skip to main content
10.1145/2623330.2623664acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Using strong triadic closure to characterize ties in social networks

Published:24 August 2014Publication History

ABSTRACT

In the past few years there has been an explosion of social networks in the online world. Users flock these networks, creating profiles and linking themselves to other individuals. Connecting online has a small cost compared to the physical world, leading to a proliferation of connections, many of which carry little value or importance. Understanding the strength and nature of these relationships is paramount to anyone interesting in making use of the online social network data. In this paper, we use the principle of Strong Triadic Closure to characterize the strength of relationships in social networks. The Strong Triadic Closure principle stipulates that it is not possible for two individuals to have a strong relationship with a common friend and not know each other. We consider the problem of labeling the ties of a social network as strong or weak so as to enforce the Strong Triadic Closure property. We formulate the problem as a novel combinatorial optimization problem, and we study it theoretically. Although the problem is NP-hard, we are able to identify cases where there exist efficient algorithms with provable approximation guarantees. We perform experiments on real data, and we show that there is a correlation between the labeling we obtain and empirical metrics of tie strength, and that weak edges act as bridges between different communities in the network. Finally, we study extensions and variations of our problem both theoretically and experimentally.

Skip Supplemental Material Section

Supplemental Material

p1466-sidebyside.mp4

mp4

296.5 MB

References

  1. L. Backstrom and J. M. Kleinberg. Romantic partnerships and the dispersion of social ties: a network analysis of relationship status on facebook. In CSCW, pages 831--841, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. K. L. Clarkson. A modification of the greedy algorithm for vertex cover. IPL, 16(1):23--25, 1983.Google ScholarGoogle ScholarCross RefCross Ref
  3. J. A. Davis. Clustering and hierarchy in interpersonal relations. American Sociological Review, page 845.Google ScholarGoogle Scholar
  4. D. Easley and J. Kleinberg. Networks, Crowds, and Markets: Reasoning About a Highly Connected World. Cambridge University Press, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. N. Garg, V. V. Vazirani, and M. Yannakakis. Multiway cuts in directed and node weighted graphs. In ICALP, volume 820, pages 487--498, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. E. Gilbert. Predicting tie strength in a new medium. In CSCW, pages 1047--1056, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. E. Gilbert and K. Karahalios. Predicting tie strength with social media. In CHI, pages 211--220, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Granovetter. The strength of weak ties. American Journal of Sociology, 78:1360--1380, 1973.Google ScholarGoogle ScholarCross RefCross Ref
  9. J. Hastad. Clique is hard to approximate within n(1-t). In Acta Mathematica, pages 627--636, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B. A. Huberman, D. M. Romero, and F. Wu. Social networks that matter: Twitter under the microscope. First Monday, 14, 2009.Google ScholarGoogle Scholar
  11. J. J. Jones, J. E. Settle, R. M. Bond, C. J. Fariss, C. Marlow, and J. H. Fowler. Inferring tie strength from online directed behavior. PLoS ONE 8, 2013.Google ScholarGoogle Scholar
  12. I. Kahanda and J. Neville. Using transactional information to predict link strength in online social networks. In ICWSM, 2009.Google ScholarGoogle Scholar
  13. D. E. Knuth. The stanford graphbase: A platform for combinatorial computing. Journal of Anthropological Research, 1993. Google ScholarGoogle Scholar
  14. G. Kossinets and D. Watts. Empirical analysis of an evolving social network. Science 311, pages 88--90, 2006.Google ScholarGoogle Scholar
  15. T. M. Newcomb. The Acquaintance Process. New York: Holt, Rinehart & Winston, 1961.Google ScholarGoogle Scholar
  16. J.-P. Onnela, J. Saramaki, J. Hyvonen, G. Szabo, D. Lazer, K. Kaski, J. Kertesz, and A.-L. Barabasi. Structure and tie strengths in mobile communication networks. PNAS USA, 104:7332--7336, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  17. B. Reed, K. Smith, and A. Vetta. Finding odd cycle transversals. Operations Research Letters, 32(4):299 -- 301, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Tang, T. Lou, and J. Kleinberg. Inferring social ties across heterogenous networks. In WSDM, pages 743--752, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. W. Tang, H. Zhuang, and J. Tang. Learning to infer social ties in large networks. In ECML/PKDD, pages 381--397, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. Ugander, B. Karrer, L. Backstrom, and C. Marlow. The anatomy of the facebook social graph. CoRR, abs/1111.4503, 2011.Google ScholarGoogle Scholar
  21. V. V. Vazirani. Approximation algorithms. Springer, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. Xiang, J. Neville, and M. Rogati. Modeling relationship strength in online social networks. In WWW Conference, pages 981--990, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. W. W. Zachary. An information ow model for conflict and fission in small groups. Journal of Anthropological Research, 33:452--473, 1977.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Using strong triadic closure to characterize ties in social networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        KDD '14: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining
        August 2014
        2028 pages
        ISBN:9781450329569
        DOI:10.1145/2623330

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 24 August 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        KDD '14 Paper Acceptance Rate151of1,036submissions,15%Overall Acceptance Rate1,133of8,635submissions,13%

        Upcoming Conference

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader