1 Finding Spread Blockers in Dynamic Networks (SNAKDD08)Habiba, Yintao Yu, Tanya Y., Berger-Wolf, Jared Saia Speaker: Hsu, Yu-wen Advisor: Dr. Koh, Jia-Ling.

Slides:



Advertisements
Similar presentations
By Venkata Sai Pulluri ( ) Narendra Muppavarapu ( )
Advertisements

Clustering Categorical Data The Case of Quran Verses
LEARNING INFLUENCE PROBABILITIES IN SOCIAL NETWORKS Amit Goyal Francesco Bonchi Laks V. S. Lakshmanan University of British Columbia Yahoo! Research University.
Spread of Influence through a Social Network Adapted from :
Analysis and Modeling of Social Networks Foudalis Ilias.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
Nonparametric Link Prediction in Dynamic Graphs Purnamrita Sarkar (UC Berkeley) Deepayan Chakrabarti (Facebook) Michael Jordan (UC Berkeley) 1.
Maximizing the Spread of Influence through a Social Network
Dynamic Bayesian Networks (DBNs)
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
CONNECTIVITY “The connectivity of a network may be defined as the degree of completeness of the links between nodes” (Robinson and Bamford, 1978).
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
Networks. Graphs (undirected, unweighted) has a set of vertices V has a set of undirected, unweighted edges E graph G = (V, E), where.
Are You moved by Your Social Network Application? Abderrahmen Mtibaa, Augustin Chaintreau, Jason LeBrun, Earl Oliver, Anna-Kaisa Pietilainen, Christophe.
HCS Clustering Algorithm
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
1 Paper: IMPORTANT by Bai Sadagopan et al. Michalis Faloutsos.
Liang, Introduction to Java Programming, Eighth Edition, (c) 2011 Pearson Education, Inc. All rights reserved Chapter 23 Algorithm Efficiency.
A Framework For Community Identification in Dynamic Social Networks Chayant Tantipathananandh Tanya Berger-Wolf David Kempe Presented by Victor Lee.
Network Measures Social Media Mining. 2 Measures and Metrics 2 Social Media Mining Network Measures Klout.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
© Peter Andreae CS4HS Algorithms Searching for an item in a list Sorting a list Searching for a word in text Analysing Networks.
Biological Networks Lectures 6-7 : February 02, 2010 Graph Algorithms Review Global Network Properties Local Network Properties 1.
CAFE router: A Fast Connectivity Aware Multiple Nets Routing Algorithm for Routing Grid with Obstacles Y. Kohira and A. Takahashi School of Computer Science.
Energy Efficient Routing and Self-Configuring Networks Stephen B. Wicker Bart Selman Terrence L. Fine Carla Gomes Bhaskar KrishnamachariDepartment of CS.
Efficient Gathering of Correlated Data in Sensor Networks
1 Applications of Relative Importance  Why is relative importance interesting? Web Social Networks Citation Graphs Biological Data  Graphs become too.
1 Chapter 24 Developing Efficient Algorithms. 2 Executing Time Suppose two algorithms perform the same task such as search (linear search vs. binary search)
Network Aware Resource Allocation in Distributed Clouds.
LANGUAGE NETWORKS THE SMALL WORLD OF HUMAN LANGUAGE Akilan Velmurugan Computer Networks – CS 790G.
1 Efficient Search Ranking in Social Network ACM CIKM2007 Monique V. Vieira, Bruno M. Fonseca, Rodrigo Damazio, Paulo B. Golgher, Davi de Castro Reis,
An Improved Algorithm to Accelerate Regular Expression Evaluation Author: Michela Becchi, Patrick Crowley Publisher: 3rd ACM/IEEE Symposium on Architecture.
MINING FREQUENT ITEMSETS IN A STREAM TOON CALDERS, NELE DEXTERS, BART GOETHALS ICDM2007 Date: 5 June 2008 Speaker: Li, Huei-Jyun Advisor: Dr. Koh, Jia-Ling.
Clustering of protein networks: Graph theory and terminology Scale-free architecture Modularity Robustness Reading: Barabasi and Oltvai 2004, Milo et al.
A Clustering Algorithm based on Graph Connectivity Balakrishna Thiagarajan Computer Science and Engineering State University of New York at Buffalo.
Science: Graph theory and networks Dr Andy Evans.
Yaomin Jin Design of Experiments Morris Method.
Workshop on Applications of Wireless Communications (WAWC 2008) 21 August 2008, Lappeenranta - Finland CONTROLLING EPIDEMICS IN WIRELESS NETWORKS Ranjan.
Page 1 Inferring Relevant Social Networks from Interpersonal Communication Munmun De Choudhury, Winter Mason, Jake Hofman and Duncan Watts WWW ’10 Summarized.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Peer Centrality in Socially-Informed P2P Topologies Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University of South.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, É va Tardos KDD 2003.
1 12/2/2015 MATH 224 – Discrete Mathematics Formally a graph is just a collection of unordered or ordered pairs, where for example, if {a,b} G if a, b.
Most of contents are provided by the website Graph Essentials TJTSD66: Advanced Topics in Social Media.
Concept Switching Azadeh Shakery. Concept Switching: Problem Definition C1C2Ck …
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
Slides are modified from Lada Adamic
CS 590 Term Project Epidemic model on Facebook
1 HOTP2P 2011 Parallel and Distributed Systems Group, Delft University of Technology, the Netherlands May 20, 2011 Betweenness Centrality Approximations.
Algorithms For Solving History Sensitive Cascade in Diffusion Networks Research Proposal Georgi Smilyanov, Maksim Tsikhanovich Advisor Dr Yu Zhang Trinity.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Informatics tools in network science
Urban Traffic Simulated From A Dual Perspective Hu Mao-Bin University of Science and Technology of China Hefei, P.R. China
Network Partition –Finding modules of the network. Graph Clustering –Partition graphs according to the connectivity. –Nodes within a cluster is highly.
1 Patterns of Cascading Behavior in Large Blog Graphs Jure Leskoves, Mary McGlohon, Christos Faloutsos, Natalie Glance, Matthew Hurst SDM 2007 Date:2008/8/21.
Importance Measures on Nodes Lecture 2 Srinivasan Parthasarathy 1.
2010 IEEE Global Telecommunications Conference, GLOBECOM 2010 Zheng Guo; Bing Wang; Jun-Hong Cui Prediction Assisted Single-copy Routing in Underwater.
Parametric calibration of speed–density relationships in mesoscopic traffic simulator with data mining Adviser: Yu-Chiang Li Speaker: Gung-Shian Lin Date:2009/10/20.
Hiroki Sayama NECSI Summer School 2008 Week 2: Complex Systems Modeling and Networks Network Models Hiroki Sayama
Social Networks Analysis
Vineet Mittal Should more be added here Committee Members:
Network analysis.
Parametric calibration of speed–density relationships in mesoscopic traffic simulator with data mining Adviser: Yu-Chiang Li Speaker: Gung-Shian Lin Date:2009/10/20.
Community detection in graphs
Effective Social Network Quarantine with Minimal Isolation Costs
Department of Computer Science University of York
Korea University of Technology and Education
Hippocampal “Time Cells”: Time versus Path Integration
Presentation transcript:

1 Finding Spread Blockers in Dynamic Networks (SNAKDD08)Habiba, Yintao Yu, Tanya Y., Berger-Wolf, Jared Saia Speaker: Hsu, Yu-wen Advisor: Dr. Koh, Jia-Ling Date: 2008/12/25

2 *Outline Introduction Definitions Experiment Results and Discussion

3 Introduction How can we stop the spread of a dynamic process through a social network? A common approach to spread inhibition is to identify key individuals whose removal will most dampen the spread. We call this set of key individuals the blockers of the spreading process.

4 Many past results focus on either:  effectively starting the spread of a process  identifying locations to place sensors in order to quickly determine where and when a spread has started. The flow of information through a social network is dependent on  who has the information at what point in time  who are the individuals in contact at that moment with the information carrier that are likely to acquire the information next.

5 Simple local measures, such as degree, can effectively predict an individual’s capacity to block spreading processes There are practical scalable heuristics for identifying quarantine and vaccination targets in order to prevent an epidemic.

6 *Definitions nodes : individuals pairwise interaction : an edge between the corresponding individuals. aggregate network :multigraphs  multiple interactions between a pair of individuals: multiple unweighted edges.

7 *Definitions-Defn1. Dynamic Network : a series of static networks  :a snapshot of individuals and their interactions at time t.  :a finite set of discrete timesteps.  :a set of individuals.  : u and v have interacted at time t. ,,

8 *Definitions-Spread Blockers : gives the overall average extent of spread in a network : the expected spread in a network  M :a model of a spreading process  X :a distribution of the probability of infection

9 : measures the reduction in the expected spread size after removing the set X of individuals from the network. : the blocking capacity of a single individual v, which is the reduction in expected spread size after removing individual v from the network.

10 :finds the set of individuals of size k that results in the maximum reduction in spread in a network when that set is removed from the network.  finds the best blocker(s) in a network.

11 *Definitions-Network Structural Measures : the number of neighbors. Density : the fraction of the possible edges present in the network: Dynamic Density : average density of a timestep Diameter : the maximum length of a shortest path.

12 Temporal Path : a sequence of nodes where each is either an edge in for some t or is a self edge.  i + 1 < j, if and then t < s  The length : the number of timesteps it spans. Dynamic Diameter : the maximum length of a shortest temporal path in the network.

13 Dynamic Degree : the change in the neighborhood of an individual over time: Dynamic Average Degree : the average over all timesteps of the interactions of an individuals in each timestep:

14 Betweenness : measures the importance of individuals based on their position on the shortest paths connecting pairs of non-adjacent individuals. Dynamic Betweenness : the fraction of all shortest temporal paths that pass through it. This version incorporates the measure of a delay between interactions as well as the individual being at the right place at the right time.  different based on position, time, and duration of interactions among individuals.

15 *Definitions-Defn2 temporal betweenness centrality of a node u: Closeness : the average distance of the individual to any other individual in the network Dynamic Closeness : the average time it takes from that individual to reach any other individual in the network, based on shortest temporal paths Clustering Coefficient : the fraction of its neighbors who are neighbors among themselves

16 Dynamic Clustering Coefficient : the sum over time of fractions of an individual’s neighbors who have been interacting among themselves in previous timesteps. Edges in Neighborhood : the number of edges in the local neighborhood of an individual.  It loosely captures the local density of the neighborhood of an individual.

17 The Independent Cascade model describes a spreading process comprising of two types of individuals, active and inactive. If an active individual succeeds in affecting any of its neighbors, those neighbors become active in the next time step.  Each attempt of activation is independent of all previous attempts as well as the attempts of any other active individual to activate a common neighbor.

18 input: a set of active individuals  an active individual tries to activate each of its currently inactive neighbors only once with a probability,independent of all the other neighbors.  If succeeds in activating at timestep t, then will be active in step t + 1, whether or not  The process runs for a finite number of timesteps T.  We denote by the correspondence between the initial set and the resulting set of active individuals. :the extent of spread.

19 In the static case, each individual u uses all its attempts of activating each of its inactive neighbors v with the same probability in one timestep t. After that single attempt the active individual becomes latent: it is active but unable to activate others. In the dynamic network model as defined above, the active individuals never become latent during the spreading process.

20 *Experimental Setup For each measure and for each dynamic network dataset, we follow the following steps:  1. Order the individuals according to the ranking imposed by the measure.  2. For i = 0 to |V | do: (a) Remove i nodes ranked top by the given measure. (b) Estimate the extent of spread by averaging over stochastic simulations of Independent Cascade model initiated at each node in turn, 3000 iterations for each starting node. (c) If the extent of spread is less than 10% of the nodes then STOP.

21 Lower Bound: Best Blockers The best blocker is the individual whose removal results in the minimum extent of spread. We then repeat the process with the remaining individuals. one needs to identify the set of top k blockers.  computationally hard  an exhaustive search is infeasible We have conducted limited experiments on the datasets considered in all cases the set of iterative best k blockers equals to the set of top k blockers.

22 *Datasets Grevy Onagers DBLP Enron Reality Mining UMass

23 *Results and Discussion Comparison of the reduction of extent of spread after removal of nodes ranked by various aggregate (top) and dynamic (bottom) measures in Onager (left) and Enron (right) dynamic networks. The x-axis shows the number of individuals removed and the y-axis shows the average spread size after the removal of individuals.

24 Comparison of the reduction of the extent of spread after removal of nodes ranked by the best measures. The x-axis shows the number of individuals removed and the y-axis shows the average spread size after the removal of individuals.

25 Comparison of the ranking of the nodes by each of the best measures. Each plot shows the ranking of the individuals according to two measures. Individuals ranked top by both measures are in the upper right corner of each plot. Nodes with the same value for a particular measure have the same rank for that measure. For each pair of plots, the left plot represents Onagers and the right plot represents Enron.

26 Table 1: The size of the common intersection of all the top sets ranked by the four measures and the best ranking. Set size is the size of the sets determined by the best blocking ordering. The size of the intersection is the number of the individuals in the intersection and the Intersection fraction is the fraction of the intersection of the size of the set.

27 *Conclusions and future work These simple local measures identify good blockers on both static and dynamic networks. Can we devise a theoretical model for social network formation that explains why simple local properties would so effectively predict which nodes are good blockers? There are certain data sets in which it is inherently challenging to find good blockers, no matter what measures are used. Can we determine structural properties of the network that determine how hard it is to find good blockers?