Recap! CMSC 498J: Social Media Computing. Department of Computer Science University of Maryland Spring Hadi Amiri
|
|
- Merryl Pitts
- 5 years ago
- Views:
Transcription
1 Recap! CMSC 498J: Social Media Computing Department of Computer Science University of Maryland Spring 2015 Hadi Amiri
2 Announcement CourseEvalUM 2
3 Announcement Project Presentations & Reports (40%) Each team (3 students) has strictly 14 mins Each student should present parts of the project that he / she worked on zero mark if he / she doesn t present Each team should me one PPT file containing all slides for group presentation me the PPT file latest by May 2, 11:59 PM Sufficiently rehearse with teammates for the presentation. 3
4 Announcement Project Presentations & Reports (40%) Max of 7 pages in which you explain: problem and its importance: concrete definition short description of dataset(s) used your approach to solve the problem evaluation results and insights Each team should submit the final report, codes, and datasets used by May 10, 11:00 AM Either write files to a CD or DVD, or us a link to download your project materials There must be a readme file in the root directory explaining steps to run your code. 4
5 Announcement Final Exam (30%) Thursday, May 12, 8:00-10:00Am CSI 2107 Closed-book. One A4 sheet for notes is allowed! 5
6 Network Basics Graph Density Complete Graph Connectivity Connected graph Distance btw nodes i and j: d(i,j) Diameter of a graph Connected component: every node in the subset has a path to every other; & the subset is not part of a bigger component. BFS: distance btw root and all level-k nodes is k! 6
7 Triadic Closure If two nodes in a network have a neighbor in common, then there is an increased likelihood they will become connected themselves. Reasons for Triadic Closure: Opportunity, Trust, Incentives Clustering Coefficient A measure to capture the prevalence of Triadic Closure Defined for nodes CF(A) = Number of connections btw A s friends = 1/6 Possible Number of connections btw A s friends 7
8 Bridge An edge is bridge if deleting it would put its two ends into two different connected components. Bridges provide access to parts of the network that are unreachable by other means! 8
9 Local Bridge An edge such that its endpoints have no friends in common! edge not in a triangle! deleting a local bridge increases the distance btw its endpoints to a value strictly > 2. 9
10 Neighborhood Overlap A measure to capture bridgeness of an edge! Don t count A and B here! Nodes Neighborhood overlap A-E 2/4 A-F 1/6 A-B 0/8 (Overlap = 0 for local bridges) Edges with very small neighborhood overlap can be considered as almost local bridges 10
11 Strong Triadic Closure Strong Triadic Closure If A has strong links to B and C, then there must be a link, either weak or strong, btw B and C! 11
12 Local Bridges and Weak Ties Relationship btw local bridges and weak ties through strong triadic closure: If node A: satisfies strong triadic closure, AND is involved in at least two strong ties Then: any local bridge adjacent to A must be a weak tie. 12
13 The Strength of Weak Ties Weak ties (acquaintances) connect us to new sources of information. This dual role - as weak connections but also valuable links to hard-to-reach parts of the network - is the surprising strength of weak ties. 13
14 Questions 1. How the neighborhood overlap of an edge depends on its strength? Neighborhood overlap should grow as tie strength grows. 2. How weak ties serve to link different communities that each contain large number of stronger ties? Delete edges from the network one at a time, starting with the weakest ties first! The giant component shrank rapidly (its size decreases rapidly). 14
15 Structural Holes- Cnt. Structural hole: the empty space in the net btw 2 sets of nodes that don t interact closely! A node with multiple local bridges spans a structural hole in the net. B has early access to info! B is a gatekeeper and controls the ways in which groups learn about info. She has power! B may try to prevent triangles from forming around the local bridges she is part of! How long these local bridges last before triadic closure produces short-cuts around them? 15
16 Node Centrality Degree centrality A node is central if it has ties to many other nodes Look at node degree! Closeness centrality A node is central if it is close to other nodes Look at distance btw nodes Betweenness centrality A node is central if other nodes have to go through it to get to each other Look at shortest paths between nodes 16
17 Clustering Break a network into densely connected nodes with sparse connections between groups Graph Partitioning Find the edges that carry most of traffic in a network and successively remove edges of high traffic! 17
18 Edge Betweenness Edge Betweenness: Let s assume 1 unit of flow will pass over all shortest path btw any pair of nodes A and B. Betweenness of an edge is the total amount of flow it carries! If there are k shortest path btw A and B, then 1/k units of flow will go along each shortest path! Girvan-Newman Algorithm: Repeat until no edges are left: Calculate betweenness of edges Remove edges with highest betweenness 18
19 Computing Edge Betweenness A clever way to compute betweennesses efficiently Use breadth-first Search 1. For each node A{ 2. Run BFS on A 3. Count the number of shortest paths from A to any other node 4. Determine the amount of traffic from A to other nodes 5. } 6. Compute betweenness for each edge by summing all the traffic passing over the edge and divide by 2 Note that we count the flow between each pair of nodes A and B twice (once when running BFS from A and once when running BFS from B)! So, we need to divide resultant values by 2! 19
20 Homophily Links connect people with similar characteristics. Homophily has two mechanisms for link formation: Selection: Selecting friends with similar characteristics Individual characteristics drive the formation of links Immutable characteristics Social Influence (socialization) Modify behaviors to make them close to behaviors of friends Existing links influence the individual characteristics of the nodes Mutable characteristics 20
21 Homophily- Cnt. Different mechanisms for link formation as types of closure processes! Focal Closure: B and C people, A focus Selection: B links to similar C (common focus) 21
22 Homophily- Cnt. Different mechanisms for link formation as types of closure processes! Membership Closure: A and B people, C focus Social influence: B links to C influenced by A 22
23 Tracking Closure Algorithm ) Take 2 snapshots of network at different times: S(1), S(2). 2) For each k, find all pairs of nodes in S(1) that are not directly connected but have k common friends. 3) Compute T(k) as the fraction of these pairs connected in S(2). 4) Plot T(k) as a function of k Tracking link formation in large scale datasets based on the above mechanisms estimate for the probability that a link will form btw 2 people with k common friends. T(0) is the rate of link formation when it does not close a triangle 23
24 Spatial Model of Segregation Effects of homophily in the formation of ethnically and racially homogeneous neighborhoods in cities. People live near others like them!! Color the map wrt to a given race : --Lighter: Lowest percentageof the race --Darker: highest percentage of the race. 24
25 Schelling Model The overall effect: Local Preferences of individual agents have produced a Global Pattern that none of them necessarily intended. Immutable characteristics can become highly correlated with mutable characteristics (here decision about where to live). 25
26 triangles with one or three +'s as balanced Structural Balance For 3 people, certain configurations are socially / psychologically more plausible Balanced Unbalanced triangles with zero or two +'s are unbalanced 26
27 Structure of Balanced Nets What does a balanced network look like? If a Labeled Complete Graph is balanced, then: The network contains only positive edges, or Global division of network: Nodes can be divided into 2 groups X and Y such that: a pos link btw every pair of nodes in X, a pos link btw every pair of nodes in Y, and a neg link btw every node of X and every node of Y X Balance Theorem: These are the only ways to have a balanced network! Y 27
28 Weak Structural Balance Weak Structural Balance Property There is no triangle with exactly two positive edges and one negative edge. 3 Mutual enemies are allowed as there could be less of a force leading any 2 of them to become friend as compared to the first case (mutual enemies with a common friend to reconcile)!
29 Structure of Weakly Balanced Nets What does a weakly balanced network look like? If a Labeled Complete Graph is weakly balanced, then its nodes can be divided into groups such that: every 2 nodes in the same group are friends, and every 2 nodes in different groups are enemies. Weakly Balance Theorem: This is the only way to have a weakly balanced network! 29
30 Balance in General Networks Claim: A graph is balanced if and only if it contains no cycle with an odd number of negative edges. Not balanced! 30
31 Web Structure Distribution of WCCs and SCCs on the web. Graph structure in the Web. Broder et. al., WWW
32 Web Structure- Cnt. IN nodes: can reach SCC but cannot be reached from it. OUT nodes: can be reached from SCC but cannot reach it. Tendrils nodes: (a) reachable from IN but cannot reach SCC, (b) can reach OUT but cannot be reached from SCC. Tendrils nodes satisfying both a & b, travel in tube from IN to OUT without touching SCC. Disconnected nodes: have no path to SCC ignoring directions Graph structure in the Web. Broder et. al., WWW
33 Power Law A function that decreases as k to some fixed power, e.g. ak -c, is called a power law! It allows to see very large values of k in data! If power-law holds, the log -log plot should be a straight line. 33
34 Rich Get Richer Rich-Get-Richer: A simple model for the creation of links as a basis for power laws! 1. Pages are created in order and named 1, 2,, N. 2. When page j is created, it produces a link to an earlier page i < j based on the following rules: a) With probability p, page j chooses page i uniformly at random, and creates a link to i. b) With probability (1- p), page j chooses page i uniformly at random and creates a link to the page that i points to (copies decision made by i). 34
35 Rich Get Richer- Cnt. We observe power law, if we run this model for many pages the fraction of pages with k in-links will be distributed according to a power law 1/k c! Value of the exponent c depends on the choice of p. Correlation between c and p? Smaller p copying becomes more frequent more likely to see extremely popular pages c gets smaller as well 35
36 Rich Get Richer- Cnt. Explain power laws using the Rich-Get-Richer model: Fraction of numbers receiving k calls per day: 1/k 2 Fraction of books bought by k people: 1/k 3 Fraction of papers with k citations: 1/k 3 Fraction of cities with population k: 1/k c, c constant Cities grow in proportion to their size, simply as a result of people having children! Once an item becomes popular, the rich-get-richer dynamics are likely to push it even higher! 36
37 HITS Algorithm 1. Set all hub scores and authority scores to Choose a number of steps k. 3. Perform a sequence of k hub-authority updates: 1. First apply the Authority Update Rule to the current set of scores. 2. Then apply the Hub Update Rule to the resulting set of scores. 4. Normalize authority and hub scores 37
38 HITS- Cnt. Authority Update Rule: For each page p, update auth(p) to be the sum of the hub scores of all pages that point to it. P auth(p) Hub Update Rule: For each page p, update hub(p) to be the sum of the authority scores of all pages that it points to. hub(p) P 38
39 Page Rank Algorithm 1. Set initial PageRank of all nodes to 1/n. 2. Perform k updates to the PageRank values: 1. Apply PageRank Update Rule 39
40 Page Rank- Cnt. PageRank Update Rule: 1. Each page divides its current PageRank equally across its out-going links passes equal shares to the pages it points to. If a page has no out-going links, it passes all its current PageRank to itself. 2. Each page updates its new PageRank to be the sum of the shares it receives. p i p j 40
41 Page Rank- Cnt. Issue with page rank algorithm? Link Farm Wrong nodes can end up with all the PageRank in the network! 41
42 Page Rank- Cnt. Scaled PageRank Update Rule: Pick a scaling factor 0 < s < 1 Apply the PageRank Update Rule as before. Then scale down all PageRank values by a factor of s. The total PageRank in the network? shrinks from 1 to s. Divide residual (1 s) PageRank equally over nodes giving (1- s) /n to each. The above rule follows from the fluid intuition for PageRank Why all the water on earth doesn t inexorably run downhill and reside exclusively at the lowest points? There s a counter-balancing process at work: Water also evaporates and gets rained back down at higher elevations! 42
43 Random Walks Random walk on a network: Start by choosing a page at random Pick each page with equal probability. Follow links for a sequence of k steps: In each step, pick a random out-going link from the current page, and follow it to where it leads. If there is no out-going links, stay at current node. An equivalent formulation of PageRank that leads to exactly the same definition! 43
44 Random Walks- Cnt. Interpretation of the leakage issue in terms of Random Walks: As the walk runs for more and more steps: The probability of reaching F or G is converging to 1; Once it reaches F or G, it is stuck there forever. The probability of being at F (G) is converging to 1/2 The probabilities are converging to 0 for all other nodes. 44
45 Information Cascade behaviors that cascade from one node to another like an epidemic! and produce collective outcomes. occurs when people make decisions sequentially, with later people watching the actions of earlier people. 45
46 Information Cascade- Cnt. General Cascades Principles Cascades can easily occur, given the right structural conditions! Cascades can lead to non-optimal (wrong) outcomes! Some (but not all) cascades can be very fragile! 46
47 Information Cascade- Cnt. follow the crowd follow private info acc rej rej acc acc acc follow private info follow the crowd 47
48 Diffusion Look at cascade from network structure perspective People imitate behaviors of others. Adopt a new behavior once a sufficient proportion of their neighbors have done so. 48
49 Diffusion- Cnt. Question: What makes a cascade stop? Or prevents it from breaking into all parts of a network? Claim: Given initial adopters of A & threshold q: i. If remaining network contains a cluster of density greater than (1 q), then no complete cascade. ii. If there is no complete cascade, the remaining network contains a cluster of density > (1 q). Cluster Density A cluster with density p: set of nodes such that each node has at least p fraction of its neighbors in the set. 49
50 Six Degree of Separation Watts-Strogatz Model A simple model that makes the word small by: Many closed triads, Many short paths. Suppose nodes live on a 2-dimensional grid Link formation: Homophily each node forms a link to all other nodes that lie within a radius of up to r grid steps away, r is a constant These are the links to similar people! Weak Ties For some constant k, each node also forms a link to k other nodes selected uniformly at random from the grid Connecting nodes who lie very far apart on the grid. 50
51 Six Degree of Separation- Cnt. The resulting net built from local structure and random edges The network has many triangles There are many short paths connecting pairs of nodes in the net! 51
52 Six Degree of Separation- Cnt. It was shown that a small amount of randomness is just needed to achieve the same qualitative effect. Instead of k random friends, allow one out of every k nodes to have a single random friend! Interpretation: group k k nodes into one towns. Each town has k links to other towns Just like previous model. To find a short path btw 2 people, first find a short path btw their towns, then use the proximitybased edges to find the actual path. 52
53 Decentralized Search Decentralized Search People are effective at collectively finding short paths Generalizing Watts-Strogatz network model Nodes on a grid Each node has edges to nodes within r grid steps. Weak ties (k random edges) are generated in a way that decays with distance This is controlled by the clustering exponent q: Let d(v,w) be the number of grid steps between nodes v and w. distance if one had to walk along adjacent nodes on the grid v links to w with probability proportional to d(v, w) -q q controls how uniform the random links are! 53
54 Decentralized Search- Cnt. d(v, w) -q : Links are too random, Can't be used effectively for decentralized search Links are not random enough. Not enough for long-distance jumps to create a small world. Is there an optimal q for the network that allows rapid decentralized search? 54
55 Decentralized Search- Cnt. 400M nodes Average of 1k runs Delivery time Best delivery time q ~ 2 Inverse square distribution! Generalized Models Ranked-Based Friendship Social Distance 55
56 Microblog Search 56
57 Microblog Search Architecture of search / retrieval systems Techniques for improving search Challenges of real-time search Twitter s architecture for real-time search Evaluation 57
58 Questions? 58
59 Reading Ch.01 Overview [NCM] Ch.02 Graphs [NCM] Ch.03 Strong and Weak Ties [NCM] Ch.04 Homophily, and Link Prediction [NCM] Ch.05 Positive and Negative Relationships [NCM] Ch.13 The Structure of the Web [NCM] Ch.14 Link Analysis [NCM] Ch.05 [MMD] Ch.16 Information Cascades [NCM] Ch.18 Power Laws and Rich-Get-Richer [NCM] Ch.19 Cascading Behavior in Networks [NCM] Ch.20 The Small-World Phenomenon [NCM] 59
Tie strength, social capital, betweenness and homophily. Rik Sarkar
Tie strength, social capital, betweenness and homophily Rik Sarkar Networks Position of a node in a network determines its role/importance Structure of a network determines its properties 2 Today Notion
More informationCS224W: Analysis of Networks Jure Leskovec, Stanford University
CS224W: Analysis of Networks Jure Leskovec, Stanford University http://cs224w.stanford.edu 11/13/17 Jure Leskovec, Stanford CS224W: Analysis of Networks, http://cs224w.stanford.edu 2 Observations Models
More informationPositive and Negative Relations
Positive and Negative Relations CMSC 498J: Social Media Computing Department of Computer Science University of Maryland Spring 2016 Hadi Amiri hadi@umd.edu Lecture Topics Balanced and Unbalanced Networks
More informationStructure of Social Networks
Structure of Social Networks Outline Structure of social networks Applications of structural analysis Social *networks* Twitter Facebook Linked-in IMs Email Real life Address books... Who Twitter #numbers
More informationEconomics of Information Networks
Economics of Information Networks Stephen Turnbull Division of Policy and Planning Sciences Lecture 4: December 7, 2017 Abstract We continue discussion of the modern economics of networks, which considers
More informationWeb 2.0 Social Data Analysis
Web 2.0 Social Data Analysis Ing. Jaroslav Kuchař jaroslav.kuchar@fit.cvut.cz Structure (2) Czech Technical University in Prague, Faculty of Information Technologies Software and Web Engineering 2 Contents
More informationTELCOM2125: Network Science and Analysis
School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2015 Figures are taken from: M.E.J. Newman, Networks: An Introduction 2
More informationNetwork Basics. CMSC 498J: Social Media Computing. Department of Computer Science University of Maryland Spring Hadi Amiri
Network Basics CMSC 498J: Social Media Computing Department of Computer Science University of Maryland Spring 2016 Hadi Amiri hadi@umd.edu Lecture Topics Graphs as Models of Networks Graph Theory Nodes,
More informationSocial Networks, Social Interaction, and Outcomes
Social Networks, Social Interaction, and Outcomes Social Networks and Social Interaction Not all links are created equal: Some links are stronger than others Some links are more useful than others Links
More informationCSE 258 Lecture 12. Web Mining and Recommender Systems. Social networks
CSE 258 Lecture 12 Web Mining and Recommender Systems Social networks Social networks We ve already seen networks (a little bit) in week 3 i.e., we ve studied inference problems defined on graphs, and
More informationCSE 158 Lecture 11. Web Mining and Recommender Systems. Social networks
CSE 158 Lecture 11 Web Mining and Recommender Systems Social networks Assignment 1 Due 5pm next Monday! (Kaggle shows UTC time, but the due date is 5pm, Monday, PST) Assignment 1 Assignment 1 Social networks
More informationSocial and Information Network Analysis Positive and Negative Relationships
Social and Information Network Analysis Positive and Negative Relationships Cornelia Caragea Department of Computer Science and Engineering University of North Texas June 14, 2016 To Recap Triadic Closure
More informationExtracting Information from Complex Networks
Extracting Information from Complex Networks 1 Complex Networks Networks that arise from modeling complex systems: relationships Social networks Biological networks Distinguish from random networks uniform
More informationCSE 255 Lecture 13. Data Mining and Predictive Analytics. Triadic closure; strong & weak ties
CSE 255 Lecture 13 Data Mining and Predictive Analytics Triadic closure; strong & weak ties Monday Random models of networks: Erdos Renyi random graphs (picture from Wikipedia http://en.wikipedia.org/wiki/erd%c5%91s%e2%80%93r%c3%a9nyi_model)
More informationCSE 158 Lecture 13. Web Mining and Recommender Systems. Triadic closure; strong & weak ties
CSE 158 Lecture 13 Web Mining and Recommender Systems Triadic closure; strong & weak ties Monday Random models of networks: Erdos Renyi random graphs (picture from Wikipedia http://en.wikipedia.org/wiki/erd%c5%91s%e2%80%93r%c3%a9nyi_model)
More informationCSE 158 Lecture 11. Web Mining and Recommender Systems. Triadic closure; strong & weak ties
CSE 158 Lecture 11 Web Mining and Recommender Systems Triadic closure; strong & weak ties Triangles So far we ve seen (a little about) how networks can be characterized by their connectivity patterns What
More informationAlgorithmic and Economic Aspects of Networks. Nicole Immorlica
Algorithmic and Economic Aspects of Networks Nicole Immorlica Syllabus 1. Jan. 8 th (today): Graph theory, network structure 2. Jan. 15 th : Random graphs, probabilistic network formation 3. Jan. 20 th
More informationModels of Network Formation. Networked Life NETS 112 Fall 2017 Prof. Michael Kearns
Models of Network Formation Networked Life NETS 112 Fall 2017 Prof. Michael Kearns Roadmap Recently: typical large-scale social and other networks exhibit: giant component with small diameter sparsity
More informationCSE 190 Lecture 16. Data Mining and Predictive Analytics. Small-world phenomena
CSE 190 Lecture 16 Data Mining and Predictive Analytics Small-world phenomena Another famous study Stanley Milgram wanted to test the (already popular) hypothesis that people in social networks are separated
More informationCAIM: Cerca i Anàlisi d Informació Massiva
1 / 72 CAIM: Cerca i Anàlisi d Informació Massiva FIB, Grau en Enginyeria Informàtica Slides by Marta Arias, José Balcázar, Ricard Gavaldá Department of Computer Science, UPC Fall 2016 http://www.cs.upc.edu/~caim
More informationSocial, Information, and Routing Networks: Models, Algorithms, and Strategic Behavior
Social, Information, and Routing Networks: Models, Algorithms, and Strategic Behavior Who? Prof. Aris Anagnostopoulos Prof. Luciana S. Buriol Prof. Guido Schäfer What will We Cover? Topics: Network properties
More informationBetweenness Measures and Graph Partitioning
Betweenness Measures and Graph Partitioning Objectives Define densely connected regions of a network Graph partitioning Algorithm to identify densely connected regions breaking a network into a set of
More informationMIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns
MIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns This is a closed-book exam. You should have no material on your desk other than the exam itself and a pencil or pen.
More informationWeb Structure Mining Community Detection and Evaluation
Web Structure Mining Community Detection and Evaluation 1 Community Community. It is formed by individuals such that those within a group interact with each other more frequently than with those outside
More informationClusters and Communities
Clusters and Communities Lecture 7 CSCI 4974/6971 22 Sep 2016 1 / 14 Today s Biz 1. Reminders 2. Review 3. Communities 4. Betweenness and Graph Partitioning 5. Label Propagation 2 / 14 Today s Biz 1. Reminders
More informationSocial and Technological Network Data Analytics. Lecture 5: Structure of the Web, Search and Power Laws. Prof Cecilia Mascolo
Social and Technological Network Data Analytics Lecture 5: Structure of the Web, Search and Power Laws Prof Cecilia Mascolo In This Lecture We describe power law networks and their properties and show
More informationAn Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization
An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization Pedro Ribeiro (DCC/FCUP & CRACS/INESC-TEC) Part 1 Motivation and emergence of Network Science
More informationHow Do Real Networks Look? Networked Life NETS 112 Fall 2014 Prof. Michael Kearns
How Do Real Networks Look? Networked Life NETS 112 Fall 2014 Prof. Michael Kearns Roadmap Next several lectures: universal structural properties of networks Each large-scale network is unique microscopically,
More informationSocial Network Analysis
Social Network Analysis Mathematics of Networks Manar Mohaisen Department of EEC Engineering Adjacency matrix Network types Edge list Adjacency list Graph representation 2 Adjacency matrix Adjacency matrix
More informationV2: Measures and Metrics (II)
- Betweenness Centrality V2: Measures and Metrics (II) - Groups of Vertices - Transitivity - Reciprocity - Signed Edges and Structural Balance - Similarity - Homophily and Assortative Mixing 1 Betweenness
More informationHow to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200?
How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200? Questions from last time Avg. FB degree is 200 (suppose).
More informationSocial Networks 2015 Lecture 10: The structure of the web and link analysis
04198250 Social Networks 2015 Lecture 10: The structure of the web and link analysis The structure of the web Information networks Nodes: pieces of information Links: different relations between information
More informationMining Social Network Graphs
Mining Social Network Graphs Analysis of Large Graphs: Community Detection Rafael Ferreira da Silva rafsilva@isi.edu http://rafaelsilva.com Note to other teachers and users of these slides: We would be
More informationCascades. Rik Sarkar. Social and Technological Networks. University of Edinburgh, 2018.
Cascades Social and Technological Networks Rik Sarkar University of Edinburgh, 2018. Course Solutions to Ex0 are up Make sure you are comfortable with this material Notes 1 with exercise questions are
More informationOnline Social Networks and Media. Positive and Negative Edges Strong and Weak Edges Strong Triadic Closure
Online Social Networks and Media Positive and Negative Edges Strong and Weak Edges Strong Triadic Closure POSITIVE AND NEGATIVE TIES Structural Balance What about negative edges? Initially, a complete
More informationRANDOM-REAL NETWORKS
RANDOM-REAL NETWORKS 1 Random networks: model A random graph is a graph of N nodes where each pair of nodes is connected by probability p: G(N,p) Random networks: model p=1/6 N=12 L=8 L=10 L=7 The number
More informationLink Analysis: Web Structure and Search
Link Analysis: Web Structure and Search Web Science (VU) (706716) Elisabeth Lex ISDS, TU Graz June 12, 2017 Elisabeth Lex (ISDS, TU Graz) Links June 12, 2017 1 / 69 Outline 1 Information Networks 2 Paths
More informationMAE 298, Lecture 9 April 30, Web search and decentralized search on small-worlds
MAE 298, Lecture 9 April 30, 2007 Web search and decentralized search on small-worlds Search for information Assume some resource of interest is stored at the vertices of a network: Web pages Files in
More informationGraph theory. Po-Shen Loh. June We begin by collecting some basic facts which can be proved via bare-hands techniques.
Graph theory Po-Shen Loh June 013 1 Basic results We begin by collecting some basic facts which can be proved via bare-hands techniques. 1. The sum of all of the degrees is equal to twice the number of
More information6.207/14.15: Networks Lecture 5: Generalized Random Graphs and Small-World Model
6.207/14.15: Networks Lecture 5: Generalized Random Graphs and Small-World Model Daron Acemoglu and Asu Ozdaglar MIT September 23, 2009 1 Outline Generalized random graph models Graphs with prescribed
More informationCentrality Book. cohesion.
Cohesion The graph-theoretic terms discussed in the previous chapter have very specific and concrete meanings which are highly shared across the field of graph theory and other fields like social network
More informationDisclaimer. Lect 2: empirical analyses of graphs
462 Page 1 Lect 2: empirical analyses of graphs Tuesday, September 11, 2007 8:30 AM Disclaimer These are my personal notes from this lecture. They may be wrong or inaccurate, and have not carefully been
More informationMa/CS 6b Class 10: Ramsey Theory
Ma/CS 6b Class 10: Ramsey Theory By Adam Sheffer The Pigeonhole Principle The pigeonhole principle. If n items are put into m containers, such that n > m, then at least one container contains more than
More informationInformation Networks and Semantics. Srinath Srinivasa IIIT Bangalore
Information Networks and Semantics Srinath Srinivasa IIIT Bangalore sri@iiitb.ac.in Outline Information versus Material Networks Semantics in Information Networks Knowledge Networks Triadic Closure Entrenchment
More informationIntroduction to Engineering Systems, ESD.00. Networks. Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow
Introduction to Engineering Systems, ESD.00 Lecture 7 Networks Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow The Bridges of Königsberg The town of Konigsberg in 18 th century
More informationBehavioral Data Mining. Lecture 9 Modeling People
Behavioral Data Mining Lecture 9 Modeling People Outline Power Laws Big-5 Personality Factors Social Network Structure Power Laws Y-axis = frequency of word, X-axis = rank in decreasing order Power Laws
More informationAlgorithms and Applications in Social Networks. 2017/2018, Semester B Slava Novgorodov
Algorithms and Applications in Social Networks 2017/2018, Semester B Slava Novgorodov 1 Lesson #1 Administrative questions Course overview Introduction to Social Networks Basic definitions Network properties
More informationMa/CS 6b Class 12: Ramsey Theory
Ma/CS 6b Class 12: Ramsey Theory By Adam Sheffer The Pigeonhole Principle The pigeonhole principle. If n items are put into m containers, such that n > m, then at least one container contains more than
More informationMaximizing the Spread of Influence through a Social Network. David Kempe, Jon Kleinberg and Eva Tardos
Maximizing the Spread of Influence through a Social Network David Kempe, Jon Kleinberg and Eva Tardos Group 9 Lauren Thomas, Ryan Lieblein, Joshua Hammock and Mary Hanvey Introduction In a social network,
More informationPositive and Negative Links
Positive and Negative Links Web Science (VU) (707.000) Elisabeth Lex KTI, TU Graz May 4, 2015 Elisabeth Lex (KTI, TU Graz) Networks May 4, 2015 1 / 66 Outline 1 Repetition 2 Motivation 3 Structural Balance
More informationCS246: Mining Massive Datasets Jure Leskovec, Stanford University
CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu HITS (Hypertext Induced Topic Selection) Is a measure of importance of pages or documents, similar to PageRank
More informationCS246: Mining Massive Datasets Jure Leskovec, Stanford University
CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu SPAM FARMING 2/11/2013 Jure Leskovec, Stanford C246: Mining Massive Datasets 2 2/11/2013 Jure Leskovec, Stanford
More informationCS249: SPECIAL TOPICS MINING INFORMATION/SOCIAL NETWORKS
CS249: SPECIAL TOPICS MINING INFORMATION/SOCIAL NETWORKS Overview of Networks Instructor: Yizhou Sun yzsun@cs.ucla.edu January 10, 2017 Overview of Information Network Analysis Network Representation Network
More informationGraphs / Networks. CSE 6242/ CX 4242 Feb 18, Centrality measures, algorithms, interactive applications. Duen Horng (Polo) Chau Georgia Tech
CSE 6242/ CX 4242 Feb 18, 2014 Graphs / Networks Centrality measures, algorithms, interactive applications Duen Horng (Polo) Chau Georgia Tech Partly based on materials by Professors Guy Lebanon, Jeffrey
More informationJordan Boyd-Graber University of Maryland. Thursday, March 3, 2011
Data-Intensive Information Processing Applications! Session #5 Graph Algorithms Jordan Boyd-Graber University of Maryland Thursday, March 3, 2011 This work is licensed under a Creative Commons Attribution-Noncommercial-Share
More informationInformation Networks: Hubs and Authorities
Information Networks: Hubs and Authorities Web Science (VU) (706.716) Elisabeth Lex KTI, TU Graz June 11, 2018 Elisabeth Lex (KTI, TU Graz) Links June 11, 2018 1 / 61 Repetition Opinion Dynamics Culture
More informationExample for calculation of clustering coefficient Node N 1 has 8 neighbors (red arrows) There are 12 connectivities among neighbors (blue arrows)
Example for calculation of clustering coefficient Node N 1 has 8 neighbors (red arrows) There are 12 connectivities among neighbors (blue arrows) Average clustering coefficient of a graph Overall measure
More informationDiffusion and Clustering on Large Graphs
Diffusion and Clustering on Large Graphs Alexander Tsiatas Thesis Proposal / Advancement Exam 8 December 2011 Introduction Graphs are omnipresent in the real world both natural and man-made Examples of
More informationMINFS544: Business Network Data Analytics and Applications
MINFS544: Business Network Data Analytics and Applications Feb 21 th, 2017 Daning Hu, Ph.D., Department of Informatics University of Zurich F Schweitzer et al. Science 2009 Stop Contagious Failures in
More informationNotes for Lecture 24
U.C. Berkeley CS170: Intro to CS Theory Handout N24 Professor Luca Trevisan December 4, 2001 Notes for Lecture 24 1 Some NP-complete Numerical Problems 1.1 Subset Sum The Subset Sum problem is defined
More informationOverlay (and P2P) Networks
Overlay (and P2P) Networks Part II Recap (Small World, Erdös Rényi model, Duncan Watts Model) Graph Properties Scale Free Networks Preferential Attachment Evolving Copying Navigation in Small World Samu
More informationAlgorithms: Graphs. Amotz Bar-Noy. Spring 2012 CUNY. Amotz Bar-Noy (CUNY) Graphs Spring / 95
Algorithms: Graphs Amotz Bar-Noy CUNY Spring 2012 Amotz Bar-Noy (CUNY) Graphs Spring 2012 1 / 95 Graphs Definition: A graph is a collection of edges and vertices. Each edge connects two vertices. Amotz
More informationComplex Networks. Structure and Dynamics
Complex Networks Structure and Dynamics Ying-Cheng Lai Department of Mathematics and Statistics Department of Electrical Engineering Arizona State University Collaborators! Adilson E. Motter, now at Max-Planck
More informationCSE 417: Algorithms and Computational Complexity. 3.1 Basic Definitions and Applications. Goals. Chapter 3. Winter 2012 Graphs and Graph Algorithms
Chapter 3 CSE 417: Algorithms and Computational Complexity Graphs Reading: 3.1-3.6 Winter 2012 Graphs and Graph Algorithms Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.
More informationEcon 430 Lecture 3: Significance and Structural Properties of N
Econ 430 Lecture 3: Significance and Structural Properties of Networks Alper Duman Izmir University Economics, March 8, 2013 Prevalence of Networks Networks are everywhere! Even in this class. We can classify
More informationECLT 5810 Clustering
ECLT 5810 Clustering What is Cluster Analysis? Cluster: a collection of data objects Similar to one another within the same cluster Dissimilar to the objects in other clusters Cluster analysis Grouping
More informationLecture 11: Graph algorithms! Claudia Hauff (Web Information Systems)!
Lecture 11: Graph algorithms!! Claudia Hauff (Web Information Systems)! ti2736b-ewi@tudelft.nl 1 Course content Introduction Data streams 1 & 2 The MapReduce paradigm Looking behind the scenes of MapReduce:
More informationbeyond social networks
beyond social networks Small world phenomenon: high clustering C network >> C random graph low average shortest path l network ln( N)! neural network of C. elegans,! semantic networks of languages,! actor
More informationL22-23: Graph Algorithms
Indian Institute of Science Bangalore, India भ रत य व ज ञ न स स थ न ब गल र, भ रत Department of Computational and Data Sciences DS 0--0,0 L-: Graph Algorithms Yogesh Simmhan simmhan@cds.iisc.ac.in Slides
More informationM.E.J. Newman: Models of the Small World
A Review Adaptive Informatics Research Centre Helsinki University of Technology November 7, 2007 Vocabulary N number of nodes of the graph l average distance between nodes D diameter of the graph d is
More informationCSCI5070 Advanced Topics in Social Computing
CSCI5070 Advanced Topics in Social Computing Irwin King The Chinese University of Hong Kong king@cse.cuhk.edu.hk!! 2012 All Rights Reserved. Outline Graphs Origins Definition Spectral Properties Type of
More informationLarge-Scale Networks. PageRank. Dr Vincent Gramoli Lecturer School of Information Technologies
Large-Scale Networks PageRank Dr Vincent Gramoli Lecturer School of Information Technologies Introduction Last week we talked about: - Hubs whose scores depend on the authority of the nodes they point
More informationCS 6604: Data Mining Large Networks and Time-Series
CS 6604: Data Mining Large Networks and Time-Series Soumya Vundekode Lecture #12: Centrality Metrics Prof. B Aditya Prakash Agenda Link Analysis and Web Search Searching the Web: The Problem of Ranking
More informationECLT 5810 Clustering
ECLT 5810 Clustering What is Cluster Analysis? Cluster: a collection of data objects Similar to one another within the same cluster Dissimilar to the objects in other clusters Cluster analysis Grouping
More informationCS224W: Social and Information Network Analysis Project Report: Edge Detection in Review Networks
CS224W: Social and Information Network Analysis Project Report: Edge Detection in Review Networks Archana Sulebele, Usha Prabhu, William Yang (Group 29) Keywords: Link Prediction, Review Networks, Adamic/Adar,
More informationWeb 2.0 Social Data Analysis
Web 2.0 Social Data Analysis Ing. Jaroslav Kuchař jaroslav.kuchar@fit.cvut.cz Structure(1) Czech Technical University in Prague, Faculty of Information Technologies Software and Web Engineering 2 Contents
More informationStatistical Methods for Network Analysis: Exponential Random Graph Models
Day 2: Network Modeling Statistical Methods for Network Analysis: Exponential Random Graph Models NMID workshop September 17 21, 2012 Prof. Martina Morris Prof. Steven Goodreau Supported by the US National
More informationDistribution-Free Models of Social and Information Networks
Distribution-Free Models of Social and Information Networks Tim Roughgarden (Stanford CS) joint work with Jacob Fox (Stanford Math), Rishi Gupta (Stanford CS), C. Seshadhri (UC Santa Cruz), Fan Wei (Stanford
More informationGraph Mining and Social Network Analysis
Graph Mining and Social Network Analysis Data Mining and Text Mining (UIC 583 @ Politecnico di Milano) References q Jiawei Han and Micheline Kamber, "Data Mining: Concepts and Techniques", The Morgan Kaufmann
More informationMath 120 Introduction to Statistics Mr. Toner s Lecture Notes 3.1 Measures of Central Tendency
Math 1 Introduction to Statistics Mr. Toner s Lecture Notes 3.1 Measures of Central Tendency lowest value + highest value midrange The word average: is very ambiguous and can actually refer to the mean,
More informationECS 289 / MAE 298, Lecture 15 Mar 2, Diffusion, Cascades and Influence, Part II
ECS 289 / MAE 298, Lecture 15 Mar 2, 2011 Diffusion, Cascades and Influence, Part II Diffusion and cascades in networks (Nodes in one of two states) Viruses (human and computer) contact processes epidemic
More informationMCL. (and other clustering algorithms) 858L
MCL (and other clustering algorithms) 858L Comparing Clustering Algorithms Brohee and van Helden (2006) compared 4 graph clustering algorithms for the task of finding protein complexes: MCODE RNSC Restricted
More informationMath 7 Glossary Terms
Math 7 Glossary Terms Absolute Value Absolute value is the distance, or number of units, a number is from zero. Distance is always a positive value; therefore, absolute value is always a positive value.
More informationWeek 5 Video 5. Relationship Mining Network Analysis
Week 5 Video 5 Relationship Mining Network Analysis Today s Class Network Analysis Network Analysis Analysis of anything that can be seen as connections between nodes Most common social networks Connections
More informationChapter 1. Social Media and Social Computing. October 2012 Youn-Hee Han
Chapter 1. Social Media and Social Computing October 2012 Youn-Hee Han http://link.koreatech.ac.kr 1.1 Social Media A rapid development and change of the Web and the Internet Participatory web application
More informationConstructing a G(N, p) Network
Random Graph Theory Dr. Natarajan Meghanathan Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection, most
More informationAnnouncements. Image Segmentation. From images to objects. Extracting objects. Status reports next Thursday ~5min presentations in class
Image Segmentation Announcements Status reports next Thursday ~5min presentations in class Project voting From Sandlot Science Today s Readings Forsyth & Ponce, Chapter 1 (plus lots of optional references
More informationBasic Network Concepts
Basic Network Concepts Basic Vocabulary Alice Graph Network Edges Links Nodes Vertices Chuck Bob Edges Alice Chuck Bob Edge Weights Alice Chuck Bob Apollo 13 Movie Network Main Actors in Apollo 13 the
More informationRandom Graph Model; parameterization 2
Agenda Random Graphs Recap giant component and small world statistics problems: degree distribution and triangles Recall that a graph G = (V, E) consists of a set of vertices V and a set of edges E V V.
More informationDegree Distribution: The case of Citation Networks
Network Analysis Degree Distribution: The case of Citation Networks Papers (in almost all fields) refer to works done earlier on same/related topics Citations A network can be defined as Each node is a
More informationErdős-Rényi Model for network formation
Network Science: Erdős-Rényi Model for network formation Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Why model? Simpler representation
More informationCS224W: Social and Information Network Analysis Jure Leskovec, Stanford University
CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University http://cs224w.stanford.edu 10/10/2011 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, http://cs224w.stanford.edu
More informationSmall-World Models and Network Growth Models. Anastassia Semjonova Roman Tekhov
Small-World Models and Network Growth Models Anastassia Semjonova Roman Tekhov Small world 6 billion small world? 1960s Stanley Milgram Six degree of separation Small world effect Motivation Not only friends:
More information1 Homophily and assortative mixing
1 Homophily and assortative mixing Networks, and particularly social networks, often exhibit a property called homophily or assortative mixing, which simply means that the attributes of vertices correlate
More informationClustering. Informal goal. General types of clustering. Applications: Clustering in information search and analysis. Example applications in search
Informal goal Clustering Given set of objects and measure of similarity between them, group similar objects together What mean by similar? What is good grouping? Computation time / quality tradeoff 1 2
More informationCS-E5740. Complex Networks. Scale-free networks
CS-E5740 Complex Networks Scale-free networks Course outline 1. Introduction (motivation, definitions, etc. ) 2. Static network models: random and small-world networks 3. Growing network models: scale-free
More informationGraph Theory. Network Science: Graph theory. Graph theory Terminology and notation. Graph theory Graph visualization
Network Science: Graph Theory Ozalp abaoglu ipartimento di Informatica Scienza e Ingegneria Università di ologna www.cs.unibo.it/babaoglu/ ranch of mathematics for the study of structures called graphs
More informationAlgorithms. Graphs. Algorithms
Algorithms Graphs Algorithms Graphs Definition: A graph is a collection of edges and vertices. Each edge connects two vertices. Algorithms 1 Graphs Vertices: Nodes, points, computers, users, items,...
More informationTopic mash II: assortativity, resilience, link prediction CS224W
Topic mash II: assortativity, resilience, link prediction CS224W Outline Node vs. edge percolation Resilience of randomly vs. preferentially grown networks Resilience in real-world networks network resilience
More informationMath 443/543 Graph Theory Notes 10: Small world phenomenon and decentralized search
Math 443/543 Graph Theory Notes 0: Small world phenomenon and decentralized search David Glickenstein November 0, 008 Small world phenomenon The small world phenomenon is the principle that all people
More information