Structural influence:

Slides:



Advertisements
Similar presentations
A General Framework for Mining Concept-Drifting Data Streams with Skewed Distributions Jing Gao Wei Fan Jiawei Han Philip S. Yu University of Illinois.
Advertisements

An Interactive-Voting Based Map Matching Algorithm
1 Cross-domain Collaboration Recommendation Jie Tang 1, Sen Wu 1, Jimeng Sun 2, Hang Su 1 1 Tsinghua University 2 IBM TJ Watson Research Center.
+ Multi-label Classification using Adaptive Neighborhoods Tanwistha Saha, Huzefa Rangwala and Carlotta Domeniconi Department of Computer Science George.
De-anonymizing social networks Arvind Narayanan, Vitaly Shmatikov.
Active Learning for Streaming Networked Data Zhilin Yang, Jie Tang, Yutao Zhang Computer Science Department, Tsinghua University.
Confluence: Conformity Influence in Large Social Networks
Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams.
1 1 Chenhao Tan, 1 Jie Tang, 2 Jimeng Sun, 3 Quan Lin, 4 Fengjiao Wang 1 Department of Computer Science and Technology, Tsinghua University, China 2 IBM.
© University of Minnesota Data Mining for the Discovery of Ocean Climate Indices 1 CSci 8980: Data Mining (Fall 2002) Vipin Kumar Army High Performance.
T T Population Sampling Distribution Purpose Allows the analyst to determine the mean and standard deviation of a sampling distribution.
T T07-01 Sample Size Effect – Normal Distribution Purpose Allows the analyst to analyze the effect that sample size has on a sampling distribution.
Decentralised Coordination of Mobile Sensors School of Electronics and Computer Science University of Southampton Ruben Stranders,
1 1 Chenhao Tan, 1 Jie Tang, 2 Jimeng Sun, 3 Quan Lin, 4 Fengjiao Wang 1 Department of Computer Science and Technology, Tsinghua University, China 2 IBM.
Active Learning for Networked Data Based on Non-progressive Diffusion Model Zhilin Yang, Jie Tang, Bin Xu, Chunxiao Xing Dept. of Computer Science and.
1 A Discriminative Approach to Topic- Based Citation Recommendation Jie Tang and Jing Zhang Presented by Pei Li Knowledge Engineering Group, Dept. of Computer.
1 Modeling the Effect of a Rate Smoother on TCP Congestion Control Behavior Kang Li, Jonathan Walpole, David C. Steere {kangli, walpole,
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
Positioning in Ad-Hoc Networks - Directions and Results Jan Beutel Computer Engineering and Networks Lab Swiss Federal Institute of Technology Zurich August.
1 Panther: Fast Top-K Similarity Search on Large Networks Jing Zhang 1, Jie Tang 1, Cong Ma 1, Hanghang Tong 2, Yu Jing 1, and Juanzi Li 1 1 Department.
Maximizing the lifetime of WSN using VBS Yaxiong Zhao and Jie Wu Computer and Information Sciences Temple University.
Online Social Networks and Media
CSE 5331/7331 F'07© Prentice Hall1 CSE 5331/7331 Fall 2007 Machine Learning Margaret H. Dunham Department of Computer Science and Engineering Southern.
CS 484 Load Balancing. Goal: All processors working all the time Efficiency of 1 Distribute the load (work) to meet the goal Two types of load balancing.
1 From Sentiment to Emotion Analysis in Social Networks Jie Tang Department of Computer Science and Technology Tsinghua University, China.
1 Yang Yang *, Yizhou Sun +, Jie Tang *, Bo Ma #, and Juanzi Li * Entity Matching across Heterogeneous Sources *Tsinghua University + Northeastern University.
1 Probability and Statistics Confidence Intervals.
Example Apply hierarchical clustering with d min to below data where c=3. Nearest neighbor clustering d min d max will form elongated clusters!
Computing and Information Sciences Kansas State University ANNIE Conference November 10, 2008 Predicting Links and Link Change in Friends Networks: Supervised.
Chapter 9 Sampling Distributions 9.1 Sampling Distributions.
1 Zi Yang Tsinghua University Joint work with Prof. Jie Tang, Prof. Juanzi Li, Dr. Keke Cai, Jingyi Guo, Chi Wang, etc. July 21, 2011, CASIN 2011, Tsinghua.
1 Zi Yang Tsinghua University Joint work with Prof. Jie Tang, Prof. Juanzi Li, Dr. Keke Cai, Jingyi Guo, Chi Wang, etc. July 21, 2011, CASIN 2011, Tsinghua.
Exploiting Input Features for Controlling Tunable Approximate Programs Sherry Zhou Department of electronic engineering Tsinghua University.
Chapter 6 Normal Approximation to Binomial Lecture 4 Section: 6.6.
The simultaneous evolution of author and paper networks
Yu Wang1, Gao Cong2, Guojie Song1, Kunqing Xie1
Wenyu Zhang From Social Network Group
Lecture 9 Line Drawing Algorithms (Bresenham’s Line Algorithm)
(5) Notes on the Least Squares Estimate
New Characterizations in Turnstile Streams with Applications
Journal of Vision. 2008;8(7):12. doi: / Figure Legend:
QianZhu, Liang Chen and Gagan Agrawal
Dynamic Graph Partitioning Algorithm
Learning Triadic Influence in Large Social Networks
Cross-lingual Knowledge Linking Across Wiki Knowledge Bases
Boosting and Additive Trees
Learning Influence Probabilities In Social Networks
Friend Recommendation with a Target User in Social Networking Services
Prof. Carolina Ruiz Department of Computer Science
Example: Academic Search
Cross-library API Recommendation Using Web Search Engines
The
Chapter 6 Confidence Intervals.
N-Gram Model Formulas Word sequences Chain rule of probability
Evaluating Hypotheses
MEgo2Vec: Embedding Matched Ego Networks for User Alignment Across Social Networks Jing Zhang+, Bo Chen+, Xianming Wang+, Fengmei Jin+, Hong Chen+, Cuiping.
A graphing calculator is required for some problems or parts of problems 2000.
Ensemble learning.
CHAPTER 12 More About Regression
Example: Academic Search
Prepared by: Mahmoud Rafeek Al-Farra
GANG: Detecting Fraudulent Users in OSNs
CSSE463: Image Recognition Day 18
Actively Learning Ontology Matching via User Interaction
Roc curves By Vittoria Cozza, matr
Introduction to Sampling Distributions
Fingerprints Are they inherited?.
Using Clustering to Make Prediction Intervals For Neural Networks
Prof. Carolina Ruiz Department of Computer Science
Presentation transcript:

Structural influence: PaperID: 1948 StructInf: Mining Structural Influence from Social Streams Jing Zhang, Jie Tang, Yuanyi Zhong, Yuchen Mo, Juanzi Li, Guojie Song, Wendy Hall, and Jimeng Sun Department of Computer Science, Tsinghua University Active neighbor Target node Question: In which structures, the target nodes are most likely to be activated? Problem Formulation Input: (v1, a1, t1) (v0, a1, t2) (v3, a1, t2) (v2, a1, t3) (v3, a2, t3) (v2, a2, t4) … v2 v3 v1 v0 v5 (v1, a1, t1) (v3, a2, t3) (v2, a2, t4) (v0, a1, t2) (v3, a1, t2) Active actions Inactive actions (v2, a1, t3) (v5, a2, t5) Network Streaming actions Action diffusion graph Output: Structural influence: Influence Probabilities of a structure Ck that can be found in the action diffusion graph. Structural Influence Measurement Basic method Sampling based methods Maintain a queue and a map to record the diffusion edges within recent time interval. To calculate xk, active actions are newly arrived actions. To calculate yk, inactive actions are actions that are outdated. Enumerate structures by extending neighboring actions of active or inactive actions. To avoid duplicate enumeration, assign each action an incremental (unique) label when it arrives, and make the labels of the selected actions smaller than those in the candidate actions. Sampling1 – Randomly sample nodes when enumerating influence patterns. Sampling2 – Randomly reserve edges when building diffusion graph. Sampling3 – Combine Sampling1 and Sampling2. They are unbiased sampling methods Results Trade-off between error and time by varying sampling probabilities: Retweet prediction: Sampling3 is most insensitive to parameters Basic: #friends, gender, status, etc. C1 : the number of active neighbors Weak: Moderate: Strong: Convergence of relative error: C1 C4 : Approximate influence probability : Relative error of approximate values