SlideShare a Scribd company logo
1 of 18
Download to read offline
Optimizing

sentinel

surveillance

in

static

and

temporal

networks
Petter

Holme
Tokyo

Institute

of

Technology
P. Holme, Objective measures for
sentinel surveillance in network
epidemiology, arXiv:1803.10637
Medical epi background
Active surveillance
Contact tracing
Passive surveillance
Hospitals/units reporting all stats
Sentinel surveillance
Epidemiology
is the study of the distribution and
determinants of health & disease
conditions in defined populations.
Sentinel surveillance
Modeling background
Vaccination
Nodes that, if deleted, minimize
outbreaks
Sentinel surveillance
Nodes that get infected reliably and
early
Influence maximization
Nodes that maximize outbreaks.
Interesting before an outbreak
of a known pathogen happens
Makes no sense for n = 1
Importance concepts
Time to discovery or extinction
Frequency of detection
Time to discovery
. . given that it is discovered
Objective measures
Goal
Compare these thee objective
measures.
How
• Run the (standard, continuous time,
Markovian) SIR model on empirical
temporal and static networks of
human contacts.
• Compare the outcome to each other
and explain differences by network
structure.
Outline of this research
time; t is the time resolution of the data set, M is the number of links in the projected and thresholded static networks, and ✓ is the threshold.
Data set N C T t M ✓ Ref.
Conference 1 113 20,818 2.50d 20s 1,321 2 [16]
Conference 2 198 327,333 2.95d 20s 775 75 [17]
Hospital 75 32,424 4.02d 20s 582 8 [18]
Reality 63 26,260 8.63h 5s 421 3 [19]
O ce 92 9,827 11.4d 20s 389 3 [20]
Primary School 1 236 60,623 8.64h 20s 299 3 [21]
Primary School 2 238 65,150 8.58h 20s 257 3 [21]
Romania 42 1,748,401 62.8d 1m 128 61 [22]
High School 1 312 28,780 4.99h 20s 1,385 2 [23]
High School 2 310 47,338 8.99h 20s 1,601 2 [23]
High School 3 303 40,174 8.99h 20s 1,096 3 [23]
High School 4 295 37,279 8.99h 20s 1,363 2 [23]
High School 5 299 34,937 8.99h 20s 1,298 2 [23]
Gallery 1 200 5,943 7.80h 20s 398 2 [24]
Gallery 2 204 6,709 8.05h 20s 393 2 [24]
Gallery 3 186 5,691 7.39h 20s 362 2 [24]
Gallery 4 211 7,409 8.01h 20s 294 2 [24]
Gallery 5 215 7,634 5.61h 20s 967 1 [24]
Cambridge 1 186 3,853,714 6.07d 20s 180 1,312 [17]
Cambridge 2 2,536 2,064,114 3.89d 1s 5,996 42 [25]
Intel 112 2,448,720 4.15d 20s 107 1,326 [17]
Copenhagen Bluetooth 671 458,920 28.0d 20s 13,363 2 [26]
Kenya 52 2,070 2.54d 1h 43 26 [27]
Diary 49 2,143 418d 1d 345 4 [28]
Prostitution 16,730 50,632 6.00y 1d 39,044 1 [29]
St Andrews 25 408,996 74d 1s 139 379 [30]
WiFi 18,719 9,094,619 83.7d 5m 884,800 6 [31]
Facebook 45,813 855,542 1,561d 1s 183,412 1 [32]
Messages 35,624 489,653 3,018d 1s 94,768 2 [33]
Forum 7,084 1,429,573 3,141d 1s 70,942 2 [33]
Dating 29,341 529,890 512d 1s 74,561 2 [34]
Copenhagen Calls 483 10,545 28.0d 1s 271 6 [26]
Copenhagen SMS 533 30,380 21.6d 1s 320 12 [26]
E-mail 1 57,194 444,160 112d 1s 92,442 1 [35]
E-mail 2 3,188 309,125 81d 1s 16,220 3 [36]
E-mail 3 986 332,334 526d 1s 9,474 3 [37]
E-mail 4 167 82,927 271d 1s 1,830 4 [38]
College 1,899 59,835 193d 1s 8,608 2 [39]
Datasets
Results
Time to detection or extinction Time to detection Frequency of detection
Nodesoftopimportance:
3
2
1
Objective measures
for the Office data at ß = 1
Correlations between objective
measures, static networks
St Andrews
Dating
E-mail 3
Reality
Romania
High School 5
Gallery 5
Kenya
Facebook
Copenhagen SMS
College
High School 1
Gallery 1
Cambridge 1
Diary
Messages
E-mail 1
Conference 1
Office
High School 2
Gallery 2
Cambridge 2
Prostitution
Forum
E-mail 2
Conference 2
Primary School 1
High School 3
Gallery 3
Intel
Hospital
Primary School 2
High School 4
Gallery 4
Copenhagen Bluetooth
WiFi
Copenhagen Calls
E-mail 4
1010-3
10-2
0.11
1
–1
0
timetodiscoveryvstimetodiscoveryordetection
timetodiscoveryvsfrequencyofdiscovery
ß
T
Ditto,temporalnetworks
Primary School 1
Diary
Gallery 3
High School 3
E-mail 3
Conference 2
Cambridge 2
Dating Copenhagen Calls
Romania
Gallery 1
High School 1
E-mail 1
Reality
Messages Copenhagen SMS
Office
Kenya
Gallery 2
High School 2
E-mail 2
Conference 1
Cambridge 1
Forum
Primary School 2
Prostitution
Gallery 4
High School 4
E-mail 4
Hospital
Intel
College
St Andrews
Gallery 5
High School 5
Copenhagen Bluetooth
FacebookWiFi
0.01 10.1
0.01
0.1
1
vT
–1 –0.5 0 0.5 1
ß
T
Structural correlations
Static networks
Subgraph centrality Component size Harmonic closeness Harmonic vitality Coreness
Gallery 5
High School 5
Reality
Copenhagen SMS
Facebook
Romania
Kenya
Gallery 2
High School 2
Conference 1
Prostitution
Forum
Office
Cambridge 2
E-mail 2
Gallery 3
High School 3
Conference 2
St Andrews
Dating
Primary School 1
Intel
E-mail 3
Gallery 4
High School 4
Hospital
Copenhagen Calls
College
Primary School 2
Copenhagen Bluetooth
E-mail 4
Gallery 1
High School 1
Diary
Messages
Cambridge 1
E-mail 1
Degree
WiFi
0.10.01 10.001 10
Time to detection or extinction
Time to detection
Frequency of detection
ß
Subgraph centrality
Component size
Harmonic closeness
Harmonic vitality
Coreness
Degree
Timetodetection
orextinctionTimetodetectionFrequencyofdetection
Primary School 1
Diary
Gallery 3
High School 3
E-mail 3
Conference 2
Cambridge 2
Dating Copenhagen Calls
Romania
Gallery 1
High School 1
E-mail 1
Reality
Messages Copenhagen SMS
Office
Kenya
Gallery 2
High School 2
E-mail 2
Conference 1
Cambridge 1
Forum
Primary School 2
Prostitution
Gallery 4
High School 4
E-mail 4
Hospital
Intel
College
St Andrews
Gallery 5
High School 5
Copenhagen Bluetooth
FacebookWiFi
Downstream component size
Average time First time
Degree
Duration
Strength Upstream component size
0.01 10.1
0.01
0.1
1
vT
ß
Conclusions
•Choose objective measure depending on
what aspect of sentinel surveillance that
matters (because of extinction events that
can make a big difference).
Thank you!

More Related Content

What's hot

New Approaches Social Network
New Approaches Social NetworkNew Approaches Social Network
New Approaches Social Networkepokh
 
Mesoscale Structures in Networks
Mesoscale Structures in NetworksMesoscale Structures in Networks
Mesoscale Structures in NetworksMason Porter
 
Inference beyond standard network models
Inference beyond standard network modelsInference beyond standard network models
Inference beyond standard network modelsUmeå University
 
A paradox of importance in network epidemiology
A paradox of importance in network epidemiologyA paradox of importance in network epidemiology
A paradox of importance in network epidemiologyPetter Holme
 
Maps of sparse memory networks reveal overlapping communities in network flows
Maps of sparse memory networks reveal overlapping communities in network flowsMaps of sparse memory networks reveal overlapping communities in network flows
Maps of sparse memory networks reveal overlapping communities in network flowsUmeå University
 
Delay Tolerant Networking routing as a Game Theory problem – An Overview
Delay Tolerant Networking routing as a Game Theory problem – An OverviewDelay Tolerant Networking routing as a Game Theory problem – An Overview
Delay Tolerant Networking routing as a Game Theory problem – An OverviewCSCJournals
 
Important spreaders in networks: Exact results for small graphs
Important spreaders in networks: Exact results for small graphsImportant spreaders in networks: Exact results for small graphs
Important spreaders in networks: Exact results for small graphsPetter Holme
 
Predicting_new_friendships_in_social_networks
Predicting_new_friendships_in_social_networksPredicting_new_friendships_in_social_networks
Predicting_new_friendships_in_social_networksAnvardh Nanduri
 
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...IJNSA Journal
 
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...ijscai
 
Adaptive Percolation Daniel Burkhardt Cerigo
Adaptive Percolation Daniel Burkhardt CerigoAdaptive Percolation Daniel Burkhardt Cerigo
Adaptive Percolation Daniel Burkhardt CerigoDaniel Burkhardt Cerigo
 
Why rumors spread fast in social networks
Why rumors spread fast in social networksWhy rumors spread fast in social networks
Why rumors spread fast in social networksaugustodefranco .
 
A Deep Analysis on Prevailing Spam Mail Filteration Machine Learning Approaches
A Deep Analysis on Prevailing Spam Mail Filteration Machine Learning ApproachesA Deep Analysis on Prevailing Spam Mail Filteration Machine Learning Approaches
A Deep Analysis on Prevailing Spam Mail Filteration Machine Learning Approachesijtsrd
 
Detecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSSDetecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSSIRJET Journal
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Tin180 VietNam
 
Exploiting friendship relations for efficient routing in mobile
Exploiting friendship relations for efficient routing in mobileExploiting friendship relations for efficient routing in mobile
Exploiting friendship relations for efficient routing in mobileramya1591
 
Community Finding with Applications on Phylogenetic Networks [Extended Abstract]
Community Finding with Applications on Phylogenetic Networks [Extended Abstract]Community Finding with Applications on Phylogenetic Networks [Extended Abstract]
Community Finding with Applications on Phylogenetic Networks [Extended Abstract]Luís Rita
 
An updated look at social network extraction system a personal data analysis ...
An updated look at social network extraction system a personal data analysis ...An updated look at social network extraction system a personal data analysis ...
An updated look at social network extraction system a personal data analysis ...eSAT Publishing House
 

What's hot (19)

New Approaches Social Network
New Approaches Social NetworkNew Approaches Social Network
New Approaches Social Network
 
Node similarity
Node similarityNode similarity
Node similarity
 
Mesoscale Structures in Networks
Mesoscale Structures in NetworksMesoscale Structures in Networks
Mesoscale Structures in Networks
 
Inference beyond standard network models
Inference beyond standard network modelsInference beyond standard network models
Inference beyond standard network models
 
A paradox of importance in network epidemiology
A paradox of importance in network epidemiologyA paradox of importance in network epidemiology
A paradox of importance in network epidemiology
 
Maps of sparse memory networks reveal overlapping communities in network flows
Maps of sparse memory networks reveal overlapping communities in network flowsMaps of sparse memory networks reveal overlapping communities in network flows
Maps of sparse memory networks reveal overlapping communities in network flows
 
Delay Tolerant Networking routing as a Game Theory problem – An Overview
Delay Tolerant Networking routing as a Game Theory problem – An OverviewDelay Tolerant Networking routing as a Game Theory problem – An Overview
Delay Tolerant Networking routing as a Game Theory problem – An Overview
 
Important spreaders in networks: Exact results for small graphs
Important spreaders in networks: Exact results for small graphsImportant spreaders in networks: Exact results for small graphs
Important spreaders in networks: Exact results for small graphs
 
Predicting_new_friendships_in_social_networks
Predicting_new_friendships_in_social_networksPredicting_new_friendships_in_social_networks
Predicting_new_friendships_in_social_networks
 
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR ...
 
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
 
Adaptive Percolation Daniel Burkhardt Cerigo
Adaptive Percolation Daniel Burkhardt CerigoAdaptive Percolation Daniel Burkhardt Cerigo
Adaptive Percolation Daniel Burkhardt Cerigo
 
Why rumors spread fast in social networks
Why rumors spread fast in social networksWhy rumors spread fast in social networks
Why rumors spread fast in social networks
 
A Deep Analysis on Prevailing Spam Mail Filteration Machine Learning Approaches
A Deep Analysis on Prevailing Spam Mail Filteration Machine Learning ApproachesA Deep Analysis on Prevailing Spam Mail Filteration Machine Learning Approaches
A Deep Analysis on Prevailing Spam Mail Filteration Machine Learning Approaches
 
Detecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSSDetecting root of the rumor in social network using GSSS
Detecting root of the rumor in social network using GSSS
 
Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)Socialnetworkanalysis (Tin180 Com)
Socialnetworkanalysis (Tin180 Com)
 
Exploiting friendship relations for efficient routing in mobile
Exploiting friendship relations for efficient routing in mobileExploiting friendship relations for efficient routing in mobile
Exploiting friendship relations for efficient routing in mobile
 
Community Finding with Applications on Phylogenetic Networks [Extended Abstract]
Community Finding with Applications on Phylogenetic Networks [Extended Abstract]Community Finding with Applications on Phylogenetic Networks [Extended Abstract]
Community Finding with Applications on Phylogenetic Networks [Extended Abstract]
 
An updated look at social network extraction system a personal data analysis ...
An updated look at social network extraction system a personal data analysis ...An updated look at social network extraction system a personal data analysis ...
An updated look at social network extraction system a personal data analysis ...
 

Similar to Comparing Objective Measures for Sentinel Surveillance in Static and Temporal Networks

Information technology syllabus
Information technology syllabusInformation technology syllabus
Information technology syllabusMustapher Matias
 
Automatic Tagging using Deep Convolutional Neural Networks - ISMIR 2016
Automatic Tagging using Deep Convolutional Neural Networks - ISMIR 2016Automatic Tagging using Deep Convolutional Neural Networks - ISMIR 2016
Automatic Tagging using Deep Convolutional Neural Networks - ISMIR 2016Keunwoo Choi
 
Quantitative Study of Innovation and Knowledge Building in Questions&Answers ...
Quantitative Study of Innovation and Knowledge Building in Questions&Answers ...Quantitative Study of Innovation and Knowledge Building in Questions&Answers ...
Quantitative Study of Innovation and Knowledge Building in Questions&Answers ...KNOWeSCAPE2014
 
00b7d51ed81834e4d7000000
00b7d51ed81834e4d700000000b7d51ed81834e4d7000000
00b7d51ed81834e4d7000000Rahul Jain
 
Silent call reason
Silent call reasonSilent call reason
Silent call reasonMehmet TANIS
 
Detection of Malicious Circuitry Using Transition Probability Based Node Redu...
Detection of Malicious Circuitry Using Transition Probability Based Node Redu...Detection of Malicious Circuitry Using Transition Probability Based Node Redu...
Detection of Malicious Circuitry Using Transition Probability Based Node Redu...TELKOMNIKA JOURNAL
 
2016-17_BE Electronics Engineering-Course Book 2016 RCOEM.pdf
2016-17_BE Electronics Engineering-Course Book 2016 RCOEM.pdf2016-17_BE Electronics Engineering-Course Book 2016 RCOEM.pdf
2016-17_BE Electronics Engineering-Course Book 2016 RCOEM.pdfMarshalsubash
 
A Study on Privacy Level in Publishing Data of Smart Tap Network
A Study on Privacy Level in Publishing Data of Smart Tap NetworkA Study on Privacy Level in Publishing Data of Smart Tap Network
A Study on Privacy Level in Publishing Data of Smart Tap NetworkHa Phuong
 
Comparison of signal smoothing techniques for use in embedded system for moni...
Comparison of signal smoothing techniques for use in embedded system for moni...Comparison of signal smoothing techniques for use in embedded system for moni...
Comparison of signal smoothing techniques for use in embedded system for moni...Dalton Valadares
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
Smoking and Pregnancy SurveyPlease take this brief survey of w.docx
Smoking and Pregnancy SurveyPlease take this brief survey of w.docxSmoking and Pregnancy SurveyPlease take this brief survey of w.docx
Smoking and Pregnancy SurveyPlease take this brief survey of w.docxpbilly1
 
Case Studies & Network Planning Tools
Case Studies & Network Planning ToolsCase Studies & Network Planning Tools
Case Studies & Network Planning ToolsEM Archieve
 
Bservice report
Bservice reportBservice report
Bservice reporthuisim7
 
Flow Cytometry in Microfluidics
Flow Cytometry in MicrofluidicsFlow Cytometry in Microfluidics
Flow Cytometry in MicrofluidicsSaransh Khandelwal
 
Masters_Thesis_ver.1.02
Masters_Thesis_ver.1.02Masters_Thesis_ver.1.02
Masters_Thesis_ver.1.02Thomas Balle
 
Extended LTE Coverage for Indoor Machine Type Communication.pdf
Extended LTE Coverage for Indoor Machine Type Communication.pdfExtended LTE Coverage for Indoor Machine Type Communication.pdf
Extended LTE Coverage for Indoor Machine Type Communication.pdfYAAKOVSOLOMON1
 

Similar to Comparing Objective Measures for Sentinel Surveillance in Static and Temporal Networks (20)

Information technology syllabus
Information technology syllabusInformation technology syllabus
Information technology syllabus
 
Automatic Tagging using Deep Convolutional Neural Networks - ISMIR 2016
Automatic Tagging using Deep Convolutional Neural Networks - ISMIR 2016Automatic Tagging using Deep Convolutional Neural Networks - ISMIR 2016
Automatic Tagging using Deep Convolutional Neural Networks - ISMIR 2016
 
Quantitative Study of Innovation and Knowledge Building in Questions&Answers ...
Quantitative Study of Innovation and Knowledge Building in Questions&Answers ...Quantitative Study of Innovation and Knowledge Building in Questions&Answers ...
Quantitative Study of Innovation and Knowledge Building in Questions&Answers ...
 
JM Thesis final
JM Thesis finalJM Thesis final
JM Thesis final
 
00b7d51ed81834e4d7000000
00b7d51ed81834e4d700000000b7d51ed81834e4d7000000
00b7d51ed81834e4d7000000
 
The Right Way
The Right WayThe Right Way
The Right Way
 
Silent call reason
Silent call reasonSilent call reason
Silent call reason
 
Detection of Malicious Circuitry Using Transition Probability Based Node Redu...
Detection of Malicious Circuitry Using Transition Probability Based Node Redu...Detection of Malicious Circuitry Using Transition Probability Based Node Redu...
Detection of Malicious Circuitry Using Transition Probability Based Node Redu...
 
2016-17_BE Electronics Engineering-Course Book 2016 RCOEM.pdf
2016-17_BE Electronics Engineering-Course Book 2016 RCOEM.pdf2016-17_BE Electronics Engineering-Course Book 2016 RCOEM.pdf
2016-17_BE Electronics Engineering-Course Book 2016 RCOEM.pdf
 
A Study on Privacy Level in Publishing Data of Smart Tap Network
A Study on Privacy Level in Publishing Data of Smart Tap NetworkA Study on Privacy Level in Publishing Data of Smart Tap Network
A Study on Privacy Level in Publishing Data of Smart Tap Network
 
Comparison of signal smoothing techniques for use in embedded system for moni...
Comparison of signal smoothing techniques for use in embedded system for moni...Comparison of signal smoothing techniques for use in embedded system for moni...
Comparison of signal smoothing techniques for use in embedded system for moni...
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
Smoking and Pregnancy SurveyPlease take this brief survey of w.docx
Smoking and Pregnancy SurveyPlease take this brief survey of w.docxSmoking and Pregnancy SurveyPlease take this brief survey of w.docx
Smoking and Pregnancy SurveyPlease take this brief survey of w.docx
 
Case Studies & Network Planning Tools
Case Studies & Network Planning ToolsCase Studies & Network Planning Tools
Case Studies & Network Planning Tools
 
Bservice report
Bservice reportBservice report
Bservice report
 
2.pdf
2.pdf2.pdf
2.pdf
 
Flow Cytometry in Microfluidics
Flow Cytometry in MicrofluidicsFlow Cytometry in Microfluidics
Flow Cytometry in Microfluidics
 
Masters_Thesis_ver.1.02
Masters_Thesis_ver.1.02Masters_Thesis_ver.1.02
Masters_Thesis_ver.1.02
 
Extended LTE Coverage for Indoor Machine Type Communication.pdf
Extended LTE Coverage for Indoor Machine Type Communication.pdfExtended LTE Coverage for Indoor Machine Type Communication.pdf
Extended LTE Coverage for Indoor Machine Type Communication.pdf
 
Tac note
Tac noteTac note
Tac note
 

More from Petter Holme

Temporal network epidemiology: Subtleties and algorithms
Temporal network epidemiology: Subtleties and algorithmsTemporal network epidemiology: Subtleties and algorithms
Temporal network epidemiology: Subtleties and algorithmsPetter Holme
 
The big science of small networks
The big science of small networksThe big science of small networks
The big science of small networksPetter Holme
 
Spin models on networks revisited
Spin models on networks revisitedSpin models on networks revisited
Spin models on networks revisitedPetter Holme
 
History of social simulations
History of social simulationsHistory of social simulations
History of social simulationsPetter Holme
 
Dynamics of Internet-mediated partnership formation
Dynamics of Internet-mediated partnership formationDynamics of Internet-mediated partnership formation
Dynamics of Internet-mediated partnership formationPetter Holme
 
Modeling the evolution of the AS-level Internet: Integrating aspects of traff...
Modeling the evolution of the AS-level Internet: Integrating aspects of traff...Modeling the evolution of the AS-level Internet: Integrating aspects of traff...
Modeling the evolution of the AS-level Internet: Integrating aspects of traff...Petter Holme
 
Emergence of collective memories
Emergence of collective memoriesEmergence of collective memories
Emergence of collective memoriesPetter Holme
 
From land use to human mobility
From land use to human mobilityFrom land use to human mobility
From land use to human mobilityPetter Holme
 
Why do metabolic networks look like they do?
Why do metabolic networks look like they do?Why do metabolic networks look like they do?
Why do metabolic networks look like they do?Petter Holme
 
Modeling the fat tails of size fluctuations in organizations
Modeling the fat tails of size fluctuations in organizationsModeling the fat tails of size fluctuations in organizations
Modeling the fat tails of size fluctuations in organizationsPetter Holme
 
From temporal to static networks, and back
From temporal to static networks, and backFrom temporal to static networks, and back
From temporal to static networks, and backPetter Holme
 
Exploring spatial networks with greedy navigators
Exploring spatial networks with greedy navigatorsExploring spatial networks with greedy navigators
Exploring spatial networks with greedy navigatorsPetter Holme
 

More from Petter Holme (13)

Temporal network epidemiology: Subtleties and algorithms
Temporal network epidemiology: Subtleties and algorithmsTemporal network epidemiology: Subtleties and algorithms
Temporal network epidemiology: Subtleties and algorithms
 
The big science of small networks
The big science of small networksThe big science of small networks
The big science of small networks
 
Spin models on networks revisited
Spin models on networks revisitedSpin models on networks revisited
Spin models on networks revisited
 
History of social simulations
History of social simulationsHistory of social simulations
History of social simulations
 
Netsci 2017
Netsci 2017Netsci 2017
Netsci 2017
 
Dynamics of Internet-mediated partnership formation
Dynamics of Internet-mediated partnership formationDynamics of Internet-mediated partnership formation
Dynamics of Internet-mediated partnership formation
 
Modeling the evolution of the AS-level Internet: Integrating aspects of traff...
Modeling the evolution of the AS-level Internet: Integrating aspects of traff...Modeling the evolution of the AS-level Internet: Integrating aspects of traff...
Modeling the evolution of the AS-level Internet: Integrating aspects of traff...
 
Emergence of collective memories
Emergence of collective memoriesEmergence of collective memories
Emergence of collective memories
 
From land use to human mobility
From land use to human mobilityFrom land use to human mobility
From land use to human mobility
 
Why do metabolic networks look like they do?
Why do metabolic networks look like they do?Why do metabolic networks look like they do?
Why do metabolic networks look like they do?
 
Modeling the fat tails of size fluctuations in organizations
Modeling the fat tails of size fluctuations in organizationsModeling the fat tails of size fluctuations in organizations
Modeling the fat tails of size fluctuations in organizations
 
From temporal to static networks, and back
From temporal to static networks, and backFrom temporal to static networks, and back
From temporal to static networks, and back
 
Exploring spatial networks with greedy navigators
Exploring spatial networks with greedy navigatorsExploring spatial networks with greedy navigators
Exploring spatial networks with greedy navigators
 

Recently uploaded

Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...jana861314
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxAleenaTreesaSaji
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxpradhanghanshyam7136
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...RohitNehra6
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSarthak Sekhar Mondal
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physicsvishikhakeshava1
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSérgio Sacani
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSérgio Sacani
 
G9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptG9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptMAESTRELLAMesa2
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 

Recently uploaded (20)

9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptx
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptx
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physics
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
G9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptG9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.ppt
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 

Comparing Objective Measures for Sentinel Surveillance in Static and Temporal Networks

  • 2. P. Holme, Objective measures for sentinel surveillance in network epidemiology, arXiv:1803.10637
  • 4. Active surveillance Contact tracing Passive surveillance Hospitals/units reporting all stats Sentinel surveillance Epidemiology is the study of the distribution and determinants of health & disease conditions in defined populations.
  • 7. Vaccination Nodes that, if deleted, minimize outbreaks Sentinel surveillance Nodes that get infected reliably and early Influence maximization Nodes that maximize outbreaks. Interesting before an outbreak of a known pathogen happens Makes no sense for n = 1 Importance concepts
  • 8. Time to discovery or extinction Frequency of detection Time to discovery . . given that it is discovered Objective measures
  • 9. Goal Compare these thee objective measures. How • Run the (standard, continuous time, Markovian) SIR model on empirical temporal and static networks of human contacts. • Compare the outcome to each other and explain differences by network structure. Outline of this research
  • 10. time; t is the time resolution of the data set, M is the number of links in the projected and thresholded static networks, and ✓ is the threshold. Data set N C T t M ✓ Ref. Conference 1 113 20,818 2.50d 20s 1,321 2 [16] Conference 2 198 327,333 2.95d 20s 775 75 [17] Hospital 75 32,424 4.02d 20s 582 8 [18] Reality 63 26,260 8.63h 5s 421 3 [19] O ce 92 9,827 11.4d 20s 389 3 [20] Primary School 1 236 60,623 8.64h 20s 299 3 [21] Primary School 2 238 65,150 8.58h 20s 257 3 [21] Romania 42 1,748,401 62.8d 1m 128 61 [22] High School 1 312 28,780 4.99h 20s 1,385 2 [23] High School 2 310 47,338 8.99h 20s 1,601 2 [23] High School 3 303 40,174 8.99h 20s 1,096 3 [23] High School 4 295 37,279 8.99h 20s 1,363 2 [23] High School 5 299 34,937 8.99h 20s 1,298 2 [23] Gallery 1 200 5,943 7.80h 20s 398 2 [24] Gallery 2 204 6,709 8.05h 20s 393 2 [24] Gallery 3 186 5,691 7.39h 20s 362 2 [24] Gallery 4 211 7,409 8.01h 20s 294 2 [24] Gallery 5 215 7,634 5.61h 20s 967 1 [24] Cambridge 1 186 3,853,714 6.07d 20s 180 1,312 [17] Cambridge 2 2,536 2,064,114 3.89d 1s 5,996 42 [25] Intel 112 2,448,720 4.15d 20s 107 1,326 [17] Copenhagen Bluetooth 671 458,920 28.0d 20s 13,363 2 [26] Kenya 52 2,070 2.54d 1h 43 26 [27] Diary 49 2,143 418d 1d 345 4 [28] Prostitution 16,730 50,632 6.00y 1d 39,044 1 [29] St Andrews 25 408,996 74d 1s 139 379 [30] WiFi 18,719 9,094,619 83.7d 5m 884,800 6 [31] Facebook 45,813 855,542 1,561d 1s 183,412 1 [32] Messages 35,624 489,653 3,018d 1s 94,768 2 [33] Forum 7,084 1,429,573 3,141d 1s 70,942 2 [33] Dating 29,341 529,890 512d 1s 74,561 2 [34] Copenhagen Calls 483 10,545 28.0d 1s 271 6 [26] Copenhagen SMS 533 30,380 21.6d 1s 320 12 [26] E-mail 1 57,194 444,160 112d 1s 92,442 1 [35] E-mail 2 3,188 309,125 81d 1s 16,220 3 [36] E-mail 3 986 332,334 526d 1s 9,474 3 [37] E-mail 4 167 82,927 271d 1s 1,830 4 [38] College 1,899 59,835 193d 1s 8,608 2 [39] Datasets
  • 12. Time to detection or extinction Time to detection Frequency of detection Nodesoftopimportance: 3 2 1 Objective measures for the Office data at ß = 1
  • 13. Correlations between objective measures, static networks St Andrews Dating E-mail 3 Reality Romania High School 5 Gallery 5 Kenya Facebook Copenhagen SMS College High School 1 Gallery 1 Cambridge 1 Diary Messages E-mail 1 Conference 1 Office High School 2 Gallery 2 Cambridge 2 Prostitution Forum E-mail 2 Conference 2 Primary School 1 High School 3 Gallery 3 Intel Hospital Primary School 2 High School 4 Gallery 4 Copenhagen Bluetooth WiFi Copenhagen Calls E-mail 4 1010-3 10-2 0.11 1 –1 0 timetodiscoveryvstimetodiscoveryordetection timetodiscoveryvsfrequencyofdiscovery ß T
  • 14. Ditto,temporalnetworks Primary School 1 Diary Gallery 3 High School 3 E-mail 3 Conference 2 Cambridge 2 Dating Copenhagen Calls Romania Gallery 1 High School 1 E-mail 1 Reality Messages Copenhagen SMS Office Kenya Gallery 2 High School 2 E-mail 2 Conference 1 Cambridge 1 Forum Primary School 2 Prostitution Gallery 4 High School 4 E-mail 4 Hospital Intel College St Andrews Gallery 5 High School 5 Copenhagen Bluetooth FacebookWiFi 0.01 10.1 0.01 0.1 1 vT –1 –0.5 0 0.5 1 ß T
  • 15. Structural correlations Static networks Subgraph centrality Component size Harmonic closeness Harmonic vitality Coreness Gallery 5 High School 5 Reality Copenhagen SMS Facebook Romania Kenya Gallery 2 High School 2 Conference 1 Prostitution Forum Office Cambridge 2 E-mail 2 Gallery 3 High School 3 Conference 2 St Andrews Dating Primary School 1 Intel E-mail 3 Gallery 4 High School 4 Hospital Copenhagen Calls College Primary School 2 Copenhagen Bluetooth E-mail 4 Gallery 1 High School 1 Diary Messages Cambridge 1 E-mail 1 Degree WiFi 0.10.01 10.001 10 Time to detection or extinction Time to detection Frequency of detection ß
  • 16. Subgraph centrality Component size Harmonic closeness Harmonic vitality Coreness Degree Timetodetection orextinctionTimetodetectionFrequencyofdetection
  • 17. Primary School 1 Diary Gallery 3 High School 3 E-mail 3 Conference 2 Cambridge 2 Dating Copenhagen Calls Romania Gallery 1 High School 1 E-mail 1 Reality Messages Copenhagen SMS Office Kenya Gallery 2 High School 2 E-mail 2 Conference 1 Cambridge 1 Forum Primary School 2 Prostitution Gallery 4 High School 4 E-mail 4 Hospital Intel College St Andrews Gallery 5 High School 5 Copenhagen Bluetooth FacebookWiFi Downstream component size Average time First time Degree Duration Strength Upstream component size 0.01 10.1 0.01 0.1 1 vT ß
  • 18. Conclusions •Choose objective measure depending on what aspect of sentinel surveillance that matters (because of extinction events that can make a big difference). Thank you!