Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2487575.2487664acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Trace complexity of network inference

Published: 11 August 2013 Publication History

Abstract

The network inference problem consists of reconstructing the edge set of a network given traces representing the chronology of infection times as epidemics spread through the network. This problem is a paradigmatic representative of prediction tasks in machine learning that require deducing a latent structure from observed patterns of activity in a network, which often require an unrealistically large number of resources (e.g., amount of available data, or computational time). A fundamental question is to understand which properties we can predict with a reasonable degree of accuracy with the available resources, and which we cannot. We define the trace complexity as the number of distinct traces required to achieve high fidelity in reconstructing the topology of the unobserved network or, more generally, some of its properties. We give algorithms that are competitive with, while being simpler and more efficient than, existing network inference approaches. Moreover, we prove that our algorithms are nearly optimal, by proving an information-theoretic lower bound on the number of traces that an optimal inference algorithm requires for performing this task in the general case. Given these strong lower bounds, we turn our attention to special cases, such as trees and bounded-degree graphs, and to property recovery tasks, such as reconstructing the degree distribution without inferring the network. We show that these problems require a much smaller (and more realistic) number of traces, making them potentially solvable in practice.

References

[1]
E. Adar and L. A. Adamic. Tracking information epidemics in blogspace. In Proc. of the 2005 IEEE/WIC/ACM Int'l Conf. on Web Intelligence, 2005.
[2]
N. Bailey. The Mathematical Theory of Infectious Diseases and its Applications. Griffin, London, 1975.
[3]
E. Bakshy, J. M. Hofman, W. A. Mason, and D. J. Watts. Everyone's an influencer: quantifying influence on twitter. In Proc. of the 4th ACM Int'l Conf. on Web search and Data Mining, 2011.
[4]
A.-L. Barabási and R. Albert. Emergence of Scaling in Random Networks. Science, 286(5439):509--512, Oct. 1999.
[5]
S. G. Bobkov and M. Ledoux. On modified logarithmic sobolev inequalities for bernoulli and poisson measures. Journal of Functional Analysis, 156(2):347--365, 1998.
[6]
T. M. Cover and J. A. Thomas. Elements of information theory. Wiley-Interscience, New York, NY, USA, 1991.
[7]
N. DU, L. Song, A. Smola, and M. Yuan. Learning networks of heterogeneous influence. In Advances in Neural Information Processing Systems 25, pages 2789--2797. 2012.
[8]
R. Durrett. Probability: Theory and examples. Cambridge Series in Statistical and Probabilistic Mathematics, 2011.
[9]
P. Erdös and A. Rényi. On the evolution of random graphs. In Pub. of the Mathematical Institute of the Hungarian Academy of Sciences, pages 17--61, 1960.
[10]
M. Faloutsos, P. Faloutsos, and C. Faloutsos. On power-law relationships of the internet topology. SIGCOMM Comput. Commun. Rev., 29(4):251--262, Aug. 1999.
[11]
T. Gneiting and A. E. Raftery. Strictly proper scoring rules, prediction, and estimation. J. Amer. Stat. Assoc., 102:359--378, 2007.
[12]
M. Gomez-Rodriguez, D. Balduzzi, and B. Schölkopf. Uncovering the temporal dynamics of diffusion networks. In Proc. of the 28th Int'l Conf. on Machine Learning, 2011.
[13]
M. Gomez-Rodriguez, J. Leskovec, and A. Krause. Inferring networks of diffusion and influence. In Proc. of the 16th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining, 2010.
[14]
V. Gripon and M. Rabbat. Reconstructing a graph from path traces. CoRR, abs/1301.6916, 2013.
[15]
D. Gruhl, R. Guha, D. Liben-Nowell, and A. Tomkins. Information diffusion through blogspace. In Proc. of the 13th Int'l Conf. on World Wide Web, 2004.
[16]
D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network. In Proc. of the 9th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining, 2003.
[17]
I. Kontoyiannis and M. Madiman. Measure concentration for compound poisson distributions. Electron. Commun. Probab., 11:no. 5, 45--57, 2006.
[18]
A. Mislove, B. Viswanath, K. Gummadi, and P. Druschel. You are who you know: Inferring user profiles in online social networks. In Proc. 3rd ACM Int'l. Conf. on Web Search and Data Mining, 2010.
[19]
S. Myers and J. Leskovec. On the convexity of latent social network inference. In Advances in Neural Information Processing Systems 23, pages 1741--1749. 2010.
[20]
P. Netrapalli and S. Sanghavi. Learning the graph of epidemic cascades. In SIGMETRICS, pages 211--222, 2012.
[21]
M. E. J. Newman. The structure and function of complex networks. SIAM REVIEW, 45:167--256, 2003.
[22]
E. M. Rogers and E. Rogers. Diffusion of Innovations. Free Press, 5th edition, Aug. 2003.

Cited By

View all
  • (2024)Fast Online Learning of Vulnerabilities for Networks With Propagating FailuresIEEE/ACM Transactions on Networking10.1109/TNET.2024.340579832:5(4025-4039)Online publication date: Oct-2024
  • (2023)Reconstructing Graph Diffusion History from a Single SnapshotProceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3580305.3599488(1978-1988)Online publication date: 6-Aug-2023
  • (2023)Multi-aspect Diffusion Network InferenceProceedings of the ACM Web Conference 202310.1145/3543507.3583228(82-90)Online publication date: 30-Apr-2023
  • Show More Cited By

Index Terms

  1. Trace complexity of network inference

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    KDD '13: Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
    August 2013
    1534 pages
    ISBN:9781450321747
    DOI:10.1145/2487575
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 August 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. independent cascade model
    2. network epidemics
    3. network inference
    4. sampling complexity

    Qualifiers

    • Research-article

    Conference

    KDD' 13
    Sponsor:

    Acceptance Rates

    KDD '13 Paper Acceptance Rate 125 of 726 submissions, 17%;
    Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)39
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 29 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Fast Online Learning of Vulnerabilities for Networks With Propagating FailuresIEEE/ACM Transactions on Networking10.1109/TNET.2024.340579832:5(4025-4039)Online publication date: Oct-2024
    • (2023)Reconstructing Graph Diffusion History from a Single SnapshotProceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3580305.3599488(1978-1988)Online publication date: 6-Aug-2023
    • (2023)Multi-aspect Diffusion Network InferenceProceedings of the ACM Web Conference 202310.1145/3543507.3583228(82-90)Online publication date: 30-Apr-2023
    • (2022)A New Method of Quantifying the Complexity of Fractal NetworksFractal and Fractional10.3390/fractalfract60602826:6(282)Online publication date: 24-May-2022
    • (2022)On the Consistency of Maximum Likelihood Estimators for Causal Network IdentificationIEEE Control Systems Letters10.1109/LCSYS.2021.30536106(175-180)Online publication date: 2022
    • (2022)Graph transfer learningKnowledge and Information Systems10.1007/s10115-022-01782-665:4(1627-1656)Online publication date: 21-Dec-2022
    • (2021)Inferring the Hidden Cascade Infection over Erdös-Rényi (ER) Random GraphElectronics10.3390/electronics1016189410:16(1894)Online publication date: 6-Aug-2021
    • (2021)Reconstructing trees from tracesThe Annals of Applied Probability10.1214/21-AAP166231:6Online publication date: 1-Dec-2021
    • (2021)Deployment of Information Diffusion for Community Detection in Online Social Networks: A Comprehensive ReviewIEEE Transactions on Computational Social Systems10.1109/TCSS.2021.30769308:5(1083-1107)Online publication date: Oct-2021
    • (2021)Graph Transfer Learning2021 IEEE International Conference on Data Mining (ICDM)10.1109/ICDM51629.2021.00024(141-150)Online publication date: Dec-2021
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media