SlideShare a Scribd company logo
1 of 26
Download to read offline
Assesing the Effects of a soft Cut-off in the
                            Twitter Social Network

                          Saptarshi Ghosh,Ajitesh Shrivastava,Niloy Ganguly


                                                   Madhur D. Amilkanthwar
                                                     Niharjyoti Sarangi


                                                         IIT Madras


                                                    April 13, 2012




Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)                        April 13, 2012   1 / 26
1    Introduction
   2    Empirical Measurements on Twitter Social Network
          Scatter plot
   3    Modeling Restricted Growth Dynamics of OSN
         Basic model proposed in WOSN Jun 2010
         Extending model
         Extending model
         Model Parameters for experiments
         Validation
   4    Insight of the Model
           Quantifying the fraction of users blocked due to restriction
           How does φs vary with κ and s?
           Using framework to design restrictions
           What values will maximize Utility?
   5    Conclusion

Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)             April 13, 2012   2 / 26
Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)   April 13, 2012   3 / 26
Introduction



           Preferential attachment model
           Twitter terminology–follower and following
           It is represented by directed edge U → V
           U is follower of V and V is following of U
           Soft-cutoff in Twitter
                         max
           κ% rule i.e. uout = max{2000, 1.1uin }..κ = 10 in Twitter




Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)           April 13, 2012   4 / 26
Empirical Measurements on Twitter Social Network




             Scater plot of followers-followings spread in Twitter:In Jan-Feb 2008
                                          Reproduced from Krishnamurthy WOSN 2008




Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)                              April 13, 2012   5 / 26
Scatter plot
   Scatter Plot after imposing restriction




         Scater plot of followers-followings spread in Twitter:In Oct-Nov 2009,after
                     restriction(along with lines x = 1.1y and x = 2000

Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)                  April 13, 2012   6 / 26
Degree distributions




   In-degree distribution(left): power-law over a large range of indegrees
   Out-degree distribution (right): sharp spike around outdegree 2000 due to
   blocked users

Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)        April 13, 2012   7 / 26
Goals



           Analyze effects of restriction in Twitter OSN

           Fraction of users likely to blocked?

           Design restrictions to balance between customer-satisfaction and
           system load

                   Desired system load
                   minimize customer dissatisfaction




Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)            April 13, 2012   8 / 26
Directed Network Growth Model[KRR Model]



           Original model proposed by Krapivsky et. al., PRL 86(23),
           2001,extended by authors

           Attachment: Newly created node attaches itself to existing node V
           which is chosen preferentially

           Creation: Existing user U follows another existing user V.U is chosen
           based on outdegree(Social activity) and V is chosen based on
           indegree(popularity)




Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)             April 13, 2012   9 / 26
Basic model proposed in WOSN Jun 2010



           Let Nij be average number of (i, j) nodes in network at time t.
           Probability of new node attaches to to an node (i, j) assumed to be
           proportional to (i + λ).
           Analogously,probability of event 2 ∝(i+λ)(j + µ)

                                                                         1
                                                  1, if j ≤ max{s, i(1 + k )},
                                      βij =
                                                  0, otherwise




Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)                           April 13, 2012   10 / 26
Basic model proposed in WOSN Jun 2010


   Change in Nij due to change in out-degree of nodes
                                 dNij                (j−1+µ)Ni,j−1 βij −(j+µ)Nij βi,j+1
                                  dt |out     =q
                                                             ij (j+µ)Nij βi,j+1



   Change in Nij due to change in in-degree of nodes
                                         dNij            (i−1+λ)Ni−1,j −(i+λ)Nij
                                          dt |in    =
                                                                ij (i+λ)Nij



   Total rate of change in Nij (t) is given by
                                       dNij       dNij             dNij
                                        dt    =    dt |out     +    dt |in    + pδi0 δj1
   last term accounts for the introduction of new nodes with in-degree 0 and out-degree 1 and Kronecker’s delta function δxy is 1
   for x = y and 0 otherwise




Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)                                                  April 13, 2012      11 / 26
Extending model

   Let at time t
           N(t) -Total number of nodes in network
           I (t) -Total in-degree
           J(t) -Total out-degree At every timestep new edge is added but node
           is added with probability p So,

          N(t)=             ij   Nij = pt,          I (t) =         ij   iNij = J(t) =   ij   jNij = t

           By assuming that at a given time number of users blocked from
           increasing out-degree is negligible as compared to total number of
           nodes so denominator of reduces to.

                    ij (j    + µ)Nij βi,j+1              ij (j   + µ)Nij = (J + µN)


Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)                                        April 13, 2012   12 / 26
Extending model



   By substituting Nij (t) = nij t it reduces to

             (i−1+λ)ni−1,j −(i+λ)nij             q(j−1+µ)ni,j−1 βij −q(j+µ)nij βi,j+1
   nij =            1+λp                     +                1+µp                      + pδi0 δj1

           Njout (t) = i Nij (t)-Total number of nodes with out-degree j at t.
           Njout (t) = t i nij = t.gj     [KRR Model]
                  where gj = i nij
                                            g
           Fraction of nodes with degree j= pj




Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)                                    April 13, 2012   13 / 26
Case 1:j < s
               Γ(j+µ)                                    −1 +µpq −1 )
   gj = G Γ(j+1+q−1 +µq−1 ) ∼ j −(1+q


   Case 2:j = s
                    1
   Let α =            1
                  (1+ k )
   So node can have outdegree j if i ≥ α(j + 1).Hence for j = s
                                           q(s−1+µ)ni,s−1
                                  Ais +        1+µp       ,              if i < α(s + 1)
                       nij =               q(s−1+µ)ni,s−1 −q(s+µ)nis
                                  Ais +             1+µp             ,   if i ≥ α(s + 1)

   Summing for i ≥ 0 gs reduces to

                                  s−1+µ             s+µ                        α(s+1)
                      gs = gs−1 s+(1+µ)q−1 + Cs s+(1+µ)q−1 ; Cs =             0          nis

   Cs is rate on increase in the number of nodes who have outdegree s but
   cannot because of restriction.

Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)                                  April 13, 2012   14 / 26
Case 3:j > s
                    
                    0,
                                                                  if i < α(j)
                                     q(j−1+µ)ni,j−1
               nij = Aij +               1+µp       ,              if αj ≤ i < α(j + 1)
                                     q(j−1+µ)ni,j−1 −q(j+µ)nij
                    
                     Aij +                                     ,   if i ≥ α(j + 1)
                    
                                              1+µp

   Solving it for every possible value of i we get,
                                                 j−1+µ             j+µ
                           gj = [gj−1 − Cj−1 ] j+(1+µ)q−1 + Cj j+(1+µ)q−1




Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)                           April 13, 2012   15 / 26
Model Parameters for experiments




                                                              µ+1
                                                         λ=    q


           Number of nodes set to 100,000
           Soft-cut off=100
           close to empirical data found at around µ = 6.0 and exact match
           found to be µ > 50




Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)              April 13, 2012   16 / 26
Validation




   (a)Agreement between simulation and propsed model,exactly matches.




Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)     April 13, 2012   17 / 26
Insight of the Model

               s−1+µ            s+µ                                        α(s+1)
   gs = gs−1 s+(1+µ)q−1 + Cs s+(1+µ)q−1 ; Cs =                            0         nis

   Summing in above range Cs is
                                            1                   d
                         Cs = (s − 1 + µ) 1+λp                  i−0 ni,s−1   − (d + λ)nds

   where nds can be found as
                                   (s+µ−1)(Γ(d+λ))           d   Γ(k+λ(1+p)+1)
                        nds =       Γ(d+λ(1+p)+2             k=0     Γ(k+λ)    nk,s−1

   Fraction of users blocked will be
                                                            s+µ      Cs
                                                φs =     s+(1+µ)q −1 p

   for s >> µ and q                 1
                                                                Cs
                                                         φs =   p

Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)                                    April 13, 2012   18 / 26
How does φs vary with κ and s?




                           Variation of fraction of users bloked at j = s
                         (a)with s (log-log plot) (b)with κ(p=0.028,µ = 6.0)




Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)                      April 13, 2012   19 / 26
Conclusions from variation of φs




   φs i.e fraction of users that might be blocked
     1 Varies inversely proportional to network density p(joining of new users

        dominates link-creation)
       2   Inversely proportional to randomness parameter µ
       3   Parabolically increase with κ
       4   Inversely proportional to s

Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)         April 13, 2012   20 / 26
Using framework to design restrictions



           Utility function U = L − wu B
           L:Reduction in the number of links due to restriction
           wu :Relative weight given to the objective of minimizing
           user-dissatisfaction
           B:fraction of blocked users.
                    L = j≥s jgj0 − j≥s jgj

           gj as defined earlier
           gj0 quantity in unrestricted network




Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)            April 13, 2012   21 / 26
What values will maximize Utility?




                       (a)Variation of U with s(b)with κ with fixed s = 2000



Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)                  April 13, 2012   22 / 26
Conclusions drawn from variation of U



           Variation of U with s
                   For low wu low cut-off is best choice.
                   As wu increases,low values of s reduce U since large fraction of users
                   gets blocked;hence optimal s occur at higher values.
                   Optimal s in case of wu = 50 matches with 2000.

           Variation of U with κ
                   For low wu , U increases with κ
                   For higher wu , U decreases with κ




Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)                     April 13, 2012   23 / 26
Conclusion



           Variation of fraction of blocked users with various parameters

           Utility function

           Soft-cutoff Vs. Hard-cutoff

           Soft-cutoffs...facebook?

           Estimating the population of spammers




Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)            April 13, 2012   24 / 26
References



   [1] Saptarshi Ghosh, Gautam Korlam, and Niloy Ganguly. The effects of re-
   strictions on number of connections in osns: a case-study on twitter. In Pro-
   ceedings of the 3rd conference on Online social networks, WOSN10, pages 1010,
   Berkeley, CA, USA, 2010. USENIX Association.
   [2] Saptarshi Ghosh, Ajitesh Srivastava, and Niloy Ganguly. Assessing the effects
   of a soft cut-off in the twitter social network. In Proceedings of the 10th
   international IFIP TC 6 conference on Networking - Volume Part II, NET-
   WORKING11, pages 288300, Berlin, Heidelberg, 2011. Springer-Verlag.
   [3]Krapvisky,P.L.,Rodgers, G.J.,Redner, S.:Degree distributions of growing
   networks.Phys.Rev.Lett. 86(23),5401-5404 (Jun 2001)




Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)              April 13, 2012   25 / 26
The End...Questions Please!




Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras)                April 13, 2012   26 / 26

More Related Content

What's hot

NONSTATIONARY RELAXED MULTISPLITTING METHODS FOR SOLVING LINEAR COMPLEMENTARI...
NONSTATIONARY RELAXED MULTISPLITTING METHODS FOR SOLVING LINEAR COMPLEMENTARI...NONSTATIONARY RELAXED MULTISPLITTING METHODS FOR SOLVING LINEAR COMPLEMENTARI...
NONSTATIONARY RELAXED MULTISPLITTING METHODS FOR SOLVING LINEAR COMPLEMENTARI...ijcsa
 
On generalized dislocated quasi metrics
On generalized dislocated quasi metricsOn generalized dislocated quasi metrics
On generalized dislocated quasi metricsAlexander Decker
 
11.on generalized dislocated quasi metrics
11.on generalized dislocated quasi metrics11.on generalized dislocated quasi metrics
11.on generalized dislocated quasi metricsAlexander Decker
 
WABI2012-SuccinctMultibitTree
WABI2012-SuccinctMultibitTreeWABI2012-SuccinctMultibitTree
WABI2012-SuccinctMultibitTreeYasuo Tabei
 
Mlab2012 tabei 20120806
Mlab2012 tabei 20120806Mlab2012 tabei 20120806
Mlab2012 tabei 20120806Yasuo Tabei
 
Conditional neural processes
Conditional neural processesConditional neural processes
Conditional neural processesKazuki Fujikawa
 
Introductory maths analysis chapter 14 official
Introductory maths analysis   chapter 14 officialIntroductory maths analysis   chapter 14 official
Introductory maths analysis chapter 14 officialEvert Sandye Taasiringan
 
Introductory maths analysis chapter 09 official
Introductory maths analysis   chapter 09 officialIntroductory maths analysis   chapter 09 official
Introductory maths analysis chapter 09 officialEvert Sandye Taasiringan
 
Nonconvex separable programming problem for optimal raw material mix in flexi...
Nonconvex separable programming problem for optimal raw material mix in flexi...Nonconvex separable programming problem for optimal raw material mix in flexi...
Nonconvex separable programming problem for optimal raw material mix in flexi...Alexander Decker
 
Optimal placement and sizing of multi
Optimal placement and sizing of multi Optimal placement and sizing of multi
Optimal placement and sizing of multi Jitendra Bhadoriya
 
34032 green func
34032 green func34032 green func
34032 green funcansarixxx
 
Introduction to Neural Netwoks
Introduction to Neural Netwoks Introduction to Neural Netwoks
Introduction to Neural Netwoks Abdallah Bashir
 
Introductory maths analysis chapter 17 official
Introductory maths analysis   chapter 17 officialIntroductory maths analysis   chapter 17 official
Introductory maths analysis chapter 17 officialEvert Sandye Taasiringan
 
Flexural analysis of thick beams using single
Flexural analysis of thick beams using singleFlexural analysis of thick beams using single
Flexural analysis of thick beams using singleiaemedu
 
Introductory maths analysis chapter 12 official
Introductory maths analysis   chapter 12 officialIntroductory maths analysis   chapter 12 official
Introductory maths analysis chapter 12 officialEvert Sandye Taasiringan
 
Introductory maths analysis chapter 00 official
Introductory maths analysis   chapter 00 officialIntroductory maths analysis   chapter 00 official
Introductory maths analysis chapter 00 officialEvert Sandye Taasiringan
 

What's hot (16)

NONSTATIONARY RELAXED MULTISPLITTING METHODS FOR SOLVING LINEAR COMPLEMENTARI...
NONSTATIONARY RELAXED MULTISPLITTING METHODS FOR SOLVING LINEAR COMPLEMENTARI...NONSTATIONARY RELAXED MULTISPLITTING METHODS FOR SOLVING LINEAR COMPLEMENTARI...
NONSTATIONARY RELAXED MULTISPLITTING METHODS FOR SOLVING LINEAR COMPLEMENTARI...
 
On generalized dislocated quasi metrics
On generalized dislocated quasi metricsOn generalized dislocated quasi metrics
On generalized dislocated quasi metrics
 
11.on generalized dislocated quasi metrics
11.on generalized dislocated quasi metrics11.on generalized dislocated quasi metrics
11.on generalized dislocated quasi metrics
 
WABI2012-SuccinctMultibitTree
WABI2012-SuccinctMultibitTreeWABI2012-SuccinctMultibitTree
WABI2012-SuccinctMultibitTree
 
Mlab2012 tabei 20120806
Mlab2012 tabei 20120806Mlab2012 tabei 20120806
Mlab2012 tabei 20120806
 
Conditional neural processes
Conditional neural processesConditional neural processes
Conditional neural processes
 
Introductory maths analysis chapter 14 official
Introductory maths analysis   chapter 14 officialIntroductory maths analysis   chapter 14 official
Introductory maths analysis chapter 14 official
 
Introductory maths analysis chapter 09 official
Introductory maths analysis   chapter 09 officialIntroductory maths analysis   chapter 09 official
Introductory maths analysis chapter 09 official
 
Nonconvex separable programming problem for optimal raw material mix in flexi...
Nonconvex separable programming problem for optimal raw material mix in flexi...Nonconvex separable programming problem for optimal raw material mix in flexi...
Nonconvex separable programming problem for optimal raw material mix in flexi...
 
Optimal placement and sizing of multi
Optimal placement and sizing of multi Optimal placement and sizing of multi
Optimal placement and sizing of multi
 
34032 green func
34032 green func34032 green func
34032 green func
 
Introduction to Neural Netwoks
Introduction to Neural Netwoks Introduction to Neural Netwoks
Introduction to Neural Netwoks
 
Introductory maths analysis chapter 17 official
Introductory maths analysis   chapter 17 officialIntroductory maths analysis   chapter 17 official
Introductory maths analysis chapter 17 official
 
Flexural analysis of thick beams using single
Flexural analysis of thick beams using singleFlexural analysis of thick beams using single
Flexural analysis of thick beams using single
 
Introductory maths analysis chapter 12 official
Introductory maths analysis   chapter 12 officialIntroductory maths analysis   chapter 12 official
Introductory maths analysis chapter 12 official
 
Introductory maths analysis chapter 00 official
Introductory maths analysis   chapter 00 officialIntroductory maths analysis   chapter 00 official
Introductory maths analysis chapter 00 official
 

Viewers also liked

A machine learning approach to building domain specific search
A machine learning approach to building domain specific searchA machine learning approach to building domain specific search
A machine learning approach to building domain specific searchNiharjyoti Sarangi
 
A Knowledge Discovery Framework for Planetary Defense
A Knowledge Discovery Framework for Planetary DefenseA Knowledge Discovery Framework for Planetary Defense
A Knowledge Discovery Framework for Planetary DefenseYongyao Jiang
 

Viewers also liked (6)

Approximate Tree Kernels
Approximate Tree KernelsApproximate Tree Kernels
Approximate Tree Kernels
 
When Why What of WWW
When Why What of WWWWhen Why What of WWW
When Why What of WWW
 
Web 3.0 :The Evolution of Web
Web 3.0:The Evolution of WebWeb 3.0:The Evolution of Web
Web 3.0 :The Evolution of Web
 
A machine learning approach to building domain specific search
A machine learning approach to building domain specific searchA machine learning approach to building domain specific search
A machine learning approach to building domain specific search
 
MUDROD - Ranking
MUDROD - RankingMUDROD - Ranking
MUDROD - Ranking
 
A Knowledge Discovery Framework for Planetary Defense
A Knowledge Discovery Framework for Planetary DefenseA Knowledge Discovery Framework for Planetary Defense
A Knowledge Discovery Framework for Planetary Defense
 

Similar to Analyzing Soft Cut-off in Twitter

Observations on Ternary Quadratic Equation z2 = 82x2 +y2
Observations on Ternary Quadratic Equation z2 = 82x2 +y2Observations on Ternary Quadratic Equation z2 = 82x2 +y2
Observations on Ternary Quadratic Equation z2 = 82x2 +y2IRJET Journal
 
2017-03, ICASSP, Projection-based Dual Averaging for Stochastic Sparse Optimi...
2017-03, ICASSP, Projection-based Dual Averaging for Stochastic Sparse Optimi...2017-03, ICASSP, Projection-based Dual Averaging for Stochastic Sparse Optimi...
2017-03, ICASSP, Projection-based Dual Averaging for Stochastic Sparse Optimi...asahiushio1
 
Intro to network Science
Intro to network ScienceIntro to network Science
Intro to network SciencePyData
 
Accelerating Pseudo-Marginal MCMC using Gaussian Processes
Accelerating Pseudo-Marginal MCMC using Gaussian ProcessesAccelerating Pseudo-Marginal MCMC using Gaussian Processes
Accelerating Pseudo-Marginal MCMC using Gaussian ProcessesMatt Moores
 
Computational Information Geometry on Matrix Manifolds (ICTP 2013)
Computational Information Geometry on Matrix Manifolds (ICTP 2013)Computational Information Geometry on Matrix Manifolds (ICTP 2013)
Computational Information Geometry on Matrix Manifolds (ICTP 2013)Frank Nielsen
 
Simplified Runtime Analysis of Estimation of Distribution Algorithms
Simplified Runtime Analysis of Estimation of Distribution AlgorithmsSimplified Runtime Analysis of Estimation of Distribution Algorithms
Simplified Runtime Analysis of Estimation of Distribution AlgorithmsPK Lehre
 
Simplified Runtime Analysis of Estimation of Distribution Algorithms
Simplified Runtime Analysis of Estimation of Distribution AlgorithmsSimplified Runtime Analysis of Estimation of Distribution Algorithms
Simplified Runtime Analysis of Estimation of Distribution AlgorithmsPer Kristian Lehre
 
Simultaneous triple series equations
Simultaneous triple series equationsSimultaneous triple series equations
Simultaneous triple series equationsAlexander Decker
 
Simultaneous triple series equations
Simultaneous triple series equationsSimultaneous triple series equations
Simultaneous triple series equationsAlexander Decker
 
On estimating the integrated co volatility using
On estimating the integrated co volatility usingOn estimating the integrated co volatility using
On estimating the integrated co volatility usingkkislas
 
Design and Implementation of Parallel and Randomized Approximation Algorithms
Design and Implementation of Parallel and Randomized Approximation AlgorithmsDesign and Implementation of Parallel and Randomized Approximation Algorithms
Design and Implementation of Parallel and Randomized Approximation AlgorithmsAjay Bidyarthy
 
Normal density and discreminant analysis
Normal density and discreminant analysisNormal density and discreminant analysis
Normal density and discreminant analysisVARUN KUMAR
 
A new three-term conjugate gradient method with application to regression an...
A new three-term conjugate gradient method with application  to regression an...A new three-term conjugate gradient method with application  to regression an...
A new three-term conjugate gradient method with application to regression an...IJECEIAES
 
A kernel-free particle method: Smile Problem Resolved
A kernel-free particle method: Smile Problem ResolvedA kernel-free particle method: Smile Problem Resolved
A kernel-free particle method: Smile Problem ResolvedKaiju Capital Management
 
Bayesian Dark Knowledge and Matrix Factorization
Bayesian Dark Knowledge and Matrix FactorizationBayesian Dark Knowledge and Matrix Factorization
Bayesian Dark Knowledge and Matrix FactorizationPreferred Networks
 

Similar to Analyzing Soft Cut-off in Twitter (20)

Observations on Ternary Quadratic Equation z2 = 82x2 +y2
Observations on Ternary Quadratic Equation z2 = 82x2 +y2Observations on Ternary Quadratic Equation z2 = 82x2 +y2
Observations on Ternary Quadratic Equation z2 = 82x2 +y2
 
QMC: Operator Splitting Workshop, Incremental Learning-to-Learn with Statisti...
QMC: Operator Splitting Workshop, Incremental Learning-to-Learn with Statisti...QMC: Operator Splitting Workshop, Incremental Learning-to-Learn with Statisti...
QMC: Operator Splitting Workshop, Incremental Learning-to-Learn with Statisti...
 
2017-03, ICASSP, Projection-based Dual Averaging for Stochastic Sparse Optimi...
2017-03, ICASSP, Projection-based Dual Averaging for Stochastic Sparse Optimi...2017-03, ICASSP, Projection-based Dual Averaging for Stochastic Sparse Optimi...
2017-03, ICASSP, Projection-based Dual Averaging for Stochastic Sparse Optimi...
 
Intro to network Science
Intro to network ScienceIntro to network Science
Intro to network Science
 
Accelerating Pseudo-Marginal MCMC using Gaussian Processes
Accelerating Pseudo-Marginal MCMC using Gaussian ProcessesAccelerating Pseudo-Marginal MCMC using Gaussian Processes
Accelerating Pseudo-Marginal MCMC using Gaussian Processes
 
Computational Information Geometry on Matrix Manifolds (ICTP 2013)
Computational Information Geometry on Matrix Manifolds (ICTP 2013)Computational Information Geometry on Matrix Manifolds (ICTP 2013)
Computational Information Geometry on Matrix Manifolds (ICTP 2013)
 
Simplified Runtime Analysis of Estimation of Distribution Algorithms
Simplified Runtime Analysis of Estimation of Distribution AlgorithmsSimplified Runtime Analysis of Estimation of Distribution Algorithms
Simplified Runtime Analysis of Estimation of Distribution Algorithms
 
Simplified Runtime Analysis of Estimation of Distribution Algorithms
Simplified Runtime Analysis of Estimation of Distribution AlgorithmsSimplified Runtime Analysis of Estimation of Distribution Algorithms
Simplified Runtime Analysis of Estimation of Distribution Algorithms
 
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
 
Simultaneous triple series equations
Simultaneous triple series equationsSimultaneous triple series equations
Simultaneous triple series equations
 
Simultaneous triple series equations
Simultaneous triple series equationsSimultaneous triple series equations
Simultaneous triple series equations
 
On estimating the integrated co volatility using
On estimating the integrated co volatility usingOn estimating the integrated co volatility using
On estimating the integrated co volatility using
 
KAUST_talk_short.pdf
KAUST_talk_short.pdfKAUST_talk_short.pdf
KAUST_talk_short.pdf
 
Design and Implementation of Parallel and Randomized Approximation Algorithms
Design and Implementation of Parallel and Randomized Approximation AlgorithmsDesign and Implementation of Parallel and Randomized Approximation Algorithms
Design and Implementation of Parallel and Randomized Approximation Algorithms
 
Normal density and discreminant analysis
Normal density and discreminant analysisNormal density and discreminant analysis
Normal density and discreminant analysis
 
A new three-term conjugate gradient method with application to regression an...
A new three-term conjugate gradient method with application  to regression an...A new three-term conjugate gradient method with application  to regression an...
A new three-term conjugate gradient method with application to regression an...
 
A kernel-free particle method: Smile Problem Resolved
A kernel-free particle method: Smile Problem ResolvedA kernel-free particle method: Smile Problem Resolved
A kernel-free particle method: Smile Problem Resolved
 
QMC: Operator Splitting Workshop, Structured Decomposition of Multi-view Data...
QMC: Operator Splitting Workshop, Structured Decomposition of Multi-view Data...QMC: Operator Splitting Workshop, Structured Decomposition of Multi-view Data...
QMC: Operator Splitting Workshop, Structured Decomposition of Multi-view Data...
 
Bayesian Dark Knowledge and Matrix Factorization
Bayesian Dark Knowledge and Matrix FactorizationBayesian Dark Knowledge and Matrix Factorization
Bayesian Dark Knowledge and Matrix Factorization
 
main
mainmain
main
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Analyzing Soft Cut-off in Twitter

  • 1. Assesing the Effects of a soft Cut-off in the Twitter Social Network Saptarshi Ghosh,Ajitesh Shrivastava,Niloy Ganguly Madhur D. Amilkanthwar Niharjyoti Sarangi IIT Madras April 13, 2012 Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 1 / 26
  • 2. 1 Introduction 2 Empirical Measurements on Twitter Social Network Scatter plot 3 Modeling Restricted Growth Dynamics of OSN Basic model proposed in WOSN Jun 2010 Extending model Extending model Model Parameters for experiments Validation 4 Insight of the Model Quantifying the fraction of users blocked due to restriction How does φs vary with κ and s? Using framework to design restrictions What values will maximize Utility? 5 Conclusion Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 2 / 26
  • 3. Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 3 / 26
  • 4. Introduction Preferential attachment model Twitter terminology–follower and following It is represented by directed edge U → V U is follower of V and V is following of U Soft-cutoff in Twitter max κ% rule i.e. uout = max{2000, 1.1uin }..κ = 10 in Twitter Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 4 / 26
  • 5. Empirical Measurements on Twitter Social Network Scater plot of followers-followings spread in Twitter:In Jan-Feb 2008 Reproduced from Krishnamurthy WOSN 2008 Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 5 / 26
  • 6. Scatter plot Scatter Plot after imposing restriction Scater plot of followers-followings spread in Twitter:In Oct-Nov 2009,after restriction(along with lines x = 1.1y and x = 2000 Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 6 / 26
  • 7. Degree distributions In-degree distribution(left): power-law over a large range of indegrees Out-degree distribution (right): sharp spike around outdegree 2000 due to blocked users Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 7 / 26
  • 8. Goals Analyze effects of restriction in Twitter OSN Fraction of users likely to blocked? Design restrictions to balance between customer-satisfaction and system load Desired system load minimize customer dissatisfaction Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 8 / 26
  • 9. Directed Network Growth Model[KRR Model] Original model proposed by Krapivsky et. al., PRL 86(23), 2001,extended by authors Attachment: Newly created node attaches itself to existing node V which is chosen preferentially Creation: Existing user U follows another existing user V.U is chosen based on outdegree(Social activity) and V is chosen based on indegree(popularity) Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 9 / 26
  • 10. Basic model proposed in WOSN Jun 2010 Let Nij be average number of (i, j) nodes in network at time t. Probability of new node attaches to to an node (i, j) assumed to be proportional to (i + λ). Analogously,probability of event 2 ∝(i+λ)(j + µ) 1 1, if j ≤ max{s, i(1 + k )}, βij = 0, otherwise Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 10 / 26
  • 11. Basic model proposed in WOSN Jun 2010 Change in Nij due to change in out-degree of nodes dNij (j−1+µ)Ni,j−1 βij −(j+µ)Nij βi,j+1 dt |out =q ij (j+µ)Nij βi,j+1 Change in Nij due to change in in-degree of nodes dNij (i−1+λ)Ni−1,j −(i+λ)Nij dt |in = ij (i+λ)Nij Total rate of change in Nij (t) is given by dNij dNij dNij dt = dt |out + dt |in + pδi0 δj1 last term accounts for the introduction of new nodes with in-degree 0 and out-degree 1 and Kronecker’s delta function δxy is 1 for x = y and 0 otherwise Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 11 / 26
  • 12. Extending model Let at time t N(t) -Total number of nodes in network I (t) -Total in-degree J(t) -Total out-degree At every timestep new edge is added but node is added with probability p So, N(t)= ij Nij = pt, I (t) = ij iNij = J(t) = ij jNij = t By assuming that at a given time number of users blocked from increasing out-degree is negligible as compared to total number of nodes so denominator of reduces to. ij (j + µ)Nij βi,j+1 ij (j + µ)Nij = (J + µN) Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 12 / 26
  • 13. Extending model By substituting Nij (t) = nij t it reduces to (i−1+λ)ni−1,j −(i+λ)nij q(j−1+µ)ni,j−1 βij −q(j+µ)nij βi,j+1 nij = 1+λp + 1+µp + pδi0 δj1 Njout (t) = i Nij (t)-Total number of nodes with out-degree j at t. Njout (t) = t i nij = t.gj [KRR Model] where gj = i nij g Fraction of nodes with degree j= pj Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 13 / 26
  • 14. Case 1:j < s Γ(j+µ) −1 +µpq −1 ) gj = G Γ(j+1+q−1 +µq−1 ) ∼ j −(1+q Case 2:j = s 1 Let α = 1 (1+ k ) So node can have outdegree j if i ≥ α(j + 1).Hence for j = s q(s−1+µ)ni,s−1 Ais + 1+µp , if i < α(s + 1) nij = q(s−1+µ)ni,s−1 −q(s+µ)nis Ais + 1+µp , if i ≥ α(s + 1) Summing for i ≥ 0 gs reduces to s−1+µ s+µ α(s+1) gs = gs−1 s+(1+µ)q−1 + Cs s+(1+µ)q−1 ; Cs = 0 nis Cs is rate on increase in the number of nodes who have outdegree s but cannot because of restriction. Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 14 / 26
  • 15. Case 3:j > s  0,  if i < α(j) q(j−1+µ)ni,j−1 nij = Aij + 1+µp , if αj ≤ i < α(j + 1) q(j−1+µ)ni,j−1 −q(j+µ)nij  Aij + , if i ≥ α(j + 1)  1+µp Solving it for every possible value of i we get, j−1+µ j+µ gj = [gj−1 − Cj−1 ] j+(1+µ)q−1 + Cj j+(1+µ)q−1 Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 15 / 26
  • 16. Model Parameters for experiments µ+1 λ= q Number of nodes set to 100,000 Soft-cut off=100 close to empirical data found at around µ = 6.0 and exact match found to be µ > 50 Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 16 / 26
  • 17. Validation (a)Agreement between simulation and propsed model,exactly matches. Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 17 / 26
  • 18. Insight of the Model s−1+µ s+µ α(s+1) gs = gs−1 s+(1+µ)q−1 + Cs s+(1+µ)q−1 ; Cs = 0 nis Summing in above range Cs is 1 d Cs = (s − 1 + µ) 1+λp i−0 ni,s−1 − (d + λ)nds where nds can be found as (s+µ−1)(Γ(d+λ)) d Γ(k+λ(1+p)+1) nds = Γ(d+λ(1+p)+2 k=0 Γ(k+λ) nk,s−1 Fraction of users blocked will be s+µ Cs φs = s+(1+µ)q −1 p for s >> µ and q 1 Cs φs = p Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 18 / 26
  • 19. How does φs vary with κ and s? Variation of fraction of users bloked at j = s (a)with s (log-log plot) (b)with κ(p=0.028,µ = 6.0) Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 19 / 26
  • 20. Conclusions from variation of φs φs i.e fraction of users that might be blocked 1 Varies inversely proportional to network density p(joining of new users dominates link-creation) 2 Inversely proportional to randomness parameter µ 3 Parabolically increase with κ 4 Inversely proportional to s Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 20 / 26
  • 21. Using framework to design restrictions Utility function U = L − wu B L:Reduction in the number of links due to restriction wu :Relative weight given to the objective of minimizing user-dissatisfaction B:fraction of blocked users. L = j≥s jgj0 − j≥s jgj gj as defined earlier gj0 quantity in unrestricted network Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 21 / 26
  • 22. What values will maximize Utility? (a)Variation of U with s(b)with κ with fixed s = 2000 Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 22 / 26
  • 23. Conclusions drawn from variation of U Variation of U with s For low wu low cut-off is best choice. As wu increases,low values of s reduce U since large fraction of users gets blocked;hence optimal s occur at higher values. Optimal s in case of wu = 50 matches with 2000. Variation of U with κ For low wu , U increases with κ For higher wu , U decreases with κ Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 23 / 26
  • 24. Conclusion Variation of fraction of blocked users with various parameters Utility function Soft-cutoff Vs. Hard-cutoff Soft-cutoffs...facebook? Estimating the population of spammers Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 24 / 26
  • 25. References [1] Saptarshi Ghosh, Gautam Korlam, and Niloy Ganguly. The effects of re- strictions on number of connections in osns: a case-study on twitter. In Pro- ceedings of the 3rd conference on Online social networks, WOSN10, pages 1010, Berkeley, CA, USA, 2010. USENIX Association. [2] Saptarshi Ghosh, Ajitesh Srivastava, and Niloy Ganguly. Assessing the effects of a soft cut-off in the twitter social network. In Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part II, NET- WORKING11, pages 288300, Berlin, Heidelberg, 2011. Springer-Verlag. [3]Krapvisky,P.L.,Rodgers, G.J.,Redner, S.:Degree distributions of growing networks.Phys.Rev.Lett. 86(23),5401-5404 (Jun 2001) Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 25 / 26
  • 26. The End...Questions Please! Madhur D. Amilkanthwar Niharjyoti Sarangi (IIT Madras) April 13, 2012 26 / 26