A visual analytics approach to compare propagation models in social networks

Size: px
Start display at page:

Download "A visual analytics approach to compare propagation models in social networks"

Transcription

1 London, April A visual analytics approach to compare propagation models in social networks J. Vallet, H. Kirchner, B. Pinaud, G. Melançon LaBRI, UMR 5800 Inria Bordeaux Univ. Bordeaux

2 We want to... Study propagation models and social networks Compare the propagation models Use graph rewriting techniques to represent models and run propagation simulations Perform visual analysis 2

3 Definitions A social network: Described as a graph G=(V, E) with a set of nodes V called individuals a set of edges E V V to represent relations W. W. Zachary, An information flow model for conflict and fission in small groups, Journal of Anthropological Research 33, (1977). 3

4 Definitions Propagation in a network as a social process An individual performs an action Her/his neighbours are informed and choose to perform the same action The process repeats itself Decisions can depend on influences, vulnerabilities or resistances between neighbours 4

5 Probabilistic cascade model simulation Linear threshold model simulation 5

6 Probabilistic cascade model simulation Linear threshold model simulation 6

7 Probabilistic cascade model simulation Linear threshold model simulation 7

8 Probabilistic cascade model simulation Linear threshold model simulation 8

9 Probabilistic cascade model simulation Linear threshold model simulation 9

10 Probabilistic cascade model simulation Linear threshold model simulation 10

11 Probabilistic cascade model simulation Linear threshold model simulation 11

12 Probabilistic cascade model simulation Linear threshold model simulation 12

13 Probabilistic cascade model simulation Linear threshold model simulation 13

14 Definitions Selected references: Threshold models Bertuzzo et al. (2010), Dodds et al. (2005), Goyal et al. (2012), Granovetter (1978), Watts (2002) Cascade models Chen W. et al. (2011), Gomez-Rodriguez et al. (2010), Payne et al. (2011), Richardson et al. (2002), Wonyeol et al. (2012)... 14

15 Model translation and rewrite rules Propagation in a network from a graph theoretic perspective Social state (activated, influent) are encoded as node attributes The process acts locally, is asynchronous, distributed and follows some conditions This is where graph rewriting comes into play 15

16 Model translation and rewrite rules Propagation in a network as a Graph Rewriting System Rules as a common paradigm to express the propagation models Each propagation paradigm (threshold, cascade) has its own ruleset and a strategy managing their application Modelling through Strategic Rewriting [Fernandez et al. (2014)] 16

17 Model translation and rewrite rules Definition: Port graph with properties [Fernandez et al. (2014)] G=(N, P, E) Ports are used as connection points Edges connect nodes through ports Each element possess a set of properties 17

18 Model translation and rewrite rules Definition: Port graph rewrite rule Symbolically written as L R LHS/RHS expressed as port graphs is a special node whose ports encode rewiring conditions to perform in rewriting (through red edges) 18

19 Model translation and rewrite rules Example: Independent cascade model [Kempe et al. (2003)] Start with a set of influencers Influencers try (according to some probability) to influence their neighbours and recruit them as new influencers The process repeats until no more influencer can be recruited 19

20 Model translation and rewrite rules Rule 1: influence from a neighbour 20

21 Model translation and rewrite rules Active = true Marked = false Active = false Visited =? Rule 1: influence from a neighbour 21

22 Model translation and rewrite rules Active = true Active = true Marked = false Marked = true Active = false Visited =? Active = false Visited = true Rule 1: influence from a neighbour 22

23 Model translation and rewrite rules Active = true Active = true Marked = false [Probability = X] Marked = true [Probability = X] Active = false Visited =? [Sigma = Y] Active = false Visited = true [Sigma = f(x, Y)] Rule 1: influence from a neighbour 23

24 Model translation and rewrite rules Active = false Visited = true Active = true Rule 2: node activation 24

25 Model translation and rewrite rules Definition: Strategy Manage the rules' application order Express control (repeat, if-then-else, while-do, ) Use a located graph with Position and Banned subgraphs: Position represents the subgraph where rewriting may take place Banned represents the subgraph where rewriting is forbidden 25

26 Model translation and rewrite rules 26

27 Model translation and rewrite rules Step 1 Step 2 Step 3 27

28 Model translation and rewrite rules Step 4 Step 5 Step 6 28

29 Analytic visualization and model comparison Successive applications of rules Keep track of the previously computed simulations Use the derivation tree during comparative analysis [Pinaud et al. (2012)] 29

30 Analytic visualization and model comparison Metrics: used to measure the propagation evolution Propagation speed: estimated by the number of active nodes at a given step Acknowledgment speed: estimated by the number of visited nodes at a given step Propagation efficiency: ratio of activated nodes at step t against those visited at t-1 30

31 Number of active nodes Number of active nodes Propagation speed Propagation step Independent cascade Propagation step Linear threshold model 31

32 32

33 Number of active nodes Propagation speed Propagation step Independent cascade Propagation step Linear threshold model Propagation step Linear threshold model (reinforced influences) 33

34 Number of visited nodes Acknowledgment speed Propagation step Independent cascade Propagation step Linear threshold model Propagation step Linear threshold model (reinforced influences) 34

35 To conclude We have used graph rewriting as a common language to express propagation models Analyze and compare the models precisely by storing the propagation evolution Results can be visually investigated to help enforce influence maximization Several metrics available to perform analysis 35

36 Future work Extend to additional models Explore other visual encodings for scalability (Matrix views...) Management of time-dependent attributes evolving along the propagation (influence exhaustion, media induced fashion...) Joint use of propagation and topological modifications Application to different domains (power distribution, network security, epidemiology, financial crisis) 36

37 References Goyal, A., F. Bonchi, and L. V. Lakshmanan (2010). Learning influence probabilities in social networks. In 3rd ACM Int. Conf. on Web Search and Data Mining, WSDM 10, pp Kempe, D., J. Kleinberg, and É. Tardos (2003). Maximizing the spread of influence through a social network. In Proc. of the 9th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, KDD 03, pp Fernandez, M., H. Kirchner, and B. Pinaud (2014). Strategic Port Graph Rewriting : An Interactive Modelling and Analysis Framework. In D. Bošnački, S. Edelkamp, A. L. Lafuente, et A. Wijs (Eds.), GRAPHITE 2014, Volume 159 of EPTCS, pp Pinaud, B., G. Melançon, and J. Dubois (2012). Porgy : A visual graph rewriting environment for complex systems. Computer Graphics Forum 31(3),

38 Thanks for your attention.

Bruno Pinaud University of Bordeaux

Bruno Pinaud University of Bordeaux Strategic Graph Rewriting / Network Analysis / Visual Analytics Challenges and thoughts Bruno Pinaud University of Bordeaux Joint work with : Maribel Fernandez (King s College London, UK) Hélène Kirchner

More information

Influence Maximization in the Independent Cascade Model

Influence Maximization in the Independent Cascade Model Influence Maximization in the Independent Cascade Model Gianlorenzo D Angelo, Lorenzo Severini, and Yllka Velaj Gran Sasso Science Institute (GSSI), Viale F. Crispi, 7, 67100, L Aquila, Italy. {gianlorenzo.dangelo,lorenzo.severini,yllka.velaj}@gssi.infn.it

More information

An Optimal Allocation Approach to Influence Maximization Problem on Modular Social Network. Tianyu Cao, Xindong Wu, Song Wang, Xiaohua Hu

An Optimal Allocation Approach to Influence Maximization Problem on Modular Social Network. Tianyu Cao, Xindong Wu, Song Wang, Xiaohua Hu An Optimal Allocation Approach to Influence Maximization Problem on Modular Social Network Tianyu Cao, Xindong Wu, Song Wang, Xiaohua Hu ACM SAC 2010 outline Social network Definition and properties Social

More information

Example 3: Viral Marketing and the vaccination policy problem

Example 3: Viral Marketing and the vaccination policy problem Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture 2: Jan 19, 2012 Scribes: Preethi Ambati and Azar Aliyev Example 3: Viral Marketing and the vaccination policy problem Diffusion

More information

arxiv: v1 [cs.si] 12 Jan 2019

arxiv: v1 [cs.si] 12 Jan 2019 Predicting Diffusion Reach Probabilities via Representation Learning on Social Networks Furkan Gursoy furkan.gursoy@boun.edu.tr Ahmet Onur Durahim onur.durahim@boun.edu.tr arxiv:1901.03829v1 [cs.si] 12

More information

Influence Maximization in Location-Based Social Networks Ivan Suarez, Sudarshan Seshadri, Patrick Cho CS224W Final Project Report

Influence Maximization in Location-Based Social Networks Ivan Suarez, Sudarshan Seshadri, Patrick Cho CS224W Final Project Report Influence Maximization in Location-Based Social Networks Ivan Suarez, Sudarshan Seshadri, Patrick Cho CS224W Final Project Report Abstract The goal of influence maximization has led to research into different

More information

Labelled Graph Strategic Rewriting for Social Networks

Labelled Graph Strategic Rewriting for Social Networks Labelled Graph Strategic Rewriting for Social Networks Maribel Fernandez, Hélène Kirchner, Bruno Pinaud, Jason Vallet To cite this version: Maribel Fernandez, Hélène Kirchner, Bruno Pinaud, Jason Vallet.

More information

Scalable Influence Maximization in Social Networks under the Linear Threshold Model

Scalable Influence Maximization in Social Networks under the Linear Threshold Model Scalable Influence Maximization in Social Networks under the Linear Threshold Model Wei Chen Microsoft Research Asia Yifei Yuan Li Zhang In collaboration with University of Pennsylvania Microsoft Research

More information

Information Dissemination in Socially Aware Networks Under the Linear Threshold Model

Information Dissemination in Socially Aware Networks Under the Linear Threshold Model Information Dissemination in Socially Aware Networks Under the Linear Threshold Model Srinivasan Venkatramanan and Anurag Kumar Department of Electrical Communication Engineering, Indian Institute of Science,

More information

Maximizing the Spread of Influence through a Social Network

Maximizing the Spread of Influence through a Social Network Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams Social Networks Infectious disease networks Viral Marketing Viral Marketing Example:

More information

CSE 316: SOCIAL NETWORK ANALYSIS INTRODUCTION. Fall 2017 Marion Neumann

CSE 316: SOCIAL NETWORK ANALYSIS INTRODUCTION. Fall 2017 Marion Neumann CSE 316: SOCIAL NETWORK ANALYSIS Fall 2017 Marion Neumann INTRODUCTION Contents in these slides may be subject to copyright. Some materials are adopted from: http://www.cs.cornell.edu/home /kleinber/ networks-book,

More information

Part I Part II Part III Part IV Part V. Influence Maximization

Part I Part II Part III Part IV Part V. Influence Maximization Part I Part II Part III Part IV Part V Influence Maximization 1 Word-of-mouth (WoM) effect in social networks xphone is good xphone is good xphone is good xphone is good xphone is good xphone is good xphone

More information

Graph similarity. Laura Zager and George Verghese EECS, MIT. March 2005

Graph similarity. Laura Zager and George Verghese EECS, MIT. March 2005 Graph similarity Laura Zager and George Verghese EECS, MIT March 2005 Words you won t hear today impedance matching thyristor oxide layer VARs Some quick definitions GV (, E) a graph G V the set of vertices

More information

DNE: A Method for Extracting Cascaded Diffusion Networks from Social Networks

DNE: A Method for Extracting Cascaded Diffusion Networks from Social Networks DNE: A Method for Extracting Cascaded Diffusion Networks from Social Networks Motahhare Eslami, Hamid R. Rabiee, and Mostafa Salehi AICTC Research Center, Department of Computer Engineering Sharif University

More information

Sparsification of Social Networks Using Random Walks

Sparsification of Social Networks Using Random Walks Sparsification of Social Networks Using Random Walks Bryan Wilder and Gita Sukthankar Department of EECS (CS), University of Central Florida bryan.wilder@knights.ucf.edu, gitars@eecs.ucf.edu Abstract There

More information

Sources of Misinformation in Online Social Networks: Who to suspect?

Sources of Misinformation in Online Social Networks: Who to suspect? Sources of Misinformation in Online Social Networks: Who to suspect? Dung T. Nguyen, Nam P. Nguyen and My T. Thai Department of Computer and Information Science and Engineering University of FLorida Email:

More information

Limiting Concept Spread in Environments with Interacting Concepts

Limiting Concept Spread in Environments with Interacting Concepts Limiting Concept Spread in Environments with Interacting Concepts James Archbold Department of Computer Science University of Warwick J.Archbold@warwick.ac.uk Nathan Griffiths Department of Computer Science

More information

Combining intensification and diversification to maximize the propagation of social influence

Combining intensification and diversification to maximize the propagation of social influence Title Combining intensification and diversification to maximize the propagation of social influence Author(s) Fan, X; Li, VOK Citation The 2013 IEEE International Conference on Communications (ICC 2013),

More information

Extracting Influential Nodes for Information Diffusion on a Social Network

Extracting Influential Nodes for Information Diffusion on a Social Network Extracting Influential Nodes for Information Diffusion on a Social Network Masahiro Kimura Dept. of Electronics and Informatics Ryukoku University Otsu 520-2194, Japan kimura@rins.ryukoku.ac.jp Kazumi

More information

Pattern Mining in Frequent Dynamic Subgraphs

Pattern Mining in Frequent Dynamic Subgraphs Pattern Mining in Frequent Dynamic Subgraphs Karsten M. Borgwardt, Hans-Peter Kriegel, Peter Wackersreuther Institute of Computer Science Ludwig-Maximilians-Universität Munich, Germany kb kriegel wackersr@dbs.ifi.lmu.de

More information

IRIE: Scalable and Robust Influence Maximization in Social Networks

IRIE: Scalable and Robust Influence Maximization in Social Networks IRIE: Scalable and Robust Influence Maximization in Social Networks Kyomin Jung KAIST Republic of Korea kyomin@kaist.edu Wooram Heo KAIST Republic of Korea modesty83@kaist.ac.kr Wei Chen Microsoft Research

More information

On a Network Generalization of the Minmax Theorem

On a Network Generalization of the Minmax Theorem On a Network Generalization of the Minmax Theorem Constantinos Daskalakis Christos H. Papadimitriou {costis, christos}@cs.berkeley.edu February 10, 2009 Abstract We consider graphical games in which edges

More information

Collaborative Filtering using a Spreading Activation Approach

Collaborative Filtering using a Spreading Activation Approach Collaborative Filtering using a Spreading Activation Approach Josephine Griffith *, Colm O Riordan *, Humphrey Sorensen ** * Department of Information Technology, NUI, Galway ** Computer Science Department,

More information

Journal of Engineering Science and Technology Review 7 (3) (2014) Research Article

Journal of Engineering Science and Technology Review 7 (3) (2014) Research Article Jestr Journal of Engineering Science and Technology Review 7 (3) (214) 32 38 Research Article JOURNAL OF Engineering Science and Technology Review www.jestr.org Improved Algorithms OF CELF and CELF++ for

More information

Theme Identification in RDF Graphs

Theme Identification in RDF Graphs Theme Identification in RDF Graphs Hanane Ouksili PRiSM, Univ. Versailles St Quentin, UMR CNRS 8144, Versailles France hanane.ouksili@prism.uvsq.fr Abstract. An increasing number of RDF datasets is published

More information

Efficient Influence Maximization in Social Networks

Efficient Influence Maximization in Social Networks Efficient Influence Maximization in Social Networks Wei Chen Microsoft Research Asia Beijing, China weic@microsoft.com Yajun Wang Microsoft Research Asia Beijing, China yajunw@microsoft.com Siyu Yang Dept.

More information

ECS 289 / MAE 298, Lecture 15 Mar 2, Diffusion, Cascades and Influence, Part II

ECS 289 / MAE 298, Lecture 15 Mar 2, Diffusion, Cascades and Influence, Part II ECS 289 / MAE 298, Lecture 15 Mar 2, 2011 Diffusion, Cascades and Influence, Part II Diffusion and cascades in networks (Nodes in one of two states) Viruses (human and computer) contact processes epidemic

More information

An Empirical Analysis of Communities in Real-World Networks

An Empirical Analysis of Communities in Real-World Networks An Empirical Analysis of Communities in Real-World Networks Chuan Sheng Foo Computer Science Department Stanford University csfoo@cs.stanford.edu ABSTRACT Little work has been done on the characterization

More information

Characteristics of Preferentially Attached Network Grown from. Small World

Characteristics of Preferentially Attached Network Grown from. Small World Characteristics of Preferentially Attached Network Grown from Small World Seungyoung Lee Graduate School of Innovation and Technology Management, Korea Advanced Institute of Science and Technology, Daejeon

More information

Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data

Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data Ms. Gayatri Attarde 1, Prof. Aarti Deshpande 2 M. E Student, Department of Computer Engineering, GHRCCEM, University

More information

CARPENTER Find Closed Patterns in Long Biological Datasets. Biological Datasets. Overview. Biological Datasets. Zhiyu Wang

CARPENTER Find Closed Patterns in Long Biological Datasets. Biological Datasets. Overview. Biological Datasets. Zhiyu Wang CARPENTER Find Closed Patterns in Long Biological Datasets Zhiyu Wang Biological Datasets Gene expression Consists of large number of genes Knowledge Discovery and Data Mining Dr. Osmar Zaiane Department

More information

Minimizing the Spread of Contamination by Blocking Links in a Network

Minimizing the Spread of Contamination by Blocking Links in a Network Minimizing the Spread of Contamination by Blocking Links in a Network Masahiro Kimura Deptartment of Electronics and Informatics Ryukoku University Otsu 520-2194, Japan kimura@rins.ryukoku.ac.jp Kazumi

More information

arxiv:cs/ v1 [cs.ir] 26 Apr 2002

arxiv:cs/ v1 [cs.ir] 26 Apr 2002 Navigating the Small World Web by Textual Cues arxiv:cs/0204054v1 [cs.ir] 26 Apr 2002 Filippo Menczer Department of Management Sciences The University of Iowa Iowa City, IA 52242 Phone: (319) 335-0884

More information

HIPRank: Ranking Nodes by Influence Propagation based on authority and hub

HIPRank: Ranking Nodes by Influence Propagation based on authority and hub HIPRank: Ranking Nodes by Influence Propagation based on authority and hub Wen Zhang, Song Wang, GuangLe Han, Ye Yang, Qing Wang Laboratory for Internet Software Technologies Institute of Software, Chinese

More information

Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating

Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Dipak J Kakade, Nilesh P Sable Department of Computer Engineering, JSPM S Imperial College of Engg. And Research,

More information

Cache Less for More in Information- Centric Networks W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter)

Cache Less for More in Information- Centric Networks W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter) Cache Less for More in Information- Centric Networks W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter) Department of Electronic & Electrical Engineering University College London London WC1E 6EA United

More information

Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme

Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme Miao Qiao, Hong Cheng, Lijun Chang and Jeffrey Xu Yu The Chinese University of Hong Kong {mqiao, hcheng, ljchang, yu}@secuhkeduhk

More information

Viral Marketing and Outbreak Detection. Fang Jin Yao Zhang

Viral Marketing and Outbreak Detection. Fang Jin Yao Zhang Viral Marketing and Outbreak Detection Fang Jin Yao Zhang Paper 1: Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, Éva Tardos KDD 2003 Outline Problem Statement

More information

Unit 8: Coping with NP-Completeness. Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems. Y.-W.

Unit 8: Coping with NP-Completeness. Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems. Y.-W. : Coping with NP-Completeness Course contents: Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems Reading: Chapter 34 Chapter 35.1, 35.2 Y.-W. Chang 1 Complexity

More information

Lossy Compression of Dynamic, Weighted Graphs

Lossy Compression of Dynamic, Weighted Graphs Lossy Compression of Dynamic, Weighted Graphs Wilko Henecka and Matthew Roughan matthew.roughan@adelaide.edu.au http://www.maths.adelaide.edu.au/matthew.roughan/ UoA August 6, 2015 M.Roughan (UoA) Graph

More information

Social-Tie-Based Information Dissemination in Mobile Opportunistic Social Networks

Social-Tie-Based Information Dissemination in Mobile Opportunistic Social Networks Social-Tie-Based Information Dissemination in Mobile Opportunistic Social Networks Yunsheng Wang and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 191 Abstract

More information

Graphical Approach for Influence Maximization in Social Networks Under Generic Threshold-based Non-submodular Model

Graphical Approach for Influence Maximization in Social Networks Under Generic Threshold-based Non-submodular Model 217 IEEE International Conference on Big Data (BIGDATA) Graphical Approach for Influence Maximization in Social Networks Under Generic Threshold-based Non-submodular Model Liang Ma IBM T. J. Watson Research

More information

Failure in Complex Social Networks

Failure in Complex Social Networks Journal of Mathematical Sociology, 33:64 68, 2009 Copyright # Taylor & Francis Group, LLC ISSN: 0022-250X print/1545-5874 online DOI: 10.1080/00222500802536988 Failure in Complex Social Networks Damon

More information

Event detection in massive datasets has applications

Event detection in massive datasets has applications AI AND HEALH Editor: Daniel B. Neill, H.J. Heinz III College, Carnegie Mellon University, neill@cs.cmu.edu Graph Structure Learning from Unlabeled Data for Early Outbreak Detection Sriram Somanchi, University

More information

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding v.vallinayagi research scholar, manonmanium university tirunelveli-11 Dr.G.M.Nasira Assistant professor dept of computer

More information

Exact Computation of Influence Spread by Binary Decision Diagrams

Exact Computation of Influence Spread by Binary Decision Diagrams Exact Computation of Influence Spread by Binary Decision Diagrams Takanori Maehara 1), Hirofumi Suzuki 2), Masakazu Ishihata 2) 1) Riken Center for Advanced Intelligence Project 2) Hokkaido University

More information

Impact of Clustering on Epidemics in Random Networks

Impact of Clustering on Epidemics in Random Networks Impact of Clustering on Epidemics in Random Networks Joint work with Marc Lelarge INRIA-ENS 8 March 2012 Coupechoux - Lelarge (INRIA-ENS) Epidemics in Random Networks 8 March 2012 1 / 19 Outline 1 Introduction

More information

Comparing the diversity of information by word-of-mouth vs. web spread

Comparing the diversity of information by word-of-mouth vs. web spread epl draft Header will be provided by the publisher Comparing the diversity of information by word-of-mouth vs. web spread A. SELA 1(a), LOUIS SHEKHTMAN 2, SHLOMO HAVLIN 2, I. BEN-GAL 1 1 Tel Aviv University,

More information

Clustering methods: Part 7 Outlier removal Pasi Fränti

Clustering methods: Part 7 Outlier removal Pasi Fränti Clustering methods: Part 7 Outlier removal Pasi Fränti 6.5.207 Machine Learning University of Eastern Finland Outlier detection methods Distance-based methods Knorr & Ng Density-based methods KDIST: K

More information

Lecture Note: Computation problems in social. network analysis

Lecture Note: Computation problems in social. network analysis Lecture Note: Computation problems in social network analysis Bang Ye Wu CSIE, Chung Cheng University, Taiwan September 29, 2008 In this lecture note, several computational problems are listed, including

More information

The Microblogging Evolution Based on User's Popularity

The Microblogging Evolution Based on User's Popularity Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 2703-2708 2703 The Microblogging Evolution Based on User's Popularity Open Access Tao Shaohua *

More information

Game Theoretic Models for Social Network Analysis

Game Theoretic Models for Social Network Analysis Game Theoretic Models for Social Network Analysis Y. Narahari and Ramasuri Narayanam Email ID: {hari,nrsuri}@csa.iisc.ernet.in Electronic Commerce Laboratory Department of Computer Science and Automation

More information

Deep Web Crawling and Mining for Building Advanced Search Application

Deep Web Crawling and Mining for Building Advanced Search Application Deep Web Crawling and Mining for Building Advanced Search Application Zhigang Hua, Dan Hou, Yu Liu, Xin Sun, Yanbing Yu {hua, houdan, yuliu, xinsun, yyu}@cc.gatech.edu College of computing, Georgia Tech

More information

SmartGossip: : an improved randomized broadcast protocol for sensor networks

SmartGossip: : an improved randomized broadcast protocol for sensor networks SmartGossip: : an improved randomized broadcast protocol for sensor networks Presented by Vilas Veeraraghavan Advisor Dr. Steven Weber Presented to the Center for Telecommunications and Information Networking

More information

Exploring graph mining approaches for dynamic heterogeneous networks

Exploring graph mining approaches for dynamic heterogeneous networks Georgetown University Institutional Repository http://www.library.georgetown.edu/digitalgeorgetown The author made this article openly available online. Please tell us how this access affects you. Your

More information

Effective Large-Scale Online Influence Maximization

Effective Large-Scale Online Influence Maximization Effective Large-Scale Online Influence Maximization Paul Lagrée, Olivier Cappé, Bogdan Cautis and Silviu Maniu LRI, Université Paris-Sud, Université Paris-Saclay LIMSI, CNRS, Université Paris-Saclay Huawei

More information

Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques

Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology,

More information

Predicting Information Diffusion in Social Networks using Content and User s Profiles

Predicting Information Diffusion in Social Networks using Content and User s Profiles Predicting Information Diffusion in Social Networks using Content and User s Profiles Cédric Lagnier, Ludovic Denoyer, Eric Gaussier, Patrick Gallinari To cite this version: Cédric Lagnier, Ludovic Denoyer,

More information

PROVIDING PRIVACY AND PERSONALIZATION IN SEARCH

PROVIDING PRIVACY AND PERSONALIZATION IN SEARCH PROVIDING PRIVACY AND PERSONALIZATION IN SEARCH T. Mercy Priya and R. M. Suresh Department of Computer Science and Engineering, Sri Muthukumaran Institute of Technology, Chikkarayapuram, Chennai, Tamil

More information

Influence-oriented Community Analysis in Social Networks

Influence-oriented Community Analysis in Social Networks Influence-oriented Community Analysis in Social Networks A thesis submitted in fulfilment of the requirements for the degree of Doctor of Philosophy Xinjue Wang B.Sc., Department of Computer Science and

More information

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism V.Narasimha Raghavan, M.Venkatesh, Divya Sridharabalan, T.Sabhanayagam, Nithin Bharath Abstract In our paper, we are utilizing

More information

Combinatorial Model and Bounds for Target Set Selection

Combinatorial Model and Bounds for Target Set Selection Combinatorial Model and Bounds for Target Set Selection Eyal Ackerman Oren Ben-Zwi Guy Wolfovitz Abstract The adoption of everyday decisions in public affairs, fashion, movie-going, and consumer behavior

More information

On Finding Power Method in Spreading Activation Search

On Finding Power Method in Spreading Activation Search On Finding Power Method in Spreading Activation Search Ján Suchal Slovak University of Technology Faculty of Informatics and Information Technologies Institute of Informatics and Software Engineering Ilkovičova

More information

CS224W: Analysis of Networks Jure Leskovec, Stanford University

CS224W: Analysis of Networks Jure Leskovec, Stanford University CS224W: Analysis of Networks Jure Leskovec, Stanford University http://cs224w.stanford.edu 11/13/17 Jure Leskovec, Stanford CS224W: Analysis of Networks, http://cs224w.stanford.edu 2 Observations Models

More information

Jure Leskovec Machine Learning Department Carnegie Mellon University

Jure Leskovec Machine Learning Department Carnegie Mellon University Jure Leskovec Machine Learning Department Carnegie Mellon University Currently: Soon: Today: Large on line systems have detailed records of human activity On line communities: Facebook (64 million users,

More information

Clustering Algorithms for Data Stream

Clustering Algorithms for Data Stream Clustering Algorithms for Data Stream Karishma Nadhe 1, Prof. P. M. Chawan 2 1Student, Dept of CS & IT, VJTI Mumbai, Maharashtra, India 2Professor, Dept of CS & IT, VJTI Mumbai, Maharashtra, India Abstract:

More information

Modeling Dynamic Behavior in Large Evolving Graphs

Modeling Dynamic Behavior in Large Evolving Graphs Modeling Dynamic Behavior in Large Evolving Graphs R. Rossi, J. Neville, B. Gallagher, and K. Henderson Presented by: Doaa Altarawy 1 Outline - Motivation - Proposed Model - Definitions - Modeling dynamic

More information

Understanding Community Effects on Information Diffusion

Understanding Community Effects on Information Diffusion Understanding Community Effects on Information Diffusion Shuyang Lin 1, Qingbo Hu 1, Guan Wang 3, and Philip S. Yu 1,2 1 Department of Computer Science, University of Illinois at Chicago, IL 2 Institute

More information

INFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM

INFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM INFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM G.Amlu #1 S.Chandralekha #2 and PraveenKumar *1 # B.Tech, Information Technology, Anand Institute of Higher Technology, Chennai, India

More information

Distributed Data Anonymization with Hiding Sensitive Node Labels

Distributed Data Anonymization with Hiding Sensitive Node Labels Distributed Data Anonymization with Hiding Sensitive Node Labels C.EMELDA Research Scholar, PG and Research Department of Computer Science, Nehru Memorial College, Putthanampatti, Bharathidasan University,Trichy

More information

The Diffusion of Networking Technologies

The Diffusion of Networking Technologies The Diffusion of Networking Technologies Sharon Goldberg Boston University goldbe@cs.bu.edu Zhenming Liu Princeton University zhenming@cs.princeton.edu August 27, 2013 Abstract There has been significant

More information

CS224W Project Write-up Static Crawling on Social Graph Chantat Eksombatchai Norases Vesdapunt Phumchanit Watanaprakornkul

CS224W Project Write-up Static Crawling on Social Graph Chantat Eksombatchai Norases Vesdapunt Phumchanit Watanaprakornkul 1 CS224W Project Write-up Static Crawling on Social Graph Chantat Eksombatchai Norases Vesdapunt Phumchanit Watanaprakornkul Introduction Our problem is crawling a static social graph (snapshot). Given

More information

Correlation Based Feature Selection with Irrelevant Feature Removal

Correlation Based Feature Selection with Irrelevant Feature Removal Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Discovery of Community Structure in Complex Networks Based on Resistance Distance and Center Nodes

Discovery of Community Structure in Complex Networks Based on Resistance Distance and Center Nodes Journal of Computational Information Systems 8: 23 (2012) 9807 9814 Available at http://www.jofcis.com Discovery of Community Structure in Complex Networks Based on Resistance Distance and Center Nodes

More information

A SOLUTION FOR REPLICA CONSISTENCY MAINTENANCE IN UNSTRUCTURED PEER-TO-PEER NETWORKS

A SOLUTION FOR REPLICA CONSISTENCY MAINTENANCE IN UNSTRUCTURED PEER-TO-PEER NETWORKS INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 A SOLUTION FOR REPLICA CONSISTENCY MAINTENANCE IN UNSTRUCTURED PEER-TO-PEER NETWORKS Narjes Nikzad Khasmakhi 1, Shahram

More information

SCENARIO BASED ADAPTIVE PREPROCESSING FOR STREAM DATA USING SVM CLASSIFIER

SCENARIO BASED ADAPTIVE PREPROCESSING FOR STREAM DATA USING SVM CLASSIFIER SCENARIO BASED ADAPTIVE PREPROCESSING FOR STREAM DATA USING SVM CLASSIFIER P.Radhabai Mrs.M.Priya Packialatha Dr.G.Geetha PG Student Assistant Professor Professor Dept of Computer Science and Engg Dept

More information

Alain Barrat CPT, Marseille, France ISI, Turin, Italy

Alain Barrat CPT, Marseille, France ISI, Turin, Italy Link creation and profile alignment in the anobii social network Alain Barrat CPT, Marseille, France ISI, Turin, Italy Social networks Huge field of research Data: mostly small samples, surveys Multiplexity

More information

Detecting and Analyzing Communities in Social Network Graphs for Targeted Marketing

Detecting and Analyzing Communities in Social Network Graphs for Targeted Marketing Detecting and Analyzing Communities in Social Network Graphs for Targeted Marketing Gautam Bhat, Rajeev Kumar Singh Department of Computer Science and Engineering Shiv Nadar University Gautam Buddh Nagar,

More information

Network embedding. Cheng Zheng

Network embedding. Cheng Zheng Network embedding Cheng Zheng Outline Problem definition Factorization based algorithms --- Laplacian Eigenmaps(NIPS, 2001) Random walk based algorithms ---DeepWalk(KDD, 2014), node2vec(kdd, 2016) Deep

More information

Utilizing Social Influence in Content Distribution Networks

Utilizing Social Influence in Content Distribution Networks This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2 proceedings Utilizing Social Influence in Content Distribution

More information

Knowledge discovery from XML Database

Knowledge discovery from XML Database Knowledge discovery from XML Database Pravin P. Chothe 1 Prof. S. V. Patil 2 Prof.S. H. Dinde 3 PG Scholar, ADCET, Professor, ADCET Ashta, Professor, SGI, Atigre, Maharashtra, India Maharashtra, India

More information

MULTI-OBJECTIVE EVOLUTIONARY ALGORITHMS FOR ENERGY-EFFICIENCY IN HETEROGENEOUS WIRELESS SENSOR NETWORKS

MULTI-OBJECTIVE EVOLUTIONARY ALGORITHMS FOR ENERGY-EFFICIENCY IN HETEROGENEOUS WIRELESS SENSOR NETWORKS MULTI-OBJECTIVE EVOLUTIONARY ALGORITHMS FOR ENERGY-EFFICIENCY IN HETEROGENEOUS WIRELESS SENSOR NETWORKS José M. Lanza-Gutiérrez, Juan A. Gómez-Pulido, Miguel A. Vega- Rodríguez, Juan M. Sánchez University

More information

Whom to befriend to influence people

Whom to befriend to influence people Whom to befriend to influence people Manuel Lafond 1, Lata Narayanan 2, Kangkang Wu 2 1 Department of Computer Science, Université de Montréal, Montréal, Canada 2 Department of Computer Science and Software

More information

Positive Influence Dominating Set in Online Social Networks

Positive Influence Dominating Set in Online Social Networks Positive Influence Dominating Set in Online Social Networks Feng Wang, Erika Camacho, and Kuai Xu Arizona State University Email: {fwang25, erika.camacho, kxu01}@asu.edu Abstract. Online social network

More information

Semi supervised clustering for Text Clustering

Semi supervised clustering for Text Clustering Semi supervised clustering for Text Clustering N.Saranya 1 Assistant Professor, Department of Computer Science and Engineering, Sri Eshwar College of Engineering, Coimbatore 1 ABSTRACT: Based on clustering

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, ISSN: IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 20131 Improve Search Engine Relevance with Filter session Addlin Shinney R 1, Saravana Kumar T

More information

Multi-Agent Learning with a Distributed Genetic Algorithm

Multi-Agent Learning with a Distributed Genetic Algorithm Multi-Agent Learning with a Distributed Genetic Algorithm Exploring Innovation Diffusion on Networks Forrest Stonedahl, William Rand, Uri Wilensky Center for Connected Learning and Computer-Based Modeling

More information

Rule-Based Method for Entity Resolution Using Optimized Root Discovery (ORD)

Rule-Based Method for Entity Resolution Using Optimized Root Discovery (ORD) American-Eurasian Journal of Scientific Research 12 (5): 255-259, 2017 ISSN 1818-6785 IDOSI Publications, 2017 DOI: 10.5829/idosi.aejsr.2017.255.259 Rule-Based Method for Entity Resolution Using Optimized

More information

Querying Shortest Distance on Large Graphs

Querying Shortest Distance on Large Graphs .. Miao Qiao, Hong Cheng, Lijun Chang and Jeffrey Xu Yu Department of Systems Engineering & Engineering Management The Chinese University of Hong Kong October 19, 2011 Roadmap Preliminary Related Work

More information

A Conflict-Based Confidence Measure for Associative Classification

A Conflict-Based Confidence Measure for Associative Classification A Conflict-Based Confidence Measure for Associative Classification Peerapon Vateekul and Mei-Ling Shyu Department of Electrical and Computer Engineering University of Miami Coral Gables, FL 33124, USA

More information

Maximizing the Spread of Influence through a Social Network. David Kempe, Jon Kleinberg and Eva Tardos

Maximizing the Spread of Influence through a Social Network. David Kempe, Jon Kleinberg and Eva Tardos Maximizing the Spread of Influence through a Social Network David Kempe, Jon Kleinberg and Eva Tardos Group 9 Lauren Thomas, Ryan Lieblein, Joshua Hammock and Mary Hanvey Introduction In a social network,

More information

Comparison of Online Record Linkage Techniques

Comparison of Online Record Linkage Techniques International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 Dec-2015 p-issn: 2395-0072 www.irjet.net Comparison of Online Record Linkage Techniques Ms. SRUTHI.

More information

Survey Result on Privacy Preserving Techniques in Data Publishing

Survey Result on Privacy Preserving Techniques in Data Publishing Survey Result on Privacy Preserving Techniques in Data Publishing S.Deebika PG Student, Computer Science and Engineering, Vivekananda College of Engineering for Women, Namakkal India A.Sathyapriya Assistant

More information

Mining User - Aware Rare Sequential Topic Pattern in Document Streams

Mining User - Aware Rare Sequential Topic Pattern in Document Streams Mining User - Aware Rare Sequential Topic Pattern in Document Streams A.Mary Assistant Professor, Department of Computer Science And Engineering Alpha College Of Engineering, Thirumazhisai, Tamil Nadu,

More information

Efficient influence spread estimation for influence maximization under the linear threshold model

Efficient influence spread estimation for influence maximization under the linear threshold model Lu et al. Computational Social Networks 2014, 1:2 RESEARCH Efficient influence spread estimation for influence maximization under the linear threshold model Zaixin Lu *, Lidan Fan, Weili Wu, Bhavani Thuraisingham

More information

Diffusion in Networks With Overlapping Community Structure

Diffusion in Networks With Overlapping Community Structure Diffusion in Networks With Overlapping Community Structure Fergal Reid Clique Research Cluster University College Dublin Email: fergal.reid@gmail.com Neil Hurley Clique Research Cluster University College

More information

arxiv: v2 [stat.ml] 4 Apr 2018

arxiv: v2 [stat.ml] 4 Apr 2018 Stochastic Dynamic Programming Heuristics for Influence Maximization-Revenue Optimization Trisha Lawrence Department of Mathematics and Statistics University of Saskatchewan 106 Wiggins Road Saskatoon,

More information

The Impact of the Number of Nodes, Speed of Nodes, Speed of Network and the Network Space to the Number of Nodes keeps Alive

The Impact of the Number of Nodes, Speed of Nodes, Speed of Network and the Network Space to the Number of Nodes keeps Alive Available online at www.globalilluminators.org GlobalIlluminators Full Paper Proceeding GTAR-2014, Vol. 1, 463--469 FULL PAPER PROCEEDING Multidisciplinary Studies ISBN: 978-969-9948-30-5 GTAR-14 The Impact

More information

Large Scale Graph Algorithms

Large Scale Graph Algorithms Large Scale Graph Algorithms A Guide to Web Research: Lecture 2 Yury Lifshits Steklov Institute of Mathematics at St.Petersburg Stuttgart, Spring 2007 1 / 34 Talk Objective To pose an abstract computational

More information

A Constrained Spreading Activation Approach to Collaborative Filtering

A Constrained Spreading Activation Approach to Collaborative Filtering A Constrained Spreading Activation Approach to Collaborative Filtering Josephine Griffith 1, Colm O Riordan 1, and Humphrey Sorensen 2 1 Dept. of Information Technology, National University of Ireland,

More information