© 2012 IBM Corporation IBM Research Gelling, and Melting, Large Graphs by Edge Manipulation Joint Work by Hanghang Tong (IBM) B. Aditya Prakash (Virginia.

Slides:



Advertisements
Similar presentations
1 Dynamics of Real-world Networks Jure Leskovec Machine Learning Department Carnegie Mellon University
Advertisements

Some Graph Algorithms.
On the Vulnerability of Large Graphs
Optimizing Join Enumeration in Transformation-based Query Optimizers ANIL SHANBHAG, S. SUDARSHAN IIT BOMBAY VLDB 2014
Presentation of Designing Efficient Irregular Networks for Heterogeneous Systems-on-Chip by Christian Neeb and Norbert Wehn and Workload Driven Synthesis.
Influence propagation in large graphs - theorems and algorithms B. Aditya Prakash Christos Faloutsos
DAVA: Distributing Vaccines over Networks under Prior Information
The Connectivity and Fault-Tolerance of the Internet Topology
Wavelength Assignment in Optical Network Design Team 6: Lisa Zhang (Mentor) Brendan Farrell, Yi Huang, Mark Iwen, Ting Wang, Jintong Zheng Progress Report.
Global Flow Optimization (GFO) in Automatic Logic Design “ TCAD91 ” by C. Leonard Berman & Louise H. Trevillyan CAD Group Meeting Prepared by Ray Cheung.
S. J. Shyu Chap. 1 Introduction 1 The Design and Analysis of Algorithms Chapter 1 Introduction S. J. Shyu.
1 Social Influence Analysis in Large-scale Networks Jie Tang 1, Jimeng Sun 2, Chi Wang 1, and Zi Yang 1 1 Dept. of Computer Science and Technology Tsinghua.
Scalable Vaccine Distribution in Large Graphs given Uncertain Data Yao Zhang, B. Aditya Prakash Department of Computer Science Virginia Tech CIKM, Shanghai,
CMU SCS Large Graph Mining - Patterns, Tools and Cascade Analysis Christos Faloutsos CMU.
CMU SCS C. Faloutsos (CMU)#1 Large Graph Algorithms Christos Faloutsos CMU McGlohon, Mary Prakash, Aditya Tong, Hanghang Tsourakakis, Babis Akoglu, Leman.
Computational problems, algorithms, runtime, hardness
CMU SCS Mining Billion-node Graphs Christos Faloutsos CMU.
SCS CMU Joint Work by Hanghang Tong, Spiros Papadimitriou, Jimeng Sun, Philip S. Yu, Christos Faloutsos Speaker: Hanghang Tong Aug , 2008, Las Vegas.
Social Networks and Graph Mining Christos Faloutsos CMU - MLD.
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
Jointly Optimal Transmission and Probing Strategies for Multichannel Systems Saswati Sarkar University of Pennsylvania Joint work with Sudipto Guha (Upenn)
© 2011 IBM Corporation IBM Research SIAM-DM 2011, Mesa AZ, USA, Non-Negative Residual Matrix Factorization w/ Application to Graph Anomaly Detection Hanghang.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
© 2010 IBM Corporation Diversified Ranking on Large Graphs: An Optimization Viewpoint Hanghang Tong, Jingrui He, Zhen Wen, Ching-Yung Lin, Ravi Konuru.
Computational Complexity, Physical Mapping III + Perl CIS 667 March 4, 2004.
The community-search problem and how to plan a successful cocktail party Mauro SozioAris Gionis Max Planck Institute, Germany Yahoo! Research, Barcelona.
1 Combinatorial Dominance Analysis Keywords: Combinatorial Optimization (CO) Approximation Algorithms (AA) Approximation Ratio (a.r) Combinatorial Dominance.
U. Michigan participation in EDIN Lada Adamic, PI E 2.1 fractional immunization of networks E 2.1 time series analysis approach to correlating structure.
Fast Random Walk with Restart and Its Applications
Lecture 3 Power Law Structure Ding-Zhu Du Univ of Texas at Dallas.
1 Quantifying Trade-Offs in Networks and Auctions Tim Roughgarden Stanford University.
Resource Placement and Assignment in Distributed Network Topologies Accepted to: INFOCOM 2013 Yuval Rochman, Hanoch Levy, Eli Brosh.
Fast Failover for Control Traffic in Software-defined Networks Globecom 2012 Neda B. & Ying Z. Presented by: Szu-Ping Wang.
Primal-Dual Meets Local Search: Approximating MST’s with Non-uniform Degree Bounds Author: Jochen Könemann R. Ravi From CMU CS 3150 Presentation by Dan.
Structure Preserving Embedding Blake Shaw, Tony Jebara ICML 2009 (Best Student Paper nominee) Presented by Feng Chen.
CMU SCS Large Graph Mining Christos Faloutsos CMU.
Understanding and Managing Cascades on Large Graphs B. Aditya Prakash Computer Science Virginia Tech. CS Seminar 11/30/2012.
L14. Fair networks and topology design D. Moltchanov, TUT, Spring 2008 D. Moltchanov, TUT, Spring 2015.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Interacting Viruses in Networks: Can Both Survive? Authors: Alex Beutel, B. Aditya Prakash, Roni Rosenfeld, and Christos Faloutsos Presented by: Zachary.
Winner-takes-all: Competing Viruses or Ideas on fair-play Networks B. Aditya Prakash, Alex Beutel, Roni Rosenfeld, Christos Faloutsos Carnegie Mellon University,
Spotting Culprits in Epidemics: How many and Which ones? B. Aditya Prakash Virginia Tech Jilles Vreeken University of Antwerp Christos Faloutsos Carnegie.
Xiaowei Ying, Xintao Wu Dept. Software and Information Systems Univ. of N.C. – Charlotte 2008 SIAM Conference on Data Mining, April 25 th Atlanta, Georgia.
Lecture 1-5 Power Law Structure Weili Wu Ding-Zhu Du Univ of Texas at Dallas.
Hanghang Tong, Brian Gallagher, Christos Faloutsos, Tina Eliassi-Rad
Online Social Networks and Media
ECML-PKDD 2010, Barcelona, Spain B. Aditya Prakash*, Hanghang Tong* ^, Nicholas Valler+, Michalis Faloutsos+, Christos Faloutsos* * Carnegie Mellon University,
KDD 2007, San Jose Fast Direction-Aware Proximity for Graph Mining Speaker: Hanghang Tong Joint work w/ Yehuda Koren, Christos Faloutsos.
Algorithms For Solving History Sensitive Cascade in Diffusion Networks Research Proposal Georgi Smilyanov, Maksim Tsikhanovich Advisor Dr Yu Zhang Trinity.
Efficient Semi-supervised Spectral Co-clustering with Constraints
Center-Piece Subgraphs: Problem definition and Fast Solutions Hanghang Tong Christos Faloutsos Carnegie Mellon University.
Controlling Propagation at Group Scale on Networks Yao Zhang*, Abhijin Adiga +, Anil Vullikanti + *, and B. Aditya Prakash* *Department of Computer Science.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
SCS CMU Speaker Hanghang Tong Colibri: Fast Mining of Large Static and Dynamic Graphs Speaking Skill Requirement.
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
Arizona State University Fast Eigen-Functions Tracking on Dynamic Graphs Chen Chen and Hanghang Tong - 1 -
Errol Lloyd Design and Analysis of Algorithms Approximation Algorithms for NP-complete Problems Bin Packing Networks.
Xiaowei Ying, Kai Pan, Xintao Wu, Ling Guo Univ. of North Carolina at Charlotte SNA-KDD June 28, 2009, Paris, France Comparisons of Randomization and K-degree.
Inferring Networks of Diffusion and Influence
Finding Dense and Connected Subgraphs in Dual Networks
MEIKE: Influence-based Communities in Networks
Main algorithm with recursion: We’ll have a function DFS that initializes, and then calls DFS-Visit, which is a recursive function and does the depth first.
Complex Networks: Connectivity and Functionality
Effective Social Network Quarantine with Minimal Isolation Costs
Epidemiology.
3.3 Network-Centric Community Detection
Large Graph Mining: Power Tools and a Practitioner’s guide
Alan Kuhnle*, Victoria G. Crawford, and My T. Thai
Presentation transcript:

© 2012 IBM Corporation IBM Research Gelling, and Melting, Large Graphs by Edge Manipulation Joint Work by Hanghang Tong (IBM) B. Aditya Prakash (Virginia Tech.) Tina Eliassi-Rad (Rutgers) Michalis Faloutsos (UCR) Christos Faloutsos (CMU) Presenter: Hanghang Tong

An Example: Flu/Virus/Rumor/Idea Propagation HealthySick Contact 2

An Example: Flu/Virus Propagation HealthySick Contact 1: Sneeze to neighbors 2: Some neighbors  Sick 3: Try to recover 3

An Example: Flu/Virus Propagation HealthySick Contact 1: Sneeze to neighbors 2: Some neighbors  Sick 3: Try to recover Q: How to guild propagation by opt. link structure? 4

An Example: Flu/Virus Propagation HealthySick Contact 1: Sneeze to neighbors 2: Some neighbors  Sick 3: Try to recover Q: How to guild propagation by opt. link structure? - Q1: Understand tipping point  existing work - Q2: Minimize the propagation - Q3: Maximize the propagation 5  This paper

IBM Research © 2012 IBM CorporationSocial Analytics & Collaboration Technologies Group 6 Roadmap  Motivation: An Illustrative Example  Q1: Understanding the Tipping Point (Background)  Q2: Minimize Propagation  Q3: Maximize Propagation  Conclusion

Eigenvalue is the Key! [ICDM2011] (Informal Description) For, – any arbitrary topology (adjacency matrix A) – any virus propagation model (VPM) in standard literature (~25 in total) the epidemic threshold depends only on – the λ (leading eigenvalue of A), – some model constant C vpm (by prop. model itself) Theorem [ Faloutsos 2 + ICDM 2011 ]: No epidemic If λ x (C vpm ) ≤ 1. 7

Epidemic Threshold for Alternating Behavior [PKDD 2010, Networking 2011] Theorem [PKDD 2010, Networking 2011]: No epidemic If λ(S) ≤ 1. System matrix S = Π i S i S i = (1-δ)I + β A i day N N night N N AiAi …… Log (Infection Ratio) Time Ticks At Threshold Below Above 8

Why is λ So Important? λ  Capacity of a Graph: Larger λ  better connected 9

IBM Research © 2012 IBM CorporationSocial Analytics & Collaboration Technologies Group 10 Roadmap  Motivation: An Illustrative Example  Q1: Understanding the Tipping Point (Background)  Q2: Minimize Propagation  Q3: Maximize Propagation  Conclusion

Minimizing Propagation: Edge Deletion Given: a graph A, virus prop model and budget k; Find: delete k ‘best’ edges from A to minimize λ Bad 11 Good

Q: How to find k best edges to delete efficiently? Left eigen-score of source Right eigen-score of target 12

Minimizing Propagation: Evaluations Time Ticks Log (Infected Ratio) (better) Our Method Aa Data set: Oregon Autonomous System Graph (14K node, 61K edges)

Discussions: Node Deletion vs. Edge Deletion Observations: Node or Edge Deletion  λ Decrease Nodes on A = Edges on its line graph L(A) Questions? Edge Deletion on A = Node Deletion on L(A)? Which strategy is better (when both feasible)? Original Graph ALine Graph L(A)

Discussions: Node Deletion vs. Edge Deletion Q: Is Edge Deletion on A = Node Deletion on L(A)? A: Yes! But, Node Deletion itself is not easy: 15 Theorem: Hardness of Node Deletion. Find Optimal k-node Immunization is NP-Hard Theorem: Line Graph Spectrum. Eigenvalue of A  Eigenvalue of L(A)

Discussions: Node Deletion vs. Edge Deletion Q: Which strategy is better (when both feasible)? A: Edge Deletion > Node Deletion 16 (better) Green: Node Deletion (e.g., shutdown a twitter account) Red: Edge Deletion (e.g., un-friend two users)

IBM Research © 2012 IBM CorporationSocial Analytics & Collaboration Technologies Group 17 Roadmap  Motivation: An Illustrative Example  Q1: Understanding the Tipping Point (Background)  Q2: Minimize Propagation  Q3: Maximize Propagation  Conclusion

Maximizing Propagation: Edge Addition Given: a graph A, virus prop model and budget k; Find: add k ‘best’ new edges into A. By 1 st order perturbation, we have λ s - λ ≈Gv(S)= c ∑ eєS u(i e )v(j e ) So, we are done  need O(n 2 -m) complexity Left eigen-score of source Right eigen-score of target Low Gv High Gv 18

λ s - λ ≈Gv(S)= c ∑ eєS u(i e )v(j e ) Q: How to Find k new edges w/ highest Gv(S) ? A: Modified Fagin’s algorithm k k #3: Search space k+d Search space :existing edgeTime Complexity: O(m+nt+kt 2 ), t = max(k,d) #1: Sorting Sources by u #2: Sorting Targets by v Maximizing Propagation: Edge Addition

Maximizing Propagation: Evaluation Time Ticks Log (Infected Ratio) (better) 20 Our Method

IBM Research © 2012 IBM CorporationSocial Analytics & Collaboration Technologies Group Conclusion  Goal: Guild Influence Prop. by Opt. Link Structure  Our Observation: Opt. Influence Prop = Opt. λ  Our Solutions: –NetMel to Minimize Propagation –NetGel to Maximize Propagation t = 1t = 2t = 3