A ew Algorithm for Community Identification in Linked Data Nacim Fateh Chikhi , Bernard Rothenburger, Nathalie Aussenac-Gilles Institut de Recherche en Informatique de Toulouse 118, route de Narbonne 31062 Toulouse Cedex 4 {chikhi, rothenburger, aussenac}@irit.fr

Abstract. In this paper, we propose four specifications which can be used for the evaluation of community identification algorithms. Furthermore, a novel algorithm VHITS meeting the four established specifications is presented. Basically, VHITS is based on a two-step approach. In the first step, the Nonnegative Matrix Factorization is used to estimate the community memberships. In the second step, a voting scheme is employed to identify the hubs and authorities of each community. VHITS is then compared to the HITS and PHITS algorithms. Experimental results show that VHITS is more adapted than HITS and PHITS to the task of community identification in citation networks. Keywords: authorities, hubs, authoritative documents, VHITS, HITS, PHITS, community identification, community mining, web communities.

1 Introduction Since late nineties, identification of web communities has received much attention from researchers. HITS is a seminal algorithm in the community identification (CI) algorithms family. Since its invention, HITS has been followed by a multitude of CI algorithms. Some of them are just extensions of HITS, but some others use completely different approaches (like the graph based approaches) [1]. Unfortunately, the existence of a large variety of CI algorithms has caused a new problem, the problem of their evaluation and comparison. In fact, CI algorithms are usually evaluated by examining manually the extracted communities. Therefore, we propose four specifications which can be used for the evaluation of CI algorithms. Furthermore, a novel algorithm meeting the four established specifications is presented. Although our algorithm may apply on different kinds of networks, we focus on the citation networks (or citation graphs). In a citation network, nodes correspond to web pages (resp. research papers), and edges represent hyperlinks (resp. bibliographic citations). The rest of the paper is organized as follows. In section 2, we present the four proposed specifications for CI algorithms evaluation. These specifications are used in

section 3 to analyze two popular CI algorithms. Section 4 describes our new CI algorithm. A case study in section 5 illustrates the behavior of three algorithms with respect to some specifications. Experimental results are given in section 6 before concluding in section 7.

2 Requirements for Community Identification Algorithms In this section, we propose the following requirements that a CI algorithm should meet. These specifications have been established after an analysis of existing CI algorithms. - Requirement 1: Results of the CI algorithm should be as close as possible to the communities that may be identified by a human expert. This can be confirmed using conventional clustering assessment methods such as accuracy or F-measure. - Requirement 2: CI algorithm should be able to identify the members of each community. The CI algorithm must be able to answer questions such as: “To which community does a document d belong?” - Requirement 3: the hubs and authorities identified by the CI algorithm should have a straightforward interpretability. - Requirement 4: CI algorithm should be able to handle overlapping communities.

3 A Critical Analysis of HITS and PHITS In this study, we consider only a specific category of CI algorithms which deal with the identification of hubs and authorities. HITS [2] and PHITS [3] are two of the most influential algorithms in this field [1]. 3.1 Hypertext Induced Topic Search The HITS algorithm starts from a citation graph which is represented by an adjacency matrix A. A Singular Value Decomposition (SVD) is then performed on A, yielding three matrices such that: A = USV. In the HITS’ terminology, matrix U is known as the hub matrix. It corresponds to the eigenvectors of the bibliographic coupling matrix AAT. Respectively, matrix V is called the authority matrix. It represents the eigenvectors of the co-citation matrix ATA. The major drawback of the HITS algorithm is related to the interpretability issue of the discovered communities. More precisely, it is well-known that the dominant community found by HITS can be easily interpreted because, by definition, its left and right singular vectors contain only positive values. However, the interpretability problem arises when trying to interpret the non principal singular vectors since they contain both positive and negative values [3] [4]. To bypass this problem, Kleinberg suggests an empirical rule to identify the communities in such situations. His heuristic consists in manually examining the positive and negative parts of each hub or authority vector. In fact, this rule is based on the observation that the relevant

communities are in some cases present in the positive part, and in other cases they are found in the negative part. Clearly, the Kleinberg’s rule imposes a serious limitation since we cannot automate the community identification task. By analyzing the HITS algorithm according to the requirements introduced in section 2, we can conclude the following: - Interpretation of HITS’s results is a tricky task (Req. 3). - HITS is unable to extract overlapping communities (Req. 4) since computed components are orthogonal. - Memberships of documents to communities cannot be obtained in a direct manner from matrices U and V (Req. 2). One has to use, subsequently, a clustering algorithm like K-means to get these memberships. 3.2 Probabilistic HITS PHITS is a community identification algorithm based on the PLSA model [5]. PLSA is a latent variable model which was initially proposed for text analysis. More precisely, the PLSA’s principle is that the relationship between documents and words can be explained by a small number of factors called topics. This model has been transposed by Cohn and Chang to the case of citation analysis by replacing words with citations. Although PLSA has been successfully applied to text analysis [5] and was shown to be superior to the well-known Latent Semantic Analysis through many experiments, no comparative evaluation has been carried out to validate the performances of PHITS over other CI algorithms. A notable exception is [6] where authors compare classification accuracy of PHITS to PLSI (i.e. link versus content analysis) in many configurations. Authors report a significant superiority of PLSI over PHITS. PHITS’ poor performances are actually due to its unsuitability for citation analysis. Citation (bibliographic and web) data are particular and different from other data such as texts. Especially, citation data are characterized by their large sparsity. To illustrate this specificity, let’s consider the Cora dataset used in Section 6. The dataset is composed of 3000 documents and 2500 unique words. While the total number of word occurrences is very large (170 000), the total number of links between documents is rather small (5 500). As it is well established in the discrete data analysis community, very sparse contingency tables poses many problems to techniques assuming a multinomial distribution of data and fitting models using the maximum likelihood estimation principle [7]. In section 5, we show that PHITS has poor clustering performance to find correct communities. Thus, we can claim that PHITS does not satisfy Req. 1.

4 Voting-based HITS The general approach used in VHITS is based on two steps:

Step A: Using an appropriate clustering algorithm, determine the members of each community. Here, “appropriate” means that the clustering algorithm should satisfy some requirements. These requirements include the ability to identify overlapping communities (Req. 4) and the efficiency in clustering citation data (Req. 1). In VHITS, we propose to use Nonnegative Matrix Factorization [8] which is a recent clustering algorithm meeting the aforementioned specifications. Step B: Once the communities have been identified, VHITS determines hubs and authorities characterizing each community. A voting scheme is employed so that each community elects its hubs and authorities based on the degrees of membership. 4.1 onnegative Matrix Factorization Nonnegative Matrix Factorization (NMF) is a recent statistical technique for matrix decomposition. Recently, NMF has been shown to be a powerful clustering technique. It has been explored in many data mining applications [9]. In text mining, for instance, it has been reported that NMF is able to elegantly extract the topics present in a collection of documents. p×q

NMF is based on the idea that any positive matrix M ∈ ℝ + can be approximated p× k

q× k

by two positive matrices F ∈ ℝ + and G ∈ ℝ + such that: M ≈ FG . T

Basically, NMF is an optimization problem with positivity constraints. Many versions of NMF exist, but they all differ in their objective function [8]. Here, we propose to use the objective minimizing the Euclidean distance between the original matrix M and the approximation FGT. In [8], the authors propose two simple update rules to solve the Euclidean version of NMF. These rules are used in the first part of VHITS. In our community identification task, NMF offers two important features. On the one hand, NMF clusters both rows and columns of the input data matrix. This characteristic is essential when identifying communities since rows (citing documents) and columns (cited documents) have different semantics. On the other hand, NMF is adapted to the analysis of overlapping clusters. This means that NMF allows a data point to belong to more than one cluster. In a nutshell, NMF is a soft clustering algorithm. The complete VHITS algorithm is given in Table 1. The first part (steps 1-5) of the algorithm identifies the members of the communities according to inlinks and outlinks. Thus, each community can be regarded from two different points of view: one is relative to the citing documents and the other is relative to the cited documents. In step 6 of VHITS, a normalization of communities’ indicators is performed. This normalization makes the membership levels look like fuzzy values. 4.2 Voting Scheme

The voting scheme employed by VHITS aims at ordering the hubs (resp. authorities) of each community according to their importance. It is based on the idea that, for each community, a vote is held to choose the hubs and authorities of that community. This vote is organized according to the following rules:

Algorithm: Voting-based HITS (VHITS). Input: An adjacency matrix D ∈ ℝ Output: Authority matrix A ∈ ℝ  ×K

Steps:

 ×

×K

and the number of communities K.

, hub matrix H ∈ ℝ

×K

, membership matrices

×K

I ∈ ℝ and O ∈ ℝ according to inlinks and outlinks, respectively. 1. Initialization: initialize A and H with random positive values, t ← 0 ; 2. Update membership value for every document in each community according to inlinks For i=1 to N and j=1 to K T

( t +1)

I ij

= I ij

(D O)ij

(t )

T

;

(IO O)ij

3. Update membership value for every document in each community according to outlinks For i=1 to N and j=1 to K ( t +1)

O ij

= O ij

(t )

(DI)ij T

;

(OI I)ij

4. t ← t + 1 ; 5. If a convergence criterion is not met then go to step 2; 6. Normalize rows of I and O to have unit L1 norm; 7. Identify authority candidates of each community

1 if I ij > 0 ACij =  0 else 8. Identify hub candidates of each community

1 if O ij > 0 HCij =  0 else 9. Compute authority score of every document in each community For i=1 to N and j=1 to K



 Dmi O mj if ACij = 1 A ij =  m =1 0 else 10. Compute hub score of every document in each community For i=1 to N and j=1 to K



 Dim I mj if HCij = 1 H ij =  m =1 0 else Table 1 - VHITS algorithm

- Each document has a voting right VR equal to one. However, this VR can be divided into portions in cases where the document belongs to more than one community. In such a situation, each community receives a VR part in proportion to the membership level of the document in that community. For example, if a document D belongs to communities C1 and C2 with membership degrees of 0.8 and 0.2 respectively, then, each member of C1 which is linked by D will receive a VR of 0.8, and each member of C2 which is linked by D will receive a VR of 0.2.

- An authority candidate of a community C is any member of C according to inlinks. Here, being a member of a community according to inlinks means having a non null membership in the community’s inlinks view. - A hub candidate of a community C is any member of C according to outlinks. Here, being a member of a community according to outlinks means having a non null membership in the community’s outlinks view. - In a community C, authority score of an authority candidate AC is computed by counting the sum of the VRs received by AC from the members of C which link to AC. - In a community C, hub score of a hub candidate HC is computed by counting the sum of the VRs received by HC from the members of C which are linked by HC.

5 Case Study Let us consider the citation graph depicted in Figure 1. This graph is used to illustrate which of the four requirements established in section 2, are met by the three algorithms: HITS, PHITS and VHITS. A natural analysis of this citation graph would reveal three communities: one independent (community 1: nodes 1-2-3-4-5) and two overlapping (community 2: nodes 6-7-8-9-10 and community 3: nodes 8-11-12-1314). First, we apply HITS on the adjacency matrix corresponding to the graph of Figure 1. The obtained authority matrix (AHITS) is reported in Table 2.

6 9 1

7 1

4

10

2

8 5

13

3

11 14 12

Figure 1 - An illustrative web graph

A HITS

 0 0.577 0   0 0.577 0   0 0.577 0   00 00 00   0.481 0 -0.316    =  0.481 0 -0.316  0.650 0 0  0 0 0   0 0 0   0.240 0 0.633   0.240 0 0.633   0 0 0   0 0 0 

Table 2 – Authority matrix returned by HITS

From Table 2, we observe that the first component (i.e. the first column of AHITS) computed by HITS corresponds to a mix of community 2 and community 3. It is composed of nodes 6-7-8-11-12 as authorities. Apropos of this result, many studies have been carried out about the first component returned by HITS. It has been shown that HITS suffers from the Tightly Knit Community effect, which means that HITS returns in his first component the most dense structure in the graph [10]. In practice, however, this dense structure does not necessarily represent a correct community (which is the case in our example). The second component, containing only positive values, can be easily interpreted. The component corresponds exactly to the desired community 1. Now, considering the third component, it is not clear which part of the component one has to consider. The component is composed of both positive and negative values. Surprisingly, in this example, the two parts of the component make sense. The positive part (nodes 11-12) corresponds to a subset of the correct community 3 and the negative part (nodes 6-7) denotes a subset of community 2. In this example, the HITS’ results confirm its non adequacy to extract overlapping communities. The example has also elucidated its interpretability problem. Due to space limitations, we report in Table 3 membership matrix according to inlinks and authority matrix returned by running VHITS on the graph of Figure 1. Moreover, results of PHITS, for this case study, are not reported because of their high similarity with those of VHITS. Unlike HITS, VHITS successfully identifies the expected communities. Furthermore, the returned components by VHITS have a straightforward interpretability. For instance, the first membership component of VHITS (first column of IVHITS) corresponds exactly to community 3. It is also interesting to observe the ability of VHITS to localize overlapping communities. In matrix IVHITS, we note that node 8 is reported to belong to both community 2 and community 3.

IVHITS

 0  0  0  00  0  = 0 0.322  0  0 1.000 1.000  0  0

0 1.000  0 1.000  0 1.000  0 0  0 0  1.000 0  1.000 0 0.678 0  0 0  0 0  0 0  0 0  0 0  0 0  

AVHITS

 0  0  0  00  0  = 0 0.842  0  0 1.842 1.842  0  0

0 2.000  0 2.000  0 2.000  0 0  0 0  2.000 0  2.000 0 2.158 0  0 0  0 0  0 0  0 0  0 0  0 0  

Table 3 – Membership matrix according to inlinks (IVHITS) and authority matrix (AVHITS) returned by VHITS

Now, let’s consider the authorities computed by VHITS for each community. For community 2 (corresponding to the second column of AVHITS), VHITS finds that node 8 is the most authoritative in that community. This result illustrates the difference between the authority and the membership concepts. Actually, according to column 2 of matrix IVHITS, nodes 6 and 7 are more likely than node 8 to be members of community 2. However, matrix AVHITS indicates that node 8 is more authoritative than nodes 6 and 7 in that community.

6 Experimental Results We report experimental results carried out to assess the clustering quality of HITS, PHITS and VHITS. We have used two pre-classified datasets. The first one is a subset of the well-known WebKb dataset [11]. This subset is a collection of 3100 web pages, where each page belongs to one of four predefined classes. The second one is the Cora dataset [12] which is composed of 3000 scientific papers. Each paper was manually classified into one of seven categories. The clustering output of each CI algorithm is evaluated using the traditional accuracy and the normalized mutual information. Obtained results are presented in Figures 2 and 3. We observe from Figures 2 and 3 that the PHITS’ results are poor comparatively to those of HITS and VHITS. This observation is even more emphasized by the normalized mutual information measure, which is a non biased clustering assessment measure. Results show also that HITS and VHITS have almost the same performances with a slight advance for VHITS on the WebKb dataset. Let’s notice also that, for the WebKb dataset, inlinks seem to have more importance than outlinks. However, the opposite phenomenon is observed with the Cora dataset. This observation is in accordance with previously reported studies about the importance of the inlinks for web page classification, and the usefulness of outlinks for bibliographic data classification.

7 Conclusion In this paper, two contributions have been presented. On the one hand, four specifications have been proposed for the evaluation of community identification algorithms. These four requirements include: the clustering quality, the ability to assign memberships to the documents, the interpretability of identified hubs and authorities, and the ability to deal with overlapping communities. We believe that using such specifications can play an important role in the construction of new community identification algorithms. On the other hand, an original algorithm namely, VHITS, has been described. VHITS is based on two techniques: Nonnegative Matrix Factorization and a voting scheme. Unlike HITS and PHITS, VHITS satisfied the four specifications. Our further investigations include the use of additional sources of information in VHITS such as content information [13], author information or anchor text information.

Figure 2 - Accuracy (left) and NMI (right) on WebKb

Figure 3 - Accuracy (left) and NMI (right) on Cora

References 1. Zhang, Y., Xu Yu, J., and Hou, J.: Web communities: Analysis and construction. Springer (2006) 2. Kleinberg, J. M.: Authoritative sources in a hyperlinked environment. Journal of the ACM, 46(5), 604–632 (1999) 3. Cohn, D., Chang, H.: Learning to probabilistically identify authoritative documents. In: 17th International Conference on Machine Learning, pp.167–174 (2000) 4. Chikhi, N.F., Rothenburger, B., Aussenac-Gilles N.: A comparison of dimensionality reduction techniques for web structure mining. In: IEEE/WIC/ACM International Conference on Web Intelligence, pp. 116–119 (2007) 5. Hofmann, T.: Probabilistic latent semantic analysis. In: 15th UAI Conference (1999) 6. Fisher, M., Everson. R.: When Are Links Useful? Experiments in Text Classification. In: 25th European Conference on Information Retrieval, LNCS 2633, pp. 41–56 (2003) 7. Agresti, A.: An Introduction to Categorical Data Analysis, 2nd Edition. Wiley (2007) 8. Lee, D., Seung, H.: Algorithms for non-negative matrix factorization. In: Neural Information Processing Systems, pages 556–562 (2000) 9. Chu, M.: Data mining and applied linear algebra. In: International Conference on Informatics Education and Research for Knowledge-Circulating Society, pp. 20–25 (2008) 10. Lempel, R., Moran, S.: The stochastic approach for link-structure analysis (SALSA) and the TKC effect. Computer Networks, 33(1-6), 387-401 (2000) 11. WebKB : http://www.cs.cmu.edu/~webkb/ 12. McCallum, A., Nigam, K., Rennie, J., Seymore K.: Automating the construction of internet portals with machine learning. Information Retrieval Journal, 3 (200), 127–163 (2000) 13. Zhu, D., Yu, K., Chi, Y., Gong, Y.: Combining content and link for classification using matrix factorization. In: 30th Annual Intl. ACM SIGIR Conference, pp. 487–494 (2007)

A new Algorithm for Community Identification in Linked ...

community identification, community mining, web communities. 1 Introduction. Since late nineties, identification of web communities has received much attention from researchers. HITS is a seminal algorithm in the community identification (CI) algorithms family. Since its invention, HITS has been followed by a multitude of CI.

240KB Sizes 0 Downloads 240 Views

Recommend Documents

Community Structure Identification: A Probabilistic ...
models have been successfully used in many data mining tasks such text clustering, .... generative of the training data only and are unable to generate new data.

A New Crossover Operator Used In Genetic Algorithm ...
JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 5, ISSUE 1, JANUARY 2011. 29 ... in the second parent will define which cells in the first.

A NEW ACTIVE LEARNING ALGORITHM FOR ...
We propose a new active learning algorithm to address the problem of selecting ..... from Microsoft Speech research group for their technical help. We also like to ...

A new algorithm for computing the minimum Hausdorff ...
Sort the spikes according to their left endpoints and add them from left to right. ... If we shift A* by t units, the left or the right endpoint will contribute at least |t| to ...

A New Algorithm for Finding Numerical Solutions of ... - IEEE Xplore
optimal control problem is the viscosity solution of its associated Hamilton-Jacobi-Bellman equation. An example that the closed form solutions of optimal ...

A new algorithm for finding numerical solutions of ...
Mar 2, 2009 - Department of Mathematics, Beijing Institute of Technology, Beijing .... Given a running cost L(t, y, u) and a terminal cost ψ(y), the optimal ...

A New Scheduling Algorithm for Distributed Streaming ...
Department of Computer Science and Technology, Tsinghua University, Beijing 100084 China. 1 This paper is ... Tel: +86 10 62782530; fax:+86 10 62771138; Email: [email protected]. Abstract ... In patching algorithm, users receive at.

A New NC-Algorithm for Finding a Perfect Matching in d-Regular ...
cubic-bipartite graphs, our algorithm as well as its analysis become much .... cycle vector in G is a big even cycle vector if it contains Ω(k) 3-vertices of G.

1 A Constraint-based Algorithm for the Identification of ...
Abstract. This paper presents two distributional constraints on the relative positions of root letters in an Arabic word. Given these constraints, it is possible to significantly reduce the search space for roots. To test their utility, these constra

NCB Saudi Economic Review - Linked - New Brand
launched an expanded asset purchase program in order to boost economic .... Housing and utilities prices edged up by 2.5%, the small- .... ly by businesses and individuals was unshaken by tum- bling oil ... tors shift towards time and savings account

Challenges for System Identification in Neural ... - Randal A. Koene
Aug 12, 2009 - by decomposing the overall problem into a collection of smaller Sys- .... cognitive neural prosthesis devised by the lab of Theodore Berger ...

Challenges for System Identification in Neural ... - Randal A. Koene
Aug 12, 2009 - system that implements a degree of intelligence and a degree of generality within .... out of the labs of Winfried Denk (Max Planck), Jeff Lichtman (Harvard) and ..... (2009), doi:10.1007/s12021–009–9052–3 (Published online:.

NCB Saudi Economic Review - Linked - New Brand
As for bullion, reduced physical demand by China and India, in addition to the reduced appeal of gold as a ... The flow of healthy corporate revenue announcements throughout Feb- ruary also supported stock prices ... banks' loan portfolio in contrast

Polony Identification Using the EM Algorithm Based on ...
Wei Li∗, Paul M. Ruegger†, James Borneman† and Tao Jiang∗. ∗Department of ..... stochastic linear system with the em algorithm and its application to.

A Clustering Algorithm for Radiosity in Complex ...
ume data structures useful for clustering. For the more accurate ..... This work was supported by the NSF grant “Interactive Computer. Graphics Input and Display ... Graphics and Scientific Visualization (ASC-8920219). The au- thors gratefully ...

Requirement for a structured algorithm in cardiac arrest following ...
Requirement for a structured algorithm in cardiac arrest ... ors, and preventability of traumatic deaths in Berlin.pdf. Requirement for a structured algorithm in ...

Requirement for a structured algorithm in cardiac arrest following ...
Whoops! There was a problem loading this page. Retrying... Requirement for a structured algorithm in cardiac arrest ... ors, and preventability of traumatic deaths in Berlin.pdf. Requirement for a structured algorithm in cardiac arrest f ... rors, an

A Clustering Algorithm for Radiosity in Complex Environments
Program of Computer Graphics. Cornell University. Abstract .... much of the analysis extends to general reflectance functions. To compute the exact radiance ...

A Scheduling Algorithm for MIMO DoF Allocation in ... - ECE Louisville
Index Terms—Scheduling, multi-hop wireless networks, MIMO, degree-of-freedom (DoF), throughput maximization. ♢. 1 INTRODUCTION ...... Engineering (NAE). Rongbo Zhu (M'10) is currently a professor in the College of Computer Science of South-. Cent

A multigrid-in-time algorithm for solving evolution ...
our multigrid-in-time algorithm simply calls an existing time-stepping routine. However, to ...... Algebraic Multigrid Cycle on HPC Platforms, in 25th ACM International Conference on Supercomputing,. Tucson, AZ ... App. Math. and Comp. Sci., 5.

A Scheduling Algorithm for MIMO DoF Allocation in ... - ECE Louisville
R. Zhu is with South-Central University for Nationalities, China. E-mail: [email protected]. Manuscript received August 25, 2014; revised January 19, 2015; ...... theory to practice: An overview of MIMO space-time coded wire- less systems,” IEEE

A Dynamic Scheduling Algorithm for Divisible Loads in ...
UMR exhibits the best performance among its family of algorithms. The MRRS .... by local applications (e.g. desktop applications) at the worker. The arrival of the local ..... u = (u1, u2, ... un) : the best solution so far, ui. {0,1} в : the value