Fast Cross-Layer Dependency Inference on Multi-Layered Networks

Total Page:16

File Type:pdf, Size:1020Kb

Fast Cross-Layer Dependency Inference on Multi-Layered Networks FASCINATE: Fast Cross-Layer Dependency Inference on Multi-layered Networks Chen Chen†, Hanghang Tong†, Lei Xie‡, Lei Ying†, and Qing He§ †Arizona State University, {chen_chen, hanghang.tong, lei.ying.2}@asu.edu ‡City University of New York, [email protected] §University at Buffalo, [email protected] ABSTRACT Multi-layered networks have recently emerged as a new network model, which naturally finds itself in many high-impact applica- tion domains, ranging from critical inter-dependent infrastructure networks, biological systems, organization-level collaborations, to cross-platform e-commerce, etc. Cross-layer dependency, which describes the dependencies or the associations between nodes across different layers/networks, often plays a central role in many data mining tasks on such multi-layered networks. Yet, it remains a daunting task to accurately know the cross-layer dependency a prior. In this paper, we address the problem of inferring the missing cross- layer dependencies on multi-layered networks. The key idea behind our method is to view it as a collective collaborative filtering prob- lem. By formulating the problem into a regularized optimization model, we propose an effective algorithm to find the local optima with linear complexity. Furthermore, we derive an online algo- rithm to accommodate newly arrived nodes, whose complexity is Figure 1: An illustrative example of multi-layered networks. Each just linear wrt the size of the neighborhood of the new node. We gray ellipse is a critical infrastructure network (e.g., Telecom net- perform extensive empirical evaluations to demonstrate the effec- work, power grid, transportation network, etc). A thick arrow be- tiveness and the efficiency of the proposed methods. tween two ellipses indicates a cross-layer dependency between the corresponding two networks (e.g., a router in the telecom network 1. INTRODUCTION depends on one or more power plants in the power grid). In an increasingly connected world, networks from many high- and the disease network is in turn coupled with the drug network impact areas are often collected from multiple inter-dependent do- by drug-disease associations. Multi-layered networks also appear mains, leading to the emergence of multi-layered networks [4, 9, in many other application domains, such as organization-level col- 26, 29, 30]. A typical example of multi-layered networks is inter- laboration platform [5] and cross-platform e-commerce [6, 16, 21, dependent critical infrastructure network. As illustrated in Figure 1, 36]. the full functioning of the telecom network, the transportation net- Compared with single-layered networks, a unique topological work and the gas pipeline network is dependent on the power sup- characteristic of multi-layered networks lies in its cross-layer de- ply from the power grid. While for the gas-fired and coal-fired pendency structure. For example, in the critical infrastructure net- generators in the power grid, their functioning is fully dependent work, the full functioning of the telecom layer depends on the suf- on the gas and coal supply from the transportation network and the ficient power supply from the power grid layer, which in turn relies gas pipeline network. Moreover, to keep the whole complex sys- on the functioning of the transportation layer (e.g., to deliver the tem working in order, extensive communications are needed across sufficient fuel). While in the biological systems, the dependency is the networks, which are in turn supported by the telecom network. represented as the associations among diseases, genes and drugs. Another example is biological system, where the protein-protein In practice, the cross-layer dependency often plays a central role in interaction network (PPI/gene network) is naturally linked to the many multi-layered network mining tasks. For example, in the crit- disease similarity network by the known disease-gene associations, ical infrastructure network, the existence of the cross-layer depen- dency is in general considered as a major factor of the vulnerability of the entire system. This is because a small disturbance on one Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed supporting layer/network (e.g., power grid) might cause a ripple ef- for profit or commercial advantage and that copies bear this notice and the full cita- fect to all the dependent layers, leading to a catastrophic/cascading tion on the first page. Copyrights for components of this work owned by others than failure of the entire system. On the other hand, the cross-layer de- ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re- publish, to post on servers or to redistribute to lists, requires prior specific permission pendency in the biological system is often the key to new discover- and/or a fee. Request permissions from [email protected]. ies, such as new treatment associations between existing drugs and KDD ’16, August 13-17, 2016, San Francisco, CA, USA new diseases (e.g., drug re-purposing). c 2016 ACM. ISBN 978-1-4503-4232-2/16/08. $15.00 Despite its key importance, it remains a daunting task to ac- DOI: http://dx.doi.org/10.1145/2939672.2939784 curately know the cross-layer dependency in a multi-layered net- Table 1: Main Symbols. work, due to a number of reasons, ranging from noise, incomplete data sources, limited accessibility to network dynamics. For ex- Symbol Definition and Description A B ample, an extreme weather event might significantly disrupt the , the adjacency matrices (bold upper case) a b power grid, the transportation network and the cross-layer depen- , column vectors (bold lower case) A B dencies in between at the epicenter. Yet, due to limited accessibility , sets (calligraphic) th th to the damage area during or soon after the disruption, the cross- A(i, j) the element at i row j column A layer dependency structure might only have a probabilistic and/or in matrix th coarse-grained description. On the other hand, for a newly identi- A(i, :) the i row of matrix A A(:,j) the jth column of matrix A fied chemical in the biological system, its cross-layer dependencies wrt proteins and/or the diseases might be completely unknown due A transpose of matrix A to clinical limitations.(i.e., the zero-start problem). Aˆ the adjacency matrix of A with the newly added node In this paper, we aim to tackle the above challenges and develop G the layer-layer dependency matrix effective and efficient methods to infer cross-layer dependency on A within-layer connectivity matrices of the network multi-layered networks. The main contributions of the paper can A = {A1,...,Ag} be summarized as D cross-layer dependency matrices D = {Di,j i, j =1, ..., g} • Problem Formulations. We formally formulate the cross- Wi,j weight matrix for Di,j layer dependency inference problem as a regularized opti- Fi low-rank representation for layer-i (i =1, ..., g) mization problem. The key idea of our formulation is to col- mi,ni number of edges and nodes in graph Ai lectively leverage the within-layer topology as well as the mi,j number of dependencies in Di,j observed cross-layer dependency to infer a latent, low-rank g total number of layers representation for each layer, based on which the missing r the rank for {Fi}i=1,...,g cross-layer dependencies can be inferred. t the maximal iteration number ξ the threshold to determine the iteration • Algorithms and Analysis. We propose an effective algorithm (FASCINATE) for cross-layer dependency inference on multi- G(i, j)=1if layer-j depends on layer-i, and G(i, j)=0other- layered networks, and analyze its optimality, convergence wise. Second, we need a set of g within-layer connectivity matri- and complexity. We further present its variants and gener- ces: A = {A1, ..., Ag} to describe the connectivities/similarities alizations, including an online algorithm to address the zero- between nodes within the same layer. Third, we need a set of cross- start problem. layer dependency matrices D = {Di,j i, j =1, ..., g}, where D • Evaluations. We perform extensive experiments on real data- i,j describes the dependencies between the nodes from layer-i sets to validate the effectiveness, efficiency and scalability of and the nodes from layer-j if these two layers are directly dependent G the proposed algorithms. Specially, our experimental eval- (i.e., (i, j)=1). When there is no direct dependencies between G uations show that the proposed algorithms outperform their the two layers (i.e., (i, j)=0), the corresponding dependency D best competitors by 8.2%-41.9% in terms of inference accu- matrix i,j is absent. Taking the multi-layered network in Fig- racy while enjoying linear complexity. Specifically, the pro- ure 2 for an example, the abstract layer-layer dependency network 7 G posed FASCINATE-ZERO algorithm can achieve up to 10 × of this biological system can be viewed as a line graph. The A speedup with barely no compromise on accuracy. four within-layer similarity matrices in are the chemical network (A1), the drug network (A2), the disease network (A3) and the A The rest of the paper is organized as follows. Section 2 gives the protein-protein interaction (PPI) network ( 4). Across those lay- formal definitions of the cross-layer dependency inference prob- ers, we have three non-empty dependency matrices, including the D lems. Section 3 proposes FASCINATE algorithm with its analysis. chemical-drug dependency matrix ( 1,2), the drug-disease inter- D Section 4 introduces the zero-start algorithm FASCINATE-ZERO. action matrix ( 2,3) and the disease-protein dependency matrix D Section 5 presents the experiment results.
Recommended publications
  • A Network Approach to Define Modularity of Components In
    A Network Approach to Define Modularity of Components Manuel E. Sosa1 Technology and Operations Management Area, in Complex Products INSEAD, 77305 Fontainebleau, France Modularity has been defined at the product and system levels. However, little effort has e-mail: [email protected] gone into defining and quantifying modularity at the component level. We consider com- plex products as a network of components that share technical interfaces (or connections) Steven D. Eppinger in order to function as a whole and define component modularity based on the lack of Sloan School of Management, connectivity among them. Building upon previous work in graph theory and social net- Massachusetts Institute of Technology, work analysis, we define three measures of component modularity based on the notion of Cambridge, Massachusetts 02139 centrality. Our measures consider how components share direct interfaces with adjacent components, how design interfaces may propagate to nonadjacent components in the Craig M. Rowles product, and how components may act as bridges among other components through their Pratt & Whitney Aircraft, interfaces. We calculate and interpret all three measures of component modularity by East Hartford, Connecticut 06108 studying the product architecture of a large commercial aircraft engine. We illustrate the use of these measures to test the impact of modularity on component redesign. Our results show that the relationship between component modularity and component redesign de- pends on the type of interfaces connecting product components. We also discuss direc- tions for future work. ͓DOI: 10.1115/1.2771182͔ 1 Introduction The need to measure modularity has been highlighted implicitly by Saleh ͓12͔ in his recent invitation “to contribute to the growing Previous research on product architecture has defined modular- field of flexibility in system design” ͑p.
    [Show full text]
  • Practical Applications of Community Detection
    Volume 6, Issue 4, April 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Practical Applications of Community Detection Mini Singh Ahuja1, Jatinder Singh2, Neha3 1 Research Scholar, Department of Computer Science, Punjab Technical University, Punjab, India 2 Professor, Department of Computer Science, KC Group of Institutes Nawashahr, Punjab, India 3 Student (M.Tech), Department of Computer Science, Regional Campus Gurdaspur, Punjab, India Abstract: Network is a collection of entities that are interconnected with links. The widespread use of social media applications like youtube, flicker, facebook is responsible for evolution of more complex networks. Online social networks like facebook and twitter are very large and dynamic complex networks. Community is a group of nodes that are more densely connected as compared to nodes outside the community. Within the community nodes are more likely to be connected but less likely to be connected with nodes of other communities. Community detection in such networks is one of the most challenging tasks. Community structures provide solutions to many real world problems. In this paper we have discussed about various applications areas of community structures in complex network. Keywords: complex network, community structures, applications of community structures, online social networks, community detection algorithms……. etc. I. INTRODUCTION Network is a collection of entities called nodes or vertices which are connected through edges or links. Computers that are connected, web pages that link to each other, group of friends are basic examples of network. Complex network is a group of interacting entities with some non trivial dynamical behavior [1].
    [Show full text]
  • Social Network Analysis with Content and Graphs
    SOCIAL NETWORK ANALYSIS WITH CONTENT AND GRAPHS Social Network Analysis with Content and Graphs William M. Campbell, Charlie K. Dagli, and Clifford J. Weinstein Social network analysis has undergone a As a consequence of changing economic renaissance with the ubiquity and quantity of » and social realities, the increased availability of large-scale, real-world sociographic data content from social media, web pages, and has ushered in a new era of research and sensors. This content is a rich data source for development in social network analysis. The quantity of constructing and analyzing social networks, but content-based data created every day by traditional and social media, sensors, and mobile devices provides great its enormity and unstructured nature also present opportunities and unique challenges for the automatic multiple challenges. Work at Lincoln Laboratory analysis, prediction, and summarization in the era of what is addressing the problems in constructing has been dubbed “Big Data.” Lincoln Laboratory has been networks from unstructured data, analyzing the investigating approaches for computational social network analysis that focus on three areas: constructing social net- community structure of a network, and inferring works, analyzing the structure and dynamics of a com- information from networks. Graph analytics munity, and developing inferences from social networks. have proven to be valuable tools in solving these Network construction from general, real-world data presents several unexpected challenges owing to the data challenges. Through the use of these tools, domains themselves, e.g., information extraction and pre- Laboratory researchers have achieved promising processing, and to the data structures used for knowledge results on real-world data.
    [Show full text]
  • Networks in Cognitive Science
    1 Networks in Cognitive Science Andrea Baronchelli1,*, Ramon Ferrer-i-Cancho2, Romualdo Pastor-Satorras3, Nick Chater4 and Morten H. Christiansen5,6 1 Laboratory for the Modeling of Biological and Socio-technical Systems, Northeastern University, Boston, MA 02115, USA 2 Complexity & Quantitative Linguistics Lab, TALP Research Center, Departament de Llenguatges i Sistemes Informàtics. Universitat Politècnica de Catalunya, Campus Nord, Edifici Omega, E-08034 Barcelona, Spain 3 Departament de Física i Enginyeria Nuclear, Universitat Politècnica de Catalunya, Campus Nord B4, E-08034 Barcelona, Spain 4Behavioural Science Group, Warwick Business School, University of Warwick, Coventry, CV4 7AL, UK 5 Department of Psychology, Cornell University, Uris Hall, Ithaca, NY 14853, USA 6 Santa Fe Institute, 1399 Hyde Park Road, Santa Fe, NM 87501, USA *Corresponding author: email [email protected] 2 Abstract Networks of interconnected nodes have long played a key role in cognitive science, from artificial neural networks to spreading activation models of semantic memory. Recently, however, a new Network Science has been developed, providing insights into the emergence of global, system-scale properties in contexts as diverse as the Internet, metabolic reactions or collaborations among scientists. Today, the inclusion of network theory into cognitive sciences, and the expansion of complex systems science, promises to significantly change the way in which the organization and dynamics of cognitive and behavioral processes are understood. In this paper, we review recent contributions of network theory at different levels and domains within the cognitive sciences. 3 Humans have more than 1010 neurons and between 1014 and 1015 synapses in their nervous system [1]. Together, neurons and synapses form neural networks, organized into structural and functional sub-networks at many scales [2].
    [Show full text]
  • Multi-Layered Network Embedding
    Multi-Layered Network Embedding Jundong Li∗y Chen Chen∗y Hanghang Tong∗ Huan Liu∗ Abstract tasks. To mitigate this problem, recent studies show Network embedding has gained more attentions in re- that through learning general network embedding rep- cent years. It has been shown that the learned low- resentations, many subsequent learning tasks could be dimensional node vector representations could advance greatly enhanced [17, 34, 39]. The basic idea is to learn a a myriad of graph mining tasks such as node classifi- low-dimensional node vector representation by leverag- cation, community detection, and link prediction. A ing the node proximity manifested in the network topo- vast majority of the existing efforts are overwhelmingly logical structure. devoted to single-layered networks or homogeneous net- The vast majority of existing efforts predomi- works with a single type of nodes and node interactions. nately focus on single-layered or homogeneous net- 1 However, in many real-world applications, a variety of works . However, real-world networks are much more networks could be abstracted and presented in a multi- complicated as cross-domain interactions between dif- layered fashion. Typical multi-layered networks include ferent networks are widely observed, which naturally critical infrastructure systems, collaboration platforms, form a type of multi-layered networks [12, 16, 35]. Crit- social recommender systems, to name a few. Despite the ical infrastructure systems are a typical example of widespread use of multi-layered networks, it remains a multi-layered networks (left part of Figure 1). In this daunting task to learn vector representations of different system, the power stations in the power grid are used types of nodes due to the bewildering combination of to provide electricity to routers in the autonomous sys- both within-layer connections and cross-layer network tem network (AS network) and vehicles in the trans- dependencies.
    [Show full text]
  • An Ecological Approach to Software Supply Chain Risk Management
    130 PROC. OF THE 15th PYTHON IN SCIENCE CONF. (SCIPY 2016) An Ecological Approach to Software Supply Chain Risk Management Sebastian Benthall‡§∗, Travis Pinney‡¶, JC Herz∗∗‡, Kit Plummerk‡ https://youtu.be/6UnuPhTPdnM F Abstract—We approach the problem of software assurance in a novel way With a small number of analytic assumptions about the inspired by an analytic framework used in natural hazard risk mitigation. Exist- propagation of vulnerability and exposure through the software ing approaches to software assurance focus on evaluating individual software dependency network, we have developed a model of ecosystem projects in isolation. We demonstrate a technique that evaluates an entire risk that predicts "hot spots" in need of more investment. In this ecosystem of software projects, taking into account the dependencey structure paper, we demonstrate this model using real software dependency between packages. Our model analytically separates vulnerability and exposure data extracted from PyPI using Ion Channel [IonChannel]. as elements of software risk, then makes minimal assumptions about the prop- agation of these values through a software supply chain. Combined with data collected from package management systems, our model indicates "hot spots" Prior work in the ecosystem of higher expected risk. We demonstrate this model using data collected from the Python Package Index (PyPI). Our results suggest that Zope [Verdon2004] outline the diversity of methods used for risk and Plone related projects carry the highest risk of all PyPI packages because analysis in software design. Their emphasis is on architecture- they are widely used and their core libraries are no longer maintained. level analysis and its iterative role in software development.
    [Show full text]
  • Exponential Random Graph Models An
    UNIVERSITY OF CALIFORNIA LOS ANGELES Network Statistics and Modeling the World Trade Network: Exponential Random Graph Models and Latent Space Models A thesis submitted in partial satisfaction of the requirements for the degree Master of Science in Statistics by Anthony James Howell 2012 © Copyright by Anthony James Howell 2012 i ABSTRACT OF THE THESIS Network Statistics and Modeling the Global Trade Economy: Exponential Random Graph Models and Latent Space Models: Is Geography Dead? by Anthony James Howell Master of Science in Statistics University of California, Los Angeles, 2012 Professor David Rigby, Chair Due to advancements in physics and computer science, networks have becoming increasingly applied to study a diverse set of interactions, including P2P, neural mapping, transportation, migration and global trade. Recent literature on the world trade network relies only on descriptive network statistics, and few attempts are made to statistically analyze the trade network using stochastic models. To fill this gap, I specify several models using international trade data and apply network statistics to determine the likelihood that a trade tie between two countries is established. I also use latent space models to test the ‘geography is dead’ thesis. There are two main findings of the paper. First, the “rich club phenomenon” identified in previous works using descriptive statistics no longer holds true when controlling for homophily and transitivity. Second, results from the latent space model refute the ‘geography is dead’ thesis. ii The thesis of Anthony James Howell is approved. Nicolas Christou Mark Handcock David Rigby, Committee Chair University of California, Los Angeles 2012 iii DEDICATION This work is dedicated to my loving family who has been instrumental in the completion of this thesis through their unconditional love and support.
    [Show full text]
  • Networktoolbox
    NetworkToolbox: Methods and Measures for Brain, Cognitive, and Psychometric Network Analysis in R This manuscript is accepted pending a minor revision to the R Journal. Alexander P. Christensen University of North Carolina at Greensboro Department of Psychology P.O. Box 26170 University of North Carolina at Greensboro Greensboro, NC, 27402-6170, USA E-mail: [email protected] ORCiD: 0000-0002-9798-7037 October 8, 2018 This article introduces the NetworkToolbox package for R. Network analysis offers an intuitive perspective on complex phenomena via models depicted by nodes (variables) and edges (correlations). The ability of net- works to model complexity has made them the standard approach for mod- eling the intricate interactions in the brain. Similarly, networks have become an increasingly attractive model for studying the complexity of psychologi- cal and psychopathological phenomena. NetworkToolbox aims to provide researchers with state-of-the-art methods and measures for estimating and analyzing brain, cognitive, and psychometric networks. In this article, I introduce NetworkToolbox and provide a tutorial for applying some the package’s functions to personality data. Keywords: psychology, network analysis, graph theory, R 1 1 Introduction Open science is ushering in a new era of psychology where multi-site collaborations are common and big data are readily available. Often, in these data, noise is mixed in with relevant information. Thus, researchers are faced with a challenge: deciphering informa- tion from the noise and maintaining the inherent structure of the data while reducing its complexity. Other areas of science have tackled this challenge with the use of network science and graph theory methods.
    [Show full text]
  • Patterns in Syntactic Dependency Networks
    PHYSICAL REVIEW E 69, 051915 (2004) Patterns in syntactic dependency networks Ramon Ferrer i Cancho,1,* Ricard V. Solé,1,2 and Reinhard Köhler3 1ICREA-Complex Systems Lab, Universitat Pompeu Fabra, Dr. Aiguader 80, 08003 Barcelona, Spain 2Santa Fe Institute, 1399 Hyde Park Road, Santa Fe, New Mexico 87501, USA 3Universität Trier, FB2/LDV, D-54268 Trier, Germany (Received 19 June 2003; revised manuscript received 19 September 2003; published 26 May 2004) Many languages are spoken on Earth. Despite their diversity, many robust language universals are known to exist. All languages share syntax, i.e., the ability of combining words for forming sentences. The origin of such traits is an issue of open debate. By using recent developments from the statistical physics of complex networks, we show that different syntactic dependency networks (from Czech, German, and Romanian) share many nontrivial statistical patterns such as the small world phenomenon, scaling in the distribution of degrees, and disassortative mixing. Such previously unreported features of syntax organization are not a trivial conse- quence of the structure of sentences, but an emergent trait at the global scale. DOI: 10.1103/PhysRevE.69.051915 PACS number(s): 87.10.ϩe, 89.75.Ϫk, 89.20.Ϫa I. INTRODUCTION p + p ⑀ 1 2 2 =1− . There is no agreement on the number of languages spoken 2 on Earth, but estimates are in the range from 3000 to 10 000 Knowing p1 =0.70 and p2 =0.17 [16] we get [1]. World languages exhibit a vast array of structural simi- ⑀ larities and differences. Syntax is a trait common to all hu- 2 = 0.56.
    [Show full text]
  • Evaluating Network Analysis and Agent Based Modeling for Investigating the Stability of Commercial Air Carrier Schedules
    Old Dominion University ODU Digital Commons Engineering Management & Systems Engineering Management & Systems Engineering Theses & Dissertations Engineering Spring 2012 Evaluating Network Analysis and Agent Based Modeling for Investigating the Stability of Commercial Air Carrier Schedules Sheila Ruth Conway Old Dominion University Follow this and additional works at: https://digitalcommons.odu.edu/emse_etds Part of the Aerospace Engineering Commons, Systems Engineering Commons, and the Transportation Commons Recommended Citation Conway, Sheila R.. "Evaluating Network Analysis and Agent Based Modeling for Investigating the Stability of Commercial Air Carrier Schedules" (2012). Doctor of Philosophy (PhD), Dissertation, Engineering Management & Systems Engineering, Old Dominion University, DOI: 10.25777/fnr1-7j24 https://digitalcommons.odu.edu/emse_etds/58 This Dissertation is brought to you for free and open access by the Engineering Management & Systems Engineering at ODU Digital Commons. It has been accepted for inclusion in Engineering Management & Systems Engineering Theses & Dissertations by an authorized administrator of ODU Digital Commons. For more information, please contact [email protected]. EVALUATING NETWORK ANALYSIS AND AGENT BASED MODELING FOR INVESTIGATING THE STABILITY OF COMMERCIAL AIR CARRIER SCHEDULES Sheila Ruth Conway B.S. May 1989, Massachusetts Institute of Technology M.S. May 1989, Massachusetts Institute of Technology A Dissertation Submitted to the Faculty of Old Dominion University in Partial Fulfillment of the Requirements for the Degree of DOCTOR OF PHILOSOPHY ENGINEERING MANAGEMENT OLD DOMINION UNIVERSITY May 2012 Approved by: Dr. Charles Keat :or Dr. Resit Unal, Member Dr. Ghaith Rabadi, Member Dr. J, MemberA ABSTRACT EVALUATING NETWORK ANALYSIS AND AGENT BASED MODELING FOR INVESTIGATING THE STABILITY OF COMMERCIAL AIR CARRIER SCHEDULES Sheila R.
    [Show full text]
  • Mining Social Dependencies in Dynamic Interaction Networks
    Mining Social Dependencies in Dynamic Interaction Networks Freddy Chong Tat Chua∗ Hady W. Lauw∗ Ee-Peng Lim∗ Abstract links also allows us to determine the cohesiveness of User-to-user interactions have become ubiquitous in users, which can be used to divide users into smaller Web 2.0. Users exchange emails, post on newsgroups, communities [14, 22, 28]. tag web pages, co-author papers, etc. Through these interactions, users co-produce or co-adopt content items 1.2 Social Dependency Modeling in User Inter- (e.g., words in emails, tags in social bookmarking action Networks User Interaction Network. A sites). We model such dynamic interactions as a user user interaction network consists of interactions that interaction network, which relates users, interactions, produce new content items over time. We consider and content items over time. After some interactions, a general approach of defining an interaction d (e.g., a user may produce content that is more similar to an email exchange, a published paper) as a tuple those produced by other users previously. We term Ad, Wd, τd where Ad, Wd and τd denote the set of this effect social dependency, and we seek to mine users, content items (e.g., words in an email or pa- from such networks the degree to which a user may per), and time point of the interaction respectively. We be socially dependent on another user over time. We represent a set of interactions over a time period as propose a Decay Topic Model to model the evolution of a graph called user interaction network, as shown in a user’s preferences for content items at the topic level, Figure 1.
    [Show full text]
  • A Python Toolkit for Language Networks Construction and Analysis
    LaNCoA: A Python Toolkit for Language Networks Construction and Analysis Domagoj Margan, Ana Mestroviˇ c´ Department of Informatics, University of Rijeka, Radmile Matejciˇ c´ 2, 51000 Rijeka, Croatia Email: fdmargan, [email protected] Abstract—In this paper we describe LaNCoA, Language Net- [17], SNAP [3], Cytoscape [34], NetworkX package [16] for works Construction and Analysis toolkit implemented in Python. Python, igraph package [15] for C, Python and R. All these The toolkit provides various procedures for network construc- tools enable calculating standard global network measures tion from the text: on the word-level (co-occurrence networks, (such as average clustering coefficient, average shortest path syntactic networks, shuffled networks), and on the subword- length, diameter, average degree, degree distribution, density, level (syllable networks, grapheme networks). Furthermore, we modularity, assortativity, etc.) and the local network measures implement functions for the language networks analysis on the global and local level. The toolkit is organized in several modules (different centrality measures: degree, betwenness, closeness, that enable various aspects of language analysis: analysis of global eigenvector, etc.). Some of the tools (for example Gephi, network measures for different co-occurrence window, compari- NewtorkX, iGraph, SNAP) provide network analysis on the son of networks based on original and shuffled texts, comparison meso-scale level with implemented algorithms for community of networks constructed on different language levels, etc. Text detection. Also there are some tools designed and focused manipulation methods, like corpora cleaning, lemmatization and only on one aspect of the network analysis, for example stopwords removal, are also implemented. For the basic network GraphCrunch [19] for graphlet analysis, GRAAL [30] for representation we use available NetworkX functions and methods.
    [Show full text]