a visual analytics approach to compare propagation models
play

A visual analytics approach to compare propagation models in social - PowerPoint PPT Presentation

London, April 11-12 2015 A visual analytics approach to compare propagation models in social networks J. Vallet, H. Kirchner, B. Pinaud, G. Melanon LaBRI, UMR 5800 Inria Bordeaux Univ. Bordeaux We want to... Study propagation models and


  1. London, April 11-12 2015 A visual analytics approach to compare propagation models in social networks J. Vallet, H. Kirchner, B. Pinaud, G. Melançon LaBRI, UMR 5800 Inria Bordeaux Univ. Bordeaux

  2. We want to... ● Study propagation models and social networks • Compare the propagation models • Use graph rewriting techniques to represent models and run propagation simulations • Perform visual analysis 2

  3. Defjnitjons A social network: G =( V , E ) Described as a graph with • a set of nodes V  called “individuals” • a set of edges E ∈ V × V  to represent “relatjons” W. W. Zachary , An informatjon fmow model for confmict 3 and fjssion in small groups, Journal of Anthropological Research 33, (1977).

  4. Defjnitjons Propagatjon in a network – as a social process • An individual performs an actjon • Her/his neighbours are informed and choose to perform the same actjon • The process repeats itself • Decisions can depend on infmuences, vulnerabilitjes or resistances between neighbours 4

  5. Probabilistjc cascade model simulatjon Linear threshold model simulatjon 5

  6. Probabilistjc cascade model simulatjon Linear threshold model simulatjon 6

  7. Probabilistjc cascade model simulatjon Linear threshold model simulatjon 7

  8. Probabilistjc cascade model simulatjon Linear threshold model simulatjon 8

  9. Probabilistjc cascade model simulatjon Linear threshold model simulatjon 9

  10. Probabilistjc cascade model simulatjon Linear threshold model simulatjon 10

  11. Probabilistjc cascade model simulatjon Linear threshold model simulatjon 11

  12. Probabilistjc cascade model simulatjon Linear threshold model simulatjon 12

  13. Probabilistjc cascade model simulatjon Linear threshold model simulatjon 13

  14. Defjnitjons Selected references: • Threshold models Bertuzzo et al. (2010) , Dodds et al. (2005), Goyal et al. (2012), Granovetuer (1978), Watus (2002)… • Cascade models Chen W. et al. (2011), Gomez-Rodriguez et al. (2010), Payne et al. (2011), Richardson et al. (2002), Wonyeol et al. (2012)... 14

  15. Model translatjon and rewrite rules Propagatjon in a network from a graph theoretjc perspectjve • Social state (actjvated, infmuent) are encoded as node atuributes • The process acts locally, is asynchronous, distributed and follows some conditjons • This is where graph rewritjng comes into play 15

  16. Model translatjon and rewrite rules Propagatjon in a network as a Graph Rewritjng System • Rules as a common paradigm to express the propagatjon models • Each propagatjon paradigm (threshold, cascade) has its own ruleset and a strategy managing their applicatjon • Modelling through Strategic Rewritjng [Fernandez et al. (2014)] 16

  17. Model translatjon and rewrite rules Defjnitjon: Port graph with propertjes [Fernandez et al. (2014)] ● G =( N , P, E ) ● Ports are used as connectjon points ● Edges connect nodes through ports ● Each element possess a set of propertjes 17

  18. Model translatjon and rewrite rules Defjnitjon: Port graph rewrite rule ● Symbolically writuen as L ⇒ R ● LHS/RHS expressed as port graphs ● is a special node whose ports ⇒ encode rewiring conditjons to perform in rewritjng (through red edges) 18

  19. Model translatjon and rewrite rules Example: Independent cascade model [Kempe et al. (2003)] • Start with a set of infmuencers • Infmuencers try (according to some probability) to infmuence their neighbours and recruit them as new infmuencers • The process repeats untjl no more infmuencer can be recruited 19

  20. Model translatjon and rewrite rules Rule 1: infmuence from a neighbour 20

  21. Model translatjon and rewrite rules Active = true Marked = false Active = false Visited = ? Rule 1: infmuence from a neighbour 21

  22. Model translatjon and rewrite rules Active = true Active = true Marked = false Marked = true Active = false Active = false Visited = ? Visited = true Rule 1: infmuence from a neighbour 22

  23. Model translatjon and rewrite rules Active = true Active = true Marked = false Marked = true [Probability = X] [Probability = X] Active = false Active = false Visited = true Visited = ? [Sigma = f(X, Y)] [Sigma = Y] Rule 1: infmuence from a neighbour 23

  24. Model translatjon and rewrite rules Active = false Active = true Visited = true Rule 2: node actjvatjon 24

  25. Model translatjon and rewrite rules Defjnitjon: Strategy • Manage the rules' applicatjon order • Express control ( repeat, if-then-else, while-do, … ) • Use a located graph with P ositjon and B anned subgraphs:  Positjon represents the subgraph where rewritjng may take place  Banned represents the subgraph where rewritjng is forbidden 25

  26. Model translatjon and rewrite rules 26

  27. Model translatjon and rewrite rules Step 1 Step 2 Step 3 27

  28. Model translatjon and rewrite rules Step 4 Step 5 Step 6 28

  29. Analytjc visualizatjon and model comparison • Successive applicatjons of rules • Keep track of the previously computed simulatjons • Use the derivatjon tree during comparatjve analysis [Pinaud et al. (2012)] 29

  30. Analytjc visualizatjon and model comparison Metrics: used to measure the propagatjon evolutjon • Propagatjon speed : estjmated by the number of actjve nodes at a given step • Acknowledgment speed : estjmated by the number of visited nodes at a given step • Propagatjon effjciency : ratjo of actjvated nodes at step t against those visited at t-1 30

  31. Propagatjon speed Number of actjve nodes Number of actjve nodes Propagatjon step Propagatjon step 31 Linear threshold model Independent cascade

  32. 32

  33. Propagatjon speed Number of actjve nodes Propagatjon step Propagatjon step Propagatjon step Independent cascade Linear threshold model Linear threshold model (reinforced infmuences) 33

  34. Acknowledgment speed Number of visited nodes Propagatjon step Propagatjon step Propagatjon step Independent cascade Linear threshold model Linear threshold model (reinforced infmuences) 34

  35. To conclude • We have used graph rewritjng as a common language to express propagatjon models • Analyze and compare the models precisely by storing the propagatjon evolutjon • Results can be visually investjgated to help enforce infmuence maximizatjon • Several metrics available to perform analysis 35

  36. Future work • Extend to additjonal models • Explore other visual encodings for scalability (Matrix views...) • Management of tjme-dependent atuributes evolving along the propagatjon (infmuence exhaustjon, media induced fashion...) • Joint use of propagatjon and topological modifjcatjons • Applicatjon to difgerent domains (power distributjon, network security, epidemiology, fjnancial crisis) 36

  37. References • Goyal, A., F. Bonchi, and L. V. Lakshmanan (2010). Learning infmuence probabilitjes in social networks. In 3 rd ACM Int. Conf. on Web Search and Data Mining, WSDM ’10, pp. 241–250 • Kempe, D., J. Kleinberg, and É. Tardos (2003). Maximizing the spread of infmuence through a social network. In Proc. of the 9 th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, KDD ’03, pp. 137–146 • Fernandez, M., H. Kirchner, and B. Pinaud (2014). Strategic Port Graph Rewritjng : An Interactjve Modelling and Analysis Framework. In D. Bošnački, S. Edelkamp, A. L. Lafuente, et A. Wijs (Eds.), GRAPHITE 2014, Volume 159 of EPTCS, pp. 15–29 • Pinaud, B., G. Melançon, and J. Dubois (2012). Porgy : A visual graph rewritjng environment for complex systems. Computer Graphics Forum 31(3), 1265–1274. 37

  38. Thanks for your attention.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend