Skip to main content
Top
Published in: Journal of Intelligent Information Systems 2/2018

20-08-2018

Accurate and efficient detection of critical links in network to minimize information loss

Authors: Kazumi Saito, Kouzou Ohara, Masahiro Kimura, Hiroshi Motoda

Published in: Journal of Intelligent Information Systems | Issue 2/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We address the problem of efficiently detecting critical links in a large network. Critical links are such links that their deletion exerts substantial effects on the network performance such as the average node reachability. We tackle this problem by proposing a new method which consists of three acceleration techniques: redundant-link skipping (RLS), marginal-node pruning (MNP) and burn-out following (BOF). All of them are designed to avoid unnecessary computation and work both in combination and in isolation. We tested the effectiveness of the proposed method using two real-world large networks and two synthetic large networks. In particular, we showed that the proposed method can estimate the performance degradation by link removal without introducing any approximation within a computation time comparable to that needed by the bottom-k sketch which is a summary of dataset and can efficiently process approximate queries, i.e., reachable nodes, on the original dataset, i.e., the given network. Further, we confirmed that the measures easily composed by the well known existing centralities, e.g. in/out-degree, betweenness, PageRank, authority/hub, are not able to detect critical links. Links detected by these measures do not reduce the average reachability at all, i.e., not critical at all.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Albert, R., Jeong, H., Barabási, A.L. (2000). Error and attack tolerance of complex networks. Nature, 406, 378–382.CrossRef Albert, R., Jeong, H., Barabási, A.L. (2000). Error and attack tolerance of complex networks. Nature, 406, 378–382.CrossRef
go back to reference Boldi, P., & Vigna, S. (2013). In-core computation of geometric centralities with hyperball: a hunderd billion nodes and beyond. In Proceedings of the 2013 IEEE 13th international conference on data mining workshops (ICDMW’13) (pp. 621–628). Boldi, P., & Vigna, S. (2013). In-core computation of geometric centralities with hyperball: a hunderd billion nodes and beyond. In Proceedings of the 2013 IEEE 13th international conference on data mining workshops (ICDMW’13) (pp. 621–628).
go back to reference Bonchi, F., Castillo, C., Ienco, D. (2013). Meme ranking to maximize posts virality in microblogging platforms. Journal of Intelligent Information Systems, 40, 211–239.CrossRef Bonchi, F., Castillo, C., Ienco, D. (2013). Meme ranking to maximize posts virality in microblogging platforms. Journal of Intelligent Information Systems, 40, 211–239.CrossRef
go back to reference Borgs, C., Brautbar, M., Chayes, J., Lucier, B. (2014). Maximizing social influence in nearly optimal time. In Proceedings of the 25th annual ACM-SIAM symposium on discrete algorithms (SODA’14) (pp. 946–957). Borgs, C., Brautbar, M., Chayes, J., Lucier, B. (2014). Maximizing social influence in nearly optimal time. In Proceedings of the 25th annual ACM-SIAM symposium on discrete algorithms (SODA’14) (pp. 946–957).
go back to reference Brin, S., & Page, L. (1998). The anatomy of a large-scale hypertextual web search engine. Computer Networks and ISDN Systems, 30, 107–117.CrossRef Brin, S., & Page, L. (1998). The anatomy of a large-scale hypertextual web search engine. Computer Networks and ISDN Systems, 30, 107–117.CrossRef
go back to reference Broder, A., Kumar, R., Maghoul, F., Raghavan, P., Rajagopalan, S., Stata, R., Tomkins, A., Wiener, J. (2000). Graph structure in the web. In Proceedings of the 9th international world wide web conference (pp. 309–320). Broder, A., Kumar, R., Maghoul, F., Raghavan, P., Rajagopalan, S., Stata, R., Tomkins, A., Wiener, J. (2000). Graph structure in the web. In Proceedings of the 9th international world wide web conference (pp. 309–320).
go back to reference Callaway, D.S., Newman, M.E.J., Strogatz, S.H., Watts, D.J. (2000). Network robustness and fragility: percolation on random graphs. Physical Reveiw Letters, 85, 5468–5471.CrossRef Callaway, D.S., Newman, M.E.J., Strogatz, S.H., Watts, D.J. (2000). Network robustness and fragility: percolation on random graphs. Physical Reveiw Letters, 85, 5468–5471.CrossRef
go back to reference Chakrabarti, S., Dom, B., Kumar, R., Raghavan, P., Rajagopalan, S., Tomkins, A., Gibson, D., Kleinberg, J. (1999). Mining the web’s link structure. IEEE Computer, 32, 60–67.CrossRef Chakrabarti, S., Dom, B., Kumar, R., Raghavan, P., Rajagopalan, S., Tomkins, A., Gibson, D., Kleinberg, J. (1999). Mining the web’s link structure. IEEE Computer, 32, 60–67.CrossRef
go back to reference Chen, W., Lakshmanan, L., Castillo, C. (2013). Information and influence propagation in social networks. Synthesis Lectures on Data Management, 5(4), 1–177.CrossRef Chen, W., Lakshmanan, L., Castillo, C. (2013). Information and influence propagation in social networks. Synthesis Lectures on Data Management, 5(4), 1–177.CrossRef
go back to reference Chierichetti, F., Epasto, A., Kumar, R., Lattanzi, S., Mirrokni, V. (2015). Efficient algorithms for public-private social networks. In Proceedings of the 21st ACM SIGKDD international conference on knowledge discovery and data mining (KDD’15) (pp. 139–148). Chierichetti, F., Epasto, A., Kumar, R., Lattanzi, S., Mirrokni, V. (2015). Efficient algorithms for public-private social networks. In Proceedings of the 21st ACM SIGKDD international conference on knowledge discovery and data mining (KDD’15) (pp. 139–148).
go back to reference Cohen, E. (1997). Size-estimation framework with applications to transitive closure and reachability. Journal of Computer and System Sciences, 55, 441–453.MathSciNetCrossRefMATH Cohen, E. (1997). Size-estimation framework with applications to transitive closure and reachability. Journal of Computer and System Sciences, 55, 441–453.MathSciNetCrossRefMATH
go back to reference Cohen, E., Delling, D., Pajor, T., Werneck, R.F. (2014). Sketch-based influence maximization and computation: scaling up with guarantees. In Proceedings of the 23rd ACM international conference on conference on information and knowledge management (pp. 629–638). Cohen, E., Delling, D., Pajor, T., Werneck, R.F. (2014). Sketch-based influence maximization and computation: scaling up with guarantees. In Proceedings of the 23rd ACM international conference on conference on information and knowledge management (pp. 629–638).
go back to reference Freeman, L. (1979). Centrality in social networks: conceptual clarification. Social Networks, 1, 215– 239.CrossRef Freeman, L. (1979). Centrality in social networks: conceptual clarification. Social Networks, 1, 215– 239.CrossRef
go back to reference Kempe, D., Kleinberg, J., Tardos, E. (2003). Maximizing the spread of influence through a social network. In Proceedings of the 9th ACM SIGKDD international conference on knowledge discovery and data mining (KDD’03) (pp. 137–146). Kempe, D., Kleinberg, J., Tardos, E. (2003). Maximizing the spread of influence through a social network. In Proceedings of the 9th ACM SIGKDD international conference on knowledge discovery and data mining (KDD’03) (pp. 137–146).
go back to reference Kempe, D., Kleinberg, J., Tardos, E. (2015). Maximizing the spread of influence through a social network. Theory of Computation, 11, 105–147.MathSciNetCrossRefMATH Kempe, D., Kleinberg, J., Tardos, E. (2015). Maximizing the spread of influence through a social network. Theory of Computation, 11, 105–147.MathSciNetCrossRefMATH
go back to reference Kimura, M., Saito, K., Motoda, H. (2009). Blocking links to minimize contamination spread in a social network. ACM Transactions on Knowledge Discovery from Data, 3, 9:1–9:23.CrossRef Kimura, M., Saito, K., Motoda, H. (2009). Blocking links to minimize contamination spread in a social network. ACM Transactions on Knowledge Discovery from Data, 3, 9:1–9:23.CrossRef
go back to reference Kimura, M., Saito, K., Nakano, R. (2007). Extracting influential nodes for information diffusion on a social network. In Proceedings of the 22nd AAAI conference on artificial intelligence (AAAI-07) (pp. 1371–1376). Kimura, M., Saito, K., Nakano, R. (2007). Extracting influential nodes for information diffusion on a social network. In Proceedings of the 22nd AAAI conference on artificial intelligence (AAAI-07) (pp. 1371–1376).
go back to reference Kimura, M., Saito, K., Ohara, K., Motoda, H. (2014). Efficient analysis of node influence based on sir model over huge complex networks. In Proceedings of the 2014 international conference on data science and advanced analytics (DSAA’14) (pp. 216–222). Kimura, M., Saito, K., Ohara, K., Motoda, H. (2014). Efficient analysis of node influence based on sir model over huge complex networks. In Proceedings of the 2014 international conference on data science and advanced analytics (DSAA’14) (pp. 216–222).
go back to reference Kimura, M., Saito, K., Ohara, K., Motoda, H. (2016). Speeding-up node influence computation for huge social networks. International Journal of Data Science and Analytics, 1, 1–14.CrossRef Kimura, M., Saito, K., Ohara, K., Motoda, H. (2016). Speeding-up node influence computation for huge social networks. International Journal of Data Science and Analytics, 1, 1–14.CrossRef
go back to reference Newman, M.E.J., Forrest, S., Balthrop, J. (2002). Email networks and the spread of computer viruses. Physical Review E, 66(035), 101. Newman, M.E.J., Forrest, S., Balthrop, J. (2002). Email networks and the spread of computer viruses. Physical Review E, 66(035), 101.
go back to reference Ohara, K., Saito, K., Kimura, M., Motoda, H. (2014). Resampling-based framework for estimating node centrality of large social network. In Proceedings of the 17th international conference on discovery science (DS’14) (pp. 228–239). LNAI 8777. Ohara, K., Saito, K., Kimura, M., Motoda, H. (2014). Resampling-based framework for estimating node centrality of large social network. In Proceedings of the 17th international conference on discovery science (DS’14) (pp. 228–239). LNAI 8777.
go back to reference Saito, K., Kimura, M., Ohara, K., Motoda, H. (2016). Detecting critical links in complex network to maintain information flow/reachability. In Proceedings of the 14th Pacific Rim international conference on artificial intelligence (pp. 419–432). Saito, K., Kimura, M., Ohara, K., Motoda, H. (2016). Detecting critical links in complex network to maintain information flow/reachability. In Proceedings of the 14th Pacific Rim international conference on artificial intelligence (pp. 419–432).
go back to reference Saito, K., Ohara, K., Kimura, M., Motoda, H. (2017). An accurate and efficient method to detect critical links to maintain information flow in network. In Proceedings of the 23th international symposium on methodologies for intelligent systems (pp. 116–126). Saito, K., Ohara, K., Kimura, M., Motoda, H. (2017). An accurate and efficient method to detect critical links to maintain information flow in network. In Proceedings of the 23th international symposium on methodologies for intelligent systems (pp. 116–126).
go back to reference Song, G., Zhou, X., Wang, Y., Xie, K. (2015). Influence maximization on large-scale mobile social network: a divide-and-conquer method. IEEE Transactions on Parallel and Distributed Systems, 26, 1379–1392.CrossRef Song, G., Zhou, X., Wang, Y., Xie, K. (2015). Influence maximization on large-scale mobile social network: a divide-and-conquer method. IEEE Transactions on Parallel and Distributed Systems, 26, 1379–1392.CrossRef
go back to reference Watts, D. (2002). A simple model of global cascades on random networks. Proceedings of the National Academy of Sciences of the United States of America, 99, 5766–5771.MathSciNetCrossRefMATH Watts, D. (2002). A simple model of global cascades on random networks. Proceedings of the National Academy of Sciences of the United States of America, 99, 5766–5771.MathSciNetCrossRefMATH
go back to reference Zhou, C., Zhang, P., Zang, W., Guo, L. (2015). On the upper bounds of spread for greedy algorithms in social network influence maximization. IEEE Transactions on Knowledge and Data Engineering, 27, 2770–2783.CrossRef Zhou, C., Zhang, P., Zang, W., Guo, L. (2015). On the upper bounds of spread for greedy algorithms in social network influence maximization. IEEE Transactions on Knowledge and Data Engineering, 27, 2770–2783.CrossRef
Metadata
Title
Accurate and efficient detection of critical links in network to minimize information loss
Authors
Kazumi Saito
Kouzou Ohara
Masahiro Kimura
Hiroshi Motoda
Publication date
20-08-2018
Publisher
Springer US
Published in
Journal of Intelligent Information Systems / Issue 2/2018
Print ISSN: 0925-9902
Electronic ISSN: 1573-7675
DOI
https://doi.org/10.1007/s10844-018-0523-6

Other articles of this Issue 2/2018

Journal of Intelligent Information Systems 2/2018 Go to the issue

Premium Partner