Professional Documents
Culture Documents
Rise and Fall Patterns of Information Diffusion
Rise and Fall Patterns of Information Diffusion
Y. Matsubara et al.
CMU SCS
yes we can
C. Faloutsos (CMU)
CMU SCS
100
100
50
50
50
0
0
100
50
100
50
0
0
0
0
100
50
100
50
50
100
0
0
0
0
100
50
100
50
100
50
50
C. Faloutsos (CMU)
100
0
0
CMU SCS
100
100
50
50
50
0
0
100
50
100
50
0
0
0
0
100
50
100
50
50
100
0
0
0
0
100
50
100
50
100
50
50
C. Faloutsos (CMU)
100
0
0
CMU SCS
20
40
60 80
Time
Value
50
0
20
40
60 80
Time
100 120
Original
SpikeM
100
100 120
20
40
60 80
Time
50
0
20
40
60 80
Time
100 120
50
0
100 120
Original
SpikeM
100
Value
50
Original
SpikeM
100
20
C. Faloutsos (CMU)
60 80
Time
100 120
Original
SpikeM
50
0
20
40
100
Value
Value
Value
50
Original
SpikeM
100
Value
Original
SpikeM
100
40
60 80
Time
100 120
CMU SCS
Time n=0
Time n=nb
Time n=nb+1
f(n)
- 2013Decay function
Google, June
C. Faloutsos (CMU)
6
CMU SCS
Time n=0
Time n=nb
Time n=nb+1
1.5
f(n)
f (n) * 7n
- 2013Decay function
Google, June
C. Faloutsos (CMU)
CMU SCS
-1.5 slope
J. G. Oliveira & A.-L. Barabsi Human Dynamics: The
Correspondence Patterns of Darwin and Einstein.
Nature 437, 1251 (2005) . [PDF]
Prob(RT > x)
(log)
-1.5
C. Faloutsos (CMU)
Details
CMU SCS
B(n1) p(n1)U(n)
(B(t) S(t))f (n1 t)
tn
b
Periodicity
noon
Bloggers change their
activity over time
activity
Peak
3am
Dip
p(n)
Time n
C. Faloutsos (CMU)
CMU SCS
Details
Rise-part
Lin-log
SI -> exponential
SpikeM -> exponential
Log-log
Google, June 2013
C. Faloutsos (CMU)
10
CMU SCS
Details
Fall-part
Lin-log
SI -> exponential
SpikeM -> power law
Google, June 2013
C. Faloutsos (CMU)
Log-log
11
CMU SCS
Tail-part forecasts
SpikeM can capture tail part
C. Faloutsos (CMU)
12
CMU SCS
What-if forecasting
(1) First
spike
(2) Release
date
?
e.g., given (1) first spike,
(2) release date of two sequel movies
(3) access volume before the release date
Google, June 2013
C. Faloutsos (CMU)
13
CMU SCS
What-if forecasting
(1) First
spike
(2) Release
date
C. Faloutsos (CMU)
14
CMU SCS
C. Faloutsos (CMU)
15
CMU SCS
Roadmap
Graph problems:
G1: Fraud detection BP
G2: Botnet detection spectral
G3: Beyond graphs: tensors and ``NELL
C. Faloutsos (CMU)
16
CMU SCS
C. Faloutsos (CMU)
17
CMU SCS
Tom Mitchell
George Karypis
N. Sidiropoulos
C. Faloutsos (CMU)
V. Papalexakis
18
CMU SCS
Thanks
CMU SCS
Prof. U Kang
Google, June 2013
20
CMU SCS
Cast
Akoglu,
Leman
McGlohon,
Mary
Google, June 2013
Beutel,
Alex
Prakash,
Aditya
Chau,
Polo
Kang, U
Papalexakis,
Vagelis
C. Faloutsos (CMU)
Koutra,
Danai
Tong,
Hanghang
21
CMU SCS
References
Deepayan Chakrabarti, Christos Faloutsos: Graph
mining: Laws, generators, and algorithms. ACM
Comput. Surv. 38(1): (2006)
C. Faloutsos (CMU)
22
CMU SCS
References
Christos Faloutsos, Tamara G. Kolda, Jimeng Sun:
Mining large graphs and streams using matrix and
tensor tools. Tutorial, SIGMOD Conference 2007:
1174
C. Faloutsos (CMU)
23
CMU SCS
References
Yasuko Matsubara, Yasushi Sakurai, B. Aditya
Prakash, Lei Li, Christos Faloutsos, "Rise and Fall
Patterns of Information Diffusion: Model and
Implications", KDD12, pp. 6-14, Beijing, China,
August 2012
C. Faloutsos (CMU)
24
CMU SCS
References
Jimeng Sun, Dacheng Tao, Christos
Faloutsos: Beyond streams and graphs:
dynamic tensor analysis. KDD 2006: 374383
C. Faloutsos (CMU)
25
CMU SCS
Overall Conclusions
G1: fraud detection
BP: powerful method
FaBP: faster; equally accurate; known
convergence
Original
SpikeM
Value
100
C. Faloutsos (CMU)
26
50
0
20
40
60 80
Time
100 120