Analysis and visualization of 2-mode networks
|
|
|
- Mervin Mason
- 9 years ago
- Views:
Transcription
1 1 Analysis and visualization of 2-mode networks Matjaž Zaveršnik, Vladimir Batagelj and Andrej Mrvar University of Ljubljana Abstract: 2-mode data consist of a data matrix A over two sets U (rows) and V (columns). One or both sets can be (very) large. Such data can be viewed also as a (directed) bipartite network. We can analyze 2-mode network directly or transform it into an 1-mode network over U or V. In the paper we present different approaches to the analysis and visualization of 2-mode networks and illustrate them on real life examples. These approaches are supported in the program Pajek. Keywords: 2-mode networks, hubs and authorities, normalizations. 1 2-mode networks A 2-mode network is a structure (U, V, R, w), where U and V are disjoint sets of vertices (nodes, units), R U V is a relation and w : R IR is a weight. If no weight is defined we can assume a constant weight w(u, v) = 1 for all (u, v) R. A 2-mode network can be viewed also as an ordinary (1-mode) network on the vertex set U + V, divided into two sets U and V, where the arcs can only go from U to V (a bipartite directed graph). Some examples of 2-mode networks are: (authors, papers, cites the paper), (authors, papers, is cited in the paper), (authors, papers, is the (co)author of the paper), (people, events, was present at), (people, institutions, is member of), (customers, products/services, consumption), (articles, shopping lists, is on the list), (delegates, proposals, voting results). Most of the techniques to analyze ordinary (1-mode) networks cannot be directly applied to 2-mode networks without modifications or change of the meaning (see?). We have two possibilities how to analyze 2-mode network: using adapted or special techniques, which are usually (but not always) very complicated, changing 2-mode network into two 1-mode networks (U, RR T ) and (V, R T R), which can be analyzed separately with standard techniques. 2 Hubs and authorities As an example of adapted technique we present hubs and authorities. In large networks we often want to determine, which vertices are the most important. There are several ways, how to define importance. Usually we compute some kind of weights on vertices and say, that vertex with higher weight is more important.
2 2 In directed networks, we usually associate two weights with each vertex v: the authority weight x v and the hub weight y v. If a vertex points to many vertices with large authority weight, then it should receive a large hub weight. If a vertex is pointed to by many vertices with large hub weight, then it should receive a large authority weight. A vertex is a good hub, if it points to many good authorities, and it is a good authority, if it is pointed to by many good hubs. The algorithm for determining authority and hub weights consist of a loop, in which we iteratively compute hub/authority weights as normalized sums of authority/hub weights of the neighbors x = normalize(random starting vector) repeat y = normalize(ax) x = normalize(a T y) until the largest change in components of x and y is < ε where A is the network matrix: A uv = { w(u, v) (u, v) R 0 otherwise Let (U, V, R, w) be a 2-mode network. Because each arc can only go from U to V, vertices in U cannot be good authorities and vertices in V cannot be good hubs. So we associate only one weight (importance) with each vertex. Let x u be the importance of vertex u U, y v the importance of vertex v V and A the adjacency matrix, where rows and columns correspond to vertices from U and V respectively (a uv = 1, if urv and 0, otherwise). The algorithm for determining the importance for each vertex remains unchanged, the only difference is in the interpretation of matrix A and vectors x and y. See section 5 for the results of described algorithm on the network of bibliographic data. 3 Transforming 2-mode network into 1-mode networks Another way to analyze 2-mode network is to transform it into two ordinary (1-mode) networks (U, RR T, w 1 ) and (V, R T R, w 2 ), which can be analyzed separately using standard techniques. The problem is that, if the maximal degree on the set U (or V ) is large, the obtained ordinary network contains large cliques; but if the vertex set is small, this is not bothering (see Figure??). From 2-mode networks over large sets U and/or V we can get smaller ordinary networks by first partitioning U and/or V and shrinking the clusters. There are also different ways to define matrix multiplication we can select different semirings. Instead of usual operations (plus, times) we can also use (or, and) for w = 1, (max, min), (min, +)... In this way we get different ordinary networks.
3 3 4 Example: Davis Southern Club Women Davis Southern Club Women is a classical example of (small) 2-mode network. The network has 32 vertices (18 women and 14 events) and 93 arcs represented by a binary matrix (see Figure??). Arcs represent observed attendance at 14 social events by 18 Southern women. We have an arc from woman u to event v, iff u attended the social event v. These data were collected by Davis et al in the 1930s (see? and?). Because we have a small network we can visualize it as a bipartite graph (see Figure??). We placed events to the left and women to the right side of the picture. We also tried to identify groups of women who attended similar events and groups of events attended by the same women. Figure?? presents the same network. To obtain this picture we computed both ordinary networks (network of women and network of events) and draw each of them using first two eigenvectors. The obtained coordinates were used to draw the original 2-mode network. Finally we manually slightly displaced some vertices in order to obtain a more readable picture. 5 Example: References In this example we have 2-mode network on 674 vertices (314 authors and 360 papers) with 613 arcs. It was produced from the bibliography of the book written by?. The result is an author-by-paper 2-mode network, where the author u is linked to the paper v iff u is the (co)author of the paper v. A network of this size can still be vizualized in the usual way, but because of larger number of vertices any additional data (labels) should be omitted (see Figure??) to make the picture readable. There exist special graphical formats and viewers, which enable us to zoom-in and zoom-out the picture. One of such formats is SVG (Scalable Vector Graphics). The latest graphical programs already contain viewers or even editors for SVG (the viewer is included also in Internet Explorer 6.0). In Figure?? a zoom-in into the network with labels is presented. It is easy to see that a pair of vertices u, v U (or V ) belong to the same (weakly) connected component of (U, RR T, w 1 ) (or (V, R T R, w 2 )) iff they belong to the same (weakly) connected component of (U, V, R, w). The ordinary network on authors is also called a collaboration network, since there is an edge between two authors iff they wrote a joint paper. In Figure?? the largest connected component of the collaboration network (86 vertices) is presented. We applied hubs and authorities algorithm to the biggest weak component of the original 2-mode network and got the following results. The most important authors, ordered descending by their importancy weights are Klavžar ( ), Imrich ( ), Mulder ( ), Mohar ( ) and Gutman ( ), while the most important papers are imkl-99b ( ), klgu-95 ( ), klmu-98 ( ), klmu-99 ( ) and klgu-97 ( ). For the the largest connected component of the collaboration network the results of hubs and authorities algorithm are a little bit different. The most important authors are
4 4 Klavžar ( ), Imrich ( ), Mohar ( ), Gutman ( ) and Pisanski ( ). The author s degree in the original 2-mode network is the number of his papers, cited in the book, while the degree in the collaboration network is the number of his coauthors. Authors with many papers are Imrich (26), Klavžar (22), Bandelt (12), Mulder (11), Mohar (10), Lovasz (10) and Zh1u (10), while authors with many coauthors are Hell (12), Klavžar (11), Imrich(10), Bandelt (10), Lovasz (8) and Pisanski(7). Another measure used to sort out the most important vertices is betweenness centrality. Vertex is central, if it lies on several shortest paths among other pairs of vertices. Authors with high betweenness centrality are often some kind of middlemans between other authors: Imrich ( ), Hell ( ), Klavžar ( ), Pultr ( ), Bandelt ( ) and Lovasz ( ). 6 Example: Slovenian journals and magazines Over people in Slovenia have been asked which Slovenian magazines and journals they read (survey conducted in 1999 and 2000, source CATI Center Ljubljana). They listed 124 different magazines and journals. The collected raw data can be represented as a 2-mode network: Delo Dnevnik Sl.novice... Reader1 x x... Reader2 x... Reader3 x From this 2-mode reader/journal network we generated the corresponding ordinary network on journals using the (+, ) semiring: the value of an undirected edge linking two journals counts the number of readers of both journals. loop on selected journal counts the number of all readers that read this journal. The obtained matrix (A): Delo Dnevnik Sl.novice... Delo Dnevnik Sl.novice The ordinary network on readers would be huge (more than vertices) containing large cliques (readers of particular journal). Because of the huge differences in number of readers of different journals it is very hard to make any conclusions about journals relationships according to the raw data. First
5 5 we have to normalize the network all the normalized values are on the interval [0, 1]. There exist several types of normalizations: Geo ij = a ij aii a jj Input ij = a ij a jj Row ij = a ij j a ij Output ij = a ij Col ij = a ii a ij i a ij Min ij = a ij min(a ii, a jj ) Max ij = a ij max(a ii, a jj ) MinDir ij = { aij a ii a jj 0 otherwise a ii MaxDir ij = { aij a ii a jj 0 otherwise a jj In Slovenia we have some publishing houses (Delo, Dnevnik, Večer,... ), which publish several magazines and journals. For example, Delo publishes Delo, Nedelo, Slovenske novice, Delničar, Vikend magazin, Ona, Moj mikro, Jana, Lady,..., Dnevnik publishes Dnevnik, Nedeljski dnevnik, Hopla, Pilot,..., while Večer publishes Večer, Naš dom, 7D, TV večer,... There are also several different types of journals and magazines: daily papers (Delo, Dnevnik, Večer, Slovenske novice, Ekipa), regional papers (Dolenjski list, Novi tednik, Primorske novice, Ptujski tednik, Vestnik Murska Sobota), business (Delničar, Finance, Gospodarski vestnik, Kapital, Manager, Obrtnik, Podjetnik), agricultural (Kmečki glas, Slovenske brazde, Kmetovalec), juvenile magazines (Ciciban, Pil, Firbec, Smrklja, Cool), general interests (7D, Nedeljski dnevnik, Nedelo, Radar), computers (Moj Mikro, Monitor, Win.ini), women (Jana, Lady, Naša žena, Anja, Viva, Otrok in družina, Moj malček, Mama), religion (Družina, Ognjišče), actuality (Mag, Mladina), home (Naš dom, Jana Ambient, Moj mali svet), relaxation (Kih, Razvedrilo, Salomonov ugankar, Antena, Hopla, Lady, Stop), mysticism (Misteriji, Aura), supplements (Delo in dom, Pilot, Vikend magazin, Ona). 6.1 Geo normalization The Geo normalization of an element of the network matrix is obtained by dividing it with the geometric mean of corresponding diagonal elements. In our case this normalization is a measure of association (correlation) between journals (see Figure??). 6.2 MinDir normalization The MinDir normalization makes two things: converts an undirected network into a directed one - an arc points from the journal with less readers to the journal with higher number of readers;
6 6 the value on an arc corresponds to the percentage of readers of the first journal, who read also the second one. In our case this normalization measures the dependence between journals (see Figure??). On both pictures the size of vertices corresponds to the number of readers. The colors determine weakly connected components. The thickness of the lines represents the normalized value of the links. Only the lines with values above some threshold value are displayed.
7 7
8 8 Figure 2: Davis data matrix
9 9 OLIVIA E13 E12 E14 E10 E11 E9 E7 E8 E6 FLORA SYLVIA HELEN VERNE NORA MYRNA PEARL KATHERINE DOROTHY RUTH EVELYN THERESA E3 E2 E5 E1 E4 ELEANOR BRENDA FRANCES LAURA CHARLOTTE Figure 3: Davis Bipartite network
10 10 E11 OLIVIA FLORA E9 VERNE SYLVIA NORA HELEN THERESA RUTH EVELYN CHARLOTTE E2 E1 E3 E4 E5 E6 E8 E7 FRANCES ELEANOR LAURA BRENDA E14 E12 E13 E10 PEARL MYRNA DOROTHY KATHERINE Figure 4: Davis First two eigenvectors on U and V, combined, manual editing
11 Figure 5: References 2-mode network: papers (darker) and their authors (lighter) 11
12 12 Figure 6: References Zoom in, with labels
13 13 Nedela, R. Cyvin, S.J. Zmazek, B. Milutinovic, U. Slutzki, G. Dakic, T. Shawe-Taylor, J. Gutman, I. Kumar, R. vande V Pisanski, T. Klavzar, S. Jha, P.K. P Batagelj, V. White, A.T. Mohar, B. Agnihotri, N. Skrekovski, R. Chepoi, V. Formann, M. Hagauer, J. Zerovnik, J. Seifter, N. Skoviera, M. Izbicki, H. Mulder, H.M. Haddad, R.W. Idury, R.M. Aurenhammer, F. Bandelt Feigenbaum, J. Dorfler, W. Wilkeit, E. Schaffer, A.A. Wagner, F. Imrich, W. Haggkvist, R. F Hershberger, J., Burr, S.A. Greenwell, D. Gyori, E. Watkins, M.E. Shearer, J.B. Plummer, M.D. Nowitz, L.A. Miller, D.J. Erdos, P. Lovasz, L. Pultr, A. Neumann-Lara, V. G Groetschel, M. Poljak, S. Hell, P. West, D.B. Nesetril, J. Rodl, V. Hahn, G. Roberts, F.S. Saks, M.E. Graham, R.L. Eaton, N. Tardif, C. Neufeld, S. Rival, I. Winkler, P.M. Pollak, H.O. Larose, B. Laviolette, F. Rall, D.F. Nowako Chung, F. R.K. Roth, R.L. Hartnell, B.L. Brown, Figure 7: References Collaboration network
14 14 Finance 7d Tv vecer Gospodarski vestnik Ona Lady Vecer Mag Delo Nasa zena Mladina Vikend magazin Jana Moj dom (Dnevnik) Delo in dom Pilot Sobotna priloga(delo) Slovenske novice Dnevnik Moj mikro Nedeljski dnevnik Smrklja Misteriji Glamur Ognjisce Pil Moj malcek Monitor Cool Aura Win.ini Pepita Druzina Firbec Mama Figure 8: Geo normalization
15 15 Slov. brazde Cool Pilot Mag Jana Ambient Glamur Internet Kmecki glas Kmetovalec Zaslon Prim. novice Moj dom Podjetnik Monitor Sobotna pril. Smrklja Ned. dnev. Finance Svet in ljudje Nedelo Gosp. vestnik Kapital Val Moj mikro Manager Nasa zena Viva Ljubljana Jana Pepita Delo Glas gosp. Mladina Denar Gea Tajnica Marketing mag. Proteus Vip Oskar Modna Jana Delo in dom Dnevnik Kaj Panorama Zdravje Anja Lady Ptujski tednik Vecer Druzina 7d Tv vecer Ognjisce Kam Trac Ona Grafiti Vikend magazin Prestop Savinjcan Slov. nov. Antena Moja skrivnost Celjski ogl. Dol.i list Ljub. zgodbe Nas casopis Salomonov ogl. Grand prix Figure 9: MinDir normalization
16 16 References V. Batagelj and A. Mrvar. Pajek - program for large network analysis, URL S. P. Borgatti and M. Everett. Network analysis of 2-mode data. Social Networks, 19: , R. Breiger. The duality of persons and groups. Social Forces, 53: , A. Davis et al. Deep South. University of Chicago Press, Chicago, W. Imrich and S. Klavžar. Product graphs: structure and recognition. John Wiley & Sons, New York, USA, J. Scott. Social Network Analysis: A Handbook. Sage Publications, London, second edition, S. Wasserman and K. Faust. Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge, 1994.
Course on Social Network Analysis Graphs and Networks
Course on Social Network Analysis Graphs and Networks Vladimir Batagelj University of Ljubljana Slovenia V. Batagelj: Social Network Analysis / Graphs and Networks 1 Outline 1 Graph...............................
HISTORICAL DEVELOPMENTS AND THEORETICAL APPROACHES IN SOCIOLOGY Vol. I - Social Network Analysis - Wouter de Nooy
SOCIAL NETWORK ANALYSIS University of Amsterdam, Netherlands Keywords: Social networks, structuralism, cohesion, brokerage, stratification, network analysis, methods, graph theory, statistical models Contents
Tools and Techniques for Social Network Analysis
Tools and Techniques for Social Network Analysis Pajek Program for Analysis and Visualization of Large Networks Pajek: What is it Pajek is a program, for Windows and Linux (via Wine) Developers: Vladimir
DATA ANALYSIS II. Matrix Algorithms
DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where
Pajek. Program for Analysis and Visualization of Large Networks. Reference Manual List of commands with short explanation version 2.
Pajek Program for Analysis and Visualization of Large Networks Reference Manual List of commands with short explanation version 2.05 Vladimir Batagelj and Andrej Mrvar Ljubljana, September 24, 2011 c 1996,
Part 2: Community Detection
Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -
Equivalence Concepts for Social Networks
Equivalence Concepts for Social Networks Tom A.B. Snijders University of Oxford March 26, 2009 c Tom A.B. Snijders (University of Oxford) Equivalences in networks March 26, 2009 1 / 40 Outline Structural
5.1 Bipartite Matching
CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson
Practical Graph Mining with R. 5. Link Analysis
Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA [email protected]
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
Social Media Mining. Graph Essentials
Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures
The PageRank Citation Ranking: Bring Order to the Web
The PageRank Citation Ranking: Bring Order to the Web presented by: Xiaoxi Pang 25.Nov 2010 1 / 20 Outline Introduction A ranking for every page on the Web Implementation Convergence Properties Personalized
How to Analyze Company Using Social Network?
How to Analyze Company Using Social Network? Sebastian Palus 1, Piotr Bródka 1, Przemysław Kazienko 1 1 Wroclaw University of Technology, Wyb. Wyspianskiego 27, 50-370 Wroclaw, Poland {sebastian.palus,
Complex Networks Analysis: Clustering Methods
Complex Networks Analysis: Clustering Methods Nikolai Nefedov Spring 2013 ISI ETH Zurich [email protected] 1 Outline Purpose to give an overview of modern graph-clustering methods and their applications
Warshall s Algorithm: Transitive Closure
CS 0 Theory of Algorithms / CS 68 Algorithms in Bioinformaticsi Dynamic Programming Part II. Warshall s Algorithm: Transitive Closure Computes the transitive closure of a relation (Alternatively: all paths
Social Media Mining. Network Measures
Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users
Mining Social-Network Graphs
342 Chapter 10 Mining Social-Network Graphs There is much information to be gained by analyzing the large-scale data that is derived from social networks. The best-known example of a social network is
SCAN: A Structural Clustering Algorithm for Networks
SCAN: A Structural Clustering Algorithm for Networks Xiaowei Xu, Nurcan Yuruk, Zhidan Feng (University of Arkansas at Little Rock) Thomas A. J. Schweiger (Acxiom Corporation) Networks scaling: #edges connected
Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data
CMPE 59H Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data Term Project Report Fatma Güney, Kübra Kalkan 1/15/2013 Keywords: Non-linear
Design of LDPC codes
Design of LDPC codes Codes from finite geometries Random codes: Determine the connections of the bipartite Tanner graph by using a (pseudo)random algorithm observing the degree distribution of the code
Visualization of Social Networks in Stata by Multi-dimensional Scaling
Visualization of Social Networks in Stata by Multi-dimensional Scaling Rense Corten Department of Sociology/ICS Utrecht University The Netherlands [email protected] April 12, 2010 1 Introduction Social network
Network Metrics, Planar Graphs, and Software Tools. Based on materials by Lala Adamic, UMichigan
Network Metrics, Planar Graphs, and Software Tools Based on materials by Lala Adamic, UMichigan Network Metrics: Bowtie Model of the Web n The Web is a directed graph: n webpages link to other webpages
A comparative study of social network analysis tools
Membre de Membre de A comparative study of social network analysis tools David Combe, Christine Largeron, Előd Egyed-Zsigmond and Mathias Géry International Workshop on Web Intelligence and Virtual Enterprises
SGL: Stata graph library for network analysis
SGL: Stata graph library for network analysis Hirotaka Miura Federal Reserve Bank of San Francisco Stata Conference Chicago 2011 The views presented here are my own and do not necessarily represent the
Graph/Network Visualization
Graph/Network Visualization Data model: graph structures (relations, knowledge) and networks. Applications: Telecommunication systems, Internet and WWW, Retailers distribution networks knowledge representation
FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
in R Binbin Lu, Martin Charlton National Centre for Geocomputation National University of Ireland Maynooth The R User Conference 2011
Converting a spatial network to a graph in R Binbin Lu, Martin Charlton National Centre for Geocomputation National University of Ireland Maynooth Maynooth, Co.Kildare, Ireland The R User Conference 2011
How To Understand The Network Of A Network
Roles in Networks Roles in Networks Motivation for work: Let topology define network roles. Work by Kleinberg on directed graphs, used topology to define two types of roles: authorities and hubs. (Each
Why? A central concept in Computer Science. Algorithms are ubiquitous.
Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online
Statistical and computational challenges in networks and cybersecurity
Statistical and computational challenges in networks and cybersecurity Hugh Chipman Acadia University June 12, 2015 Statistical and computational challenges in networks and cybersecurity May 4-8, 2015,
15.062 Data Mining: Algorithms and Applications Matrix Math Review
.6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop
Scheduling Shop Scheduling. Tim Nieberg
Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations
NEW VERSION OF DECISION SUPPORT SYSTEM FOR EVALUATING TAKEOVER BIDS IN PRIVATIZATION OF THE PUBLIC ENTERPRISES AND SERVICES
NEW VERSION OF DECISION SUPPORT SYSTEM FOR EVALUATING TAKEOVER BIDS IN PRIVATIZATION OF THE PUBLIC ENTERPRISES AND SERVICES Silvija Vlah Kristina Soric Visnja Vojvodic Rosenzweig Department of Mathematics
Practical statistical network analysis (with R and igraph)
Practical statistical network analysis (with R and igraph) Gábor Csárdi [email protected] Department of Biophysics, KFKI Research Institute for Nuclear and Particle Physics of the Hungarian Academy of
Evaluating Software Products - A Case Study
LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATION: A CASE STUDY ON GAMES Özge Bengur 1 and Banu Günel 2 Informatics Institute, Middle East Technical University, Ankara, Turkey
IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*
IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti
Rank one SVD: un algorithm pour la visualisation d une matrice non négative
Rank one SVD: un algorithm pour la visualisation d une matrice non négative L. Labiod and M. Nadif LIPADE - Universite ParisDescartes, France ECAIS 2013 November 7, 2013 Outline Outline 1 Data visualization
3. The Junction Tree Algorithms
A Short Course on Graphical Models 3. The Junction Tree Algorithms Mark Paskin [email protected] 1 Review: conditional independence Two random variables X and Y are independent (written X Y ) iff p X ( )
Nimble Algorithms for Cloud Computing. Ravi Kannan, Santosh Vempala and David Woodruff
Nimble Algorithms for Cloud Computing Ravi Kannan, Santosh Vempala and David Woodruff Cloud computing Data is distributed arbitrarily on many servers Parallel algorithms: time Streaming algorithms: sublinear
NETZCOPE - a tool to analyze and display complex R&D collaboration networks
The Task Concepts from Spectral Graph Theory EU R&D Network Analysis Netzcope Screenshots NETZCOPE - a tool to analyze and display complex R&D collaboration networks L. Streit & O. Strogan BiBoS, Univ.
CIS 700: algorithms for Big Data
CIS 700: algorithms for Big Data Lecture 6: Graph Sketching Slides at http://grigory.us/big-data-class.html Grigory Yaroslavtsev http://grigory.us Sketching Graphs? We know how to sketch vectors: v Mv
A Review And Evaluations Of Shortest Path Algorithms
A Review And Evaluations Of Shortest Path Algorithms Kairanbay Magzhan, Hajar Mat Jani Abstract: Nowadays, in computer networks, the routing is based on the shortest path problem. This will help in minimizing
Simplified External memory Algorithms for Planar DAGs. July 2004
Simplified External Memory Algorithms for Planar DAGs Lars Arge Duke University Laura Toma Bowdoin College July 2004 Graph Problems Graph G = (V, E) with V vertices and E edges DAG: directed acyclic graph
Graph Mining and Social Network Analysis
Graph Mining and Social Network Analysis Data Mining and Text Mining (UIC 583 @ Politecnico di Milano) References Jiawei Han and Micheline Kamber, "Data Mining: Concepts and Techniques", The Morgan Kaufmann
Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar
Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples
Finding and counting given length cycles
Finding and counting given length cycles Noga Alon Raphael Yuster Uri Zwick Abstract We present an assortment of methods for finding and counting simple cycles of a given length in directed and undirected
Trusses: Cohesive Subgraphs for Social Network Analysis
Trusses: Cohesive Subgraphs for Social Network Analysis Jonathan Cohen National Security Agency Suite 6514 9800 Savage Road Fort Meade, MD 20755-6513 Abstract Social network analysts employ automated methods
Network File Storage with Graceful Performance Degradation
Network File Storage with Graceful Performance Degradation ANXIAO (ANDREW) JIANG California Institute of Technology and JEHOSHUA BRUCK California Institute of Technology A file storage scheme is proposed
Lecture 7: NP-Complete Problems
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 7: NP-Complete Problems David Mix Barrington and Alexis Maciel July 25, 2000 1. Circuit
Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor
Online algorithms for combinatorial problems Ph.D. Thesis by Judit Nagy-György Supervisor: Péter Hajnal Associate Professor Doctoral School in Mathematics and Computer Science University of Szeged Bolyai
Groups and Positions in Complete Networks
86 Groups and Positions in Complete Networks OBJECTIVES The objective of this chapter is to show how a complete network can be analyzed further by using different algorithms to identify its groups and
A Tutorial on Spectral Clustering
A Tutorial on Spectral Clustering Ulrike von Luxburg Max Planck Institute for Biological Cybernetics Spemannstr. 38, 7276 Tübingen, Germany [email protected] This article appears in Statistics
SECTIONS 1.5-1.6 NOTES ON GRAPH THEORY NOTATION AND ITS USE IN THE STUDY OF SPARSE SYMMETRIC MATRICES
SECIONS.5-.6 NOES ON GRPH HEORY NOION ND IS USE IN HE SUDY OF SPRSE SYMMERIC MRICES graph G ( X, E) consists of a finite set of nodes or vertices X and edges E. EXMPLE : road map of part of British Columbia
Algorithm Design and Analysis
Algorithm Design and Analysis LECTURE 27 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/6/2011 S. Raskhodnikova;
An approach of detecting structure emergence of regional complex network of entrepreneurs: simulation experiment of college student start-ups
An approach of detecting structure emergence of regional complex network of entrepreneurs: simulation experiment of college student start-ups Abstract Yan Shen 1, Bao Wu 2* 3 1 Hangzhou Normal University,
Graph theoretic approach to analyze amino acid network
Int. J. Adv. Appl. Math. and Mech. 2(3) (2015) 31-37 (ISSN: 2347-2529) Journal homepage: www.ijaamm.com International Journal of Advances in Applied Mathematics and Mechanics Graph theoretic approach to
AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC
AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC W. T. TUTTE. Introduction. In a recent series of papers [l-4] on graphs and matroids I used definitions equivalent to the following.
Examining graduate committee faculty compositions- A social network analysis example. Kathryn Shirley and Kelly D. Bradley. University of Kentucky
Examining graduate committee faculty compositions- A social network analysis example Kathryn Shirley and Kelly D. Bradley University of Kentucky Graduate committee social network analysis 1 Abstract Social
Analysis of Algorithms I: Optimal Binary Search Trees
Analysis of Algorithms I: Optimal Binary Search Trees Xi Chen Columbia University Given a set of n keys K = {k 1,..., k n } in sorted order: k 1 < k 2 < < k n we wish to build an optimal binary search
Solutions to Homework 6
Solutions to Homework 6 Debasish Das EECS Department, Northwestern University [email protected] 1 Problem 5.24 We want to find light spanning trees with certain special properties. Given is one example
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
Network/Graph Theory. What is a Network? What is network theory? Graph-based representations. Friendship Network. What makes a problem graph-like?
What is a Network? Network/Graph Theory Network = graph Informally a graph is a set of nodes joined by a set of lines or arrows. 1 1 2 3 2 3 4 5 6 4 5 6 Graph-based representations Representing a problem
Zachary Monaco Georgia College Olympic Coloring: Go For The Gold
Zachary Monaco Georgia College Olympic Coloring: Go For The Gold Coloring the vertices or edges of a graph leads to a variety of interesting applications in graph theory These applications include various
Asking Hard Graph Questions. Paul Burkhardt. February 3, 2014
Beyond Watson: Predictive Analytics and Big Data U.S. National Security Agency Research Directorate - R6 Technical Report February 3, 2014 300 years before Watson there was Euler! The first (Jeopardy!)
Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs
Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs Kousha Etessami U. of Edinburgh, UK Kousha Etessami (U. of Edinburgh, UK) Discrete Mathematics (Chapter 6) 1 / 13 Overview Graphs and Graph
! E6893 Big Data Analytics Lecture 10:! Linked Big Data Graph Computing (II)
E6893 Big Data Analytics Lecture 10: Linked Big Data Graph Computing (II) Ching-Yung Lin, Ph.D. Adjunct Professor, Dept. of Electrical Engineering and Computer Science Mgr., Dept. of Network Science and
Mean Ramsey-Turán numbers
Mean Ramsey-Turán numbers Raphael Yuster Department of Mathematics University of Haifa at Oranim Tivon 36006, Israel Abstract A ρ-mean coloring of a graph is a coloring of the edges such that the average
On the k-path cover problem for cacti
On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China [email protected], [email protected] Abstract In this paper we
1 o Semestre 2007/2008
Departamento de Engenharia Informática Instituto Superior Técnico 1 o Semestre 2007/2008 Outline 1 2 3 4 5 Outline 1 2 3 4 5 Exploiting Text How is text exploited? Two main directions Extraction Extraction
Structural and functional analytics for community detection in large-scale complex networks
Chopade and Zhan Journal of Big Data DOI 10.1186/s40537-015-0019-y RESEARCH Open Access Structural and functional analytics for community detection in large-scale complex networks Pravin Chopade 1* and
SPECIAL PERTURBATIONS UNCORRELATED TRACK PROCESSING
AAS 07-228 SPECIAL PERTURBATIONS UNCORRELATED TRACK PROCESSING INTRODUCTION James G. Miller * Two historical uncorrelated track (UCT) processing approaches have been employed using general perturbations
Data Mining. Cluster Analysis: Advanced Concepts and Algorithms
Data Mining Cluster Analysis: Advanced Concepts and Algorithms Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004 1 More Clustering Methods Prototype-based clustering Density-based clustering Graph-based
(67902) Topics in Theory and Complexity Nov 2, 2006. Lecture 7
(67902) Topics in Theory and Complexity Nov 2, 2006 Lecturer: Irit Dinur Lecture 7 Scribe: Rani Lekach 1 Lecture overview This Lecture consists of two parts In the first part we will refresh the definition
An overview of Software Applications for Social Network Analysis
IRSR INTERNATIONAL REVIEW of SOCIAL RESEARCH Volume 3, Issue 3, October 2013, 71-77 International Review of Social Research An overview of Software Applications for Social Network Analysis Ioana-Alexandra
CSU, Fresno - Institutional Research, Assessment and Planning - Dmitri Rogulkin
My presentation is about data visualization. How to use visual graphs and charts in order to explore data, discover meaning and report findings. The goal is to show that visual displays can be very effective
Introduction to Scheduling Theory
Introduction to Scheduling Theory Arnaud Legrand Laboratoire Informatique et Distribution IMAG CNRS, France [email protected] November 8, 2004 1/ 26 Outline 1 Task graphs from outer space 2 Scheduling
Hadoop SNS. renren.com. Saturday, December 3, 11
Hadoop SNS renren.com Saturday, December 3, 11 2.2 190 40 Saturday, December 3, 11 Saturday, December 3, 11 Saturday, December 3, 11 Saturday, December 3, 11 Saturday, December 3, 11 Saturday, December
Graphical degree sequences and realizations
swap Graphical and realizations Péter L. Erdös Alfréd Rényi Institute of Mathematics Hungarian Academy of Sciences MAPCON 12 MPIPKS - Dresden, May 15, 2012 swap Graphical and realizations Péter L. Erdös
1 Introduction. Dr. T. Srinivas Department of Mathematics Kakatiya University Warangal 506009, AP, INDIA [email protected]
A New Allgoriitthm for Miiniimum Costt Liinkiing M. Sreenivas Alluri Institute of Management Sciences Hanamkonda 506001, AP, INDIA [email protected] Dr. T. Srinivas Department of Mathematics Kakatiya
High degree graphs contain large-star factors
High degree graphs contain large-star factors Dedicated to László Lovász, for his 60th birthday Noga Alon Nicholas Wormald Abstract We show that any finite simple graph with minimum degree d contains a
Community Mining from Multi-relational Networks
Community Mining from Multi-relational Networks Deng Cai 1, Zheng Shao 1, Xiaofei He 2, Xifeng Yan 1, and Jiawei Han 1 1 Computer Science Department, University of Illinois at Urbana Champaign (dengcai2,
Social Networks and Social Media
Social Networks and Social Media Social Media: Many-to-Many Social Networking Content Sharing Social Media Blogs Microblogging Wiki Forum 2 Characteristics of Social Media Consumers become Producers Rich
Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring
Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring Qiang Zheng, Student Member, IEEE, and Guohong Cao, Fellow, IEEE Department of Computer Science and Engineering
What is SNA? A sociogram showing ties
Case Western Reserve University School of Medicine Social Network Analysis: Nuts & Bolts Papp KK 1, Zhang GQ 2 1 Director, Program Evaluation, CTSC, 2 Professor, Electrical Engineering and Computer Science,
Discrete Applied Mathematics. The firefighter problem with more than one firefighter on trees
Discrete Applied Mathematics 161 (2013) 899 908 Contents lists available at SciVerse ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam The firefighter problem with
A. Mrvar: Network Analysis using Pajek 1. Cluster
A. Mrvar: Network Analysis using Pajek 1 Cluster One of the important goals of network analysis is to find clusters of units, which have similar (or equal) structural characteristics, which are determined
MapReduce Approach to Collective Classification for Networks
MapReduce Approach to Collective Classification for Networks Wojciech Indyk 1, Tomasz Kajdanowicz 1, Przemyslaw Kazienko 1, and Slawomir Plamowski 1 Wroclaw University of Technology, Wroclaw, Poland Faculty
Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs
Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs Leah Epstein Magnús M. Halldórsson Asaf Levin Hadas Shachnai Abstract Motivated by applications in batch scheduling of jobs in manufacturing
Reductions & NP-completeness as part of Foundations of Computer Science undergraduate course
Reductions & NP-completeness as part of Foundations of Computer Science undergraduate course Alex Angelopoulos, NTUA January 22, 2015 Outline Alex Angelopoulos (NTUA) FoCS: Reductions & NP-completeness-
USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS
USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA [email protected] ABSTRACT This
Clique coloring B 1 -EPG graphs
Clique coloring B 1 -EPG graphs Flavia Bonomo a,c, María Pía Mazzoleni b,c, and Maya Stein d a Departamento de Computación, FCEN-UBA, Buenos Aires, Argentina. b Departamento de Matemática, FCE-UNLP, La
