U. Michigan participation in EDIN Lada Adamic, PI E 2.1 fractional immunization of networks E 2.1 time series analysis approach to correlating structure.

Slides:



Advertisements
Similar presentations
Mobile Communication Networks Vahid Mirjalili Department of Mechanical Engineering Department of Biochemistry & Molecular Biology.
Advertisements

Spread of Influence through a Social Network Adapted from :
Maximizing the Spread of Influence through a Social Network
DAVA: Distributing Vaccines over Networks under Prior Information
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
Maximizing the Spread of Influence through a Social Network
Experiments We measured the times(s) and number of expanded nodes to previous heuristic using BFBnB. Dynamic Programming Intuition. All DAGs must have.
© 2012 IBM Corporation IBM Research Gelling, and Melting, Large Graphs by Edge Manipulation Joint Work by Hanghang Tong (IBM) B. Aditya Prakash (Virginia.
Martha Garcia.  Goals of Static Process Scheduling  Types of Static Process Scheduling  Future Research  References.
Absorbing Random walks Coverage
On the Spread of Viruses on the Internet Noam Berger Joint work with C. Borgs, J.T. Chayes and A. Saberi.
Object Detection by Matching Longin Jan Latecki. Contour-based object detection Database shapes: …..
CMU SCS Mining Billion-node Graphs Christos Faloutsos CMU.
On Computing Compression Trees for Data Collection in Wireless Sensor Networks Jian Li, Amol Deshpande and Samir Khuller Department of Computer Science,
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
Social networks and information sharing Lada Adamic.
Expertise Networks in Online Communities: Structure and Algorithms Jun Zhang Mark S. Ackerman Lada Adamic University of Michigan WWW 2007, May 8–12, 2007,
INFERRING NETWORKS OF DIFFUSION AND INFLUENCE Presented by Alicia Frame Paper by Manuel Gomez-Rodriguez, Jure Leskovec, and Andreas Kraus.
Tracking Moving Objects in Anonymized Trajectories Nikolay Vyahhi 1, Spiridon Bakiras 2, Panos Kalnis 3, and Gabriel Ghinita 3 1 St. Petersburg State University.
Co-evolution of network structure and content Lada Adamic School of Information & Center for the Study of Complex Systems University of Michigan.
NetSI: networks SI Lada Adamic, Jiang Yang, Eytan Bakshy, Xiao Wei, Matthew Simmons, Edwin Teng, David Huffaker.
Review Rong Jin. Comparison of Different Classification Models  The goal of all classifiers Predicating class label y for an input x Estimate p(y|x)
Active Learning for Probabilistic Models Lee Wee Sun Department of Computer Science National University of Singapore LARC-IMS Workshop.
Models of Influence in Online Social Networks
Some basic concepts of Information Theory and Entropy
Social Network Analysis via Factor Graph Model
Distributed Constraint Optimization Michal Jakob Agent Technology Center, Dept. of Computer Science and Engineering, FEE, Czech Technical University A4M33MAS.
On the Construction of Data Aggregation Tree with Minimum Energy Cost in Wireless Sensor Networks: NP-Completeness and Approximation Algorithms National.
CMU SCS Large Graph Mining Christos Faloutsos CMU.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
DATA MINING LECTURE 13 Absorbing Random walks Coverage.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Information Spread and Information Maximization in Social Networks Xie Yiran 5.28.
ANTs PI Meeting, Nov. 29, 2000W. Zhang, Washington University1 Flexible Methods for Multi-agent distributed resource Allocation by Exploiting Phase Transitions.
De-Nian Young Ming-Syan Chen IEEE Transactions on Mobile Computing Slide content thanks in part to Yu-Hsun Chen, University of Taiwan.
Algorithms for Allocating Wavelength Converters in All-Optical Networks Authors: Goaxi Xiao and Yiu-Wing Leung Presented by: Douglas L. Potts CEG 790 Summer.
DATA MINING LECTURE 13 Pagerank, Absorbing Random Walks Coverage Problems.
Interacting Viruses in Networks: Can Both Survive? Authors: Alex Beutel, B. Aditya Prakash, Roni Rosenfeld, and Christos Faloutsos Presented by: Zachary.
Spotting Culprits in Epidemics: How many and Which ones? B. Aditya Prakash Virginia Tech Jilles Vreeken University of Antwerp Christos Faloutsos Carnegie.
Finding Top-k Shortest Path Distance Changes in an Evolutionary Network SSTD th August 2011 Manish Gupta UIUC Charu Aggarwal IBM Jiawei Han UIUC.
Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, É va Tardos KDD 2003.
Network theory 101 Temporal effects What we are interested in What kind of relevant temporal /topological structures are there? Why? How does.
Online Social Networks and Media
Lecture 10: Network models CS 765: Complex Networks Slides are modified from Networks: Theory and Application by Lada Adamic.
ECML-PKDD 2010, Barcelona, Spain B. Aditya Prakash*, Hanghang Tong* ^, Nicholas Valler+, Michalis Faloutsos+, Christos Faloutsos* * Carnegie Mellon University,
Static Process Scheduling
1 Latency-Bounded Minimum Influential Node Selection in Social Networks Incheol Shin
1 Friends and Neighbors on the Web Presentation for Web Information Retrieval Bruno Lepri.
CS 590 Term Project Epidemic model on Facebook
A Latent Social Approach to YouTube Popularity Prediction Amandianeze Nwana Prof. Salman Avestimehr Prof. Tsuhan Chen.
1 Finding Spread Blockers in Dynamic Networks (SNAKDD08)Habiba, Yintao Yu, Tanya Y., Berger-Wolf, Jared Saia Speaker: Hsu, Yu-wen Advisor: Dr. Koh, Jia-Ling.
Transport in weighted networks: optimal path and superhighways Collaborators: Z. Wu, Y. Chen, E. Lopez, S. Carmi, L.A. Braunstein, S. Buldyrev, H. E. Stanley.
A Simulation-Based Study of Overlay Routing Performance CS 268 Course Project Andrey Ermolinskiy, Hovig Bayandorian, Daniel Chen.
On the Placement of Web Server Replicas Yu Cai. Paper On the Placement of Web Server Replicas Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker Infocom.
Network Partition –Finding modules of the network. Graph Clustering –Partition graphs according to the connectivity. –Nodes within a cluster is highly.
Controlling Propagation at Group Scale on Networks Yao Zhang*, Abhijin Adiga +, Anil Vullikanti + *, and B. Aditya Prakash* *Department of Computer Science.
Network applications Sushmita Roy BMI/CS 576 Dec 9 th, 2014.
A Connectivity-Based Popularity Prediction Approach for Social Networks Huangmao Quan, Ana Milicic, Slobodan Vucetic, and Jie Wu Department of Computer.
Pradeep Konduri Static Process Scheduling:  Proceedance process model  Communication system model  Application  Dicussion.
 DM-Group Meeting Liangzhe Chen, Oct Papers to be present  RSC: Mining and Modeling Temporal Activity in Social Media  KDD’15  A. F. Costa,
Epidemic Profiles and Defense of Scale-Free Networks L. Briesemeister, P. Lincoln, P. Porras Presented by Meltem Yıldırım CmpE
Social Networks Some content from Ding-Zhu Du, Lada Adamic, and Eytan Adar.
Wenyu Zhang From Social Network Group
Summary Presented by : Aishwarya Deep Shukla
Effective Social Network Quarantine with Minimal Isolation Costs
Mixture of Mutually Exciting Processes for Viral Diffusion
Department of Computer Science University of York
Boltzmann Machine (BM) (§6.4)
CS639: Data Management for Data Science
Yingze Wang and Shi-Kuo Chang University of Pittsburgh
Presentation transcript:

U. Michigan participation in EDIN Lada Adamic, PI E 2.1 fractional immunization of networks E 2.1 time series analysis approach to correlating structure and content, and co-evolving structure E 2.3 role of groups in information diffusion E 2.3 cultural differences in communication structure

2 Fractional Immunization in Hospital-transfer Graphs B. Aditya Prakash 1, Lada A. Adamic 2, Theodore Iwashyna 2, Hanghang Tong 3, Christos Faloutsos 1 1 Carnegie Melon University, 2 University of Michigan, 3 IBM

3 hospital setting Hospitals harbor highly resistant bacteria These bacteria can hitch a ride when patients are transferred from hospital to hospital communication network setting individuals may propagate misinformation or malicious computer viruses two settings

4 one problem complete immunization is not feasible all prior work on immunization on networks assumes complete immunization our approach: fractional immunization allocating resources to nodes reduces their probability of becoming infected e.g. allocating r units of resource corresponds to reducing Prob(infection) to

Fractional Asymmetric Immunization 5 Fractional Effect Asymmetric Effect

Fractional Asymmetric Immunization 6 Fractional Effect [ f(x) = ] Asymmetric Effect  Edge weakened by half

Fractional Asymmetric Immunization 7 Fractional Effect [ f(x) = ] Asymmetric Effect   Only incoming edges

Fractional Asymmetric Immunization 8 Fractional Effect [ f(x) = ] Asymmetric Effect # antidotes = 3

Fractional Asymmetric Immunization 9 Fractional Effect [ f(x) = ] Asymmetric Effect # antidotes = 3

Fractional Asymmetric Immunization 10 Fractional Effect [ f(x) = ] Asymmetric Effect # antidotes = 3

Problem Statement 11 Hospital-transfer networks – Number of patients transferred Given: – The SI model – Directed weighted graph – A total of k antidotes – A weakening function f(x) Find: – the ‘best’ distribution which minimizes the “footprint” at some time t

Naïve way How to estimate the footprint? – Run simulations? – too slow – takes about 3 weeks for graphs of typical size!

Our Solution – Main Idea The SI model has no threshold – any infection will become an epidemic But – can bound the expected number of infected nodes at time t Get the distribution which minimizes the bound!

Our Solution – Main Idea NP-complete! We give a fast, effective near-optimal algorithm - GreedyResync – O(km/r + kN)

Simulations Lower is better Our algorithm, near optimal US-MEDICARE Hospital Patient Transfer network

simulation results 16

Resource allocation 17 few ICU beds many ICU beds fewer resources more resources

fractional immunization: summary Targeted resource allocation is 16x more effective than uniform Best strategy: heavily concentrate resources at a few particularly important hospitals Greedy algorithm is near-optimal 18

Time series analysis of network co-evolution Can the evolution of network structure reveal attributes of the content? – imagine that pattern of who communicates with whom is easy to discern, but acquiring content is costly (paying informant, decrypting, etc.) – Can the structure suggest when it would be appropriate to Can the evolution of one network predict how another network over the same nodes will evolve in the future? Chun-Yuen Teng, Liuling Gong, Avishay Livne, Lada Adamic Twitter data

contemporaneous correlation between structure and content predicting the similarity between non- linked pairs using textual and structural variables correlation between textual and structural features

measuring co-evolution temporal conductance – degree of unexpectedness – recent and frequent edges, or those that close recent and frequent paths, are expected Second Life data: – low conductance (network is novel) corresponds to lower entropy in exchanged assets – “free” asset transfer network time series predicts, via temporal conductance, paid transaction time series

The role of groups in information diffusion Main findings: – group variables help to explain adoption e.g. overlap of groups an individual and previous adopters belong to group variables are more predictive than # of adopting contacts, etc. – group structure is predictive of amount of exchange e.g. higher clustering David Huffaker, Chun-Yuen Teng, Liuling Gong, Matthew Simmons, Lada Adamic

group structure conducive to exchange low rates of adoption high rates of adoption

cultural differences in co-evolving communication patterns corporate communication – In Asia, individuals use different channels for different contacts Jiang Yang 1, Zhen Wen 2, Lada Adamic 1, Mark Ackerman 1 1 U. Michigan, 2 IBM

cultural differences in sentiment expression