Degree Preserving Randomization is a technique used in Network Science that aims to assess whether or not variations observed in a given graph could simply be an artifact of the graph's inherent structural properties rather than properties unique to the nodes, in an observed network.

Background

Cataloged as early as 1996,[1] the simplest implementation of degree preserving randomization relies on a Monte Carlo algorithm that rearranges, or "rewires" the network at random such that, with a sufficient number of rewires, the network's degree distribution is identical to the initial degree distribution of the network, though the topological structure of the network has become completely distinct from the original network.

A demonstration of a single iteration of the Degree Preserving Randomization algorithm.

Degree preserving randomization, while it has many different forms, typically takes on the form of a relatively simple approach: for any network consisting of nodes with edges, select two dyadically tied nodes. For each of these dyadic pairs, switch the edges such that the new dyadic pairs are mismatched. After a sufficient number of these mismatches, the network increasingly loses its original observed topography.

As is common with algorithms based on Markov chains, the number of iterations, or individual rewires, that must occur on a given graph such that the graph is sufficiently random and distinct from the original graph is unknown, though Espinoza[2] asserts that a safe minimum threshold is , where "is at least 100" (Espinoza). Others have provided input for this issue, including one author who states that a safe minimum may instead be at least , where epsilon lies in a range between and , though ultimately the correct number is not presently known.[3][4]

Uses

There are several cases in which published research have explicitly employed degree preserving randomization in order to analyze network properties. Dekker[5] used rewiring in order to more accurately model observed social networks by adding a secondary variable, , which introduces a high-degree attachment bias. Liu et al.[6] have additionally employed degree preserving randomization to assert that the Control Centrality, a metric they identify, alters little when compared to the Control Centrality of an Erdős–Rényi model containing the same number of nodes in their simulations - Liu et al. have also used degree preserving randomization models in subsequent work exploring network controllability.[7]

Additionally, some work has been done in investigating how Degree Preserving Randomization may be used in addressing considerations of anonymity in networked data research, which has been shown to be a cause for concern in Social Network Analysis, as in the case of a study by Lewis et al.[8][9] Ultimately the work conducted by Ying and Wu, starting from a foundation of Degree Preserving Randomization, and then forwarding several modifications, has showed moderate advances in protecting anonymity without compromising the integrity of the underlying utility of the observed network.[10]

Additionally, the method is similar in nature to the broadly used Exponential random graph models popularized in social science,[11][12] and indeed the various forms of modeling networks against observed networks in order to identify and theorize about the differences expressed in real networks. Importantly, Degree Preserving Randomization provides a simple algorithmic design for those familiar with programming to apply a model to an available observed network.

Example

What follows is a small example showing how one may apply Degree Preserving Randomization to an observed network in an effort to understand the network against otherwise random variation while maintaining the degree distributional aspect of the network. The Association of Internet Researchers has a Listserv that constitutes the majority of discussion threads surrounding their work. On it, members post updates about their own research, upcoming conferences, calls for papers and also engage one another in substantive discussions in their field. These emails can in turn constitute a directed and temporal network graph, where nodes are individual e-mail accounts belonging to the Listserv and edges are cases in which one e-mail address responds to another e-mail address on the Listserv.

Results from Degree Preserving Randomization Trials.

In this observed network, the properties of the Listserv are relatively simple to calculate - for the network of 3,235 individual e-mail accounts and 9,824 exchanges in total, the observed reciprocity of the network is about 0.074, and the [Average path length|average path length] is about 4.46. Could these values be arrived at simply through the nature of the network's inherent structure?

Applying the rule, this network would require around 67,861 individual edge rewires to construct a likely sufficiently random degree-preserved graph. If we construct many random, degree preserving graphs from the real graph, we can then create a probability space for characteristics, such as reciprocity and average path length, and assess the degree to which the network could have expressed these characteristics at random. 534 networks were generated using Degree Preserving Randomization. As both reciprocity and average path length in this graph are normally distributed, and as the standard deviation for both reciprocity and average path length are far too narrow to include the observed case, we can reasonably posit that this network is expressing characteristics that are non-random (and thus open for further theory and modeling).

References

  1. Rao, A Ramachandra; Jana, Rabindranath; Bandyopadhyay, Suraj (1996). "A Markov chain Monte Carlo method for generating random (0, 1)-matrices with given marginals" (PDF). Indian Journal of Statistics Series A. Retrieved November 5, 2014.
  2. Espinoza, Max. "On Network Randomization Methods: A Negative Control Study" (PDF). {{cite journal}}: Cite journal requires |journal= (help)
  3. Re: [igraph] Degree-preserving rewiring of a large graph
  4. Pinar, Ali; Ray, Jaideep; Seshadri, S. (2012), Are we there yet? When to stop a Markov chain while generating random graphs (PDF), arXiv:1202.3473, Bibcode:2012arXiv1202.3473R
  5. Dekker, A.H. (2007), "Realistic Social Networks for Simulation using Network Rewiring" (PDF), Proceedings MODSIM 2007
  6. Liu, Y-Y.; Slotine, J-J; Barabási, A-L (2012), "Control Centrality and Hierarchical Structure in Complex Networks", PLOS ONE, 7 (9): e44459, arXiv:1203.2655, Bibcode:2012PLoSO...744459L, doi:10.1371/journal.pone.0044459, PMC 3459977, PMID 23028542
  7. Liu, Yang-Yu; Slotine, Jean-Jacques; Barabási, Albert-Laszlo (2013), "Effect of correlations on network controllability", Sci. Rep., 3: 1067, arXiv:1203.5161, Bibcode:2013NatSR...3E1067P, doi:10.1038/srep01067, PMC 3545232, PMID 23323210
  8. Parry, Marc (July 10, 2011), "Harvard Researchers Accused of Breaching Students' Privacy", The Chronicle of Higher Education, retrieved November 5, 2014
  9. Lewis, Kevin; Kaufman, Jason; Gonzalez, Marco; Wimmer, Andreas; Christakis, Nicholas (2008), "Tastes, ties, and time: A new social network dataset using Facebook.com" (PDF), Social Networks, 30 (4): 330–342, CiteSeerX 10.1.1.158.9087, doi:10.1016/j.socnet.2008.07.002
  10. Ying, Xiaowei; Wu, Xintao (2008), "Randomizing Social Networks: a Spectrum Preserving Approach", SDM: 739–750, CiteSeerX 10.1.1.140.6647, doi:10.1137/1.9781611972788.67, ISBN 978-0-89871-654-2
  11. Snijders, Tom AB. (2002), "Markov chain Monte Carlo estimation of exponential random graph models", Journal of Social Structure, 3 (2): 1–40
  12. Robins, Garry; Patterson, Pip; Kalish, Yuval; Lusher, Dean (2007), "An introduction to exponential random graph models for social networks", Social Networks, 29 (2): 173–191, doi:10.1016/j.socnet.2006.08.002, hdl:1959.3/216571
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.