Skip to main content

Applications of Temporal Graph Metrics to Real-World Networks

  • Chapter
  • First Online:
Temporal Networks

Abstract

Real world networks exhibit rich temporal information: friends are added and removed over time in online social networks; the seasons dictate the predator-prey relationship in food webs; and the propagation of a virus depends on the network of human contacts throughout the day. Recent studies have demonstrated that static network analysis is perhaps unsuitable in the study of real world network since static paths ignore time order, which, in turn, results in static shortest paths overestimating available links and underestimating their true corresponding lengths. Temporal extensions to centrality and efficiency metrics based on temporal shortest paths have also been proposed. Firstly, we analyse the roles of key individuals of a corporate network ranked according to temporal centrality within the context of a bankruptcy scandal; secondly, we present how such temporal metrics can be used to study the robustness of temporal networks in presence of random errors and intelligent attacks; thirdly, we study containment schemes for mobile phone malware which can spread via short range radio, similar to biological viruses; finally, we study how the temporal network structure of human interactions can be exploited to effectively immunise human populations. Through these applications we demonstrate that temporal metrics provide a more accurate and effective analysis of real-world networks compared to their static counterparts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The static degree centrality is defined as the number of edges connected to a node i, normalised by the total possible neighbour nodes (n − 1) [56].

  2. 2.

    The AUC is commonly used in epidemiology and medical trials [21].

References

  1. Albert, R., Jeong, H., Barabási, A.-L.: Error and attack tolerance of complex networks. Nature 406(6794), 378–382 (2000)

    Article  ADS  Google Scholar 

  2. Barrat, A., Barthélemy, M., Vespignani, A.: Dynamical Processes on Complex Networks. Cambridge University Press, Cambridge (2008)

    Book  MATH  Google Scholar 

  3. Boccaletti, S., Latora, V., Moreno, Y., Chavez, M., Hwang, D.-U.: Complex networks: structure and dynamics. Phys. Rep. 424(4–5), 175–308 (2006)

    Article  MathSciNet  ADS  Google Scholar 

  4. Cabspotting Project. http://cabspotting.org/ (2009). Accessed 27 Feb 2013

  5. Callaway, D.S., Newman, M.E.J., Strogatz, S.H., Watts, D.J.: Network robustness and fragility: percolation on random graphs. Phys. Rev. Lett. 85(25), 5468–5471 (2000)

    Article  ADS  Google Scholar 

  6. Cattuto, C., Van den Broeck, W., Barrat, A., Colizza, V., Pinton, J.-F., Vespignani, A.: Dynamics of person-to-person interactions from distributed RFID sensor networks. PLoS ONE 5(7), e11596 (2010)

    Article  ADS  Google Scholar 

  7. CBS News. Enron traders caught on tape. http://www.cbsnews.com/stories/2004/06/01/eveningnews/main620626.shtml (2004). Accessed 27 February 2013

  8. CBS News. Former Enron trader pleads guilty. http://www.cbsnews.com/stories/2004/06/16/national/main623569.shtml (2004). Accessed 27 February 2013

  9. Centola, D.: The spread of behavior in an online social network experiment. Science 329(5996), 1194–1197 (2010)

    Article  ADS  Google Scholar 

  10. Chaintreau, A., Hui, P., Crowcroft, J., Diot, C., Gass, R., Scott, J.: Impact of human mobility on opportunistic forwarding algorithms. IEEE Trans. Mobile Comput. 6(6), 606–620 (2007)

    Article  Google Scholar 

  11. Chaintreau, A., Le Boudec, J.Y., Ristanovic, N.: The age of gossip: spatial mean field regime. In: Proceedings of SIGMETRICS ’09, pp. 109–120. ACM, New York (2009)

    Google Scholar 

  12. Christakis, N.A., Fowler, J.H.: The spread of obesity in a large social network over 32 years. N. Engl. J. Med. 357(4), 370–379 (2007)

    Article  Google Scholar 

  13. Christakis, N.A., Fowler, J.H.: The collective dynamics of smoking in a large social network. N. Engl. J. Med. 358(21), 2249–2258 (2008)

    Article  Google Scholar 

  14. Clauset, A., Eagle, N.: Persistence and periodicity in a dynamic proximity network. In: Proceedings of DIMACS Workshop on Computational Methods for Dynamic Interaction Networks, Rutgers University, Piscataway, 24–25 September 2007

    Google Scholar 

  15. Crucitti, P., Latora, V., Marchiori, M., Rapisarda, A.: Error and attack tolerance of complex networks. Physica A 340, 388–394 (2004)

    Article  MathSciNet  ADS  Google Scholar 

  16. Danon, L., House, T.A., Read, J.M., Keeling, M.J.: Social encounter networks: collective properties and disease transmission. J. R. Soc. Interface 9(76), 11 (2012)

    Article  Google Scholar 

  17. Eagle, N., Pentland, A.: Reality mining: sensing complex social systems. Pers. Ubiquit. Comput. 10(4), 255–268 (2006)

    Article  Google Scholar 

  18. Elkind, P., McLean, B.: The Smartest Guys in the Room: The Amazing Rise and Scandalous Fall of Enron. New York, Penguin (2004)

    Google Scholar 

  19. Erdős, P., Rényi, A.: On the evolution of random graphs. Publ. Math. Inst. Hungar. Acad. Sci. 5, 17–61 (1960)

    Google Scholar 

  20. Eubank, S., Guclu, H., Anil Kumar, V.S., Marathe, M.V., Srinivasan, A., Toroczkai, Z., Wang, N.: Modelling disease outbreaks in realistic urban social networks. Nature 429(6988), 180–184 (2004)

    Article  ADS  Google Scholar 

  21. Evans, C.H. Jr., Ildstad, S.T.: Small Clinical Trials: Issues and Challenges. National Academy of Sciences Press, Washington, DC (2001)

    Google Scholar 

  22. Faloutsos, M., Faloutsos, P., Faloutsos, C.: On power-law relationships of the Internet topology. In: Proceedings of SIGCOMM ’99, pp. 251–262. ACM, New York (1999)

    Google Scholar 

  23. Federal Energy Regulatory Commission. Addressing the 2000–2001 Western Energy Crisis. http://www.ferc.gov/industries/electric/indus-act/wec.asp (2010). Accessed 27 Feb 2013

  24. Funka, S., Gilada, E., Watkinsb, C., Jansena, V.A.A.: The spread of awareness and its impact on epidemic outbreaks. Proc. Natl. Acad. Sci. U.S.A. 106, 6872–6877 (2009)

    Article  ADS  Google Scholar 

  25. Gkantsidis, C., Karagiannis, T., Vojnovic, M.: Planet scale software updates. In: Proceedings of SIGCOMM ’06. ACM, New York (2006)

    Google Scholar 

  26. Holme, P., Kim, B.J., Yoon, C.N., Han, S.K.: Attack vulnerability of complex networks. Phys. Rev. E 65(5), 056109 (2002)

    Article  ADS  Google Scholar 

  27. Huberman, B.A., Adamic, L.A.: Growth dynamics of the world-wide web. Nature 401(6749), 131 (1999)

    ADS  Google Scholar 

  28. Hypponen, M.: F-secure weblog: the grand opening! http://www.f-secure.com/weblog/archives/00000568.html (2005). Accessed 27 Feb 2013

  29. Keeling, M.J., Rohani, P.: Modeling Infectious Diseases in Human and Animals. Princeton University Press, Princeton (2007)

    Google Scholar 

  30. Kempe, D., Kleinberg, J., Kumar, A.: Connectivity and inference problems for temporal networks. J. Comput. Syst. Sci 64(4), 820–842 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  31. Kendall, M.G.: A new measure of rank correlation. Biometrika 30(1–2), 81–93 (1938)

    MathSciNet  MATH  Google Scholar 

  32. Kostakos, V.: Temporal graphs. Physica A 388(6), 1007–1023 (2009)

    Article  MathSciNet  ADS  Google Scholar 

  33. Leavitt, N.: Mobile phones: the next frontier for hackers? Computer 38(4), 20–23 (2005)

    Article  Google Scholar 

  34. Lee, S., Rocha, L.E.C., Liljeros, F., Holme, P.: Exploiting temporal network structures of human interaction to effectively immunize populations. PLoS ONE 7(5), e36439 (2012)

    Article  ADS  Google Scholar 

  35. Liljeros, F., Edling, C.R., Amaral, L.A.N.: Sexual networks: implications for the transmission of sexually transmitted infections. Microb. Infect. 5(2), 189–196 (2003)

    Article  Google Scholar 

  36. May, R.M.: Network structure and the biology of populations. Trends Ecol. Evol. 21(7), 394–399 (2006)

    Article  Google Scholar 

  37. Medina, A., Gursun, G., Basu, P., Matta, I.: On the universal generation of mobility models. In: Proceedings of IEEE/ACM MASCOTS ’10, Miami Beach, FL, August 2010

    Google Scholar 

  38. Newman, M.E.J.: Networks: An Introduction. Oxford University Press, Oxford (2010)

    MATH  Google Scholar 

  39. Newman, M.E.J.: Mixing patterns in networks. Phys. Rev. E 67, 026126 (2003)

    Article  MathSciNet  ADS  Google Scholar 

  40. Nicosia, V., Tang, J., Mascolo, C., Musolesi, M., Russo, G., Latora, V.: Graph metrics for temporal networks. In: Saramäki, J., Holme, P. (eds.) Temporal Networks. Springer, Berlin (2013)

    Google Scholar 

  41. Piorkowski, M., Sarafijanovic-Djukic, N., Grossglauser, M.: CRAWDAD data set epfl/mobility (v. 2009-02-24). Downloaded from http://crawdad.cs.dartmouth.edu/epfl/mobility (2009). Accessed 27 Feb 2013

  42. Rachuri, K.K., Musolesi, M., Mascolo, C., Rentfrow, P.J., Longworth, C., Aucinas, A.: EmotionSense: a mobile phones based adaptive platform for experimental social psychology research. In: Proceedings of UbiComp ’10. ACM, New York (2010)

    Google Scholar 

  43. Salathé, M., Kazandjieva, M., Lee, J.W., Levis, P., Feldman, M.W., Jones, J.H.: A high-resolution human contact network for infectious disease transmission. In: Proceedings of the National Academy of Sciences of the USA, Washington, vol. 107, pp. 22020–22025, December 2010

    Google Scholar 

  44. Saramäki, J., Kaski, K.: Modelling development of epidemics with dynamic small-world networks. J. Theor. Biol. 234(3), 413–421 (2005)

    Article  Google Scholar 

  45. Scellato, S., Leontiadis, I., Mascolo, C., Basu, P., Zafer, M.: Evaluating temporal robustness of mobile networks. IEEE Trans. Mobile Comput. 12(1), 105–117 (2013). http://doi.ieeecomputersociety.org/10.1109/TMC.2011.248

    Google Scholar 

  46. Scott, J., Gass, R., Crowcroft, J., Hui, P., Diot, C., Chaintreau, A.: CRAWDAD data set cambridge/haggle (v. 2009-05-29). Downloaded from http://crawdad.cs.dartmouth.edu/cambridge/haggle (2009). Accessed 27 Feb 2013

  47. Shetty, J., Adibi, J.: Discovering important nodes through graph entropy the case of Enron email database. In: Proceedings of the 3rd International Workshop on Link Discovery, pp. 74–81. ACM, Chicago (2005)

    Google Scholar 

  48. Tang, J., Musolesi, M., Mascolo, C., Latora, V.: Temporal distance metrics for social network analysis. In: Proceedings of WOSN ’09, Barcelona, August 2009

    Google Scholar 

  49. Tang, J., Musolesi, M., Mascolo, C., Latora, V., Nicosia, V.: Analysing information flows and key mediators through temporal centrality metrics. In: Proceedings of ACM SNS ’10, Paris, April 2010

    Google Scholar 

  50. Tang, J., Mascolo, C., Musolesi, M., Latora, V.: Exploiting temporal complex network metrics in mobile malware containment. In: Proceedings of the 12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM’11), Lucca, June 2011

    Google Scholar 

  51. Tang, J., Kim, H., Mascolo, C., Musolesi, M.: STOP: socio-temporal opportunistic patching of short range mobile malware. In: Proceedings of the 13th IEEE Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM’12), San Francisco, June 2012

    Google Scholar 

  52. Van Ruitenbeek, E., Courtney, T., Sanders, W.H., Stevens, F.: Quantifying the effectiveness of mobile phone virus response mechanisms. In: Proceedings of DNS ’07, 2007

    Google Scholar 

  53. Virus description: Bluetooth-worm:symos/cabir. http://www.f-secure.com/v-descs/cabir.shtml (2004). Accessed 27 Feb 2013

  54. Wang, P., Gonzalez, M.C., Hidalgo, C.A., Barabasi, A.-L.: Understanding the spreading patterns of mobile phone viruses. Science 324(5930), 1071–1076 (2009)

    Article  ADS  Google Scholar 

  55. Washington Post. Enron fraud trial ends in 5 convictions. http://www.washingtonpost.com/wp-dyn/articles/A23034-2004Nov3.html (2004). Accessed 27 Feb 2013

  56. Wasserman, S., Faust, K.: Social Networks Analysis. Cambridge University Press, Cambridge (1994)

    Google Scholar 

  57. Zhu, Z., Cao, G., Zhu, S., Ranjan, S., Nucci, A.: A social network based patching scheme for worm containment in cellular networks. In: Proceedings of INFOCOM ’09, IEEE, Rio de Janeiro, April 2009

    Google Scholar 

  58. Zyba, G., Voelker, G.M., Liljenstam, M., Mehes, A., Johansson, P.: Defending mobile phones from proximity malware. In: Proceedings of INFOCOM ’09, IEEE, Rio de Janeiro, April 2009

    Google Scholar 

Download references

Acknowledgements

This work was funded in part through EPSRC Project MOLTEN (EP/I017321/1) and the EU LASAGNE Project, Contract No.318132 (STREP).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mirco Musolesi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Tang, J. et al. (2013). Applications of Temporal Graph Metrics to Real-World Networks. In: Holme, P., Saramäki, J. (eds) Temporal Networks. Understanding Complex Systems. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36461-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36461-7_7

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36460-0

  • Online ISBN: 978-3-642-36461-7

  • eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)

Publish with us

Policies and ethics