Homophily Law of Networks: – Principles, Methods and Experiments

Total Page:16

File Type:pdf, Size:1020Kb

Homophily Law of Networks: – Principles, Methods and Experiments Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions Homophily Law of Networks: – Principles, Methods and Experiments LI Angsheng Institute of Software Chinese Academy of Sciences SAS, Isaac Newton Institute 11, Jan. 2012 Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions Abstract In this talk, I will introduce our new discovery of the homophily law of networks, that the homophily property ensures that a real network satisfies the small community phenomenon, including: 1) the power law degree distribution, 2) the small diameter property, 3) a significant fraction of nodes are contained in some small communities, 4) nodes within a small community share something in common, the colors in our model, 5) a small community contains a few representatives, and 6) nodes within a small community satisfy the power law degree distribution. I will also introduce the applications of the small community phenomenon and homophily law of networks in new searching, predicting and ranking algorithms in real networks. Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions Outline 1. Graph in the information age 2. Clustering/community finding - past decade 3. Challenges - next decade 4. Mathematical definitions 5. Small community phenomenon 6. Homophily law 7. Local dimension and searching 8. Local reductions 9. Cascading/giant cascading 10. Small core Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions Scale free graphs 1) 1999, Barabási, Albert, Science, Scale free of a web network 2) 2002, Barabási, Albert, 2002, Review of modern physics 3) Kumar et al. 2000, in- and out-degrees of a web crawl Later on: – internet networks – telephone call graph – US power grid – Hollywod graph of actors – foodweb – protein-protein interaction networks – email – collaboration – citation, · · · Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions Power law G = (V , E), ∃β > 0: The number of nodes of degree k in G is proportional to 1/k β. Degree Distribution of COND-MAT(N=21363) 104 103 102 Number of nodes 101 100 100 101 102 103 Degree Figure: Degree distribution of COND-MAT Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions PA Degree distribution of PA model(N=20000) 104 103 102 number of nodes 101 100 100 101 102 103 104 degree Figure: Degree distribution of PA model Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions History 1. 1926, Lotka, Chemical abstracts from 1907 - 1916 # of authors published k papers proportional to 1/k 2 2. 1932, Zipf # of English words that are used for k times proportional to 1/k 3. 1949, Yule Explained the reason why power law exists, having idea of the preferential attachment 4. 1955, Simon First simple model of the PA, leading to power law Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions Small world 1. 1967, Stanley Milgram 6 degree separation - social experiments 2. 1999, reasoning on the diameter of web on the average, the diameter of a 200 million nodes – 19, 1.5 million nodes – 16. 3. 1998, Watts, Strogatz, Nature a 1 dimension model of graphs with small diameter, poly(log n). 4. 2000, Kleinberg a d-dimension model of graphs, satisfying the small world phenomenon, and in which a short path can be locally found. Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions Summary 1. Both the power law and small world were found in social study by experiments 2. Both can be studied mathematically in networks 3. The two laws are shared by most real world networks 4. Perhaps the major achievement in the past decade for the network science is the discovery that networks are universal representation for complex systems for a number of subjects, including both natural and social sciences – commented by Barabási, 2009, in his Science review article. Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions Challenges 2009, Barabási, Science paper, reviewing the past decade The state of the art: There are almost as many as dynamics as the real world networks. Questions 1) Are there uniform approaches to the dynamics of networks in general? 2) Why the failure of a few nodes cause the failure of the whole network? With applications in: – environments – society – economics – technology – internet etc. 3) Can network be robust and secure? Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions Clustering Hypothesis: Structures are essential to the dynamics of networks First step: clustering to understand the structures Two approaches: 1. Modularity – physical approach, implicit def 2. Graph partitioning – algorithmic dependent – balanced, so large – disjoint Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions Summary - community finding • Graph partitioning algorithms have been successfully used in finding large communities of networks – the project of finding large communities is done Observations 1. real communities are small 2. communities are overlapping 3. need a mathematical definition of community Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions Intuition Figure: Two vertex sets (with dark background) have the same conductance value 1/11, while the left one is more community-like Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions Overview I. Local approach II. Global approach Our study consists of: • Mathematical theory • Algorithms • Experiments • Applications Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions Mathematical definition Definition 1 For S ⊆ V and vol(S) ≤ 2 vol(G), the conductance of S is defined as: e(S, S¯) Φ(S)= . vol(S) Definition Given a graph G = (V , E), a set S ⊂ V is a (α, β)-community of G, if α Φ(S) ≤ . |S|β Moreover, if |S| = O((ln n)γ), then we say that S is a (α, β, γ)-community of G, where n = |V |. In this case, we say that (α, β, γ) is the local dimension of G. Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions Small community phenomenon Let {Gn} be a sequence of networks evolved from some network model. We say that {Gn} satisfies the small community phenomenon, if there are constants α, β, γ such that there is a significant fraction of nodes of Gn which are contained in some (α, β, γ)-communities, for almost all n. Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions Erdös-Rényi model Theorem If p = ω(n) ln n/n, where ω(n) →∞ arbitrarily slowly, then with high probability, a random graph G in G(n, p) does not even contain an (α, β, γ)-community for every β > 0 and all γ > 0. Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions Ravasz-Barabási hierarchical model Theorem For a graph Gt generated from the stochastic Ravasz-Barabási hierarchical model, with high probability, every node is contained in an (α, β, γ)-community for some γ > 0 and 1 β = min{1, log5 p }. Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions Preferential attachment model Theorem With high probability, for a graph Gd,n in the preferential attachment model and d ≥ 2, 0 < β ≤ 2, there is no (α, β)-community in Gd,n. Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions Geometric preferential attachment model Theorem For Gn generated from the Geometric Preferential Attachment model, with high probability, each vertex in Gn is contained in an (α, β)-community of size nǫ, where 0 <β,ǫ< 1/2. Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions d-dimensional small world model Theorem In the d-dimensional small world model G, with high probability: (1) if r < d, there is no proper community for an arbitrary node; (2) if r d, there exists weak -communities of size n = (α, β) (ln n)c1 for every node, where β < 1, c1 > 0; (3) if 2d ≥ r > d, there exists (α, r − 1, c2)-communities for every node, where c2 > 1; and (4) if r > 2d, there exists (α, 1, 1)-communities for every node. Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions Small community model A hybrid social network built based on the following rules: (i) A new node v links to an existing node u with probability proportional to both the degree d(u) and (dist(u, v))−β for some constant β, (ii) A new local edge is added with probability inverse proportional to the distance between the two nodes, and (iii) A new global edge is added with probability proportional to both the degrees and (dist(u, v))−γ for some constant γ. Theorem (1) The global edges satisfy the power law distribution, (2) The whole network satisfies the small community phenomenon, and (3) The whole network satisfies the small world phenomenon. Math Searching HomophilyLaw SearchingandPredicting Reduction Cascading Validation Questions Approximation of the PageRank With Jiankou Li, Pan Peng Community (v,α,β,κ,ǫ) • Compute an ǫ-approximation personalized PageRank vector p = prκ(χv − r) by invoking ApproximatePR (v,κ,ǫ). • Order the vertices into the sequence v1, · · · , vn by swapping. Define Si = {v1, · · · , vi } for each i ∈ [1, |supp(p)|]. • (The first local optimal strategy) For
Recommended publications
  • Group-In-A-Box Layout for Multi-Faceted Analysis of Communities
    2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing Group-In-a-Box Layout for Multi-faceted Analysis of Communities Eduarda Mendes Rodrigues*, Natasa Milic-Frayling †, Marc Smith‡, Ben Shneiderman§, Derek Hansen¶ * Dept. of Informatics Engineering, Faculty of Engineering, University of Porto, Portugal [email protected] † Microsoft Research, Cambridge, UK [email protected] ‡ Connected Action Consulting Group, Belmont, California, USA [email protected] § Dept. of Computer Science & Human-Computer Interaction Lab University of Maryland, College Park, Maryland, USA [email protected] ¶ College of Information Studies & Center for the Advanced Study of Communities and Information University of Maryland, College Park, Maryland, USA [email protected] Abstract—Communities in social networks emerge from One particularly important aspect of social network interactions among individuals and can be analyzed through a analysis is the detection of communities, i.e., sub-groups of combination of clustering and graph layout algorithms. These individuals or entities that exhibit tight interconnectivity approaches result in 2D or 3D visualizations of clustered among the wider population. For example, Twitter users who graphs, with groups of vertices representing individuals that regularly retweet each other’s messages may form cohesive form a community. However, in many instances the vertices groups within the Twitter social network. In a network have attributes that divide individuals into distinct categories visualization they would appear as clusters or sub-graphs, such as gender, profession, geographic location, and similar. It often colored distinctly or represented by a different vertex is often important to investigate what categories of individuals shape in order to convey their group identity.
    [Show full text]
  • Joint Estimation of Preferential Attachment and Node Fitness In
    www.nature.com/scientificreports OPEN Joint estimation of preferential attachment and node fitness in growing complex networks Received: 15 April 2016 Thong Pham1, Paul Sheridan2 & Hidetoshi Shimodaira1 Accepted: 09 August 2016 Complex network growth across diverse fields of science is hypothesized to be driven in the main by Published: 07 September 2016 a combination of preferential attachment and node fitness processes. For measuring the respective influences of these processes, previous approaches make strong and untested assumptions on the functional forms of either the preferential attachment function or fitness function or both. We introduce a Bayesian statistical method called PAFit to estimate preferential attachment and node fitness without imposing such functional constraints that works by maximizing a log-likelihood function with suitably added regularization terms. We use PAFit to investigate the interplay between preferential attachment and node fitness processes in a Facebook wall-post network. While we uncover evidence for both preferential attachment and node fitness, thus validating the hypothesis that these processes together drive complex network evolution, we also find that node fitness plays the bigger role in determining the degree of a node. This is the first validation of its kind on real-world network data. But surprisingly the rate of preferential attachment is found to deviate from the conventional log-linear form when node fitness is taken into account. The proposed method is implemented in the R package PAFit. The study of complex network evolution is a hallmark of network science. Research in this discipline is inspired by empirical observations underscoring the widespread nature of certain structural features, such as the small-world property1, a high clustering coefficient2, a heavy tail in the degree distribution3, assortative mixing patterns among nodes4, and community structure5 in a multitude of biological, societal, and technological networks6–11.
    [Show full text]
  • Networkx: Network Analysis with Python
    NetworkX: Network Analysis with Python Salvatore Scellato Full tutorial presented at the XXX SunBelt Conference “NetworkX introduction: Hacking social networks using the Python programming language” by Aric Hagberg & Drew Conway Outline 1. Introduction to NetworkX 2. Getting started with Python and NetworkX 3. Basic network analysis 4. Writing your own code 5. You are ready for your project! 1. Introduction to NetworkX. Introduction to NetworkX - network analysis Vast amounts of network data are being generated and collected • Sociology: web pages, mobile phones, social networks • Technology: Internet routers, vehicular flows, power grids How can we analyze this networks? Introduction to NetworkX - Python awesomeness Introduction to NetworkX “Python package for the creation, manipulation and study of the structure, dynamics and functions of complex networks.” • Data structures for representing many types of networks, or graphs • Nodes can be any (hashable) Python object, edges can contain arbitrary data • Flexibility ideal for representing networks found in many different fields • Easy to install on multiple platforms • Online up-to-date documentation • First public release in April 2005 Introduction to NetworkX - design requirements • Tool to study the structure and dynamics of social, biological, and infrastructure networks • Ease-of-use and rapid development in a collaborative, multidisciplinary environment • Easy to learn, easy to teach • Open-source tool base that can easily grow in a multidisciplinary environment with non-expert users
    [Show full text]
  • Introduction to Network Science & Visualisation
    IFC – Bank Indonesia International Workshop and Seminar on “Big Data for Central Bank Policies / Building Pathways for Policy Making with Big Data” Bali, Indonesia, 23-26 July 2018 Introduction to network science & visualisation1 Kimmo Soramäki, Financial Network Analytics 1 This presentation was prepared for the meeting. The views expressed are those of the author and do not necessarily reflect the views of the BIS, the IFC or the central banks and other institutions represented at the meeting. FNA FNA Introduction to Network Science & Visualization I Dr. Kimmo Soramäki Founder & CEO, FNA www.fna.fi Agenda Network Science ● Introduction ● Key concepts Exposure Networks ● OTC Derivatives ● CCP Interconnectedness Correlation Networks ● Housing Bubble and Crisis ● US Presidential Election Network Science and Graphs Analytics Is already powering the best known AI applications Knowledge Social Product Economic Knowledge Payment Graph Graph Graph Graph Graph Graph Network Science and Graphs Analytics “Goldman Sachs takes a DIY approach to graph analytics” For enhanced compliance and fraud detection (www.TechTarget.com, Mar 2015). “PayPal relies on graph techniques to perform sophisticated fraud detection” Saving them more than $700 million and enabling them to perform predictive fraud analysis, according to the IDC (www.globalbankingandfinance.com, Jan 2016) "Network diagnostics .. may displace atomised metrics such as VaR” Regulators are increasing using network science for financial stability analysis. (Andy Haldane, Bank of England Executive
    [Show full text]
  • Evolving Networks and Social Network Analysis Methods And
    DOI: 10.5772/intechopen.79041 ProvisionalChapter chapter 7 Evolving Networks andand SocialSocial NetworkNetwork AnalysisAnalysis Methods and Techniques Mário Cordeiro, Rui P. Sarmento,Sarmento, PavelPavel BrazdilBrazdil andand João Gama Additional information isis available atat thethe endend ofof thethe chapterchapter http://dx.doi.org/10.5772/intechopen.79041 Abstract Evolving networks by definition are networks that change as a function of time. They are a natural extension of network science since almost all real-world networks evolve over time, either by adding or by removing nodes or links over time: elementary actor-level network measures like network centrality change as a function of time, popularity and influence of individuals grow or fade depending on processes, and events occur in net- works during time intervals. Other problems such as network-level statistics computation, link prediction, community detection, and visualization gain additional research impor- tance when applied to dynamic online social networks (OSNs). Due to their temporal dimension, rapid growth of users, velocity of changes in networks, and amount of data that these OSNs generate, effective and efficient methods and techniques for small static networks are now required to scale and deal with the temporal dimension in case of streaming settings. This chapter reviews the state of the art in selected aspects of evolving social networks presenting open research challenges related to OSNs. The challenges suggest that significant further research is required in evolving social networks, i.e., existent methods, techniques, and algorithms must be rethought and designed toward incremental and dynamic versions that allow the efficient analysis of evolving networks. Keywords: evolving networks, social network analysis 1.
    [Show full text]
  • Network Science, Homophily and Who Reviews Who in the Linux Kernel? Working Paper[+] › Open-Access at ECIS2020-Arxiv.Pdf
    Network Science, Homophily and Who Reviews Who in the Linux Kernel? Working paper[P] Open-access at http://users.abo.fi/jteixeir/pub/linuxsna/ ECIS2020-arxiv.pdf José Apolinário Teixeira Åbo Akademi University Finland # jteixeira@abo. Ville Leppänen University of Turku Finland Sami Hyrynsalmi arXiv:2106.09329v1 [cs.SE] 17 Jun 2021 LUT University Finland [P]As presented at 2020 European Conference on Information Systems (ECIS 2020), held Online, June 15-17, 2020. The ocial conference proceedings are available at the AIS eLibrary (https://aisel.aisnet.org/ecis2020_rp/). Page ii of 24 ? Copyright notice ? The copyright is held by the authors. The same article is available at the AIS Electronic Library (AISeL) with permission from the authors (see https://aisel.aisnet.org/ ecis2020_rp/). The Association for Information Systems (AIS) can publish and repro- duce this article as part of the Proceedings of the European Conference on Information Systems (ECIS 2020). ? Archiving information ? The article was self-archived by the rst author at its own personal website http:// users.abo.fi/jteixeir/pub/linuxsna/ECIS2020-arxiv.pdf dur- ing June 2021 after the work was presented at the 28th European Conference on Informa- tion Systems (ECIS 2020). Page iii of 24 ð Funding and Acknowledgements ð The rst author’s eorts were partially nanced by Liikesivistysrahasto - the Finnish Foundation for Economic Education, the Academy of Finland via the DiWIL project (see http://abo./diwil) project. A research companion website at http://users.abo./jteixeir/ECIS2020cw supports the paper with additional methodological details, additional data visualizations (plots, tables, and networks), as well as high-resolution versions of the gures embedded in the paper.
    [Show full text]
  • Network Science
    This is a preprint of Katy Börner, Soma Sanyal and Alessandro Vespignani (2007) Network Science. In Blaise Cronin (Ed) Annual Review of Information Science & Technology, Volume 41. Medford, NJ: Information Today, Inc./American Society for Information Science and Technology, chapter 12, pp. 537-607. Network Science Katy Börner School of Library and Information Science, Indiana University, Bloomington, IN 47405, USA [email protected] Soma Sanyal School of Library and Information Science, Indiana University, Bloomington, IN 47405, USA [email protected] Alessandro Vespignani School of Informatics, Indiana University, Bloomington, IN 47406, USA [email protected] 1. Introduction.............................................................................................................................................2 2. Notions and Notations.............................................................................................................................4 2.1 Graphs and Subgraphs .........................................................................................................................5 2.2 Graph Connectivity..............................................................................................................................7 3. Network Sampling ..................................................................................................................................9 4. Network Measurements........................................................................................................................11
    [Show full text]
  • Learning on Hypergraphs: Spectral Theory and Clustering
    Learning on Hypergraphs: Spectral Theory and Clustering Pan Li, Olgica Milenkovic Coordinated Science Laboratory University of Illinois at Urbana-Champaign March 12, 2019 Learning on Graphs Graphs are indispensable mathematical data models capturing pairwise interactions: k-nn network social network publication network Important learning on graphs problems: clustering (community detection), semi-supervised/active learning, representation learning (graph embedding) etc. Beyond Pairwise Relations A graph models pairwise relations. Recent work has shown that high-order relations can be significantly more informative: Examples include: Understanding the organization of networks (Benson, Gleich and Leskovec'16) Determining the topological connectivity between data points (Zhou, Huang, Sch}olkopf'07). Graphs with high-order relations can be modeled as hypergraphs (formally defined later). Meta-graphs, meta-paths in heterogeneous information networks. Algorithmic methods for analyzing high-order relations and learning problems are still under development. Beyond Pairwise Relations Functional units in social and biological networks. High-order network motifs: Motif (Benson’16) Microfauna Pelagic fishes Crabs & Benthic fishes Macroinvertebrates Algorithmic methods for analyzing high-order relations and learning problems are still under development. Beyond Pairwise Relations Functional units in social and biological networks. Meta-graphs, meta-paths in heterogeneous information networks. (Zhou, Yu, Han'11) Beyond Pairwise Relations Functional units in social and biological networks. Meta-graphs, meta-paths in heterogeneous information networks. Algorithmic methods for analyzing high-order relations and learning problems are still under development. Review of Graph Clustering: Notation and Terminology Graph Clustering Task: Cluster the vertices that are \densely" connected by edges. Graph Partitioning and Conductance A (weighted) graph G = (V ; E; w): for e 2 E, we is the weight.
    [Show full text]
  • Multiplex Conductance and Gossip Based Information Spreading in Multiplex Networks
    1 Multiplex Conductance and Gossip Based Information Spreading in Multiplex Networks Yufan Huang, Student Member, IEEE, and Huaiyu Dai, Fellow, IEEE Abstract—In this network era, not only people are connected, different networks are also coupled through various interconnections. This kind of network of networks, or multilayer networks, has attracted research interest recently, and many beneficial features have been discovered. However, quantitative study of information spreading in such networks is essentially lacking. Despite some existing results in single networks, the layer heterogeneity and complicated interconnections among the layers make the study of information spreading in this type of networks challenging. In this work, we study the information spreading time in multiplex networks, adopting the gossip (random-walk) based information spreading model. A new metric called multiplex conductance is defined based on the multiplex network structure and used to quantify the information spreading time in a general multiplex network in the idealized setting. Multiplex conductance is then evaluated for some interesting multiplex networks to facilitate understanding in this new area. Finally, the tradeoff between the information spreading efficiency improvement and the layer cost is examined to explain the user’s social behavior and motivate effective multiplex network designs. Index Terms—Information spreading, multiplex networks, gossip algorithm, multiplex conductance F 1 INTRODUCTION N the election year, one of the most important tasks Arguably, this somewhat simplified version of multilayer I for presidential candidates is to disseminate their words networks already captures many interesting multi-scale and and opinions to voters in a fast and efficient manner. multi-component features, and serves as a good starting The underlying research problem on information spreading point for our intended study.
    [Show full text]
  • Synthetic Graph Generation for Data-Intensive HPC Benchmarking: Background and Framework
    ORNL/TM-2013/339 Synthetic Graph Generation for Data-Intensive HPC Benchmarking: Background and Framework October 2013 Prepared by Joshua Lothian, Sarah Powers, Blair D. Sullivan, Matthew Baker, Jonathan Schrock, Stephen W. Poole DOCUMENT AVAILABILITY Reports produced after January 1, 1996, are generally available free via the U.S. Department of Energy (DOE) Information Bridge: Web Site: http://www.osti.gov/bridge Reports produced before January 1, 1996, may be purchased by members of the public from the following source: National Technical Information Service 5285 Port Royal Road Springfield, VA 22161 Telephone: 703-605-6000 (1-800-553-6847) TDD: 703-487-4639 Fax: 703-605-6900 E-mail: [email protected] Web site: http://www.ntis.gov/support/ordernowabout.htm Reports are available to DOE employees, DOE contractors, Energy Technology Data Ex- change (ETDE), and International Nuclear Information System (INIS) representatives from the following sources: Office of Scientific and Technical Information P.O. Box 62 Oak Ridge, TN 37831 Telephone: 865-576-8401 Fax: 865-576-5728 E-mail: [email protected] Web site:http://www.osti.gov/contact.html This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or other- wise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof.
    [Show full text]
  • Social Network Analysis and Information Propagation: a Case Study Using Flickr and Youtube Networks
    International Journal of Future Computer and Communication, Vol. 2, No. 3, June 2013 Social Network Analysis and Information Propagation: A Case Study Using Flickr and YouTube Networks Samir Akrouf, Laifa Meriem, Belayadi Yahia, and Mouhoub Nasser Eddine, Member, IACSIT 1 makes decisions based on what other people do because their Abstract—Social media and Social Network Analysis (SNA) decisions may reflect information that they have and he or acquired a huge popularity and represent one of the most she does not. This concept is called ″herding″ or ″information important social and computer science phenomena of recent cascades″. Therefore, analyzing the flow of information on years. One of the most studied problems in this research area is influence and information propagation. The aim of this paper is social media and predicting users’ influence in a network to analyze the information diffusion process and predict the became so important to make various kinds of advantages influence (represented by the rate of infected nodes at the end of and decisions. In [2]-[3], the marketing strategies were the diffusion process) of an initial set of nodes in two networks: enhanced with a word-of-mouth approach using probabilistic Flickr user’s contacts and YouTube videos users commenting models of interactions to choose the best viral marketing plan. these videos. These networks are dissimilar in their structure Some other researchers focused on information diffusion in (size, type, diameter, density, components), and the type of the relationships (explicit relationship represented by the contacts certain special cases. Given an example, the study of Sadikov links, and implicit relationship created by commenting on et.al [6], where they addressed the problem of missing data in videos), they are extracted using NodeXL tool.
    [Show full text]
  • Preferential Attachment Model with Degree Bound and Its Application to Key Predistribution in WSN
    Preferential Attachment Model with Degree Bound and its Application to Key Predistribution in WSN Sushmita Rujy and Arindam Palz y Indian Statistical Institute, Kolkata, India. Email: [email protected] z TCS Innovation Labs, Kolkata, India. Email: [email protected] Abstract—Preferential attachment models have been widely particularly those in the military domain [14]. The resource studied in complex networks, because they can explain the constrained nature of sensors restricts the use of public key formation of many networks like social networks, citation methods to secure communication. Key predistribution [7] networks, power grids, and biological networks, to name a few. Motivated by the application of key predistribution in wireless is a widely used symmetric key management technique in sensor networks (WSN), we initiate the study of preferential which cryptographic keys are preloaded in sensor networks attachment with degree bound. prior to deployment. Sensor nodes find out the common keys Our paper has two important contributions to two different using a shared key discovery phase. Messages are encrypted areas. The first is a contribution in the study of complex by the source node using the shared key and decrypted at the networks. We propose preferential attachment model with degree bound for the first time. In the normal preferential receiving node using the same key. attachment model, the degree distribution follows a power law, The number of keys in each node is to be minimized, in with many nodes of low degree and a few nodes of high degree. order to reduce storage space. Direct communication between In our scheme, the nodes can have a maximum degree dmax, any pair of nodes help in quick and easy transmission of where dmax is an integer chosen according to the application.
    [Show full text]