting you between the eyes.
Version April 10, 2019 submitted to Algorithms
24 of 38
7.1. Statistical Model
A statistical model defines a family of probability distribution over experimental measurements.
Many experimental running times have some degree of randomness: Caching effects, network traffic and
influence of other processes contribute to this, sometimes the tested algorithm is randomized itself. Even a
deterministic implementation on deterministic hardware can only be tested on a finite set of input data,
representing a random draw from the infinite set of possible inputs. A model encodes our assumptions
about how these sources of randomness combine to yield the distribution of outputs we see. If, for example,
the measurement error consists of many additive and independent parts, the central limit theorem justifies
a normal distribution.
To enable useful inferences, the model should have at least one free parameter corresponding to a
quantity of interest. Any model is necessarily an abstraction, as expressed in the aphorism "all models are
wrong, but some are useful" [85].
7.1.1. Example
Suppose we want to investigate whether KADABRA scales better than RK on inputs of increasing size.
Figure 6 shows running times of KADABRA and RK with respect to the instance size. These are spread
out, implying either that the running time is highly variable, or that it depends on aspects other than the
instance size.
A companion Jupyter notebook including this example and the following inferences is included in the
supplementary materials.
In general, running times are modeled as functions of the input size, sometimes with additional
properties of the input. The running time of KADABRA, for example, possibly depends on the diameter of
the input graph. Algorithms in network analysis often have polynomial running times where a reasonable
upper bound for the leading exponent can be found. Thus, the running time can be modeled as such a
polynomial, written as a + bn + cn2 + dn3 + . . . + α log n + β log log n + . . ., with the unknown coefficients
of the polynomial being the free parameters of the model.
However, a large number of free model parameters makes inference difficult. This includes the danger
of overfitting, i. e., inferring parameter values that precisely fit the measured results but are unlikely to
generalize.
To evaluate the scaling behavior, it is thus often more useful to focus on the largest exponent
instead. Let TA(n) be the running time of the implementation of RK and TB(n) the running time of the
implementation of KADABRA on inputs of size n, with unknown parameters αA, αB, βA and βB.38
TA(n) = αA · nβA ·
TB(n) = αB · nβB ·
The term explicitly models the error; it can be due to variability in inputs (some instances might be
harder to process than others of the same size) and measurement noise (some runs suffer from interference
or caching effects). Since harder inputs are not constrained to additive difficulty and longer runs have more
38 For estimating asymptotic upper bounds, see the work of McGeoch et al. [32] on curve bounding.
Version April 10, 2019 submitted to Algorithms
25 of 38
opportunity to experience adverse hardware effects, we choose a multiplicative error term.39 Taking the
logarithms of both sides makes the equations linear:
log(TA(n)) = log(αA) + βA log(n) + log()
log(TB(n)) = log(αB) + βB log(n) + log()
(4)
(5)
A commonly chosen distribution for additive errors is Gaussian, justified by the central limit
theorem [86]. Since longer runs have more exposure to possibly adverse hardware or network effects
we consider multiplicative error terms to be more likely and use a log-normal distribution.40 Since the
logarithm of the log-normal distribution is a normal (Gaussian) distribution, Equations 4 and 5 can be
rewritten as normally distributed random variables:
log(TA(n)) ∼ N (log(αA) + βA log(n), σ2
)
log(TB(n)) ∼ N (log(αB) + βB log(n), σ2
)
(6)
(7)
This form shows more intuitively the idea that a statistical model is a set of probability measures on
experimental outcomes. In this example, the set of probability measures modeling the performance of an
algorithm are parametrized by the tuple (α, β, σ) ∈ R3.
A problem remains if the input instances are very inhomogeneous. In that case, both A and B have a
large estimated variance (σ2). Even if the variability of performance on the same instance is small, any
genuine performance difference might be wrongly attributed to the large inter-instance variance. This issue
can be addressed with a combined model as recommended by Coffin and Saltzmann [15], in which the
running time TA(x) of A is a function of the running time TB(x) of B on the same instance x:
log(TA(x)) ∼ N (log(αA/B) + βA/B log(TB(x)), σ2)
For a more extensive overview of modeling experimental algorithms, see [37].
(8)
7.1.2. Model Fit
Several methods exist to infer parameters when fitting a statistical model to experimental data. The
most well-known is arguably the maximum-likelihood fit, choosing parameters for a distribution that give
the highest probability for the observed measurements. In the case of a linear model with a normally
distributed error, this is equivalent to a least-squares fit [87]. Such a fit yields a single estimate for plausible
parameter values.
Given random variations in the measurement, we are also interested in the range of plausible values,
quantifying the uncertainty involved in measurement and instance selection. This is covered in Sections
7.3.2 and 7.4.
7.2. Formalizing Hypotheses
Previously (Section 4.1), we discussed two types of hypotheses. The first type is that a new algorithm
is better in some aspect than the state of the art. The second type claims insight into how the behavior of
39 Summands with smaller exponents are also subsumed within the error term. If they have a large effect, an additive error
might reflect this more accurately.
40 In some cases, it might even make sense to use a hierarchical model with two different error terms: One for the input
instances, the other one for the differences on the same input.
Version April 10, 2019 submitted to Algorithms
26 of 38
an algorithm depends on settings and properties of the input. We now express these same hypotheses more
formally, as statements about the parameters in a statistical model. The two types are then related to the
statistical approaches of hypothesis testing and parameter estimation.
Considering the scaling model presented in Equation (8) and the question whether implementation A
scales better than implementation B, the parameter in question is the exponent βA/B. The hypothesis
that A scales better than B is equivalent to log(βA/B) < 0; both scaling the same implies log(βA/B) = 0.
Note that the first hypothesis does not imply a fully specified probability distribution on βA/B, merely
restricting it to the negative half-plane. The hypothesis of log(βA/B) = 0 does completely specify such a
distribution (i. e., a point mass of probability 1 at 0), which is useful for later statistical inference.
7.3. Frequentist Methods
Frequentist statistics defines the probability of an experimental outcome as the limit of its relative
frequency when the number of experiments trends towards infinity. This is usually denoted as the classical
approach.
7.3.1. Null Hypothesis Significance Testing
As discussed above, null hypothesis significance testing evaluates a proposed hypothesis by contrasting
it with a null hypothesis, which states that no true difference exists and the observed difference is due to
chance. As an example application, we compare the approximation quality of KADABRA and RK. From
theory, we would expect higher approximation errors from KADABRA, since it samples fewer paths. We
investigate whether the measured empirical difference supports this theory, or could also be explained with
random measurement noise, i. e., with the null hypothesis (denoted with H0) of both algorithms having the
same distribution of errors and just measuring higher errors from KADABRA by coincidence. Here it is an
advantage that the proposed alternate hypothesis (i. e., the distributions are meaningfully different) does
not need an explicit modeling of the output distribution, as the distribution of differences in our case does
not follow an easily parameterizable distribution.
When deciding whether to reject a null hypothesis (and by implication, support the alternate
hypothesis), it is possible to make one of two errors: (i) rejecting a null hypothesis, even though it
is true (false positive), (ii) failing to reject a false null hypothesis (false negative). In such probabilistic
decisions, the error rate deemed acceptable often depends on the associated costs for each type of error.
For scientific research, Fisher suggested that a false positive rate of 5% is acceptable [88], and most fields
follow that suggestion. This threshold is commonly denoted as α.
Controlling for the first kind of error, the p-value is defined as the probability that a summary statistic
as extreme as the observed one would have occurred given the null hypothesis [89]. Please note that this
is not the probability P (H0observations), i. e., the probability that the null hypothesis is true given the
observations.
For practical purposes, a wide range of statistical hypothesis tests have been developed, which aggregate
measurements to a summary statistic and often require certain conditions. For an overview of which of
them are applicable in which situation, see the excellent textbook of Young and Smith [89]. In our example
the paired results are of very different instances and clearly not normally distributed. We thus avoid the
common t-test and use a Wilcoxon test of pairs [90] from the SciPy [91] stats module, yielding a p-value
of 5.9 · 10−5, see cell 14 of the statistics notebook in the supplementary materials. Since this is smaller
than our threshold α of 0.05, one would thus say that this result allows us to reject the null hypothesis at
the level of 5.9 · 10−5. Such a difference is commonly called statistically significant. To decide whether it
is actually significant in practice, we look at the magnitude of the difference: The error of KADABRA is
about one order of magnitude higher for most instances, which we would call significant.
Version April 10, 2019 submitted to Algorithms
27 of 38
Multiple Comparisons
The NHST approach guarantees that of all false hypotheses, the expected fraction that seem significant
when tested is at most α. Often though, a publication tests more than one hypotheses. For methods to
address this problem and adjust the probability that any null hypothesis in an experiment is falsely rejected
(also called the familywise error rate), see Bonferroni [92] and Holm [93].
7.3.2. Confidence Intervals
One of the main criticism of NHST is that it ignores effect sizes; the magnitude of the p-value says
nothing about the magnitude of the effect. More formally, for every true effect with size > 0 and every
significance level α, there exists an n0 so that all experiments containing n ≥ n0 measurements are likely to
reject the null hypothesis at level α. Following this, Coffin and Saltzmann [15] caution against overly large
data sets - a recommendation which comes with its own set of problems.
The statistical response to the problem of small but meaningless p-values with large data sets is
a shift away from hypothesis testing to parameter estimation. Instead of asking whether the difference
between populations is over a threshold, the difference is quantified as a parameter in a statistical model,
see also Section 7.2. As Kruschke et al. [83] put it, the null hypothesis test asks whether the null value
of a parameter would be rejected at a given significance level. A confidence interval merely asks which
other parameter values would not be rejected [83]. We refer to [94,95] for a formal definition and usage
guidelines.
7.4. Bayesian Inference
Bayesian statistics defines the probability of an experimental outcome as the uncertainty of knowledge
about it. Bayes's theorem gives a formal way to update probabilities on new observations. In its simplest
form for discrete events and hypotheses, it can be given as:
P (H1A) =
P (AH1)P (H1)
P (A)
(9)
When observing outcome A, the probability of hypothesis H1 is proportional to the probability of A
conditioned on H1 multiplied by the prior probability P (H1). The conditional probability P (AH1) of an
outcome A given an hypothesis H1 is also called the likelihood of H1. The prior probability reflects the
estimation before making observations, based on background knowledge.
Extended to continuous distributions, Bayes's rule allows to combine a statistical model with a set of
measurements and a prior probability distribution over parameters to yield a posterior probability distribution
over parameters. This posterior distribution reflects both the uncertainty in measurements and possible
prior knowledge about parameters. A thorough treatment is given by Gelman et al. [96].
For our example model introduced in Section 7.1, we model the running times of implementation B as
a function of the time of implementation A, as done in Equation (8):
log(TA(n)) ∼ N (αA/B + βA/B · log(TB(n)), σ2
A/B)
This defines the likelihood function as a Gaussian noise with variance σ2. Since this variance is unknown,
we keep it as a model parameter. As we have no specific prior information about plausible values of α and
β, we define the following vague prior distributions:
αA/B ∼ N (0, 10), βA/B ∼ N (1, 10), σA/B ∼ InvGamma(1, 1)
Version April 10, 2019 submitted to Algorithms
28 of 38
import pymc3 as pm
from scipy import optimize
basic_model = pm.Model()
with basic_model:
alpha = pm.Normal('alpha', mu=0, sd=10)
with basic_model:
pm.summary(trace)
beta = pm.Normal('beta', mu=0, sd=10)
sigma = pm.InverseGamma('sigma', alpha=1,beta=1)
mu = alpha + beta*logTimeRK
Y_obs = pm.Normal('Y_obs', mu=mu, sd=sigma, observed=logTimeKadabra)
# approximate posterior distribution with 10000 samples
trace = pm.sample(10000)
Figure 8. Example listing for inference of parameters αA/B, βA/B and σA/B.
HPD 2.5 Mean HPD 97.5
-6.87
0.70
0.80
-3.58
1.29
1.54
-5.22
1.01
1.13
αA/B
βA/B
σA/B
Table 4. Posterior distribution of parameter values.
The first two distributions represent our initial -- conservative -- belief that the two implementations are
equivalent in terms of scaling behavior and constants. We model the variance of the observation noise σ2
as an inverse gamma distribution instead of a normal distribution, since a variance cannot be negative.
Figure 8 shows a listing to compute and show the posterior distribution of these three parameters
using SciPy [91] and PyMC3 [97]. Results are listed in Table 4. The interval of Highest Probability
Density (HPD) is constructed to contain 95% of the probability mass of the respective posterior distribution.
It is the Bayesian equivalent of the confidence interval (Section 7.3.2) and also called credible interval.
The most probable values for αA/B and βA/B are -5.22 and 1.01, respectively. Taking measurement
uncertainty into account, the true values are within the intervals [−6.87,−3.58] respective [0.70, 1.29] with
95% probability. This shows that KADABRA is faster on average, but results about the relative scaling
behavior are inconclusive. While the average for βA/B is 1.01 and suggests similar scaling, the interval
[0.7, 1.29] neither excludes the hypothesis that KADABRA scales better, nor the hypothesis that it scales
worse.
7.4.1. Equivalence Testing
Computing the highest density interval can also be used for hypothesis testing. In Section 7.3.1 we
discussed how to show that two distributions are different. Sometimes, though, we are interested in showing
that they are sufficiently similar. An example would be wanting to show that two sampling algorithms give
the same distribution of results. This is not easily possible within the NHST paradigm, as the two answers
of a classical hypothesis test are "probably different" and "not sure".
This problem can be solved by calculating the posterior distribution of the parameter of interest and
defining a region of practical equivalence (ROPE), which covers all parameter values that are effectively
indistinguishable from 0. If x% of the posterior probability mass are in the region of practical equivalence,
the inferred parameter is practically indistinguishable with probability x%. If x% of the probability mass
are outside the ROPE, the parameter is meaningfully different with probability x%. If the intervals overlap,
the observed data is insufficient to come to either conclusion. In our example, the scaling behavior of two
algorithms is equivalent if the inferred exponent modeling their relative running times is more or less 1. We
could define practical equivalence as ±5%, resulting in a region of practical equivalence of [0.95, 1.05]. The
Version April 10, 2019 submitted to Algorithms
29 of 38
interval [0.7, 1.29] containing 95% of the probability mass for β is neither completely inside [0.95, 1.05] nor
completely outside it, implying that more experiments are needed to come to a conclusion.
7.4.2. Bayes Factor
Bayes factors are a way to compare the relative fit of several models and hypotheses to a given set
of observations. While NHST (Section 7.3.1) evaluates the fit of observations to the null hypothesis and
confidence intervals and credible intervals infer the range of plausible values of parameters in a model, the
Bayes factor between two hypotheses gives the ratio between their posterior probabilities. This probability
ratio of hypotheses is then:
P (H1obs)
P (H0obs)
P (H1)
P (H0)
P (obsH1)
P (obsH0)
=
Crucially, the ratio of prior probabilities, which is subjective, is a separate factor from the ratio of likelihoods,
which is objective. This objective part, the ratio P (obsH1)
P (obsH0), is called the Bayes factor.
The first obvious difference to NHST is that calculating a Bayes Factor consists of comparing the fit of
both hypotheses to the data, not only the null hypothesis. It thus requires that an alternate hypothesis is
stated explicitly, including a probability distribution over observable outcomes. If the alternative hypothesis
is meant to be vague, for example just that two distributions are different, an uninformative prior with a
high variance should be used. However, specific hypotheses like "the new algorithm is at least 20% faster"
can also be modeled explicitly.
This explicit modeling allows inference in both directions; using NHST, on the other hand, one can
only ever infer that a null hypothesis is unlikely or that the data is insufficient to infer this. Using Bayes
factors, it is possible to infer that H1 is more probable than H0, or that the observations are insufficient to
support this statement, or that H0 is more probable than H1.
In the previous running time analysis, we hypothesized a better scaling behavior, which was not
confirmed by the experimental measurements. However, the graphs with high diameter are larger than
average and a cursory complexity analysis of the KADABRA algorithm suggests that the diameter has an
influence on the running time. Might the relative scaling of KADABRA and RK depend on the running
time?
To answer this question, we compare the fit of two models: The first model is the same as discussed
earlier (Equation 8), it models the expected running time of KADABRA on instance x as eα · TRK(x)β,
where TRK(x) is the running time of RK on the same instance. The second model has the additional free
parameter γ, controlling the interaction between the diameter and running times:
log(T (x)) ∼ N (log(α) + β log(TRK(x)) + γ log(diamx), σ).
(10)
Comparing for example the errors of a least-squares fit of the two models would not give much insight,
since including an additional free parameter in a model almost always results in a better fit. This does not
have to mean that the new parameter captures something interesting.
Instead, we calculate the Bayes factor, for which we integrate over the prior distribution in each model.
Since this integral over the prior distribution also includes values of the new parameter which are not a
good fit, models with too many additional parameters are automatically penalized. Our two models are
similar, thus we can phrase them as a hierarchical model with the additional parameter controlled by a
boolean random variable, see Listing 9.
The posterior for the indicator variable selected_model is 0.945, yielding a Bayes factor of ≈ 17 in
support of including the diameter in the model. We can thus conclude that it is very probable that the
diameter has an influence on the relative scaling between KADABRA and RK. The inferred mean of the
variable γ is 0.79, meaning that higher diameter values lead to higher running times.
Version April 10, 2019 submitted to Algorithms
30 of 38
import pymc3 as pm
from scipy import optimize
basic_model = pm.Model()
with basic_model:
pi = (0.5, 0.5)
selected_model = pm.Bernoulli('selected_model', p=pi[1])
alpha = pm.Normal('alpha', mu=0, sd=10)
beta = pm.Normal('beta', mu=0, sd=10)
gamma = pm.Normal('gamma', mu=0, sd=10)
sigma = pm.InverseGamma('sigma', alpha=1, beta=1)
mu = alpha + beta*logTimesRK + gamma*logDiameters*selected_model
Y_obs = pm.Normal('Y_obs', mu=mu, sd=sigma, observed=logTimeKadabra)
Figure 9. Listing to compute the Bayes factor, the relative likelihood of two models, between the model
including the graph diameter and the model with just the graph sizes. The variable selected_model is an
indicator for which model is selected.
Estimation
Frequentist
Confidence Interval
Bayesian
Posterior
Hypothesis
Equivalence
Difference
Model Selection
TOST
NHST
AIC
Posterior + ROPE or BF
Bayes Factor (BF)
Table 5. Overview of different statistical methods. TOST stands for Two One-Sided T-Tests and AIC
is the Akaike Information Criterion [98], a combined measure for model fit and model complexity.
7.5. Recommendations
Which statistical method is best, depends on what needs to be shown. For almost all objectives, both
Bayesian and frequentist methods exist, see Table 5. In experimental algorithmics, most hypotheses can
be expressed as statements constraining parameters in a statistical model, i. e., "the average speedup of
A over B is at least 20%". Thus, in contrast to earlier statistical practice, we recommend to approach
evaluation of hypotheses by parameter estimation and to only use the classical hypothesis tests when
parameter estimation is not possible. The additional information gained by parameter estimates has a
couple of advantages. For example, when using only hypothesis tests, small differences in large data sets
can yield impressively small p-values and thus claims of statistical significance even when the difference is
irrelevant in practice and the significance is statistical only [15]. Using confidence intervals (Section 7.3.2)
or the posterior distribution in addition with a region of practical equivalence avoids this problem [83].
Below is a rough guideline (also shown in Figure 10) outlining our method selection process. It favors
Bayesian methods, since the python library PyMC3 [97] offering them fits well into our workflow.
1. Define a model that captures the parts of the measured results that interest you, see Section 7.1.
2. Using confidence intervals (Section 7.3.2) or credible intervals (Section 7.4), estimate plausible
values for the model parameters, including their uncertainty. If this proves intractable and you are
only interested in whether a measured difference is due to chance, use a significance test instead
(Section 7.3.1).
3. If you want to show that two distributions (of outcomes of algorithms) are similar, use an equivalence
test, in which you define a region of practical equivalence.
4. If you want to show that two distributions (of outcomes of algorithms) are different, you may also
use an equivalence test or alternatively, a significance test.
5. If you want to compare how well different hypotheses explain the data, for example compare whether
the diameter has an influence on relative scaling, compare the relative fit using a Bayes factor
(Section 7.4.2).
Needless to say, these are only recommendations.
Version April 10, 2019 submitted to Algorithms
31 of 38
Hypothesis test or Parameter estimation?
Parameter
Hypothesis
Bayesian or Frequentist
preference?
Difference,
Equivalence
or Model Comparison?
Model
Comparison
Bayes Factor
7.4.2
Bayesian
Difference
Frequentist
Credible Interval
7.4
Equivalence
Hypothesis of difference
possible to model?
Yes
No
Confidence Interval
7.3.2
8. Conclusions
Region of
Practical Equivalence
7.4.1
Null Hypothesis
Statistical Tests
7.3.1
Figure 10. Flowchart outlining our method selection.
Besides setting guidelines for experimental algorithmics, this paper provides a tool for simplifying the
typical experimental workflow. We hope that both are useful for the envisioned target group -- and beyond,
of course. We may have omitted material some consider important. This happened on purpose to keep the
exposition reasonably concise. To account for future demands, we could imagine an evolving "community
version" of the paper, updated with the help of new co-authors in regular time intervals. That is why we
invite the community to contribute comments, corrections and/or text.41
Let us conclude by reminding the reader: most of the guidelines in the paper are not scientific laws
nor set in stone. Always apply common sense to adapt a guideline to your concrete situation! Also, we
cannot claim that we always followed the guidelines in the past. But this was all the more motivation for
us to write this paper, to develop SimexPal and to have a standard to follow -- we hope that the community
shares this motivation.
Acknowledgments: We thank Michael Hamann and Sebastian Schlag for their timely and thorough feedback on
a working draft of the paper. We also thank Alexander Meier and Dimitri Ghouse for valuable advice on statistics.
A subset of the authors was partially supported by grant ME 3619/3-2 within German Research Foundation (DFG)
Priority Programme 1736 Algorithms for Big Data.
41 The source files of this paper can be found at https://github.com/hu-macsy/ae-tutorial-paper. We encourage readers post
suggestions via GitHub issues and welcome pull requests.
Version April 10, 2019 submitted to Algorithms
32 of 38
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
Bogdanov, A.; Trevisan, L. Average-Case Complexity. Foundations and Trends R(cid:13) in Theoretical Computer
Science 2006, 2, 1 -- 106. doi:10.1561/0400000004.
Spielman, D.; Teng, S.H. Smoothed Analysis of Algorithms: Why the Simplex Algorithm Usually Takes
Polynomial Time. Proceedings of the Thirty-third Annual ACM Symposium on Theory of Computing;
ACM: New York, NY, USA, 2001; STOC '01, pp. 296 -- 305. doi:10.1145/380752.380813.
Heule, M.J.H.; Järvisalo, M.J.; Suda, M., Eds. Proceedings of SAT Competition 2018; Solver and Benchmark
Descriptions, 2018.
Applegate, D.L.; Bixby, R.E.; Chvatal, V.; Cook, W.J. The Traveling Salesman Problem: A Computational
Study (Princeton Series in Applied Mathematics); Princeton University Press: Princeton, NJ, USA, 2007.
Mehlhorn, K.; Sanders, P. Algorithms and Data Structures: The Basic Toolbox; SpringerLink: Springer
e-Books, Springer, 2008.
Puglisi, S.J.; Smyth, W.F.; Turpin, A.H. A Taxonomy of Suffix Array Construction Algorithms. ACM
Comput. Surv. 2007, 39. doi:10.1145/1242471.1242472.
Johnson, D.S. A theoretician's guide to the experimental analysis of algorithms. Data Structures, Near
Neighbor Searches, and Methodology: Fifth and Sixth DIMACS Implementation Challenges, Proceedings of
a DIMACS Workshop, USA, 1999, 1999, pp. 215 -- 250.
Muller-Hannemann, M.; Schirra, S., Eds. Algorithm Engineering: Bridging the Gap Between Algorithm
Theory and Practice; Springer-Verlag: Berlin, Heidelberg, 2010.
Moret, B., Towards a discipline of experimental algorithmics; American Mathematical Society, 2002; pp.
197 -- 213. doi:10.1090/dimacs/059/10.
Sanders, P. Algorithm Engineering - An Attempt at a Definition Using Sorting as an Example. ALENEX.
SIAM, 2010, pp. 55 -- 61.
Bast, H.; Delling, D.; Goldberg, A.; Müller-Hannemann, M.; Pajor, T.; Sanders, P.; Wagner, D.; Werneck,
R.F. Route planning in transportation networks. In Algorithm engineering; Springer, 2016; pp. 19 -- 80.
Applegate, D.L.; Bixby, R.E.; Chvatal, V.; Cook, W.J. The traveling salesman problem: a computational
study; Princeton university press, 2006.
Brandes, U.; Robins, G.; McCranie, A.; Wasserman, S. What is network science? Network Science 2013,
1, 1 -- 15. doi:10.1017/nws.2013.2.
Newman, M. Networks; Oxford university press, 2018.
Coffin, M.; Saltzman, M.J. Statistical Analysis of Computational Tests of Algorithms and Heuristics.
INFORMS Journal on Computing 2000, 12, 24 -- 44.
Borassi, M.; Natale, E. KADABRA is an ADaptive Algorithm for Betweenness via Random Approximation.
LIPIcs-Leibniz International Proceedings in Informatics. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik,
2016, Vol. 57.
Staudt, C.L.; Sazonovs, A.; Meyerhenke, H. NetworKit: A tool suite for large-scale complex network analysis.
Network Science 2016, 4, 508 -- 530.
Boldi, P.; Vigna, S. Axioms for centrality. Internet Mathematics 2014, 10, 222 -- 262.
Freeman, L.C. A set of measures of centrality based on betweenness. Sociometry 1977, pp. 35 -- 41.
Brandes, U. A faster algorithm for betweenness centrality.
25, 163 -- 177.
Bader, D.A.; Kintali, S.; Madduri, K.; Mihail, M. Approximating betweenness centrality. International
Workshop on Algorithms and Models for the Web-Graph. Springer, 2007, pp. 124 -- 137.
Geisberger, R.; Sanders, P.; Schultes, D. Better Approximation of Betweenness Centrality. Proceedings of
the Meeting on Algorithm Engineering & Expermiments; Society for Industrial and Applied Mathematics:
Philadelphia, PA, USA, 2008; pp. 90 -- 100.
Riondato, M.; Kornaropoulos, E.M. Fast approximation of betweenness centrality through sampling. Data
Mining and Knowledge Discovery 2016, 30, 438 -- 475.
Journal of mathematical sociology 2001,
Version April 10, 2019 submitted to Algorithms
33 of 38
24.
25.
26.
27.
28.
29.
30.
31.
Riondato, M.; Upfal, E. ABRA: Approximating betweenness centrality in static and dynamic graphs with
rademacher averages. ACM Transactions on Knowledge Discovery from Data (TKDD) 2018, 12, 61.
Kunegis, J. Konect: the koblenz network collection. Proceedings of the 22nd International Conference on
World Wide Web. ACM, 2013, pp. 1343 -- 1350.
Leskovec, J.; Krevl, A. SNAP Datasets: Stanford Large Network Dataset Collection. http://snap.stanford.
edu/data, 2014.
Bader, D.; Meyerhenke, H.; Sanders, P.; Wagner, D., Eds. Proc. of the 10th DIMACS Implementation
Challenge, Contemporary Mathematics. American Mathematical Society, 2012.
Davis, T.A.; Hu, Y. The University of Florida sparse matrix collection. ACM Transactions on Mathematical
Software (TOMS) 2011, 38, 1.
Boldi, P.; Vigna, S. The WebGraph Framework I: Compression Techniques. Proc. of the Thirteenth
International World Wide Web Conference (WWW 2004); ACM Press: Manhattan, USA, 2004; pp. 595 -- 601.
Rossi, R.A.; Ahmed, N.K. An Interactive Data Repository with Visual Analytics. SIGKDD Explor. 2016,
17, 37 -- 41.
Goldenberg, A.; Zheng, A.X.; Fienberg, S.E.; Airoldi, E.M.; others. A survey of statistical network models.
Foundations and Trends R(cid:13) in Machine Learning 2010, 2, 129 -- 233.
33.
34.
35.
36.
37.
BMJ 2005, 331, 903,
Standard deviations and standard errors.
32. McGeoch, C.C.; Sanders, P.; Fleischer, R.; Cohen, P.R.; Precup, D. Using Finite Experiments to Study
Asymptotic Performance. Experimental Algorithmics, From Algorithm Design to Robust and Efficient
Software [Dagstuhl seminar, September 2000], 2000, pp. 93 -- 126.
Bernardo, J.M.; Smith, A.F. Bayesian theory; Vol. 405, John Wiley & Sons, 2009.
Altman, D.G.; Bland, J.M.
[https://www.bmj.com/content/331/7521/903.full.pdf].
Ellis, P.D. The essential guide to effect sizes: Statistical power, meta-analysis, and the interpretation of
research results; Cambridge University Press, 2010.
Cohen, J. Statistical power analysis for the behavioral sciences; Routledge, 1988.
McGeoch, C.C. A Guide to Experimental Algorithmics, 1st ed.; Cambridge University Press: New York, NY,
USA, 2012.
Rardin, R.L.; Uzsoy, R. Experimental Evaluation of Heuristic Optimization Algorithms: A Tutorial. Journal
of Heuristics 2001, 7, 261 -- 304. doi:10.1023/A:1011319115230.
Sedgewick, R. Implementing quicksort programs. Communications of the ACM 1978, 21, 847 -- 857.
Eppstein, D.; Wang, J. Fast Approximation of Centrality. Proceedings of the Twelfth Annual ACM-SIAM
Symposium on Discrete Algorithms; Society for Industrial and Applied Mathematics: Philadelphia, PA,
USA, 2001; SODA '01, pp. 228 -- 229.
James, G.; Witten, D.; Hastie, T.; Tibshirani, R. An Introduction to Statistical Learning -- with Applications
in R, 2013.
Hinton, G.E. A practical guide to training restricted Boltzmann machines. In Neural networks: Tricks of the
trade; Springer, 2012; pp. 599 -- 619.
Larochelle, H.; Erhan, D.; Courville, A.; Bergstra, J.; Bengio, Y. An empirical evaluation of deep architectures
on problems with many factors of variation. Proceedings of the 24th international conference on Machine
learning. ACM, 2007, pp. 473 -- 480.
LeCun, Y.; Bottou, L.; Bengio, Y.; Haffner, P. Gradient-based learning applied to document recognition.
Proceedings of the IEEE 1998, 86, 2278 -- 2324.
Bergamini, E.; Meyerhenke, H.; Staudt, C.L., Approximating Betweenness Centrality in Large Evolving
Networks. In 2015 Proceedings of the Seventeenth Workshop on Algorithm Engineering and Experiments
(ALENEX); SIAM, 2015; pp. 133 -- 146, [https://epubs.siam.org/doi/pdf/10.1137/1.9781611973754.12].
doi:10.1137/1.9781611973754.12.
Green, O.; McColl, R.; Bader, D.A. A Fast Algorithm for Streaming Betweenness Centrality. Proceedings
of the 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International
41.
42.
43.
44.
45.
38.
39.
40.
46.
Version April 10, 2019 submitted to Algorithms
34 of 38
Conference on Privacy, Security, Risk and Trust; IEEE Computer Society: Washington, DC, USA, 2012;
SOCIALCOM-PASSAT '12, pp. 11 -- 20. doi:10.1109/SocialCom-PASSAT.2012.37.
Kourtellis, N.; Morales, G.D.F.; Bonchi, F. Scalable Online Betweenness Centrality in Evolving Graphs.
CoRR 2014, abs/1401.6981.
Brandes, U.; Pich, C. Centrality estimation in large networks. INTL. JOURNAL OF BIFURCATION AND
CHAOS, SPECIAL ISSUE ON COMPLEX NETWORKS' STRUCTURE AND DYNAMICS, 2007.
Bader, D.; Madduri, K. Parallel Algorithms for Evaluating Centrality Indices in Real-world Networks.
Proceedings of the 2006 International Conference on Parallel Processing (ICPP '06), 2006, pp. 539 -- 550.
McLaughlin, A.; Bader, D.A. Scalable and High Performance Betweenness Centrality on the GPU. SC '14:
Proceedings of the International Conference for High Performance Computing, Networking, Storage and
Analysis, 2014, pp. 572 -- 583. doi:10.1109/SC.2014.52.
Sariyüce, A.E.; Kaya, K.; Saule, E.; Çatalyürek, U.V. Betweenness Centrality on GPUs and Heterogeneous
Architectures. Proceedings of the 6th Workshop on General Purpose Processor Using Graphics Processing
Units; ACM: New York, NY, USA, 2013; GPGPU-6, pp. 76 -- 85. doi:10.1145/2458523.2458531.
Shi, Z.; Zhang, B. Fast network centrality analysis using GPUs. BMC Bioinformatics 2011, 12, 149.
doi:10.1186/1471-2105-12-149.
Crescenzi, P.; D'Angelo, G.; Severini, L.; Velaj, Y. Greedily Improving Our Own Centrality in A Network.
Experimental Algorithms; Bampis, E., Ed.; Springer International Publishing: Cham, 2015; pp. 43 -- 55.
Hennessy, J.L.; Patterson, D.A. Computer architecture: a quantitative approach; Elsevier, 2011.
Bixby, R.E. Solving real-world linear programs: A decade and more of progress. Operations research 2002,
50, 3 -- 15.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56. Mitchell, D.W. 88.27 more on spreads and non-arithmetic means. The Mathematical Gazette 2004,
88, 142 -- 144.
Smith, J.E. Characterizing Computer Performance with a Single Number. Commun. ACM 1988,
31, 1202 -- 1206. doi:10.1145/63039.63043.
Fleming, P.J.; Wallace, J.J. How Not To Lie With Statistics: The Correct Way To Summarize Benchmark
Results. Commun. ACM 1986, 29, 218 -- 221. doi:10.1145/5666.5673.
AlGhamdi, Z.; Jamour, F.; Skiadopoulos, S.; Kalnis, P. A Benchmark for Betweenness Centrality
Approximation Algorithms on Large Graphs.
Proceedings of the 29th International Conference on
Scientific and Statistical Database Management, Chicago, IL, USA, June 27-29, 2017, 2017, pp. 6:1 -- 6:12.
doi:10.1145/3085504.3085510.
git. git. https://git-scm.com/, 2005.
GitHub. GitHub. https://github.com/, 2007.
GitLab. GitLab. https://gitlab.com/, 2011.
Bitbucket. Bitbucket. https://bitbucket.org/, 2008.
Nethercote, N.; Seward, J. Valgrind: a framework for heavyweight dynamic binary instrumentation. ACM
Sigplan notices. ACM, 2007, Vol. 42, pp. 89 -- 100.
Reinders, J. VTune performance analyzer essentials. Intel Press 2005.
Hamadi, Y.; Wintersteiger, C.M. Seven Challenges in Parallel SAT Solving. Proceedings of the Twenty-Sixth
AAAI Conference on Artificial Intelligence, 2012.
Kimmig, R.; Meyerhenke, H.; Strash, D. Shared Memory Parallel Subgraph Enumeration.
2017
IEEE International Parallel and Distributed Processing Symposium Workshops, IPDPS Workshops 2017,
Orlando / Buena Vista, FL, USA, May 29 - June 2, 2017. IEEE Computer Society, 2017, pp. 519 -- 529.
doi:10.1109/IPDPSW.2017.133.
Goldberg, D. What Every Computer Scientist Should Know About Floating-point Arithmetic. ACM
Comput. Surv. 1991, 23, 5 -- 48. doi:10.1145/103162.103163.
YAML. The YAML Project. https://yaml.org/, 2002.
(DFG), G.R.F., 2010.
JSON. JSON. https://www.json.org/index.html, 2001.
57.
58.
59.
60.
61.
62.
63.
64.
65.
66.
67.
68.
69.
70.
71.
Version April 10, 2019 submitted to Algorithms
35 of 38
72.
73.
74.
The American Statistician 1973, 27, 17 -- 21.
Anscombe, F.J. Graphs in Statistical Analysis.
doi:10.1080/00031305.1973.10478966.
Healy, K. Data Visualization: A Practical Introduction; Princeton University Press, 2018.
Sanders, P. Presenting Data from Experiments in Algorithmics. In Experimental Algorithmics; Fleischer, R.;
Moret, B.; Schmidt, E.M., Eds.; Springer-Verlag Berlin Heidelberg, 2002; Vol. 2547, LNCS, chapter 9, pp.
181 -- 196.
Tufte, E.R. The Visual Display of Quantitative Information; Graphics Press, 2001.
Munzner, T. Visualization Analyis and Design; CRC Press, 2014.
75.
76.
77. Ware, C. Information Visualization: Perception for Design, 3rd ed.; Morgan Kaufmann, 2012.
78.
Anderson, D.R.; Burnham, K.P.; Thompson, W.L. Null hypothesis testing: problems, prevalence, and an
alternative. The journal of wildlife management 2000, pp. 912 -- 923.
Trafimow, D.; Marks, M. Editorial. Basic and Applied Social Psychology 2015, 37, 1 -- 2.
79.
80. Wasserstein, R.L.; Lazar, N.A. The ASA's statement on p-values: context, process, and purpose, 2016.
81.
The New Statistics: Why and How.
Psychological Science 2014, 25, 7 -- 29,
Lash, T.L. The harm done to reproducibility by the culture of null hypothesis significance testing. American
journal of epidemiology 2017, 186, 627 -- 635.
Cumming, G.
[https://doi.org/10.1177/0956797613504966]. PMID: 24220629, doi:10.1177/0956797613504966.
Kruschke, J.K.; Liddell, T.M. The Bayesian New Statistics: Hypothesis testing, estimation, meta-analysis,
and power analysis from a Bayesian perspective. Psychonomic Bulletin & Review 2018, 25, 178 -- 206.
Murtaugh, P.A. In defense of P values. Ecology 2014, 95, 611 -- 617.
Box, G.E.P. Science and Statistics. Journal of the American Statistical Association 1976, 71, 791 -- 799.
Pólya, G. Über den zentralen Grenzwertsatz der Wahrscheinlichkeitsrechnung und das Momentenproblem.
Mathematische Zeitschrift 1920, 8, 171 -- 181.
The Equivalence of Generalized Least Squares and
Charnes, A.; Frome, E.L.; Yu, P.L.
Maximum Likelihood Estimates in the Exponential Family.
Journal of the American Statistical
Association 1976, 71, 169 -- 171, [https://www.tandfonline.com/doi/pdf/10.1080/01621459.1976.10481508].
doi:10.1080/01621459.1976.10481508.
Fisher, R.A. Statistical methods for research workers. In Breakthroughs in Statistics; Springer, 1992; pp.
66 -- 70.
Young, G.A.; Smith, R.L.; others. Essentials of statistical inference; Vol. 16, Cambridge University Press,
2005.
82.
83.
84.
85.
86.
87.
88.
89.
92.
93.
94.
95.
96.
97.
98.
99.
90. Wilcoxon, F. Individual comparisons by ranking methods. Biometrics bulletin 1945, 1, 80 -- 83.
91.
[Online;
Jones, E.; Oliphant, T.; Peterson, P.; others. SciPy: Open source scientific tools for Python, 2001 -- .
accessed <today>].
Dunn, O.J. Multiple comparisons among means. Journal of the American Statistical Association 1961,
56, 52 -- 64.
Holm, S. A Simple Sequentially Rejective Multiple Test Procedure. Scandinavian Journal of Statistics 1979,
6, 65 -- 70.
Smithson, M. Confidence Intervals; SAGE Publications, Inc., 2003.
Neyman, J. Outline of a Theory of Statistical Estimation Based on the Classical Theory of Probability. Phil.
Trans. R. Soc. Lond. A 1937, 236, 333 -- 380.
Gelman, A.; Stern, H.S.; Carlin, J.B.; Dunson, D.B.; Vehtari, A.; Rubin, D.B. Bayesian data analysis;
Chapman and Hall/CRC, 2013.
Salvatier, J.; Wiecki, T.V.; Fonnesbeck, C. Probabilistic programming in Python using PyMC3. PeerJ
Computer Science 2016, 2, e55.
Akaike, H. A new look at the statistical model identification. IEEE Transactions on Automatic Control
1974, 19, 716 -- 723. doi:10.1109/TAC.1974.1100705.
Barr, R.S. Designing and Reporting on Computational Experiments with Heuristic Methods; Technical report,
Department of Computer Science and Engineering, Southern Methodist University, 1995.
Version April 10, 2019 submitted to Algorithms
36 of 38
100. Moret, B.M.E.; Shapiro, H.D.D. Algorithms and Experiments: The New (and Old) Methodology. j-jucs
2001, 7, 434 -- 446.
101. Gent, I.P.; Grant, S.A.; MacIntyre, E.; Prosser, P.; Shaw, P.; Smith, B.M.; Walsh, T. How Not To Do It.
Research Report 97.27 (School of Computer Studies, University of Leeds) 1997.
102. McGeoch, C.C.; Moret, B.M.E. How to present a paper on experimental work with algorithms. SIGACT
News 1999, 30, 85 -- 90.
103. McGeoch, C.C. Toward an Experimental Method for Algorithm Simulation.
INFORMS Journal on
Computing 1996, 8, 1 -- 15.
104. McGeoch, C.C. Analyzing Algorithms by Simulation: Variance Reduction Techniques and Simulation
Speedups. ACM Comput. Surv. 1992, 24, 195 -- 212. doi:10.1145/130844.130853.
105. Council, N.R. Network Science; The National Academies Press: Washington, DC, 2005. doi:10.17226/11516.
106. Hanks, S.; Pollack, M.E.; Cohen, P.R. Benchmarks, Test Beds, Controlled Experimentation, and the Design
of Agent Architectures. AI Magazine 1993, 14, 17 -- 42.
107. Cohen, P.R. Empirical Methods for Artificial Intelligence; MIT Press: Cambridge, MA, USA, 1995.
108. Eckles, D.; Brian, K.; Johan, U. Design and Analysis of Experiments in Networks: Reducing Bias from
Interference. Journal of Causal Inference 2017, 5.
109. Gui, H.; Xu, Y.; Bhasin, A.; Han, J. Network A/B Testing: From Sampling to Estimation. Proceedings
of the 24th International Conference on World Wide Web; International World Wide Web Conferences
Steering Committee: Republic and Canton of Geneva, Switzerland, 2015; WWW '15, pp. 399 -- 409.
doi:10.1145/2736277.2741081.
Jensen, D.D.; Cohen, P.R. Multiple comparisons in induction algorithms. Machine Learning 2000,
38, 309 -- 338.
110.
111. Kuhn, M.; Johnson, K. Applied predictive modeling; Vol. 26, Springer, 2013.
112.
Funke, D.; Sanders, P. Parallel d-D Delaunay Triangulations in Shared and Distributed Memory. ALENEX.
SIAM, 2017, pp. 207 -- 217.
113. Booth, A.; Papaioannou, D.; Sutton, A. Systematic Approaches to a Successful Literature Review; SAGE
Publications, 2012.
114. Keshav, S. How to Read a Paper.
SIGCOMM Comput. Commun. Rev.
2007, 37, 83 -- 84.
doi:10.1145/1273445.1273458.
115. Kaijanaho, A.J. Teaching Master's Degree Students to Read Research Literature: Experience in a
Programming Languages Course 2002 -- 2017. Proceedings of the 17th Koli Calling International Conference
on Computing Education Research; ACM: New York, NY, USA, 2017; Koli Calling '17, pp. 143 -- 147.
doi:10.1145/3141880.3141893.
116. Garousi, V.; Felderer, M. Experience-based Guidelines for Effective and Efficient Data Extraction in
Systematic Reviews in Software Engineering. Proceedings of the 21st International Conference on Evaluation
and Assessment in Software Engineering; ACM: New York, NY, USA, 2017; EASE'17, pp. 170 -- 179.
doi:10.1145/3084226.3084238.
117. Brooks, A. Searching and Reviewing the Computer Science Literature: A Guide for Research Students, 1990.
118. Karger, D.R.; Stein, C. A new approach to the minimum cut problem. Journal of the ACM (JACM) 1996,
43, 601 -- 640.
119. Brandes, U.; Delling, D.; Gaertler, M.; Görke, R.; Hoefer, M.; Nikoloski, Z.; Wagner, D. On Finding Graph
Clusterings with Maximum Modularity. Proceedings of the 33rd International Conference on Graph-theoretic
Concepts in Computer Science; Springer-Verlag: Berlin, Heidelberg, 2007; WG'07, pp. 121 -- 132.
120. Hijazi, H.L.; Bonami, P.; Cornuéjols, G.; Ouorou, A. Mixed Integer NonLinear Programs featuring "On/Off"
constraints: convex analysis and applications. Electronic Notes in Discrete Mathematics 2010, 36, 1153 -- 1160.
121. Morey, R.D.; Hoekstra, R.; Rouder, J.N.; Lee, M.D.; Wagenmakers, E.J. The fallacy of placing confidence in
confidence intervals. Psychonomic bulletin & review 2016, 23, 103 -- 123.
Version April 10, 2019 submitted to Algorithms
37 of 38
122. Greenland, S.; Senn, S.J.; Rothman, K.J.; Carlin, J.B.; Poole, C.; Goodman, S.N.; Altman, D.G. Statistical
tests, P values, confidence intervals, and power: a guide to misinterpretations. European journal of
epidemiology 2016, 31, 337 -- 350.
Ioannidis, J.P. Why most published research findings are false. PLoS medicine 2005, 2, e124.
123.
124. Tukey, J.W. We Need Both Exploratory and Confirmatory.
The American Statistician
[https://amstat.tandfonline.com/doi/pdf/10.1080/00031305.1980.10482706].
1980,
doi:10.1080/00031305.1980.10482706.
23 -- 25,
34,
125. Amdahl, G.M. Validity of the single processor approach to achieving large scale computing capabilities.
Proceedings of the April 18-20, 1967, spring joint computer conference. ACM, 1967, pp. 483 -- 485.
126. Gustafson, J.L. Reevaluating Amdahl's law. Communications of the ACM 1988, 31, 532 -- 533.
127.
Shi, Y. Reevaluating Amdahl's law and Gustafson's law. Computer Sciences Department, Temple University
(MS: 38-24) 1996.
128. Costa, L.d.F.; Rodrigues, F.A.; Travieso, G.; Villas Boas, P.R. Characterization of complex networks: A
survey of measurements. Advances in physics 2007, 56, 167 -- 242.
129. Kim, J.; Wilhelm, T. What is a complex graph? Physica A: Statistical Mechanics and its Applications 2008,
387, 2637 -- 2652.
130. Boccaletti, S.; Latora, V.; Moreno, Y.; Chavez, M.; Hwang, D.U. Complex networks: Structure and dynamics.
Physics reports 2006, 424, 175 -- 308.
131. Watts, D.J.; Strogatz, S.H. Collective dynamics of 'small-world'networks. nature 1998, 393, 440.
132. Barabási, A.L.; Albert, R. Emergence of scaling in random networks. science 1999, 286, 509 -- 512.
133. Newman, M.E. Assortative mixing in networks. Physical review letters 2002, 89, 208701.
134. Milo, R.; Shen-Orr, S.; Itzkovitz, S.; Kashtan, N.; Chklovskii, D.; Alon, U. Network motifs: simple building
blocks of complex networks. Science 2002, 298, 824 -- 827.
135. Newman, M.E. Modularity and community structure in networks. Proceedings of the national academy of
sciences 2006, 103, 8577 -- 8582.
136. Barabási, A.L.; Bonabeau, E. Scale-free networks. Scientific american 2003, 288, 60 -- 69.
137. Amaral, L.A.N.; Scala, A.; Barthelemy, M.; Stanley, H.E. Classes of small-world networks. Proceedings of
the national academy of sciences 2000, 97, 11149 -- 11152.
Sedgewick, R. The analysis of quicksort programs. Acta Informatica 1977, 7, 327 -- 355.
138.
139. Easley, D.; Kleinberg, J. Networks, crowds, and markets: Reasoning about a highly connected world;
Cambridge University Press, 2010.
140. Bavelas, A. A mathematical model for group structures. Applied anthropology 1948, 7, 16 -- 30.
141.
Shimbel, A. Structural parameters of communication networks. The bulletin of mathematical biophysics
1953, 15, 501 -- 507.
Shaw, M.E. Group structure and the behavior of individuals in small groups. The Journal of psychology
1954, 38, 139 -- 149.
142.
143. Cohn, B.S.; Marriott, M. Networks and centres of integration in Indian civilization. Journal of social
Research 1958, 1, 1 -- 9.
144. Borgatti, S.P.; Everett, M.G. A graph-theoretic perspective on centrality. Social networks 2006, 28, 466 -- 484.
145. Chung, F.; Chung, F.R.; Graham, F.C.; Lu, L.; Chung, K.F.; others. Complex graphs and networks;
146.
American Mathematical Soc., 2006.
Lü, J.; Chen, G.; Ogorzalek, M.J.; Trajković, L. Theory and applications of complex networks: Advances
and challenges. Circuits and Systems (ISCAS), 2013 IEEE International Symposium on. IEEE, 2013, pp.
2291 -- 2294.
147. Clauset, A.; Shalizi, C.R.; Newman, M.E. Power-law distributions in empirical data. SIAM review 2009,
148.
51, 661 -- 703.
Fan, R.; Xu, K.; Zhao, J. A GPU-Based Solution to Fast Calculation of Betweenness Centrality on Large
Weighted Networks. PeerJ Computer Science 2017, 3.
Version April 10, 2019 submitted to Algorithms
38 of 38
149. D'Angelo, G.; Severini, L.; Velaj, Y. On the Maximum Betweenness Improvement Problem. Electronic
Notes in Theoretical Computer Science 2016, 322, 153 -- 168. Proceedings of ICTCS 2015, the 16th Italian
Conference on Theoretical Computer Science, doi:https://doi.org/10.1016/j.entcs.2016.03.011.
Jacob, R.; Koschützki, D.; Lehmann, K.A.; Peeters, L.; Tenfelde-Podehl, D., Algorithms for Centrality
Indices. In Network Analysis: Methodological Foundations; Springer Berlin Heidelberg: Berlin, Heidelberg,
2005; pp. 62 -- 82. doi:10.1007/978-3-540-31955-9_4.
150.
151. Hong, C.T.; Chen, D.H.; Chen, Y.B.; Chen, W.G.; Zheng, W.M.; Lin, H.B. Providing Source Code Level
Portability Between CPU and GPU with MapCG. Journal of Computer Science and Technology 2012,
27, 42 -- 56. doi:10.1007/s11390-012-1205-4.
152. Hayashi, T.; Akiba, T.; Yoshida, Y. Fully Dynamic Betweenness Centrality Maintenance on Massive Networks.
Proc. VLDB Endow. 2015, 9, 48 -- 59. doi:10.14778/2850578.2850580.
153. Nemhauser, G.L.; Wolsey, L.A. Best algorithms for approximating the maximum of a submodular set
function. Mathematics of operations research 1978, 3, 177 -- 188.
154. Chacon, S.; Straub, B. Pro Git, 2nd ed.; Apress: Berkely, CA, USA, 2014.
155. R Core Team. R-project. https://www.r-project.org/, 1993.
156. R Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical
Computing, Vienna, Austria, 2012. ISBN 3-900051-07-0.
157. Williams, T.; Kelley, C. gnuplot. https://www.r-project.org/, 1986.
158. Hunter, J.D. Matplotlib: A 2D graphics environment. Computing In Science & Engineering 2007, 9, 90 -- 95.
doi:10.1109/MCSE.2007.55.
159. The MathWorks, Inc.. Matlab 8.0. https://www.mathworks.com/products/matlab.html, 1984.
160. Cox, D.R. Principles of statistical inference; Cambridge university press, 2006.
161. Cox, N.J. Stata tip 96: Cube roots. Stata Journal 2011, 11, 149 -- 154(6).
162. Demsar, J. Statistical Comparisons of Classifiers over Multiple Data Sets. Journal of Machine Learning
Research 2006, 7, 1 -- 30.
163. García, S.; Fernández, A.; Luengo, J.; Herrera, F. Advanced nonparametric tests for multiple comparisons in
the design of experiments in computational intelligence and data mining: Experimental analysis of power.
Inf. Sci. 2010, 180, 2044 -- 2064. doi:10.1016/j.ins.2009.12.010.
164. Garcia, S.; Herrera, F. An extension on"statistical comparisons of classifiers over multiple data sets"for all
pairwise comparisons. Journal of Machine Learning Research 2008, 9, 2677 -- 2694.
165. Knuth, D.E. The art of computer programming; Vol. 3, Pearson Education, 1997.
c(cid:13) 2019 by the authors. Submitted to Algorithms for possible open access publication under the terms and
conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
|
1708.05569 | 2 | 1708 | 2018-09-12T10:38:07 | Community detection in networks via nonlinear modularity eigenvectors | [
"cs.SI",
"math.OC",
"stat.ML"
] | Revealing a community structure in a network or dataset is a central problem arising in many scientific areas. The modularity function $Q$ is an established measure quantifying the quality of a community, being identified as a set of nodes having high modularity. In our terminology, a set of nodes with positive modularity is called a \textit{module} and a set that maximizes $Q$ is thus called \textit{leading module}. Finding a leading module in a network is an important task, however the dimension of real-world problems makes the maximization of $Q$ unfeasible. This poses the need of approximation techniques which are typically based on a linear relaxation of $Q$, induced by the spectrum of the modularity matrix $M$. In this work we propose a nonlinear relaxation which is instead based on the spectrum of a nonlinear modularity operator $\mathcal M$. We show that extremal eigenvalues of $\mathcal M$ provide an exact relaxation of the modularity measure $Q$, however at the price of being more challenging to be computed than those of $M$. Thus we extend the work made on nonlinear Laplacians, by proposing a computational scheme, named \textit{generalized RatioDCA}, to address such extremal eigenvalues. We show monotonic ascent and convergence of the method. We finally apply the new method to several synthetic and real-world data sets, showing both effectiveness of the model and performance of the method. | cs.SI | cs |
COMMUNITY DETECTION IN NETWORKS VIA NONLINEAR
MODULARITY EIGENVECTORS ∗
FRANCESCO TUDISCO†, PEDRO MERCADO‡, AND MATTHIAS HEIN‡
Abstract. Revealing a community structure in a network or dataset is a central problem arising
in many scientific areas. The modularity function Q is an established measure quantifying the quality
of a community, being identified as a set of nodes having high modularity. In our terminology, a set of
nodes with positive modularity is called a module and a set that maximizes Q is thus called leading
module. Finding a leading module in a network is an important task, however the dimension of
real-world problems makes the maximization of Q unfeasible. This poses the need of approximation
techniques which are typically based on a linear relaxation of Q, induced by the spectrum of the
modularity matrix M. In this work we propose a nonlinear relaxation which is instead based on
the spectrum of a nonlinear modularity operator M. We show that extremal eigenvalues of M
provide an exact relaxation of the modularity measure Q, in the sense that the maximum eigenvalue
of M is equal to the maximum value of Q, however at the price of being more challenging to be
computed than those of M. Thus we extend the work made on nonlinear Laplacians, by proposing
a computational scheme, named generalized RatioDCA, to address such extremal eigenvalues. We
show monotonic ascent and convergence of the method. We finally apply the new method to several
synthetic and real-world data sets, showing both effectiveness of the model and performance of the
method.
Key words. Community detection, graph modularity, spectral partitioning, nonlinear eigenval-
ues, Cheeger inequality.
AMS subject classifications. 05C50, 05C70, 47H30, 68R10
1. Introduction. This paper is concerned with the problem of finding leading
communities in a network. A community is roughly defined as a set of nodes being
highly connected inside and poorly connected with the rest of the graph. Identifying
important communities in a complex network is a highly relevant problem which has
applications in many disciplines, such as computer science, physics, neuroscience,
social science, biology, and many others, see e.g. [19, 43, 51, 54].
In order to address this problem from the mathematical point of view one needs
a quantitative definition of what a community is. To this end several merit functions
have been introduced in the recent literature [24]. A very popular and successful idea
is based on the concept of modularity introduced by Newman and Girvan in [44].
The modularity measure of a set of nodes A in a graph G = (V, E) quantifies the
difference between the actual and expected weight of edges in A, if edges were placed
at random according to a random null model. A subgraph G(A) is then identified as
a community if the modularity measure of A is "large enough".
The modularity-based community detection problem thus boils down to a combi-
natorial optimization problem, that is reminiscent of another famous task known as
graph partitioning. Graph partitioning can be roughly described as the problem of
finding a k-partition of the set of vertices of G, where k is a given number of disjoint
sets to be identified.
Modularity-based community detection does not prescribe the number of subsets
∗
of F.T. has been partially supported by the Marie Curie Individual Fellowship MAGNET.
Funding: The work of the authors has been supported by the ERC grant NOLEPRO. The work
†Department of Mathematics and Statistics, University of Strathclyde, G11XH Glasgow, UK
‡Department of Mathematics and Computer Science, Saarland University, 66123 Saarbrücken,
([email protected])
Germany ([email protected], [email protected])
1
2
into which the network is divided, and it is generally assumed that the graph is
intrinsically structured into groups that are delimited to some extent. The main
objective is to reveal the presence and the consistency of such groups.
As modularity-based community detection is known to be NP-hard [7], different
strategies have been proposed to compute an approximate solution. Linear relaxation
approaches are based on the spectrum of specific matrices (as the modularity matrix
or the Laplacian matrix) and have been been widely explored and applied to various
research areas, see e.g. [21, 40, 41, 52]. Computational heuristics have been developed
for optimizing directly the discrete quality function (see e.g. [36, 45]), including for
example greedy algorithms [14], simulated annealing [28] and extremal optimization
[18]. Among them, the locally greedy algorithm known as Louvain method [5] is
arguably the most popular one. In recent years, and mostly in the context of graph
partitioning, nonlinear relaxation approaches have been proposed (see for instance
[8,9,29,56]). In the context of community detection, a nonlinear relaxation based on
the Ginzburg-Landau functional is considered for instance in [6,32], where it is shown
to be Γ-convergent to the discrete modularity optimum.
In this paper, we propose two nonlinear relaxations of different modularity set
functions, and prove them to be exact, in the sense that the maximum values of
our proposed nonlinear relaxations are equal to the maximum of the corresponding
modularity set functions. More precisely, we introduce two nonlinear relaxations that
are based on a nonlinear modularity operator M : Rn → Rn. We associate to M
two different Rayleigh quotients, inducing two different notions of eigenvalues and
eigenvectors of M and we prove two Cheeger-type results for M that show that the
maximal eigenvalues of M associated to such Rayleigh quotients coincide with the
maxima of two different modularity measures of the graph. Interestingly enough we
observe that the modularity matrix completely overlooks the difference between these
two modularity measures, which instead M allows to address individually.
Although nonlinearity generally prevents us to compute the eigenvalues of M,
the optimization framework proposed in [30] allows for an algorithm addressing the
minimization of positive valued Rayleigh quotients. As the Rayleigh quotients we
associate to M attain positive and negative values, here we extend that method to
a wider class of ratios of functions, proving monotonic descent and convergence to a
nonlinear eigenvector.
The paper is organized as follows: Section 2 gives an overview of the concept of
modularity measure, modularity matrix and the Newman's spectral method for com-
munity detection, as proposed in [44]. In Section 3 we define the nonlinear modularity
operator M and the associated Rayleigh and dual Rayleigh quotients. We show that
both ensure an exact relaxation of suitable modularity-based combinatorial optimiza-
tion problems on the graph. In Section 4 we propose a nonlinear spectral method for
community detection in networks through the eigenvectors of the nonlinear modular-
ity and, finally, in Section 5 we show extensive results on synthetic and real-world
networks highlighting the improvements that nonlinearity ensures over the standard
linear relaxation approach.
1.1. Notation. Throughout this paper we assume that an undirected graph
G = (V, E) is given, with the following properties: V is the vertex set equipped with
the positive measure µ : V → R+; E is the edge set equipped with positive weight
function w : E → R+. The symbol R+ denotes the set of positive numbers. The
vertex set V is everywhere identified with {1, . . . , n}. We denote by (cid:104)·,·(cid:105)µ the weighted
i µixip be
scalar product (cid:104)x, y(cid:105)µ =(cid:80)
i µixiyi. Similarly, for p ≥ 1 we let (cid:107)x(cid:107)p
p,µ =(cid:80)
3
(cid:88)
i∈A
(cid:88)
the weighted (cid:96)p norm on V .
Given two subsets A, B ⊆ V , the set of edges between nodes in A and B is denoted
by E(A, B). When A and B coincide we use the short notation E(A). The overall
weight of a set is the sum of the weights in the set, thus for A, B ⊆ V , we write
µ(A) =
µi,
w(E(A, B)) =
w(ij) .
w(E({i}, V )) = di is the degree of the node i, and w(E(A, V )) = vol(A) =(cid:80)
Special notations are reserved to the case where B is the whole vertex set. Precisely,
i∈A di
For a subset A ⊆ V we write A to denote the complement V \ A and we let
the volume of the set A.
1A ∈ Rn be the characteristic vector (1A)i = 1 if i ∈ A and (1A)i = 0 otherwise.
ij∈E(A,B)
2. Modularity measure. A central problem in graph mining is to look for
quantitative definitions of community. Although there is no universally accepted
definition and a variety of merit functions have been proposed in recent literature,
the global definition based on the modularity quality function proposed by Newman
and Girvan [44] is an effective and very popular one [24]. Such measure is based
on the assumption that A ⊆ V is a community of nodes if the induced subgraph
G(A) = (A, E(A)) contains more edges than expected, if edges were placed at random
according to a random graph model G0 (also called null-model).
Let G0 = (V0, E0) be the expected graph of the random ensemble G0, with weight
measure w0 : E0 → R+. The definition of modularity Q(A) of A ⊆ V , is as follows
(1)
Q(A) = w(E(A)) − w0(E0(A)) ,
so that Q(A) > 0 if the actual weight of edges in G(A) exceeds the expected one
in G0(A). A set of nodes A is a community if it has positive modularity, and the
associated subgraph G(A) is called a module. A number of different null-models
and variants of the modularity measure have been considered in recent literature, see
e.g. [2, 22, 47, 50].
An alternative formulation relates with a normalized version of the modularity,
where the measure µ(A) of the set A is used as a balancing function, for different
choices of the measure µ. We define the normalized modularity Qµ(A) of A ⊆ V as
follows
(2)
Qµ(A) = Q(A)/µ(A) .
As we discuss in Section 5, the use of such normalized version can help to identify
small group of nodes as important communities in the graph, whereas it is known
that the standard (unnormalized) measure tends to overlook small groups [25].
The definition of modularity of a subset is naturally extended to the measure of
the modularity of a partition of G, by simply looking at the sum of the modularities:
given a partition {A1, . . . , Ak} of V , its modularity and normalized modularity are
defined respectively by
q(A1, . . . , Ak) =
Q(Ai),
and
qµ(A1, . . . , Ak) =
Qµ(Ai) .
Clearly the normalization factor 1/µ(V ) does not affect the community structure and
is considered here for compatibility with previous works. When the partition consists
k(cid:88)
1
µ(V )
i=1
k(cid:88)
i=1
4
of only two sets {A, A} we use the shorter notation q(A) and qµ(A) for q(A, A) and
qµ(A, A), respectively.
The definition and effectiveness of the modularity measure (1) highly depends
on the chosen random model G0. A very popular and successful one, considered
originally by Newman and Girvan in [44], is based on the Chung-Lu random graph
(see f.i. [1, 12, 46]) and its weighted variant [21]. For the sake of completeness, we
recall hereafter the definition of weighted Chung-Lu model.
i=1 δi.
Definition 2.1. Let δ = (δ1, . . . , δn)T > 0, and let X(p) be a nonnegative ran-
dom variable parametrized by the scalar parameter p ∈ [0, 1], whose expectation is
E(X(p)) = p. We say that a graph G = (V, E) with weight function w follows the
X-weighted Chung-Lu random graph model G(δ, X) if, for all i, j ∈ V , w(ij) are
independent random variables distributed as X(pij) where pij = δiδj/(cid:80)n
The unweighted model coincides with the special case of G(δ, X) where X(p) is the
Bernoulli trial with success probability p. On the other hand, if X(p) has a continuous
part, then G(δ, X) may contain graphs with generic weighted edges. In any case, as
in the original Chung-Lu model, if G is a random graph drawn from G(δ, X) then the
expected degree of node i is E(di) = δi.
Given the degree sequence d = (d1, . . . , dn) of the actual network G = (V, E), we
assume from now on that the null-model G0 follows the weighted Chung-Lu random
graph model G(δ, X) above, with δ = d. Note that, under this assumption, the
modularity measure (1) becomes Q(A) = w(E(A)) − vol(A)2/vol(V ) and we have, in
particular, Q(A) = Q(A), for any A ⊆ V .
The main contributions we propose in this work deal with the leading module
problem, that is the problem of finding a subset A ⊆ V having maximal modularity.
Due to the identity Q(A) = Q(A), such problem coincides with finding the bi-partition
{A, A} of the vertex set, having maximal modularity. Note that, for the special case
of partitions consisting of two sets, the corresponding modularity and normalized
modularity set functions are
(3)
q(A) =
2
µ(V )
Q(A),
and
qµ(A) = µ(V )
Q(A)
µ(A)µ(A)
.
2.1. The modularity matrix and the spectral method. Looking for a lead-
ing module is a major task in community detection which coincides with the discovery
of an optimal bi-partition of G into communities, in terms of modularity. This problem
is equivalent to maximizing the modularity and normalized modularity through the
set functions q and qµ, respectively, over the possible subsets of V , namely computing
the quantities
(4)
q(G) = max
A⊆V
q(A),
qµ(G) = max
A⊆V
qµ(A) .
As both q(G) and qµ(G) are NP-hard optimization problems [7], a globally optimal
solution for large graphs is out of reach. One of the best known techniques for an
approximate solution to these problems -- typically referred to as "spectral method" --
relates with the modularity matrix, and its leading eigenpair. Let d be the vector of
the degrees of the graph, the normalized modularity matrix of G, with vertex measure
µ, is defined as follows
(cid:18)
(cid:19)
(M )ij =
1
µi
w(ij) − didj
vol(V )
,
for i, j = 1, . . . , n .
5
√
Note that the term didj/vol(V ) is the (i, j) entry of the one-rank adjacency matrix
of the expected graph of a random ensemble following the weighted Chung-Lu random
model.
eigenvalue λ1(M ). It is proved in [22] that if (cid:101)d = (d1/
The spectral method roughly selects a bi-partition of the vertex set V accordingly
with the sign of the elements in an eigenvector x of M, associated with its largest
µn) is not an
eigenvector of M, then λ1(M ) is a simple eigenvalue and thus x is uniquely defined.
If λ1(M ) > 0, one computes x such that M x = λ1(M )x, then the vertex set V is
partitioned into A+ = {i ∈ V : xi ≥ t∗} and A+, being t∗ = arg maxt q({i ∈ V :
ui ≥ t}). If λ1(M ) = 0, the graph is said algebraically indivisible, i.e. it resembles
no community structure (see e.g. [21,41]). The motivations behind this technique are
based on a relaxation argument, that we discuss in what follows.
√
µ1, . . . , dn/
The Rayleigh quotient of M is the real valued function
rM (x) =
(cid:104)x, M x(cid:105)µ
(cid:107)x(cid:107)2
2,µ
.
As the matrix M is symmetric with respect the weighted scalar product (cid:104)·,·(cid:105)µ, its
eigenvalues can be characterized as variational values of rM.
In particular, if the
eigenvalues of M are enumerated in descending order, then λ1(M ) is the global max-
imum of rM,
(5)
λ1(M ) = max
x∈Rn
rM (x) .
The quantity q(G) can be rewritten in terms of rM, thus in terms of M. Consider
the binary vector vA = 1A − 1A. Using the identities 1A = 1 − 1A, M1 = 0 and
(cid:107)vA(cid:107)2
2,µ = µ(V ), we get (cid:104)vA, M vA(cid:105)µ = 4Q(A), thus
(6)
q(G) = max
A⊆V
2 Q(A)
µ(V )
=
1
2
max
A⊆V
rM (vA) =
1
2
max
x∈{−1,1}n
rM (x) .
Computing the global optimum of rM over {−1, 1}n is NP-hard. However, this max-
imum can be approximated by dropping the binary constraint on x and, thus, trans-
forming the problem into the eigenvalue problem (5), which can be easily solved. This
observation is one of the main motivations of the spectral method based on the mod-
ularity matrix M and its largest eigenvalue λ1(M ), whereas the main drawback of
this approach is that, in general, the eigenvalue λ1(M ) can arbitrary differ from the
actual modularity q(G).
From Equation (6) we can see that rM coincides with q when evaluated on binary
vectors x ∈ {−1, 1}n. For this reason and the fact that maxx∈Rn rM (x) coincides with
an eigenvalue of the linear operator M we say that rM is a linear relaxation of q.
Before concluding this section we would like to point out another drawback of the
linear relaxation approach which, to our opinion, is often overlooked: as we will show
in Section 5, the solutions of q(G) and qµ(G) are in general far from being the same,
however the linear relaxation approach in principle ignores such difference. In fact, the
linear relaxation rM of the modularity set function q is also a linear relaxation of the
normalized modularity set function qµ. We show such observation via the following
Proposition 2.2. If the largest eigenvalue λ1(M ) of M is positive, then rM is a
linear relaxation of both q and qµ.
6
Proof. We already observed that rM coincides with q on the set of binary vectors
x ∈ {−1, 1}n. A similar simple argument is used for qµ. Consider the vector wA =
1A − µ(A)
µ(V ) 1. Since µ(A) = µ(V ) − µ(A) we get (cid:107)wA(cid:107)2
and rM (wA) =
qµ(A, A). Note that (cid:104)wA, 1(cid:105)µ = 0, thus
2,µ = µ(A)µ(A)
µ(V )
µ(V ) Q(A)
µ(A) µ(A)
max
rM (x) .
= max
A⊆V
rM (wA) =
qµ(G) = max
A⊆V
x∈{−a,b}n, (cid:104)x,1(cid:105)µ=0
(7)
Therefore, rM and qµ coincide on the set of binary vectors x ∈ {−a, b}n such that
(cid:104)x, 1(cid:105)µ = 0 (for suitable a, b > 0). As M has a positive eigenvalue by assumption,
dropping the binary constraint x ∈ {−a, b}n and recalling that 1 ∈ ker(M ), we get
maxx∈Rn, (cid:104)x,1(cid:105)µ=0 rM (x) = maxx∈Rn rM (x) = λ1(M ).
3. Tight nonlinear modularity relaxation. In this section we introduce a
nonlinear modularity operator M, through a natural generalization of the modularity
matrix M. To this operator we associate a Rayleigh quotient and a dual Rayleigh
quotient to which naturally correspond a notion of nonlinear eigenvalues and eigen-
vectors. We use the new Rayleigh quotients to derive nonlinear relaxations of the
modularity q and the normalized modularity qµ set functions, respectively. Moreover,
unlike the standard linear relaxation, we show that such relaxations are tight, that is
we prove a Cheeger-type result showing that certain eigenvalues of M coincide with
the graph modularities (4).
3.1. Nonlinear modularity operator. The nonlinear modularity operator we
are going to define is related with the Clarke's subdifferential ∂ (see [13] e.g.). We
recall that, for f : Rn → R Lipschitz around x ∈ Rn, the subdifferential of f at x is
defined as the following subset of Rn
f (z + tv) − f (z)
y ∈ Rn : (cid:104)y, v(cid:105) ≤ lim sup
z→x,t→0
∂f (x) =
The subdifferential of the one norm f (x) = (cid:107)x(cid:107)1 and the infinity norm f (x) =
(cid:107)x(cid:107)∞ are of particular importance of us. For these particular functions explicit ex-
pressions for ∂f (x) are available. We recall them below in (8) and (13), respectively.
As the absolute value is not differentiable at zero, the subdifferential of the 1-norm
t
,
.
for all v ∈ Rn
(cid:27)
(cid:26)
(cid:26)
(cid:27)
is the set valued map Φ defined by
yi = sign(xi) if xi (cid:54)= 0,
yi ∈ [−1, 1] if xi = 0
x (cid:55)→ Φ(x) =
y ∈ Rn :
(8)
where sign(xi) = 1 if xi > 0 and sign(xi) = −1 if xi < 0. Note that if y ∈ Φ(x)
then any component of y belongs to the image of the corresponding component of x.
Precisely, y ∈ Φ(x) if and only if yi ∈ Φ(xi) for all i = 1, . . . , n.
In order to define the nonlinear modularity operator, let us first observe that, due
j=1 Mij = 0, for i = 1, . . . , n, the following formula holds for the
to the identity (cid:80)n
,
modularity matrix M:
(M x)i =
Mijxj − xi
Mij =
(−M )ij(xi − xj) .
This implies the following identity
(9)
(cid:104)x, M x(cid:105)µ =
µi(−M )ijxi(xi − xj) =
µi(−M )ijxi − xj2 ,
n(cid:88)
n(cid:88)
j=1
i,j=1
n(cid:88)
j=1
n(cid:88)
n(cid:88)
j=1
1
2
i,j=1
for any x ∈ Rn. Thus we define the nonlinear modularity operator as follows:
(10)
M(x)i =
(−M )ijΦ(xi − xj),
i = 1, . . . , n .
n(cid:88)
j=1
7
Note that, by definition, for any y ∈ M(x) we have
(11)
(cid:104)x, y(cid:105)µ =
1
2
µi(−M )ijxi − xj .
n(cid:88)
i,j=1
n(cid:88)
Since the right-hand side of (11) does not depend on the choice of the vector
y ∈ M(x), we write (cid:104)x,M(x)(cid:105)µ to denote the quantity in (11), in analogy with (9).
Note that (cid:104)x,M(x)(cid:105)µ and (cid:104)x, M (x)(cid:105)µ coincide on binary vectors, for instance when
x ∈ {−1, 1}n. Also note that (cid:104)x,M(x)(cid:105)µ is strictly related with the total variation
of the vector x. More precisely, (cid:104)x,M(x)(cid:105)µ is the difference of two weighted total
variations of x, as we will discuss with more detail in Section 3.4. For completeness,
we recall that the weighted total variation of x ∈ Rn is the scalar function
xρ
T V =
ρ(i, j)xi − xj ,
where ρ(i, j) ≥ 0 are the nonnegative weights.
We now consider two Rayleigh quotients associated with M(x), defined as follows
i,j=1
rM(x) =
(cid:104)x,M(x)(cid:105)µ
(cid:107)x(cid:107)1,µ
,
r∗
M(x) =
(cid:104)x,M(x)(cid:105)µ
(cid:107)x(cid:107)∞
,
(12)
where (cid:107)x(cid:107)1,µ =(cid:80)
i µixi and (cid:107)x(cid:107)∞ = maxi xi. The functions rM and r∗
M generalize
the Rayleigh quotient rM of the linear modularity, and we will show in the next section
that the global maxima of r∗
M and rM provide an exact nonlinear relaxation of the
modularity q and normalized modularity qµ set functions, defined in (3), respectively.
Here we show that the optimality conditions for rM and r∗
M are related to a notion
of eigenvalues and eigenvectors for the nonlinear modularity operator M. We also
briefly discuss the underlying mathematical reason why rM naturally generalizes into
rM and r∗
M.
3.2. Nonlinear modularity eigenvectors. As for the 1-norm, we consider the
subdifferential Ψ of the infinity norm x (cid:55)→ (cid:107)x(cid:107)∞. For a vector x ∈ Rn, let m1, . . . , mk
be the indices such that xmi = (cid:107)x(cid:107)∞, then the subdifferential of the infinity norm
is the set valued map Ψ defined by
(13)
x (cid:55)→ Ψ(x) = Conv{σ11m1, . . . , σk1mk} ,
where, for i = 1, . . . , k, σi = sign(xmi) and Conv denotes the convex hull.
of M
To the subdifferentials Φ and Ψ correspond a notion of eigenvalue and eigenvector
Definition 3.1. We say that λ is a nonlinear eigenvalue of M with eigenvector
x if either 0 ∈ M(x) − λΦ(x) or 0 ∈ M(x) − λΨ(x).
We have
8
Proposition 3.2. Let x be a critical point of rM, then x is a nonlinear eigen-
vector of M such that 0 ∈ M(x)− λΦ(x) with λ = rM(x). Similarly, if x is a critical
M, then x is a nonlinear eigenvector of M such that 0 ∈ M(x) − λΨ(x)
point of r∗
with λ = r∗
M(x).
Proof. Let ∂ denote the subdifferential. A direct inspection reveals that ∂(cid:107)x(cid:107)1,µ =
DµΦ(x), where Dµ is the diagonal matrix (Dµ)i = µi and Φ(x) is the vector with
components Φ(x)i = Φ(xi). Using the chain rule for ∂ (see e.g. [13]) we get
(cid:8)(cid:107)x(cid:107)1,µ ∂ (cid:104)x,M(x)(cid:105)µ − (cid:104)x,M(x)(cid:105)µ ∂(cid:107)x(cid:107)1,µ
(cid:8)DµM(x) − rM(x) DµΦ(x)(cid:9)
(cid:9)
∂ rM(x) ⊆ 1
(cid:107)x(cid:107)2
1,µ
1
=
(cid:107)x(cid:107)1,µ
M.
Therefore 0 ∈ ∂ rM(x) implies 0 ∈ M(x) − rM(x) Φ(x). As ∂(cid:107)x(cid:107)∞ = Ψ(x), a similar
computation shows the proof for r∗
Thus critical points and critical values of rM and r∗
M satisfy generalized eigenvalue
equations for the nonlinear modularity operator M. Despite the linear case, where
the eigenvalues of the modularity matrix M coincide with the variational values of rM,
the number of eigenvalues of M defined by means of the Rayleigh quotients in (12)
is much larger than just the set of variational ones. However in many situations the
variational spectrum plays a central role, as for instance in the case of the nonlinear
Laplacian [11, 17, 55]. This work provides a further example:
in what follows we
consider the dominant eigenvalues of M, coinciding with suitable variational values
of rM and r∗
M, we prove two optimality Cheeger-type results and we discuss how
to use these eigenvalues to locate a leading module in the network by means of a
nonlinear spectral method. The task of multiple community detection can also be
addressed by successive bi-partitions, as we discuss in Section 5.3. Advantages of
the nonlinear spectral method over the linear one are highlighted Section 5 where
extensive numerical results are shown.
3.3. On the relation between r∗
M, rM and rM. We briefly discuss the math-
ematical reason why rM generalizes into rM and r∗
M. This gives further reason-
ing to the definition in (12). To this end we suppose for simplicity that µi = 1.
Therefore (−M )ij = didj/vol(V ) − w(ij) for all i, j = 1, . . . , n. Given the graph
G = (V, E), consider the linear difference operator B : Rn → RE entrywise defined
by (Bx)ij = xi − xj, ij ∈ E, and let wM : E → R be the real valued function
wM (ij) = (−M )ij/2. Then we can write
(cid:104)x, M x(cid:105)µ = (cid:104)Bx, Bx(cid:105)wM
= (cid:107)Bx(cid:107)2
2,wM
=
wM (ij)(Bx)2
ij ,
(cid:88)
ij∈E
where we use the compact notation (cid:107)·(cid:107)2,wM , even though that quantity is not a norm
on RE, as wM attains positive and negative values. We have, as a consequence,
rM (x) = ((cid:107)Bx(cid:107)2,wM /(cid:107)x(cid:107)2)2. A natural generalization of such quantity is therefore
given by
(cid:18)(cid:107)Bx(cid:107)p,wM
(cid:19)p
(cid:107)x(cid:107)p
rp(x) =
,
where, for p ≥ 1 and z ∈ RE, we are using the notation (cid:107)z(cid:107)p
ij wM (ij)zijp.
Clearly rM is retrieved from rp for p = 2. Now, let p∗ be the Hölder conjugate of p,
that is the solution of the equation 1/p + 1/p∗ = 1. As 2∗ = 2, the quantity rM (x) is
p,wM
=(cid:80)
9
q
exact,
nonlinear
approximate, linear
r∗
M
p = 1
r∗
p
rM
p = 2
a p p r o x i m a t e ,
i n e a r
l
qµ
exact,
nonlinear
rM
rp
p = 1
Fig. 1. This diagram summarizes how the relaxation functions rp and r∗
p (for p = 1, 2) are
related with q and qµ and which are their main properties.
p(x) = ((cid:107)Bx(cid:107)p,wM /(cid:107)x(cid:107)p∗ )p as well. The Rayleigh quotients
in fact a special case of r∗
in (12) are obtained by plugging p = 1 into rp and r∗
p, respectively. Even though in
this work we shall focus only on the case p = 1, we believe that further investigations
on rp and r∗
p for different values of p would be of significant interest. Figure 1 outlines
this observation and the relation between the set valued functions q and qµ and the
Rayleigh quotients rp and r∗
p, for the specific values p = 1, 2. The next section gives
further detail in this sense.
3.4. Exact relaxation via nonlinear Rayleigh quotients. From (6) and
Proposition 2.2 we deduce that the leading eigenvalue λ1(M ) of the modularity ma-
trix M is an upper bound for both the quantities q(G) and qµ(G). This intuitively
motivates the use of such eigenvalue and the corresponding eigenvectors to approxi-
mate the modularity of the graph. However λ1(M ) is an approximation that can be
arbitrarily far from the true value of the modularity. In particular, when µ = d is the
degree vector, a Cheeger-type inequality showing a lower bound for qµ(G) in terms
of λ1(M ) has been shown in [23], whereas a lower bound for q(G) is known only for
regular graphs [21], the general case being still an open problem.
In what follows we show that moving from the linear to the nonlinear modularity
operator, allows to shrink the distance between the combinatorial quantities q(G)
and qµ(G) defined in (4) and the spectrum of M. More precisely, we show that
the new Rayleigh quotients r∗
M and rM, as for rM, coincide with the modularity
and normalized modularity functions q and qµ, respectively, on suitable set of binary
vectors. However, unlike the linear case, we prove that the quantities
(14)
λ1(r∗
M) = max
x∈Rn
r∗
M(x),
λ⊥
1 (rM) =
max
x∈Rn, (cid:104)x,1(cid:105)µ=0
rM(x)
coincide exactly with the modularity q(G) and normalized modularity qµ(G), respec-
tively. For these reasons we say that the functions r∗
M and rM are exact nonlinear
relaxations of the modularity q and normalized modularity qµ set functions, respec-
tively. The diagram in Figure 1 summarizes these relaxation relations.
To address the case of q(G) we make use of the Lovász extension of the modularity
set function. The Lovász extension, also referred to as Choquet integral, allows the
extension of set valued functions to the entire space Rn and is particularly well-
suited to deal with optimization of sub-modular functions. We refer to [3] for a
careful introduction to the topic. Below we recall one possible definition of the Lovász
extension
Definition 3.3. Given the set of vertices V , let P(V ) be the power set of V ,
and consider a function F : P(V ) → R. For a given vector x ∈ Rn let σ be any
n−1(cid:88)
10
permutation such that xσ(1) ≤ xσ(2) ≤ ··· ≤ xσ(n) and let Ci(x) ⊆ V be the set
Ci(x) = {k ∈ V : xσ(k) ≥ xσ(i)}
The Lovász extension fF : Rn → R of F is defined by
fF (x) =
F (Ci+1(x))(xσ(i+1) − xσ(i)) + F (V )xσ(1)
i=1
We collect in the next proposition some useful properties of the Lovász extension,
which will be helpful in the following. We refer to [3] for their proofs.
Proposition 3.4 (Some properties of the Lovász extension). Consider two set
valued functions F, H : P(V ) → R such that F (∅) = H(∅) = 0. Then
1. fF + fH is the Lovász extension of F + H, i.e. fF + fH = fF +H.
2. For all A ⊆ V it holds F (A) = fF (1A).
3. fF is positively one-homogeneous, i.e. fF (αx) = αfF (x) for all α ≥ 0.
4. Given a graph G = (V, E) let w : E → R+ denote its edge weight function and
let cutG denote the set valued function cutG(A) = w(E(A, A)). The Lovász
extension of cutG is the weighted total variation
n(cid:88)
i,j=1
fcutG (x) =
1
2
w(ij)xi − xj =
xw
T V .
1
2
5. Given x ∈ Rn and t > 0 consider the level set At
fF (x) =
{F (At
x) − F (V )} dt +
(cid:90) 0
−∞
(cid:90) +∞
x = {i ∈ V : xi > t}. Then
F (At
x) dt .
0
The formula at point 5 is actually one of the many equivalent definitions of the Lovász
extension and is sometimes referred to as the co-area theorem.
Remark 3.5. From the proposition above we deduce that (cid:104)x,M(x)(cid:105)µ is the Lovász
extension of the modularity function Q and it corresponds to the difference of two
weighted total variations of x ∈ Rn.
In fact, given a graph G = (V, E) with weight function w, consider the complete
graph K0 = (V, V × V ) with weight function w0(ij) = didj/volG(V ), where di =
w(E({i}, V )) and volG(V ) = w(E) are the degree of node i and the volume of G,
respectively. Then, for any A ⊆ V we have
w(E(A, V )) =
di =
di
dj/volG(V ) = w0(E(A, V ))
(cid:88)
i∈A
(cid:88)
i∈A
(cid:88)
j∈V
Therefore, from (1) and the identity w(E(A, A)) = w(E(A, V )) − w(E(A)), we can
decompose the modularity of a set A into Q(A) = cutK0 (A)− cutG(A), where cutG is
the set valued function defined at point 4 of Proposition 3.4. Combining points 1 and
4 of Proposition 3.4 we obtain
(15)
fQ(x) = f{cutK0−cutG}(x) = fcutK0
(cid:8)xw0
=
1
2
T V − xw
T V
(x) − fcutG (x)
(cid:9) = (cid:104)x,M(x)(cid:105)µ .
The following technical lemma will be useful in the proof of Theorem 3.7 below,
being one of our two main theorems of the section.
11
Lemma 3.6. Let F, H : P(V ) → R be set valued functions such that 0 < H(A) ≤
1 for all A ⊆ V s.t. A /∈ {∅, V }. If F (V ) = 0, then
max
A⊆V
F (A)
H(A)
≥ 1
2
max
(cid:107)x(cid:107)∞≤1
fF (x) .
Proof. Suppose w.l.o.g. that the entries of x ∈ Rn are labeled in ascending order,
that is x1 ≤ ··· ≤ xn. We have
n−1(cid:88)
F (Ci+1(x))(xi+1 − xi) ≤ n−1(cid:88)
i=1
i=1
fF (x) =
As 0 < H(Ci+1(x)) ≤ 1 and (xi+1 − xi) ≥ 0 we get
fF (x) ≤ max
i=2,...,n
F (Ci(x))
H(Ci(x))
(xn − x1) ≤
We get as a consequence
F (Ci+1(x))
H(Ci+1(x))
H(Ci+1(x))(xi+1 − xi)
(cid:18)
max
i=1,...,n
(cid:19)
2(cid:107)x(cid:107)∞
F (Ci(x))
H(Ci(x))
max
(cid:107)x(cid:107)∞≤1
fF (x) ≤ 2 max
(cid:107)x(cid:107)∞≤1
max
i=1,...,n
F (Ci(x))
H(Ci(x))
= 2 max
A⊆V
F (A)
H(A)
The above lemma allows us to show that r∗
M is an exact nonlinear relaxation of
and this proves the claim.
the modularity function q
Theorem 3.7. Let r∗
M(x). Then r∗
maxx∈Rn r∗
M be the Rayleigh quotient defined in (12) and let λ1(r∗
M(1A − 1A) = q(A)µ(V ), for any A ⊆ V and
q(G) = max
A⊆V
q(A) = λ1(r∗
M)/µ(V ) .
M) =
Proof. For a subset A ⊆ V , consider the vector vA = 1A − 1A. Then
(cid:104)vA,M(vA)(cid:105)µ =
1
2
µi(−M )ij(vA)i − (vA)j = 2 Q(A)
n(cid:88)
i,j=1
and (cid:107)vA(cid:107)∞ = 1. Therefore r∗
(16)
M(vA) = 2 Q(A) = q(A)µ(V ) and
µ(V )q(G) = max
A⊆V
M(vA) ≤ max
r∗
x∈Rn
r∗
M(x) .
To show the reverse inequality we use Lemma 3.6 and Remark 3.5. By (15)
we have fQ(x) = (cid:104)x,M(x)(cid:105)µ. Now let H : P(V ) → R be the constant function
H(A) = 1. As Q(V ) = 0, we can use such H into Lemma 3.6, with F = Q, to get
max
A⊆V
Q(A) ≥ 1
2
max
(cid:107)x(cid:107)∞≤1
(cid:104)x,M(x)(cid:105)µ =
1
2
max
x∈Rn
r∗
M(x) .
where the second identity holds since fQ is positively one-homogeneous (Proposition
3.4, point 3). Combining the latter inequality with (16) we conclude.
We now prove an analogous result involving qµ(G) and rM, To this end we for-
mulate the following Lemma 3.8. The proof is a straightforward modification of the
proof of Lemma 3.1 in [30], and is omitted for brevity.
12
Lemma 3.8. A function f : Rn → R is positively one-homogeneous, even, convex
and f (x + y) = f (x) for any y ∈ span(1) if and only if there exists µ : V → R+
such that f (x) = supy∈Y (cid:104)x, y(cid:105)µ where Y is a closed symmetric convex set such that
(cid:104)y, 1(cid:105)µ = 0 for any y ∈ Y .
The following theorem shows that rM is an exact nonlinear relaxation of the
normalized modularity function qµ.
Theorem 3.9. Let rM be the Rayleigh quotient defined in (12) and let λ⊥
1 (rM) =
maxx∈Rn,(cid:104)x,1(cid:105)µ=0 rM(x). Then rM(1A − µ(A)/µ(V )1) = qµ(A)/2 for any A ⊆ V and
qµ(G) = max
A⊆V
qµ(A) = 2 λ⊥
1 (rM) .
Proof. For A ⊆ V let ν(A) = µ(A)µ(A)/µ(V ). Then qµ(A) = Q(A)/ν(A). More-
over, if wA = 1A − µ(A)/µ(V )1, we have (cid:107)wA(cid:107)1,µ = 2 ν(A) and (cid:104)wA,M(wA)(cid:105)µ =
(cid:104)1A,M(1A)(cid:105)µ = Q(A). Thus rM(wA) = qµ(A)/2 and
(17)
max
qµ(G) = 2
rM(x) .
x∈{−a,b}n,(cid:104)x,1(cid:105)µ=0
Now, for x ∈ Rn and t > 0 consider the level set At
x = {i ∈ V : xi > t} and let
xmin = mini xi and xmax = maxi xi. From the co-area formula (Proposition 3.4 point
5) and the identity fQ(x) = (cid:104)x,M(x)(cid:105)µ shown in (15) we have
(cid:104)x,M(x)(cid:105)µ =
Q(At
x) dt =
Q(At
x) dt .
(cid:90) +∞
−∞
(cid:27)(cid:90) xmax
(cid:90) xmax
xmin
(cid:26)
(cid:26)
Given A ⊆ V , let wA denote the vector wA = 1A − µ(A)/µ(V )1. From (cid:107)wA(cid:107)1,µ =
2ν(A) we obtain
t
max
2ν(At
Q(At
x)
2ν(At
x)
(cid:104)x,M(x)(cid:105)µ ≤
Let P : Rn → Rn be the orthogonal projection onto {x : (cid:104)x, 1(cid:105)µ = 0}, that is
P (x) = x − (cid:104)x, 1(cid:105)µ /µ(V )1, and consider the function f (x) = (cid:107)P (x)(cid:107)1,µ. Note that f
satisfies all the hypothesis of Lemma 3.8 above. Moreover note that f (1A) = (cid:107)wA(cid:107)1,µ
for any A ⊆ V . Thus, by Lemma 3.8, there exists Y ⊆ range(P ) such that
Q(At
x)
2ν(At
x)
(cid:107)1,µ dt.
(cid:107)wAt
x) dt =
max
xmin
xmin
t
x
(cid:27)(cid:90) xmax
(cid:90) xmax
(cid:10)1At
x
, y(cid:11)
dt .
µ
(cid:107)wAt
x
(cid:107)1,µdt = sup
y∈Y
xmin
Assume w.l.o.g. that x is ordered so that x1 ≤ ··· ≤ xn. Note that the function
x we have
, y(cid:11) is constant on the intervals [xi, xi+1]. Thus, letting Ai = Axi
xmin
(cid:90) xmax
n−1(cid:88)
φ(t) =(cid:10)1At
(cid:90) xmax
x
xmin
i=1
thus, by Lemma 3.8,
φ(t)dt =
(xi+1 − xi)(cid:104)1Ai, y(cid:105)µ =
µ = (cid:104)x, y(cid:105)µ ,
n(cid:88)
i=1
xi
(cid:10)1Ai−1 − 1Ai, y(cid:11)
(cid:90) xmax
(cid:107)wAt
x
(cid:107)1,µ dt .
xmin
(cid:107)P (x)(cid:107)1,µ = f (x) = sup
y∈Y
(cid:104)x, y(cid:105)µ =
Denote by A∗
(cid:104)P (x),M(P (x))(cid:105)µ, all together we have
x the set that attains the maximum maxt Q(At
x)/ν(At
13
x). As (cid:104)x,M(x)(cid:105)µ =
(18)
λ⊥
1 (rM) = max
x∈Rn
(cid:104)x,M(x)(cid:105)
(cid:107)P (x)(cid:107)1,µ
On the other hand, using (17) we get qµ(G) ≤ 2λ⊥
proves the statement.
rM(P (x)) = max
x∈Rn
≤ max
x∈Rn
Q(A∗
x)
2ν(A∗
x)
≤ qµ(G)/2 .
1 (rM) and together with (18) this
1 (rM). The pseudo code for the method for r∗
4. Spectral method for nonlinear modularity. As in the spectral method
proposed by Newman [41], we can identify a leading module in the network by parti-
tioning the vertex set into two subsets associated to the maximizers of either λ1(r∗
M)
or λ⊥
M is presented below, obvious
changes are needed when r∗
1 . Compute λ1(r∗
2 . If λ1(r∗
M) > 0 :
M) and an associated eigenvector x
M is replaced by rM.
(M1)
partition the vertex set into A+ and A+ by optimal thresholding
the eigenvector x with respect to the community measure
The optimal thresholding technique for x at step 2 returns the partition {A+, A+}
defined by A+ = {i ∈ V : xi > t∗}, being t∗ such that t∗ = arg maxt q({i : xi > t}).
The procedure (M1) can be iterated into a successive bi-partitioning strategy
which can be sketched as follows: Consider the nonlinear modularity operator Mi, i =
1, 2, associated with the two subgraphs G1 = G(A+) and G2 = G(A+), respectively,
and look for a maximal module within G1 and G2 by repeating points 1 and 2, and so
forth. As in the linear case, each time this procedure is iterated, we have to consider
a new nonlinear modularity operator. If A ⊆ V is the subset of nodes associated with
the current recursion, that is Gi = G(A), the new nonlinear modularity operator Mi
is defined by replacing the modularity matrix M in (10) with the modularity matrix
MA of the corresponding subgraph G(A), given by [22, 42]
(cid:40) 1
(cid:0)Mii − (WG(A)1)i + vol(A)
if i (cid:54)= j
Mij
vol(V ) (WG1)i
(cid:1)
(MA)ij =
µi
1
µi
for i, j ∈ A ,
where WG and WG(A) are the weight matrices of the graphs G and G(A), respectively.
We discuss in what follows a generalized version of the RatioDCA method [30] for
approaching step 1 in the above procedure (M1). The method converges to a critical
value of the Rayleigh quotients (12) and ensures a better approximation of q(G) and
qµ(G) than the standard linear spectral method.
4.1. Generalized RatioDCA method. The RatioDCA technique [30] is a
general scheme for minimizing the ratio of nonnegative differences of convex one-
homogeneous functions. We extend that technique to the case where the difference of
functions in the numerator can attain both positive and negative values. As our goal
is to maximize rM and r∗
M respectively.
The generalized RatioDCA technique we propose is of self-interest. For this rea-
son, we formulate and analyze the method for general ratio of differences of convex
one-homogeneous functions f1, f2, g1, g2 : Rn → R, such that g1(x) − g2(x) ≥ 0 for
all x ∈ Rn.
M, we then apply the method to −rM and −r∗
14
Algorithm 1: Generalized RatioDCA
Input: Initial guess x0, with (cid:107)x0(cid:107) = 1 and λ0 = r(x0)
1 repeat
2
3
if λk ≥ 0 then
F2(xk) ∈ ∂f2(xk),
xk+1 = arg min(cid:107)ξ(cid:107)2≤1
F2(xk) ∈ ∂f2(xk),
xk+1 = arg min(cid:107)ξ(cid:107)2≤1
else
4
5
6
7
(cid:110)
(cid:110)
G1(xk) ∈ ∂g1(xk)
f1(ξ) − (cid:104)ξ, F2(xk)(cid:105) + λk
G2(xk) ∈ ∂g2(xk)
g1(ξ) − (cid:104)ξ, G2(xk)(cid:105) + 1
λk
(cid:0)g2(ξ) − (cid:104)ξ, G1(xk)(cid:105)(cid:1)(cid:111)
(cid:0)(cid:104)ξ, F2(xk)(cid:105) − f1(ξ)(cid:1)(cid:111)
end
λk+1 = r(xk+1)
8
9
10 until λk+1 − λk/λk < tolerance
Output: Eigenvalue λk+1 and associated eigenvector xk+1
Define the function
(19)
r(x) =
f1(x) − f2(x)
g1(x) − g2(x)
and consider the problem of computing the minimum minx r(x). The function (19)
can be seen as a generalized Rayleigh quotient and the critical values λ of r(x) satisfy
the generalized eigenvalue equation
(20)
0 ∈ ∂f1(x) − ∂f2(x) − λ(∂g1(x) − ∂g2(x)) .
In analogy with Definition 3.1, when (20) holds we say that λ is a nonlinear eigenvalue
associate to r, with corresponding nonlinear eigenvector x. Computing the minimum
of r(x) is in general a non-smooth and non-convex optimization problem, so an exact
computation of the global minimum of r(x) for general functions and large values of
n is out of reach. However, in Theorems 4.1 and 4.2 we prove that the generalized
RatioDCA technique described in Algorithm 1 generates a monotonically descending
sequence converging to a nonlinear eigenvalue of r(x).
The following theorems describe the convergence properties of the generalized
RatioDCA algorithm.
Theorem 4.1. Let {λk}k be the sequence generated by the generalized RatioDCA.
Then either λk+1 < λk or the method terminates and it outputs a nonlinear eigenvalue
λk+1 of r and a corresponding nonlinear eigenvector xk+1.
Proof. Define τ1 and τ2 as in Lines 4 and 7 of Algorithm 1. Namely,
τ1(ξ) = f1(ξ) − (cid:104)ξ, F2(xk)(cid:105) + λk
and
τ2(ξ) = g1(ξ) − (cid:104)ξ, G2(xk)(cid:105) + 1
λk
(cid:0)g2(ξ) − (cid:104)ξ, G1(xk)(cid:105)
(cid:0)(cid:104)ξ, F2(xk)(cid:105) − f1(ξ)(cid:1) .
By construction we have τ1(xk) = τ2(xk) = 0, due to the fact that for any convex one-
homogeneous function f, and any F (x) ∈ ∂f (x), it holds (cid:104)x, F (x)(cid:105) = f (x). Recall
moreover that, for any convex one-homogeneous function f : Rn → R, it holds
f (x) ≥ (cid:104)x, F (y)(cid:105), for any x, y ∈ Rn and any F (y) ∈ ∂f (y) (see e.g. [31]).
15
If λk ≥ 0, by definition of xk+1 we have τ1(xk+1) ≤ 0. Two cases are possible:
either τ1(xk+1) < 0 or τ1(xk+1) = 0. In the first case we have
f1(xk+1)+λk g2(xk+1) < (cid:104)xk+1, F2(xk)(cid:105)+λk (cid:104)xk+1, G1(xk)(cid:105) ≤ f2(xk+1)+λkg1(xk+1)
therefore f1(xk+1)−f2(xk+1) < λk(g1(xk+1)−g2(xk+1)) that is λk+1 < λk. Otherwise
τ1(xk+1) = 0, thus λk+1 = λk and the method terminates. As f1, f2, g1, g2 are one-
homogeneous we deduce that xk+1 = xk is a global minimum of τ1, thus 0 ∈ ∂τ1(xk+1).
This implies 0 ∈ ∂f1(xk+1) − F2(xk+1) − λk+1(G1(xk+1) − ∂g2(xk+1)), that is λk+1
is a nonlinear eigenvalue of r with corresponding nonlinear eigenvector xk+1.
Let us now consider the case λk < 0. We have
τ2(xk+1) = g1(xk+1) − (cid:104)xk+1, G2(xk)(cid:105) +
(cid:0)(cid:104)xk+1, F2(xk)(cid:105) − f1(xk+1)(cid:1) ≤ 0 .
1
λk
If τ2(xk+1) < 0, together with λk < 0 and g1 − g2 ≥ 0 this implies
g1(xk+1)− 1
λk
f1(xk+1) < (cid:104)xk+1, G2(xk)(cid:105)− 1
λk
(cid:104)xk+1, F2(xk)(cid:105) ≤ g2(xk+1)− 1
λk
f2(xk+1)
(f2(xk+1)− f2(xk+1)), that is λk+1 < λk. Again,
therefore g1(xk+1)− g2(xk+1) < − 1
note that the equality holds only if the optimal value in the inner problem is zero,
which implies in turn that the sequence terminates and the point xk+1 = xk is a
critical value of τ2, thus 0 ∈ ∂τ2(xk+1). We get
λk
0 ∈ ∂g1(xk+1) − G2(xk+1) − (∂f1(xk+1) − F2(xk+1))/λk+1 .
Multiplying the previous equation by −λk+1 (cid:54)= 0 we conclude the proof.
Theorem 4.2. Let {λk}k ⊆ R and {xk}k ⊆ Rn be the sequences defined by the
generalized RatioDCA method. Then
1. λk converges to a nonlinear eigenvalue λ of r,
2. there exists a subsequence of {xk}k converging to a nonlinear eigenvector
of r corresponding to λ and the same holds for any convergent subsequence
of {xk}k.
Proof. The sequence {xk}k belongs to the compact set {x : (cid:107)x(cid:107)2 ≤ 1} thus
λk = r(xk) is decreasing and bounded, and there exits a convergent subsequence xkj .
We deduce that there exists λ such that min(cid:107)x(cid:107)2≤1 r(x) ≤ λ = limk r(xk) and thus,
for any convergent subsequence xkj of xk, we have limj xkj = x∗ with r(x∗) = λ.
Similarly to the previous proof, define τ1 and τ2 as
τ1(ξ) = f1(ξ) − (cid:104)ξ, F2(x∗)(cid:105) + λ(cid:0)g2(ξ) − (cid:104)ξ, G1(x∗)(cid:105)
(cid:0)(cid:104)ξ, F2(x∗)(cid:105) − f1(ξ)(cid:1) .
τ2(ξ) = g1(ξ) − (cid:104)ξ, G2(x∗)(cid:105) +
1
λ
Assume λ < 0. We observe that τ2 has to be nonnegative.
let (cid:101)x =
arg min(cid:107)ξ(cid:107)≤1 τ2(ξ) and assume that τ2((cid:101)x) < 0. Arguing as in the proof of Theo-
rem 4.1, we get r((cid:101)x) > λ = r(x∗) which is a contradiction, as λ is the limit of the
sequence λk = r(xk). This implies that x∗ is a critical point for τ2, thus 0 ∈ ∂τ2(x∗),
showing that x∗ is a nonlinear eigenvector of r with critical value λ. If λ ≥ 0, an
analogous argument applied to τ1 leads to the same conclusion, thus concluding the
proof.
In fact,
16
(cid:8)xw0
(cid:9). As we aim at maximizing the Rayleigh quotients (12), we apply the gen-
4.2. Generalized RatioDCA for modularity Rayleigh quotients. In or-
der to apply Algorithm 1 to r∗
M and rM recall that, as observed in (15), the quantity
T V −
(cid:104)x,M(x)(cid:105)µ is the difference of two weighted total variations (cid:104)x,M(x)(cid:105)µ = 1
xw
eralized RatioDCA to either −r∗
M or −rM. However, for rM, we are interested in
λ⊥
1 (rM), and thus we want to maximize rM over the subspace range(P ), being P the
orthogonal projection P (x) = x−(cid:104)x, 1(cid:105)µ /µ(V )1. This issue is addressed by applying
the generalized RatioDCA to the function
T V
2
(cid:101)rM(x) =
(cid:104)x,M(x)(cid:105)µ
(cid:107)P (x)(cid:107)1,µ
.
In fact, due to the definition of M, we have rM(P (x)) = (cid:101)rM(x). Thus, optimizing
(cid:101)rM is equivalent to optimizing rM on the subspace range(P ).
T V , g1(x) = (cid:107)x(cid:107)∞ and g2(x) = 0.
1 (rM) we apply Algorithm 1 with the choices f1(x) =
T V , g1(x) = (cid:107)P (x)(cid:107)1,µ and g2(x) = 0.
The following Algorithm 2 shows an implementation of Algorithm 1 tailored to
1 (rM). Straightforward changes are required when im-
Therefore:
• In order to address λ1(r∗
2xw0
2xw
• In order to address λ⊥
2xw
2xw0
the problem of computing λ⊥
plementing the method for λ1(r∗
M) we apply Algorithm 1 with the choices f1(x) =
T V , f2(x) = 1
T V , f2(x) = 1
1
1
M).
1 (rM)
δ0(xk) ∈ ∂(cid:8)xkw0
Algorithm 2: Generalized RatioDCA for λ⊥
Input: Initial guess x0 (cid:54)= 0 such that (cid:104)x0, 1(cid:105)µ = 0 and λ0 = rM(x0)
1 repeat
2
3
(cid:9) such that (cid:104)1, δ0(xk)(cid:105)µ = 0, φ(xk) ∈ Φ(xk)
(cid:110)ξw
T V −(cid:10)ξ, δ0(xk) − 2 λk P(cid:0)φ(xk)(cid:1)(cid:11)(cid:111)
(cid:110)
(cid:16)(cid:104)ξ, δ0(xk)(cid:105)µ − ξw
2(cid:107)P (ξ)(cid:107)1,µ − 1
if λk ≤ 0 then
yk+1 = arg min(cid:107)ξ(cid:107)2≤1
yk+1 = arg min(cid:107)ξ(cid:107)2≤1
else
4
5
6
T V
T V
λk
(cid:17)(cid:111)
end
xk+1 = P (yk+1)
λk+1 = rM(xk+1)
7
8
9
10 until λk+1 − λk/λk < tolerance
Output: Eigenvalue λk+1 and associated eigenvector xk+1
Note that in the algorithm we need to select an element δ0(x) of the subdifferential
of the total variation of x, weighted with w0, being also an element of range(P ), i.e.
fulfilling the condition (cid:104)1, δ0(x)(cid:105)µ = 0. This is always possible, as long as x is not
the constant vector. In fact, consider the sign function σ : R → {−1, 0, 1} defined by
σ(λ) = λ/λ if λ (cid:54)= 0 and σ(λ) = 0 otherwise. One easily realizes that the vector y,
with components
belongs to ∂(cid:8)xkw0
T V
yi =
(cid:9) and is such that (cid:104)1, y(cid:105)µ = 0, that is y ∈ range(P ).
i = 1, . . . , n ,
j=1
didj
vol(V )
σ(xi − xj) ,
A number of optimization strategies can be used to solve the inner convex-
optimization problem at steps 4 and 6 of Algorithm 2. Two efficient methods used
n(cid:88)
1
µi
17
in [29, 30] are FISTA [4] and PDHG [10]. Both methods ensure a quadratic conver-
gence rate. Moreover, the computational cost of each iteration of both FISTA and
PDHG is led by the cost required to perform the two matrix-vector multiplications
Bx and BT x, being B the node-edge transition matrix of the graph B : Rn → RE,
entrywise defined by (Bx)(ij) = w(ij)(xi − xj). As it is known, B is typically a very
sparse matrix. We use PDHG in the experiments that we present in the next section.
Let us conclude with some important remarks related with the practical imple-
mentation of the generalized RatioDCA technique. First, note that an exact solution
of the inner problems at steps 4 and 6 is not required in order to ensure monotonic
ascending. In fact, the proof of Theorem 4.1 goes through unchanged if xk+1 is re-
placed by any vector y such that τ1(y) < τ1(xk), resp. τ2(y) < τ2(xk). Therefore
one can speed up the inner problem phase by computing any y with such a property,
especially at an early stage, when the solution is far from the limit.
Second, Theorem 4.1 ensures that the sequence of approximations of the Rayleigh
quotient generated by the generalized RatioDCA scheme is monotonically increasing.
As a consequence, if we run the algorithm by using the leading eigenvector of the
modularity matrix M as a starting vector x0, the output is guaranteed to be a better
approximation of the modularities q(G) and qµ(G). On the other hand, convergence to
a global optimum is not ensured, so in practice one runs the method with a number of
starting points and chooses the solution having largest modularity. An effective choice
of the starting point can be done by exploiting a diffusion process on the graph, as
suggested in [8]. We shall discuss this with more detail in Section 5.5.
5. Numerical experiments. In this section we apply our method to several
real-world networks with the aim of highlighting the improvements that the nonlinear
modularity ensures over the standard linear approach. All the experiments shown
in what follows assume µ = d, that is each vertex is weighted with its degree. We
subdivide the discussion as follows. In Section 5.1 we discuss the differences between
identified communities associated to the exact nonlinear relaxations r∗
M and rM of
the modularity and normalized modularity set functions, respectively. Then, in Sec-
tions 5.2 and 5.3, we focus only on the optimization of the modularity function q and
compare the proposed nonlinear approach with other standard techniques. Precisely,
in Section 5.2 we analyze the handwritten digits dataset known as MNIST, restricting
our attention to the subset made by the digits 4 and 9 . We show several statistics in-
cluding modularity value and clustering error. Finally, in Section 5.3 we perform com-
munity detection on several complex networks borrowed from different applications,
comparing the modularity value obtained with the generalized RatioDCA method for
λ1(r∗
M) against standard methods. We also discuss some experiments where multiple
communities are computed.
5.1. On the difference between q(G) and qµ(G): unbalanced community
structure. There are many situations where the community structure in a network
is not balanced. Communities of relatively small size can be present in a network
alongside communities with a much larger amount of nodes.
It is in fact not dif-
ficult to imagine the situation of a social network of individual relationships made
by communities of highly different sizes. However, a known drawback of modularity
maximization [25,37] is the tendency to overlook small-size communities, even if such
groups are well interconnected and can be clearly identified as communities. Many
possible solutions to this phenomenon have been proposed in the recent literature,
as for instance through the introduction of a tunable resolution parameter γ, by in-
troducing weighted self-loops, or by considering different null-models (see [22,47,53],
18
e.g.). In [23,57] it is pointed out that the use of a normalized modularity measure qµ
is a further potential approach. In fact, if we seek at localizing a set A ⊆ V with high
modularity Q(A) but relatively small size µ(A), then we expect the maximum of qµ
to be a good indicator of the partition involving A.
In this section we compare the community structure obtained from applying the
nonlinear spectral method with r∗
M and with rM, aiming at maximizing the mod-
ularity q and the normalized modularity qµ functions, respectively. In Figure 2 we
show the clustering obtained on a synthetic dataset built trying to model the situation
considered in Fig. 2 of [25]: two small communities poorly connected with each other
and with the rest of the network.
Our aim is to localize the small community as the leading module in the graph.
In our synthetic model we generate a random graph G = (V, E) as follows: The small
community A1 has 50 nodes, each two nodes in A1 are connected with probability 0.6,
and the weight function for G is such that w(ij) = 2 for any ij ∈ E(A1). Another
group A2 ⊆ V has 100 nodes, each two nodes in A2 are connected with probability
0.4, and the weight function for G is such that w(ij) = 1 for any ij ∈ E(A2). Finally,
the rest of the graph V \ (A1 ∪ A2) consist of 450 nodes and each of them is connected
by an edge ij with probability 0.05 and w(ij) = 1.
The weight matrix of the graph is shown on the left-most side of Fig 2, whereas
the table in the right-most part shows the value of the modularities q(Ci) and qµ(Ci)
evaluated on the three different partitions {Ci, Ci}, i = 1, 2, 3, obtained by the linear
spectral method, the nonlinear spectral method with r∗
M and the one for rM, respec-
tively. Although the modularity obtained applying the nonlinear spectral method
to r∗
M is the highest one, as expected, the clustering shown in Figure 2 highlights
how the unbalanced solution obtained through λ⊥
1 (rM) is able to recognize the small
community A1, whereas the other approaches are not.
WG
(a) λ1(M )
(b) λ1(r∗
M)
(c) λ⊥
1 (rM)
q(Ci) qµ(Ci)
0.012
0.022
0.029
(a) 0.29
(b) 0.37
(c) 0.13
Fig. 2. Experiments on synthetic data. From left to right: Sparsity pattern (spy) plot of the
weight matrix of the graph; partition {C1, C1} obtained through Newman's spectral method; partitions
{C2, C2} and {C3, C3} obtained through (M1) with λ1(r∗
1 (rM), respectively; value of the
modularity of the three partitions. Relation between matrix spy (WG) and the graph drawings: the
smallest ground-truth community (top-left block of WG) corresponds to the right-most community
in graph displays of (a), (b) and (c), whereas the largest community (bottom-right block of WG) is
displayed as the bottom-left community in (a), (b) and (c).
M) and λ⊥
In Figure 3 we propose a similar comparison made on the Jazz bands network [27].
The network has been obtained from "The Red Hot Jazz Archive" digital database,
and includes 198 bands that performed between 1912 and 1940, with most of the bands
performing in the 1920's. In this case each vertex corresponds to a band, and an edge
between two bands is established if they have at least one musician in common. A
relatively small community seems to be captured by the normalized modularity qµ,
corresponding to an unbalanced subdivision of the network, whereas a relatively poor
community structure corresponds to the standard modularity. The graph drawings
are realized by means of the Kamada-Kawai algorithm [34].
0100200300400500nz = 48506010020030040050019
q(Ci) qµ(Ci)
0.035
0.038
0.050
(a) 0.30
(b) 0.32
(c) 0.27
WG
(a) λ1(M )
(b) λ1(r∗
M)
(c) λ⊥
1 (rM)
Fig. 3. Experiments on Jazz Network. From left to right: Sparsity pattern (spy) plot of the
weight matrix of the graph; partition {C1, C1} obtained through Newman's spectral method; partitions
{C2, C2} and {C3, C3} obtained through (M1) with λ1(r∗
1 (rM), respectively; value of the
modularity of the three partitions.
M) and λ⊥
5.2. MNIST: handwritten 4-9 digits. The database known as MNIST [38]
consists of 70K images of 10 different handwritten digits ranging from 0 to 9. This
dataset is a widespread benchmark for graph partitioning and data mining. Each digit
is an image of 28 × 28 pixels which is then represented as a real matrix Xi ∈ R28×28.
Here we do not apply any form of dimension reduction strategy, as for instance pro-
jection on principal subspaces. For a chosen integer m, we build a weighted graph
G = (V, E) out of the original data points (images) Xi by placing an edge between
node i and its m-nearest neighbors j, weighted by
(cid:18)
(cid:19)
w(ij) = exp
− 4(cid:107)Xi − Xj(cid:107)2
min{ν(i), ν(j)}
F
,
ν(s) = min
t: st∈E
(cid:107)Xs − Xt(cid:107)2
F ,
being (cid:107) · (cid:107)F the Frobenius norm. We limit our attention to the subset of samples
representing the digits 4 and 9 which result into a graph with 13,782 nodes. We refer
to this dataset as 49 MNIST. The reason for choosing such two digits is due to the
fact that they are particularly difficult to distinguish, as handwritten 4 and 9 look
very similar (see f.i. [30]).
Although the use of MNIST dataset is not common in the community detection
literature, it gives us a ground-truth community structure to which compare the result
of our methods and thus allows for a clustering error measurement. In the following
Table 1 we compare linear and nonlinear spectral methods on 49 MNIST for different
values of m (the number of nearest neighbors defining the edge set of the graph),
ranging among {5, 10, 15, 20}. As the two groups we are looking for are known to be
of approximately same size, we apply the nonlinear method (M1) with λ1(r∗
M), i.e.
with the exact nonlinear relaxation of the modularity set function q.
Let {A, A} be the ground-truth partition of the graph, and let {A+, A+} be the
partition obtained by the spectral method. Table 1 shows the following measurements:
Modularity. This is the modularity value q(A+) of the partition {A+, A+}
computed by optimal thresholding the eigenvector of λ1(M ) and λ1(r∗
M), respectively.
Clustering error. This error measure counts the fraction of incorrectly assigned
labels with respect to the ground truth. Namely
(cid:110) (cid:88)
i∈A+
C.Error =
1
n
(cid:88)
i∈A+
(cid:111)
δ(Li, LA+) +
δ(Li, LA+
)
where δ is the Dirac function, Li is the true label of node i, and LA+, LA+
dominant true-labels in the clusters A+ and A+, respectively.
Normalized Mutual Information (NMI). This is an entropy-based similarity
measure comparing two partitions of the node set. This measure is borrowed from
are the
20
with distribution pX (x), is defined by H(X) = −(cid:80)
information theory, where was originally used to evaluate the Shannon information
content of random variables. The Shannon entropy of a discrete random variable X,
x pX (x) log pX (x), whereas the
mutual information of two discrete random variables X and Y is defined as
(cid:88)
(cid:88)
x
y
I(X, Y ) =
p(X,Y )(x, y) log
(cid:18) p(X,Y )(x, y)
(cid:19)
pX (x)pY (y)
.
Finally the NMI of X and Y is N M I(X, Y ) = 2I(X, Y )/{H(X) + H(Y )}. The use
of NMI for comparing network partitions has been then proposed in [15, 26, 36].
10
5
m Method
λ1(M )
λ1(r∗
M)
λ1(M )
λ1(r∗
M)
λ1(M )
λ1(r∗
M)
λ1(M )
λ1(r∗
M)
20
15
C.Error N M I
0.14
0.88
0.36
0.81
0.05
0.82
0.03
0.82
0.30
0.01
0.23
0.03
0.39
0.03
0.41
0.03
q
0.79
0.95
0.71
0.93
0.77
0.91
0.80
0.91
Table 1
Experiments on 49MNIST dataset and the associated network built out of a m-nearest-neighbors
M) we indicate the linear method and our
graph, with m ∈ {5, 10, 15, 20}. With λ1(M ) and λ1(r∗
nonlinear variant (M1), respectively.
5.3. Community detection on complex networks. In this section we apply
the method (M1) with r∗
M, i.e. the exact nonlinear relaxation of the modularity set
function q, to analyze the community structure of several complex networks of differ-
ent sizes and representing data taken from different fields, including ecological net-
works (such as Benguela, Skipwith, StMarks, Ythan2), social and economic networks
(such as SawMill, UKFaculty, Corporate, Geom, Erdős), protein-protein interaction
networks (such as Malaria, Drugs, Hpyroli, Ecoli, PINHuman), technological and in-
formational networks (such as Electronic2, USAir97, Internet97, Internet98, AS735,
Oregon1), transcription networks (such as YeastS), and citation networks (such as
AstroPh, CondMat). Overall we have gathered 68 different networks with sizes rang-
ing from n = 29 to n = 23133, all of whom are freely available online. We show the
complete list of data sets in Appendix A.
For each of them we look for the leading module with respect to the unbalanced
modularity measure q. In particular, we apply the generalized RatioDCA for λ1(r∗
M).
As this method does not necessarily converge to the global maximum, we run it with
different starting points and then take as a result the one achieving higher modularity.
We discuss the choice of the starting points with more detail in Subsection 5.5. Note
that, due to Theorem 4.1, the choice of the eigenvector corresponding to λ1(M ) as
starting point ensures improvement with respect to the linear case and is often an
effective choice. Table 2 shows results in this sense: we compare the number of times
the nonlinear spectral method outperforms the linear one (in terms of modularity
value), with different strategies for the starting point.
and our nonlinear spectral technique (M1) for λ1(r∗
Table 3 shows modularity values obtained by the linear spectral method for λ1(M )
M), with the generalized RatioDCA
Starting point strategy
Best
Strictly Best
Eig
100%
95.59%
30 Rand
82.35%
82.35%
Table 2
21
All
30 Diff
95.59%
100%
94.12% 97.06%
Experiments on real world networks looking for two communities. Fraction of cases where the
nonlinear spectral method (M1) achieves best and strictly best modularity value q with respect to the
linear method. Columns from left to right show results for different sets of starting points: linear
modularity eigenvector as starting point, 30 uniformly random starting points, 30 diffused starting
points (see Sec. 5.5), all of them. Experiments are done on 68 networks, listed in Appendix A.
described in Algorithm 1, on 15 example networks. For the results of our method the
shown values are the best value of modularity obtained with the spectral method
(M1) run with with 61 starting points: 30 random, 30 diffusive (see Sec. 5.5) and the
leading eigenvector of M. The linear modularity approach is outperformed by our
nonlinear method: the improvement over the modularity matrix linear approach is
up to 128%, which corresponds to the case of AS735. Also, the size of the modules
identified by the two methods often significantly differ.
In Figure 5 we show further statistics on this experiment.
In particular, the
first plot on the left shows medians and quartiles of the modularity value obtained
by the nonlinear method with 61 starting points, highlighting the value obtained
with the linear modularity eigenvector as a starting point (magenta triangle) and
the best value obtained (black dot). These modularity values are compared with the
modularity values obtained with the linear method (green triangle). The second plot
on the right of Figure 5 shows timing performances of the nonlinear method (M1) for
λ1(r∗
M) implemented via the generalized RatioDCA Algorithm 1 on the 15 datasets
here considered. The generalized RatioDCA is here implemented using PDHG as
inner-optimization method [10].
Finally, in Figure 4 we show graph drawings comparing the bi-partitions obtained
with the two methods on some sample networks. We consider this drawing give a good
qualitative intuition of the advantages obtained by using our nonlinear method.
Fig. 4. Bi-partition obtained by the linear (left) and nonlinear (right) spectral methods. Net-
works shown, from left to right: Electronic2, Drugs, and YeastS.
5.4. Recursive splitting for multiple communities. The final test we pro-
pose concerns the detection of multiple communities. Although our method is meant
to address the leading module problem, as in the standard spectral method, we can
address multiple communities by performing Successive Graph Bipartitions (SGB).
This procedure requires to update the modularity operator at each recursion, as dis-
cussed in Section 4. A comparison between the modularity value of the community
structure obtained with different strategies on a number of datasets is shown in Tables
4 and 5 where we compare our method with the linear spectral bi-partition and the
locally greedy algorithm known as Louvain method [5]. For the latter method we use
22
ID
Network
Social 3A
Skipwith
Stony
Malaria
Electronic 2
Electronic 3
1 Macaque cortex
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Transc Main
Software VTK
YeastS Main
Drugs
ODLIS
Erdős 2
AS 735
CA CondMat
n
32
32
35
112
229
252
512
616
662
771
2224
2898
6927
7716
23133
Linear Method
A1
q(A1)
0.22
16
14
0.28
0.04
14
0.09
34
0.25
65
0.36
88
95
0.23
0.43
220
0.20
91
0.32
317
471
0.25
0.30
1285
0.28
1804
0.18
2390
2243
0.21
Table 3
Nonlinear Method
A2
16
17
17
40
113
115
253
285
318
364
883
1379
2333
3040
8777
q(A2)
0.23
0.30
0.06
0.12
0.35
0.48
0.49
0.49
0.44
0.39
0.37
0.34
0.42
0.41
0.42
Gain (%)
q(A2)/q(A1)
+4
+7
+50
+8
+40
+33
+113
+14
+120
+22
+48
+13
+50
+128
+100
Experiments on real world networks looking for two communities. For the nonlinear spectral
method (M1) we consider 61 starting points: 30 random, 30 diffusive (see Sec. 5.5) and the leading
eigenvector of M. The column n shows the size of the graph; A1 and A2 are the smallest communities
identified by the linear and the nonlinear method, respectively; columns Ai and q(Ai) shows size and
modularity value of Ai, i = 1, 2, respectively; the last column shows the ratio between the modularity
of both partitions.
Fig. 5. Boxplots of modularity values (left plot) and execution times (right plot) for the non-
linear method (M1) implemented via the generalized RatioDCA Algorithm 1 with 61 starting points:
30 random, 30 diffusive (see Sec. 5.5) and the leading eigenvector of M. The black dots show the
best value obtained by the method (also shown in Table 3). The magenta triangles show values and
timing for the method started with the linear modularity eigenvector. Green triangles correspond to
the standard linear method. Experiments have been made on the 15 datasets of Table 3 (where the
dataset sizes are shown), with MATLAB R2016b and forcing one single computing thread.
the GenLouvain Matlab toolbox [33].
These two strategies are arguably the most popular methods for revealing com-
munities in networks. The SGB approach is a relatively naive extension of the spec-
tral method for the leading module. For the modularity-based community detection
problem the SGB strategy has been probably first proposed in [41]. Although this
technique works well in certain cases, it typically does not outperform the Louvain
method and it is known that there are situations where this approach may fail. This is
1 2 3 4 5 6 7 8 9101112131415Dataset ID00.050.10.150.20.250.30.350.40.450.5ModularityNonlinear Method (best)Nonlinear Method (eig)Linear Method 1 2 3 4 5 6 7 8 9101112131415Dataset ID10-210-1100101102Execution TimeLinear Method23
shown for example in [48] where the method based on the linear modularity eigenvec-
tors is shown to fail on the 8-node bucket brigade and on some real-world datasets.
This negative results have led to different extensions of spectral algorithms to the
problem of multiple communities, see for instance [49, 58]. A more careful extension
of our nonlinear spectral approach to the multi-community case goes beyond the scope
of this paper and is left to future work.
In the following experiments we compute an initial community assignment via
SGB and then refine it by moving the nodes among communities following a relatively
standard flipping strategy based on the Kernighan -- Lin algorithm [35], see also [42].
This refinement procedure identifies the node that, when assigned to another com-
munity, generates the biggest increase on modularity (or the smallest decrease if no
increase is possible). This procedure is repeated until all the n nodes have been
moved, with the constraint that each node assignment can be changed only once.
By identifying the intermediate community of this process that leads to the biggest
increase on modularity, the current communities are updated. Starting from these
new communities, the process is repeated until no further modularity improvement is
observed.
This technique can be efficiently implemented in parallel, to speed up its time
execution. We apply node flipping to both the linear and the nonlinear SGB.
Table 4 shows the percentage of cases where the nonlinear method achieves best
and strictly best modularity on the 68 networks listed in Appendix A. Table 5 com-
pares modularity values and number of assigned communities on some example net-
works and for the three strategies: linear spectral method for λ1(M ), nonlinear spec-
tral method (M1) for λ1(r∗
M) with the generalized RatioDCA Algorithm 1, and Gen-
Louvain toolbox.
Both our method and the Louvain method are run several times. As before, our
method is run with 61 starting points: 30 random, 30 diffusive (see next subsection)
and the leading eigenvector of M. The Louvain method is run with 100 random initial
node orderings. Results in Tables 4 and 5 are based, for each method, on the best
modularity assignment achieved among all the runs. As expected, the performance
of our nonlinear spectral method are now less remarkable: The nonlinear method
systematically outperforms the linear one, as for the leading module case discussed
in the previous section, whereas it shows a performance competitive to the Louvain
technique in terms of modularity value, even though the community assignment of
the two methods often considerably differ.
In fact, the median ratio between the
modularity assignments of our method and the Louvain one over the 68 datasets of
Appendix A is 0.9998 with a variance of 0.0005.
5.5. On the choice of the starting points. The optimization method in
Algorithm 1 often converges to local maxima, thus performances of that strategy rely
on the choice of the starting points x0. According to our Theorem 4.1, the sequence
r∗
M(xk) increases monotonically. This suggests that using the leading eigenvector of
the modularity matrix as a starting point ensures a higher modularity value with
respect to the linear spectral method. This observation applies to the case of two
communities, whereas does not necessarily work anymore when looking for multiple
groups. A standard approach in that case is to pick some additional random starting
point. However a better choice can be done by choosing a set of diffuse starting points
as suggested in [8]: At each recursion of SGB let x be the eigenvector of the matrix
MA, corresponding to one of the current subgraphs G(A). Let vi, vj be two nodes
sampled uniformly at random from A such that vi ∈ C and vj ∈ C, where {C, C} is
24
Starting point strategy
Best
Strictly Best
Eig
18%
11.8%
Table 4
30 Rand
29.4%
22.1%
All
30 Diff
30.9% 44.1%
25%
33.8%
Experiments on real world networks looking for two or more communities. Fraction of cases
where the nonlinear spectral method (M1) achieves best and strictly best modularity value q with
respect to the linear method and the best modularity value obtained by the Louvain method after 100
runs with random initial node ordering. Columns from left to right show results for different sets
of starting points:
linear modularity eigenvector as starting point, 30 uniformly random starting
points, 30 diffused starting points (see Sec. 5.5), all of them. Experiments are done on 68 networks,
listed in Appendix A.
Network
n
Macaque cortex
Social 3A
Skipwith
Stony
Malaria
Electronic 2
Electronic 3
Drugs
Transc Main
Software VTK
YeastS Main
ODLIS
Erdős 2
AS 735
CA CondMat
30
32
35
112
229
252
512
616
662
771
2224
2898
6927
7716
23133
Linear SGB
qlin
Nc
2
0.22
4
0.36
0.06
2
3
0.16
8
0.51
9
0.72
25
0.76
0.75
21
17
0.74
38
0.61
48
0.57
9
0.43
0.70
63
28
0.53
0.66
43
Nonlinear SGB
qnlin
0.23
0.37
0.07
0.17
0.53
0.75
0.82
0.77
0.76
0.67
0.59
0.48
0.75
0.63
0.72
Nc
2
4
2
5
9
11
16
17
22
21
46
17
73
77
832
Table 5
GenLouvain
qLou
Nc
3
0.19
4
0.37
0.07
2
5
0.17
0.53
8
11
0.75
15
0.79
0.77
15
16
0.76
17
0.67
26
0.60
17
0.48
0.75
1433
1274
0.63
0.74
619
Gain (%)
qnlin
qlin
+4
+2
+7
+6
+4
+4
+8
+3
+4
+12
+4
+12
+7
+19
+9
qnlin
qLou
+20
0
0
0
0
0
+4
0
0
0
-2
0
0
0
-3
Experiments on real world networks looking for two or more communities. For the Louvain
method we consider 100 initial random node orderings. For the nonlinear spectral method (M1)
we consider 61 random starting points: 30 random, 30 diffusive (see Sec. 5.5) and the leading
eigenvector of M. Column n is the size of the graph, whereas, for each method, Nc denote the
number of communities identified. The three quantities qlin, qnlin and qLou denote the modularity
of the partition obtained with the linear, nonlinear and Louvain methods, respectively. The last two
columns show the ratio between the modularity of the partitions obtained with the nonlinear method
(M1) with respect the linear and the Louvain algorithms, respectively.
a partition of A obtained through optimal thresholding the eigenvector x. Then, for
the zero vector z we set zi = 1 and zj = −1. We then propagate this initial stage
with(cid:101)z = (I + L)−1z where L denotes the unnormalized graph Laplacian of G(A), and
take(cid:101)z as starting point for our method.
6. Conclusions. The linear spectral method [44] and the locally greedy tech-
nique known as Louvain method [5] are among the most popular techniques for com-
munities detection. Our nonlinear modularity approach is an extension of the linear
spectral method and has a number of properties that identify it as valid alternative
in several circumstances: (a) The method is supported by a detailed mathematical
understanding and two exact relaxation identities (Theorems 3.9 and 3.7) that can be
seen as nonlinear extensions of modularity Cheeger-type inequalities; (b) it exploits
for the first time the use of nonlinear eigenvalue theory in the context of community
detection; (c) the use of the nonlinear modularity operator M, here presented, allows
25
us to address individually both balanced (equally sized) and unbalanced (small size)
leading module problems.
The analysis of Section 5 shows experimental evidence of the quality of our ap-
proach and the advantage over the linear method. Several interesting research direc-
tions remain open, in particular for what concerns the computational efficiency of the
nonlinear Rayleigh quotients optimization and the overall nonlinear spectral method,
and for what concerns the possibility of tailoring the method to the problem of mul-
tiple communities -- which is currently addressed by the naive strategy of successive
bi-partitions -- in a more effective way.
Acknowledgements. We are grateful to Francesca Arrigo for sharing with us
several of the networks we used in the numerical experiments.
A. Networks used in the experiments. Here we list the names of the net-
works we used in Section 5. For the sake of brevity, we do not give individual refer-
ences nor individual descriptions of the data sets, whereas we refer to [16, 19, 20, 39]
for details.
Network names: Benguela, Coachella, Macaque Visual Cortex Sporn, Macaque
Visual Cortex, PIN Afulgidus, Social3A, Chesapeake, Hi-tech main, Zackar, Skipwith,
Sawmill, StMartin, Trans urchin, StMarks, KSHV, ReefSmall, Dolphins, Newman dol-
phins, PRISON SymA, Bridge Brook, grassland , WorldTrade Dichot SymA, Shelf, UK-
faculty, Pin Bsubtilis main, Ythan2, Canton, Stony, Electronic1, Ythan1, Software Digital
main-sA, ScotchBroom, ElVerde, LittleRock, Jazz, Malaria PIN main, PINEcoli validated
main, SmallW main, Electronic2, Neurons, ColoSpg, Trans Ecoli main, USAir97, Elec-
tronic3, Drugs, Transc yeast main, Hpyroli main, Software VTK main-sA, Software XMMS
main-sA, Roget, Software Abi main-sA, PIN Ecoli All main, Software Mysql main-sA, Cor-
porate People main, YeastS main, PIN Human main, ODLIS, Internet 1997, Drosophila
PIN Confidence main, Internet 1998, Geom, USpowerGrid, Power grid, Erdos02, As-735,
Oregon1, Ca-AstroPh, Ca-CondMat.
REFERENCES
[1] N. Arcolano, K. Ni, B. A. Miller, N. T. Bliss, and P. J. Wolfe, Moments of parameter
estimates for Chung-Lu random graph models, in 2012 IEEE International Conference on
Acoustics, Speech and Signal Processing (ICASSP), 2012, pp. 3961 -- 3964.
[2] A. Arenas, A. Fernández, and S. Gómez, Analysis of the structure of complex networks
at different resolution levels, New Journal of Physics, 10 (2008), p. 053039.
[3] F. Bach, Learning with submodular functions: A convex optimization perspective, Foundations
and Trends in Machine Learning, 6 (2013), pp. 145 -- 373.
[4] A. Beck and M. Teboulle, A fast iterative shrinkage-thresholding algorithm for linear in-
verse problems, SIAM Journal on Imaging Sciences, 2 (2009), pp. 183 -- 202.
[5] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre, Fast unfolding of
communities in large networks, Journal of Statistical Mechanics: Theory and Experiment,
2008 (2008), p. P10008.
[6] Z. Boyd, E. Bae, X.-C. Tai, and A. L. Bertozzi, Simplified energy landscape for modu-
larity using total variation, arXiv:1707.09285, (2017).
[7] U. Brandes, D. Delling, M. Gaertler, R. Gorke, M. Hoefer, Z. Nikoloski, and
D. Wagner, On modularity clustering, IEEE Transactions on Knowledge and Data Engi-
neering, 20 (2008), pp. 172 -- 188.
[8] X. Bresson, T. Laurent, D. Uminsky, and J. von Brecht, Multiclass total variation
clustering, in Advances in Neural Information Processing Systems 26, 2013, pp. 1421 -- 1429.
[9] T. Bühler and M. Hein, Spectral clustering based on the graph p-Laplacian, in Proceedings
of the 26th Annual International Conference on Machine Learning, ICML '09, New York,
NY, USA, 2009, ACM, pp. 81 -- 88.
[10] A. Chambolle and T. Pock, A first-order primal-dual algorithm for convex problems with
applications to imaging, J. Math. Imaging Vision, 40 (2011), pp. 120 -- 145.
26
[11] K. C. Chang, Spectrum of the 1-Laplacian and Cheeger's constant on graphs, Journal of
[12] F. R. K. Chung and L. Lu, Complex graphs and networks, vol. 107, American Mathematical
Graph Theory, 81, pp. 167 -- 207.
Society, Providence, 2006.
[13] F. H. Clarke, Optimization and nonsmooth analysis, vol. 5, SIAM, 1990.
[14] A. Clauset, M. E. J. Newman, and C. Moore, Finding community structure in very large
networks, Phys. Rev. E, 70 (2004), p. 066111.
[15] L. Danon, A. Diaz-Guilera, J. Duch, and A. Arenas, Comparing community structure
identification, Journal of Statistical Mechanics: Theory and Experiment, 2005 (2005),
p. P09008.
[16] T. A. Davis and Y. Hu, The University of Florida sparse matrix collection, ACM Trans.
Math. Softw., 38 (2011), pp. 1 -- 25.
[17] P. Drábek and S. B. Robinson, On the generalization of the Courant nodal domain theorem,
Journal of Differential Equations, 181 (2002), pp. 58 -- 71.
[18] J. Duch and A. Arenas, Community detection in complex networks using extremal opti-
mization, Phys. Rev. E, 72 (2005), p. 027104.
[19] E. Estrada, The structure of complex networks: theory and applications, Oxford University
Press, 2012.
[20] E. Estrada and F. Arrigo, Predicting triadic closure in networks using communicability
distance functions, SIAM Journal on Applied Mathematics, 75 (2015), pp. 1725 -- 1744.
[21] D. Fasino and F. Tudisco, An algebraic analysis of the graph modularity, SIAM Journal on
Matrix Analysis and Applications, 35 (2014), pp. 997 -- 1018.
[22] D. Fasino and F. Tudisco, Generalized modularity matrices, Linear Algebra and its Appli-
cations, 502 (2016), pp. 327 -- 345.
[23] D. Fasino and F. Tudisco, Modularity bounds for clusters located by leading eigenvectors
of the normalized modularity matrix, Journal of Mathematical Inequalities, 11 (2016),
pp. 701 -- 714.
[24] S. Fortunato, Community detection in graphs, Physics reports, 486 (2010), pp. 75 -- 174.
[25] S. Fortunato and M. Barthélemy, Resolution limit in community detection, Proceedings
of the National Academy of Sciences, 104 (2007), pp. 36 -- 41.
[26] A. L. N. Fred and A. K. Jain, Learning pairwise similarity for data clustering, in 18th
International Conference on Pattern Recognition (ICPR), 2006, pp. 925 -- 928.
[27] P. M. Gleiser and L. Danon, Community structure in jazz, Advances in Complex Systems,
06 (2003), pp. 565 -- 573.
[28] R. Guimerà, M. Sales-Pardo, and L. A. N. Amaral, Modularity from fluctuations in
random graphs and complex networks, Phys. Rev. E, 70 (2004), p. 025101.
[29] M. Hein and T. Bühler, An inverse power method for nonlinear eigenproblems with ap-
plications in 1-spectral clustering and sparse PCA, in Adv. Neural Inf. Process. Syst. 23
(NIPS), 2010, pp. 847 -- 855.
[30] M. Hein and S. Setzer, Beyond spectral clustering - tight relaxations of balanced graph cuts,
in Advances in Neural Information Processing Systems 24, 2011, pp. 2366 -- 2374.
[31] J.-B. Hiriart-Urruty and C. Lemaréchal, Fundamentals of convex analysis, Springer
Science & Business Media, 2012.
[32] H. Hu, T. Laurent, M. A. Porter, and A. L. Bertozzi, A method based on total variation
for network modularity optimization using the MBO scheme, SIAM Journal on Applied
Mathematics, 73 (2013), pp. 2224 -- 2246.
[33] L. G. S. Jeub, M. Bazzi, I. S. Jutla, and P. J. Mucha, A generalized Louvain method
for community detection implemented in MATLAB, (2011 -- 16), http://netwiki.amath.unc.
edu/GenLouvain.
[34] T. Kamada and S. Kawai, An algorithm for drawing general undirected graphs, Information
Processing Letters, 31 (1989), pp. 7 -- 15.
[35] B. W. Kernighan and S. Lin, An efficient heuristic procedure for partitioning graphs, The
Bell System Technical Journal, 49 (1970), pp. 291 -- 307.
[36] A. Lancichinetti and S. Fortunato, Community detection algorithms: A comparative anal-
ysis, Phys. Rev. E, 80 (2009), p. 056117.
[37] A. Lancichinetti and S. Fortunato, Limits of modularity maximization in community
detection, Phys. Rev. E, 84 (2011), p. 066122.
[38] Y. LeCun, C. Cortes, and C. J. C. Burges, The MNIST database of handwritten digits,
(1998), http://yann.lecun.com/exdb/mnist/.
[39] J. Leskovec and A. Krevl, SNAP Datasets: Stanford large network dataset collection.
http://snap.stanford.edu/data, June 2014.
[40] P. Mercado, A. Gautier, F. Tudisco, and M. Hein, The power mean Laplacian for
27
multilayer graph clustering, in Proceedings of the 21st International Conference on Arti-
ficial Intelligence and Statistics (AISTATS), vol. 84 of Proceedings of Machine Learning
Research, 2018, pp. 1828 -- 1838.
[41] M. E. J. Newman, Finding community structure in networks using the eigenvectors of ma-
trices, Phys. Rev. E, 74 (2006), p. 036104.
[42] M. E. J. Newman, Modularity and community structure in networks, Proceedings of the
National Academy of Sciences, 103 (2006), pp. 8577 -- 8582.
[43] M. E. J. Newman, Networks: an introduction, Oxford University Press, 2010.
[44] M. E. J. Newman and M. Girvan, Finding and evaluating community structure in networks,
[45] M. A. Porter, J.-P. Onnela, and P. J. Mucha, Communities in networks, Notices of the
Phys. Rev. E, 69 (2004), p. 026113.
AMS, 56 (2009), pp. 1082 -- 1097.
[46] N. Pržulj and D. J. Higham, Modelling protein -- protein interaction networks via a stickiness
index, Journal of The Royal Society Interface, 3 (2006), pp. 711 -- 716.
[47] J. Reichardt and S. Bornholdt, Statistical mechanics of community detection, Phys. Rev.
[48] T. Richardson, P. J. Mucha, and M. A. Porter, Spectral tripartitioning of networks,
E, 74 (2006), p. 016110.
Phys. Rev. E, 80 (2009), p. 036111.
[49] M. A. Riolo and M. E. J. Newman, First-principles multiway spectral partitioning of graphs,
Journal of Complex Networks, 2 (2014), pp. 121 -- 140.
[50] P. Ronhovde and Z. Nussinov, Local resolution-limit-free potts model for community detec-
tion, Phys. Rev. E, 81 (2010), p. 046114.
[51] S. E. Schaeffer, Graph clustering, Computer science review, 1 (2007), pp. 27 -- 64.
[52] H.-W. Shen and X.-Q. Cheng, Spectral methods for the detection of network community
structure: a comparative analysis, Journal of Statistical Mechanics: Theory and Experi-
ment, 2010 (2010), p. P10020.
[53] V. A. Traag, P. Van Dooren, and Y. Nesterov, Narrow scope for resolution-limit-free
community detection, Phys. Rev. E, 84 (2011), p. 016114.
[54] A. Traud, E. Kelsic, P. Mucha, and M. Porter, Comparing community structure to
characteristics in online collegiate social networks, SIAM Review, 53 (2011), pp. 526 -- 543.
[55] F. Tudisco and M. Hein, A nodal domain theorem and a higher-order Cheeger inequality for
the graph p-Laplacian, EMS Journal of Spectral Theory, in press (2016).
[56] F. Tudisco and D. J. Higham, A nonlinear spectral method for core-periphery detection in
networks, arXiv:1804.09820, (2018).
[57] S. Zhang and H. Zhao, Normalized modularity optimization method for community identi-
fication with degree adjustment, Phys. Rev. E, 88 (2013), p. 052802.
[58] X. Zhang and M. E. J. Newman, Multiway spectral community detection in networks, Phys.
Rev. E, 92 (2015), p. 052808.
|
1211.5184 | 1 | 1211 | 2012-11-22T01:57:20 | Faster Random Walks By Rewiring Online Social Networks On-The-Fly | [
"cs.SI",
"cs.DS",
"physics.soc-ph"
] | Many online social networks feature restrictive web interfaces which only allow the query of a user's local neighborhood through the interface. To enable analytics over such an online social network through its restrictive web interface, many recent efforts reuse the existing Markov Chain Monte Carlo methods such as random walks to sample the social network and support analytics based on the samples. The problem with such an approach, however, is the large amount of queries often required (i.e., a long "mixing time") for a random walk to reach a desired (stationary) sampling distribution.
In this paper, we consider a novel problem of enabling a faster random walk over online social networks by "rewiring" the social network on-the-fly. Specifically, we develop Modified TOpology (MTO)-Sampler which, by using only information exposed by the restrictive web interface, constructs a "virtual" overlay topology of the social network while performing a random walk, and ensures that the random walk follows the modified overlay topology rather than the original one. We show that MTO-Sampler not only provably enhances the efficiency of sampling, but also achieves significant savings on query cost over real-world online social networks such as Google Plus, Epinion etc. | cs.SI | cs |
Faster Random Walks By Rewiring Online Social
Networks On-The-Fly
Zhuojie Zhou1 , Nan Zhang2 , Zhiguo Gong3 , Gautam Das4
1,2Computer Science Department, George Washington University
[email protected]
[email protected]
3Computer and Information Science Department, University of Macau
[email protected]
4Computer Science Department, University of Texas at Arlington
[email protected]
Abstract— Many online social networks feature restrictive web
interfaces which only allow the query of a user’s local neighbor-
hood through the interface. To enable analytics over such an
online social network through its restrictive web interface, many
recent efforts reuse the existing Markov Chain Monte Carlo
methods such as random walks to sample the social network
and support analytics based on the samples. The problem with
such an approach, however, is the large amount of queries often
required (i.e., a long “mixing time”) for a random walk to reach
a desired (stationary) sampling distribution.
In this paper, we consider a novel problem of enabling a faster
random walk over online social networks by “rewiring” the social
network on-the-fly. Specifically, we develop Modified TOpology
(MTO)-Sampler which, by using only information exposed by the
restrictive web interface, constructs a “virtual” overlay topology
of the social network while performing a random walk, and
ensures that the random walk follows the modified overlay
topology rather than the original one. We show that MTO-
Sampler not only provably enhances the efficiency of sampling,
but also achieves significant savings on query cost over real-world
online social networks such as Google Plus, Epinion etc.
I . IN TRODUC T ION
A. Aggregate Estimation over Online Social Networks
An online social network allows its users to publish contents
and form connections with other users. To retrieve infor-
mation from a social network, one generally needs to issue
a individual-user query through the social network’s web
interface by specifying a user of interest, and the web interface
returns the contents published by the user as well as a list of
other users connected with the user1 .
An online social network not only provides a platform for
users to share information with their acquaintance, but also
enables a third party to perform a wide variety of analytical
applications over the social network - e.g., the analysis of
rumor/news propagation, the mining of sentiment/opinion on
certain subjects, and social media based market research.
While some third parties, e.g., advertisers, may be able to
negotiate contracts with the network owners to get access
to the full underlying database, many third parties lack the
1We currently focus on the undirected relationship between users.
resources to do so. To enable these third-party analytical
applications, one must be able to accurately estimate big-
picture aggregates (e.g., the average age of users, the COUNT
of user posts that contain a given word) over an online social
network by issuing a small number of individual-user queries
through the social network’s web interface. We address this
problem of third-party aggregate estimation in the paper.
B. Existing Sampling Based Solutions and Their Problems
An important challenge facing third-party aggregate esti-
mation is the lack of cooperation from online social network
providers. In particular,
the information returned by each
individual-user query is extremely limited - only containing
information about the neighborhood of one user. Furthermore,
almost all large-scale online social networks enforce limits
on the number of web requests one can issue (e.g., 600 open
graph queries per 600 seconds for Facebook2 , and 350 requests
per hour for Twitter3 ). As a result, it is practically impossible
to crawl/download most or all data from an online social
network before generating aggregate estimations. There is also
no available way for a third party to obtain the entire topology
of the graph underlying the social network.
To address this challenge, a number of sampling techniques
have been proposed for performing analytics over an online
social network without the prerequisite of crawling [10]–[12],
[15]. The objective of sampling is to randomly select elements
(e.g., nodes/users or edges/relationships) from the online social
network according to a pre-determined probability distribution,
and then to generate aggregate estimations based on the
retrieved samples. Since only individual local neighborhoods
(i.e., a user and the set of its neighbors) - rather than the
entire graph topology - can be retrieved from the social
network’s web interface, to the best of our knowledge, all
existing sampling techniques without prior knowledge of all
nodes/edges are built upon the idea of performing random
walks over the graph which only require knowledge of the
local neighborhoods visited by the random walks.
2 https://developers.facebook.com/docs/best-practices/
3 https://dev.twitter.com/docs/rate-limiting
In literature, there are two popular random walk schemes:
simple random walk and Metropolis Hastings random walk.
Simple random walk (SRW) [17] starts from an arbitrary
user, repeatedly hops from one user to another by choosing
uniformly at random from the former user’s neighborhood,
and stops after a number of steps to retrieve the last user as
a sample. When the simple random walk is sufficiently long,
the probability for each user to be sampled tends to reach a
stationary (probability) distribution proportional to each user’s
degree (i.e., the number of users connected with the user).
Thus, based on the retrieved samples and knowledge of such
a stationary distribution, one can generate unbiased estimations
of AVG aggregates (with or without selection conditions) over
all users in the social network. If the total number of users
in the social network is available4 , then COUNT and SUM
aggregates can be answered without bias as well.
Metropolis Hastings random walk (MHRW) is a random
walk achieving any distribution (typically uniform distribution)
constructed by the famous MH algorithm. As an extension of
MHRW, based on the knowledge of all the ids of a graph, [11]
suggests that we can conduct random jump (RJ), which jumps
to any random vertex5 in the graph with a fixed probability
in each step when it carries on the MHRW. Although MHRW
can yield asymptotically uniform samples, which requires no
additional processing for subsequent analysis, it is slower than
SRW almost for all practical measurements of convergence,
such as degree distribution distance, KS distance and mean
degree error. According to [10] and [14], SRW is 1.5-8 times
faster than MHRW. Thus we set the baseline as SRW, while
we also include MHRW in the experimental section.
A critical problem of existing sampling techniques, how-
ever, is the large number of individual-user queries (i.e., web
requests) they require for retrieving each sample. Consider the
above-described simple random walk as an example. In order
to reach the stationary distribution (and thereby an accurate
aggregate estimation), one may have to issue a large number of
queries as a “burn-in” period of the random walk. Traditional
studies on graph theory found that the length of such a burn-in
period is determined by the graph conductance - an intrinsic
property of the graph topology (formally defined in Section II).
In particular, the smaller the conductance is, the longer the
burn-in period will be (i.e., the more individual-user queries
will be required by sampling).
Unfortunately, a recent study [18] on real-world social net-
works such as Facebook, Livejournal, etc. found the conduc-
tance of their graphs to be substantially lower than expected.
As a result, a random walk on these social networks often
requires a large number of individual-user queries - e.g.,
approximately 500 to 1500 single random walk length for a
real-world social network Livejournal of one million nodes
to achieve acceptable variance distance [18]. One can see
that, in order to retrieve enough samples to reach an accurate
4Which is the case for many real-world social networks whose providers
publish the total number of users for advertising purposes.
5 It may need the global topology or the whole user id space for generate
random vertex, thus not viable for all online social networks.
aggregate estimation, the existing sampling techniques may
require a very large number of individual-user queries.
C. Outline of Technical Results
In this paper, we consider a novel problem of how to sig-
nificantly increase the conductance of a social network graph
by modifying the graph topology on-the-fly (during the third-
party random walk process). In the following, we shall first
explain what we mean by on-the-fly topology modification,
and then describe the rationale behind our main ideas for
topology modification.
First, by topology modification we do not actually modify
the original topology of the social network graph - indeed,
no third party other than the social network provider has the
ability to do so. What we modify is the topology of an overlay
graph on which we perform the random walks. Fig 1 depicts
an example: if we can decide that not considering a particular
edge in the random walk process can make the burn-in period
shorter (i.e., increase the conductance), then we are essentially
performing random walks over an overlay graph on which this
edge is removed. By doing so, we can achieve same accurate
aggregate estimation with lower query cost. One can see that,
with traditional random walk techniques, the overlay graph is
exactly the same as the original social network graph. Our
objective here is to manipulate edges in the overlay graph so
as to maximize the graph conductance.
It is important to note that the technical challenge here is
not how edge manipulations can boost graph conductance - a
simple method to reach theoretical maximum on conductance
is to repeatedly insert edges to the graph until it becomes
a complete graph. This requires the knowledge of all nodes
in the social network, which a third-party does not have. The
key challenge here is how to perform edge manipulations only
based on the knowledge of local neighborhoods that a random
walk has passed by, and yet increases the conductance of
the entire graph in a significant manner. In the following, we
provide an intuitive explanation of our main ideas for topology
modification.
To understand the main ideas, we first introduce the con-
cepts of cross-cutting and non-cross-cutting edges intuitively
with an example in Fig 1 (we shall formally define these
concepts in Section II). Generally speaking, if we consider
a social network graph consisting of multiple densely con-
nected components (e.g., S and ¯S in Fig 1), then the edges
connecting them are likely to be cross-cutting edges, while
edges inside each densely connected component are likely
non-cross-cutting ones. A key intuition here is that the more
cross-cutting edges and/or the fewer non-cross-cutting edges a
graph has, the higher its conductance is. For example, Graph G
in Fig 1 has a low conductance (i.e., high burn-in period) as a
random walk is likely to get “stucked” in one of the two dense
components which are difficult to escape, given that there is
only one cross-cutting edge (u, v). On the other hand, with
far fewer non-cross-cutting edges and a few additional cross-
cutting edges, G∗ has a much higher conductance as it is much
sampling techniques.
I I . PR EL IM INAR I E S
A. Model of Online Social Networks
In this paper, we consider an online social network with an
interface that allows input queries of the form
q(v): SELECT * FROM D WHERE USER-ID = v ,
and responds with the information about user v (e.g., user
name, self-description, user-published contents) as well as
the list of all other users connected with v (e.g., v ’s friends
in the network). This is a model followed by many online
social networks - e.g., Google Plus, Facebook, etc - with the
interface provided as either an end-user-friendly web page or
a developer-specific API call.
Consider the social-network topology as an undirected
graph G(V , E ), where each node in V is corresponding to
a user in the social network7 , and each edge in E represents
the connection between two users. One can see that the answer
to query q(v) (v ∈ V ) is a set of nodes N (v) ⊆ V , such that
∀u ∈ N (v), there is an edge e : (u, v) ∈ E . We henceforth
refer to N (v) as the neighborhood of v . We use kv to denote
the degree of v - i.e., kv = N (v). For abbreviation, we also
write e : (u, v) as euv .
Running Example: We shall use, throughout this paper,
the 22-node, 111-edge, barbell graph shown (as the
original graph G) in Fig 1 as a running example.
B. Performance Measures for Sampling
In the following, we shall discuss two key objectives for
sampling: (1) minimizing bias - such that the retrieved samples
can be used to accurately estimate aggregate query answers,
and (2) reducing the number of queries required for sampling
- given the stringent requirement often put in place by real-
world social networks on the number of queries one can issue
per day.
Bias: In general, sampling bias is the “distance” between
the target (i.e., ideal) distribution of samples and the actual
sampling distribution - i.e., the probability for each tuple to be
retrieved as a sample. We shall further discuss a concrete bias
measure in the next subsection and an experimental measure
in Section V-A.3.
Query Cost: To this end, we consider the number of unique
queries one has to issue for the sampling process, as any
duplicate query can be answered from local cache without
consuming the query limit enforced by the social network
provider.
C. Random Walk
A random walk is a Markov Chain Monte Carlo (MCMC)
method which takes successive random steps on the above-
described graph G according to a transition matrix P =
7Note that without
introducing ambiguity, we use “node” and “social
network user” interchangeably in this paper.
Fig. 1. A concept of a random walk on the topologically modified overlay
graph.
easier now for a random walk to move from one component
to the other.
With the concepts of cross-cutting and non-cross-cutting
edges, we develop Modify TOpology Sampler
(MTO-
Sampler), a topology manipulation technique which first de-
termines6 whether a given edge in the graph is a cross-cutting
edge based solely upon knowledge of the local neighborhood
topology, and then removes the edge if it is non-cross-cutting.
MTO-Sampler may also “move” an edge by changing a node
connected to the edge if it is determined that, by doing so,
the new edge is more likely to be a cross-cutting edge. We
shall show in the paper that MTO-Sampler is capable of
significantly improving the efficiency of random walks: For
the example in Fig 1, MTO-Sampler is capable of reducing the
mixing time (i.e., query cost of a random walk) by 97%. We
also demonstrate through experimental results the significant
improvement of efficiency achieved by MTO-Sampler for real-
world social networks such as Epinions, Google Plus, etc.
The main contributions of our approach include:
• (Problem Novelty) We consider a novel problem of mod-
ifying the graph topology on-the-fly (during the random
walk process) for the efficient third-party sampling of
online social networks.
• (Solution Novelty) We develop MTO-Sampler which
determines whether an edge is (non-)cross-cutting based
solely upon local neighborhood knowledge retrieved by
the random walk, and then manipulates the graph topol-
ogy to significantly improve sampling efficiency.
• Our contributions also include extensive theoretical anal-
ysis (on various social network models) and experimental
evaluation on synthetic and real-world social networks
as well as online at Google+ which demonstrate the
superiority of our MTO-Sampler over the traditional
6Note that, as we shall prove in section III-A, it is impossible to assert
deterministically that an edge is cross-cutting. Nonetheless, it is possible to
assert deterministically that an edge is non-cross-cutting. Thus, our algorithm
has two possible outputs: non-cross-cutting or uncertain. We shall show in
the paper that it outputs non-cross-cutting for a large number of (non-cross-
cutting) edges in real-world social networks.
uvwuvSSuvSSww(b)(a)vvijww0GG'uvw(b)(a)uvwuvSSuvS'S'(b)(a)u0u0uvSSuvS'S'(d)(c)u0u0vursvursOverlay graph G*Original graph GwS*S*SS(puv ), u, v ∈ V , where puv represents the probability for
the random walk to transit from node u to v . The premise
here is that, after performing a random walk for a sufficient
number of steps, the probability distribution for the walk to
land on each node in G converges to a stationary distribution
π which then becomes the sampling distribution8 . There are
many different types of random walks, corresponding to the
different designs of P and different stationary distributions.
In this paper, we consider the simple random walk that has a
stationary distribution of π(v) = kv /(2E ) for all v ∈ V .
Definition 1: (Simple Random Walk). Given a current
node v , a simple random walk chooses uniformly at random
a neighboring node u ∈ N (v) and transit to u in the next step
(cid:26) 1/kv
- i.e.,
if u ∈ N (v),
(1)
Pvu =
otherwise.
0
One can see that each step of a simple random walk requires
exactly one query (i.e., q(v) to identify the neighborhood
of v and select the next stop u). Thus, the performance of
sampling - i.e., the tradeoff between bias and query cost -
is determined by how fast the random walk converges to the
stationary distribution. Formally, we measure the convergence
speed as the mixing time defined as follows.
Definition 2: (Mixing Time) Given G : (V , E ), after t
steps of simple random walk, the relative point-wise distance
between the current sampling distribution and the stationary
(cid:27)
(cid:26) P t
distribution is
uv − π(v)
(cid:52)(t) =
π(v)
max
u,v∈V ,v∈N (u)
(2)
uv is the element of P t with indices u and v . The
where P t
mixing time of the random walk is the minimum value of t
such that (cid:52)(t) ≤ where is a pre-determined threshold on
relative point-wise distance.
One can see from the definition that the relative point-wise
distance (cid:52)(t) measures the bias of the random walk after t
steps. Mixing time, on the other hand, captures the query cost
required to reduce the bias below a pre-determined threshold .
In the following subsection, we describe a key characteristics
of the graph that determines the mixing time - the conductance
of the graph.
D. Conductance: An Efficiency Indicator
Intuitively, the conductance Φ, which indicates how fast the
simple random walk converges to its stationary distribution,
measures how “well-knit” a graph is. Specifically, the conduc-
tance is determined by a cut of the graph G - i.e., a partition
of V into two disjoint subsets S and ¯S - which minimizes the
ratio between the probability for the random walk to move
from one partition to the other and the probability for the
random walk to stay in the same partition. Formally, we have
the following definition.
8 That is, if we take the end node as a sample
Definition 3: (Conductance). The conductance9 of a graph
G : (V , E ) is
min (cid:8){euv u ∈ S, v ∈ V }, {euv u ∈ ¯S , v ∈ V }(cid:9) .
{euv u ∈ S, v ∈ ¯S }
Φ(G) = min
S⊆V
The relationship between the graph conductance and the
mixing time of a simple random walk is illustrated by the
(cid:19)t
(cid:18)
following inequality [3]:
1 − Φ(G)2
2
(1 − 2Φ(G))t ≤ (cid:52)(t) ≤
2E
minv∈V kv
One can see that the graph conductance Φ(G) ranges between
0 and 1 - and the larger Φ(G) is, the smaller the mixing time
will be (for a fixed threshold ). Also note from (3) the log
scale relationship between Φ(G) and the mixing time. This
indicates a small change on Φ(G) may lead to a significant
(cid:18)
(cid:19)t ≤
change of the mixing time. Let
2E
(cid:33)
(cid:32)
1 − Φ(G)2
minv∈V kv
2
⇒ t ≥
1
log(1 − Φ(G)2 )
log
⇒ t ≥ −
1
log(1 − Φ(G)2 )
2E
minv∈V kv
log(c/)
.
(3)
(4)
(5)
(6)
2E
Here c =
. For example, increasing conductance
minv∈V kv
from 0.010 to 0.012 will change the mixing time from
46050.5 · log(c/) to 31979.1 · log(c/).
graph in the running example is Φ(G) = 1/((cid:0)11
(cid:1) + 1) =
Running Example: The conductance of the barbell
2
0.018. The corresponding (and unique) S and ¯S are
shown in Fig 1. Correspondingly, the mixing time to
reach a relative point-wise distance of (cid:52)(t) ≤ is
bounded from above by 14212.3 · log(22.2/). We shall
show throughout the paper how our on-the-fly topology
modification techniques can significantly increase con-
ductance and reduce the mixing time for this running
example.
E. Key for Conductance: Cross-Cutting Edges
A key observation from Definition 3 is that
the graph
conductance critically depends on the number of edges which
{euv u ∈ S, v ∈ ¯S }. The
“cross-cut” S and ¯S - i.e.,
more such cross-cutting edges there are, the higher the graph
conductance is likely to be. On the other hand, since a non-
cross-cutting edge is only counted in the denominator, the
more non-cross-cutting edges there are in the graph, the lower
the conductance is likely to be. Formally, we define cross-
cutting edges as follows.
Definition 4: (Cross-cutting edges). For a given graph
G(V , E ), an edge euv is a cross-cutting edge if and only if
9Rigidly, the conductance is determined by both the graph topology and
the transition matrix of the random walk. Here we tailor the definition to the
simple random walk considered in this paper.
ϕ(S ) =
there exists S ⊆ V such that u ∈ S , v ∈ ¯S where ¯S = V \S ,
and
min (cid:8){euv u ∈ S, v ∈ V }, {euv u ∈ ¯S , v ∈ V }(cid:9)
{euv u ∈ S, v ∈ ¯S }
takes the minimum value among all possible S ⊆ V .
We note that in large graphs such as online social networks, it
is reasonable to assume that the number of cross-cutting edges
is relatively small when compared to total number of edges in
S or ¯S .
One can see that our objective of on-the-fly topology
modification is then to increase the number of cross-cutting
edges and decrease the number of non-cross-cutting edges as
much as possible. We describe our main ideas for doing so in
the next section.
Running Example: For the barbell graph, adding any
edge between the two halves of the graph produces a
new cross-cutting edge, and increases the graph conduc-
tance from Φ(G) = 0.018 to 0.035 - i.e., the mixing-
time will be reduced to 3758.1/14212.3 = 0.264 - a
significant reduction of 75%.
I I I . MA IN ID EA S O F ON -TH E -F LY TO PO LOGY
MOD I FICAT ION
A. Technical Challenges: Negative Results
One can see from Section II-E that the key for increasing
the conductance of a social network (and thereby reducing
the query cost of sampling) through topology modification
is to determine whether an edge is a cross-cutting edge or
not. Unfortunately, the deterministic identification of a cross-
cutting edge is a hard problem (in the worst case) even if the
entire graph topology is given as prior knowledge, as shown
in the following theorem.
Theorem 1: The problem of determining whether an edge
is cross-cutting or not is NP-hard.
Proof: Consider the case of equal transition probability
for each edge. The problem of finding all cross-cutting edges is
equivalent with finding the optimum cut of the graph according
to the Cheeger constant - a problem proved to be NP-hard [7].
Given the worst-case hardness result, we now consider
the best-case scenario - i.e.,
is there any graph topology
(which is not the worst-case input, of course) for which it
is possible to efficiently identify cross-cutting edges? It is
easy to see that, if the entire graph topology is given, then
there certainly exist such graphs - with the original graph in
Fig 1 being an example - for which the cross-cutting edge(s)
can be straightforwardly identified. Nonetheless, our interest
lies on making such identifications based solely upon local
neighborhood knowledge - because of the aforementioned
restrictions of online social-network interfaces. The following
theorem, unfortunately, shows that it is impossible for one to
deterministically confirm the cross-cutting nature of an edge
unless the entire graph topology has been crawled.
Fig. 2. By cloning graph G, we can always construct graph G(cid:48) such that
simply adding an edge e : (vi , vj ) may decrease the conductance.
Theorem 2: Given the local neighborhood topology of ver-
tices accessed by a third-party sampler, {v1 , . . . , vk } ⊂ V
in G(V , E ) where k < V , for any given edge e : (vi , vj ),
there must exist a graph G(cid:48) (V (cid:48) , E (cid:48) ) such that: (1) e : (vi , vj )
is not a cross-cutting edge for G(cid:48) , and (2) G and G(cid:48) are
indistinguishable from the view of the sampler - i.e., there
exists {v (cid:48)
k } ⊂ V (cid:48) which have the exactly same local
1 , . . . , v (cid:48)
neighborhood as {v1 , . . . , vk }.
Proof: The construction of G(cid:48) can be stated as follows:
n and e extra edges into
First, insert n extra vertices v0
1 , . . . , v0
the graph, such that ∀e : (vi , vj ) ∈ E , there is e0 : (v0
i , v0
j )
in the new graph. Note that at this moment, there is no edge
between any vi and v0
j . Then, in the second step, identify from
G a vertex w which has not been accessed by the sampler -
i.e., w (cid:54)⊆ {v1 , . . . , vk } - and insert into the graph an edge
e : (w, w0 ). One can see that the only cross-cutting edge in
the output graph G(cid:48) is (w, w0 ) - i.e., e : (vi , vj ) cannot be a
cross-cutting edge for G(cid:48) . An intuitive demonstration of the
proof is shown in Fig 2.
It is important to note from the theorem, however, that
it still
leaves two possible ways for one to increase the
conductance of a social network based on only the local
neighborhood knowledge: (1) While the theorem indicates that
it is impossible to deterministically confirm the cross-cutting
nature of an edge, it may still be possible to deterministically
disprove an edge from being cross-cutting - i.e., we may prove
that an edge is definitely non-cross-cutting based on just local
neighborhood knowledge, and therefore remove it to increase
the conductance deterministically. (2) It is still possible to
conditionally or probabilistically evaluate the likelihood of
an edge being cross-cutting - e.g., we may determine that
an edge absent from the original graph is more likely to be
a cross-cutting edge (if added) than an existing edge, and
thereby replace the existing edge with the new one to increase
the conductance in a probabilistic fashion. We consider the
removal and replacement strategies, respectively, in the next
two subsections.
B. Deterministic Identification of Non-cross-cutting Edges
To illustrate the main idea of our deterministic identification
of non-cross-cutting edges (for removals), we start with an
example in Fig 3 to show why we can determine, based solely
upon the local neighborhoods of u and v as shown in the graph,
that e : (u, v) (henceforth denoted by euv ) in the Fig is not a
uvSSuvS'S'(b)(a)u0u0uvwuvw(b)(a)uvSSuvSSww(b)(a)vvijww0GG'(c)). Then, drag one of u and v to ensure that both of them
are in this more popular partition under the new configuration.
One can see that, since at most 2 common neighbors of u
and v are in the less popular partition, the number of cross-
cutting edges under the new configuration is at most 2 ∗ 2 + 1,
where 2 ∗ 2 is the number of cross-cutting edges associated
with the 2 common neighbors in the less popular partition (at
most 2 for each), and 1 is the number of cross-cutting edge
associated with the other (non-common) neighbor of the node
being dragged (i.e., u0 in Fig 3 (a)).
The following theorem depicts the general case for which
we can remove an edge on-the-fly to increase the graph
conductance. Recall that N (u) and ku represent the set of
neighbors and the degree of a node u, respectively.
Theorem 3: [Edge Removal Criteria]: Given G(V , E ),
∀u, v ∈ V , if euv ∈ E and
(cid:25)
(cid:24) N (u) ∩ N (v)
2
max{ku , kv },
+ 1 >
(7)
1
2
then euv is not a cross-cutting edge.
Proof: Let n = N (u) ∩N (v), without losing generality,
assuming u ∈ S, v ∈ ¯S , then there must be n cross-cutting
edges in these n disjoint paths of length 2 between u and
v . We denote nu , nv as the number of cross-cutting edges in
these n paths connected with u and v, so nu + nv = n. One
can see that if we try to “drag” u from u ∈ S to u ∈ ¯S , all
the edges connected with u would be modified, e.g. flip the
the assumption from inequality (7): (cid:6) n
(cid:7)+1 > 1
edges linked to u, which means the old cross-cutting edges
will be the new non-cross-cutting edges, and vice versa. As
2 max{ku , kv },
2
2 ku or nv + 1 > 1
2 kv holds. Without
so either nu + 1 > 1
losing generality, assuming for vertex u the inequality holds,
we change u from set S to ¯S , so the number of cross-cutting
edges must be strictly decreasing. Since we have assumed that
the number of edges in S or ¯S is much greater than the number
of cross-cutting edges, so Φ(G) must decrease according to
the decrease of the number of cutting-edges, which leads to
the contradiction of euv is a cross-cutting edge.
Due to space limitations, please refer to the technical report
[23] for the proofs of all theorems in the rest of the paper.
Intuitively, theorem 3 gives us a clue that if two nodes have
enough common neighbors, then we can deterministically say
that the edge between them is non-cross-cutting. Moreover, (7)
is tight - i.e., if it does not hold, then we can always construct
a counter example where euv is cross-cutting - as shown in
the following theorem.
(cid:25)
(cid:24) N (u) ∩ N (v)
Corollary 1: For all N (u), N (v), ku , kv which satisfy
2
max{ku , kv },
+ 1 ≤ 1
2
(8)
there always exists a graph G(V , E ) in which euv is cross-
cutting.
Fig. 3. A figure shows that the edge euv cannot be the cross-cutting edge
in theorem 3. Locally, (a) and (c) have 6 cross-cutting edges, while (b) and
(d) only have 5 of them.
cross-cutting edge. The intuition behind this is fairly simple:
When u and v share a large number of common neighbors
(e.g., 5 in Fig 3) but have relatively few other edges (e.g., 1
each in Fig 3), it is highly unlikely for the partition to cut
through euv rather than the other edges of u and v - e.g.,
(u, u0 ) in Fig 3 - if it cuts through any edges associated with
u and v at all.
The rigid (dis-)proof can be constructed with contradiction.
Suppose euv is a cross-cutting edge between two partitions of
the graph, S and ¯S . One can see that since u and v belong to
different partitions, there must be at least 6 cross-cutting edges
in the subgraph (Fig 3 (a) depicts an example). We now show
in the following discussion that this is actually impossible
because one can always construct another partition S (cid:48) and
¯S (cid:48) (by “dragging” u and v into the same part) and reduce
the number of cross-cutting edges to at most 5. Note that this
contradicts the definition of S and ¯S being a configuration
which minimizes the number of cross-cutting edges. Thus, euv
cannot be a cross-cutting edge.
To understand how the construction of S (cid:48) and ¯S (cid:48) works,
consider Fig 3 (b) as an example. For the partition illustrated
in Fig 3 (a), we can “drag” u into ¯S to form the new
configuration, such that the number of cross-cutting edges
associated with u and v is now at most 5, as shown in Fig 3 (b).
Note that the other edges not shown in the subgraph (no matter
cross-cutting or not) are not affected by the re-configuration,
because all vertices associated with u are already known in
the local neighborhood of u (shown in Fig 3).
More generally, for the other possible settings of S and ¯S
(such as Fig 3(c)), one can construct the re-configuration in
analogy with the following general principle: First, find the
“more popular” partition (i.e., either S or ¯S ) among the 5
common neighbors of u and v (e.g., ¯S in Fig 3 (a) or Fig 3
uvwuvSSuvSSww(b)(a)vvijww0GG'uvw(b)(a)uvwuvSSuvS'S'(b)(a)u0u0uvSSuvS'S'(d)(c)u0u0vursvursOverlay graph G*Original graph GwS*S*SSFig. 4. Replace the edge euv with euw
Fig. 5. A demo shows that euv cannot be a cross-cutting edge in theorem
VIII.
Running Example: With our on-the-fly edge removals,
any random walk is essentially following an overlay
topology G∗ which can be constructed by applying
Theorem 3 to every edge in the original graph G. For
the bar-bell running example, the solid lines in Fig 1
depicts G∗ . The conductance is now Φ(G∗ ) = 0.053.
Compared with the original conductance of 0.018, the
corresponding lower bound on mixing time is reduced
to 1638.3/14212.3 = 0.115 of the original value - a
reduction of 89%.
C. Conditional Identification of Cross-cutting Edges
We now describe our second idea of conditionally identify-
ing cross-cutting edges. We start with an example in Fig 4 to
show why we can replace an existing edge with a new one
such that (1) the new edge is more likely to be crosscutting,
and (2) the replacement is guaranteed to not decrease the
conductance.
Specifically, consider the replacement of euv by euw given
the neighborhoods of u and v . A key observation here is that
euv and evw cannot be both cross-cutting edges. The reason
is that otherwise we could always “drag” v into the same
partition as u and w to reduce the number of cross-cutting
edges by at least 1. Given this key observation, one can see
that the replacement of euv by euw will only have two possible
outcomes:
• if euv is a cross-cutting edge, then euw must also be a
cross-cutting edge because, due to the observation, evw
cannot be a cross-cutting edge. Thus, the replacement
leads to no change on the graph conductance.
• if euv is not a cross-cutting edge, then replacing it with
euw will either keep the same conductance, or increase
the conductance if euw is cross-cutting.
As such, the replacement operation never reduces the conduc-
tance, and might increase it when euw is cross-cutting. More
generally, we have the following theorem.
Theorem 4: Given G(V , E ), ∀v ∈ V , if kv = 3, u, w ∈
N (v), then replacing edge euv with euw will not decrease the
conductance, while it also has positive possibility to increase
the conductance.
Next, we are going to prove that kv = 3 is actually the
only case when replacement is guaranteed to not reduce the
conductance, as shown by the following corollary.
Corollary 2: For v ∈ V , if kv (cid:54)= 3, then there always exist
a graph G(V , E ), ∀u, w ∈ N (v), such that replacing euv with
euw will decrease the conductance or have no effect.
Running Example: With Theorem VIII, an example of
the replacement operations one can perform over the
bar-bell running example in Fig 1 is to replace eur with
erv , given that u (after edge removals) has a degree
of 3. Compared with the original conductance of Φ(G)
= 0.018 and the post-removal conductance of Φ(G∗ )
= 0.053, the conductance is now further increased to
Φ(G∗∗ ) = 0.105. The corresponding lower bound on
mixing time is reduced to 416.6/1638.3 = 0.25 of the
post-removal bound - a further reduction of 75% - and
416.6/14212.3 = 0.029 of the original bound - an overall
reduction of 97%.
D. Extension
If we know more about the user’s neighbors, especially the
common neighbors of the user and the random walk’s next
candidate, we will deterministically identify more non-cross-
cutting edges. When the random walk reaches the nodes we
have accessed before, we can use their degree information
without issuing extra web requests since we could retrieve
data from our local database.
Fig 5 (a) shows an example that with the extra degree
knowledge of u and v ’s common neighbor w , euv must be
a non-cross-cutting edge. As kw = 3, if we assume euv is a
cross-cutting edges, then there must be 3 cross-cutting edges
between u and v . However, there exists another configuration
Fig 5 (b), which only has 2 cross-cutting edges. Thus, it
contradicts the assumption that euv is a cross-cutting edge.
Noticed that if we do not know the degree of w , we could not
deterministically identify euv since theorem 3 does not apply
here.
(cid:24) N (u) ∩ N (v) − N ∗
(cid:25)
Theorem 5: Given G(V , E ), ∀u, v ∈ V , if euv ∈ E and
(cid:88)
(4−kw ) >
max{ku , kv },
1
1
+1+
2
2
2
w∈N ∗
(9)
we can assert that euv is not a cross-cutting edge. Here we
denote N ∗ = {w ∈ N (u) ∩ N (v) kw is known , 2 ≤ kw ≤
3}.
Intuitively, the edge between two nodes which have many
common neighbors has higher probability to be a non-cross-
cutting edge. Also, it is easy for us to find these edges in
online social networks. If a friend knows almost every other
uvSSuvS'S'(b)(a)u0u0uvwuvw(b)(a)uvSSuvSSww(b)(a)vvijww0GG'uvwuvSSuvS'S'(b)(a)u0u0uvwuvw(b)(a)uvSSuvSSww(b)(a)friends of a person, then this edge may be considered as non-
cross-cutting edge according to theorem 3 and VIII.
IV. A LGOR I THM MTO -SAM PL ER
A. Algorithm implementation
Algorithm description. To explain how the on-the-fly modi-
fication works, we demonstrate an example in Fig 6. Fig 6(a)
is an overlay graph G∗ that has been modified according to
former theorems, in which edges A, C and D are removed,
and edge B is replaced. Fig 6(b) shows one possible track of
how our MTO-sampler change the simple random walk. For
instance, when the random walk sees a node u, and ku = 3
(it satisfies the condition of replacement), then it may replace
an edge as we described in theorem VIII. The colored area
contains all the nodes that the random walk visits.
Algorithm 1 depicts the detailed procedure of MTO sampler,
and the stopping rule (which indicates that the random walk
should stop and output samples) can be any convergence
monitor used in Markov Chain.
Algorithm 1 MTO-Sampler for Simple Random Walk
for i = 1 → sample size do
Starting from vertex u
while !(Stopping rule) do
while N (u) ≥ 1 do
Uniformly pick a neighbor v , and issue a query
if euv is removable then
N (u) ← N (u) − {v}
continue
else if kv == 3 then
/* One of v ’s edge can be replaced*/
if choose to replace euv then
v ← v (cid:48)
else
N (u) ← N (u) ∪ {v (cid:48)}
choose u ← v or u ← v (cid:48) randomly
break
end if
end if
if rand(0, 1) < 1/2 then
u ← v
break
else
continue
end if
end while
end while
Record sample xi ← u
end for
Aggregate estimation and probability revision. After col-
lecting samples, we use Importance Sampling to directly
estimate the aggregate information through the samples from
the random walk’s stationary distribution τ .
Importance Sampling:
for i = 1 to Sample Size N do
xi ← sampling from τ
w(xi ) ← π(xi )
record f (xi ) /*Aggregate Function f (·) */
τ (xi )
(cid:80)N
end for
(cid:80)N
1
i=1 f (xi )w(xi )
Output estimation A(f (X )) =
N
1
i=1 w(xi )
N
The key challenge for MTO-Sampler using importance
sampling is to estimate the stationary distribution of MTO-
Sampler random walk τ ∗ . Since MTO-Sampler modifies the
topology, τ ∗ may not equal to the stationary distribution τ .
Here we have
k∗
τ ∗ (u) =
u
(10)
2E ∗ .
k∗
u is unknown in overlay graph G∗ , but we can draw simple
random sample from u’s neighbors in G∗ to get an unbiased
estimation of k∗
u .
,
(11)
B. Theoretical Model Analysis
In order to theoretically analysis the performance of MTO-
Sampler, we introduce a well known graph generation model:
Latent space model.
Latent space model. Latent space graph model [21] are
connecting two nodes with the probability related to their
distance in the latent space.
P (i ∼ j dij ) =
1
1 + eα(dij −r)
here dij is the distance between two nodes i and j ; r controls
the level of sociability of a node in this graph, and α is the
sharpness of the function.
We will show that in the following theorem if two nodes’
distance is smaller than a threshold d0 , then it is likely to be an
non-cross-cutting edge. Therefore, after finding the expected
number of edges that can be removed we can calculate the
increment of the conductance.
Theorem 6: Given a latent space graph model G(V , E ),
assume α = +∞, then the expected number of edges we
(cid:19)1/D(cid:33)(cid:33)
(cid:32)
(cid:32)
(cid:18) 1
can removed
E[R] ≥ E · P
d < V (r)
3
1 −
,
(12)
here V(r) is the volume of a hypersphere with radius r in D
dimensional latent space. The proof can be found at [23].
Simple simulations show that from 20000 points experi-
ment, one can get the empirical distribution of point-wise
distance. More specifically, If we let r = 0.7, a = 4 and
b = 5, D = 2, then
E[Φ(G∗ )] ≥ 1.052Φ(G)
We compared the experimental results together with this
theoretical bound of latent space model in section V-B.
(13)
(a) Modified overlay graph G∗
(b) Carry out the random walk by modify the topology on-the-fly. It
is identical to the random walk in overlay graph G∗ .
Fig. 6. A demo shows how the MTO-Sampler modifies the topology of the graph on-the-fly.
Dataset
Epinions [19]
Slashdot A [16]
Slashdot B [16]
#edges
#nodes
100120
26588
428714
70068
70999
436453
TABLE I
LOCA L DATA S ET S
90% diameter
4.8
4.5
4.5
V. EX PER IM EN T S
A. Experimental Setup
1) Hardware and Platform: We conducted all experiments
on a computer with Intel Core i3 2.27GHz CPU, 4GB RAM
and 64bit Ubuntu operating system. All algorithms were
implemented in Python 2.7. Our local, synthetic and online
datasets are stored in the in-memory Redis database and the
MongoDB database.
2) Datasets: We tested three types of datasets in the
experiments: local real-world social networks, Google Plus
online social network, and synthetic social networks - which
we describe respectively as follows.
Local Datasets: The local social networks - i.e., real-world so-
cial networks for which the entire topology is downloaded and
stored locally in our server. For these datasets, we simulated
the individual-user-query-only web interface strictly according
to the definition in Section 1, and ran our algorithms over
the simulated interface. The rationale behind using such local
datasets is so as we have the ground truth (e.g., real aggregate
query answers over the entire network) to compare against for
evaluating the performance of our algorithms.
Table I shows the list of local social networks we tested
with (collected from [1]). All three datasets are previously-
captured topological snapshots of Epinions and Slashdot, two
real-world online social networks. Since we focus on sampling
undirected graphs in this paper, for a real-world directed graph
(e.g., Epinions), we first convert it to an undirected one by only
keeping edges that appear in both directions in the original
directed graph. Note by following this conversion strategy, we
guarantee that a random walk over the undirected graph can
also be performed over the original directed graph, with an
additional step of verifying the inverse edge (resp. v → u)
before committing to an edge (resp. u → v ) in the random
walk. The number of edges and the 90% effective diameter
reported in Table I represent values after conversion.
Google Plus Online Social Graph: We also tested a second
type of dataset: remote, online, social networks for which we
have no access to the ground truth. In particular, we chose
the Google Plus10 network because its API11 is the most
generous among what we tested in terms of the number of
accesses allowed per IP address per day. Using random walk
and MTO-Sampler random walk, we have accessed 240,276
users in Google Plus. We observed that the interface provided
by Google Social Graph API strictly adheres to our model of
an individual-user-query-only web interface, in that each API
request returns the local neighborhood of one user. We also
collected the data of users’ self-description.
Synthetic Social Networks: One can see that, for the real-
world social network described above, we cannot change
graph parameters such as size, connectivity, etc, and observe
the corresponding performance change of our algorithms. To
do so, we also tested synthetic social networks which were
generated according to theoretical models. In particular, we
tested the latent space model.
We note that, since the effectiveness of these theoretical
models are still under research/debate, we tested these syn-
thetic social networks for the sole purpose of observing the
potential change of performance for social networks with
different characteristics. The superiority of our algorithm over
simple random walk, on the other hand, is tested by our
experiments on the two types of real-world social networks.
Implementation and Evaluation: Algo-
3) Algorithms
rithms: We tested four algorithms, the simple random walk
(i.e., baseline), Metropolis Hastings Random Walk (MHRW),
Random Jump (RJ) and our MTO-Sampler, and compared their
performance over all of the above-described datasets.
Input Parameters: Both simple random walk and our MTO-
sampler are parameter-less algorithms with one exception:
They both need a convergence indicator to determine when
10 https://plus.google.com/
11 The
found
be
can
its Python wrapper
source
code
of
https://github.com/pct/python-googleplusapi. After April 20, 2012,
social graph api will be fully retired.
at
this
uvuvuvuvuvuvwuvwuvwuvuvSSSSuvSSN*uvuvv'uvv'Option (a)uvv'uvv'Option (b)vursvursOverlay graph G*Original graph GC1C2uvSSC1C2ABABCABCDuvuvuvuvuvuvwuvwuvwuvuvSSSSuvSSN*uvuvv'uvv'Option (a)uvv'uvv'Option (b)vursvursOverlay graph G*Original graph GC1C2uvSSC1C2ABABCABCDDuvZ =
(14)
the random walk has reached (or become sufficiently close to)
the stationary distribution - so a sample can be retrieved from
it. In the experiments, we used the Geweke indicator [9], one
of the most popularly used methods in the literature, which
we briefly explain as follows.
Given a sequence of nodes retrieved by a random walk, the
Geweke method determines whether the random walk reaches
the stationary distribution after a burn-in of k steps by first
constructing two “windows” of nodes: Window A is formed
by the first 10% nodes retrieved by the random walk after
the k-step burn-in period, and Window B formed by the last
50%. One can see that, if the random walk indeed converges to
the stationary distribution after burn-in, then the two windows
should be statistically indistinguishable. This is exactly how
the Geweke indicator tests convergence. In particular, consider
any attribute θ that can be retrieved for each node in the
network (a commonly used one is degree that applies to every
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ,
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ¯θA − ¯θB
graph). Let
(cid:113)
θ + SB
SA
θ
where ¯θA and ¯θB are means of θ for all nodes in Windows A
and B , respectively, and SA
θ and SB
θ are their corresponding
variances. One can see that Z → 0 when the random walk
converges to the stationary distribution. Thus, the Geweke
indicator confirms convergence if Z falls below a threshold. In
the experiments, we set the threshold to be Z ≤ 0.1 by default,
while also performing tests with the threshold ranging from
0.01 to 1.
Performance Measures for Sampling: As mentioned in
Section II-B, a sampling technique for online social net-
p(v) = deg(v)/ (cid:80)
works should be measured by query cost and bias - i.e.,
the distance between the (ideal) stationary distribution (i.e.,
v deg(v) for a simple random walk) and the
actual probability distribution for each node to be sampled. To
measure the query cost, we simply used the number of unique
queries issued by the sampler. Bias, on the other hand, is more
difficult to measure, as shown in the following discussions.
For a small graph, we measured bias by running the sampler
for an extremely long amount of time (long enough so that
each node is sampled multiple times). We then estimated the
sampling distribution by counting the number of times each
node is retrieved, and compared this distribution with the ideal
one to derive the bias. In particular, we measured bias as
the KL-divergence between the two distributions, specifically
DKL (P Psam ) + DKL (Psam P ), where P and Psam are the
ideal distribution and the (measured) sampling distribution,
respectively.
For a larger graph, one may need a prohibitively large
number of queries to sample each node multiple times. To
measure bias in this case, we use the collected samples to
estimate aggregate query answers over all nodes in the graph,
and then compare the estimation with the ground truth. One
can see that, a sampler with a smaller bias tends to produce an
estimation with lower relative error. Specifically, for the local
social networks, we used the average degree as the aggregate
query (as only topological information is available for these
networks). For the Google Social Graph experiment, we tested
various aggregate queries including the average degree and the
average length of user self-description.
Finally, to verify the theoretical results derived in the paper,
we also tested a theoretical measure: the mixing time of the
graph. In particular, we continuously ran our MTO-Sampler
until it hits each node at least once - so we could actually
obtain the topology of the overlay graph (e.g., as in Fig 1).
Then, we computed the mixing time of the overlay graph
(from the Second-Largest Eigenvalue Modulus (SLEM) of its
adjacency matrix12 , see [6]). We would like to caution that,
while we used it to verify our theoretical results of MTO-
Sampler never decreasing the conductance of a graph, this
theoretically computed measure does not replace the above-
described bias vs. query cost tests because it is often sensitive
to a small number of “badly-connected” nodes (which may
not cause significant bias for practical purposes).
B. Performance Comparison Between Simple Random Walk
and MTO-Sampler
We started by comparing the performance of Simple Ran-
dom Walk (SRW) and MTO-Sampler over real-world social
networks using all
three performance measures described
above - KL-divergence, relative error vs. query cost, and
theoretical mixing time.
Local Datasets: We started by testing the relative error
vs. query cost tradeoff of SRW, MTO, MHRW and RJ for
estimating aggregate query answers. Since only topological
information is available for local datasets, we used the average
degree as the aggregate query. Fig 7 depicts the performance
comparison for the three real-world social networks. Here each
point represents the average of 20 runs of each algorithm, and
the query cost (i.e., y-axis) represents the maximum query
cost for a random walk to generate an estimation with relative
error above a given value (i.e., x-axis). For random jump in
the experiments, we set the probability of jumping as 0.5. One
can see that, for all three datasets, our MTO-Sampler achieves
a significant reduction of query cost compared with the SRW
sampler, MHRW sampler and Random Jump sampler.
We also tested the KL-divergence measured by performing
an extremely long execution of SRW and MTO in Fig 8 -
with each producing 20000 samples - to estimate the sampling
probability for each node. The Geweke threshold was set
to be 0.1 for the test. One can see that our MTO-Sampler
not only requires fewer queries for generating each sample
(i.e., converges to the stationary distribution faster), but also
produces less bias than the SRW sampler.
To further test the bias of samples generated by our MTO-
Sampler, we also conducted the test while varying the Geweke
threshold from 0.1 to 0.8 on the dataset Slashdot B. Fig 9
12 Typical theoretical mixing time of Simple Random Walk can be defined
as Θ(1/ log(1/µ)), where µ is SLEM of transition matrix P .
(a) Slashdot A
(b) Slashdot B
(c) Epinions
Fig. 7. Bias vs. Query Cost tests for local datasets’ average degree.
Fig. 8. Comparison between SRW and MTO on
query cost and the Kullback–Leibler divergence
measure defined in Section V-A.3 over all three
datasets.
Fig. 9. Varying Geweke Threshold to get different
KL divergence on dataset Slashdot B. KL and
QC stands for KL divergence and Query Cost
respectively.
Fig. 10. Comparison of theoretical mixing time
on latent space graph model. MTO Both: Remove
and replace edges. MTO RM: Only remove edges.
MTO RP: Only replace edges.
depicts the change of measured bias for SRW and MTO,
respectively. One can see from the figure that our MTO-
Sampler achieves smaller bias than SRW for all cases being
tested. In addition, a smaller threshold leads to a smaller bias
and larger query cost, as indicated by the definition of Geweke
convergence monitor.
Google Plus online social network: For Google Plus, we
do not have the ground truth as the entire social network
is too large (about 85.2 million users in Feb 201213 ) to be
crawled. Thus, we performed the tests in two steps. First, we
continuously ran each sampler until their Geweke convergence
monitor indicated that it had reached its stationary distribution.
We then used the final estimation as the presumptive ground
truth which we refer to as the converged value. In the second
step, we used the converged value to compute the relative error
vs. query cost tradeoff as previously described.
Fig 11(a) shows the estimated average degree when running
SRW and MTO-Sampler random walk on Google Plus. It
clearly shows that MTO-Sampler’s variance is smaller and
converges faster than simpler random walk. Fig 11(b) and
11(c) illustrate the comparison between SRW and MTO of
the relative error vs query cost of multiple attributes. We note
that the self-description length is the number of characters in
13 Estimated by Paul Allen’s model, http://goo.gl/nZCzN
users’ self-description. One can see that our MTO-Sampler
significantly outperforms SRW.
Synthetic Social Networks: Finally, we conducted further
analysis of our MTO-Sampler, in particular the individual
effects of edge removals (RM) and edge replacements (RP),
using the synthetic latent space model described in Section V-
A.2. Fig 10 depicts the results when the number of nodes in
the graph varies from 50 to 100 (with the latent space model,
we distributed these nodes in an area of [0, 4] × [0, 5], and
set r = 0.7). We derived the theoretical mixing time from the
second largest eigenvalue modulus of the transition matrix.
Note that Fig 10 also includes the theoretical bound derived
in Section 4.2. One can see from the figure that our final
MTO-Sampler achieves better efficiency than the individual
applications of edge removal and replacement. In addition,
the theoretical model represents a conservation estimation that
is outperformed by the real efficiency of MTO-Sampler -
consistent with our results in Section 4.2.
V I . R E LATED WORK
Sampling from online social networks. Several papers [2],
[13], [15] have considered sampling from general large graph,
and [10], [12], [18] focus on sampling from online social
networks.
0.10.120.140.160.180.2020004000600080001000012000Relative ErrorQuery Cost SRWMTOMHRWRJ0.10.120.140.160.180.20200040006000800010000Relative ErrorQuery Cost SRWMTOMHRWRJ0.10.150.20.250.30500100015002000250030003500Relative ErrorQuery Cost SRWMTOMHRWRJ0.10.20.30.40.50.60.70.8Geweke Threshold0.180.200.220.240.260.280.300.32Kullback-Leibler divergenceKL_SRWKL_MTOQC_SRWQC_MTO0100002000030000400005000060000Query Cost505560657075Number of Nodes50100150200250Mixing TimeOriginal GraphTheoretical BoundMTO_BothMTO_RMMTO_RP(a) Estimated Average Degree
(b) Average Degree
(c) Average Self-description Length
Fig. 11. Google Plus online social network
With global topology, [15] discussed sampling techniques
like random node, random edge, random subgraph in large
graphs. [11] introduced Albatross sampling which combines
random jump and MHRW. [10] also demonstrated true uniform
sampling method among the users’ id as “ground-truth”.
Without global
topology, [10], [15] compared sampling
techniques such as Simple Random Walk, Metropolis-Hastings
Random Walk and traditional Breadth First Search (BFS) and
Depth First Search (DFS). Also [4], [10] considered many
parallel random walks at the same time, and MTO-sampler
can be applied to each parallel random walk straightforwardly,
since it is an parameter-free and online algorithm.
Moreover, to the best of our knowledge, random walk is still
the most practical way to sampling from large graphs without
global topology.
Shorten the mixing time of random walks. [18] found
that
the mixing time of typical online social networks is
much larger than anticipated, which validates our motivation to
shorten the mixing time of random walk. [5] derived the fastest
mixing random walk on a graph by convex optimization on
second largest eigenvalue of the transition matrix, but it need
the whole topology of the graph, and its high time complexity
make it inapplicable in large graphs.
Theoretical models of online social network. [22] compared
latent space model with real social network data. [8] intro-
duced hybrid graph model to incorporate the small world phe-
nomenon. [20] also measured the difference between multiple
synthetic graphs and real world social network graphs.
V I I . CONC LU S ION S
In this paper we have initiated a study of enabling faster
random walk over an online social network (with a restrictive
web interface) by “rewiring” the social network on-the-fly. We
showed that the key for speeding up a random walk is to
increase the conductance of the graph topology followed by
the random walk. As such, we developed MTO-Sampler which
provably increases the graph conductance by constructing
an overlay topology on-the-fly through edge removals and
replacements. We provided theoretical analysis and extensive
experimental studies over real-world social networks to illus-
trate the superiority of MTO-Sampler on achieving a smaller
sampling bias while consuming a lower query cost.
R E F ER ENC E S
[1] Stanford large network dataset collection http://snap.stanford.
edu/data/.
[2] E. M. Airoldi.
Sampling algorithms for pure network topologies.
SIGKDD Explorations, 7:13–22, 2005.
[3] N. Alon. Eigenvalues and expanders. Combinatorica, 6:83–96, 1986.
10.1007/BF02579166.
[4] N. Alon, C. Avin, M. Koucky, G. Kozma, Z. Lotker, and M. R. Tuttle.
Many random walks are faster than one. In SPAA, 2008.
[5] S. Boyd, P. Diaconis, and L. Xiao. Fastest mixing markov chain on a
graph. SIAM REVIEW, 46:667–689, 2003.
[6] S. Boyd, A. Ghosh, and B. Prabhakar. Mixing times for random walks
on geometric random graphs. SIAM ANALCO, 2005.
[7] F. Chung. Random walks and local cuts in graphs. Linear Algebra and
its Applications, 423(1):22–32, May 2007.
[8] F. Chung and L. Lu. The small world phenomenon in hybrid power
law graphs. In Complex Networks, (Eds. E. Ben-Naim et. al.), Springer-
Verlag, pages 91–106. Springer, 2004.
[9] J. Geweke. Evaluating the accuracy of sampling-based approaches to
In IN BAYESIAN STATISTICS,
the calculation of posterior moments.
pages 169–193. University Press, 1992.
[10] M. Gjoka, M. Kurant, C. T. Butts, and A. Markopoulou. Walking in
facebook: A case study of unbiased sampling of osns. In INFOCOM,
2010.
[11] L. Jin, Y. Chen, P. Hui, C. Ding, T. Wang, A. V. Vasilakos, B. Deng, and
X. Li. Albatross sampling: robust and effective hybrid vertex sampling
for social graphs. In MobiArch, 2011.
[12] L. Katzir, E. Liberty, and O. Somekh. Estimating sizes of social networks
via biased sampling. In WWW, 2011.
[13] M. Kurant, M. Gjoka, C. T. Butts, and A. Markopoulou. Walking on a
graph with a magnifying glass: stratified sampling via weighted random
walks. In SIGMETRICS, 2011.
[14] C.-H. Lee, X. Xu, and D. Y. Eun. Beyond random walk and metropolis-
hastings samplers: Why you should not backtrack for unbiased graph
sampling. In Sigmetrics, 2012.
[15] J. Leskovec and C. Faloutsos. Sampling from large graphs. In SIGKDD,
2006.
[16] J. Leskovec, K. Lang, A. Dasgupta, and M. Mahoney. Community
structure in large networks: Natural cluster sizes and the absence of
large well-defined clusters. Internet Mathematics, 6(1):29–123, 2009.
[17] L. Lov ´asz. Random walks on graphs: A survey. Combinatorics, Paul
Erdos is Eighty, 2(1):1–46, 1993.
[18] A. Mohaisen, A. Yun, and Y. Kim. Measuring the mixing time of social
graphs. In SIGCOMM, 2010.
[19] M. Richardson, R. Agrawal, and P. Domingos. Trust management for
the semantic web. In ISWC, 2003.
[20] A. Sala, L. Cao, C. Wilson, R. Zablit, H. Zheng, and B. Zhao.
Measurement-calibrated graph models for social network experiments.
In WWW, 2010.
[21] P. Sarkar, D. Chakrabarti, and A. W. Moore. Theoretical justification of
popular link prediction heuristics. In COLT, 2010.
010002000300040005000510152025Query CostEstimated Average Degree SRWMTO0.10.150.20.250.30.350.40.450.50500100015002000250030003500400045005000Relative ErrorQuery Cost SRWMTO0.10.150.20.250.30.350.40.450.5300035004000450050005500Relative ErrorQuery Cost SRWMTOFig. 13. When replacing euv with euw from a node v whose degree is larger
than 3, it may decrease the conductance if both euv and ewv are cross-cutting
edges.
Fig. 12. An counter example of lemma 1 that edge euv must be a cross-
cutting edge.
[22] P. Sarkar and A. W. Moore. Dynamic social network analysis using latent
space models. SIGKDD Explor. Newsl., 7:31–40, December 2005.
[23] Z. Zhou, N. Zhang, Z. Gong, and G. Das. http://www.seas.gwu.
edu/nzhang10/rewiring.pdf.
V I I I . A P PEND IX
(cid:24) N (u) ∩ N (v)
(cid:25)
Corollary 1. For all N (u), N (v), ku , kv which satisfy
max{ku , kv },
+ 1 ≤ 1
2
2
there always exists a graph G(V , E ) in which euv is cross-
cutting.
(15)
Proof: Let n = N (u)∩N (v). We only need to construct
a counter-example for each case that satisfies (15), but euv is a
cross-cutting edge. Assume we have a graph like Fig 12, which
shows the whole view of it. We let the number of common
neighbors of node u and v be n. Assuming ku ≥ kv , from
(cid:26) Ou = max{ku , kv } − n − 1 ≥ 1,
(15) we get:
if n is even
(16)
Ou = max{ku , kv } − n − 1 ≥ 2,
if n is odd
Here Ou = {ewu w ∈ N (u) − N (v) ∪ {v}}, which denotes
the outer edges of u which is not linked to the node v and
their common neighbors. We can carefully construct a graph
like Fig 12: for each neighbor of node u and v , it only has
1-degree neighbors. So we need to prove that after assigning
the degree for each node, euv will be a cross-cutting edge. If
we simply let:
kw (cid:29) max{ku , kv } ∀w ∈ {V − {u, v}}
(17)
and then we divide these nodes into two sets S and ¯S .
Suppose n is even. In order to achieve the minimum in the
(cid:26) n + 1,
definition of conductance, there must exist the case such that
we only need to decide whether node u is in S or in ¯S .
if u ∈ S
# Cross-Cutting Edges =
(18)
n + Ou ,
if u ∈ ¯S
If Ou > 1, we can easily assert that euv is a cross-cutting
edge. If Ou = 1, we can let a(S ) = a( ¯S ) when u ∈ S
to minimize min{a(S ), a( ¯S )}. So euv is an cross-cutting
(cid:26) n + 1,
edge under this circumstance.
Also, suppose n is odd. Similarly, we have
if u ∈ S
(19)
# Cross-Cutting Edges =
if u ∈ ¯S
2 (cid:99) + Ou ,
2(cid:98) n
Since Ou ≥ 2, in the same way we know that euv is a cross-
cutting edge.
Theorem 4. Given G(V , E ), ∀v ∈ V , if kv = 3, u, w ∈
N (v), then replacing edge euv with euw will not decrease the
conductance, while it also has positive possibility to increase
the conductance.
Proof: First, no matter euv is a cross-
cutting edge or not, replace it with euw should at least obtain
the same conductance. If euv is not a cross-cutting edge,
then obviously we are not going to decrease the conductance
because a(S ) or a( ¯S ) will not change. If euv is a cross-cutting
edge, we only need to prove that euw is also a cross-cutting
edge. Let’s assume euw is not a cross-cutting edge, then we
can infer that the evw is a cross-cutting edge. But v only has
degree of 3, so it is obvious that letting u, v and w be the
same side will achieve less conductance, which contradicts the
definition of conductance.
But if evw is a cross-cutting edge, and we replace euv with
euw , then euw has the positive probability to become one more
cross-cutting edge in this local view of u, v and w , which result
in higher conductance.
Corollary 2. For v ∈ V , if kv (cid:54)= 3, then there always
exist a graph G(V , E ), ∀u, w ∈ N (v), such that replacing
euv with euw will decrease the conductance or have no effect.
Proof:
If kv = 1, then we could not cut it to disconnect the
graph. If kv = 2, we need to check some possible situations.
If none of these edges linked to v are cross-cutting edges,
then replacing would not has effect on the conductance. If
either euv or ewv is a cross-cutting edge, then replace one of
them with euw will not generate another cross-cutting edge;
because now kv = 1, and it should belongs to one side of the
separation, S or ¯S .
So we only need to consider the situation when kv ≥ 4. See
Fig 13. There exist the case when both euv and ewv are cross-
cutting edges. Then replacing euv with ewv would decrease the
number of cross-cutting edges from 2 to 1 locally, which may
lead to dramatic decrease of the conductance of the graph.
uvuvuvuvwuvwuvwuvuvSSSSuvSSN*uvuvv'uvv'Option (a)uvv'uvv'Option (b)C1C2uvSSC1C2ABABCDABCDuvuvSSuvSSwwvursvursOverlay graph G*Original graph GvursOverlay graph G*Original graph GvursuvwuvuvuvuvuvuvwuvwuvwABvursvursuvuvSSSSuvSS(kw − 2)
u + n(i)
n(o)
v + 1 >
1
u + n(o)
n(i)
v + 1 >
2
− 1
2
Fig. 14. N ∗ is the set we have accessed before and whose nodes are of
degree 2 and 3. We do not know the blue nodes’ degree.
following inequality would hold:
(cid:32)
(max{ku , kv })
1
2N ∗ − (cid:88)
2
− 1
2
w∈N ∗
(cid:32)
(max{ku , kv })
2N ∗ − (cid:88)
w∈N ∗
Without losing generality, assume the first one holds, then we
are going to prove that by rearrange the set N ∗ ∪ {u} we can
achieve a lower conductance and thus lead to the contradiction.
Imagine that if we try to drag the whole set of N ∗∪{u} from
S to ¯S , then we need to “rearrange” all the edges linked to the
The uniqueness of kv = 3 is that there would not exist the
set: those cross-cutting edges linked to the set but outside N ∗
case when both euv and ewv are cross-cutting edges.
will be “fliped”, i.e. from cross-cutting edges to non-cross-
(cid:25)
(cid:24) N (u) ∩ N (v) − N ∗
(cid:88)
cutting edges and vice versa; those cross-cutting edges linked
Theorem 5. Given G(V , E ), ∀u, v ∈ V , if euv ∈ E and
to the set but inside N ∗ will be eliminated, otherwise there will
be two cross-cutting edges linked to the node in N ∗ , which is
max{ku , kv },
(4−kw ) >
1
1
impossible because ∀w ∈ N ∗ , 2 ≤ kw ≤ 3.
2
2
2
Let ON ∗∪{u} = {evw ∈ E v ∈ (N ∗ ∪ {u}), w /∈ (N ∗ ∪
w∈N ∗
(cid:88)
(20)
{u})}, then
we can assert that euv is not a cross-cutting edge. Here we
denote N ∗ = {w ∈ N (u) ∩ N (v) kw is known , 2 ≤ kw ≤
kw − 2N ∗ .
ON ∗∪{u} = max{ku , kv } +
3}.
Proof: Noticed that if we do not know any degree
(cid:109)
(cid:108) n−N ∗
w∈N ∗
And we know that the minimum number of cross-cutting edges
+ 1 + N ∗ . So as
we can manipulate will be at least
(cid:24) n − N ∗
(cid:25)
2
the result of one line calculation of (20),
ON ∗∪{u} .
+ 1 + N ∗ >
1
(22)
2
2
Therefore moving the set N ∗ ∪ {u} from S to ¯S will always
results in a lower conductance.
+1+
information about the common neighbors of u and v , then
N ∗ = ∅, and theorem VIII is exactly the same as theorem 3.
We are going to prove this theorem by contradiction, which
means if we assume euv is a cross-cutting edge, then we can
find another configuration of S and ¯S such that euv is not
a cross-cutting edge but obtain less conductance. Again, let
n = N (u) ∩ N (v), according to the assumption the number
of common neighbors of u and v is n, then there must be n+ 1
cross-cutting edges in this local view of the graph, see Fig 14.
Given a node w ∈ N (u) ∩ N (v), and according to some
historical information we can achieve its degree kw without
paying any query cost. So obviously, if kw ≥ 4 then it makes
no sense to consider the rearrangement of it because dragging
w from S to ¯S would probably increase the number of cross-
cutting edges without knowing the edge information outside
this local view of the graph. Therefore, we only need to
consider N ∗ , which is the set of all the nodes belongs to
common neighbors of degree 2 and 3.
if we denote that the number of cross-cutting edges linked
to u within N ∗ ∪{u} is n(i)
u , the number of cross-cutting edges
linked to u outside N ∗ ∪{u} is n(o)
u , and similarly we have n(i)
v
and n(o)
v + n(o)
u + n(i)
u + n(o)
v . So we have n(i)
v = n. According
to the condition described in Proposition VIII, either of the
(cid:33)
(cid:33)
(kw − 2)
(21)
Theorem 6. Given a latent space graph model G(V,E),
assume α = +∞, then the expected number of edges we can
(cid:19)1/D(cid:33)(cid:33)
(cid:32)
(cid:32)
(cid:18) 1
removed
1 −
E[R] ≥ E · P
d < V (r)
3
(23)
(24)
Moreover, if we assume the dimension D = 2, and nodes are
uniformly distributed in a rectangle [0, a] × [0, b], then for the
graph G∗ (after removing edges from G) is:
1 − (cid:82)(cid:82)
E[Φ(G∗ )] ≥
Φ(G)
2 ≤0.75r2 fa (z1 )fb (z2 )dz1 z2
z2
1 +z2
where z1 and z2 are independent uniform random variable
supported on [0, a] and [0, b].
(cid:18)
(cid:19)D ≤ N (i) ∩ N (j )
Proof: According to [21], we have
1 − dij
N (i) ∪ N (j ) .
2r
V (r) is the volume of a D dimensional hypersphere of radius
r. Therefore, if we have small enough dij , than we can confirm
that we can remove the edge eij . Conservatively, from theorem
V (r)
(25)
uvuvuvuvuvuvwuvwuvwABvursvursuvuvSSSSuvSSN*3 we can reasonably assert that if N (i) ∩ N (j ) ≥ N (i) ∪
(cid:19)1/D(cid:33)
(cid:32)
(cid:18) 1
N (j ) − 2, then the edge eij can be safely removed. So when
(1 −
dij ≤ 2r
1 −
V (r)
2
N (i) ∪ N (j ) )
= d0 ,
(26)
the edge eij can be removed. Now, we have transformed the
probability of removing an edge to the probability of two
node’s distance is within a threshold. Since N (i)∪N (j ) ≥ 3,
so (23) holds.
Given more assumptions of dimension and the distribution
of nodes, the probability of two nodes’ euclidean distance
(cid:90) (cid:90)
smaller than the threshold is:
P(d ≤ d0 ) =
(27)
fa (z1 )fb (z2 )dz1 z2 .
2 ≤d2
1 +z2
z2
0
Also, since N (u) ∩ N (v) ≥ 3, the change of conductance
can be calculated as
E[Φ(G∗ )] =
(28)
(29)
.
(30)
σ(S )
a(S ) − P(d ≤ d0 )a(S )
1
1 − P(d ≤ d0 )
Φ(G)
1 − (cid:82)(cid:82)
Φ(G)
2 ≤0.75r2 fa (z1 )fb (z2 )dz1 z2
1 +z2
z2
=
≥
|
1903.06232 | 2 | 1903 | 2019-06-07T04:20:29 | Profile Closeness in Complex Networks | [
"cs.SI",
"cs.DM",
"physics.soc-ph"
] | We introduce a new centrality measure, known as profile closeness, for complex networks. This network attribute originates from the graph-theoretic analysis of consensus problems. We also demonstrate its relevance in inferring the evolution of network communities.
Keywords: Complex networks, Centrality, Community, Median, Closeness, Consensus theory | cs.SI | cs | Profile Closeness in Complex Networks
1st Divya Sindhu Lekha
Dept. Computer Applications
Cochin Univ. of Sci. & Tech.
2nd Sruthi K S
Dept. Computer Applications
Cochin Univ. of Sci. & Tech.
3rd Kannan Balakrishnan
Dept. Computer Applications
Cochin Univ. of Sci. & Tech.
4th Sreekumar A
Dept. Computer Applications
Cochin Univ. of Sci. & Tech.
Kochi, India
Kochi, India
Kochi, India
Kochi, India
[email protected]
[email protected]
[email protected]
[email protected]
9
1
0
2
n
u
J
7
]
I
S
.
s
c
[
2
v
2
3
2
6
0
.
3
0
9
1
:
v
i
X
r
a
Abstract -- We introduce a new centrality measure, known as
profile closeness, for complex networks. This network attribute
originates from the graph-theoretic analysis of consensus prob-
lems. We also demonstrate its relevance in inferring the evolution
of network communities.
Index Terms -- Complex networks, Centrality, Community, Me-
dian, Closeness, Consensus theory
When a governing body plans to install a public utility
centre in a locality, they investigate the availability of suit-
able locations and find an optimum place that addresses the
demands of the population. In this case, the total distance
from this optimum location to the entire locality should be
as small as possible. This situation is an adequate instance of
the facility location problem known as the median problem.
Given a graph G = (V, E), a median vertex is the one
which minimizes the total distance to all other vertices. Here,
the distance between two vertices is given by the length of
the shortest path between them. For a vertex v ∈ V , the total
distance of v is defined as the sum of the distances from v to
all other vertices.
(cid:88)
u∈V
d(v) =
d(u, v)
The vertices with minimum total distance are known as the
median vertices of G. Median set M (G) is the set of all
median vertices of G.
M (G) = {vd(v) = min
v∈V
{d(v)}}.
In a realistic world, the customer demand at every location
may not be uniform. It can vary. An adequate notion to
capture this variation in customer preferences is to construct
a customer profile for the network. Locations which are
preferred by more than one customer may be considered more
than once. A profile is thus, a multiset of vertices in which a
vertex can occur zero or more times.
Definition 0.1: A profile π on G is a finite sequence π =
(x1, x2, . . . , xk) of vertices of G. Note that a vertex may occur
more than once as an element in π. Therefore, π is a multiset.
Now, the median problem will be more generalized to compute
the median in a graph with respect to a given profile. Given a
profile π in graph G, the total distance of a vertex v ∈ V (G)
is
dπ(v) =
d(u, v).
(cid:88)
u∈π
{dπ(v)}}.
Now, we can define the median of G with respect to π as
follows:
M (π) = {vdπ(v) = min
v∈V
Definition 0.2: The median of G with respect to π is
A prominent work that deals with the generalized median
problem is by Bandelt and Berthelemy (1984) [1]. They char-
acterized the medians of arbitrary profiles in median graphs.
Mulder (1997) [18] applied the majority strategy to find the
median set for all profiles in a median graph. Following
Mulder, Balakrishnan et.al [2], [3] applied other consensus
strategies like plurality, hill climbing, and steepest ascent hill
climbing for the computation of median sets of profiles in
arbitrary graphs. In 2015, Changat et al. [6] devised algorithms
for computing the median of profiles in hypercube-embeddable
graphs known as (cid:96)1-graphs.
Now, let us again analyze the above three scenarios in the
context of the median problem.
• The location of the median point in a network is highly
critical. Once a threat reaches the median location, it
needs only very less time to spread through the entire
network. Therefore, finding the location of the median
point in a network is a problem of prime interest here.
• The median nodes in a network need fewer steps to
communicate with others.
• Median nodes can act as crucial start nodes for quaran-
tine.
The closeness centrality cC, introduced by Freeman [8], is
a related centrality measure. The nodes with higher closeness
centrality are the median nodes when the profile under con-
sideration is the entire network.
Based on these observations, we propose a new centrality
measure, known as profile closeness centrality.
In the next section, we give the details of the construction
of the new measure.
I. COMPUTING PROFILE CLOSENESS
Consider a large network N with n nodes and m links. Since
n is very large, we modify the definition of the profile. It is
no more defined as a multiset. To improve the convenience,
we define the profile as a weighted subset of nodes.
π = {(u, r(u))}
where u is an arbitrary vertex of N and r(u) is the rank of u
in π based on its priority.
N may contain disconnected components. When two nodes
are unconnected, the distance between them becomes infinity.
We avoid such pairs in our computation. Given a node v, the
total distance of v with respect to π is
(cid:88)
d(u, v) × r(u)
Dπ(v) =
u∈π,u(cid:54)=v
Note that we consider a distance d(u, v) only when it is not
∞.
Now, we define the profile closeness cπ(v) as the normal-
ized inverse of Dπ(v).
cπ(v) =
n
Dπ(v)
.
As in the case of a normal closeness centrality, nodes with
higher cπ values are the ones with better access to profile
nodes. The median of the network, Mπ(N ), is the set of nodes
with maximum profile closeness.
Mπ(N ) = {vcπ(v) = cmax
}
π
where cmax
π = max
v∈V
cπ(v).
A. Choosing rank function
Degree (δ) of a node refers to the number of edges incident
on it. A high-degree node has a direct influence on a larger
part of the network (See Opsahl et al. [20]). Therefore, it
is a potentially important decision-maker in the consensus
problem. Such nodes should be given a higher priority. We
can do this by assigning r(u) → δ(u).
However, the choice of the rank function depends on the
problem being discussed. An excellent candidate for the rank
function in problems involving spreading dynamics, such as
information (rumour) dissemination or epidemic outbreak, is
the node influence. An example of this can be the epidemic
impact discussed in [21].
B. Choosing a profile
The relevance of a profile depends on the proportion of high-
rank nodes included in it. If π consists of prominent nodes
(say, hubs) from different disconnected components in N, then
it follows that, cπ effectively captures the relative closeness of
a node to the key nodes in N. A high cπ(v) indicates that
v can act as a critical access point to the vital areas of the
network. There are several ways to identify a set of vital nodes
in a network. Refer [15] for a state-of-art review of vital node
identification.
Detecting a set of vital nodes can help adopt budget-
constrained methods to enhance the security of a network.
But, this does not hold true when the identified set itself is
very large. In such a case, we need to find the minimum
number of nodes which have easy access to this set. This can
be evaluated using the profile closeness. The set of vital nodes
can be denoted as the profile π, the nodes ranked based on
their vitality, cπ computed, and nodes with higher cπ values
identified. Let k be the maximum number of nodes that can be
secured within the given budget. Then, k nodes with highest
possible cπ values are the efficient candidates that ought to be
protected.
II. CLOSENESS AND PROFILE CLOSENESS
As discussed in the introduction, the profile closeness of a
node v measures its closeness centrality when the profile is
the entire node set and rank of the nodes is unity. i.e.
cπ(v) = cC(v)
when π = V (N ) × {1}.
In 1979, Freeman [8] introduced the concept of centraliza-
tion of a graph or network to compare the relative importance
of its nodes. Centralization is also a way to compare different
graphs based on their respective centrality scores.
In order to find the centralization scores, we need to
determine the maximum possible value of centrality (c∗
π) and
the deviation of the centrality of different nodes (cπ(v)) from
c∗
π. The centralization index Ccπ is the ratio of this deviation to
the maximum possible value for a graph containing the same
number of nodes.
Freeman [8] showed that the closeness centrality attains the
maximum score if and only if the graph is a star. This was
proven later by Everett et al. [7]. Also, the minimum value is
attained when the graph is complete or a cycle.
The profile closeness cπ attains the maximum value when
π is the entire set of the graph vertices. In this case, cπ(v) =
cC(v) for any node v. Therefore, the centralization of the
profile closeness coincides with the closeness centrality.
However, we need to compare the performance of cC and
cπ with respect to the intended applications of cπ. As cC
is a global measure whereas cπ is highly localized to the
profile π, the comparisons need to be done locally as well.
So, two comparisons need to be done - one with the global
closeness centrality cC, and the other with a local closeness
measure known as cluster closeness, ccluster. Note that the
only difference here is that ccluster does not have the priority
ranking of group members, which is an essential feature of
cπ.
We generate some random scale-free networks and identify
their clusters. Subsequently, we calculate the global closeness
cC for each node. We calculate the ccluster of a node as
its closeness to its parent cluster. In addition, we construct a
profile with these clusters. Here, the rank of a node v, r(v), is
δcluster(v)(the number of neighbors of v within the cluster).
Thus, if a node has a large number of connections within
its cluster, then it is considered as having higher priority in
the profile. We compute cπ with these profiles and compare
them with cC and ccluster over all the generated networks.
For comparing these measures, we use the correlation between
them.
Simulating correlation
We performed simulations on random scale-free networks
with 50, 100, 500, and 1000 nodes and average degrees 2, 5,
and 7. The results of the correlation are shown in tables I
and II. The values in each cell are the average correlation
between the measures. The range of correlation (maxmin) is
shown below each value in brackets.
50
0.516
0.522
0.480
2
5
7
1000
0.833
0.857
0.872
100
0.617
0.628
0.617
500
0.782
0.805
0.817
[0.864-0.124]
[0.879-0.272]
[0.944-0.605]
[0.935-0.658]
[0.793-0.128]
[0.816-0.247]
[0.900-0.684]
[0.924-0.710]
[0.732-0.054]
[0.803-0.312]
[0.900-0.660]
[0.930-0.692]
TABLE I: Correlation between closeness and profile closeness
Table I shows the correlation between the closeness central-
ity and profile closeness for the generated random networks.
Both are positively correlated, and the relationship is fairly
good enough. An important point here is that the closeness
centrality in large networks is highly correlated with its profile
closeness. This seems interesting because the computation
of profile closeness is less data-consuming when compared
to the computation of closeness centrality. Assume that both
measures give the same ranking of nodes in a large network
N. Then, we can use the low-computational profile closeness
for the closeness ranking of nodes in N. However, more
investigations need to be done in this regard. We need to
simulate the experiment on very large networks in order to
ensure this capability of profile closeness.
[1.0-0.595]
[0.997-0.734]
[0.999-0.049]
[0.999-0.923]
2
5
7
50
0.953
0.947
0.957
[0.999-0.514]
[0.999-0.748]
100
0.960
0.948
[1.0-0.653]
0.949
[1.0-0.537]
500
0.962
0.965
0.953
[0.999-0.646]
[0.999-0.752]
[0.999-0.595]
0.968
[1.0-0.706]
1000
0.980
0.970
TABLE II: Correlation between cluster closeness and profile
closeness
Table II shows the correlation between cluster closeness
and profile closeness for the generated random networks.
We observed that the average correlations are high, which
indicates a strong relationship between ccluster and cπ. An-
other interesting observation is that the average correlation
increases steadily with network size for sparse as well as dense
networks.
III. APPLICATION: COMMUNITY CLOSENESS
When the profile under consideration is a community, we
call it a community profile. The relative importance of commu-
nity members differ with their influence on other community
members and the network as a whole. Some of the related
works in this regard are discussed below.
Guimer´a and Amaral (2005) [13] studied the pattern of
intra-community connections in metabolic networks. They
analyzed the degrees of nodes within the community (within-
module degree) to understand if it is centralized or decentral-
ized. A community is centralized if its members have different
within-module degrees.
Wang et al. (2011) [23] proposed two kinds of important
nodes in communities: community cores and bridges. Commu-
nity cores are the most central nodes within the community
whereas bridges act as connectors between communities. Han
et al. (2004) [14] has also given a similar characterization of
nodes important in a community as party hubs and date hubs
where party hubs are like community cores and date hubs are
like bridges.
Gupta et al. (2016) [12] proposed a community-based
centrality known as Comm Centrality to find the influential
nodes in a network. The computation of this centrality does
not require the entire global information about the network,
but only the intra and inter-community links of a node.
The above works indicate that the communities, especially
the relative importance of their members, influence the overall
behavior of the network considerably. A community profile
captures the relative importance of the community members.
Here, all
the nodes are not considered homogenous and
we prioritize nodes like community cores and bridges. The
application of a community profile is two-fold.
• The community cores and bridges are prioritized in all
the communities in a profile. Then, the profile closeness
determines the accessibility of these vital nodes from ev-
ery nook and corner of the network. This first application,
the details of which are outside the scope of this work,
provides a means to measure the global accessibility of
the network.
• The community profile is constructed from a single
community; with priority given to vital members. Then,
the profile closeness predicts the new nodes who may
join the community and members who may be on the
verge of leaving the community. This second application,
which will be discussed in detail in the next section, is
associated with the local accessibility to a community.
A. Construction of community profile
The first step in constructing a community profile is the
identification of communities in the network. Once we have
detected the communities, we need to rank the members in
each community. The ranking is based on the intra-modular
degree (δcomm). We can also use other relevant community-
based measures like Comm centrality ( [12]) for ranking. r(v)
denotes the rank of a node v. Now, we define the community
profile π as
π = {(v, r(v))}
The construction of a community profile is devised in algo-
rithm 1, Gen π.
Algorithm 1 Gen π: Constructing community profile
Require: Community comm = (Vcomm, Ecomm)
Ensure: π
1: for v ∈ Vcomm do
2:
3:
4: end for
5: return π
π ← π(cid:83){(v, δcomm(v))}
δcomm(v) = N eighborcomm(v)
B. Computing community closeness
Algorithm 2 computes the community closeness of the
entire network ccπ[.]
du[.] ← SSSP (N, u)
for (v, r(v)) ∈ π do
Algorithm 2 CC: Finding community closeness
Require: Network N, profile π
Ensure: cπ[.]
1: for u ∈ V (N ) do
2:
3: Dπ(u) = 0
4:
5:
6:
7:
8:
9:
10: end for
11: return cπ[.]
end if
end for
cπ[u] ← n
if (u (cid:54)= v and du[v] (cid:54)= ∞) then
Dπ(u) = Dπ(u) + [du[v] × r(v)]
Dπ[u]
C. Predicting community members
Given a node u and profile π in N, algorithm 2 correctly
computes the closeness of the node to the community corre-
sponding to π. A community is stable when every node in a
community has comparable closeness values. In other words,
the community is unstable when the intra-community close-
ness of its nodes show drastic variations. Nodes with higher
values are likely to continue in the community, whereas those
with very low values may leave the community in the future.
We conducted experiments on networks with first-hand infor-
mation on their ground-truth communities. Empirical evidence
shows that the above observation is true. Another interesting
observation was that the nodes that exhibit more closeness
towards an external community tend to join that community
in future. Thus, profile closeness is an adequate indicator of
how communities evolve in a network. The efficiency of this
prediction depends on the design of the community profile.
D. Empirical evidence - Networks with ground-truth commu-
nities
Research on community detection has been very active for
the past two decades. Many community detection techniques
were devised. The Girvan-Newman method of community de-
tection [9], based on edge betweenness, was a novel approach.
Later, the same team came up with the modularity concept, a
qualitative attribute of a community. See [10]. Modularity is
defined as the difference between the fraction of the edges in
a community and the expected fraction in a random network.
Girvan and Newman observed that, for a robust community,
this attribute falls between 0.3 and 0.7. Therefore, modularity
optimization can lead to better community detection. However,
this is an NP-complete problem [4]. Different approximation
techniques based on modularity optimization produce com-
munity structures of high quality, that too with very low time
requirements of the order of network size. A very recent survey
by Zhao et al. [25] gives a clear picture of the state-of-art in
this regard.
In this study, we used the Louvain method [5] of modularity
optimization for detecting communities. It is an agglomerative
technique with each node initially assigned as a unique com-
munity. The algorithm works in multiple passes until the best
partitions are achieved. Each pass consists of two phases; in
phase 1 the nodes are moved to the neighboring community
if it can achieve a higher gain in modularity and in phase 2 a
new network is created from the communities detected in pass
1.
First, we simulated our results using two real-world net-
works in which the community structure is evident. The
networks are Zachary's karate club network [24] and the
American college football network [9]. See table III.
Network
Karate Club
College Football
Dolphin
Nodes
Edges
Communities
34
115
62
78
613
159
2
12
2
Density
0.2781
0.0935164
0.0840825
TABLE III: Networks with ground-truth communities
1) Zachary's karate club network: We conducted our pri-
mary survey on the famous karate club network data collected
and studied by Zachary [24] in 1977. In his study, Zachary
closely observed the internal conflicts in a 34-member group
(a university-based karate club) over a period of 3 years.
The conflicts led to a fission of the club into two groups.
See table IV. He modeled the fission process as a network.
The nodes of the network represented the club members and
edges represented their interactions outside the club. Zachary
predicted this fission with greater than 97% accuracy and
argues that his observations are applicable to any bounded
social groups. Many researchers used this network as a primary
testbed for their studies on community formation in complex
networks.
Community
I
II
1
11
10
27
2
12
15
28
3
13
16
29
Member nodes
6
4
18
14
23
19
30
32
5
17
21
31
7
20
24
33
8
22
25
34
9
26
TABLE IV: Ground-truth communities in Karate network
We identified 4 communites in the network (using the
Louvain method). See table V.
Comm.
I
II
III
1
5
9
34
24
2
6
10
3
7
15
4
11
16
12
Member nodes
8
13
17
19
21
23
14
27
18
30
20
31
22
33
25
IV
TABLE V: Communities detected in Karate network
26
32
28
29
We used the intra-module degree (δcommunity) of nodes for
constructing the profile. The nodes in the profile were prior-
itized based on their δcommunity value. Nodes having higher
Fig. 1: Community closeness in Karate club network.
Fig. 2: Profile closeness of external nodes to community I.
value were given higher priority. Subsequently, the profile
closeness was computed for each community member. See
figure 1. Different colors represent the members of different
communities. The relative size of the nodes represent their
profile closeness with respect to their own community.
The profile closeness of node 9 in its community
(ccCommunityIII (9)) is very low. From this, we can interpret
that 9 has a higher tendency to leave its community. Also, we
compared the profile closeness of all nodes with respect to
community I (ccCommunityI ). See figure 2. Nodes external
to Community I are colored blue. Among them, Node 9
has a higher value for ccCommunityI . This high value of
ccCommunityI (9) and the low value of ccCommunityIII (9)
indicates that 9 has more affinity towards Community I than
its own community, Community III.
This observation is relevant since node 9 originally belonged
to Community I as noted by Zachary. Furthermore, Zachary
had even observed that member 9 is a weak supporter of the
second faction (II); but joined the first faction (I) after the
fission. Our method also reproduced the same fact.
2) American college football network: The second network
chosen for our study was the American college football
network, from the dataset collected by Newman [9]. The
nodes in this network represent the college football teams in
the U.S. and the edges represent the games between them
in the year 2000. About 8-12 teams were grouped into a
conference. Altogether 12 conferences were identified. Most
of the matches were between the teams belonging to the same
conference. Therefore, the inherent community structure in
this network corresponds to these conferences. These ground-
truth communities are given in table VI.
In the community detection step, we identified ten commu-
nities (See table VII). Four among them (I, V II, IX and X)
correspond to the ground-truth communities (AtlanticCoast,
Pac 10, Big 10 and Big 12 respectively.) Community V III is
a combination of two actual communities, Mountain West and
Sun Belt.
We then examined the profile closeness of all the nodes
to community II. See figure 4. We observed that Central
Florida has a greater closeness to II. This conforms to the
ground truth that Central Florida team played with teams like
Connecticut in many matches.
3) Dolphins network: Another chosen network with the
ground-truth community is the dolphins network, which is
from the dataset collected by Lusseau et al., in the University
of Otago- Marine Mammal Research Group [16] (2003).
Lusseau along with Newman [17] (2004) used this data to
study social networks of bottlenose dolphins. In their study,
they observed fission in the network to two groups with
one individual (SN100) temporarily leaving the place. These
communities are shown in table VIII.
We detected 5 communities. See figure 5. The communities
are shown in table IX. We checked the closeness to com-
munity V . See figure 6. It is clearly visible that DN63 and
Knit are having higher chances of grouping with community
V . This conforms to the observation made by Lusseau and
2345678910111213141718202226282930313233124252715161921233423456789101112131417182022262829303132331242527151619212334TABLE VI: US Football Network: Ground truth communities
Conference
Atlantic
Coast
IA
Independents
Mid
American
Big
East
Conference
USA
SEC
W.
Athletic
Sun
Belt
Pac
10
Mountain
West
Big
10
Big
12
Fig. 3: Community closeness in American college football
network.
College teams
Flora. St.
Georg. Tech
Clemson
Cent. Flora
Notre Dame
Akron
Kent
Ohio
Ball St.
E. Michigan
Virg. Tech
Syracuse
Miami Flora
Alabama Birm.
Memphis
Tulane
T. Christ.
Vanderbilt
S. Caro.
Arkansas
Missis. St.
Louis. Tech
S. Method.
T. El Paso
Boise St.
Louis. Monroe
N. Texas
New Mex. St.
Nev. Las Vegas
Oreg. St.
Stanford
Ariz.
Oregon
Brigh. Y.
Wyoming
Illin.
Iowa
Ohio St.
Indiana
Oklah. st.
Colorado
Missouri
Texas A & M
N. Caro. St.
Duke
Maryland
Connecticut
Utah St.
Bowl. Green St.
Miami Ohio
N. Illin.
C. Michigan
Virginia
N. Caro.
Wake Forest
Navy
Buffalo
Marshall
W. Michigan
Toledo
Boston Coll.
Pittsburg
Rutgers
E. Caro.
Houston
Cincinnati
Florida
Georgia
Auburn
Louis. St.
Fresno St.
Nevada
Tulsa
W. Virg.
Temple
S. Missis.
Louisville
Army
Kentucky
Tennessee
Alabama
Missis.
Rice
San Jose St.
Hawaii
Louis. Lafay.
Arkansas St.
Mid. Tenn. St.
Idaho
S. Calif.
Calif.
Washing.
New Mex.
Utah
Air Force
Nwestern
Penn St.
Wisconsin
Minnesota
Texas
Kansas
Nebraska
Oklahoma
UCLA
Ariz. St.
Washing. St.
San Diego St.
Colorado St.
Mich. St.
Mich.
Purdue
Baylor
Iowa St.
Texas Tech
Kansas St.
Newman.
IV. SUMMARY
We proposed the concept of profile closeness centrality
which is adequate for solving consensus problems in complex
networks. A profile is a set of nodes with assigned priorities
(rank). Some of the salient features of profile closeness are
the following.
• The rank assigned to a profile node depends on the extent
of the influence that it has on the network. For example,
high degree nodes, which directly influence a large part
of the network, are ranked high.
• Choice of the rank function depends on domain of the
network.
• It is suitable for budget-constrained network problems.
• It closely correlates with the global closeness centrality
for large networks. Therefore, profile closeness offers a
Fig. 4: Profile closeness of external nodes to community II.
BrighamYoungFloraStateIowaKansasStateNewMexicoTexasTechPennStateSouthernCaliforniaArizonaStateSanDiegoStateBaylorNorthTexasNorthernIllinoisNorthwesternWesternMichiganWisconsinWyomingAuburnAkronVirginiaTechAlabamaUCLAArizonaUtahArkansasStateNorthCarolinaStateBallStateFloraBoiseStateBostonCollegeWestVirginiaBowlingGreenStateMichiganVirginiaBuffaloSyracuseCentralFloraGeorgiaTechCentralMichiganPurdueColoradoColoradoStateConnecticutEasternMichiganEastCarolinaDukeFresnoStateOhioStateHoustonRiceIdahoWashingtonKansasSouthernMethodistKentPittsburghKentuckyLouisvilleLouisianaTechLouisianaMonroeMinnesotaMiamiOhioVanderbiltMdleTennesseeStateIllinoisMississippiStateMemphisNevadaOregonNewMexicoStateSouthCarolinaOhioIowaStateSanJoseStateNebraskaSouthernMississippiTennesseeStanfordWashingtonStateTempleNavyTexasA&MNotreDameTexasElPasoOklahomaToledoTulaneMississippiTulsaNorthCarolinaUtahStateArmyCincinnatiAirForceRutgersGeorgiaLouisianaStateLouisianaLafayetteTexasMarshallMichiganStateMiamiFloraMissouriClemsonNevadaLasVegasWakeForestIndianaOklahomaStateOregonStateMarylandTexasChristianCaliforniaAlabamaBirminghamArkansasHawaiiBrighamYoungFloraStateIowaKansasStateNewMexicoTexasTechPennStateSouthernCaliforniaArizonaStateSanDiegoStateBaylorNorthTexasNorthernIllinoisNorthwesternWesternMichiganWisconsinWyomingAuburnAkronVirginiaTechAlabamaUCLAArizonaUtahArkansasStateNorthCarolinaStateBallStateFloraBoiseStateBostonCollegeWestVirginiaBowlingGreenStateMichiganVirginiaBuffaloSyracuseCentralFloraGeorgiaTechCentralMichiganPurdueColoradoColoradoStateConnecticutEasternMichiganEastCarolinaDukeFresnoStateOhioStateHoustonRiceIdahoWashingtonKansasSouthernMethodistKentPittsburghKentuckyLouisvilleLouisianaTechLouisianaMonroeMinnesotaMiamiOhioVanderbiltMdleTennesseeStateIllinoisMississippiStateMemphisNevadaOregonNewMexicoStateSouthCarolinaOhioIowaStateSanJoseStateNebraskaSouthernMississippiTennesseeStanfordWashingtonStateTempleNavyTexasA&MNotreDameTexasElPasoOklahomaToledoTulaneMississippiTulsaNorthCarolinaUtahStateArmyCincinnatiAirForceRutgersGeorgiaLouisianaStateLouisianaLafayetteTexasMarshallMichiganStateMiamiFloraMissouriClemsonNevadaLasVegasWakeForestIndianaOklahomaStateOregonStateMarylandTexasChristianCaliforniaAlabamaBirminghamArkansasHawaiiCommunity
Member teams
I
II
III
IV
V
VI
VII
VIII
IX
X
Flora St.
Georg. Tech
Clemson
Connecticut
Bowl. Green St.
Miami Ohio
N. Illin.
C. Mich.
Virg. Tech
Syracuse
Miami Flora
Notre Dame
Alabama Birm.
Memphis
Tulane
Vanderbilt
S. Caro.
Arkansas
Missis. St.
Louis. Monroe
Louis. Tech
Rice
San Jose St.
Hawaii
Oregon St.
Stanford
Arizona
Oregon
Brigham Y.
Wyoming
N Las Vegas
N. Texas
Utah St.
Illinois
Iowa
Ohio St.
Indiana
Oklah. st.
Colorado
Missouri
Texas A & M
N. Caro. St.
Duke
Maryland
Toledo
Buffalo
Marshall
W. Mich.
E. Mich.
Boston Coll.
Pittsburg
Rutgers
Mid. Tennes. St.
E. Caro.
Houston
Cincinnati
Flora
Georgia
Auburn
Louis. St.
C. Flora
S. Method.
T. El Paso
Fresno St.
S. Calif.
Calif.
Washing.
New Mex.
Utah
Air Force
Arkansas St.
Idaho
Nwestern
Penn St.
Wisconsin
Minnesota
Texas
Kansas
Nebraska
Oklahoma
Virginia
N. Caro.
Wake Forest
Akron
Kent
Ohio
Ball St.
W. Virg.
Temple
Navy
S. Missis.
Louisville
Army
Kentucky
Tennessee
Alabama
Missis.
Louis.Lafay.
Nevada
Tulsa
T. Christ.
UCLA
Arizona St.
Washing. St.
San Diego St.
Colorado St.
Boise St.
New Mex. St.
Fig. 5: Community closeness in Dolphins network.
Mich. St.
Michigan
Purdue
Baylor
Iowa St.
Texas Tech
Kansas St.
TABLE VII: US Football Network: Detected communities
Member dolphins
Group
I
II
Beak
Fish
Hook
MN83
Shmuddel
SN89
Topless
TSN83
Beescratch
Gallatin
Notch
TR82
Web
Bumper
Five
Jonah
Oscar
SMN5
SN9
TR120
Vau
DN16
Jet
Number1
TR88
Zig
CCL
Fork
Kringel
Patchback
SN100
SN96
TR77
Whitetip
DN21
Knit
Quasi
TR99
Cross
Grin
MN105
PL
SN4
Stripes
Trigger
Zap
DN63
MN23
Ripplefluke
Upbang
Double
Haecksel
MN60
Scabs
SN63
Thumper
TSN103
Zipfel
Feather
Mus
SN90
Wave
TABLE VIII: Ground-truth groups in dolphin network
Fig. 6: Community closeness in Dolphins network.
BeakBeescratchBumperCCLCrossDN16DN21DN63DoubleFeatherFishFiveForkGallatinGrinHaeckselHookJetJonahKnitKringelMN105MN23MN60MN83MusNotchNumber1OscarPatchbackPLQuasiRippleflukeScabsShmuddelSMN5SN100SN4SN63SN89SN9SN90SN96StripesThumperToplessTR120TR77TR82TR88TR99TriggerTSN103TSN83UpbangVauWaveWebWhitetipZapZigZipfelBeakBeescratchBumperCCLCrossDN16DN21DN63DoubleFeatherFishFiveForkGallatinGrinHaeckselHookJetJonahKnitKringelMN105MN23MN60MN83MusNotchNumber1OscarPatchbackPLQuasiRippleflukeScabsShmuddelSMN5SN100SN4SN63SN89SN9SN90SN96StripesThumperToplessTR120TR77TR82TR88TR99TriggerTSN103TSN83UpbangVauWaveWebWhitetipZapZigZipfelGroup
I
II
III
IV
V
Bumper
SN96
Double
Member dolphins
Beak
PL
CCL
Zap
Cross
MN60
Trigger
Fork
Five
MN83
Vau
Grin
SN4
TR120
TR99
DN16
MN23
Ripplefluke
Web
Shmuddel
Thumper
Zipfel
Beescratch
Jet
Quasi
Wave
Fish
TR77
Oscar
Haecksel
Patchback
Hook
SN63
TSN103
TR88
DN21
Mus
SN90
Zig
Knit
SN100
Jonah
SMN5
DN63
SN89
MN105
Topless
Kringel
Scabs
SN9
Stripes
TSN83 Whitetip
Feather
Notch
TR82
Gallatin
Number1
Upbang
TABLE IX: Communities detected in dolphin network
low computational complexity approximation of close-
ness ranking.
• It can aid in predicting community evolution.
The most noteworthy finding of this work is that the relative
importance of the community members plays a key role in at-
tracting new nodes or repelling existing nodes. However, more
investigations are needed to develop alternative techniques to
assign member priorities.
FUNDING
This work was supported by the National Post-doctoral
Fellowship (N-PDF) No. PDF/2016/002872 from the Science
and Engineering Research Board (SERB), Department of
Science and Technology (DST), Government of India.
ACKNOWLEDGMENTS
The authors are grateful to Prof. Animesh Mukherjee (IIT
Kharagpur) for providing valuable comments on the work.
REFERENCES
[11] M. Granovetter, "Threshold Models of Collective Behavior," The Amer-
ican J. Sociology, Vol. 83, 1978, pp. 1420 -- 1443.
[12] N. Gupta, A. Singh, H. Cherifi, "Centrality measures for networks with
community structure," Physica A, 452, 2016, pp. 46 -- 59.
[13] R. Guimer´a, L. A. N. Amaral, "Functional cartography of complex
metabolic networks," Nature, Volume 433, 2005, pp. 895 -- 900.
[14] J. D. J. Han, N. Bertin, T. Hao, D. S. Goldberg, G. F. Berriz, L.
V. Zhang, D. Dupuy, A. J. M. Walhout, M. E. Cusick, F. P. Roth,
M. Vidal, "Evidence for dynamically organized modularity in the yeast
proteinprotein interaction network," Nature, 430, 2004, pp. 88 -- 93.
[15] L. Lu, D. Chen, X. Ren, Q. Zhang, Y. Zhang, T. Zhou, "Vital nodes
identification in complex networks," Physics Reports, Volume 650, 2016,
pp. 1 -- 63.
[16] D. Lusseau, K. Schneider, O. J. Boisseau, P. Haase, E. Slooten, S. M.
Dawson, "The bottlenose dolphin community of Doubtful Sound features
a large proportion of long-lasting associations - Can geographic isolation
explain this unique trait?," Behavioral Ecology and Sociobiology 54,
2003, pp. 396 -- 405.
[17] D. Lusseau, M. E. J. Newman, "Identifying the role that animals play in
their social networks," Proceedings. Biological sciences vol. 271 Suppl
6, 2004, pp. S477 -- S481.
[18] H. M. Mulder, "Majority strategy on graphs," Discrete Appl. Math. 80,
1997, pp. 97 -- 105.
[19] F. Morone, H. A. Makse, "Influence maximization in complex networks
through optimal percolation," Nature 65, Vol 524, 2015, pp. 65 -- 68.
[20] T. Opsahl, F. Agneessens, J. Skvoretz, "Node centrality in weighted
networks: Generalizing degree and shortest paths," Social Networks,
Volume 32, Issue 3, 2010, pp. 245 -- 251.
[21] M. Siki´c, A. Lanci´c, N. Antulov-Fantulin, H. Stefanci´c,"Epidemic cen-
trality is there an underestimated epidemic impact of network peripheral
nodes?," Eur. Phys. J. B 86:440, 2013, 13 pages.
[22] M. Takaffoli, R. Rabbany, O. R. Zaıane, "Community evolution predic-
tion in dynamic social networks," 2014 IEEE/ACM International Confer-
ence on Advances in Social Networks Analysis and Mining (ASONAM
2014), Beijing, 2014, pp. 9 -- 16.
[23] Y. Wang, Z. Di, Y. Fan, "Identifying and Characterizing Nodes Important
to Community Structure Using the Spectrum of the Graph," PLoS ONE,
6(11), e27418, 2011.
[24] W. W. Zachary, "An Information Flow Model for Conflict and Fission in
Small Groups," J. Anthropological Research, 33, 4, 1977, pp. 452 -- 473.
[25] Z. Zhao, S. Zheng, C. Li, J. Sun, L. Chang, F. Chiclana, "A compar-
ative study on community detection methods in complex networks," J.
Intelligent & Fuzzy Systems, vol. 35, no. 1, 2018, pp. 1077 -- 1086.
[1] H. J. Bandelt, J. P. Barth´elemy, "Medians in median graphs," Disc. Appl.
Math. 8, 1984, pp. 131 -- 142.
[2] K. Balakrishnan, M., Changat, H. M. Mulder, "Median computation in
graphs using consensus strategies," (No. EI 2007-34). Report / Econo-
metric Institute, Erasmus University Rotterdam, 2007.
[3] K. Balakrishnan, M., Changat, H. M. Mulder, "Plurality strategy in
graphs," Australesian. J. Combin. 46, 2010, pp. 191 -- 202.
[4] U. Brandes, D. Delling, M. Gaertler, R. Gorke, M. Hoefer, Z. Nikoloski,
D. Wagner, "On Modularity Clustering," IEEE Transactions on Knowl-
edge and Data Engineering, vol. 20, no. 2, pp. 172-188, Feb. 2008.
[5] V. D. Blondel, J-L. Guillaume, R. Lambiotte, E. Lefebvre, "Fast unfolding
of communities in large networks," J. Statistical Mechanics: Theory and
Experiment (10), P10008, 12 pages, 2008.
[6] M. Changat, D. S. Lekha, A. R. Subhamathi, "Algorithms for the
remoteness function, and the median and antimedian sets in (cid:96)1-graphs,"
International Journal of Computing Science and Mathematics; 6(5), 2015,
pp. 480 -- 491.
[7] M. G. Everett, P. Sinclair, P. Dankelmann, "Some centrality results new
and old," J. Math. Sociol., Volume 28, 2004, pp. 215 -- 227.
[8] L. Freeman, "Centrality in Social Networks," Social Networks, 1, 1978,
pp. 215 -- 239.
[9] M. Girvan, M. E. J. Newman, "Community structure in social and
biological networks," Proc. Natl. Acad. Sci. USA 99, 2002, pp. 7821 --
7826.
[10] M. Girvan, M. E. J. Newman, "Finding and evaluating community
structure in networks," Phys. Rev. E 69, 026113, 16 pages 2004.
|
Subsets and Splits