SlideShare a Scribd company logo
1 of 20
Download to read offline
DEEPWALK VS NODE2VEC
SIDDHANT VERMA
BIT MESRA
Networks
 A flexible and general data structure.
 Many types of data can be formulated as
networks.
 Universal language for describing complex
data.
 Networks from science, nature,
and technology are more similar
than one would expect.
Classical ML tasks in
networks
 Node classification - Predict a type of a given
node
 Link prediction - Predict whether two nodes
are linked
 Community detection - Identify densely
linked clusters of nodes
 Network similarity - How similar are two
(sub)networks.
Graph Embedding
Graph Embedding is an approach that is used to
transform nodes, edges, and their features into
vector space (a lower dimension) whilst
maximally preserving properties like graph
structure and information.
DeepWalk
DeepWalk uses local information obtained from
truncated random walks to learn latent
representations by treating walks as the
equivalent of sentences.
Deepwalk learns social representations of a
graph’s vertices, by modeling a stream of short
random walks.
Social representations are latent features of the
vertices that capture neighborhood similarity and
community membership.
DeepWalk takes a graph as input and produces a
latent representation as an output. The result of
applying our method to the well-studied Karate
network is shown
Connection: Power laws
The frequency which vertices appear in the short
random walks will also follow a power-law
distribution. Word frequency in natural language
follows a similar distribution, and techniques
from language modeling account for this
distributional behavior.
Pseudo Algorithm
SkipGram
SkipGram is an algorithm that is used to create
word embeddings i.e. high-dimensional vector
representation of words. These embeddings are
meant to encode the semantic meaning of words
such that words that are semantically similar will
lie close to each other in that vector's space.
Hierarchical Softmax
If we assign the vertices to the leaves of a binary
tree, the prediction problem turns into
maximizing the probability of a specific path in
the tree. If the path to vertex uk is identified by a
sequence of tree nodes (b0, b1, . . . , bdlog |V |e),
(b0 = root, bdlog |V |e = uk) then
Pr(uk | Φ(vj )) = dlog Y |V |e l=1 Pr(bl | Φ(vj ))
Now, Pr(bl | Φ(vj )) could be modeled by a binary
classifier that is assigned to the parent of the node
bl. This reduces the computational complexity of
calculating Pr(uk | Φ(vj )) from O(|V |) to O(log |
V |).
Node2vec
Node2vec, an algorithmic framework for learning
continuous feature representations for nodes in
networks. In node2vec, we learn a mapping of
nodes to a low-dimensional space of features that
maximizes the likelihood of preserving network
neighborhoods of nodes. We define a flexible
notion of a node’s network neighborhood and
design a biased random walk procedure, which
efficiently explores diverse neighborhoods. Our
algorithm generalizes prior work which is based
on rigid notions of network neighborhoods, and
we argue that the added flexibility in exploring
neighborhoods is the key to learning richer
representations.
BFS
Neighborhood is restricted to nodes which are
immediate neighbors of the source .
For a neighborhood of size k=3 BFS samples
nodes s1,s2,s3
BFS <-> Structural Equivalence
Nodes that have similar structural roles in
networks should be embedded closely together.
E.g., nodes u and s6 in fig
Restricting search to nearby nodes, BFS gives
microscopic view.
Network roles such as bridges and hubs can be
inferred using BFS.
DFS
Neighborhood consists of nodes sequentially
sampled at increasing distances from the source
node .
For a neighborhood of size k=3 DFS
samples nodes s4,s5,s6 .
DFS <-> Homophily
Nodes that are highly interconnected and belong
to similar network communities should be
embedded closely together.
E.g., nodes u and s1 in fig
DFS sampled nodes reflect a macro-view of
nodes neighborhood.
Drawbacks of DeepWalk
DeepWalk: learns d-dimensional feature
representations by simulating uniform random
walks. Can be observed as a special case of
node2vec with parameters p = 1 & q = 1.
Networks represent a mixture of homophily and
structural equivalence, which are not effectively
covered by the above method.
Feature Learning Framework
Let G = (V, E) be a given network. applies to any
(un)directed, (un)weighted network. Let f : V →
R d be the mapping function from nodes to
feature representaions . Here d is a parameter
specifying the number of dimensions of our
feature representation. Equivalently, f is a matrix
of size |V | × d parameters. For every source node
u V , we define NS(u) V as a network
∈ ⊂
neighborhood of node u generated through a
neighborhood sampling strategy S.
f: max f X u V log P r(NS(u)|f(u))
∈
Conditional independence. We factorize the
likelihood by assuming that the likelihood of
observing a neighborhood node is independent of
observing any other neighborhood node given the
feature representation of the source:
P r(NS(u)|f(u)) = Y ni NS (u) P r(ni|f(u)).
∈
model the conditional likelihood of every source-
neighborhood node pair as a softmax unit
parametrized by a dot product of their features: P
r(ni|f(u)) = exp(f(ni) · f(u)) P v V exp(f(v) ·
∈
f(u)). With the above assumptions, the objective
in Eq. 1 simplifies to: max f X u V − log Zu +
∈
X ni NS (u) f(ni) · f(u) .
∈
Given the linear nature of text, the notion of a
neighborhood can be naturally defined using a
sliding window over consecutive words.
Networks, however, are not linear, and thus a
richer notion of a neighborhood is needed. To
resolve this issue, we propose a randomized
procedure that samples many different
neighborhoods of a given source node u. The
neighborhoods NS(u) are not restricted to just
immediate neighbors but can have vastly different
structures depending on the sampling strategy S.
Search bias α
We define a 2nd order random walk with two
parameters p and q which guide the walk:
Consider a random walk that just traversed edge
(t, v) and now resides at node v (Figure 2). The
walk now needs to decide on the next step so it
evaluates the transition probabilities πvx on edges
(v, x) leading from v. We set the unnormalized
transition probability to
πvx = αpq(t, x) · wvx,
wvx = weight between node v and x
and dtx denotes the shortest path distance
between nodes t and x. Note that dtx must be one
of {0, 1, 2}, and hence, the two parameters are
necessary and sufficient to guide the walk.
Intuitively, parameters p and q control how fast
the walk explores and leaves the neighborhood of
starting node u. In particular, the parameters
allow our search procedure to (approximately)
interpolate between BFS and DFS and thereby
reflect an affinity for different notions of node
equivalences.
Formally, given a source node u, we simulate a
random walk of fixed length l. Let ci denote the
ith node in the walk, starting with c0 = u. Nodes
ci are generated by the following distribution:
P(ci = x | ci−1 = v) = (πvx Z if (v, x) E 0
∈
otherwise where πvx is the unnormalized
transition probability between nodes v and x, and
Z is the normalizing constant.
Return parameter, p. Parameter p controls the
likelihood of immediately revisiting a node in the
walk. Setting it to a high value (> max(q, 1))
ensures that we are less likely to sample an
alreadyvisited node in the following two steps
(unless the next node in the walk had no other
neighbor). This strategy encourages moderate
exploration and avoids 2-hop redundancy in
sampling. On the other hand, if p is low (< min(q,
1)), it would lead the walk to backtrack a step
(Figure 2) and this would keep the walk “local”
close to the starting node u. In-out parameter, q.
Parameter q allows the search to differentiate
between “inward” and “outward” nodes. Going
back to Figure 2, if q > 1, the random walk is
biased towards nodes close to node t. Such walks
obtain a local view of the underlying graph with
respect to the start node in the walk and
approximate BFS behavior in the sense that our
samples comprise of nodes within a small
locality. In contrast, if q < 1, the walk is more
inclined to visit nodes which are further away
from the node t. Such behavior is reflective of
DFS which encourages outward exploration.
However, an essential difference here is that we
achieve DFS-like exploration within the random
walk framework. Hence, the sampled nodes are
not at strictly increasing distances from a given
source node u, but in turn, we benefit from
tractable preprocessing and superior sampling
efficiency of random walks. Note that by setting
πv,x to be a function of the preceeding node in the
walk t, the random walks are 2nd order
Markovian.
Pseudo algorithm

More Related Content

What's hot

MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM ijwmn
 
Spectral cnn
Spectral cnnSpectral cnn
Spectral cnnBrian Kim
 
State-of-the-art Clustering Techniques: Support Vector Methods and Minimum Br...
State-of-the-art Clustering Techniques: Support Vector Methods and Minimum Br...State-of-the-art Clustering Techniques: Support Vector Methods and Minimum Br...
State-of-the-art Clustering Techniques: Support Vector Methods and Minimum Br...Vincenzo Russo
 
Recurrent Neural Networks
Recurrent Neural NetworksRecurrent Neural Networks
Recurrent Neural NetworksSharath TS
 
Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Krishna Nanda
 
(研究会輪読) Weight Uncertainty in Neural Networks
(研究会輪読) Weight Uncertainty in Neural Networks(研究会輪読) Weight Uncertainty in Neural Networks
(研究会輪読) Weight Uncertainty in Neural NetworksMasahiro Suzuki
 
Recurrent Neural Networks. Part 1: Theory
Recurrent Neural Networks. Part 1: TheoryRecurrent Neural Networks. Part 1: Theory
Recurrent Neural Networks. Part 1: TheoryAndrii Gakhov
 
DBSCAN (2014_11_25 06_21_12 UTC)
DBSCAN (2014_11_25 06_21_12 UTC)DBSCAN (2014_11_25 06_21_12 UTC)
DBSCAN (2014_11_25 06_21_12 UTC)Cory Cook
 
Dynamic time wrapping (dtw), vector quantization(vq), linear predictive codin...
Dynamic time wrapping (dtw), vector quantization(vq), linear predictive codin...Dynamic time wrapping (dtw), vector quantization(vq), linear predictive codin...
Dynamic time wrapping (dtw), vector quantization(vq), linear predictive codin...Tanjarul Islam Mishu
 
CHANG-RAHIMI-POURNAGHSHBAND_DIFFERENTIATED-SERVICE-QUEUING-DISCIPLINES-IN-NS3
CHANG-RAHIMI-POURNAGHSHBAND_DIFFERENTIATED-SERVICE-QUEUING-DISCIPLINES-IN-NS3CHANG-RAHIMI-POURNAGHSHBAND_DIFFERENTIATED-SERVICE-QUEUING-DISCIPLINES-IN-NS3
CHANG-RAHIMI-POURNAGHSHBAND_DIFFERENTIATED-SERVICE-QUEUING-DISCIPLINES-IN-NS3Robert Chang
 
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALSBLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALSIJNSA Journal
 
A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms
A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms
A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms ijcseit
 
Recurrent Neural Networks (D2L2 2017 UPC Deep Learning for Computer Vision)
Recurrent Neural Networks (D2L2 2017 UPC Deep Learning for Computer Vision)Recurrent Neural Networks (D2L2 2017 UPC Deep Learning for Computer Vision)
Recurrent Neural Networks (D2L2 2017 UPC Deep Learning for Computer Vision)Universitat Politècnica de Catalunya
 
Murpy's Machine Learning:14. Kernel
Murpy's Machine Learning:14. KernelMurpy's Machine Learning:14. Kernel
Murpy's Machine Learning:14. KernelJungkyu Lee
 
An introduction to deep learning
An introduction to deep learningAn introduction to deep learning
An introduction to deep learningVan Thanh
 

What's hot (20)

Dbscan algorithom
Dbscan algorithomDbscan algorithom
Dbscan algorithom
 
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM
 
Bn
BnBn
Bn
 
Spectral cnn
Spectral cnnSpectral cnn
Spectral cnn
 
State-of-the-art Clustering Techniques: Support Vector Methods and Minimum Br...
State-of-the-art Clustering Techniques: Support Vector Methods and Minimum Br...State-of-the-art Clustering Techniques: Support Vector Methods and Minimum Br...
State-of-the-art Clustering Techniques: Support Vector Methods and Minimum Br...
 
Recurrent Neural Networks
Recurrent Neural NetworksRecurrent Neural Networks
Recurrent Neural Networks
 
Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1
 
(研究会輪読) Weight Uncertainty in Neural Networks
(研究会輪読) Weight Uncertainty in Neural Networks(研究会輪読) Weight Uncertainty in Neural Networks
(研究会輪読) Weight Uncertainty in Neural Networks
 
Recurrent Neural Networks. Part 1: Theory
Recurrent Neural Networks. Part 1: TheoryRecurrent Neural Networks. Part 1: Theory
Recurrent Neural Networks. Part 1: Theory
 
DBSCAN (2014_11_25 06_21_12 UTC)
DBSCAN (2014_11_25 06_21_12 UTC)DBSCAN (2014_11_25 06_21_12 UTC)
DBSCAN (2014_11_25 06_21_12 UTC)
 
Dynamic time wrapping (dtw), vector quantization(vq), linear predictive codin...
Dynamic time wrapping (dtw), vector quantization(vq), linear predictive codin...Dynamic time wrapping (dtw), vector quantization(vq), linear predictive codin...
Dynamic time wrapping (dtw), vector quantization(vq), linear predictive codin...
 
Paper_KST
Paper_KSTPaper_KST
Paper_KST
 
CHANG-RAHIMI-POURNAGHSHBAND_DIFFERENTIATED-SERVICE-QUEUING-DISCIPLINES-IN-NS3
CHANG-RAHIMI-POURNAGHSHBAND_DIFFERENTIATED-SERVICE-QUEUING-DISCIPLINES-IN-NS3CHANG-RAHIMI-POURNAGHSHBAND_DIFFERENTIATED-SERVICE-QUEUING-DISCIPLINES-IN-NS3
CHANG-RAHIMI-POURNAGHSHBAND_DIFFERENTIATED-SERVICE-QUEUING-DISCIPLINES-IN-NS3
 
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALSBLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
 
A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms
A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms
A Novel Dencos Model For High Dimensional Data Using Genetic Algorithms
 
Recurrent Neural Networks (D2L2 2017 UPC Deep Learning for Computer Vision)
Recurrent Neural Networks (D2L2 2017 UPC Deep Learning for Computer Vision)Recurrent Neural Networks (D2L2 2017 UPC Deep Learning for Computer Vision)
Recurrent Neural Networks (D2L2 2017 UPC Deep Learning for Computer Vision)
 
Murpy's Machine Learning:14. Kernel
Murpy's Machine Learning:14. KernelMurpy's Machine Learning:14. Kernel
Murpy's Machine Learning:14. Kernel
 
Multidimensional RNN
Multidimensional RNNMultidimensional RNN
Multidimensional RNN
 
An introduction to deep learning
An introduction to deep learningAn introduction to deep learning
An introduction to deep learning
 
ML-GCN
ML-GCNML-GCN
ML-GCN
 

Similar to Deepwalk vs Node2vec

Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...Vladimir Kulyukin
 
The Effect of Network Topology on Geographic Routing Performance in Localized...
The Effect of Network Topology on Geographic Routing Performance in Localized...The Effect of Network Topology on Geographic Routing Performance in Localized...
The Effect of Network Topology on Geographic Routing Performance in Localized...IDES Editor
 
Xtc a practical topology control algorithm for ad hoc networks (synopsis)
Xtc a practical topology control algorithm for ad hoc networks (synopsis)Xtc a practical topology control algorithm for ad hoc networks (synopsis)
Xtc a practical topology control algorithm for ad hoc networks (synopsis)Mumbai Academisc
 
Link Prediction in the Real World
Link Prediction in the Real WorldLink Prediction in the Real World
Link Prediction in the Real WorldBalaji Ganesan
 
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...ijcsit
 
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...AIRCC Publishing Corporation
 
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...AIRCC Publishing Corporation
 
On the Implementation of Goldberg's Maximum Flow Algorithm in Extended Mixed ...
On the Implementation of Goldberg's Maximum Flow Algorithm in Extended Mixed ...On the Implementation of Goldberg's Maximum Flow Algorithm in Extended Mixed ...
On the Implementation of Goldberg's Maximum Flow Algorithm in Extended Mixed ...AIRCC Publishing Corporation
 
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksThe Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksGiselleginaGloria
 
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksThe Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksFransiskeran
 
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksThe Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networksgraphhoc
 
240401_JW_labseminar[LINE: Large-scale Information Network Embeddin].pptx
240401_JW_labseminar[LINE: Large-scale Information Network Embeddin].pptx240401_JW_labseminar[LINE: Large-scale Information Network Embeddin].pptx
240401_JW_labseminar[LINE: Large-scale Information Network Embeddin].pptxthanhdowork
 

Similar to Deepwalk vs Node2vec (20)

Deepwalk vs Node2vec
Deepwalk vs Node2vecDeepwalk vs Node2vec
Deepwalk vs Node2vec
 
Line
LineLine
Line
 
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...
Connect-the-Dots in a Graph and Buffon's Needle on a Chessboard: Two Problems...
 
Iclr2016 vaeまとめ
Iclr2016 vaeまとめIclr2016 vaeまとめ
Iclr2016 vaeまとめ
 
Slides4
Slides4Slides4
Slides4
 
The Effect of Network Topology on Geographic Routing Performance in Localized...
The Effect of Network Topology on Geographic Routing Performance in Localized...The Effect of Network Topology on Geographic Routing Performance in Localized...
The Effect of Network Topology on Geographic Routing Performance in Localized...
 
Dijkstra
DijkstraDijkstra
Dijkstra
 
d
dd
d
 
Xtc a practical topology control algorithm for ad hoc networks (synopsis)
Xtc a practical topology control algorithm for ad hoc networks (synopsis)Xtc a practical topology control algorithm for ad hoc networks (synopsis)
Xtc a practical topology control algorithm for ad hoc networks (synopsis)
 
Link Prediction in the Real World
Link Prediction in the Real WorldLink Prediction in the Real World
Link Prediction in the Real World
 
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
 
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
 
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED ...
 
5.2_video_slides.pptx
5.2_video_slides.pptx5.2_video_slides.pptx
5.2_video_slides.pptx
 
On the Implementation of Goldberg's Maximum Flow Algorithm in Extended Mixed ...
On the Implementation of Goldberg's Maximum Flow Algorithm in Extended Mixed ...On the Implementation of Goldberg's Maximum Flow Algorithm in Extended Mixed ...
On the Implementation of Goldberg's Maximum Flow Algorithm in Extended Mixed ...
 
Cnetwork
CnetworkCnetwork
Cnetwork
 
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksThe Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
 
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksThe Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
 
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksThe Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
 
240401_JW_labseminar[LINE: Large-scale Information Network Embeddin].pptx
240401_JW_labseminar[LINE: Large-scale Information Network Embeddin].pptx240401_JW_labseminar[LINE: Large-scale Information Network Embeddin].pptx
240401_JW_labseminar[LINE: Large-scale Information Network Embeddin].pptx
 

Recently uploaded

1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfgstagge
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一fhwihughh
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceSapana Sha
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 

Recently uploaded (20)

1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts Service
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 

Deepwalk vs Node2vec

  • 2. Networks  A flexible and general data structure.  Many types of data can be formulated as networks.  Universal language for describing complex data.  Networks from science, nature, and technology are more similar than one would expect.
  • 3. Classical ML tasks in networks  Node classification - Predict a type of a given node  Link prediction - Predict whether two nodes are linked  Community detection - Identify densely linked clusters of nodes  Network similarity - How similar are two (sub)networks.
  • 4. Graph Embedding Graph Embedding is an approach that is used to transform nodes, edges, and their features into vector space (a lower dimension) whilst maximally preserving properties like graph structure and information.
  • 5. DeepWalk DeepWalk uses local information obtained from truncated random walks to learn latent representations by treating walks as the equivalent of sentences.
  • 6. Deepwalk learns social representations of a graph’s vertices, by modeling a stream of short random walks. Social representations are latent features of the vertices that capture neighborhood similarity and community membership. DeepWalk takes a graph as input and produces a latent representation as an output. The result of applying our method to the well-studied Karate network is shown
  • 7. Connection: Power laws The frequency which vertices appear in the short random walks will also follow a power-law distribution. Word frequency in natural language follows a similar distribution, and techniques from language modeling account for this distributional behavior.
  • 9. SkipGram SkipGram is an algorithm that is used to create word embeddings i.e. high-dimensional vector representation of words. These embeddings are meant to encode the semantic meaning of words such that words that are semantically similar will lie close to each other in that vector's space.
  • 10. Hierarchical Softmax If we assign the vertices to the leaves of a binary tree, the prediction problem turns into maximizing the probability of a specific path in the tree. If the path to vertex uk is identified by a sequence of tree nodes (b0, b1, . . . , bdlog |V |e), (b0 = root, bdlog |V |e = uk) then Pr(uk | Φ(vj )) = dlog Y |V |e l=1 Pr(bl | Φ(vj )) Now, Pr(bl | Φ(vj )) could be modeled by a binary classifier that is assigned to the parent of the node bl. This reduces the computational complexity of calculating Pr(uk | Φ(vj )) from O(|V |) to O(log | V |).
  • 11. Node2vec Node2vec, an algorithmic framework for learning continuous feature representations for nodes in networks. In node2vec, we learn a mapping of nodes to a low-dimensional space of features that maximizes the likelihood of preserving network neighborhoods of nodes. We define a flexible notion of a node’s network neighborhood and design a biased random walk procedure, which efficiently explores diverse neighborhoods. Our algorithm generalizes prior work which is based on rigid notions of network neighborhoods, and we argue that the added flexibility in exploring neighborhoods is the key to learning richer representations.
  • 12. BFS Neighborhood is restricted to nodes which are immediate neighbors of the source . For a neighborhood of size k=3 BFS samples nodes s1,s2,s3 BFS <-> Structural Equivalence Nodes that have similar structural roles in networks should be embedded closely together. E.g., nodes u and s6 in fig Restricting search to nearby nodes, BFS gives microscopic view. Network roles such as bridges and hubs can be inferred using BFS.
  • 13. DFS Neighborhood consists of nodes sequentially sampled at increasing distances from the source node . For a neighborhood of size k=3 DFS samples nodes s4,s5,s6 . DFS <-> Homophily Nodes that are highly interconnected and belong to similar network communities should be embedded closely together. E.g., nodes u and s1 in fig DFS sampled nodes reflect a macro-view of nodes neighborhood.
  • 14. Drawbacks of DeepWalk DeepWalk: learns d-dimensional feature representations by simulating uniform random walks. Can be observed as a special case of node2vec with parameters p = 1 & q = 1. Networks represent a mixture of homophily and structural equivalence, which are not effectively covered by the above method.
  • 15. Feature Learning Framework Let G = (V, E) be a given network. applies to any (un)directed, (un)weighted network. Let f : V → R d be the mapping function from nodes to feature representaions . Here d is a parameter specifying the number of dimensions of our feature representation. Equivalently, f is a matrix of size |V | × d parameters. For every source node u V , we define NS(u) V as a network ∈ ⊂ neighborhood of node u generated through a neighborhood sampling strategy S. f: max f X u V log P r(NS(u)|f(u)) ∈ Conditional independence. We factorize the likelihood by assuming that the likelihood of observing a neighborhood node is independent of observing any other neighborhood node given the feature representation of the source: P r(NS(u)|f(u)) = Y ni NS (u) P r(ni|f(u)). ∈ model the conditional likelihood of every source- neighborhood node pair as a softmax unit parametrized by a dot product of their features: P r(ni|f(u)) = exp(f(ni) · f(u)) P v V exp(f(v) · ∈ f(u)). With the above assumptions, the objective
  • 16. in Eq. 1 simplifies to: max f X u V − log Zu + ∈ X ni NS (u) f(ni) · f(u) . ∈ Given the linear nature of text, the notion of a neighborhood can be naturally defined using a sliding window over consecutive words. Networks, however, are not linear, and thus a richer notion of a neighborhood is needed. To resolve this issue, we propose a randomized procedure that samples many different neighborhoods of a given source node u. The neighborhoods NS(u) are not restricted to just immediate neighbors but can have vastly different structures depending on the sampling strategy S. Search bias α We define a 2nd order random walk with two parameters p and q which guide the walk: Consider a random walk that just traversed edge (t, v) and now resides at node v (Figure 2). The walk now needs to decide on the next step so it evaluates the transition probabilities πvx on edges (v, x) leading from v. We set the unnormalized transition probability to
  • 17. πvx = αpq(t, x) · wvx, wvx = weight between node v and x and dtx denotes the shortest path distance between nodes t and x. Note that dtx must be one of {0, 1, 2}, and hence, the two parameters are necessary and sufficient to guide the walk. Intuitively, parameters p and q control how fast the walk explores and leaves the neighborhood of starting node u. In particular, the parameters allow our search procedure to (approximately) interpolate between BFS and DFS and thereby reflect an affinity for different notions of node equivalences.
  • 18. Formally, given a source node u, we simulate a random walk of fixed length l. Let ci denote the ith node in the walk, starting with c0 = u. Nodes ci are generated by the following distribution: P(ci = x | ci−1 = v) = (πvx Z if (v, x) E 0 ∈ otherwise where πvx is the unnormalized transition probability between nodes v and x, and Z is the normalizing constant. Return parameter, p. Parameter p controls the likelihood of immediately revisiting a node in the walk. Setting it to a high value (> max(q, 1)) ensures that we are less likely to sample an alreadyvisited node in the following two steps (unless the next node in the walk had no other neighbor). This strategy encourages moderate exploration and avoids 2-hop redundancy in
  • 19. sampling. On the other hand, if p is low (< min(q, 1)), it would lead the walk to backtrack a step (Figure 2) and this would keep the walk “local” close to the starting node u. In-out parameter, q. Parameter q allows the search to differentiate between “inward” and “outward” nodes. Going back to Figure 2, if q > 1, the random walk is biased towards nodes close to node t. Such walks obtain a local view of the underlying graph with respect to the start node in the walk and approximate BFS behavior in the sense that our samples comprise of nodes within a small locality. In contrast, if q < 1, the walk is more inclined to visit nodes which are further away from the node t. Such behavior is reflective of DFS which encourages outward exploration. However, an essential difference here is that we achieve DFS-like exploration within the random walk framework. Hence, the sampled nodes are not at strictly increasing distances from a given source node u, but in turn, we benefit from tractable preprocessing and superior sampling efficiency of random walks. Note that by setting πv,x to be a function of the preceeding node in the walk t, the random walks are 2nd order Markovian.