existence emergence of navigability in social networks
play

Existence & Emergence of Navigability in Social Networks - PowerPoint PPT Presentation

Existence & Emergence of Navigability in Social Networks Emmanuelle Lebhar (CNRS & CMM-U. de Chile) 1 1- Social networks 2 Social networks Networks of human beings interactions. High school dating Co-authorship in Physics 3


  1. Augmented graph models • Density based augmentations: [Kleinberg 00, Kleinberg 01, Duchon et al. 05, Slivkins 05] If H is of bounded growth i.e. B u (2R) ≤ c.B u (R) for all node u and radius R 20

  2. Augmented graph models • Density based augmentations: [Kleinberg 00, Kleinberg 01, Duchon et al. 05, Slivkins 05] If H is of bounded growth i.e. B u (2R) ≤ c.B u (R) for all node u and radius R and if φ is density based i.e. φ u (v) proportional to 1/B u ( dist(u,v) ) 20

  3. Augmented graph models • Density based augmentations: [Kleinberg 00, Kleinberg 01, Duchon et al. 05, Slivkins 05] If H is of bounded growth i.e. B u (2R) ≤ c.B u (R) for all node u and radius R and if φ is density based i.e. φ u (v) proportional to 1/B u ( dist(u,v) ) Then H is navigable i.e. greedy routing computes polylog(n) paths knowing only H. 20

  4. Augmented graph models • Density based augmentations 21

  5. Augmented graph models • Density based augmentations small probability v u B u ( d(u,v) ) 21

  6. Augmented graph models • Density based augmentations small probability big probability v v u u B u ( d(u,v) ) B u ( d(u,v) ) 21

  7. Augmented graph models • Density based augmentations small probability big probability v v u u B u ( d(u,v) ) B u ( d(u,v) ) Liben-Nowell et al 05 : it fits observations on electronic social networks. 21

  8. - Navigability: Dynamic properties 22

  9. Question • Harmonic augmentation 1/x is crucial. 23

  10. Question • Harmonic augmentation 1/x is crucial. • But : natural spontaneous networks. 23

  11. Question • Harmonic augmentation 1/x is crucial. • But : natural spontaneous networks. • How does it emerge? 23

  12. Question • Harmonic augmentation 1/x is crucial. • But : natural spontaneous networks. • How does it emerge? We look for a natural dynamic process arising the shortcuts that produces navigability. (e.g. 1 -harmonic distribution on the ring.) 23

  13. Previous attempts [Clauset & Moore 2003] • Hypothesis: shortcuts comes from successive searches. 24

  14. Previous attempts [Clauset & Moore 2003] • Hypothesis: shortcuts comes from successive searches. new hyperlink: bookmark - u stops after t steps (random) and rewire its link. 24

  15. Previous attempts [Clauset & Moore 2003] • Hypothesis: shortcuts comes from successive searches. new hyperlink: bookmark hyperlink Threshold of frustration - u tries to route greedily towards v (random). - u stops after t steps (random) and rewire its link. 24

  16. Previous attempts 25

  17. Previous attempts • Simulation results: 1 0.95 convergence to the 0.9 rewired exponent, � rewired 0.85 harmonic distribution 0.8 0.75 and short greedy 0.7 � =75 � =150 routes. 0.65 � =300 � =500 0.6 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 initial exponent, � 0 25

  18. Previous attempts • Simulation results: 1 0.95 convergence to the 0.9 rewired exponent, � rewired 0.85 harmonic distribution 0.8 0.75 and short greedy 0.7 � =75 � =150 routes. 0.65 � =300 � =500 0.6 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 initial exponent, � 0 • No analytical result: complex dependencies of the shortcuts. 25

  19. Previous attempts [Clarke & Sandberg 2006] • Same hypothesis: shortcuts comes from successive searches. 26

  20. Previous attempts [Clarke & Sandberg 2006] • Same hypothesis: shortcuts comes from successive searches. - u computes a greedy path P to v (random). 26

  21. Previous attempts [Clarke & Sandberg 2006] • Same hypothesis: shortcuts comes from successive searches. - u computes a greedy path P to v (random). - each node of P rewires its link to v with probability p. 26

  22. Previous attempts [Clarke & Sandberg 2006] • Same hypothesis: shortcuts comes from successive searches. - u computes a greedy path P to v (random). - each node of P rewires its link to v with probability p. • Analytical results: convergence to the harmonic distribution. • Simulation results: short greedy routes. 26

  23. Our approach [Chaintreau, Fraigniaud, L. 08] • A different hypothesis : 1. Links comes from people who met once. 2. Links tend to be forgotten with time. 27

  24. Our approach [Chaintreau, Fraigniaud, L. 08] • A different hypothesis : 1. Links comes from people who met once. 2. Links tend to be forgotten with time. • Our process can be fully analyzed. 27

  25. Move and Forget process Z k 28

  26. Move and Forget process Z k Individuals: token moving on the grid. 28

  27. Move and Forget process Z k Individuals: token moving on the grid. 28

  28. Move and Forget process Z k Each token moves independently according to a random walk. 29

  29. Move and Forget process Z k Each token moves independently according to a random walk. 29

  30. Move and Forget process Z k Each token moves independently according to a random walk. 29

  31. Move and Forget process Z k Each token moves independently according to a random walk. 29

  32. Move and Forget process Z k Each token moves independently according to a random walk. 29

  33. Move and Forget process Z k Each token drags the head of a shortcut rooted at its departure position. 30

  34. Move and Forget process But after some time, we forget people. 31

  35. Move and Forget process But after some time, we forget people. How sad. 31

  36. Move and Forget process But after some time, we forget people. Forgetting mechanism: • In each step, if our link is of age a, we forget it with probability ∝ 1 /a. 31

  37. Move and Forget process But after some time, we forget people. Forgetting mechanism: • In each step, if our link is of age a, we forget it with probability ∝ 1 /a. I.e. : there is less chance to forget your very old friend than the one met at the bar yesterday. 31

  38. Move and Forget process Z k When a link is forgotten, it is rewired to its departure and a new token is launched. 32

  39. Move and Forget process Z k When a link is forgotten, it is rewired to its departure and a new token is launched. 32

  40. Move and Forget process Z k When a link is forgotten, it is rewired to its departure and a new token is launched. 33

  41. Move and Forget process Z k When a link is forgotten, it is rewired to its departure and a new token is launched. 33

  42. More precisely • At time t, the long range contact of u is (x 1 (t),x 2 (t),...,x k (t)). 34

  43. More precisely • At time t, the long range contact of u is (x 1 (t),x 2 (t),...,x k (t)). • It is forgotten with probability ∝ 1/a (a=the time since it has been launched). 34

  44. More precisely • At time t, the long range contact of u is (x 1 (t),x 2 (t),...,x k (t)). • It is forgotten with probability ∝ 1/a (a=the time since it has been launched). • If it survives, for all i: x i (t+1)= x i (t)+1 with probability 1/2 x i (t+1)= x i (t)-1 with probability 1/2 34

  45. More precisely • At time t, the long range contact of u is (x 1 (t),x 2 (t),...,x k (t)). • It is forgotten with probability ∝ 1/a (a=the time since it has been launched). • If it survives, for all i: x i (t+1)= x i (t)+1 with probability 1/2 x i (t+1)= x i (t)-1 with probability 1/2 • Otherwise, (x 1 (t+1),..., x k (t+1))=u. 34

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend