School of Information University of Michigan Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution.

Slides:



Advertisements
Similar presentations
Peer-to-Peer and Social Networks Power law graphs Small world graphs.
Advertisements

Analysis and Modeling of Social Networks Foudalis Ilias.
School of Information University of Michigan Network resilience Lecture 20.
VL Netzwerke, WS 2007/08 Edda Klipp 1 Max Planck Institute Molecular Genetics Humboldt University Berlin Theoretical Biophysics Networks in Metabolism.
Network Models Social Media Mining. 2 Measures and Metrics 2 Social Media Mining Network Models Why should I use network models? In may 2011, Facebook.
Small Worlds Presented by Geetha Akula For the Faculty of Department of Computer Science, CALSTATE LA. On 8 th June 07.
Networks FIAS Summer School 6th August 2008 Complex Networks 1.
1 Complex systems Made of many non-identical elements connected by diverse interactions. NETWORK New York Times Slides: thanks to A-L Barabasi.
Peer-to-Peer and Grid Computing Exercise Session 3 (TUD Student Use Only) ‏
School of Information University of Michigan SI 614 Networks: Theory and Application Lecture 1: Networks: what they are and what they are good for Instructor:
Cary Engleberg, M.D. Professor of Internal Medicine University of Michigan Medical School Unless otherwise noted, the content of this program is licensed.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution 3.0 License.
Large-scale organization of metabolic networks Jeong et al. CS 466 Saurabh Sinha.
(Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Oct 16th, 2012.
Topic 13 Network Models Credits: C. Faloutsos and J. Leskovec Tutorial
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 License.
Lecture 28 Network resilience
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution 3.0 License.
Network properties Slides are modified from Networks: Theory and Application by Lada Adamic.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution 3.0 License.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons BY 3.0 License.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 License.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution-Non-Commercial- ShareAlike 3.0 License.
Clustering of protein networks: Graph theory and terminology Scale-free architecture Modularity Robustness Reading: Barabasi and Oltvai 2004, Milo et al.
COLOR TEST COLOR TEST. Social Networks: Structure and Impact N ICOLE I MMORLICA, N ORTHWESTERN U.
School of Information University of Michigan Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution.
Social Network Analysis Prof. Dr. Daning Hu Department of Informatics University of Zurich Mar 5th, 2013.
and Complex Adaptive Systems by Eileen Kraemer
School of Information University of Michigan Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution.
Complex Network Theory – An Introduction Niloy Ganguly.
Lecture 10: Network models CS 765: Complex Networks Slides are modified from Networks: Theory and Application by Lada Adamic.
Complex Network Theory – An Introduction Niloy Ganguly.
A connected simple graph is Eulerian iff every graph vertex has even degree. The numbers of Eulerian graphs with, 2,... nodes are 1, 1, 2, 3, 7, 16, 54,
Percolation and diffusion in network models Shai Carmi, Department of Physics, Bar-Ilan University Networks Percolation Diffusion Background picture: The.
Most of contents are provided by the website Network Models TJTSD66: Advanced Topics in Social Media (Social.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution 3.0 License.
Lecture 2: Introduction CS 765: Complex Networks Slides are adapted from Constantine Dovrolis, Eileen Kraemer, Peter Dodds, and Sergei Maslov.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons BY-SA 3.0 License.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution-Non-Commercial- ShareAlike 3.0 License.
Network resilience.
Performance Evaluation Lecture 1: Complex Networks Giovanni Neglia INRIA – EPI Maestro 10 December 2012.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution – Non-commercial – Share Alike 3.0 License.
Information Retrieval Search Engine Technology (10) Prof. Dragomir R. Radev.
Netlogo demo. Complexity and Networks Melanie Mitchell Portland State University and Santa Fe Institute.
Algorithms and Computational Biology Lab, Department of Computer Science and & Information Engineering, National Taiwan University, Taiwan Network Biology.
Social Network Analysis 1. What is Network Analysis? Social network analysis is a method by which one can analyze the connections across individuals or.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution – Non-commercial – Share Alike 3.0 License.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 License.
Social Networks Some content from Ding-Zhu Du, Lada Adamic, and Eytan Adar.
Topics In Social Computing (67810)
Copyright © 2009, Steven J. Jackson.
Copyright © 2008, Greg Grossmeier.
Copyright © 2009, Joan Durrance.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution 3.0 License.
Copyright © 2008, Annemarie Sullivan Palincsar.
Copyright © 2009, Jack Wheeler.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution 3.0 License.
Copyright © 2009, Jack Wheeler.
Copyright © 2009, Jack Wheeler.
Copyright © 2008, Annemarie Sullivan Palincsar.
Copyright © 2009, Mark McCabe.
Lecture 9: Network models CS 765: Complex Networks
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution - Non-Commercial - Share Alike 3.0 License..
You assume all responsibility for use and potential liability associated with any use of the material. Material contains copyrighted content, used in accordance.
You assume all responsibility for use and potential liability associated with any use of the material. Material contains copyrighted content, used in accordance.
Copyright © 2009, Mark McCabe.
You assume all responsibility for use and potential liability associated with any use of the material. Material contains copyrighted content, used in accordance.
You assume all responsibility for use and potential liability associated with any use of the material. Material contains copyrighted content, used in accordance.
You assume all responsibility for use and potential liability associated with any use of the material. Material contains copyrighted content, used in accordance.
You assume all responsibility for use and potential liability associated with any use of the material. Material contains copyrighted content, used in accordance.
Presentation transcript:

School of Information University of Michigan Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution 3.0 License. Copyright 2008, Lada Adamic You assume all responsibility for use and potential liability associated with any use of the material. Material contains copyrighted content, used in accordance with U.S. law. Copyright holders of content included in this material should contact with any questions, corrections, or clarifications regarding the use of content. The Regents of the University of Michigan do not license the use of third party content posted to this site unless such a license is specifically granted in connection with particular content objects. Users of content are responsible for their compliance with applicable law. Mention of specific products in this recording solely represents the opinion of the speaker and does not represent an endorsement by the University of Michigan. For more information about how to cite these materials visit

School of Information University of Michigan Why networks are interesting to study Instructor: Lada Adamic

Outline the role of networks in life, nature, and research why model networks: structure & dynamics models (structure): Erdos-Renyi random graph Watts-Strogatz small world model Barabasi-Albert scale-free networks implications (dynamics): diffusion of disease and information search by navigating the network resilience IR applications

examples: early social network analysis 1933 Moreno displays first sociogram at meeting of the Medical Society of the state of New York article in NYT interests: effect of networks on e.g. disease propagation Preceded by studies of (pre)school children in the 1920’s Source: The New York Times (April 3, 1933, page 17).

examples: early social network analysis School kids – favorite (and captive) subjects of study These days much more difficult because need parental consent to gather social network data Source: An Attraction Network in a Fourth Grade Class (Moreno, ‘Who shall survive?’, 1934). boys girls

What are networks? Networks are collections of points joined by lines. “Network” ≡ “Graph” pointslines verticesedges, arcsmath nodeslinkscomputer science sitesbondsphysics actorsties, relationssociology node edge

examples: Political/Financial Networks Mark Lombardi: tracked and mapped global financial fiascos in the 1980s and 1990s (committed suicide 2000) searched public sources such as news articles drew networks by hand (some drawings as wide as 10ft) Book: Hobbs, Robert. Mark Lombardi :global networks /Robert Hobbs.. New York : Independent Curators International, c2003..

Understanding through visualization “I happened to be in the Drawing Center when the Lombardi show was being installed and several consultants to the Department of Homeland Security came in to take a look. They said they found the work revelatory, not because the financial and political connections he mapped were new to them, but because Lombardi showed them an elegant way to array disparate information and make sense of things, which they thought might be useful to their security efforts. I didn't know whether to find that response comforting or alarming, but I saw exactly what they meant.” Michael Kimmelman Webs Connecting the Power Brokers, the Money and the World NY Times November 14, 2003

“Six degrees of Mohammed Atta” Uncloaking Terrorist Networks, by Valdis Krebs examples: terrorist networks

examples: boards of directors Source:

examples: online social networks Friendster "Vizster: Visualizing Online Social Networks." Jeffrey Heer and danah boyd. IEEE Symposium on Information Visualization (InfoViz 2005).InfoViz 2005

examples: Networks of personal homepages StanfordMIT Source: Lada A. Adamic and Eytan Adar, ‘Friends and neighbors on the web’, Social Networks, 25(3): , July homophily: what attributes are predictive of friendship? group cohesion

examples: internet Source: Bill Cheswick

examples: airline networks Source: Northwest Airlines WorldTraveler Magazine

examples: railway networks Source: TRTA, March Tokyo rail map

other examples, e.g. natural language processing Wordnet Source:

examples: gene regulatory networks gene regulatory networks humans have only 30,000 genes, 98% shared with chimps the complexity is in the interaction of genes can we predict what result of the inhibition of one gene will be? Source:

Citric acid cycle Metabolites participate in chemical reactions examples: metabolic networks Source: undetermined

Biochemical pathways (Roche) Source: Roche Applied Science,

modeling networks: random networks Nodes connected at random Number of edges incident on each node is Poisson distributed Poisson distribution

Erdos-Renyi random graphs What happens to the size of the giant component as the density of the network increases?

modeling networks: small worlds Small worlds a friend of a friend is also frequently a friend but only six hops separate any two people in the world Arnold S. – thomashawk, Flickr;

Small world models Duncan Watts and Steven Strogatz a few random links in an otherwise structured graph make the network a small world: the average shortest path is short regular lattice: my friend’s friend is always my friend small world: mostly structured with a few random connections random graph: all connections random Source: Watts, D.J., Strogatz, S.H.(1998) Collective dynamics of 'small-world' networks. Nature 393:

Watts Strogatz Small World Model As you rewire more and more of the links and random, what happens to the clustering coefficient and average shortest path relative to their values for the regular lattice?

SIS models and small worlds SIS model: nodes return to “susceptible” state after being infected What is the role of random shortcuts in diffusion?

modeling networks: power law networks Many real world networks contain hubs: highly connected nodes Usually the distribution of edges is extremely skewed many nodes with few edges fat tail: a few nodes with a very large number of edges no “typical” number of edges number of edges number of nodes with so many edges

But is it really a power-law? A power-law will appear as a straight line on a log-log plot: A deviation from a straight line could indicate a different distribution: exponential lognormal log(# edges) log(# nodes)

network growth & resulting structure random attachment: new node picks any existing node to attach to preferential attachment: new node picks from existing nodes according to their degrees

What implications does this have? Robustness Search Spread of disease Opinion formation Spread of computer viruses Gossip

Mary Bob Jane Who could introduce me to Richard Gere? How do we search? Friends collage – luc, Flickr; Richard Gere – spaceodissey, Flickr;

number of nodes found power-law graph

93 number of nodes found Poisson graph

Power-law networks are robust to random breakdown

But are especially vulnerable to targeted attack Targeting and removing hubs can quickly break up the network

mike In social networks, it’s nice to be a hub

But it depends on what you’re sharing…

The role of hubs in epidemics In a power-law network, a virus can persist no matter how low its infectiousness Many real world networks do exhibit power-laws: needle sharing sexual contacts networks

Spread of computer viruses can be affected by the underlying network

SI models & network structure Will random or preferential attachment lead to faster diffusion? random growthpreferential growth

resilience: power grids and cascading failures Vast system of electricity generation, transmission & distribution is essentially a single network Power flows through all paths from source to sink (flow calculations are important for other networks, even social ones) All AC lines within an interconnect must be in sync If frequency varies too much (as line approaches capacity), a circuit breaker takes the generator out of the system Larger flows are sent to neighboring parts of the grid – triggering a cascading failure Source:.wikipedia.org/wiki/File:UnitedStatesPowerGrid.jpg

Cascading failures 1:58 p.m. The Eastlake, Ohio, First Energy generating plant shuts down (maintenance problems). 3:06 p.m. A First Energy 345-kV transmission line fails south of Cleveland, Ohio. 3:17 p.m. Voltage dips temporarily on the Ohio portion of the grid. Controllers take no action, but power shifted by the first failure onto another power line causes it to sag into a tree at 3:32 p.m., bringing it offline as well. While Mid West ISO and First Energy controllers try to understand the failures, they fail to inform system controllers in nearby states. 3:41 and 3:46 p.m. Two breakers connecting First Energy’s grid with American Electric Power are tripped. 4:05 p.m. A sustained power surge on some Ohio lines signals more trouble building. 4:09:02 p.m. Voltage sags deeply as Ohio draws 2 GW of power from Michigan. 4:10:34 p.m. Many transmission lines trip out, first in Michigan and then in Ohio, blocking the eastward flow of power. Generators go down, creating a huge power deficit. In seconds, power surges out of the East, tripping East coast generators to protect them. Source: Eric J. Lerner, “What's wrong with the electric grid?”

(dis) information cascades Rumor spreading Urban legends Word of mouth (movies, products) Web is self- correcting: Satellite image hoax is first passed around, then exposed, hoax fact is blogged about, then written up on urbanlegends.about.com Source: undetermined

Actual satellite images of the effect of the blackout 20 hours prior to blackout 7 hours after blackout Source: NOAA, U.S. Government

IR applications: online info retrieval It’s in the links: links to URLs can be interpreted as endorsements or recommendations the more links a URL receives, the more likely it is to be a good/entertaining/provocative/authoritative/interesting information source but not all link sources are created equal a link from a respected information source a link from a page created by a spammer Many webpages scattered across the web an important page, e.g. slashdot if a web page is slashdotted, it gains attention

Ranking pages by tracking a drunk A random walker following edges in a network for a very long time will spend a proportion of time at each node which can be used as a measure of importance Various eigenvalue metrics yield variations of importance measures

Wrap up networks are everywhere and can be used to describe many, many systems by modeling networks we can start to understand their properties and the implications those properties have for processes occurring on the network