skip to main content
10.1145/1557019.1557054acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Large human communication networks: patterns and a utility-driven generator

Authors Info & Claims
Published:28 June 2009Publication History

ABSTRACT

Given a real, and weighted person-to-person network which changes over time, what can we say about the cliques that it contains? Do the incidents of communication, or weights on the edges of a clique follow any pattern? Real, and in-person social networks have many more triangles than chance would dictate. As it turns out, there are many more cliques than one would expect, in surprising patterns.

In this paper, we study massive real-world social networks formed by direct contacts among people through various personal communication services, such as Phone-Call, SMS, IM etc. The contributions are the following: (a) we discover surprising patterns with the cliques, (b) we report power-laws of the weights on the edges of cliques, (c) our real networks follow these patterns such that we can trust them to spot outliers and finally, (d) we propose the first utility-driven graph generator for weighted time-evolving networks, which match the observed patterns. Our study focused on three large datasets, each of which is a different type of communication service, with over one million records, and spans several months of activity.

Skip Supplemental Material Section

Supplemental Material

p269-du.mp4

mp4

68.3 MB

References

  1. C. C. Aggarwal and P. S. Yu. Outlier detection with uncertain data. In SDM, pages 483--493, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  2. S. Albers, S. Eilts, E. Even-Dar, Y. Mansour, and L. Roditty. On nash equilibria for a network creation game. In SODA,pages 89--98, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Albert and A.-L. Barabasi. Statistical mechanics of complex networks. Reviews of Modern Physics, 74:47, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  4. B. Wu and D. B. Davison Identifying link farm spam pages. In WWW 2005, pages 820--829, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. L. Barabasi and R. Albert. Emergence of scaling in random networks. Science, 286(5439):509--512, October 1999.Google ScholarGoogle ScholarCross RefCross Ref
  6. Z. Bi, C. Faloutsos, and F. Korn. The"DGX distribution for mining massive, skewed data. SIGKDD 2001, pages 17--26 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. F. Cazals and C. Karande. Reporting maximal cliques: new insights into an old problem. Research Report, http://cgal.inria.fr/Publications/2005/CK05b, (5615), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. Chakrabarti and C. Faloutsos. Graph mining: Laws, generators, and algorithms. ACM Comput. Surv., 38(1), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. V. Chandola, A. Banerjee, and V. Kumar. Anomaly detection: A survey. To Appear in ACM Computing Survey. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. L.-N. David and K. Jon. The link-prediction problem for social networks. Journal of the American Society for Information Science and Technology, 58(7):1019--1031, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. E. D. Demaine, M. Hajiaghayi, H. Mahini, and M. Zadimoghaddam. The price of anarchy in network creation games. In PODC, pages 292--298, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. N. Du, B. Wu, and B. Wang. A parallel algorithm for enumerating all maximal cliques in complex networks. In ICDM2006 Mining Complex Data Workshop, pages 320--324. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Z. Elena, K. Aleksander, and G. Lise. Trusting spam reporters: A reporter-based reputation system for email filtering. ACM Trans. Inf. Syst., 27(1), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. P. Erdos and A. Renyi. On the evolution of random graphs. Publ. Math. Inst. Hungary. Acad. Sci., 5:17--61, 1960.Google ScholarGoogle Scholar
  15. E. Even-Dar, M. J. Kearns, and S. Suri. A network formation game for bipartite exchange economies. In SODA, pages 697--706, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Fabrikant, A. Luthra, E. N. Maneva, C. H. Papadimitriou, and S. Shenker. On a network creation game. In PODC, pages 347--351, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Leskovec, L. Backstorm, R. Kumar, and A. Tomkins Microscopic evolution of social networks. In SIGKDD 2008, pages 462--470. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Y. Koren. Tutorial on recent progress in collaborative filtering. In RecSys 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. N. Laoutaris, L. J. Poplawski, R. Rajaraman, R. Sundaram, and S.-H. Teng. Bounded budget connection games or how to make friends and influence people on a budget. CoRR, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J.-G. Lee, J. Han, and X. Li. Trajectory outlier detection: A partition-and-detect framework. In ICDE 2008, pages 140--149. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. Leskovec, J. Kleinberg, and C. Faloutsos. Graphs over time: densification laws, shrinking diameters and possible explanations. In SIGKDD 2005, pages 177--187. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. M. McGlohon, L. Akoglu, and C. Faloutsos. Weighted graphs and disconnected components: patterns and a generator. In SIGKDD 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. W. Michael and H. Mattord. Principles of Information Secuirty. Thomson, Canada.Google ScholarGoogle Scholar
  24. M. Mitzenmacher. Dynamic models for file sizes and double pareto distributions. 2002.Google ScholarGoogle Scholar
  25. A. A. Nanavati, S. Gurumurthy, G. Das, D. Chakraborty, K. Dasgupta, S. Mukherjea, and A. Joshi. In CIKM 2006.Google ScholarGoogle Scholar
  26. J. F. Nash. Non-cooperative games. Annals of Mathematics, 54, 286--295, 1951.Google ScholarGoogle ScholarCross RefCross Ref
  27. M. E. J. Newman. Power laws, pareto distributions and zipf's law. May 2006.Google ScholarGoogle Scholar
  28. J.-P. Onnela, J. Saramaki, J. Hyvonen, G. Szabo, A. M. de Menezes, K. Kaski, A.-L. Barabasi, and J. Kertesz. Analysis of a large-scale weighted network of one-to-one human communication. New J. Phys., 9(6):179, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  29. J. P. Onnela, J. Saramaki, J. Hyvonen, G. Szabo, D. Lazer, K. Kaski, J. Kertesz, and A. L. Barabasi. Structure and tie strengths in mobile communication networks. PNAS, 104(18):7332--7336, May 2007.Google ScholarGoogle ScholarCross RefCross Ref
  30. W. Reed and M. Jorgensen. The double pareto-lognormal distribution a new parametric model for size distribution. 2004.Google ScholarGoogle Scholar
  31. M. Seshadri, S. Machiraju, A. Sridharan, J. Bolot, C. Faloutsos, and J. Leskove. In SIGKDD 2008.Google ScholarGoogle Scholar
  32. J. Sun, H. Qu, D. Chakrabarti, and C. Faloutsos. Neighborhood formation and anomaly detection in bipartite graphs. In ICDM, pages 418--425, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. S. Wasserman and K. Faust. Social Network Analysis. Cambridge University Press, Cambridge, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  34. D. Watts. Small Worlds:The Dynamics of Networks between Order and Randomness. Princeton University Press, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. D. Watts and S. Strogatz. Collective dynamics of small-world networks. Nature, 393(6684):440--442, June 1998.Google ScholarGoogle ScholarCross RefCross Ref
  36. D. J. Watts and S. H. Strogatz. Collective dynamics of 'small-world' networks. Nature, 393(6684):440--442, June 1998.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Large human communication networks: patterns and a utility-driven generator

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      KDD '09: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
      June 2009
      1426 pages
      ISBN:9781605584959
      DOI:10.1145/1557019

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 June 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,133of8,635submissions,13%

      Upcoming Conference

      KDD '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader