Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3219819.3220019acmotherconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article
Public Access

Network Connectivity Optimization: Fundamental Limits and Effective Algorithms

Published: 19 July 2018 Publication History

Abstract

Network connectivity optimization, which aims to manipulate network connectivity by changing its underlying topology, is a fundamental task behind a wealth of high-impact data mining applications, ranging from immunization, critical infrastructure construction, social collaboration mining, bioinformatics analysis, to intelligent transportation system design. To tackle its exponential computation complexity, greedy algorithms have been extensively used for network connectivity optimization by exploiting its diminishing returns property. Despite the empirical success, two key challenges largely remain open. First, on the theoretic side, the hardness, as well as the approximability of the general network connectivity optimization problem are still nascent except for a few special instances. Second, on the algorithmic side, current algorithms are often hard to balance between the optimization quality and the computational efficiency. In this paper, we systematically address these two challenges for the network connectivity optimization problem. First, we reveal some fundamental limits by proving that, for a wide range of network connectivity optimization problems, (1) they are NP-hard and (2) (1-1/e) is the optimal approximation ratio for any polynomial algorithms. Second, we propose an effective, scalable and general algorithm (CONTAIN) to carefully balance the optimization quality and the computational efficiency.

Supplementary Material

MP4 File (chen_network_connectivity_optimization.mp4)

References

[1]
Réka Albert, Hawoong Jeong, and Albert-László Barabási . 1999. Internet: Diameter of the world-wide web. nature, Vol. 401, 6749 (1999), 130.
[2]
Réka Albert, Hawoong Jeong, and Albert-László Barabási . 2000. Error and attack tolerance of complex networks. nature, Vol. 406, 6794 (2000), 378--382.
[3]
Béla Bollobás . 2001. The Evolution of Random Graphs--the Giant Component (bibinfoedition2 ed.). Cambridge University Press, 130--159.
[4]
Deepayan Chakrabarti, Yang Wang, Chenxi Wang, Jurij Leskovec, and Christos Faloutsos . 2008. Epidemic thresholds in real networks. ACM Transactions on Information and System Security (TISSEC), Vol. 10, 4 (2008), 1.
[5]
Hau Chan, Leman Akoglu, and Hanghang Tong . 2014. Make it or break it: Manipulating robustness in large networks Proceedings of the 2014 SIAM International Conference on Data Mining. SIAM, 325--333.
[6]
Hau Chan, Shuchu Han, and Leman Akoglu . 2015. Where graph topology matters: the robust subgraph problem Proceedings of the 2015 SIAM International Conference on Data Mining. SIAM, 10--18.
[7]
Chen Chen, Jingrui He, Nadya Bliss, and Hanghang Tong . 2015. On the Connectivity of Multi-layered Networks: Models, Measures and Optimal Control Data Mining (ICDM), 2015 IEEE International Conference on. IEEE, 715--720.
[8]
Chen Chen and Hanghang Tong . 2017. On the eigen-functions of dynamic graphs: Fast tracking and attribution algorithms. Statistical Analysis and Data Mining: The ASA Data Science Journal, Vol. 10, 2 (2017), 121--135.
[9]
Chen Chen, Hanghang Tong, B. Aditya Prakash, Tina Eliassi-Rad, Michalis Faloutsos, and Christos Faloutsos . 2016 a. Eigen-Optimization on Large Graphs by Edge Manipulation. ACM Trans. Knowl. Discov. Data Vol. 10, 4, Article bibinfoarticleno49 (June . 2016), bibinfonumpages30 pages.
[10]
Chen Chen, Hanghang Tong, B Aditya Prakash, Charalampos E Tsourakakis, Tina Eliassi-Rad, Christos Faloutsos, and Duen Horng Chau . 2016 b. Node Immunization on Large Graphs: Theory and Algorithms. IEEE Transactions on Knowledge and Data Engineering, Vol. 28, 1 (2016), 113--126.
[11]
Xilun Chen and K Selcuk Candan . 2014. LWI-SVD: low-rank, windowed, incremental singular value decompositions on time-evolving data sets Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 987--996.
[12]
Allan Peter Davis, Cynthia J Grondin, Kelley Lennon-Hopkins, Cynthia Saraceni-Richards, Daniela Sciaky, Benjamin L King, Thomas C Wiegers, and Carolyn J Mattingly . 2015. The Comparative Toxicogenomics Database's 10th year anniversary: update 2015. Nucleic acids research Vol. 43, D1 (2015), D914--D920.
[13]
Linton C Freeman . 1978. Centrality in social networks conceptual clarification. Social networks, Vol. 1, 3 (1978), 215--239.
[14]
Mark Jerrum and Alistair Sinclair . 1988. Conductance and the rapid mixing property for Markov chains: the approximation of permanent resolved. In Proceedings of the twentieth annual ACM symposium on Theory of computing. ACM, 235--244.
[15]
Ling Jian, Jundong Li, and Huan Liu . 2018. Toward online node classification on streaming networks. Data Min. Knowl. Discov. Vol. 32, 1 (2018), 231--257.
[16]
WU Jun, Mauricio Barahona, Tan Yue-Jin, and Deng Hong-Zhong . 2010. Natural connectivity of complex networks. Chinese physics letters Vol. 27, 7 (2010), 078902.
[17]
Samir Khuller, Anna Moss, and Joseph Seffi Naor . 1999. The budgeted maximum coverage problem. Inform. Process. Lett. Vol. 70, 1 (1999), 39--45.
[18]
Jon Kleinberg and Eva Tardos . 2006. Algorithm design. Pearson Education India.
[19]
Istvan A Kovacs and Albert-Laszlo Barabasi . 2015. Network science: Destruction perfected. Nature, Vol. 524, 7563 (2015), 38--39.
[20]
Long T Le, Tina Eliassi-Rad, and Hanghang Tong . 2015. MET: A fast algorithm for minimizing propagation in large graphs with small eigen-gaps Proceedings of the 2015 SIAM International Conference on Data Mining. SIAM, 694--702.
[21]
Jure Leskovec, Jon Kleinberg, and Christos Faloutsos . 2005. Graphs over time: densification laws, shrinking diameters and possible explanations Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining. ACM, 177--187.
[22]
Jure Leskovec, Jon Kleinberg, and Christos Faloutsos . 2007. Graph evolution: Densification and shrinking diameters. ACM Transactions on Knowledge Discovery from Data (TKDD), Vol. 1, 1 (2007), 2.
[23]
Jundong Li, Harsh Dani, Xia Hu, Jiliang Tang, Yi Chang, and Huan Liu . 2017. Attributed Network Embedding for Learning in a Dynamic Environment Proceedings of CIKM 2017. ACM, 387--396.
[24]
Liangyue Li, Hanghang Tong, Yanghua Xiao, and Wei Fan . 2015. Cheetah: fast graph kernel tracking on dynamic graphs Proceedings of the 2015 SIAM International Conference on Data Mining. SIAM, 280--288.
[25]
Rong-Hua Li and Jeffrey Xu Yu . 2015. Triangle minimization in large networks. Knowledge and Information Systems Vol. 45, 3 (2015), 617--643.
[26]
Julian Mcauley and Jure Leskovec . 2014. Discovering social circles in ego networks. ACM Transactions on Knowledge Discovery from Data (TKDD), Vol. 8, 1 (2014), 4.
[27]
Ron Milo, Shai Shen-Orr, Shalev Itzkovitz, Nadav Kashtan, Dmitri Chklovskii, and Uri Alon . 2002. Network motifs: simple building blocks of complex networks. Science, Vol. 298, 5594 (2002), 824--827.
[28]
Mark EJ Newman . 2008. The mathematics of networks. The new palgrave encyclopedia of economics Vol. 2 (2008), 1--12.
[29]
Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd . 1999. The PageRank citation ranking: Bringing order to the web. Technical Report.
[30]
B Aditya Prakash, Deepayan Chakrabarti, Nicholas C Valler, Michalis Faloutsos, and Christos Faloutsos . 2012. Threshold conditions for arbitrary cascade models on arbitrary networks. Knowledge and information systems Vol. 33, 3 (2012), 549--575.
[31]
Michael Sipser . 1997. Introduction to the theory of computation. PWS Publishing Company.
[32]
Jie Tang, Jing Zhang, Limin Yao, Juanzi Li, Li Zhang, and Zhong Su . 2008. Arnetminer: extraction and mining of academic social networks Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 990--998.
[33]
Charalampos E Tsourakakis . 2008. Fast counting of triangles in large real networks without counting: Algorithms and laws 2008 Eighth IEEE International Conference on Data Mining. IEEE, 608--617.
[34]
Stanley Wasserman and Katherine Faust . 1994. Social network analysis: Methods and applications. Vol. Vol. 8. Cambridge university press.
[35]
Hao Yin, Austin R. Benson, Jure Leskovec, and David F. Gleich . 2017. Local Higher-Order Graph Clustering. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 555--564.
[36]
Dawei Zhou, Si Zhang, Mehmet Yigit Yildirim, Scott Alcorn, Hanghang Tong, Hasan Davulcu, and Jingrui He . 2017. A Local Algorithm for Structure-Preserving Graph Cut Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 655--664.

Cited By

View all
  • (2024)Accelerating the Decentralized Federated Learning via Manipulating EdgesProceedings of the ACM Web Conference 202410.1145/3589334.3645509(2945-2954)Online publication date: 13-May-2024
  • (2024)Finding the key nodes to minimize the victims of the malicious information in complex networkKnowledge-Based Systems10.1016/j.knosys.2024.111632293(111632)Online publication date: Jun-2024
  • (2023)Measures and Optimization for Robustness and Vulnerability in Disconnected NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.327997918(3350-3362)Online publication date: 2023
  • Show More Cited By

Index Terms

  1. Network Connectivity Optimization: Fundamental Limits and Effective Algorithms

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    KDD '18: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining
    July 2018
    2925 pages
    ISBN:9781450355520
    DOI:10.1145/3219819
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 July 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. graph mining
    2. network connectivity

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    KDD '18
    Sponsor:

    Acceptance Rates

    KDD '18 Paper Acceptance Rate 107 of 983 submissions, 11%;
    Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)135
    • Downloads (Last 6 weeks)21
    Reflects downloads up to 03 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Accelerating the Decentralized Federated Learning via Manipulating EdgesProceedings of the ACM Web Conference 202410.1145/3589334.3645509(2945-2954)Online publication date: 13-May-2024
    • (2024)Finding the key nodes to minimize the victims of the malicious information in complex networkKnowledge-Based Systems10.1016/j.knosys.2024.111632293(111632)Online publication date: Jun-2024
    • (2023)Measures and Optimization for Robustness and Vulnerability in Disconnected NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.327997918(3350-3362)Online publication date: 2023
    • (2023)Propagation Losses Algorithm for Indoor Wireless Sensor Network2023 Photonics & Electromagnetics Research Symposium (PIERS)10.1109/PIERS59004.2023.10221251(1772-1778)Online publication date: 3-Jul-2023
    • (2023)Efficient Public Transport Planning on Roads2023 IEEE 39th International Conference on Data Engineering (ICDE)10.1109/ICDE55515.2023.00188(2443-2455)Online publication date: Apr-2023
    • (2022)Network Connectivity: Concepts, Computation, and OptimizationSynthesis Lectures on Learning, Networks, and Algorithms10.2200/S01154ED1V01Y202111LNA0283:1(1-165)Online publication date: 25-Jan-2022
    • (2021)Fast Connectivity Minimization on Large-Scale NetworksACM Transactions on Knowledge Discovery from Data10.1145/344234215:3(1-25)Online publication date: 3-May-2021
    • (2021)Heterogeneous Wireless Sensor Network Development and Deployment Based on Sensor Nodes Density2021 25th International Conference Electronics10.1109/IEEECONF52705.2021.9467447(1-6)Online publication date: 14-Jun-2021
    • (2020)Finding the Best k in Core Decomposition: A Time and Space Optimal Solution2020 IEEE 36th International Conference on Data Engineering (ICDE)10.1109/ICDE48307.2020.00065(685-696)Online publication date: Apr-2020
    • (2019)N2NProceedings of the 28th ACM International Conference on Information and Knowledge Management10.1145/3357384.3357910(861-870)Online publication date: 3-Nov-2019

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media