SlideShare a Scribd company logo
1 of 22
Download to read offline
AOT LAB
                                            DII, UNIPR



    SOCIAL
    NETWORK
    ANALYSIS
    Enrico Franchi (efranchi@ce.unipr.it)



1
Outline

    SNA = Complex Network Analysis on Social Networks


    Notation & Metrics             Degree Distribution
                                   Path Lengths
                                   Transitivity
    Models                          Random Graphs
                                    Small-Worlds
                                    Preferential Attachment


   Models Discussion


    Conclusion

                                                              2
Network                                       Directed Network
G = (V, E) E ⊂ V        2
                                              k out
                                                      = ∑ A ij        k = ∑ A ji
                                                                       in

{(x, x) x ∈V } ∩ E = ∅
                                               i                      i
                                                           j                j

                                              ki = kiin + kiout

                                              Undirected Network
Adjacency Matrix
                                              A symmetric
       ⎧1 if (i,j) ∈E
A ij = ⎨
       ⎩0 otherwise                           ki = ∑ A ji = ∑ A ij
                                                       j          j




                        px = # {i ki = x }
                            1
Degree Distribution
                            n
Average Degree          k =n   −1
                                    ∑k    x
                                    x∈V
                                                                                   3
Measure of Transitivity

                                   ()
                                         −1
                                    ki
Local Clustering Coefficient   Ci = 2         T (i)
                                                  T(i): # distinct triangles with i as vertex




                                  1
Clustering Coefficient         C = ∑ Ci
                                  n i∈V



C=
   ( number of closed paths of length 2 ) = ( number of triangles ) × 3
       ( number of paths of length 2 )     ( number of connected triples )


                                                                                         4
Shortest Path Length and Diameter
     scalar operations
                               AB = A + .⋅ B                The matrix product depends from

 ( A,+,⋅)                     [ AB]ij = ∑ A ik ⋅ Bkj
                                                            the operations of the semi-ring

                                           k

Set of Adjacency Matrices
                                                                 min


    Other matrix products make sense: e.g.,    ( A,+,^ ) or ( A,^,+ )

    We consider:                       (
                   Sk (M) = M + .^ M k ^ .+ M k         )
    Shortest path lengths matrix:   L = ( Sn … S1 ) ( M )

    Diameter:   d = max L           Average shortest path:       = Lij
                         ij
                                                                                         5
Computational Complexity of ASPL:

  All pairs shortest path matrix based (parallelizable):     ( ) α ≈ 3/ 4
                                                           O n   3+α



  All pairs shortest path Bellman-Ford:                    O (n )3



  All pairs shortest path Dijkstra w. Fibonacci Heaps:     O ( n log n + nm )
                                                                 2




Computing the CPL

 x = M q (S)       q#S elements are ≤ than x and (1-q)#S are > than x

 x = Lqδ (S)       q#S(1-δ) elements are ≤ than x and (1-q)#S(1-δ) are > than x



Huber Algorithm

      2 2 (1 − δ )
                        2
                              Let R a random sample of S such that #R=s, then
  s = 2 ln
     q      δ 2              Lqδ(S) = Mq(R) with probability p = 1-ε.
                                                                                  6
2 2 (1 − δ )
                   2

s = 2 ln
   q      δ 2




                       7
Facebook Hugs Degree Distribution


10000000                                                  Nodes: 1322631 Edges: 1555597
                                                          m/n: 1.17             CPL: 11.74
 1000000
                                                          Clustering Coefficient: 0.0527
                                                          Number of Components: 18987
  100000
                                                          Isles: 0

   10000
                                                          Largest Component Size: 1169456


    1000

                                                                  For large k we have
     100
                                                                  statistical fluctuations

      10



       1
           1                      10                              100                        1000


               For small k power-laws do not hold                                                   8
Many networks have
power-law degree distribution.                       pk ∝ k         −γ
                                                                         γ >1
•   Citation networks
                                                     k   r
                                                             =?
•   Biological networks

•   WWW graph

•   Internet graph

•   Social Networks

                             Power-Law: ! gamma=3

              1000000

               100000

                10000

                 1000

                  100

                   10

                     1

                  0.1                                                           9
                         1      10             100           1000
Erdös-Rényi Random Graphs
                                                                       Connectedness
                                                          p            Threshold     log n / n
G(n, p)
                                                   p
G(n, m)                              p
                                           p
                                                              p
                                                                                p
Ensembles of Graphs                            p                       p
When describe values of                            p
properties, we actually the          p                                      Pr(Aij = 1) = p
expected value of the property


d := d = ∑ Pr(G)⋅ d(G) ∝
                          log n
                                                       Pr(G) = p       m
                                                                           (1− p)
                                                                                 () n
                                                                                    2 −m

         G               log k
    ⎛ n⎞
 m =⎜ ⎟ p             k = (n − 1)p       C = k (n − 1)    −1
    ⎝ 2⎠
     ⎛ n − 1⎞ k                                                   k
                                                                   k
pk = ⎜      ⎟ p (1− p)
                       n−1−k
                                 n→∞           pk = e   − k
                                                                                           10
     ⎝k ⎠                                                         k!
p


      Watts-Strogatz Model
      In the modified model, we only add the edges.


   ki = κ + si             ps = e   −κ s   (κ p )   s
                                                          C=
                                                                    3(κ − 2)
                                             s!              4(κ − 1) + 8κ p + 4κ p 2
Edges in
the lattice # added
                           pk = e   −κ s   (κ p )   k−κ
                                                          ≈
                                                             log(npκ )
            shortcuts
                                           ( k − κ )!          κ p
                                                                 2



                                                                                   11
Strogatz-Watts Model - 10000 nodes k = 4
                 1
                                                CPL(p)/CPL(0)
                                                C(p)/C(0)
                0.8
CPL(p)/CPL(0)




                0.6
  C(p)/C(0)




                0.4


                0.2


                 0
                      0   0.2      0.4   p   0.6         0.8          1

                           Short CPL
                                             Large Clustering Coefficient   12
                           Threshold
                                             Threshold
13
Matt Britt ©
Barabási-Albert Model                                      Connectedness              log n
                                                           Threshold                log log n

BARABASI-ALBERT-MODEL(G,M0,STEPS)              Pr(V = x ) =            ∑       Pr(E = e) =
  FOR K FROM 1 TO STEPS                                            e∈N ( x )

    N0 ← NEW-NODE(G)                                               kx   2k x
                                                                 =    =
    ADD-NODE(G,N0)                                                 m ∑ kx
    A ← MAKE-ARRAY()                                                            x
    FOR N IN NODES(G)
                                                      −3
      PUSH(A, N)                             pk ∝ x
      FOR J IN DEGREE(N)
                                               log n
        PUSH(A, N)                        ≈
    FOR J FROM 1 TO M                        log log n
      N ← RANDOM-CHOICE(A)
                                                   −3/4
      ADD-LINK (N0, N)                    C≈n
                                                                         Scale-free entails
                                                                         short CPL
                         Transitivity disappears                                                14
                         with network size                    No analytical proof available
OSN               Refs.        Users Links <k> C CP         d      γ    r
                                                      L
Club Nexus    Adamic et al     2.5 K 10 K 8.2 0.2 4         13    n.a. n.a.
Cyworld        Ahn et al       12 M 191 M 31.6 0.2 3.2      16         -0.1
Cyworld T      Ahn et al        92 K 0.7 M 15.3 0.3 7.2    n.a.   n.a. 0.4
LiveJournal   Mislove et al     5 M 77 M 17 0.3 5.9         20          0.2
Flickr        Mislove et al    1.8 M 22 M 12.2 0.3 5.7      27          0.2
Twitter        Kwak et al      41 M 1700 M n.a. n.a. 4     4.1         n.a.
Orkut         Mislove et al     3 M 223 M 106 0.2 4.3        9    1.5 0.1
Orkut          Ahn et al       100 K 1.5 M 30.2 0.3 3.8    n.a.   3.7 0.3
Youtube       Mislove et al    1.1 M 5 M 4.29 0.1 5.1       21          -0
Facebook       Gjoka et al      1 M n.a. n.a. 0.2 n.a.     n.a.        0.23
FB H           Nazir et al      51 K 116 K n.a. 0.4 n.a.    29         n.a.
FB GL          Nazir et al     277 K 600 K n.a. 0.3 n.a.    45         n.a.
BrightKite    Scellato et al    54 K 213 K 7.88 0.2 4.7    n.a.        n.a.
FourSquare    Scellato et al    58 K 351 K 12 0.3 4.6      n.a.        n.a.
LiveJournal   Scellato et al   993 K 29.6 M 29.9 0.2 4.9   n.a.        n.a.
Twitter        Java et al       87 K 829 K 18.9 0.1 n.a.     6         0.59
Twitter       Scellato et al   409 K 183 M 447 0.2 2.8     n.a.        n.a.
                                                                              15
Static           Deg       C         Rigid

    ER       Yes              Poisson   Low       -

    WS       Yes              Poisson   Ok        Yes

    BA       No               PL γ=3    Fixable   Yes

•   Moreover:

•    Mostly no navigability

•    Uniformity assumption

•    Sometimes too complex for analytic study

•    Few features studied

•    Power-law?

                                                          16
Alternative models for degree distributions
Power-laws are difficult to fit.
When they do, there are often better distributions.


        Power-law with cutoff almost always fits better than plain power-law.

                                   f (x;γ , β ) = x −γ eβ x
        Sometimes the log-normal distribution is more appropriate

                                    1           ⎛ − ( log(x / m))2 ⎞
                  f (x;σ , m) =             exp ⎜                  ⎟
                                xσ (2π )1/2
                                                ⎝       2σ  2
                                                                   ⎠

        Most of the times random and preferential attachment processes concur

                        F(x;r) = 1− (rm)1+r (x + rm)−(1+r )
              r→0                                               r→∞
                                                                                      17
     scale-free                                               negative exponential dist.
Massachussets       1st run: 64/296 arrived, most
                                 Boston   delivered to him by 2 men
Nebraska
                                          2nd run: 24/160 arrived, 2/3
                                          delivered by “Mr. Jacobs”
        Omaha
                                          2 ≤ hops ≤ 10; µ=5.x
      Wichita               6 Degrees
                                          CPL, hubs, ...

    Kansas                                ... and Kleinberg’s Intuition


Milgram’s Experiment
•     Random people from Omaha & Wichita were asked to
      send a postcard to a person in Boston:

•     Write the name on the postcard

•     Forward the message only to people personally known
                                                                          18
      that was more likely to know the target
Biased Preferential Attachment
At each step:

    A new node is added to the network and is assigned to one of the
    sets P, I and L according to a probability distribution h
            +
    e0 ∈       edges are added to the network

     for each edge (u,v) u is chosen with distribution D0 and:

         if u ∈ I, v is a new node and is assigned to P;

         if u ∈ L, v is chosen according to Dγ.

                  ⎧(β + 1)(ku + 1)            u ∈L
           β      ⎪
          D (u) ∝ ⎨ ku + 1                    u ∈I
                  ⎪0                          u ∈P
                  ⎩

          No analytic results available.
                                                                       19
Transitive Linking Model [Davidsen 02]
 Transitive Linking
    I    At each step:
         TL: a random node is chosen, and it introduces two other nodes that
             are linked to it; if the node does not have 2 edges, it introduces
             himself to a random node
        RM: with probability p a node is chosen and removed along its edges
             and replaced with a node with one random edge
    I    When p ⇤ 1 the TL dominates the process:
            I   the degree distribution is a power-law with cutoff
            I   1 C = p(⌅k ⇧ 1), i.e., quite large in practice
    I    For larger values of p the two different process concur to form an
         exponential degree distribution
    I    for p ⇥ 1 the degree distribution is essentially a Poisson
         distribution


  Instead of p it would make sense to have distinct p and r
Bergenti, Franchi, Poggi (Univ. Parma)   Models for Agent-based Simulation of SN   SNAMAS ’11   11 / 19
  parameters for nodes leaving and entering the network

                     Few analytic results available.
                                                                                                          20
[1]	

  Dorogovtsev, S. N. and Mendes, J. F. F. 2003 Evolution of Networks: From Biological Nets
   to the Internet and WWW (Physics). Oxford University Press, USA.
[2]	

  Watts, D. J. 2003 Small Worlds: The Dynamics of Networks between Order and
   Randomness (Princeton Studies in Complexity). Princeton University Press.
[3]	

  Jackson, M. O. 2010 Social and Economic Networks. Princeton University Press.
[4]	

  Newman, M. 2010 Networks: An Introduction. Oxford University Press, USA.
[5]	

  Wasserman, S. and Faust, K. 1994 Social Network Analysis: Methods and Applications
   (Structural Analysis in the Social Sciences). Cambridge University Press.
[6]	

  Scott, J. P. 2000 Social Network Analysis: A Handbook. Sage Publications Ltd.
[7]	

  Kepner, J. and Gilbert, J. 2011 Graph Algorithms in the Language of Linear Algebra
   (Software, Environments, and Tools). Society for Industrial & Applied Mathematics.
[8]	

  Cormen, T. H., Leiserson, C. E., Rivest, R. L., and Stein, C. 2009 Introduction to
   Algorithms. The MIT Press.
[9]	

  Skiena, S. S. 2010 The Algorithm Design Manual. Springer.
[10]	

 Bollobas, B. 1998 Modern Graph Theory. Springer.
[11]	

 Watts, D. J. and Strogatz, S. H. 1998. Collective dynamics of ‘small-world’networks.
   Nature. 393, 6684, 440-442.
[12]	

 Barabási, A. L. and Albert, R. 1999. Emergence of scaling in random networks. Science.
   286, 5439, 509.
[13]	

 Kleinberg, J. 2000. The small-world phenomenon: an algorithm perspective. Proceedings of
   the thirty-second annual ACM symposium on Theory of computing. 163-170.
[14]	

 Milgram, S. 1967. The small world problem. Psychology today. 2, 1, 60-67.

                                                                                           21
Thanks for your kind attention.




Enrico Franchi (efranchi@ce.unipr.it)
AOTLAB, Dipartimento Ingegneria dell’Informazione,
Università di Parma




                                                     22

More Related Content

What's hot

Nelly Litvak – Asymptotic behaviour of ranking algorithms in directed random ...
Nelly Litvak – Asymptotic behaviour of ranking algorithms in directed random ...Nelly Litvak – Asymptotic behaviour of ranking algorithms in directed random ...
Nelly Litvak – Asymptotic behaviour of ranking algorithms in directed random ...Yandex
 
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...MLconf
 
Efficient end-to-end learning for quantizable representations
Efficient end-to-end learning for quantizable representationsEfficient end-to-end learning for quantizable representations
Efficient end-to-end learning for quantizable representationsNAVER Engineering
 
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...Masahiro Suzuki
 
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...MLconf
 
A Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersA Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersIDES Editor
 
Auto encoding-variational-bayes
Auto encoding-variational-bayesAuto encoding-variational-bayes
Auto encoding-variational-bayesmehdi Cherti
 
Information-theoretic clustering with applications
Information-theoretic clustering  with applicationsInformation-theoretic clustering  with applications
Information-theoretic clustering with applicationsFrank Nielsen
 
Introduction to Elliptic Curve Cryptography
Introduction to Elliptic Curve CryptographyIntroduction to Elliptic Curve Cryptography
Introduction to Elliptic Curve CryptographyDavid Evans
 
The world of loss function
The world of loss functionThe world of loss function
The world of loss function홍배 김
 
Reinforcement Learning (Reloaded) - Xavier Giró-i-Nieto - UPC Barcelona 2018
Reinforcement Learning (Reloaded) - Xavier Giró-i-Nieto - UPC Barcelona 2018Reinforcement Learning (Reloaded) - Xavier Giró-i-Nieto - UPC Barcelona 2018
Reinforcement Learning (Reloaded) - Xavier Giró-i-Nieto - UPC Barcelona 2018Universitat Politècnica de Catalunya
 
Word Embeddings (D2L4 Deep Learning for Speech and Language UPC 2017)
Word Embeddings (D2L4 Deep Learning for Speech and Language UPC 2017)Word Embeddings (D2L4 Deep Learning for Speech and Language UPC 2017)
Word Embeddings (D2L4 Deep Learning for Speech and Language UPC 2017)Universitat Politècnica de Catalunya
 
Auto-encoding variational bayes
Auto-encoding variational bayesAuto-encoding variational bayes
Auto-encoding variational bayesKyuri Kim
 
Optimal interval clustering: Application to Bregman clustering and statistica...
Optimal interval clustering: Application to Bregman clustering and statistica...Optimal interval clustering: Application to Bregman clustering and statistica...
Optimal interval clustering: Application to Bregman clustering and statistica...Frank Nielsen
 
Digital Signal Processing[ECEG-3171]-Ch1_L02
Digital Signal Processing[ECEG-3171]-Ch1_L02Digital Signal Processing[ECEG-3171]-Ch1_L02
Digital Signal Processing[ECEG-3171]-Ch1_L02Rediet Moges
 
Show, Attend and Tell: Neural Image Caption Generation with Visual Attention
Show, Attend and Tell: Neural Image Caption Generation with Visual AttentionShow, Attend and Tell: Neural Image Caption Generation with Visual Attention
Show, Attend and Tell: Neural Image Caption Generation with Visual AttentionEun Ji Lee
 
CVPR2010: Advanced ITinCVPR in a Nutshell: part 4: additional slides
CVPR2010: Advanced ITinCVPR in a Nutshell: part 4: additional slidesCVPR2010: Advanced ITinCVPR in a Nutshell: part 4: additional slides
CVPR2010: Advanced ITinCVPR in a Nutshell: part 4: additional slideszukun
 

What's hot (20)

Nelly Litvak – Asymptotic behaviour of ranking algorithms in directed random ...
Nelly Litvak – Asymptotic behaviour of ranking algorithms in directed random ...Nelly Litvak – Asymptotic behaviour of ranking algorithms in directed random ...
Nelly Litvak – Asymptotic behaviour of ranking algorithms in directed random ...
 
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...
 
Codes and Isogenies
Codes and IsogeniesCodes and Isogenies
Codes and Isogenies
 
Efficient end-to-end learning for quantizable representations
Efficient end-to-end learning for quantizable representationsEfficient end-to-end learning for quantizable representations
Efficient end-to-end learning for quantizable representations
 
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
 
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...
Animashree Anandkumar, Electrical Engineering and CS Dept, UC Irvine at MLcon...
 
Iclr2016 vaeまとめ
Iclr2016 vaeまとめIclr2016 vaeまとめ
Iclr2016 vaeまとめ
 
YSC 2013
YSC 2013YSC 2013
YSC 2013
 
A Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersA Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR Filters
 
Auto encoding-variational-bayes
Auto encoding-variational-bayesAuto encoding-variational-bayes
Auto encoding-variational-bayes
 
Information-theoretic clustering with applications
Information-theoretic clustering  with applicationsInformation-theoretic clustering  with applications
Information-theoretic clustering with applications
 
Introduction to Elliptic Curve Cryptography
Introduction to Elliptic Curve CryptographyIntroduction to Elliptic Curve Cryptography
Introduction to Elliptic Curve Cryptography
 
The world of loss function
The world of loss functionThe world of loss function
The world of loss function
 
Reinforcement Learning (Reloaded) - Xavier Giró-i-Nieto - UPC Barcelona 2018
Reinforcement Learning (Reloaded) - Xavier Giró-i-Nieto - UPC Barcelona 2018Reinforcement Learning (Reloaded) - Xavier Giró-i-Nieto - UPC Barcelona 2018
Reinforcement Learning (Reloaded) - Xavier Giró-i-Nieto - UPC Barcelona 2018
 
Word Embeddings (D2L4 Deep Learning for Speech and Language UPC 2017)
Word Embeddings (D2L4 Deep Learning for Speech and Language UPC 2017)Word Embeddings (D2L4 Deep Learning for Speech and Language UPC 2017)
Word Embeddings (D2L4 Deep Learning for Speech and Language UPC 2017)
 
Auto-encoding variational bayes
Auto-encoding variational bayesAuto-encoding variational bayes
Auto-encoding variational bayes
 
Optimal interval clustering: Application to Bregman clustering and statistica...
Optimal interval clustering: Application to Bregman clustering and statistica...Optimal interval clustering: Application to Bregman clustering and statistica...
Optimal interval clustering: Application to Bregman clustering and statistica...
 
Digital Signal Processing[ECEG-3171]-Ch1_L02
Digital Signal Processing[ECEG-3171]-Ch1_L02Digital Signal Processing[ECEG-3171]-Ch1_L02
Digital Signal Processing[ECEG-3171]-Ch1_L02
 
Show, Attend and Tell: Neural Image Caption Generation with Visual Attention
Show, Attend and Tell: Neural Image Caption Generation with Visual AttentionShow, Attend and Tell: Neural Image Caption Generation with Visual Attention
Show, Attend and Tell: Neural Image Caption Generation with Visual Attention
 
CVPR2010: Advanced ITinCVPR in a Nutshell: part 4: additional slides
CVPR2010: Advanced ITinCVPR in a Nutshell: part 4: additional slidesCVPR2010: Advanced ITinCVPR in a Nutshell: part 4: additional slides
CVPR2010: Advanced ITinCVPR in a Nutshell: part 4: additional slides
 

Similar to Social Network Analysis

Numerical Linear Algebra for Data and Link Analysis.
Numerical Linear Algebra for Data and Link Analysis.Numerical Linear Algebra for Data and Link Analysis.
Numerical Linear Algebra for Data and Link Analysis.Leonid Zhukov
 
Continuum Modeling and Control of Large Nonuniform Networks
Continuum Modeling and Control of Large Nonuniform NetworksContinuum Modeling and Control of Large Nonuniform Networks
Continuum Modeling and Control of Large Nonuniform NetworksYang Zhang
 
Thesis : &quot;IBBET : In Band Bandwidth Estimation for LAN&quot;
Thesis : &quot;IBBET : In Band Bandwidth Estimation for LAN&quot;Thesis : &quot;IBBET : In Band Bandwidth Estimation for LAN&quot;
Thesis : &quot;IBBET : In Band Bandwidth Estimation for LAN&quot;Vishalkumarec
 
MVPA with SpaceNet: sparse structured priors
MVPA with SpaceNet: sparse structured priorsMVPA with SpaceNet: sparse structured priors
MVPA with SpaceNet: sparse structured priorsElvis DOHMATOB
 
Topology Matters in Communication
Topology Matters in CommunicationTopology Matters in Communication
Topology Matters in Communicationcseiitgn
 
Pres110811
Pres110811Pres110811
Pres110811shotlub
 
Csr2011 june14 14_00_agrawal
Csr2011 june14 14_00_agrawalCsr2011 june14 14_00_agrawal
Csr2011 june14 14_00_agrawalCSR2011
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Pydata Katya Vasilaky
Pydata Katya VasilakyPydata Katya Vasilaky
Pydata Katya Vasilakyknv4
 
Quantum assignment
Quantum assignmentQuantum assignment
Quantum assignmentViraj Dande
 
New Mathematical Tools for the Financial Sector
New Mathematical Tools for the Financial SectorNew Mathematical Tools for the Financial Sector
New Mathematical Tools for the Financial SectorSSA KPI
 
NIPS2010: optimization algorithms in machine learning
NIPS2010: optimization algorithms in machine learningNIPS2010: optimization algorithms in machine learning
NIPS2010: optimization algorithms in machine learningzukun
 
Fast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s methodFast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s methodIAEME Publication
 
Bayesian inference on mixtures
Bayesian inference on mixturesBayesian inference on mixtures
Bayesian inference on mixturesChristian Robert
 

Similar to Social Network Analysis (20)

Cdc18 dg lee
Cdc18 dg leeCdc18 dg lee
Cdc18 dg lee
 
Numerical Linear Algebra for Data and Link Analysis.
Numerical Linear Algebra for Data and Link Analysis.Numerical Linear Algebra for Data and Link Analysis.
Numerical Linear Algebra for Data and Link Analysis.
 
Continuum Modeling and Control of Large Nonuniform Networks
Continuum Modeling and Control of Large Nonuniform NetworksContinuum Modeling and Control of Large Nonuniform Networks
Continuum Modeling and Control of Large Nonuniform Networks
 
Thesis : &quot;IBBET : In Band Bandwidth Estimation for LAN&quot;
Thesis : &quot;IBBET : In Band Bandwidth Estimation for LAN&quot;Thesis : &quot;IBBET : In Band Bandwidth Estimation for LAN&quot;
Thesis : &quot;IBBET : In Band Bandwidth Estimation for LAN&quot;
 
Networking Assignment Help
Networking Assignment HelpNetworking Assignment Help
Networking Assignment Help
 
TunUp final presentation
TunUp final presentationTunUp final presentation
TunUp final presentation
 
MVPA with SpaceNet: sparse structured priors
MVPA with SpaceNet: sparse structured priorsMVPA with SpaceNet: sparse structured priors
MVPA with SpaceNet: sparse structured priors
 
Topology Matters in Communication
Topology Matters in CommunicationTopology Matters in Communication
Topology Matters in Communication
 
Pres110811
Pres110811Pres110811
Pres110811
 
Csr2011 june14 14_00_agrawal
Csr2011 june14 14_00_agrawalCsr2011 june14 14_00_agrawal
Csr2011 june14 14_00_agrawal
 
Mgm
MgmMgm
Mgm
 
Statistical Physics Assignment Help
Statistical Physics Assignment HelpStatistical Physics Assignment Help
Statistical Physics Assignment Help
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Pydata Katya Vasilaky
Pydata Katya VasilakyPydata Katya Vasilaky
Pydata Katya Vasilaky
 
Quantum assignment
Quantum assignmentQuantum assignment
Quantum assignment
 
kactl.pdf
kactl.pdfkactl.pdf
kactl.pdf
 
New Mathematical Tools for the Financial Sector
New Mathematical Tools for the Financial SectorNew Mathematical Tools for the Financial Sector
New Mathematical Tools for the Financial Sector
 
NIPS2010: optimization algorithms in machine learning
NIPS2010: optimization algorithms in machine learningNIPS2010: optimization algorithms in machine learning
NIPS2010: optimization algorithms in machine learning
 
Fast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s methodFast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s method
 
Bayesian inference on mixtures
Bayesian inference on mixturesBayesian inference on mixtures
Bayesian inference on mixtures
 

More from rik0

Python intro
Python introPython intro
Python introrik0
 
Game theory
Game theoryGame theory
Game theoryrik0
 
Social choice
Social choiceSocial choice
Social choicerik0
 
Clojure Interoperability
Clojure InteroperabilityClojure Interoperability
Clojure Interoperabilityrik0
 
Pydiomatic
PydiomaticPydiomatic
Pydiomaticrik0
 
Pycrashcourse4.0 pdfjam
Pycrashcourse4.0 pdfjamPycrashcourse4.0 pdfjam
Pycrashcourse4.0 pdfjamrik0
 
Twcrashcourse
TwcrashcourseTwcrashcourse
Twcrashcourserik0
 
Pyimproved again
Pyimproved againPyimproved again
Pyimproved againrik0
 
Pycrashcourse3.1
Pycrashcourse3.1Pycrashcourse3.1
Pycrashcourse3.1rik0
 
Pycrashcourse3.0
Pycrashcourse3.0Pycrashcourse3.0
Pycrashcourse3.0rik0
 
Pycrashcourse2.0
Pycrashcourse2.0Pycrashcourse2.0
Pycrashcourse2.0rik0
 
Pycrashcourse
PycrashcoursePycrashcourse
Pycrashcourserik0
 
Pyimproved
PyimprovedPyimproved
Pyimprovedrik0
 

More from rik0 (13)

Python intro
Python introPython intro
Python intro
 
Game theory
Game theoryGame theory
Game theory
 
Social choice
Social choiceSocial choice
Social choice
 
Clojure Interoperability
Clojure InteroperabilityClojure Interoperability
Clojure Interoperability
 
Pydiomatic
PydiomaticPydiomatic
Pydiomatic
 
Pycrashcourse4.0 pdfjam
Pycrashcourse4.0 pdfjamPycrashcourse4.0 pdfjam
Pycrashcourse4.0 pdfjam
 
Twcrashcourse
TwcrashcourseTwcrashcourse
Twcrashcourse
 
Pyimproved again
Pyimproved againPyimproved again
Pyimproved again
 
Pycrashcourse3.1
Pycrashcourse3.1Pycrashcourse3.1
Pycrashcourse3.1
 
Pycrashcourse3.0
Pycrashcourse3.0Pycrashcourse3.0
Pycrashcourse3.0
 
Pycrashcourse2.0
Pycrashcourse2.0Pycrashcourse2.0
Pycrashcourse2.0
 
Pycrashcourse
PycrashcoursePycrashcourse
Pycrashcourse
 
Pyimproved
PyimprovedPyimproved
Pyimproved
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Social Network Analysis

  • 1. AOT LAB DII, UNIPR SOCIAL NETWORK ANALYSIS Enrico Franchi (efranchi@ce.unipr.it) 1
  • 2. Outline SNA = Complex Network Analysis on Social Networks Notation & Metrics Degree Distribution Path Lengths Transitivity Models Random Graphs Small-Worlds Preferential Attachment Models Discussion Conclusion 2
  • 3. Network Directed Network G = (V, E) E ⊂ V 2 k out = ∑ A ij k = ∑ A ji in {(x, x) x ∈V } ∩ E = ∅ i i j j ki = kiin + kiout Undirected Network Adjacency Matrix A symmetric ⎧1 if (i,j) ∈E A ij = ⎨ ⎩0 otherwise ki = ∑ A ji = ∑ A ij j j px = # {i ki = x } 1 Degree Distribution n Average Degree k =n −1 ∑k x x∈V 3
  • 4. Measure of Transitivity () −1 ki Local Clustering Coefficient Ci = 2 T (i) T(i): # distinct triangles with i as vertex 1 Clustering Coefficient C = ∑ Ci n i∈V C= ( number of closed paths of length 2 ) = ( number of triangles ) × 3 ( number of paths of length 2 ) ( number of connected triples ) 4
  • 5. Shortest Path Length and Diameter scalar operations AB = A + .⋅ B The matrix product depends from ( A,+,⋅) [ AB]ij = ∑ A ik ⋅ Bkj the operations of the semi-ring k Set of Adjacency Matrices min Other matrix products make sense: e.g., ( A,+,^ ) or ( A,^,+ ) We consider: ( Sk (M) = M + .^ M k ^ .+ M k ) Shortest path lengths matrix: L = ( Sn … S1 ) ( M ) Diameter: d = max L Average shortest path:  = Lij ij 5
  • 6. Computational Complexity of ASPL: All pairs shortest path matrix based (parallelizable): ( ) α ≈ 3/ 4 O n 3+α All pairs shortest path Bellman-Ford: O (n )3 All pairs shortest path Dijkstra w. Fibonacci Heaps: O ( n log n + nm ) 2 Computing the CPL x = M q (S) q#S elements are ≤ than x and (1-q)#S are > than x x = Lqδ (S) q#S(1-δ) elements are ≤ than x and (1-q)#S(1-δ) are > than x Huber Algorithm 2 2 (1 − δ ) 2 Let R a random sample of S such that #R=s, then s = 2 ln q  δ 2 Lqδ(S) = Mq(R) with probability p = 1-ε. 6
  • 7. 2 2 (1 − δ ) 2 s = 2 ln q  δ 2 7
  • 8. Facebook Hugs Degree Distribution 10000000 Nodes: 1322631 Edges: 1555597 m/n: 1.17 CPL: 11.74 1000000 Clustering Coefficient: 0.0527 Number of Components: 18987 100000 Isles: 0 10000 Largest Component Size: 1169456 1000 For large k we have 100 statistical fluctuations 10 1 1 10 100 1000 For small k power-laws do not hold 8
  • 9. Many networks have power-law degree distribution. pk ∝ k −γ γ >1 • Citation networks k r =? • Biological networks • WWW graph • Internet graph • Social Networks Power-Law: ! gamma=3 1000000 100000 10000 1000 100 10 1 0.1 9 1 10 100 1000
  • 10. Erdös-Rényi Random Graphs Connectedness p Threshold log n / n G(n, p) p G(n, m) p p p p Ensembles of Graphs p p When describe values of p properties, we actually the p Pr(Aij = 1) = p expected value of the property d := d = ∑ Pr(G)⋅ d(G) ∝ log n Pr(G) = p m (1− p) () n 2 −m G log k ⎛ n⎞ m =⎜ ⎟ p k = (n − 1)p C = k (n − 1) −1 ⎝ 2⎠ ⎛ n − 1⎞ k k k pk = ⎜ ⎟ p (1− p) n−1−k n→∞ pk = e − k 10 ⎝k ⎠ k!
  • 11. p Watts-Strogatz Model In the modified model, we only add the edges. ki = κ + si ps = e −κ s (κ p ) s C= 3(κ − 2) s! 4(κ − 1) + 8κ p + 4κ p 2 Edges in the lattice # added pk = e −κ s (κ p ) k−κ ≈ log(npκ ) shortcuts ( k − κ )! κ p 2 11
  • 12. Strogatz-Watts Model - 10000 nodes k = 4 1 CPL(p)/CPL(0) C(p)/C(0) 0.8 CPL(p)/CPL(0) 0.6 C(p)/C(0) 0.4 0.2 0 0 0.2 0.4 p 0.6 0.8 1 Short CPL Large Clustering Coefficient 12 Threshold Threshold
  • 14. Barabási-Albert Model Connectedness log n Threshold log log n BARABASI-ALBERT-MODEL(G,M0,STEPS) Pr(V = x ) = ∑ Pr(E = e) = FOR K FROM 1 TO STEPS e∈N ( x ) N0 ← NEW-NODE(G) kx 2k x = = ADD-NODE(G,N0) m ∑ kx A ← MAKE-ARRAY() x FOR N IN NODES(G) −3 PUSH(A, N) pk ∝ x FOR J IN DEGREE(N) log n PUSH(A, N) ≈ FOR J FROM 1 TO M log log n N ← RANDOM-CHOICE(A) −3/4 ADD-LINK (N0, N) C≈n Scale-free entails short CPL Transitivity disappears 14 with network size No analytical proof available
  • 15. OSN Refs. Users Links <k> C CP d γ r L Club Nexus Adamic et al 2.5 K 10 K 8.2 0.2 4 13 n.a. n.a. Cyworld Ahn et al 12 M 191 M 31.6 0.2 3.2 16 -0.1 Cyworld T Ahn et al 92 K 0.7 M 15.3 0.3 7.2 n.a. n.a. 0.4 LiveJournal Mislove et al 5 M 77 M 17 0.3 5.9 20 0.2 Flickr Mislove et al 1.8 M 22 M 12.2 0.3 5.7 27 0.2 Twitter Kwak et al 41 M 1700 M n.a. n.a. 4 4.1 n.a. Orkut Mislove et al 3 M 223 M 106 0.2 4.3 9 1.5 0.1 Orkut Ahn et al 100 K 1.5 M 30.2 0.3 3.8 n.a. 3.7 0.3 Youtube Mislove et al 1.1 M 5 M 4.29 0.1 5.1 21 -0 Facebook Gjoka et al 1 M n.a. n.a. 0.2 n.a. n.a. 0.23 FB H Nazir et al 51 K 116 K n.a. 0.4 n.a. 29 n.a. FB GL Nazir et al 277 K 600 K n.a. 0.3 n.a. 45 n.a. BrightKite Scellato et al 54 K 213 K 7.88 0.2 4.7 n.a. n.a. FourSquare Scellato et al 58 K 351 K 12 0.3 4.6 n.a. n.a. LiveJournal Scellato et al 993 K 29.6 M 29.9 0.2 4.9 n.a. n.a. Twitter Java et al 87 K 829 K 18.9 0.1 n.a. 6 0.59 Twitter Scellato et al 409 K 183 M 447 0.2 2.8 n.a. n.a. 15
  • 16. Static Deg C Rigid ER Yes Poisson Low - WS Yes Poisson Ok Yes BA No PL γ=3 Fixable Yes • Moreover: • Mostly no navigability • Uniformity assumption • Sometimes too complex for analytic study • Few features studied • Power-law? 16
  • 17. Alternative models for degree distributions Power-laws are difficult to fit. When they do, there are often better distributions. Power-law with cutoff almost always fits better than plain power-law. f (x;γ , β ) = x −γ eβ x Sometimes the log-normal distribution is more appropriate 1 ⎛ − ( log(x / m))2 ⎞ f (x;σ , m) = exp ⎜ ⎟ xσ (2π )1/2 ⎝ 2σ 2 ⎠ Most of the times random and preferential attachment processes concur F(x;r) = 1− (rm)1+r (x + rm)−(1+r ) r→0 r→∞ 17 scale-free negative exponential dist.
  • 18. Massachussets 1st run: 64/296 arrived, most Boston delivered to him by 2 men Nebraska 2nd run: 24/160 arrived, 2/3 delivered by “Mr. Jacobs” Omaha 2 ≤ hops ≤ 10; µ=5.x Wichita 6 Degrees CPL, hubs, ... Kansas ... and Kleinberg’s Intuition Milgram’s Experiment • Random people from Omaha & Wichita were asked to send a postcard to a person in Boston: • Write the name on the postcard • Forward the message only to people personally known 18 that was more likely to know the target
  • 19. Biased Preferential Attachment At each step: A new node is added to the network and is assigned to one of the sets P, I and L according to a probability distribution h + e0 ∈ edges are added to the network for each edge (u,v) u is chosen with distribution D0 and: if u ∈ I, v is a new node and is assigned to P; if u ∈ L, v is chosen according to Dγ. ⎧(β + 1)(ku + 1) u ∈L β ⎪ D (u) ∝ ⎨ ku + 1 u ∈I ⎪0 u ∈P ⎩ No analytic results available. 19
  • 20. Transitive Linking Model [Davidsen 02] Transitive Linking I At each step: TL: a random node is chosen, and it introduces two other nodes that are linked to it; if the node does not have 2 edges, it introduces himself to a random node RM: with probability p a node is chosen and removed along its edges and replaced with a node with one random edge I When p ⇤ 1 the TL dominates the process: I the degree distribution is a power-law with cutoff I 1 C = p(⌅k ⇧ 1), i.e., quite large in practice I For larger values of p the two different process concur to form an exponential degree distribution I for p ⇥ 1 the degree distribution is essentially a Poisson distribution Instead of p it would make sense to have distinct p and r Bergenti, Franchi, Poggi (Univ. Parma) Models for Agent-based Simulation of SN SNAMAS ’11 11 / 19 parameters for nodes leaving and entering the network Few analytic results available. 20
  • 21. [1] Dorogovtsev, S. N. and Mendes, J. F. F. 2003 Evolution of Networks: From Biological Nets to the Internet and WWW (Physics). Oxford University Press, USA. [2] Watts, D. J. 2003 Small Worlds: The Dynamics of Networks between Order and Randomness (Princeton Studies in Complexity). Princeton University Press. [3] Jackson, M. O. 2010 Social and Economic Networks. Princeton University Press. [4] Newman, M. 2010 Networks: An Introduction. Oxford University Press, USA. [5] Wasserman, S. and Faust, K. 1994 Social Network Analysis: Methods and Applications (Structural Analysis in the Social Sciences). Cambridge University Press. [6] Scott, J. P. 2000 Social Network Analysis: A Handbook. Sage Publications Ltd. [7] Kepner, J. and Gilbert, J. 2011 Graph Algorithms in the Language of Linear Algebra (Software, Environments, and Tools). Society for Industrial & Applied Mathematics. [8] Cormen, T. H., Leiserson, C. E., Rivest, R. L., and Stein, C. 2009 Introduction to Algorithms. The MIT Press. [9] Skiena, S. S. 2010 The Algorithm Design Manual. Springer. [10] Bollobas, B. 1998 Modern Graph Theory. Springer. [11] Watts, D. J. and Strogatz, S. H. 1998. Collective dynamics of ‘small-world’networks. Nature. 393, 6684, 440-442. [12] Barabási, A. L. and Albert, R. 1999. Emergence of scaling in random networks. Science. 286, 5439, 509. [13] Kleinberg, J. 2000. The small-world phenomenon: an algorithm perspective. Proceedings of the thirty-second annual ACM symposium on Theory of computing. 163-170. [14] Milgram, S. 1967. The small world problem. Psychology today. 2, 1, 60-67. 21
  • 22. Thanks for your kind attention. Enrico Franchi (efranchi@ce.unipr.it) AOTLAB, Dipartimento Ingegneria dell’Informazione, Università di Parma 22