A visual analytics approach to compare propagation models in social - - PowerPoint PPT Presentation

a visual analytics approach to compare propagation models
SMART_READER_LITE
LIVE PREVIEW

A visual analytics approach to compare propagation models in social - - PowerPoint PPT Presentation

London, April 11-12 2015 A visual analytics approach to compare propagation models in social networks J. Vallet, H. Kirchner, B. Pinaud, G. Melanon LaBRI, UMR 5800 Inria Bordeaux Univ. Bordeaux We want to... Study propagation models and


slide-1
SLIDE 1

A visual analytics approach to compare propagation models in social networks

  • J. Vallet, H. Kirchner, B. Pinaud, G. Melançon

LaBRI, UMR 5800 Inria Bordeaux

  • Univ. Bordeaux

London, April 11-12 2015

slide-2
SLIDE 2

We want to...

2

  • Study propagation models and social networks
  • Compare the propagation models
  • Use graph rewriting techniques to represent models and run

propagation simulations

  • Perform visual analysis
slide-3
SLIDE 3

Defjnitjons

Described as a graph with

  • a set of nodes
  • called “individuals”
  • a set of edges
  • to represent “relatjons”

A social network:

3

  • W. W. Zachary, An informatjon fmow model for confmict

and fjssion in small groups, Journal of Anthropological Research 33, (1977).

G=(V , E)

E∈V ×V V

slide-4
SLIDE 4

Defjnitjons

Propagatjon in a network – as a social process

  • An individual performs an actjon
  • Her/his neighbours are informed and

choose to perform the same actjon

  • The process repeats itself
  • Decisions can depend on infmuences,

vulnerabilitjes or resistances between neighbours

4

slide-5
SLIDE 5

Probabilistjc cascade model simulatjon Linear threshold model simulatjon

5

slide-6
SLIDE 6

6

Linear threshold model simulatjon Probabilistjc cascade model simulatjon

slide-7
SLIDE 7

7

Linear threshold model simulatjon Probabilistjc cascade model simulatjon

slide-8
SLIDE 8

8

Linear threshold model simulatjon Probabilistjc cascade model simulatjon

slide-9
SLIDE 9

9

Linear threshold model simulatjon Probabilistjc cascade model simulatjon

slide-10
SLIDE 10

10

Linear threshold model simulatjon Probabilistjc cascade model simulatjon

slide-11
SLIDE 11

11

Linear threshold model simulatjon Probabilistjc cascade model simulatjon

slide-12
SLIDE 12

12

Linear threshold model simulatjon Probabilistjc cascade model simulatjon

slide-13
SLIDE 13

13

Linear threshold model simulatjon Probabilistjc cascade model simulatjon

slide-14
SLIDE 14

Defjnitjons

Selected references:

14

  • Threshold models

Bertuzzo et al. (2010), Dodds et al. (2005), Goyal et al. (2012), Granovetuer (1978), Watus (2002)…

  • Cascade models

Chen W. et al. (2011), Gomez-Rodriguez et al. (2010), Payne et al. (2011), Richardson et al. (2002), Wonyeol et al. (2012)...

slide-15
SLIDE 15

Model translatjon and rewrite rules

15

  • Social state (actjvated, infmuent) are encoded as node atuributes
  • The process acts locally, is asynchronous, distributed and follows

some conditjons

  • This is where graph rewritjng comes into play

Propagatjon in a network from a graph theoretjc perspectjve

slide-16
SLIDE 16

Model translatjon and rewrite rules

16

  • Rules as a common paradigm to express the propagatjon models
  • Each propagatjon paradigm (threshold, cascade) has its own ruleset

and a strategy managing their applicatjon

  • Modelling through Strategic Rewritjng [Fernandez et al. (2014)]

Propagatjon in a network as a Graph Rewritjng System

slide-17
SLIDE 17
  • Ports are used as connectjon points
  • Edges connect nodes through ports
  • Each element possess a set of propertjes

Defjnitjon: Port graph with propertjes

[Fernandez et al. (2014)]

17

Model translatjon and rewrite rules

G=(N , P, E)

slide-18
SLIDE 18

Model translatjon and rewrite rules

18

Defjnitjon: Port graph rewrite rule

  • Symbolically writuen as
  • LHS/RHS expressed as port graphs
  • is a special node whose ports

encode rewiring conditjons to perform in rewritjng (through red edges)

L⇒ R ⇒

slide-19
SLIDE 19
  • Start with a set of infmuencers
  • Infmuencers try (according to some

probability) to infmuence their neighbours and recruit them as new infmuencers

  • The process repeats untjl no more

infmuencer can be recruited

Example: Independent cascade model [Kempe et al. (2003)]

19

Model translatjon and rewrite rules

slide-20
SLIDE 20

Model translatjon and rewrite rules

Rule 1: infmuence from a neighbour

20

slide-21
SLIDE 21

Model translatjon and rewrite rules

Rule 1: infmuence from a neighbour

21

Active = true Active = false Visited = ? Marked = false

slide-22
SLIDE 22

Model translatjon and rewrite rules

Rule 1: infmuence from a neighbour

22

Active = true Active = false Visited = ? Active = false Visited = true Active = true Marked = false Marked = true

slide-23
SLIDE 23

Model translatjon and rewrite rules

Rule 1: infmuence from a neighbour

23

Active = true Active = false Visited = ? [Sigma = Y] Active = false Visited = true [Sigma = f(X, Y)] Active = true Marked = false [Probability = X] Marked = true [Probability = X]

slide-24
SLIDE 24

Model translatjon and rewrite rules

24

Active = false Visited = true Active = true

Rule 2: node actjvatjon

slide-25
SLIDE 25
  • Manage the rules' applicatjon order
  • Express control (repeat, if-then-else, while-do, …)
  • Use a located graph with Positjon and Banned subgraphs:

 Positjon represents the subgraph where rewritjng may take place  Banned represents the subgraph where rewritjng is forbidden

Defjnitjon: Strategy

25

Model translatjon and rewrite rules

slide-26
SLIDE 26

26

Model translatjon and rewrite rules

slide-27
SLIDE 27

Model translatjon and rewrite rules

Step 1 Step 2 Step 3

27

slide-28
SLIDE 28

28

Model translatjon and rewrite rules

Step 4 Step 5 Step 6

slide-29
SLIDE 29

Analytjc visualizatjon and model comparison

  • Successive applicatjons of rules
  • Keep track of the previously computed

simulatjons

  • Use the derivatjon tree during

comparatjve analysis

[Pinaud et al. (2012)]

29

slide-30
SLIDE 30

Analytjc visualizatjon and model comparison

30

  • Propagatjon speed: estjmated by the number of actjve nodes at a

given step

  • Acknowledgment speed: estjmated by the number of visited nodes

at a given step

  • Propagatjon effjciency: ratjo of actjvated nodes at step t against

those visited at t-1

Metrics: used to measure the propagatjon evolutjon

slide-31
SLIDE 31

Independent cascade Linear threshold model

31

Number of actjve nodes Number of actjve nodes

Propagatjon speed

Propagatjon step Propagatjon step

slide-32
SLIDE 32

32

slide-33
SLIDE 33

Propagatjon speed

Propagatjon step

33

Independent cascade Linear threshold model

Number of actjve nodes Propagatjon step Propagatjon step

Linear threshold model (reinforced infmuences)

slide-34
SLIDE 34

Acknowledgment speed

34

Independent cascade Linear threshold model

Number of visited nodes

Linear threshold model (reinforced infmuences)

Propagatjon step Propagatjon step Propagatjon step

slide-35
SLIDE 35

To conclude

  • We have used graph rewritjng as a common language to express

propagatjon models

  • Analyze and compare the models precisely by storing the

propagatjon evolutjon

  • Results can be visually investjgated to help enforce infmuence

maximizatjon

  • Several metrics available to perform analysis

35

slide-36
SLIDE 36

Future work

  • Extend to additjonal models
  • Explore other visual encodings for scalability (Matrix views...)
  • Management of tjme-dependent atuributes evolving along the

propagatjon (infmuence exhaustjon, media induced fashion...)

  • Joint use of propagatjon and topological modifjcatjons
  • Applicatjon to difgerent domains (power distributjon, network

security, epidemiology, fjnancial crisis)

36

slide-37
SLIDE 37

References

  • Goyal, A., F. Bonchi, and L. V. Lakshmanan (2010). Learning infmuence probabilitjes in social
  • networks. In 3rd ACM Int. Conf. on Web Search and Data Mining, WSDM ’10, pp. 241–250
  • Kempe, D., J. Kleinberg, and É. Tardos (2003). Maximizing the spread of infmuence through a

social network. In Proc. of the 9th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, KDD ’03, pp. 137–146

  • Fernandez, M., H. Kirchner, and B. Pinaud (2014). Strategic Port Graph Rewritjng : An

Interactjve Modelling and Analysis Framework. In D. Bošnački, S. Edelkamp, A. L. Lafuente, et

  • A. Wijs (Eds.), GRAPHITE 2014, Volume 159 of EPTCS, pp. 15–29
  • Pinaud, B., G. Melançon, and J. Dubois (2012). Porgy : A visual graph rewritjng environment

for complex systems. Computer Graphics Forum 31(3), 1265–1274.

37

slide-38
SLIDE 38

Thanks for your attention.