Algorithmic and Economic Aspects of Networks Nicole Immorlica.

Slides:



Advertisements
Similar presentations
The Small World Phenomenon: An Algorithmic Perspective Speaker: Bradford Greening, Jr. Rutgers University – Camden.
Advertisements

1 Analyzing Kleinberg’s Small-world Model Chip Martel and Van Nguyen Computer Science Department; University of California at Davis.
Small-world networks.
Algorithmic and Economic Aspects of Networks Nicole Immorlica.
How to Schedule a Cascade in an Arbitrary Graph F. Chierchetti, J. Kleinberg, A. Panconesi February 2012 Presented by Emrah Cem 7301 – Advances in Social.
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
Online Social Networks and Media Navigation in a small world.
Rumors and Routes Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopRumors and Routes1.
Social Networks 101 P ROF. J ASON H ARTLINE AND P ROF. N ICOLE I MMORLICA.
What did we see in the last lecture?. What are we going to talk about today? Generative models for graphs with power-law degree distribution Generative.
Information Networks Small World Networks Lecture 5.
Algorithmic and Economic Aspects of Networks Nicole Immorlica.
Identity and search in social networks Presented by Pooja Deodhar Duncan J. Watts, Peter Sheridan Dodds and M. E. J. Newman.
Lecture 7 CS 728 Searchable Networks. Errata: Differences between Copying and Preferential Attachment In generative model: let p k be fraction of nodes.
Company LOGO 1 Identity and Search in Social Networks D.J.Watts, P.S. Dodds, M.E.J. Newman Maryam Fazel-Zarandi.
Search in Power-Law Networks Presented by Hakim Weatherspoon CS294-4: Peer-to-Peer Systems Slides also borrowed from the following paper Path Finding Strategies.
CSE 522 – Algorithmic and Economic Aspects of the Internet Instructors: Nicole Immorlica Mohammad Mahdian.
1 A Random-Surfer Web-Graph Model (Joint work with Avrim Blum & Hubert Chan) Mugizi Rwebangira.
On the Spread of Viruses on the Internet Noam Berger Joint work with C. Borgs, J.T. Chayes and A. Saberi.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Small Worlds Presented by Geetha Akula For the Faculty of Department of Computer Science, CALSTATE LA. On 8 th June 07.
Social Networks 101 P ROF. J ASON H ARTLINE AND P ROF. N ICOLE I MMORLICA.
Algorithmic and Economic Aspects of Networks Nicole Immorlica.
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
Peer-to-Peer and Grid Computing Exercise Session 3 (TUD Student Use Only) ‏
1 Analyzing Kleinberg’s (and other) Small-world Models Chip Martel and Van Nguyen Computer Science Department; University of California at Davis.
Parallel Routing Bruce, Chiu-Wing Sham. Overview Background Routing in parallel computers Routing in hypercube network –Bit-fixing routing algorithm –Randomized.
CSE 522 – Algorithmic and Economic Aspects of the Internet Instructors: Nicole Immorlica Mohammad Mahdian.
Fault-tolerant Routing in Peer-to-Peer Systems James Aspnes Zoë Diamadi Gauri Shah Yale University PODC 2002.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
Advanced Topics in Data Mining Special focus: Social Networks.
Analysis of Social Information Networks Thursday January 27 th, Lecture 2: Algorithmic Small World 1.
Vassilios V. Dimakopoulos and Evaggelia Pitoura Distributed Data Management Lab Dept. of Computer Science, Univ. of Ioannina, Greece
The Small World Phenomenon: An Algorithmic Perspective by Anton Karatoun.
Random Walks Great Theoretical Ideas In Computer Science Steven Rudich, Anupam GuptaCS Spring 2004 Lecture 24April 8, 2004Carnegie Mellon University.
1 Analyzing Kleinberg’s (and other) Small-world Models Chip Martel and Van Nguyen Computer Science Department; University of California at Davis.
1 A Random-Surfer Web-Graph Model Avrim Blum, Hubert Chan, Mugizi Rwebangira Carnegie Mellon University.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Models of Influence in Online Social Networks
It’s a Small World After All Kim Dressel - The small world phenomenon Please hold applause until the end of the presentation. Angie Heimkes Eric Larson.
Proof of Kleinberg’s small-world theorems
Section 8 – Ec1818 Jeremy Barofsky March 31 st and April 1 st, 2010.
Small-world networks. What is it? Everyone talks about the small world phenomenon, but truly what is it? There are three landmark papers: Stanley Milgram.
1 Reading Report 5 Yin Chen 2 Mar 2004 Reference: Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications, Ion Stoica, Robert Morris, david.
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
Random Walks Great Theoretical Ideas In Computer Science Steven Rudich, Anupam GuptaCS Spring 2005 Lecture 24April 7, 2005Carnegie Mellon University.
COLOR TEST COLOR TEST. Social Networks: Structure and Impact N ICOLE I MMORLICA, N ORTHWESTERN U.
Gennaro Cordasco - How Much Independent Should Individual Contacts be to Form a Small-World? - 19/12/2006 How Much Independent Should Individual Contacts.
Online Social Networks and Media
3. SMALL WORLDS The Watts-Strogatz model. Watts-Strogatz, Nature 1998 Small world: the average shortest path length in a real network is small Six degrees.
Navigation in small worlds Social Networks: Models and Applications Seminar Toronto, Fall 2007 (based on a presentation by Stratis Ioannidis)
Percolation Processes Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopPercolation Processes1.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
Online Social Networks and Media
1 Analyzing and Characterizing Small-World Graphs Van Nguyen and Chip Martel Computer Science, UC Davis.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Performance Evaluation Lecture 1: Complex Networks Giovanni Neglia INRIA – EPI Maestro 10 December 2012.
Siddhartha Gunda Sorabh Hamirwasia.  Generating small world network model.  Optimal network property for decentralized search.  Variation in epidemic.
Models and Algorithms for Complex Networks
Class 4: It’s a Small World After All Network Science: Small World February 2012 Dr. Baruch Barzel.
Small-world phenomenon: An Algorithmic Perspective Jon Kleinberg.
Stochastic Streams: Sample Complexity vs. Space Complexity
Introduction to Wireless Sensor Networks
Know thy Neighbor’s Neighbor Better Routing for Skip Graphs and Small Worlds Moni Naor Udi Wieder.
Peer-to-Peer and Social Networks
Effective Social Network Quarantine with Minimal Isolation Costs
Network Science: A Short Introduction i3 Workshop
Diffusion in Networks Dr. Henry Hexmoor Department of Computer Science Southern Illinois University Carbondale 1/17/2019.
Proof of Kleinberg’s small-world theorems
Navigation and Propagation in Networks
Presentation transcript:

Algorithmic and Economic Aspects of Networks Nicole Immorlica

Diffusion through Networks How do fads develop? How do diseases spread? What makes peaceful people riot? Why is English an international language?

Bass Model People are either innovators or immitators, based on random stimulae and interactions. they innovate at rate p, and immitate at rate q

Bass Model Let F(t) be fraction of agents who have adopted behavior by time t. Then, F(t) = F(t-1) + p∙(1 – F(t-1)) + q∙F(t-1) ∙(1 – F(t-1)) Additional innovators Additional immitators

Bass Model By continuous-time approximation, see F(t) = [1 – exp(-(p+q)t)] / [1 + (q/p)exp(-(p+q)/t)] Ratio of immitators to innovators

Bass Model F(t) t First adoptors are mostly innovators More immitators as more people to immitate Most people have adopted, so process slows

Extending Bass Impose network structure. … like finding giant components … SIR model – susceptible, infect, recover Allow people to change their minds. … SIS model – susceptible, infect, susceptible

SIS Model

Most significant factor is varying degrees. Simplify model: - People meet randomly as in Bass - Different people have different # of meetings

SIS Model People have degrees that govern amount of interaction. P(d) = fraction of people with degree d P(d) / ∑ d P(d) = probability of interacting with a person of degree d.

SIS Model Let ρ(d) be fraction of people with degree d who are infected. Then prob. of meeting infected person is: Θ = P(d) ∑ d P(d) ∑ x ρ(d) d

∙ d] x SIS Model If α is transmission rate, and β is recovery rate, then fraction of nodes of deg d who get infected is: and fraction of nodes that recover is: [(1 – ρ(d))(Θ ∙ α) ρ(d) xβ

SIS Model Questions: 1. How high should infection rate be compared to recovery rate for disease to live? 2. In steady state, how many people infected? 3. How does this relate to network structure or degree distribution?

SIS Model In steady state, fraction of infected equals fraction of recovered (1 – ρ(d))dαΘ = βρ(d) or ρ(d) = λΘd / (λΘd + 1) where λ is ratio of α to β.

SIS Model We know 1. Fraction of population that is infected 2. Steady state equation ρ(d) = λΘd / (λΘd + 1) Θ = P(d) ∑ d P(d) ∑ x ρ(d)

SIS Model Solve for Θ, When all degrees are regular, say d*? When degrees follow a power law P(d) = d -2 ? Θ = P(d) x λΘd ∑ d P(d) x (λΘd + 1) ∑

SIS Model Regular degrees, Θ = 0 or Θ = 1 – 1/λd* Infected pop. Θ Infection/recovery rate λ d* = α / β

SIS Model Power law degrees, see board Infected pop. Θ Infection/recovery rate λ Always positive! Disease lives for any positive infection rate.

Example: Corrupted Blood

Lesson Mean-preserving spreads in degree distributions (e.g., power-law vs Poission) lead to lower thresholds for infection.

Questions How does immunization help? Which nodes should we immunize? How about quarantines? How sensitive is the model to variations in network structure or initial infection sets? What if disease is malicious (e.g., computer viruses)? How can it spread effectively, or spread to a particular person?

Search and Navigation How to find a particular node in a network? - do a random walk (perhaps biased by network characteristics) - do a greedy walk based on similarity of neighbors to target

Finding Target Randomly Procedure 1: At each step, visit a new node uniformly at random until target is found. Theorem. Expected # of steps = (n+1) / 2.

Finding Target Randomly Procedure 2: At each step, visit a new node that is a random neighbor of current node. Theorem. Expected # of steps is a function of the expansion of the network.

Finding Target Randomly Variations: walk towards neighbors with - high degree - high centrality - least # of common neighbors

Homophily Suppose people have observable characteristics and tend to befriend people who are similar to themselves. - geography - socio-economic status - profession

Networks with Homophily Rewiring model (Watts-Strogatz) - People have a predictable structure of local links reflecting homophily - And a few random long-range links

Rewiring Model 1. Start with a grid (or other regular graph) 2. For each node, create one (or k in general) random long-range link

Rewiring Model 1. Exhibits small-world phenomenon (short paths exist) 2. Furthermore, people can find them with a decentralized algorithm for appropriate distribution [Kleinberg 2000] – Explains Milgrom experiment

Decentralized Search Choose long-range links from distribution which favors close nodes Tradeoff: + Gives navigational clues – Increases path length Result. There is a unique optimal distribution where decentralized search finds short paths.

Decentralized Search Model n x n grid d(u,v) = grid distance between u and v Each node u has directed edge to exactly one node v, it’s long-range contact Pr[u connects to v] = d(u, v) -r

Tradeoff Discovered path length r = 0, uniform path length Actual path length r large, highly local

Decentralized Algorithm Node s must send message m to node t. At any moment, current message holder u must pass m to neighbor given: – Set of local contacts of all nodes (grid structure) – Location on grid of destination t – Location and long-range contacts of nodes that have seen m

Delivery Time Definition: The expected delivery time is expectation over choice of long-range contacts and uniformly random s and t of number of steps to deliver m.

Delivery Time 0 · r < 2r = 2r > 2 Expected Delivery Time  (n (2-r)/3 )O(log 2 n)  (n (r-2)/(r-1) )

Algorithm In each step, current message holder u passes m to his or her neighbor v which is closest (in grid distance) to destination t.

Proof Sketch Define phases based on how close m is to t – Alg is in phase j if 2 j · d(m,t) < 2 j+1 Prove we don’t spend too much time in any one phase – Exp time in phase j is c log n for all j Conclude since at most log n phases, expected delivery time is O(log 2 n) – Follows from linearity of expectation

Proof Let B j = {v : d(v,t) · 2 j }, i.e., the nodes outside phase j Then the probability we leave phase j is |B j |.Pr[u’s contact is in B j ] – Compute prob. long-range contact of u is in B j – Compute cardinality of B j

Probability of long-range contact Recall long-range contact of v is u with prob d(u,v) -2  v≠u d(u,v) -2 Bound denominator – There are 4k nodes at distance k – Hence,  v≠u d(u,v) -2 ·  2n k=1 (1/k 2 )(4k) = O(log n)

Number of nodes at distance at most 2 j Hence |B j | ¸ ½ (2 j )(2 j ) = 2 2j-1 Cardinality of B j 2j2j

Probability leave phase j Note d(u,v) for v 2 B j is at most 2 j + 2 j+1 t 2j2j 2 j+1 v u

Probability leave phase j Pr[. ]= |B j |.Pr[u’s contact is in B j ] = |B j | d(u,B j ) -2 /  v d(u,v) -2 ¸ (2 2j-1 )(2 j + 2 j+1 ) -2 / O(log n) ¸ O(1/log n)

Expected # steps in phase j Let X j = # steps in phase j E[X j ]=  t Pr[X j ¸ t] ·  t (1-O(1/log n)) t-1 = O(log n) Since # phases is also O(log n), we see exp. delivery time is O(log 2 n) as claimed.

Other Diffusion Questions Rumor spreading - push model - pull model - intentional structures Joint computations: dist. sensors computing - average temperature in a field

Project Brainstorming Theoretical analysis of initial infection set for disease propagation Wikipedia study Music consumption, trends in modern technologies Online forums Mine social networks for degree distributions and other network parameters Hotelling model in higher dimensions Study disease prop in online games Economies in online games Finding poa/pos bounds in co-authorship networks Extending Jason’s paper to single pricing, particular sequences, etc.

Assignment: Readings: – Social and Economic Networks, Chapter 7 – Stoica, Morris, Liben-Nowell, Karger, Kaashoek, Dabek, Balakrishnan, Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications, IEEE/ACM Transactions on Networking, Vol. 11, No. 1, pp , February Reaction to Chord paper Project proposals due 12/2/2009 Presentation volunteer? Erik.