Discovering Leaders from Community Actions Amit Goyal 1 Francesco Bonchi 2 Laks V.S. Lakshmanan 1 Oct 27, 2008 1 2.

Slides:



Advertisements
Similar presentations
Amit Goyal Laks V. S. Lakshmanan RecMax: Exploiting Recommender Systems for Fun and Profit University of British Columbia
Advertisements

A General Algorithm for Subtree Similarity-Search The Hebrew University of Jerusalem ICDE 2014, Chicago, USA Sara Cohen, Nerya Or 1.
Benchmarking traversal operations over graph databases Marek Ciglan 1, Alex Averbuch 2 and Ladialav Hluchý 1 1 Institute of Informatics, Slovak Academy.
Viral Marketing – Learning Influence Probabilities.
Learning Influence Probabilities in Social Networks 1 2 Amit Goyal 1 Francesco Bonchi 2 Laks V. S. Lakshmanan 1 U. of British Columbia Yahoo! Research.
LEARNING INFLUENCE PROBABILITIES IN SOCIAL NETWORKS Amit Goyal Francesco Bonchi Laks V. S. Lakshmanan University of British Columbia Yahoo! Research University.
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Pete Bohman Adam Kunk.  Introduction  Related Work  System Overview  Indexing Scheme  Ranking  Evaluation  Conclusion.
Spread of Influence through a Social Network Adapted from :
Maintaining Sliding Widow Skylines on Data Streams.
Cost-effective Outbreak Detection in Networks Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, Natalie Glance.
Maximizing the Spread of Influence through a Social Network
In Search of Influential Event Organizers in Online Social Networks
1 Social Influence Analysis in Large-scale Networks Jie Tang 1, Jimeng Sun 2, Chi Wang 1, and Zi Yang 1 1 Dept. of Computer Science and Technology Tsinghua.
CIKM’2008 Presentation Oct. 27, 2008 Napa, California
Intelligent Database Systems Lab N.Y.U.S.T. I. M. Discovering Leaders from Community Actions Presenter : Wu, Jia-Hao Authors : Amit Goyal, Francesco Bonchi,
Integrating Bayesian Networks and Simpson’s Paradox in Data Mining Alex Freitas University of Kent Ken McGarry University of Sunderland.
Influence and Correlation in Social Networks Aris Anagnostopoulos Ravi Kumar Mohammad Mahdian.
The community-search problem and how to plan a successful cocktail party Mauro SozioAris Gionis Max Planck Institute, Germany Yahoo! Research, Barcelona.
Mining Association Rules
Simpath: An Efficient Algorithm for Influence Maximization under Linear Threshold Model Amit Goyal Wei Lu Laks V. S. Lakshmanan University of British Columbia.
Maximizing Product Adoption in Social Networks
Models of Influence in Online Social Networks
Efficient Query Evaluation over Temporally Correlated Probabilistic Streams Bhargav Kanagal, Amol Deshpande ΗΥ-562 Advanced Topics on Databases Αλέκα Σεληνιωτάκη.
Social Network Analysis via Factor Graph Model
A Distributed and Privacy Preserving Algorithm for Identifying Information Hubs in Social Networks M.U. Ilyas, Z Shafiq, Alex Liu, H Radha Michigan State.
Modeling Information Diffusion in Networks with Unobserved Links Quang Duong Michael P. Wellman Satinder Singh Computer Science and Engineering University.
+ Offline Optimal Ads Allocation in SNS Advertising Hui Miao, Peixin Gao.
Personalized Influence Maximization on Social Networks
Context Tailoring the DBMS –To support particular applications Beyond alphanumerical data Beyond retrieve + process –To support particular hardware New.
Mehdi Kargar Aijun An York University, Toronto, Canada Discovering Top-k Teams of Experts with/without a Leader in Social Networks.
1 Adaptive QoS Framework for Wireless Sensor Networks Lucy He Honeywell Technology & Solutions Lab No. 430 Guo Li Bin Road, Pudong New Area, Shanghai,
Information Flow using Edge Stress Factor Communities Extraction from Graphs Implied by an Instant Messages Corpus Franco Salvetti University of Colorado.
Approximate Frequency Counts over Data Streams Loo Kin Kong 4 th Oct., 2002.
黃福銘 (Angus F.M. Huang) ANTS Lab, IIS, Academia Sinica TrajPattern: Mining Sequential Patterns from Imprecise Trajectories.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Information Spread and Information Maximization in Social Networks Xie Yiran 5.28.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
School of Computer Science Carnegie Mellon University 1 The dynamics of viral marketing Jure Leskovec, Carnegie Mellon University Lada Adamic, University.
December 7-10, 2013, Dallas, Texas
Data Mining Algorithms for Large-Scale Distributed Systems Presenter: Ran Wolff Joint work with Assaf Schuster 2003.
Computer Science and Engineering Efficiently Monitoring Top-k Pairs over Sliding Windows Presented By: Zhitao Shen 1 Joint work with Muhammad Aamir Cheema.
ACM International Conference on Information and Knowledge Management (CIKM) Analysis of Physical Activity Propagation in a Health Social Network.
Exploiting Context Analysis for Combining Multiple Entity Resolution Systems -Ramu Bandaru Zhaoqi Chen Dmitri V.kalashnikov Sharad Mehrotra.
Mining Top-K Large Structural Patterns in a Massive Network Feida Zhu 1, Qiang Qu 2, David Lo 1, Xifeng Yan 3, Jiawei Han 4, and Philip S. Yu 5 1 Singapore.
Socialbots and its implication On ONLINE SOCIAL Networks Md Abdul Alim, Xiang Li and Tianyi Pan Group 18.
D-skyline and T-skyline Methods for Similarity Search Query in Streaming Environment Ling Wang 1, Tie Hua Zhou 1, Kyung Ah Kim 2, Eun Jong Cha 2, and Keun.
1 Latency-Bounded Minimum Influential Node Selection in Social Networks Incheol Shin
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
A Kernel Approach for Learning From Almost Orthogonal Pattern * CIS 525 Class Presentation Professor: Slobodan Vucetic Presenter: Yilian Qin * B. Scholkopf.
Pete Bohman Adam Kunk.  Introduction  Related Work  System Overview  Indexing Scheme  Ranking  Evaluation  Conclusion.
Presented by: Omar Alqahtani Spring Authors: Publication:  ICDE 2015 Type:  Research Paper 2.
1 Discovering Web Communities in the Blogspace Ying Zhou, Joseph Davis (HICSS 2007)
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
A Connectivity-Based Popularity Prediction Approach for Social Networks Huangmao Quan, Ana Milicic, Slobodan Vucetic, and Jie Wu Department of Computer.
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
Presented by: Siddhant Kulkarni Spring Authors: Publication:  ICDE 2015 Type:  Research Paper 2.
Inferring Networks of Diffusion and Influence
Nanyang Technological University
Finding Dense and Connected Subgraphs in Dual Networks
A paper on Join Synopses for Approximate Query Answering
Approximate Lineage for Probabilistic Databases
Learning Influence Probabilities In Social Networks
Cost-effective Outbreak Detection in Networks
Example: Academic Search
Pei Lee, ICDE 2014, Chicago, IL, USA
Discovering Leaders from Community Actions
Discovering Influential Nodes From Social Trust Network
Analysis of Large Graphs: Overlapping Communities
Presentation transcript:

Discovering Leaders from Community Actions Amit Goyal 1 Francesco Bonchi 2 Laks V.S. Lakshmanan 1 Oct 27,

Context & Motivations: Viral Marketing

3 Word of Mouth and Viral Marketing We are more influenced by our friends than strangers 68% of consumers consult friends and family before purchasing home electronics (Burke 2003) Amit Goyal (University of British Columbia)

4 Viral Marketing Also known as Target Advertising Initiate chain reaction by Word of mouth effect Low investments, maximum gain Amit Goyal (University of British Columbia)

5 Viral Marketing as an Optimization Problem Given: Network with influence probabilities Problem: Select top-k leaders such that by targeting them, the spread of influence is maximized Hao Ma et al 2008, Domingos et al 2001, Richardson et al 2002, Kempe et al 2003 How to calculate true influence probabilities? Amit Goyal (University of British Columbia)

6 A pattern mining approach We propose a completely different approach based on frequent pattern mining. We focus on the actions performed by users: Joining a community (as in flickr/facebook community) Rating a song, a movie (as in Y! Music, Y! Movie) Importance of time in which actions are performed Assumption: Users can see their friends’ actions Amit Goyal (University of British Columbia)

7 Our Contributions Formally define the notion of leaders and its various flavors Efficient algorithms for extracting these leaders Demonstrate the utility and scalability of our algorithms, via an extensive set of experiments on a real world dataset  Yahoo! Messenger (social graph)  Yahoo! Movies rating (actions log) Amit Goyal (University of British Columbia)

8 Rest of the talk Framework definition:  Influence propagation on the social network  Various notions of leaders Algorithms Experiments Related Work Conclusion Amit Goyal (University of British Columbia)

Framework Definition

10 Input Data (1) A social network, i.e., an undirected graph G=(V,E) where nodes are users and edges represent social ties. Users declare their friends. e.g. Facebook, Yahoo! Messenger etc Amit Goyal (University of British Columbia)

11 Input Data (2) An actions log sorted in chronological order, i.e., a relation Actions(User, Action, Time) Example: Jack joined Yoga community at time 5 Assumption: Users can see their friends actions (feeds) Amit Goyal (University of British Columbia)

12 Action Propagation JackJill Mary  Jack and Jill are friends  Jack and Mary are friends  Action is “Joining the Yoga community” Joined Yoga Community at time 5 Joined Yoga Community at time 8 Joined Yoga Community at time 1000  Action Propagated from Jack to Jill  Action propagated from Jack to Mary Amit Goyal (University of British Columbia) 3 time units 995 time units

13 Propagation Graph JackJill Joey Joined Yoga Community at time 5 Joined Yoga Community at time 8 Joined Yoga Community at time 1000 Mary Ben Joined Yoga Community at time 12 Joined Yoga Community at time 15 Can we say Mary got influenced by Jack?? NO Amit Goyal (University of British Columbia)

14 User Influence Graph When an action propagates from user u to user v, we may think of v being influenced by u Influence should decay in time Size of influence graph << Size of PG Amit Goyal (University of British Columbia) Propagation Graph User Influence Graph for Jack

15 Leaders – first definition Who should be a leader?  For an action, should influence sufficiently large number of users ( >ψ )  For an action, should influence these users in a reasonable amount of time ( <π )  Should act as a leader in sufficiently large number of actions ( >σ ) If ψ= 2, π = 15, σ = 1 then, both Jack and Jill are leaders Amit Goyal (University of British Columbia) JackJill Joey Joined Yoga Community at time 5 Joined Yoga Community at time 8 Joined Yoga Community at time 1000 Mary Ben Joined Yoga Community at time 12 Joined Yoga Community at time JackJill Joey Joined Yoga Community at time 5 Joined Yoga Community at time 8 Joined Yoga Community at time 1000 Mary Ben Joined Yoga Community at time 12 Joined Yoga Community at time 15 JackJill Joey Joined Yoga Community at time 5 Joined Yoga Community at time 8 Joined Yoga Community at time 1000 Mary Ben Joined Yoga Community at time 12 Joined Yoga Community at time 15 JackJill Joey Joined Yoga Community at time 5 Joined Yoga Community at time 8 Joined Yoga Community at time 1000 Mary Ben Joined Yoga Community at time 12 Joined Yoga Community at time 15

16 Tribe Leader A leader may influence different users for different actions What if a leader lead a fixed set of users for different actions? We call these leaders as Tribe Leaders Can be considered as small communities Amit Goyal (University of British Columbia) jack A1 A3 A2 A1, A2 and A3 are 3 different actions

17 Additional Constraint: Genuineness It may happen that one user acts as a leader but in concrete he is always a follower of the other leaders We want to avoid this kind of fake leaders. gen(Jill) = 1/3 Another constraint: confidence Amit Goyal (University of British Columbia) Tom Jill Jack A1 A3 A2 A1 A2 A1, A2 and A3 are 3 different actions

Algorithms but how will I discover the leaders??

19 Algorithms: Overview Assumptions:  Social graph is huge – millions of nodes  Actions log is huge – millions of tuples  For an action, size of user Influence Graph << size of Propagation Graph for all users Our algorithms are able to extract the patterns (leaders and tribe leaders) in no more than one scan of the action log table. Amit Goyal (University of British Columbia)

20 Algorithms: Overview Scan the action log table by means of a window of sizeπbackward in time, i.e., starting from the most recent timestamp (bottom of the table if we assume tuples to be ordered by time). Efficiently compute the influence matrix, i.e., a matrix Users x Actions  IM π (u, a) represents number of users, influenced by u w.r.t. action a within timeπ Compute leaders from IM Amit Goyal (University of British Columbia) IM 10 (Jack, “joining yoga community”) = 3

21 Computing Influence Matrix (1) We use a bit vector to track which users are influenced by a given user. Updated incrementally Locking mechanism using another bit vector  0 => free bit; 1 => occupied bit Node to bit index mapping stored in a queue Bits must be dynamically allocated. S R T W V NodeInfVec R S T W V (V,2)(W,1)(T,4)(S,6)(R,0) Head Queue Lock bit Vector Time window on propagation graph Amit Goyal (University of British Columbia)

22 Computing Influence Matrix (2) Slide up the current window – delete node V Delete the entry from queue Update the lock Update influence vectors S R T W V NodeInfVec R S T W V Lock bit Vector (V,2)(W,1)(T,4)(S,6)(R,0) Head Queue Amit Goyal (University of British Columbia) (V,2)(W,1)(T,4)(S,6)(R,0) Lock bit Vector NodeInfVec R S T W V Time window on propagation graph

23 Computing Influence Matrix (3) New node P added Issue a lock, add entry to the queue Compute its Influence Vector by propagation Number of followers of P = 4 IM(P,a) = 4 S R T W NodeInfVec P R S T W (W,1)(T,4)(S,6)(R,0)(P,2) Head Queue Lock bit Vector P Amit Goyal (University of British Columbia) (W,1)(T,4)(S,6)(R,0) Lock bit Vector NodeInfVec R S T W Time window on propagation graph

24 Mining Tribe Leaders Influence Matrix not enough We use influence cube: Users x Actions x Users  IC π (u,a,v) = 1, when user v is influenced by user u for action a within time π We do not explicitly compute the whole cube due to sparsity. Problem same as discovering existence of frequent itemsets of size larger than a given threshold Amit Goyal (University of British Columbia)

25 Algorithms - Final Comments The only truly mandatory threshold is π(time threshold) Influence Matrix: O(TAn 2 ) in bit level operations  T = total number of tuples in action log  A = total number of distinct actions  n = maximum number of nodes visible in any position of the time window  n << N, where N is the total number of users Tribe Leaders:  Influence Cube: O(TAn 2 )  Finding existence of frequent itemsets: exponential in number of followers But very fast due to optimizations (Bonchi 2003) Amit Goyal (University of British Columbia)

Experiments enough talking, show me the results dude!!

27 Data Preparation Data  Social graph: Yahoo! Instant Messenger  Actions log: Yahoo! Movies Action = user u rated movie m at time t  joined through common users identifiers Started from Yahoo! Instant Messenger subgraph of “most active” users (110M nodes) and 21M ratings from Yahoo! Movies. Ended with 217.5K nodes, 221.4K edges and 1.8M ratings. Amit Goyal (University of British Columbia)

28 Data characteristics: connected components Giant component 94K Users (43.2% of connected users) Total 46,650 connected components Amit Goyal (University of British Columbia)

29 Leaders Vs. Tribe leaders Amit Goyal (University of British Columbia) π – threshold on time σ – threshold on number of actions ψ – threshold on number of influenced users

30 Number of leaders found Amit Goyal (University of British Columbia) π – threshold on time σ – threshold on number of actions ψ – threshold on number of influenced users

31 Run-time Amit Goyal (University of British Columbia) π – threshold on time σ – threshold on number of actions ψ – threshold on number of influenced users

32 Genuineness: an almost binary concept! Amit Goyal (University of British Columbia)

33 Top-10 tribe leaders w.r.t. tribe size Tribe leaders exhibit high confidence. Tribe leaders with low genuineness were found dominated by other tribe leaders present in the tables. We found many users acting as leader in many actions but not being a tribe leader. Amit Goyal (University of British Columbia)

34 Related Work (1) Identifying influential users  Domingos et al 2001, Richardson et al 2002, Kempe et al 2005 Identifying influential bloggers  Agarwal et al 2008 Identifying communities in Social Networks  Hoproft et al 2003, Kumar et al 2006, Backstrom et al 2006, Tantipathananadh et al 2007, Huang et al 2008, Friedland at el 2007 Amit Goyal (University of British Columbia)

35 Related Work (2) Influence and Correlation in Social Networks  Aris Anagnostopoulos et al 2008 Revenue maximization  Hartline et al 2008 Near optimal sensor placement for outbreak detection  Leskovec et al 2007 Heat Diffusion Model  Hao Ma et al 2008 (CIKM) Amit Goyal (University of British Columbia)

36 Conclusions Proposed framework based on frequent pattern mining for discovering leaders in social networks Formally define the problem of extracting leaders from social graph and actions log.  Various notions of leader, tribe leader  Their confidence and genuine variants Efficient algorithms for extracting leaders of various flavors  Just one pass over the actions log table Demonstrate the utility and scalability of our algorithms, via an extensive set of experiments on a real world dataset  Yahoo! Messenger (social graph)  Yahoo! Movies rating (actions log) Amit Goyal (University of British Columbia)

37 Ongoing/Future Work Gurumine: Pattern Mining System for Discovering Leaders and Tribes (Demo paper to appear in ICDE 2009) Leadership Cube: What kind of leaders attract what kind of followers for what kind of actions? Viral Marketing Stronger notions of influence? Amit Goyal (University of British Columbia)

38 Thanks! Amit Goyal (University of British Columbia)

39 Backup

40 Number of leaders found π – threshold on time σ – threshold on number of actions ψ – threshold on number of influenced users Amit Goyal (University of British Columbia)

41 Additional constraint: confidence Similarly to association rules, we can have a confidence measure for leaders. Leadership confidence = # actions in which is a leader / # actions performed Example: Lets say Jack performed 10 actions out of which in 7 actions, he acted as a leader (i.e. more than ψ users followed in short time), then conf(Jack) = 7/10 Amit Goyal (University of British Columbia)