Modularity Maximization

Slides:



Advertisements
Similar presentations
Chapter 4 Partition (3) Double Partition Ding-Zhu Du.
Advertisements

1 Ivan Marsic Rutgers University LECTURE 15: Software Complexity Metrics.
Community Detection Algorithm and Community Quality Metric Mingming Chen & Boleslaw K. Szymanski Department of Computer Science Rensselaer Polytechnic.
Online Social Networks and Media. Graph partitioning The general problem – Input: a graph G=(V,E) edge (u,v) denotes similarity between u and v weighted.
1 Modularity and Community Structure in Networks* Final project *Based on a paper by M.E.J Newman in PNAS 2006.
Active Contour Models (Snakes)
1 Network Coding: Theory and Practice Apirath Limmanee Jacobs University.
University of Texas at Austin Machine Learning Group Department of Computer Sciences University of Texas at Austin Support Vector Machines.
1 Lecture 5: Automatic cluster detection Lecture 6: Artificial neural networks Lecture 7: Evaluation of discovered knowledge Brief introduction to lectures.
Recovering Articulated Object Models from 3D Range Data Dragomir Anguelov Daphne Koller Hoi-Cheung Pang Praveen Srinivasan Sebastian Thrun Computer Science.
Support Vector Machines
Lecture 3 Power Law Structure Ding-Zhu Du Univ of Texas at Dallas.
Department of Engineering Science Department of Zoology Soft partitioning in networks via Bayesian nonnegative matrix factorization Ioannis Psorakis, Steve.
Shambhavi Srinivasa Carey Williamson Zongpeng Li Department of Computer Science University of Calgary Barrier Counting in Mixed Wireless Sensor Networks.
1 CS612 Algorithms for Electronic Design Automation CS 612 – Lecture 8 Lecture 8 Network Flow Based Modeling Mustafa Ozdal Computer Engineering Department,
Network Flow. Network flow formulation A network G = (V, E). Capacity c(u, v)  0 for edge (u, v). Assume c(u, v) = 0 if (u, v)  E. Source s and sink.
Lecture 1-5 Power Law Structure Weili Wu Ding-Zhu Du Univ of Texas at Dallas.
Advancements in the Inference of AS Relationships Xenofontas Dimitropoulos (Fontas) (CAIDA/GaTech) Dmitri Krioukov Bradley Huffaker k claffy George Riley.
Lecture 3-1 Independent Cascade Weili Wu Ding-Zhu Du University of Texas at Dallas.
On Bharathi-Kempe-Salek Conjecture about Influence Maximization Ding-Zhu Du University of Texas at Dallas.
1 CS612 Algorithms for Electronic Design Automation CS 612 – Lecture 8 Lecture 8 Network Flow Based Modeling Mustafa Ozdal Computer Engineering Department,
Community structure in graphs Santo Fortunato. More links “inside” than “outside” Graphs are “sparse” “Communities”
Lecture 2-1 Submodular Maximization Weili Wu Ding-Zhu Du University of Texas at Dallas.
Lecture 2-3 Deterministic Difussion Weili Wu Ding-Zhu Du University of Texas at Dallas.
Community Detection  Definition: Community Detection  Girwan Newman Approach  Hierarchical Clustering.
Introduction to Social Computing
Graph clustering to detect network modules
Cohesive Subgraph Computation over Large Graphs
Wenyu Zhang From Social Network Group
Hierarchical Agglomerative Clustering on graphs
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Semi-Supervised Clustering
Independent Cascade Model and Linear Threshold Model
Heuristic & Approximation
Near-Optimal Spectrum Allocation for Cognitive Radios: A Frequency-Time Auction Perspective Xinyu Wang Department of Electronic Engineering Shanghai.
Computer-algorithm Methodology in Mathematics Instruction Hansheng Yang Bin Lu Southwest University of Science and Technology, Mianyang,
Groups of vertices and Core-periphery structure
MEIKE: Influence-based Communities in Networks
Gyan Ranjan University of Minnesota, MN
Influence Maximization
Power Law Structure Weili Wu Ding-Zhu Du Univ of Texas at Dallas
by Hyunwoo Park and Kichun Lee Knowledge-Based Systems 60 (2014) 58–72
June 2017 High Density Clusters.
Secure Scheduling for Barrier Coverage
Generative models preserving community structure
Overview of Communities in networks
Introduction to Social Computing
Positive Influence Dominating Set
Sociology & Science: Sociology is often referred to as a ‘Social Science’ but can it truly be classified as a science? Scientific methodology can be used.
Independent Cascade Model and Linear Threshold Model
Influence Maximization
The Capacity of Wireless Networks
Influence-Based Community Detection
Peter J. Mucha, Thomas Richardson, Kevin Macon, Mason A
Noémi Gaskó, Rodica Ioana Lung, Mihai Alexandru Suciu
Introducing Disciplines
3.3 Network-Centric Community Detection
Maximum Lifetime of Sensor Networks with Adjustable Sensing Range
On the Designing of Popular Packages
General Threshold and Cascade Models
Kempe-Kleinberg-Tardos Conjecture A simple proof
Influence Maximization
Independent Cascade Model and Linear Threshold Model
Survey on Coverage Problems in Wireless Sensor Networks - 2
Survey on Coverage Problems in Wireless Sensor Networks
at University of Texas at Dallas
And Competitive Influence
Lecture 2-6 Complexity for Computing Influence Spread
Multiple Products.
Data-Dependent Approximation
Presentation transcript:

Modularity Maximization Lecture 6-2 Modularity Maximization Ding-Zhu Du University of Texas at Dallas First, I want to thank you for you presence. ********In this presentation I will try to introduce The social network which is a theoretical structure to study relationships between individuals, groups, organizations, or even entire societies.  It is related to a wide range of disciplines. These disciplines include, but are not limited to information science, biology, economics, geography, communication studies, and so on.. The study of social networks begins with the late eighteenth century, two sociologists (Émile [ei'mi:l] Durkheim and Ferdinand ['fɝdənænd] Fer迪南de Tönnies) foreshadowed the idea of social networks in their theories and research of social groups. Nowadays, we study social networks using network analysis to identify social communities, pick influential person, and design good software. lidong.wu@utdallas.edu

Model-Based Detections Connection-based detection Modularity maximization Influence-based detection Overlapping community detection Hierarchy community detection

Model-Based Detection Modularity Maximization Is the most popular one

Outline Modularity Function Greedy Spectral Method and MP Hybrid Method 1. Brief overview of social networks 2. How to build applications on top of the social network –  Think about a social network being MS Windows, We can build applications on it.

Modularity Function (Newman 2006)

Modularity Function (Newman 2006)

Newman 2006 M.E. J. Newman: Modularity and community structure in networks, Proceedings of the National Academy of Sciences, vol 103 no 23 (2006) pp. 8577-8582.

Modularity Function

Modularity Function (Newman 2006)

Modularity Function (digraph)

Why call Modularity? Module = community in some complex networks The function describes the quality of modules.

Modularity Max is NP-hard U. Brandes, D. Delling, M. Gaertler, R. Gorke, M. Hoefer, Z. Nikoloski, and D. Wagner: On modularity clustering, IEEE Transactions on Knowledge and Data Engineering (TKDE), vol 20, no 2 (2008) pp 172-188

Outline Modularity Function Greedy Spectral Method Hybrid Method 1. Brief overview of social networks 2. How to build applications on top of the social network –  Think about a social network being MS Windows, We can build applications on it.

Increment

Greedy Algorithm

Outline Modularity Function Greedy Spectral Method and MP Hybrid Method 1. Brief overview of social networks 2. How to build applications on top of the social network –  Think about a social network being MS Windows, We can build applications on it.

Qualified Cut Community Partition

Quadratic Form

Spectral Method

Linear Program

Semi-definite Program Vector Program Semi-definite Program

Outline Modularity Function Greedy Spectral Method and MP Hybrid Method 1. Brief overview of social networks 2. How to build applications on top of the social network –  Think about a social network being MS Windows, We can build applications on it.

Resolution limit Misidentification: some derived communities do not satisfy the weak community definition or even the most weak community definition In other words, obtained communities may have sparser connection within them than between them.

Hybrid Detection: a Possible Research Direction

Max Q s.t. condition (1) This may give an improvement. Is it possible to do? (1) can be written as linear constraints Q can be written as a quadratic function Thus, Max Q s.t. (1) can be formulated as a quadratic programming, which can be transformed into a semi-definite programming

Linear Constraints

Linear Constraints

Modularity Density Modularity Density function (Li et al. 2008)

Opt D s.t. condition (1) This may give an improvement. Is it possible to do? (1) can be written as linear constraints Q can be written as a fractional function Thus, Max D s.t. (1) can be formulated as a Geometric Programming.

Outline Community Structure Connection-Based Detection Influence-Based Detection Remarks 1. Brief overview of social networks 2. How to build applications on top of the social network –  Think about a social network being MS Windows, We can build applications on it.

Remark 1 How to evaluate the method for finding a community? This is an important research problem. There exist many methods. Show an example.

Clustering

Community Detection

Remark 2 How to do hierarchy community detection? This is an important research problem. There exist many methods. Show an example.

Survey • Introductory review: Communities in networks by M. A. Porter, J.-P. Onnela, and P. J. Mucha, Notices of the American Mathematical Society 56, 1082 (2009) • Comprehensive review: Community detection in graphs by Santo Fortunato, Physics Reports 486, 75 (2010)

THANK YOU!