SlideShare a Scribd company logo
Learning Multifractal Structure in Large Networks 
Austin Benson, Carlos Riquelme, Sven Schmit 
Stanford University 
f arbenson, rikel, schmit g @ stanford.edu 
Knowledge Discovery and Data Mining (KDD) 
August 26, 2014
Setting 
We want a simple, scalable method to model networks and generate 
random (undirected) graphs 
I Looking for graph generators that can mimic real world graph 
structure 
{ Power law degree distribution, 
{ High clustering coecient, etc. 
I Many models have been proposed, starting with Erdos-Renyi graphs 
I Relatively recent models: SKG [Leskovec et al. 2010], BTER 
[Seshadhri et al. 2012], TCL [Pfeier et al. 2012] 
I In 2011 Palla et al. introduce multifractal network generators, 
`generalizing' SKG 
2
Our contributions 
We propose methods to make MFNG a feasible framework to model large 
networks 
3
Our contributions 
We propose methods to make MFNG a feasible framework to model large 
networks 
I First, we give an intuitive theoretical result that opens the door to 
scalable estimation 
I We show how we can
t MFNG to graphs using mehod of moments 
estimation, with runtime independent of the size of the graph 
I We develop a fast heuristic for sampling MFNG 
I We demonstrate the ectiveness of our approach in synthetic and 
real world settings. 
3
An introduction to Multifractal Network Generators 
(MFNG) 
Ingredients 
I Number of nodes: n 
I Number of categories: m with speci
ed lenghts li 
I Number of recursive levels: k  logm(n) 
I Probabilities of edges between nodes, based on categories, stored in 
matrix P 2 [0; 1]mm 
4
Generating a graph with no recursion 
Let's consider the simple case
rst: k = 1 
I Begin with a line: [0; 1] 
I Divide the line in m intervals (or categories) with lengths 
l1; l2; : : : ; lm 
I Sample nodes on the line according to a uniform distribution: this 
gives every node a category 
x2 
 
x3 
c1 c2 
x1 
 
 
0 1 
5
From line to square 
c1 c2 
x3  
c2 
x2  
c1 
 
x1 
 
x2 
 
x3 
x1  
pc1;c1 
pc2;c2 
pc1;c2 
pc1;c2 
I For any two nodes u 2 ci; v 2 cj , add an edge with probability 
according to pci;cj 
6
Adding recursion 
For subsequent levels, we subdivide the intervals again to
nd categories 
of nodes in the next layer 
x2 
 
x3 
c1 c2 
x1 
 
 
0 1 
x1 
 
x2 
 
0 c1 c2 1 
7
Adding recursion 
For subsequent levels, we subdivide the intervals again to
nd categories 
of nodes in the next layer 
x2 
 
x3 
c1 c2 
x1 
 
 
0 1 
x1 
 
x2 
 
0 c1 c2 1 
Now add an edge between nodes by multiplying probabilities 
corresponding to categories in each layer. 
In the above two layer example 
I node x1 has categories (c1; c1), 
I node x2 has categories (c1; c2), and 
I node x3 has categories (c2; c2) 
And hence, we add edge (x1; x2) with probability pc1;c1pc1;c2 . 
7
Expanding the recursion 
So we can get a full probabilistic adjacency matrix Q 2 [0; 1]mkmk 
by 
expanding all recursive levels 
Problem: Q grows fast with k. Dicult to do inference. 
Intuitively, we should not have to do this. 
8
Main theoretical result 
Consider sampling k graphs from a MFNG with 1 recursive level, and 
construct a new graph G 
by taking the intersection over graphs: 
H1 H2 H3 G 
 
Then G 
has same distribution as a graph G generated from a MFNG 
with k recursive levels. 
9
Computing expected number of edges is easy 
p11 p12 
p22 
xi 
xj 
p13 
p23 
p33 
`1 `2 `3 
Prob((u; v) 2 E) = p = 
X3 
i=1 
X3 
j=1 
`i`jpij ; E fjEjg = 
 
n 
2 
 
pk 
So computing p is O(m2) instead of O(m2k). 
10
Computing moments of certain subgraphs is easy 
With above theory, we can easily compute the expected number of... 
I edges, wedges, 3-stars, 4-stars ... 
I triangles, 4-cliques... 
S2 S3 S4 K3 K4 
11
We can learn multifractal structure quickly 
Method of moments: 
1. Count number of wedges, 3-stars, triangles, 4-cliques, etc. in 
network of interest 
2. Try to
nd parameters such that the expected values, E[Fi], match 
the empirical counts, fi 
minimize 
P;`;r 
X 
i 
jfi  E[Fi]j 
fi 
subject to 0  pij = pji  1; 1  i  j  c 
0  `i  1; 1  i  c 
Xm 
i=1 
`i = 1 
Key idea: Once we have the counts (fi), this optimization routine is 
independent of the size of the graph. 
12

More Related Content

What's hot

Data transfer using bipartite graph
Data transfer using bipartite graphData transfer using bipartite graph
Data transfer using bipartite graph
SwathiSundari
 
Lightweight Address Hopping forDefending the IPv6 IoT
Lightweight Address Hopping forDefending the IPv6 IoTLightweight Address Hopping forDefending the IPv6 IoT
Lightweight Address Hopping forDefending the IPv6 IoT
José Francisco Chávez Carreón
 
Homomorphic encryption in_cloud
Homomorphic encryption in_cloudHomomorphic encryption in_cloud
Homomorphic encryption in_cloud
Shivam Singh
 
cryptography Application of linear algebra
cryptography Application of linear algebra cryptography Application of linear algebra
cryptography Application of linear algebra
Sami Ullah
 
Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms
cscpconf
 
1
11
Dijkstra's algorithm presentation
Dijkstra's algorithm presentationDijkstra's algorithm presentation
Dijkstra's algorithm presentation
Subid Biswas
 
Genetic Algorithm in Hill Cipher Encryption
Genetic Algorithm in Hill Cipher EncryptionGenetic Algorithm in Hill Cipher Encryption
Genetic Algorithm in Hill Cipher Encryption
Universitas Pembangunan Panca Budi
 
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLINGCRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
Journal For Research
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
alagumani1984
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
Marwa Hashem elsherif
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storage
Shivam Singh
 
Dijkstra's Algorithm
Dijkstra's AlgorithmDijkstra's Algorithm
Dijkstra's Algorithm
ArijitDhali
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipher
Aashirwad Kashyap
 
Time series predictions using LSTMs
Time series predictions using LSTMsTime series predictions using LSTMs
Time series predictions using LSTMs
Setu Chokshi
 
Deep Learning: R with Keras and TensorFlow
Deep Learning: R with Keras and TensorFlowDeep Learning: R with Keras and TensorFlow
Deep Learning: R with Keras and TensorFlow
Oswald Campesato
 
Algorithms Question bank
Algorithms Question bankAlgorithms Question bank
Algorithms Question bank
Shivalik college of engineering
 
Cloud computing and security final
Cloud computing and security finalCloud computing and security final
Cloud computing and security final
Akash Kamble
 
Scala and Deep Learning
Scala and Deep LearningScala and Deep Learning
Scala and Deep Learning
Oswald Campesato
 
C++ and Deep Learning
C++ and Deep LearningC++ and Deep Learning
C++ and Deep Learning
Oswald Campesato
 

What's hot (20)

Data transfer using bipartite graph
Data transfer using bipartite graphData transfer using bipartite graph
Data transfer using bipartite graph
 
Lightweight Address Hopping forDefending the IPv6 IoT
Lightweight Address Hopping forDefending the IPv6 IoTLightweight Address Hopping forDefending the IPv6 IoT
Lightweight Address Hopping forDefending the IPv6 IoT
 
Homomorphic encryption in_cloud
Homomorphic encryption in_cloudHomomorphic encryption in_cloud
Homomorphic encryption in_cloud
 
cryptography Application of linear algebra
cryptography Application of linear algebra cryptography Application of linear algebra
cryptography Application of linear algebra
 
Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms
 
1
11
1
 
Dijkstra's algorithm presentation
Dijkstra's algorithm presentationDijkstra's algorithm presentation
Dijkstra's algorithm presentation
 
Genetic Algorithm in Hill Cipher Encryption
Genetic Algorithm in Hill Cipher EncryptionGenetic Algorithm in Hill Cipher Encryption
Genetic Algorithm in Hill Cipher Encryption
 
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLINGCRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storage
 
Dijkstra's Algorithm
Dijkstra's AlgorithmDijkstra's Algorithm
Dijkstra's Algorithm
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipher
 
Time series predictions using LSTMs
Time series predictions using LSTMsTime series predictions using LSTMs
Time series predictions using LSTMs
 
Deep Learning: R with Keras and TensorFlow
Deep Learning: R with Keras and TensorFlowDeep Learning: R with Keras and TensorFlow
Deep Learning: R with Keras and TensorFlow
 
Algorithms Question bank
Algorithms Question bankAlgorithms Question bank
Algorithms Question bank
 
Cloud computing and security final
Cloud computing and security finalCloud computing and security final
Cloud computing and security final
 
Scala and Deep Learning
Scala and Deep LearningScala and Deep Learning
Scala and Deep Learning
 
C++ and Deep Learning
C++ and Deep LearningC++ and Deep Learning
C++ and Deep Learning
 

Similar to Learning multifractal structure in large networks (KDD 2014)

Learning multifractal structure in large networks (Purdue ML Seminar)
Learning multifractal structure in large networks (Purdue ML Seminar)Learning multifractal structure in large networks (Purdue ML Seminar)
Learning multifractal structure in large networks (Purdue ML Seminar)
Austin Benson
 
Modelling the Clustering Coefficient of a Random graph
Modelling the Clustering Coefficient of a Random graphModelling the Clustering Coefficient of a Random graph
Modelling the Clustering Coefficient of a Random graph
Graph-TA
 
PixelCNN, Wavenet, Normalizing Flows - Santiago Pascual - UPC Barcelona 2018
PixelCNN, Wavenet, Normalizing Flows - Santiago Pascual - UPC Barcelona 2018PixelCNN, Wavenet, Normalizing Flows - Santiago Pascual - UPC Barcelona 2018
PixelCNN, Wavenet, Normalizing Flows - Santiago Pascual - UPC Barcelona 2018
Universitat Politècnica de Catalunya
 
Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networks
mourya chandra
 
K means report
K means reportK means report
K means report
Gaurav Handa
 
Absorbing Random Walk Centrality
Absorbing Random Walk CentralityAbsorbing Random Walk Centrality
Absorbing Random Walk Centrality
Michael Mathioudakis
 
240603_Thanh_LabSeminar[Imagine That! Abstract-to-Intricate Text-to-Image Syn...
240603_Thanh_LabSeminar[Imagine That! Abstract-to-Intricate Text-to-Image Syn...240603_Thanh_LabSeminar[Imagine That! Abstract-to-Intricate Text-to-Image Syn...
240603_Thanh_LabSeminar[Imagine That! Abstract-to-Intricate Text-to-Image Syn...
thanhdowork
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
Alexander Decker
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
Sayantan Sur
 
How to share a secret
How to share a secretHow to share a secret
How to share a secret
Camilo Garrido
 
A simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representationsA simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representations
Devansh16
 
An Efficient Method of Partitioning High Volumes of Multidimensional Data for...
An Efficient Method of Partitioning High Volumes of Multidimensional Data for...An Efficient Method of Partitioning High Volumes of Multidimensional Data for...
An Efficient Method of Partitioning High Volumes of Multidimensional Data for...
IJERA Editor
 
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdfCD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
RajJain516913
 
Subquad multi ff
Subquad multi ffSubquad multi ff
Subquad multi ff
Fabian Velazquez
 
A NOVEL (K,N) SECRET SHARING SCHEME FROM QUADRATIC RESIDUES FOR GRAYSCALE IMAGES
A NOVEL (K,N) SECRET SHARING SCHEME FROM QUADRATIC RESIDUES FOR GRAYSCALE IMAGESA NOVEL (K,N) SECRET SHARING SCHEME FROM QUADRATIC RESIDUES FOR GRAYSCALE IMAGES
A NOVEL (K,N) SECRET SHARING SCHEME FROM QUADRATIC RESIDUES FOR GRAYSCALE IMAGES
IJNSA Journal
 
Chapter 11. Cluster Analysis Advanced Methods.ppt
Chapter 11. Cluster Analysis Advanced Methods.pptChapter 11. Cluster Analysis Advanced Methods.ppt
Chapter 11. Cluster Analysis Advanced Methods.ppt
Subrata Kumer Paul
 
On Optimization of Network-coded Scalable Multimedia Service Multicasting
On Optimization of Network-coded Scalable Multimedia Service MulticastingOn Optimization of Network-coded Scalable Multimedia Service Multicasting
On Optimization of Network-coded Scalable Multimedia Service Multicasting
Andrea Tassi
 
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMPEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
ijcisjournal
 
Ijetr042170
Ijetr042170Ijetr042170
Tensor Spectral Clustering
Tensor Spectral ClusteringTensor Spectral Clustering
Tensor Spectral Clustering
Austin Benson
 

Similar to Learning multifractal structure in large networks (KDD 2014) (20)

Learning multifractal structure in large networks (Purdue ML Seminar)
Learning multifractal structure in large networks (Purdue ML Seminar)Learning multifractal structure in large networks (Purdue ML Seminar)
Learning multifractal structure in large networks (Purdue ML Seminar)
 
Modelling the Clustering Coefficient of a Random graph
Modelling the Clustering Coefficient of a Random graphModelling the Clustering Coefficient of a Random graph
Modelling the Clustering Coefficient of a Random graph
 
PixelCNN, Wavenet, Normalizing Flows - Santiago Pascual - UPC Barcelona 2018
PixelCNN, Wavenet, Normalizing Flows - Santiago Pascual - UPC Barcelona 2018PixelCNN, Wavenet, Normalizing Flows - Santiago Pascual - UPC Barcelona 2018
PixelCNN, Wavenet, Normalizing Flows - Santiago Pascual - UPC Barcelona 2018
 
Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networks
 
K means report
K means reportK means report
K means report
 
Absorbing Random Walk Centrality
Absorbing Random Walk CentralityAbsorbing Random Walk Centrality
Absorbing Random Walk Centrality
 
240603_Thanh_LabSeminar[Imagine That! Abstract-to-Intricate Text-to-Image Syn...
240603_Thanh_LabSeminar[Imagine That! Abstract-to-Intricate Text-to-Image Syn...240603_Thanh_LabSeminar[Imagine That! Abstract-to-Intricate Text-to-Image Syn...
240603_Thanh_LabSeminar[Imagine That! Abstract-to-Intricate Text-to-Image Syn...
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
How to share a secret
How to share a secretHow to share a secret
How to share a secret
 
A simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representationsA simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representations
 
An Efficient Method of Partitioning High Volumes of Multidimensional Data for...
An Efficient Method of Partitioning High Volumes of Multidimensional Data for...An Efficient Method of Partitioning High Volumes of Multidimensional Data for...
An Efficient Method of Partitioning High Volumes of Multidimensional Data for...
 
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdfCD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
 
Subquad multi ff
Subquad multi ffSubquad multi ff
Subquad multi ff
 
A NOVEL (K,N) SECRET SHARING SCHEME FROM QUADRATIC RESIDUES FOR GRAYSCALE IMAGES
A NOVEL (K,N) SECRET SHARING SCHEME FROM QUADRATIC RESIDUES FOR GRAYSCALE IMAGESA NOVEL (K,N) SECRET SHARING SCHEME FROM QUADRATIC RESIDUES FOR GRAYSCALE IMAGES
A NOVEL (K,N) SECRET SHARING SCHEME FROM QUADRATIC RESIDUES FOR GRAYSCALE IMAGES
 
Chapter 11. Cluster Analysis Advanced Methods.ppt
Chapter 11. Cluster Analysis Advanced Methods.pptChapter 11. Cluster Analysis Advanced Methods.ppt
Chapter 11. Cluster Analysis Advanced Methods.ppt
 
On Optimization of Network-coded Scalable Multimedia Service Multicasting
On Optimization of Network-coded Scalable Multimedia Service MulticastingOn Optimization of Network-coded Scalable Multimedia Service Multicasting
On Optimization of Network-coded Scalable Multimedia Service Multicasting
 
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMPEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
 
Ijetr042170
Ijetr042170Ijetr042170
Ijetr042170
 
Tensor Spectral Clustering
Tensor Spectral ClusteringTensor Spectral Clustering
Tensor Spectral Clustering
 

More from Austin Benson

Hypergraph Cuts with General Splitting Functions (JMM)
Hypergraph Cuts with General Splitting Functions (JMM)Hypergraph Cuts with General Splitting Functions (JMM)
Hypergraph Cuts with General Splitting Functions (JMM)
Austin Benson
 
Spectral embeddings and evolving networks
Spectral embeddings and evolving networksSpectral embeddings and evolving networks
Spectral embeddings and evolving networks
Austin Benson
 
Computational Frameworks for Higher-order Network Data Analysis
Computational Frameworks for Higher-order Network Data AnalysisComputational Frameworks for Higher-order Network Data Analysis
Computational Frameworks for Higher-order Network Data Analysis
Austin Benson
 
Higher-order link prediction and other hypergraph modeling
Higher-order link prediction and other hypergraph modelingHigher-order link prediction and other hypergraph modeling
Higher-order link prediction and other hypergraph modeling
Austin Benson
 
Hypergraph Cuts with General Splitting Functions
Hypergraph Cuts with General Splitting FunctionsHypergraph Cuts with General Splitting Functions
Hypergraph Cuts with General Splitting Functions
Austin Benson
 
Hypergraph Cuts with General Splitting Functions
Hypergraph Cuts with General Splitting FunctionsHypergraph Cuts with General Splitting Functions
Hypergraph Cuts with General Splitting Functions
Austin Benson
 
Higher-order link prediction
Higher-order link predictionHigher-order link prediction
Higher-order link prediction
Austin Benson
 
Simplicial closure & higher-order link prediction
Simplicial closure & higher-order link predictionSimplicial closure & higher-order link prediction
Simplicial closure & higher-order link prediction
Austin Benson
 
Three hypergraph eigenvector centralities
Three hypergraph eigenvector centralitiesThree hypergraph eigenvector centralities
Three hypergraph eigenvector centralities
Austin Benson
 
Semi-supervised learning of edge flows
Semi-supervised learning of edge flowsSemi-supervised learning of edge flows
Semi-supervised learning of edge flows
Austin Benson
 
Choosing to grow a graph
Choosing to grow a graphChoosing to grow a graph
Choosing to grow a graph
Austin Benson
 
Link prediction in networks with core-fringe structure
Link prediction in networks with core-fringe structureLink prediction in networks with core-fringe structure
Link prediction in networks with core-fringe structure
Austin Benson
 
Higher-order Link Prediction GraphEx
Higher-order Link Prediction GraphExHigher-order Link Prediction GraphEx
Higher-order Link Prediction GraphEx
Austin Benson
 
Higher-order Link Prediction Syracuse
Higher-order Link Prediction SyracuseHigher-order Link Prediction Syracuse
Higher-order Link Prediction Syracuse
Austin Benson
 
Random spatial network models for core-periphery structure
Random spatial network models for core-periphery structureRandom spatial network models for core-periphery structure
Random spatial network models for core-periphery structure
Austin Benson
 
Random spatial network models for core-periphery structure.
Random spatial network models for core-periphery structure.Random spatial network models for core-periphery structure.
Random spatial network models for core-periphery structure.
Austin Benson
 
Simplicial closure & higher-order link prediction
Simplicial closure & higher-order link predictionSimplicial closure & higher-order link prediction
Simplicial closure & higher-order link prediction
Austin Benson
 
Simplicial closure and simplicial diffusions
Simplicial closure and simplicial diffusionsSimplicial closure and simplicial diffusions
Simplicial closure and simplicial diffusions
Austin Benson
 
Sampling methods for counting temporal motifs
Sampling methods for counting temporal motifsSampling methods for counting temporal motifs
Sampling methods for counting temporal motifs
Austin Benson
 
Set prediction three ways
Set prediction three waysSet prediction three ways
Set prediction three ways
Austin Benson
 

More from Austin Benson (20)

Hypergraph Cuts with General Splitting Functions (JMM)
Hypergraph Cuts with General Splitting Functions (JMM)Hypergraph Cuts with General Splitting Functions (JMM)
Hypergraph Cuts with General Splitting Functions (JMM)
 
Spectral embeddings and evolving networks
Spectral embeddings and evolving networksSpectral embeddings and evolving networks
Spectral embeddings and evolving networks
 
Computational Frameworks for Higher-order Network Data Analysis
Computational Frameworks for Higher-order Network Data AnalysisComputational Frameworks for Higher-order Network Data Analysis
Computational Frameworks for Higher-order Network Data Analysis
 
Higher-order link prediction and other hypergraph modeling
Higher-order link prediction and other hypergraph modelingHigher-order link prediction and other hypergraph modeling
Higher-order link prediction and other hypergraph modeling
 
Hypergraph Cuts with General Splitting Functions
Hypergraph Cuts with General Splitting FunctionsHypergraph Cuts with General Splitting Functions
Hypergraph Cuts with General Splitting Functions
 
Hypergraph Cuts with General Splitting Functions
Hypergraph Cuts with General Splitting FunctionsHypergraph Cuts with General Splitting Functions
Hypergraph Cuts with General Splitting Functions
 
Higher-order link prediction
Higher-order link predictionHigher-order link prediction
Higher-order link prediction
 
Simplicial closure & higher-order link prediction
Simplicial closure & higher-order link predictionSimplicial closure & higher-order link prediction
Simplicial closure & higher-order link prediction
 
Three hypergraph eigenvector centralities
Three hypergraph eigenvector centralitiesThree hypergraph eigenvector centralities
Three hypergraph eigenvector centralities
 
Semi-supervised learning of edge flows
Semi-supervised learning of edge flowsSemi-supervised learning of edge flows
Semi-supervised learning of edge flows
 
Choosing to grow a graph
Choosing to grow a graphChoosing to grow a graph
Choosing to grow a graph
 
Link prediction in networks with core-fringe structure
Link prediction in networks with core-fringe structureLink prediction in networks with core-fringe structure
Link prediction in networks with core-fringe structure
 
Higher-order Link Prediction GraphEx
Higher-order Link Prediction GraphExHigher-order Link Prediction GraphEx
Higher-order Link Prediction GraphEx
 
Higher-order Link Prediction Syracuse
Higher-order Link Prediction SyracuseHigher-order Link Prediction Syracuse
Higher-order Link Prediction Syracuse
 
Random spatial network models for core-periphery structure
Random spatial network models for core-periphery structureRandom spatial network models for core-periphery structure
Random spatial network models for core-periphery structure
 
Random spatial network models for core-periphery structure.
Random spatial network models for core-periphery structure.Random spatial network models for core-periphery structure.
Random spatial network models for core-periphery structure.
 
Simplicial closure & higher-order link prediction
Simplicial closure & higher-order link predictionSimplicial closure & higher-order link prediction
Simplicial closure & higher-order link prediction
 
Simplicial closure and simplicial diffusions
Simplicial closure and simplicial diffusionsSimplicial closure and simplicial diffusions
Simplicial closure and simplicial diffusions
 
Sampling methods for counting temporal motifs
Sampling methods for counting temporal motifsSampling methods for counting temporal motifs
Sampling methods for counting temporal motifs
 
Set prediction three ways
Set prediction three waysSet prediction three ways
Set prediction three ways
 

Recently uploaded

AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
architagupta876
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
gaafergoudaay7aga
 

Recently uploaded (20)

AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
 

Learning multifractal structure in large networks (KDD 2014)

  • 1. Learning Multifractal Structure in Large Networks Austin Benson, Carlos Riquelme, Sven Schmit Stanford University f arbenson, rikel, schmit g @ stanford.edu Knowledge Discovery and Data Mining (KDD) August 26, 2014
  • 2. Setting We want a simple, scalable method to model networks and generate random (undirected) graphs I Looking for graph generators that can mimic real world graph structure { Power law degree distribution, { High clustering coecient, etc. I Many models have been proposed, starting with Erdos-Renyi graphs I Relatively recent models: SKG [Leskovec et al. 2010], BTER [Seshadhri et al. 2012], TCL [Pfeier et al. 2012] I In 2011 Palla et al. introduce multifractal network generators, `generalizing' SKG 2
  • 3. Our contributions We propose methods to make MFNG a feasible framework to model large networks 3
  • 4. Our contributions We propose methods to make MFNG a feasible framework to model large networks I First, we give an intuitive theoretical result that opens the door to scalable estimation I We show how we can
  • 5. t MFNG to graphs using mehod of moments estimation, with runtime independent of the size of the graph I We develop a fast heuristic for sampling MFNG I We demonstrate the ectiveness of our approach in synthetic and real world settings. 3
  • 6. An introduction to Multifractal Network Generators (MFNG) Ingredients I Number of nodes: n I Number of categories: m with speci
  • 7. ed lenghts li I Number of recursive levels: k logm(n) I Probabilities of edges between nodes, based on categories, stored in matrix P 2 [0; 1]mm 4
  • 8. Generating a graph with no recursion Let's consider the simple case
  • 9. rst: k = 1 I Begin with a line: [0; 1] I Divide the line in m intervals (or categories) with lengths l1; l2; : : : ; lm I Sample nodes on the line according to a uniform distribution: this gives every node a category x2 x3 c1 c2 x1 0 1 5
  • 10. From line to square c1 c2 x3 c2 x2 c1 x1 x2 x3 x1 pc1;c1 pc2;c2 pc1;c2 pc1;c2 I For any two nodes u 2 ci; v 2 cj , add an edge with probability according to pci;cj 6
  • 11. Adding recursion For subsequent levels, we subdivide the intervals again to
  • 12. nd categories of nodes in the next layer x2 x3 c1 c2 x1 0 1 x1 x2 0 c1 c2 1 7
  • 13. Adding recursion For subsequent levels, we subdivide the intervals again to
  • 14. nd categories of nodes in the next layer x2 x3 c1 c2 x1 0 1 x1 x2 0 c1 c2 1 Now add an edge between nodes by multiplying probabilities corresponding to categories in each layer. In the above two layer example I node x1 has categories (c1; c1), I node x2 has categories (c1; c2), and I node x3 has categories (c2; c2) And hence, we add edge (x1; x2) with probability pc1;c1pc1;c2 . 7
  • 15. Expanding the recursion So we can get a full probabilistic adjacency matrix Q 2 [0; 1]mkmk by expanding all recursive levels Problem: Q grows fast with k. Dicult to do inference. Intuitively, we should not have to do this. 8
  • 16. Main theoretical result Consider sampling k graphs from a MFNG with 1 recursive level, and construct a new graph G by taking the intersection over graphs: H1 H2 H3 G Then G has same distribution as a graph G generated from a MFNG with k recursive levels. 9
  • 17. Computing expected number of edges is easy p11 p12 p22 xi xj p13 p23 p33 `1 `2 `3 Prob((u; v) 2 E) = p = X3 i=1 X3 j=1 `i`jpij ; E fjEjg = n 2 pk So computing p is O(m2) instead of O(m2k). 10
  • 18. Computing moments of certain subgraphs is easy With above theory, we can easily compute the expected number of... I edges, wedges, 3-stars, 4-stars ... I triangles, 4-cliques... S2 S3 S4 K3 K4 11
  • 19. We can learn multifractal structure quickly Method of moments: 1. Count number of wedges, 3-stars, triangles, 4-cliques, etc. in network of interest 2. Try to
  • 20. nd parameters such that the expected values, E[Fi], match the empirical counts, fi minimize P;`;r X i jfi E[Fi]j fi subject to 0 pij = pji 1; 1 i j c 0 `i 1; 1 i c Xm i=1 `i = 1 Key idea: Once we have the counts (fi), this optimization routine is independent of the size of the graph. 12
  • 21. Method of moments recovers small synthetic graphs Original MFNG, Single sample, Recovered MFNG jV j m k `1 `2 p11 p12 p22 Original 6,000 2 10 0.25 0.75 0.59 0.43 0.78 Recovered 6,000 2 9 0.2728 0.7272 0.5431 0.4101 0.7593 13
  • 22. Twitter network edges wedges 3−stars 4−stars triangles4−cliques 1.6 1.4 1.2 1 0.8 0.6 0.4 0.2 0 Expected / empirical Twitter MFNG−2 MFNG−3 SKG MoM KronFit 104 103 102 101 100 101 102 103 104 Degree 100 Number of nodes Twitter real MFNG (m=2) MFNG (m=3) Comparison against a method of moments for Stochastic Kronecker Graphs [Gleich and Owen 2012] and KronFit [Leskovec et al. 2010] 14
  • 23. Citation network edges wedges 3−stars 4−stars triangles4−cliques 2 1.5 1 0.5 0 Expected / empirical Citation MFNG−2 MFNG−3 SKG MoM KronFit 104 103 102 101 100 101 102 103 Degree 100 Number of nodes Citation real MFNG (m=2) MFNG (m=3) I Triangles and 4-cliques are again matched in expectation. I We employ noisy SKG strategy [Seshadhri et al. 2013] to dampen the degree distribution. 15
  • 24. Fast sampling is challenging I Naive way: ip a coin for each O(n2), while we would like O(jEj) I Idea from SKG:
  • 25. x number of edges and then use `ball-dropping' I Problem for MFNG: many nodes can fall into a single box, we have to ensure we still sample enough edges from that box p11 p12 p22 p12 16
  • 26. Conclusion We proposed methods to make MFNG a feasible framework to model large networks I First, we give an intuitive theoretical result that opens the door to scalable estimation I We show how we can
  • 27. t MFNG parameters to arbitrarily largh graphs using mehod of moments estimation I We develop a fast heuristic for sampling MFNG I We demonstrate the ectiveness of our approach in synthetic and real world settings 17
  • 28. Learning Multifractal Structure in Large Networks Questions? I Austin Benson: arbenson@stanford.edu I Carlos Riquelme: rikel@stanford.edu I Sven Schmit: schmit@stanford.edu 18