Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Greedily Improving Our Own Closeness Centrality in a Network

Published: 20 July 2016 Publication History

Abstract

The closeness centrality is a well-known measure of importance of a vertex within a given complex network. Having high closeness centrality can have positive impact on the vertex itself: hence, in this paper we consider the optimization problem of determining how much a vertex can increase its centrality by creating a limited amount of new edges incident to it. We will consider both the undirected and the directed graph cases. In both cases, we first prove that the optimization problem does not admit a polynomial-time approximation scheme (unless P = NP), and then propose a greedy approximation algorithm (with an almost tight approximation ratio), whose performance is then tested on synthetic graphs and real-world networks.

References

[1]
Arnetminer. Accessed January 15, 2015 from http://arnetminer.org.
[2]
Konstantin Avrachenkov and Nelly Litvak. 2006. The effect of new links on Google PageRank. Stoch. Models 22, 2 (2006), 319--331.
[3]
Lars Backstrom and Jure Leskovec. 2011. Supervised random walks: Predicting and recommending links in social networks. In Proceedings of the 4th ACM International Conference on Web Search and Data Mining (WSDM’11). ACM, 635--644.
[4]
Albert-Laszlo Barabasi and Reka Albert. 1999. Emergence of scaling in random networks. Science 286, 5439 (1999), 509--512.
[5]
Reinhard Bauer, Gianlorenzo D’Angelo, Daniel Delling, Andrea Schumm, and Dorothea Wagner. 2012. The shortcut problem -- Complexity and algorithms. J. Graph Algorithms Appl. 16, 2 (2012), 447--481.
[6]
Edward A. Bender and E. Rodney Canfield. 1978. The asymptotic number of labeled graphs with given degree sequences. J. Comb. Theory Ser. A 24, 3 (1978), 296--307.
[7]
Davide Bilò, Luciano Gualà, and Guido Proietti. 2012. Improved approximability and non-approximability results for graph diameter decreasing problems. Theor. Comput. Sci. 417 (2012), 12--22.
[8]
Paolo Boldi and Sebastiano Vigna. 2014. Axioms for centrality. Internet Math. 10, 3--4 (2014), 222--262.
[9]
Béla Bollobás, Christian Borgs, Jennifer Chayes, and Oliver Riordan. 2003. Directed scale-free graphs. In Proceedings of the 14th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA’03). SIAM, 132--139.
[10]
Flavio Chierichetti, Ravi Kumar, Silvio Lattanzi, Alessandro Panconesi, and Prabhakar Raghavan. 2009. Models for the compressible web. In Proceedings of the 50th Annual Symposium on Foundations of Computer Science (FOCS’09). IEEE, 331--340.
[11]
Edith Cohen, Daniel Delling, Thomas Pajor, and Renato F. Werneck. 2014. Computing Classic Closeness Centrality, at Scale. Technical Report MSR-TR-2014-71. http://research.microsoft.com/apps/pubs/default.aspx?id=217367.
[12]
Pierluigi Crescenzi, Gianlorenzo D’Angelo, Lorenzo Severini, and Yllka Velaj. 2015. Greedily improving our own centrality in a network. In Proceedings of the 14th International Symposium on Experimental Algorithms (SEA’15). Lecture Notes in Computer Science, Vol. 9125. Springer, 43--55.
[13]
Gianlorenzo D’Angelo, Lorenzo Severini, and Yllka Velaj. 2016. On the maximum betweenness improvement problem. Electron. Notes Theor. Comput. Sci. 322 (2016), 153--168. Proceedings of the 16th Italian Conference on Theoretical Computer Science (ICTCS’15).
[14]
Sina Dehghani, Mohammad Amin Fazli, Jafar Habibi, and Sadra Yazdanbod. 2015. Using shortcut edges to maximize the number of triangles in graphs. Oper. Res. Lett. 43, 6 (2015), 6.
[15]
Erik D. Demaine and Morteza Zadimoghaddam. 2010. Minimizing the diameter of a network using shortcut edges. In Proceedings of the 12th Scandinavian Symposium and Workshop on Algorithm Theory (SWAT’10). Lecture Notes in Computer Science, Vol. 6139. Springer, 420--431.
[16]
I. Dinur and D. Steurer. 2014. Analytical approach to parallel repetition. In Proceedings of the 46th Annual ACM Symposium on Theory of Computing. ACM, 624--633.
[17]
P. Erdős and A. Rényi. 1959. On random graphs I. Publ. Math. 6 (1959), 290--297.
[18]
Uriel Feige. 1998. A threshold of ln n for approximating set cover. J. ACM 45, 4 (1998).
[19]
Fabrizio Frati, Serge Gaspers, Joachim Gudmundsson, and Luke Mathieson. 2015. Augmenting graphs to minimize the diameter. Algorithmica 72, 4 (2015), 995--1010.
[20]
GNU. GLPK -- GNU Linear Programming Kit. http://www.gnu.org/software/glpk.
[21]
IMDB. Accessed January 15, 2015 from http://www.imdb.com.
[22]
Vatche Ishakian, Dóra Erdös, Evimaria Terzi, and Azer Bestavros. 2012. A framework for the evaluation and management of network centrality. In Proceedings of the 12th SIAM Int. Conf. on Data Mining (SDM). SIAM, 427--438.
[23]
Miray Kas, Matthew Wachs, Kathleen M. Carley, and L. Richard Carley. 2013. Incremental algorithm for updating betweenness centrality in dynamically growing networks. In Proceedings of Advances in Social Networks Analysis and Mining (ASONAM’13). ACM, 33--40.
[24]
David Kempe, Jon Kleinberg, and Éva Tardos. 2015. Maximizing the spread of influence through a social network. Theory Comput. 11, 4 (2015), 105--147.
[25]
Ravi Kumar, Prabhakar Raghavan, Sridhar Rajagopalan, D. Sivakumar, Andrew Tomkins, and Eli Upfal. 2000. Stochastic models for the web graph. In Proceedings of the 41st Annual Symposium on Foundations of Computer Science (FOCS’00). IEEE, 57--65.
[26]
Jérome Kunegis. 2013. KONECT -- The Koblenz network collection. In Proceedings of the 1st International Web Observatory Workshop (WOW’13). 1343--1350.
[27]
LAW. Laboratory for Web Algorithmics. Accessed January 15, 2015 from http://law.di.unimi.it/index.php.
[28]
Jure Leskovec, Jon Kleinberg, and Christos Faloutsos. 2007. Graph evolution: Densification and shrinking diameters. ACM Trans. Knowl. Discov. Data 1, 1 (March 2007), Article no. 2.
[29]
Jure Leskovec and Andrej Krevl. 2014. SNAP Datasets: Stanford Large Network Dataset Collection. Accessed June, 2014 from http://snap.stanford.edu/data.
[30]
Michael Ley. DBLP. Accessed January 15, 2015 from http://dblp.uni-trier.de/.
[31]
Rong-Hua Li and Jeffrey Xu Yu. 2015. Triangle minimization in large networks. Knowl. Inf. Syst. 45, 3 (2015), 617--643.
[32]
David Liben-Nowell and Jon Kleinberg. 2003. The link prediction problem for social networks. In Proceedings of the 12th International Conference on Information and Knowledge Management (CIKM’03). ACM, 556--559.
[33]
Adam Meyerson and Brian Tagiku. 2009. Minimizing average shortest path distances via shortcut edge addition. In Proceedings of the 13th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX’09). Lecture Notes in Computer Science, Vol. 5687. Springer, 272--285.
[34]
Michael Molloy and Bruce Reed. 1995. A critical point for random graphs with a given degree sequence. Random Struct. Algorithms 6, 2--3 (1995), 161--180.
[35]
G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. 1978. An analysis of approximations for maximizing submodular set functions--I. Math. Program. 14, 1 (1978), 265--294.
[36]
Martin Olsen and Anastasios Viglas. 2014. On the approximability of the link building problem. Theor. Comput. Sci. 518 (2014), 96--116.
[37]
Christos H. Papadimitriou and Mihalis Yannakakis. 1991. Optimization, approximation, and complexity classes. J. Comput. Syst. Sci. 43, 3 (1991), 425--440.
[38]
Manos Papagelis. 2015. Refining social graph connectivity via shortcut edge addition. ACM Trans. Knowl. Discov. Data 10, 2 (2015), 12.
[39]
Manos Papagelis, Francesco Bonchi, and Aristides Gionis. 2011. Suggesting ghost edges for a smaller world. In Proceedings of the 20th ACM International Conference on Information and Knowledge Management (CIKM’11). ACM, 2305--2308.
[40]
Nikos Parotsidis, Evaggelia Pitoura, and Panayiotis Tsaparas. 2015. Selecting shortcuts for a smaller world. In Proceedings of the 2015 SIAM International Conference on Data Mining. SIAM, 28--36.
[41]
Nikos Parotsidis, Evaggelia Pitoura, and Panayiotis Tsaparas. 2016. Centrality-aware link recommendations. In Proceedings of the 9th ACM International Conference on Web Search and Data Mining (WSDM’16). ACM, 503--512.
[42]
S. Perumal, P. Basu, and Ziyu Guan. 2013. Minimizing eccentricity in composite networks via constrained edge additions. In Proceedings of IEEE Military Communications Conference (MILCOM’13). 1894--1899.
[43]
Alexandrin Popescul and Lyle H. Ungar. 2003. Statistical relational learning for link prediction. In Proceedings of IJCAI Workshop on Learning Statistical Models from Relational Data.
[44]
Sudip Saha, Abhijin Adiga, B. Aditya Prakash, and Anil Kumar S. Vullikanti. 2015. Approximation algorithms for reducing the spectral radius to control epidemic spread. In Proceedings of the 2015 SIAM International Conference on Data Mining. SIAM, 568--576.
[45]
Ahmet Erdem Sariyüce, Kamer Kaya, Erik Saule, and Ümit V. Çatalyürek. 2013. Incremental algorithms for closeness centrality. In Proceedings of the 2013 IEEE International Conference on Big Data. IEEE, 487--492.
[46]
Hanghang Tong, B. Aditya Prakash, Tina Eliassi-Rad, Michalis Faloutsos, and Christos Faloutsos. 2012. Gelling, and melting, large graphs by edge manipulation. In Proceedings of the 21st ACM International Conference on Information and Knowledge Management (CIKM’12). ACM, 245--254.
[47]
Uri AlonLab. Accessed January 15, 2015 from http://www.weizmann.ac.il/mcb/UriAlon/.
[48]
Duncan J. Watts and Steven H. Strogatz. 1998. Collective dynamics of ‘small-world’ networks. Nature 393, 6684 (1998), 440--442.
[49]
Erjia Yan and Ying Ding. 2009. Applying centrality measures to impact analysis: A coauthorship network analysis. J. Assoc. Inf. Sci. Technol. 60, 10 (2009), 2107--2118.
[50]
Zhijun Yin, Manish Gupta, Tim Weninger, and Jiawei Han. 2010. A unified framework for link recommendation using random walks. In Proceedings of International Conference on Advances in Social Networks Analysis and Mining (ASONAM’10). IEEE Computer Society, 152--159.

Cited By

View all
  • (2024)Exploring social networks in foster caring: The mockingbird family in AustraliaJournal of Social and Personal Relationships10.1177/0265407524123045541:7(1869-1891)Online publication date: 31-Jan-2024
  • (2024)Optimizing Network Resilience via Vertex AnchoringProceedings of the ACM Web Conference 202410.1145/3589334.3645465(606-617)Online publication date: 13-May-2024
  • (2024)Resistance Eccentricity in Graphs: Distribution, Computation and Optimization2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00315(4113-4126)Online publication date: 13-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Knowledge Discovery from Data
ACM Transactions on Knowledge Discovery from Data  Volume 11, Issue 1
February 2017
288 pages
ISSN:1556-4681
EISSN:1556-472X
DOI:10.1145/2974720
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 July 2016
Accepted: 01 June 2016
Revised: 01 May 2016
Received: 01 September 2015
Published in TKDD Volume 11, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Approximation algorithms
  2. graph augmentation
  3. greedy algorithm
  4. large networks

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • 14th International Symposium on Experimental Algorithms (SEA)

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)81
  • Downloads (Last 6 weeks)12
Reflects downloads up to 01 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Exploring social networks in foster caring: The mockingbird family in AustraliaJournal of Social and Personal Relationships10.1177/0265407524123045541:7(1869-1891)Online publication date: 31-Jan-2024
  • (2024)Optimizing Network Resilience via Vertex AnchoringProceedings of the ACM Web Conference 202410.1145/3589334.3645465(606-617)Online publication date: 13-May-2024
  • (2024)Resistance Eccentricity in Graphs: Distribution, Computation and Optimization2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00315(4113-4126)Online publication date: 13-May-2024
  • (2024)Dendrobium nobile alkaloids modulate calcium dysregulation and neuroinflammation in Alzheimer's disease: A bioinformatic analysisPharmacological Research - Modern Chinese Medicine10.1016/j.prmcm.2024.10049512(100495)Online publication date: Sep-2024
  • (2024)Adversarial analysis of similarity-based sign predictionArtificial Intelligence10.1016/j.artint.2024.104173(104173)Online publication date: Jun-2024
  • (2024)Mapping the entrepreneurship ecosystem scholarship: current state and future directionsInternational Entrepreneurship and Management Journal10.1007/s11365-024-00975-520:4(3035-3080)Online publication date: 2-May-2024
  • (2024)Tackling school segregation with transportation network interventions: an agent-based modelling approachAutonomous Agents and Multi-Agent Systems10.1007/s10458-024-09652-x38:1Online publication date: 20-May-2024
  • (2023)How Flexible is CXL's Memory Protection?Queue10.1145/360601421:3(54-64)Online publication date: 5-Jul-2023
  • (2023)Echoes of IntelligenceQueue10.1145/360601121:3(36-53)Online publication date: 27-Jun-2023
  • (2023)Closeness Centrality on Uncertain GraphsACM Transactions on the Web10.1145/360491217:4(1-29)Online publication date: 11-Jul-2023
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media