Abstract
We study the evolution of networks through ‘triplets’—three-node graphlets. We develop a method to compute a transition matrix to describe the evolution of triplets in temporal networks. To identify the importance of higher-order interactions in the evolution of networks, we compare both artificial and real-world data to a model based on pairwise interactions only. The significant differences between the computed matrix and the calculated matrix from the fitted parameters demonstrate that non-pairwise interactions exist for various real-world systems in space and time, such as our data sets. Furthermore, this also reveals that different patterns of higher-order interaction are involved in different real-world situations. To test our approach, we then use these transition matrices as the basis of a link prediction algorithm. We investigate our algorithm’s performance on four temporal networks, comparing our approach against ten other link prediction methods. Our results show that higher-order interactions in both space and time play a crucial role in the evolution of networks as we find our method, along with two other methods based on non-local interactions, give the best overall performance. The results also confirm the concept that the higher-order interaction patterns, i.e., triplet dynamics, can help us understand and predict the evolution of different real-world systems.
Similar content being viewed by others
Introduction
The collective behaviour of a complex system cannot be understood and predicted by considering the basic units of the system in isolation1,2. Complex networks3,4 are often used to represent complex systems and thenin which the basic unit of interaction, the edge, represents pairwise interactions. However, in systems represented by networks there are often local processes, known as higher-order interactions, where groups of more than two participants interact and the set of pairwise interactions does not capture the whole picture5. Research has revealed that many empirical systems display higher-order interactions, for example social systems6,7,8, neuroscience9,10,11, biology12, and ecology13. Therefore to understand the dynamics of real complex systems we often need to describe interactions beyond the simplest pairwise relationships.
Hypergraphs14,15,16 naturally encode higher-order interactions in terms of fundamental units, their hyperedges. However, in many cases the data only reveals pairwise interactions making the simple graph the appropriate representation and the higher order interactions have to be inferred from the pairwise interactions recorded in a network. For instance, data on phone calls does not reveal other higher-order connections, e.g. through face-to-face meetings, but the pattern of calls can reveal the existence of such connections. Network Science offers many approaches to discovering these local group interactions from a network. It is natural to work with small sub-graphs, motifs6,17, or if we consider induced subgraphs (the maximal subgraph defined by a given vertex set), in terms of graphlets18,19. Higher order analysis in terms of paths is important in several contexts20,21 but more relevant here is the use of cliques, subgraphs which are complete graphs. Cliques have long played an important role in social science, for instance see22, and can be used in many contexts such as community detection23,24. Cliques in networks are the basis for analysis in terms of simplicial complexes as used in algebraic topology. In network analysis, simplicial complexes25,26,27 have been used to analyse network geometry28, to model structure in temporal networks29, investigate synchronization phenomenon30,31,32,33, social contagion34, epidemic spreading35, and neuroscience10,11.
One area where network analysis is less well developed is the temporal evolution of networks. Many complex systems are not static so an important application of networks is to analyse their behaviour over time36,37,38,39,40,41,42,43. Using higher-order interactions in an evolving network context has been considered in a few contexts34,44,45,46. Most of the research on motifs in temporal networks focuses on how the number of each type of motif changes as the network is evolves. On the other hand, the study of simplicial complexes is interested in how the fully connected triangles affect the structures of networks. So there is a gap between understanding how three-node combinations will evolve and how that evolution will affect the evolution of the whole network. This gap motivates us to design a method to investigate whether any non-pairwise interactions will be observed by measuring three-node dynamics.
In this paper we study higher-order processes in temporal networks through the simplest examples of a higher-order interactions, the evolution of the node triplet, three nodes and all three potential edges between these three nodes. Our method looks at the evolution of a network through the relationships of three nodes as shown in the top row of Fig. 1. so the higher-order structures include a clique, the triangle, and a path of length two. Studying the evolution of relationships in a network by focussing on just three nodes has a long history as this includes the process where a path of length two connecting three nodes turns into a triangle as in triadic closure7,8,47,48 which underpins many other concepts such as structural holes49.
This paper is organised in the following way: In the first section, we introduce the transition matrix that describes the Markovian evolution of the triplet. In the second section, we propose a null model that can demonstrate the higher-order interactions indeed exist in many real-world networks. In the third part, based on the triplet evolution, we create an algorithm that can predict the existence of the links in the temporal networks.
Triplet dynamics
In order to look beyond pairwise interactions we focus on triplets, at the configurations of three nodes in a network along with all their edges, i.e. the three-node graphlet (also known as a “triphlet”). configurations of three nodes in a network along with any edges between those nodes as shown in Fig. 1. Our focus is not on the number of each triplet type at each time but on how each triplets evolves from one arrangement to the next in a temporal network, an example of “temporal graphlets”.
Transition matrix
We start with temporal graphs \({\mathscr {G}}(s)\), a sequence of graphs with one node set \({\mathscr {V}}\) but with variable edges sets \({\mathscr {E}}(s)\), where s is a discrete time variable. The variable \(\mathsf {M}_s(u,v,w)\), often abbreviated to \(\mathsf {M}_s\), records the state of a three-node triplet (u, v, w) at time s. The states are the subgraphs equivalent to the three nodes and all the edges between them at time s. That is \(\mathsf {M}_s\equiv \mathsf {M}_s(u,v,w)\) is a map from a node triplet (u, v, w), where \(u,v,w \in {\mathscr {V}}\), to the induced graphlet, the maximal subgraph in \({\mathscr {G}}(s)\) containing the nodes u, v and w. We will use \({\mathscr {M}}\) to denote the set of all the possible three-node graphs and \(m_{i} \in {\mathscr {M}}\) represents one of the possible graphs in \({\mathscr {M}}\). So formally
The choice of \({\mathscr {M}}\) is not unique and it depends on the characteristics of the nodes and links used to distinguish configurations. If we characterise the states by the number of links among the three nodes, that is use unlabelled graphs, there are just four distinct states in \({\mathscr {M}}\) which we can name as \(m_0\), \(m_1\), \(m_2\) and \(m_3\) as shown in Fig. 1. So \({\mathscr {M}}_4\) is the state set characterised by the number of links and here \(m_i\) is the unlabelled graph of three nodes and i edges. We will use \({\mathscr {M}}_4\) for visualisation and illustration only in our work here.
By contrast, we want to consider the labels (identities) of the nodes in our work. So for our results we work with eight states in \({\mathscr {M}}\) since each link between the three pairs of nodes can either be present or absent. That means the links between different pairs of nodes are distinct. This state set is represented by \({\mathscr {M}}_{8}\) as illustrated in the lower row of Fig. 1.
Typically one uses graphlets by counting the frequency of each graphlet \(m \in {\mathscr {M}}\) in each graph \({\mathscr {G}}(s)\) in the temporal graph sequence. So a simple way to look at the evolution is to see how these counts change. We wish to go beyond this and look at the way local structure controls the local evolution. In order to do this we define a transition matrix \(\mathsf {T}\) which describes the likelihood that a given triplet is to be transformed in to another triplet in one time step. That is \(\mathsf {T}_{ij}(s)\) gives the probability that a triplet of nodes in the state \(m_i\) in \({\mathscr {G}}(s-1)\) at time \(s-1\) becomes the triplet \(m_j\) in \({\mathscr {G}}(s)\) at the next time step, s. That is
By definition, all entries of \(\mathsf {T}\) are non-negative, \(\mathsf {T}_{ij} (s) \ge 0\), and each row in the transition matrix satisfies a normalisation condition
In practice we have to use an estimate \(\widehat{\mathsf {T}}(s)\) for the transition matrix \(\mathsf {T}(s)\). We do this by using a subset \({\mathscr {T}}_{s-1}\) of all possible distinct node triplets so \({\mathscr {T}}_{s-1} \subseteq {\mathscr {V}}^3\). From this subset of node triplets, we then count how often the associated graphlet transforms from \(m_i\) to \(m_j\). More formally we define
where \(\delta ({\mathscr G}_1,{\mathscr G}_2)=1\) (0) if graphlets \({\mathscr G}_1\) and \({\mathscr G}_2\) are isomorphic (not isomorphic). The best estimate \(\widehat{\mathsf {T}}_{ij} (s)\) of \(\mathsf {T}_{ij}(s)\) is produced if \({\mathscr T}_{s-1}\) is the set of all possible distinct node triplets. However, for a large graph with N nodes there are \(\left( {\begin{array}{c}N\\ 3\end{array}}\right) = N\cdot (N-1)\cdot (N-2)/6\) three node combinations making it computationally inefficient to use all triplets. For example, for \(N = 100,000, \left( {\begin{array}{c}N\\ 3\end{array}}\right) = 1.7\cdot 10^{14}\), Therefore, we will use random sampling of triplets of a sufficient amount to produce our estimates. The estimations are detailed in Appendix A.
To illustrate the construction of a triplet transition matrix, we use the simpler \({\mathscr M}_{4} = \left\{ m_{0}, m_{1}, m_{2}, m_{3} \right\} \). Note that the subscripts of \(\mathsf {T}\), \(i,j = 0,1,2,3\) correspond to subscripts of states \(m_i\) in \({\mathscr M}_4\) shown in Fig. 1. An example of the evolution of a network of 5 nodes and the triplet transition matrix is shown in Fig. 2. Note we will use labelled subgraphs and \({\mathscr M}_8\) for our analysis.
Evidence for higher order interactions
To investigate the effectiveness of three-node interactions, we start by considering a ‘pairwise model’ whose dynamics is driven only by pair-wise relationships. This will act as a null model when analysing the transition matrix for artificial and real-world networks.
A pairwise model
Our ‘pairwise model’ is a stochastic graph model for dynamic networks50 in which the evolution of the links is based on comparison of the evolution of the edge between pairs of nodes, so a two-node graphlet model. In the pairwise model, moving from one network, \({\mathscr G}(s)\) to the next network in the sequence, \({\mathscr G}(s+1)\), any pair of nodes with no existing link gains a link with probability p otherwise with probability \((1-p)\) the pair of nodes remains unconnected. Similarly, every existing link \(e \in ~{\mathscr E}(s)\) is removed with probability q otherwise with probability \((1-q)\) the link remains. The number of links is not preserved in this model. This null model is a lower order description of the local interactions than our full analysis in terms of triplets. It is straightforward to write down the form of the transition matrix in our triplet based analysis when assuming this pairwise model gives a precise description, giving us a two-parameter transition matrix denoted as \(\mathsf {T}^{({\mathrm {pw}})}(s)\). The detailed calculation of the form is given in Appendix B.
If we assume that graph evolution follows this pairwise mechanism, we can estimate values \(\hat{p}(s)\) and \(\hat{q}(s)\) for the parameters p and q respectively by looking at how links changed over one time step, i.e., from the edge set \({{\mathscr E}}(s-1)\) in \({\mathscr {G}}(s-1)\) to edge set \({\mathscr E}(s)\) of \({\mathscr {G}}(s)\). Formally we have that
This gives us our pairwise model prediction for the triplet transition matrix \(\widehat{\mathsf {T}}^{\mathrm {(pw)}}(s)\), where we substitute \(\hat{p}(s)\) from (6) and \(\hat{q}(s)\) from (5) for p and q in \(\mathsf {T}^{({\mathrm {pw}})}\) in equation (B1) of appendix B. That is \(\widehat{\mathsf {T}}^{\mathrm {(pw)}}(s) = \mathsf {T}^{({\mathrm {pw}})}(\hat{p}(s),\hat{q}(s)) \) where
Quantifying non pairwise interactions
Real world data sets
The first data set is a Turkish Shareholder network51. The nodes are shareholders in Turkish companies and two shareholders are linked if they both hold shares in the same company in one year. The snapshots in the Turkish companies temporalShareholder network, \({\mathscr G}(s)\), are for consecutive years. The second data set is a Wikipedia Mathematicians network. Nodes are pages corresponding to biographies of mathematicians in Wikipedia and two nodes are connected in one snapshot \({\mathscr G}(s)\) if there is a hyperlink (in either direction) between the two pages at the time the data is taken52. The third temporal network is constructed from college message data. In this case the nodes are students and an edge in a snapshot indicates that the students exchanged a message within the interval associated with that snapshot53,54,55. We also use a network based on face-to-face contacts at a conference on hypertext. In the network, a node represents a conference visitor, and an edge represents a face-to-face contact that was active for at least 20 s56,57. Finally the Email network is derived from the emails at a large institution. Each node corresponds to an email address. An edge in a given snapshot indicates that an email was sent between the nodes in the time interval corresponding to that snapshot53,58,59. For temporal networks based on real data, the actual time interval between consecutive graphs in our temporal network, between \({\mathscr G}(s)\) and \({\mathscr G}(s+1)\), is given in real units as \(\Delta t\). In some data sets we are able to look at the same data with different real time intervals between data sets. We provide a summary of the graph statistics in Table 1:
Quantifying non pairwise interactions
The pairwise model captures the effects of the interaction of node pairs. We can use this in the form \(\widehat{\mathsf {T}}^{\mathrm {(pw)}}(s)\) in (7) as a benchmark to show how higher-order information is captured by our triplet based analysis using \(\widehat{\mathsf {T}}(s)\) of (4). One way to study this for any given temporal network is to look at the difference \(\Delta \widehat{\mathsf {T}}(s)\) of the transition probabilities between the empirical triplet transition and the assumed pairwise null model:
where each entry in the matrix represents the difference between the estimated triplet transition probability and pairwise transition probability for different states.
To test our approach using our triplet transition matrices, we first look at artificial temporal graphs created from three simple models. The first model, the pairwise model, is simply the same pairwise interaction mechanism used above to define \(\widehat{\mathsf {T}}^{\mathrm {(pw)}}(s)\). The second model, the edge swap model, is the configuration model which is also based on pairs of nodes. The third model, the random walk model, uses short random walks in order to find new target nodes when rewiring an edge, and so this involves higher-order interactions. In the last two models, a fraction of edges in \({\mathscr G}(s)\) are rewired to give the next graph \({\mathscr G}(s+1)\) in the temporal network. The results are as expected with matrix \(\Delta \widehat{\mathsf {T}}(s)\) close to zero for all entries for the first two models based on node pairs and it is only with the third higher-order model that some \(\Delta \widehat{\mathsf {T}}(s)\) entries are found to be large. The networks constructed are undirected. The details of the models and of the results are given in Appendix B.
We then apply this framework to analyse some real data sets. For clarity we show results for our triplet transition matrix (8) when working with \({\mathscr M}_4\) and these are shown in Fig. 3. Not surprisingly, given these are from real world data sets, these who significant non-zero entries in our measure \(\Delta \widehat{\mathsf {T}}(s)\) but also they all look very different from each other, reflecting different mechanisms behind the evolution of different systems.These results for real-world systems have significant non-zero entries in our measure \(\Delta \widehat{\mathsf {T}}(s)\). These results for \(\Delta \widehat{\mathsf {T}}(s)\) are also very different from each other, reflecting distinct mechanisms behind the evolution of these systems.
When we look for higher order interactions, we find clear differences between the triplet transition matrix \(\widehat{\mathsf {T}}\) and the simple pairwise reference model of \(\widehat{\mathsf {T}}^{\mathrm {(pw)}}\), especially in the Turkish Shareholder network Fig. 3a. For example, compared to the corresponding probability in the pairwise model, the real probability of any triplet state becoming disconnected in the next snapshot (i.e., moving from \(m_i \rightarrow m_0\), \(i \in \{0,1,2,3\}\), the first column of the transition matrix) is much less, showing that this subgraph is very stable compared with the pairwise case in the Turkish Shareholder network. Additionally, the state is much more likely to evolve to \(m_1\) at \(s+1\) (the second column of the transition matrix), which demonstrates that in many real networks, the interactions are beyond the pairwise interaction. The significance test using Z-score can be found in Appendix D.
In our analysis of real data, we use \(\Delta t\) to denote the physical time difference between snapshots \({\mathscr G}(s)\) and \({\mathscr G}(s+1)\). This time interval can be varied when working with the College message data of Fig. 3c and the Email networks of Fig. 3d. In these cases we try several values of \(\Delta t\) before choosing an appropriate value the the illustrations in Fig. 3. We are looking for a value that is not too short (nothing much happens) and not too long (averaging over uncorrelated changes).
Unsurprisingly, all four real world networks show considerable higher-order effects but there are interesting differences that reveal the processes behind the evolution are likely to have some significant differences. The \(\widehat{\mathsf {T}}\) results are shown in the top row of Fig. 3. The result for the Turkish Shareholder networks in Fig. 3a and the Email networks in Fig. 3d look very similar. However, when we compare them to our reference model, the pairwise model, we see large differences, showing that these are very different types of temporal network and using raw values of \(\widehat{\mathsf {T}}\) can be misleading.
In fact, the networks which are most similar, once simple pairwise processes are discounted, are the Wikipedia Mathematicians networks Fig. 3b and the Email networks Fig. 3d. In both cases, processes where an edge is added (upper triangle in the heat map) there is little difference from the pairwise model. This might be expected for the cases where there is at most one edge in the triplet. Only the \(\Delta \widehat{\mathsf {T}}_{23}\) entry for the \(m_2 \rightarrow m_3\) transition shows a slight increase over what would be predicted based on the rate of edge addition in these models (the p parameter of the pairwise model) which suggests triadic closure7,8,47,48 does play a role here but it is very slight by these measures. On the other hand, there is a strong sign of “triadic stability”, that is the complete graphlet \(m_3\) is much more stable than we would expect given the rate of edge loss in the pairwise model (the q parameter). So it seems the social processes behind the ideas of triadic closure are possibly more important for the stability of triangles in the contexts of our Wikipedia Mathematician and Email network.It is natural to think that processes responsible for triadic closure (\(m_2 \rightarrow m_3\)) would also slow the rate at which such triangles break up (\(m_3 \rightarrow m_2\)) but we do not see this in our result. One interpretation of our results is that the social processes normally invoked for triadic closure7,8,47,48 can, in some cases, be more important in preventing the breakup of triangles than in the creation of triangles.
In some ways the similarity between the Wikipedia Mathematicians networks Fig. 3b and the Email networks Fig. 3d is surprising as we might have expected the greatest similarity between the two communication networks, the College Message networks Fig. 3c and the Email networks Fig. 3d but that is not what we see in our measures. In particular, the stability of the complete triangle in the college message is exactly as we would expect based on pairwise measures suggesting different properties in these two communication networks, e.g.i.e. that many of the college messages are between actors who do not have strong ties.
However, the main message in Fig. 3 is that in almost any data, we find the evolution has clear signals of higher-order interactions playing an important role.
Link prediction
The analysis of our transition matrix of triplets reveals that non-pairwise interaction exists in network evolution. We now ask if these higher-order interaction patterns are essential for network evolution. We investigate this question by performing link predictions for dynamic networks based on the higher-order information stored in our triplet transition matrices.
Triplet transition score
The idea behind our algorithm is that the formation or removal of links between a node pair is encoded in our triplet interactions. The likelihood of a link appearing (or disappearing) between a node pair in a snapshot can be obtained by looking at the triplets containing this node pair and using the triplet transition matrix to see what that suggests about the evolution of any edge between our chosen node pair.
To keep our analysis simple we will assume that the interval between snapshots \(\Delta t\) is about the same size as the appropriate time scale for changes in the network. If we look at snapshots covering a short period of time, nothing much happens and the transition matrix has too little information in it. One could then look at larger times scales by using \(\widehat{\mathsf {T}}(s)\), \(\widehat{\mathsf {T}}(s-1)\), \(\widehat{\mathsf {T}}(s-2)\) and so forth to predict links in the next network snapshot \({\mathscr G}(s+1)\). WeIf we look at snapshots covering an extremely short period of time, say one that covers the typical difference in time between events, then the transition matrix contains too little information. In such a case one could then look at larger times scales by using \(\widehat{\mathsf {T}}(s), \widehat{\mathsf {T}}(s-1), \cdots , \widehat{\mathsf {T}}(s-n)\) (for some n) to predict links in the next network snapshot \({\mathscr G}(s+1)\). However, we will use the simpler assumption that working with one snapshot by choosing \(\Delta t\) appropriately (where we have that choice) captures the essential information. This implies we have avoided the opposite problem, where \(\Delta t\) is too large so the information in the transition matrix is averaging over mostly uncorrelated and unrelated events which means we have very little signal encoded in our transition matrices.
Our second assumption is that the transition depends only on the state of the system at the last time step, which means we assume the process is Markovian. In some ways this need not be completely true. Provided the snapshots \({\mathscr G}(s-1)\) and \({\mathscr G}(s)\) are in a similar state to the one we are trying to predict, \({\mathscr G}(s+1)\), then because we are constructing our transition matrices based on the similar states, the history of the evolution may well be encoded in this. For instance, patterns of activity in an email network of a large institution could well change if there is a major reorganisation with many people changing roles or locations in which case the history of the system has an impact on the evolution. Put another way, we assume that any non-Markovian behaviour is happening on much larger time scale than we are studying and so we can use a Markovian approximation.
Our link prediction algorithm assigns a score to each node pair. By looking at the distribution of these scores we can separate them into node pairs with low scores, predicting no link in the next snapshot, or a high score meaning this node pair will be connected. For a given snapshot \({\mathscr G}(s)\), for each node pair, say (u, v), we look at all \((N-2)\) triplets containing that node pair count the number of each triplet falling in each state \(m \in {\mathscr M}\). Normalising this gives us our node-pair state vector \(\psi (u,v;s)\) as follows
Our estimate for the transition matrix \(\widehat{\mathsf {T}}(s)\), based on \({\mathscr G}(s-1)\) to \({\mathscr G}(s)\) evolution, is to be used to tell us about the evolution of this triplet state distribution \(\psi (s)\) in (9). For instance we estimate that the probability \(L_\beta \) that a pair of nodes u, v has an link, \(\beta =1\), or no link, \(\beta =0\), in the graph \({\mathscr G}(s+1)\) is given by the projection from predicted \(\psi (s)\):
where \(P^{\mathrm (out)}_{j\beta }\) is a projection vector for the triplet evolution and \(\sum _{\beta =0}^{1} P^{\mathrm (out)}_{j\beta }=1\). With the other definition \(\sum _{j} \widehat{\mathsf {T}}_{ij} =1\), and \(\sum _{i} \psi _i(u,v;s)=1\), then we have that \(L_\beta \) is properly normalised \(\sum _{\beta =0}^{1} L_\beta (u,v) =1\). It is this \(L_\beta \) in (10) that we use as a score for link prediction.
Take the case of \({\mathscr M}_4\) as an example, the projection from triplet distribution onto links uses
The factors here arise for the state set \({\mathscr M}_4\) since the unlabelled graphlets do not distinguish which links are occupied in the one-link triplet \(m_1\) or two-link triplet \(m_2\). For the state set \({\mathscr M}_8\) which we use in most of our work, this projection matrix is much simpler with entries either 0 or 1. If we choose (u, v) to be the first link, so it is the only link in the triplet we call \(n_1\) in Fig. 1, then we can use bitwise logical operators to represent \({{\mathbf {\mathsf{{P}}}}}^{\mathrm (out)}_{j\beta }\) as \( (j \; {\mathrm AND} \; 1)\; {\mathrm XOR} \; \beta \).
Node similarity
We are using link prediction as a way to test that our triplet transition matrices \(\widehat{\mathsf {T}}\) capture important higher-order interactions in the evolution of temporal networks. In order to see how effective our approach is, we need to compare against other methods of link prediction. All the methods we use are listed in Table 2. All these methods can be discussed in terms of a node similarity score and in this section we will start our examination of these methods by considering the node similarity scores used in each method. This will allow us to examine the relationships between these various methods and ask if they capture higher-order interactions to any extent. The next stage is to turn these similarity scores into a link prediction and we will look at this step in the next section.
The various link prediction methods can be categorised based on the type of information used to make a prediction about each node pair: those which use only local interactions probing a fixed distance from the node pair, and those global methods which use nodes arbitrarily far from the node pair of interest. This is indicated by the length scale of methods indicated in Table 2 and will be clear from the power of the adjacency matrix \({{\mathbf {\mathsf{{A}}}}}\) appearing in the similarity scores defined in this section.
One other point can be made. In terms of the temporal network, none of these existing similarity scores, none of the these link prediction methods from the literature, use more than one temporal snapshot \({\mathscr G}(s)\). So one standout feature of our method is the use of two temporal snapshots, \({\mathscr G}(s)\) and \({\mathscr G}(s-1)\). The evolution of a triplet from one snap shot to another records, in an indirect way, the effects of other nodes beyond the triplet of interest as illustrated in Fig. 4. This is why our method is listed as probing long length scales in Table 2. So one standout feature of our method is the use of two temporal snapshots, \({\mathscr G}(s)\) and \({\mathscr G}(s-1)\). The evolution of a triplet from one snap shot to another records, in an indirect way, the effects of other nodes beyond the triplet of interest. This is why our method is listed as probing long length scales in Table 2.
In the following s(u, v) is a (similarity) score assigned to a pair of vertices \(u,v \in {\mathscr V}\) where \({\mathscr N}(u)\) is the set of neighbours of vertex u, i.e. \({\mathscr N}(u) = \{ w | (u,w) \in {\mathscr E}\}\). The similarity scores are then used to decide if an edge should exist between u and v and that will be used in turn to make the link prediction for the next snapshot in time. We will assume a simple graph in these discussions.
The simplest node similarity measure is the Edge Existence (EE) index \(s_{\mathrm EE} (u,v)\). After all, if there is already an edge between two vertices u and v this is a good indication of a close relationship between these nodes, and vice versa. We define Edge Existence index to be
That is Every edge between u and v adds one to this index so, for a simple graph, this is the corresponding entry of the adjacency matrix, \(A_{uv}\). This is the simplest edge prediction method in that it predicts no changes at all so it is not very useful and we do not use it in our work. However, we will see this score contributes to some of the other, more sophisticated methods, so it is useful to define this score. The Edge Existence score records no higher-order effects, there is a path of length at most one between the nodes.
While not very useful, this Edge Existence (EE) index could produce some very good statistics. For instance, if very few edges are changing in each time interval, then this method would predict the behaviour of the vast majority of edges as most remain unchanged. It would only do badly if we used statistics that specifically measured the success of node pairs changing their connectedness from one time step to the next. A good example ofthis when the Edge Existence method would appear to be successful is when we break up the data into small steps in time where few edges change. However we would learn little of interest in this case. would be when we are able to break the data up into arbitrarily sized steps in time, and if we choose steps which are too small, we will get little change step because of this discretisation choice.
The Common Neighbours (CN) method60,61,66 simply scores the relationship between two nodes based on the the number of neighbours they have in common
This will tend to give large scores if u and/or v have high degrees and this is illustrated in more detail in Appendix E.
One way to compensate for the expected dependence of \(s_{\mathrm CN}\) on the degree of the nodes is to normalise by the total number of unique neighbours. This gives us the Jaccard Coefficient60,66 (JC) method based on the well known similarity measure68 in which the likelihood that two nodes are linked is equal to the number of neighbours they have in common relative to the total number of unique neighbours.
The Preferential Attachment (PA) method for link prediction60,66 is based on the idea that the probability of a link between two vertices is related to the product of their degrees of the two vertices
This is proportional to the number of common neighbours expected in the Configuration model69 as has been used in the context of collaboration (bipartite) collaboration graphs60,70,71.
The Resource Allocating Index63 (RAI) method and the Adamic-Adar Index60,66 (AAI) method are both based on the idea that if two vertices u and v share some ‘features’ f that is very common in the whole network then that common feature is not a strong indicator that the two vertices should be linked. The converse is true if the common feature is rare, that is a good indicator that the vertices u and v should be linked. So in general if W(x) is a monotonically decreasing function of x we can use this on the frequency n(f) of the occurrence of feature f to give a generic similarity function of the form \(s_{\mathrm W}(u,v) =\sum _{f \in u, v} W(n(f))\). In our case, we will not assume any meta-data exists, but we will look for methods that use features which are based purely upon the topology of the network.
In the Resource Allocating Index63 the inverse of the degree of the neighbour is used as the weighting function, so \(W(n(f)) \equiv 1/|{\mathscr N}(w)|\) giving
Note that this means that the contribution from any one node w to the total of all scores \(S_{\mathrm RAI}(u,v) = \sum _{u,v} s_{\mathrm RAI}(u,v)\) is half of the degree of w minus one, \(({\mathscr N}(w)-1)/2\). Thus the Resource Allocating Index still gives high degree nodes more weight.
On the other hand, the Adamic-Adar Index60,66 uses the inverse logarithm of the degree to weight the contribution of each common neighbour to the score, \(W(n(f)) \equiv 1/\ln (|{\mathscr N}(w)|)\). That is
All the indices mentioned above have been based either on the degree of the two nodes of interest \(s_{EE}\) or on the properties of u, v and their common nearest neighbours \(w \in {\mathscr N}(u) \cap {\mathscr N}(v)\). This involves paths between the two nodes u and v of length two or less. The next logical step is to include paths of length three and the Local Path Index (LPI) \(s_{\mathrm LPI}\)61,63 is an example of this where
Here \(\beta \) is a real parameter where \(\beta =0\) reproduces the Common Neighbours score of (13). The \(\beta {{\mathbf {\mathsf{{A}}}}}^3\) term is counting the number of walks of length three that start at u and end at v. If there is already an edge between u and v then \([{{\mathbf {\mathsf{{A}}}}}^3]_{uv}\) includes backtracking paths such as the sequence u, w, u, v. This means the second term also includes a term equal to \(A_{uv}(|{\mathscr N}(u)|+|{\mathscr N}(v)|)\), i.e. there is a contribution from the Edge Existence similarity \(s_{\mathrm EE} (u,v)\) (12) in this method.
The Katz Index60,61,66 (Katz) counts the number of paths between each pair of vertices, where each path of length \(\ell \) contributes a factor of \(\beta ^\ell \) to the score. The score is simply the appropriate entry of the matrix \([{{\mathbf {\mathsf{{I}}}}}-\beta {{\mathbf {\mathsf{{A}}}}}]^{-1}\),
where \(\beta \) is positive but must be less than the largest eigenvalue of the adjacency \({{\mathbf {\mathsf{{A}}}}}\). Note for low \(\beta \) and for a simple graph we have that
The Local Leicht-Holme-Newman Index72 (LLHN) is based on the vertex similarity index of62, but while this gives a specific motivation for the form, it is in the end just a specific rescaling of the Katz index (19), namely
where \({{\mathbf {\mathsf{{D}}}}}\) is a diagonal matrix whose entries are equal to the degrees of the nodes, \(D_{uv} = \delta _{u,v} |{\mathscr N}(u)|\). The motivation for using this normalisation is that \(|{\mathscr N}(u)| \cdot |{\mathscr N}(v)|\) is proportional to the number of neighbours expected in the configuration model, as shown in Appendix E. So the Local Leicht-Holme-Newman Index is the Katz score relative to the Katz score expected for the same pair of nodes in the configuration model.
The Matrix Forest Index64 (MFI) is defined as:
where \({{\mathbf {\mathsf{{L}}}}}= {{\mathbf {\mathsf{{D}}}}}- {{\mathbf {\mathsf{{A}}}}}\) is the Laplacian. One way to understand the Matrix Forest Index is to consider the diffusion process described by a Laplacian. If we were to demand that at time \(t+1\) we had only had particles at one site u, then \(s_{\mathrm MFI}(u,v)\) tells us how many of those particles were at vertex v at the previous time step.
From node similarity to link prediction
All the link prediction methods used in this paper, see Table 2, assign a similarity score between pairs of nodes. To turn this into a link prediction, the basic conjecture is that the higher the similarity between a pair of nodes, the more likely we are to find a link between these two nodes.
All methods, therefore, require a precise method to turn the scores into predictions, essentially to define what is meant by a ‘high’ or a ‘low’ score by introducing a classification threshold. Often this is done very simply by ranking the scores and using a fixed number of the most highly ranked node pairs to predict a link. This method is typically used only for link addition in which one is only trying to predict when an unlinked node pair gains a link, that is the \(A_{uv}(s)=0\) to \(A_{uv}(s+1)=1\) process.
We are interested in the most general predictions, looking at all four possible changes for node pairs from one snapshot in time to the next, that is all the four possible \(A_{uv}(s)=0,1\) to \(A_{uv}(s+1)=0,1\) processes. This is link evolution rather than link addition. In order to make these more general predictions for any method, we use k-means clustering methods to separate the prediction scores produced by each method into two classes: a high score group and a low score group of node pairs. Any node pair with a score in the high scoring group will be predicted to have a link in the next snapshot; node pairs in the low scoring group will be predicted to have no link.
To show how this works, we give some examples of how the score from our triplet transition method produces a natural split into low and high scores which is easily discovered by an automated clustering method such as k-means, as seen in the first-row of Fig. 5. In our final results below for our link prediction algorithm, we use \({\mathscr M}_8\) and the clear separation of node similarity scores into a low and high group is shown in the second row of Fig. 5. For comparison we also show the results for our method using the less sensitive \({\mathscr M}_4\). In practice, both seem to separate low and high scoring node pairs well but we get a slightly clearer separation in some cases when using \({\mathscr M}_8\).
We can look at how the other nine link prediction methods perform in terms of identifying two clear groups of low- and high- scoring node pairs. What is surprising is that most of the algorithms fail to do this well, or some cases at all, in most of the data sets as shown in Section E of the Appendix. An example of a poor separation, the Jaccard Coefficient method, is shown in Fig. 6. The one exception is the Katz method, also shown in Fig. 6, which works well in three of the four data sets. Given this is one of the methods probing large distances in the network, this would seem to support the idea that higher-order interactions are important in link prediction.
Since our triplet transition method splits the node similarity scores so well, any unsupervised clustering method should be able to split the node pairs into a low scoring cluster and a high scoring cluster. As the problem is in one-dimension a version of k-means clustering is sufficient and this will always assign our node pairs to either a low or to a high score even if a method does not have a clear threshold visually. The objective function of our clustering is J where
where \(\theta \) is the Heaviside step function. The sum over (u, v) is over all distinct nodes pairs (so \((u,v) \in {\mathscr V}^2 | u \ne v\)). The \(\mu _+\) (\(\mu _-\)) is the average similarity score of node pairs in the high score (low score) cluster. The problem is reduced to finding the threshold value \(s_{\mathrm th}\) that minimises J.
Evaluation metrics
To evaluate the performance of our Triplet Transition and the other link prediction methods, we use a variety of standard metrics.The simplest metric we use is to simply look at the fraction of edges that are removedThe simplest metric we use is the fraction of edges that are removed from snapshot s to the next snapshot \(s+1\). We denote this by \(f_{\mathscr E}(s)\),
where \({\mathscr E}(s)\) is the link set of the network in snapshot s.
We also use more traditional metrics such as precision and area under the curve for which we need a binary classification. Thinking of snapshot \({\mathscr G}(s+1)\) as the current state while we are trying to predict the state in the next snapshot, we consider four transitions \((A_{uv}(s) \rightarrow A_{uv}(s+1) )\) of node pairs: \(0 \rightarrow 0\), \(0 \rightarrow 1\), \(1 \rightarrow 0\), and \(1 \rightarrow 1\). We map these states onto a binary set of states, namely \(A_{uv}(s+1)\), so what we call a positive result (negative result) is where a link is present (is not present) in snapshot \((s+1)\) regardless of the state that pair started in. We then consider whether the prediction for the state of the node pair in snapshot \(s+1\) was true or false. So a false positive is where we predict no link for a node pair when that pair did end up with a link, while a true negative is where we correctly predict a pair of nodes will not be connected in the next snapshot. The table of predicted classes and actual classes is shown in Table 3.
With this traditional binary classification, we can then evaluate the performance of our Triplet Transition method using standard metrics (see Appendix F for more details)—area under curve and precision. To express these, we define \(N_{\alpha \beta \pm }\) to be the number of node pairs satisfying the following criteria. The node pair starts in snapshot \({\mathscr G}(s)\) in state \(\alpha \) equal to 1 if the node pair is connected by an edge, 0 otherwise. This edge pair is then in state \(\beta \) in snapshot \({\mathscr G}(s+1)\) with \(\beta \) is 1 if the node pair is connected by an edge in snapshot \({\mathscr G}(s+1)\), and is 0 otherwise. Finally the sign indicates if the prediction made for that node pair in \({\mathscr G}(s+1)\) was correct (true, \(+\)) or incorrect (false, −).
We can evaluate the methods independent of the classification threshold chosen through k-means by using the area under the curve (AUC) where the curve is the receiver operating characteristic curve. For any binary classifier of the results of an algorithm, such as defined here in Table 3, the curve plotted is the fraction of positive results (TPR, true positive rate) which are correct against the fraction of negative results which are incorrect (FPR, false positive rate) as the threshold \(s_{\mathrm th}\) is varied:
Once the threshold \(s_{\mathrm th}\) has been fixed, in our case using k-means (23), the precision score \(S_{\mathrm {prec}}\) is defined as the number of times that we predict a link exists between node pairs in the later snapshot correctly (a true positive, \(N_{11+}+N_{01+}\)) divided by the number of times we predict a link, correctly (true positive) or incorrectly (false positive, \(N_{11-}+N_{01-}\)):
A high precision score means we can trust that links predicted by the algorithm will exist.
We can set a baseline value for precision using a simple model which predicts a link in snapshot \({\mathscr G}(s+1)\) exists for any given node pair with a probability given by the fraction of node pairs which have an link in snapshot \({\mathscr G}(s)\), that is the density \(\rho (s)\). In this case, the precision (26) is simply equal to the density in snapshot \({\mathscr G}(s)\), \(S_{\mathrm {prec,base}} =\rho (s)\), see Appendix F.
A very low precision score for baseline method indicates that the links existing between node pairs are not random. Some of the local measurement algorithms give lower scores than the baseline, suggesting that those types of local information are less likely to drive the evolution of the networks.
Edge sampling
We use the whole network to evaluate the performance, which is different from the sampling method used in Fig. 5 to take account of the full nature of the data. In the following analysis, we predict the node pairs for all the possible node pairs of a whole network. We expect predictions can capture evolving characteristics of networks and the Mathematician networks change tiny fractions which are not sufficient enough to evaluate the predictions. Therefore, we replace the Mathematician networks with Hypertext networks (see Appendix C for more details of this data set) in the following prediction analysis. Time data is sampled over different time intervals \(\Delta t\). For Turkish Shareholder networks, the smallest time separation is 2 years, and we consider four or more years too long for the evolution; for the Hypertext data, which records the short communications, we choose \(\Delta t\) as 40 and 60 minutes; for the College Message and Email networks, we consider that 8 hour to 1 month communication frequency is reasonable.
Results
Figure 7 shows a comparison of AUC for the ten algorithms when we apply them to node pairs sampled uniformly at random from all possible node pairs. The Triplet Transition (TT) approach defined here is the left-most triangular point in each figure. In the Hypertext networks (b) and the College Message networks (c), the Triplet Transition method has the highest AUC though the PA, Katz, MFI and LPI algorithms perform almost as well (see Table 2 for abbreviations). For the Turkish Shareholder network (a) the AUC of our Triplet Transition method is again the highest though with a similar AUC value for various algorithms. Note that PA, Katz, and MFI are now weaker. Only for the Email network (d) is our Triplet Transition outperformed, in this case by the Katz, MFI and LPI algorithms.
Figure 8 shows that there are some clear patterns in our results for precision. First, each link prediction method has a similar performance relative to the other methods on three of the networks: the Hypertext network (b), the College Message network (c), and the Email network (d). On these three data sets, three algorithms are consistently better than the others though with similar performances relative to one another: our Triplet Transition (TT) method, the Katz method60,61,66, and the Matrix Forest Index64 (MFI) method. All of these are probing non-local information in the networks, suggesting this is necessary to understand the time evolution of these networks.
Overall we see some similarity in these AUC results, summarised in Table 4 as we saw for precision in Table 5. The same three algorithms, the Triplet Transition (TT) methods, the Katz method, and the MFI method, have a similar high performance on the same three networks, the Hypertext network, the College Message network and the Email network. For these three networks, we might also pick out the Preferential Attachment (PA) algorithm. However, now the AUC values for the Turkish Shareholder network show that our Triplet Transition method continues to perform well, unlike for the precision measurements. The Katz, Matrix Forest Index and Preferential Attachment methods are, though, in a weaker group of algorithms as measured by their AUC performance on theTurkish Shareholder network.
For three of these networks, we also measure AUC over snapshots of these networks defined over different time scales. The comparison among methods rarely changes. However, the performance of most algorithms is altered by the size of the time window chosen in some cases, reflecting inherent timescales in the different systems. The most noticeable is that for the Email network, there is a large difference between windows of eight hours and one week but not so much change between a week and one month. The gaps may suggest that if a person is going to produce an email, perhaps following up an email request of bringing a third person into the conversation, that new email is done often on the scale of a few days not always on the scale of a few hours.
The Triplet Transition proposed here is used to predict a link between two nodes by considering these alongside a third node which can be in any position in the network. In this way, this third node not only captures the higher-order interactions but also enables the method to encode both local and non-local information about the link of interest. We find that our Triplet Transition method and the two other global methods used here, Katz Index method60,61,66 and the Matrix Forest Index64 are generally the best for most of networks we studied, in particular for the Hypertext networks, the College Message networks and the Email networks. As the most successful methods here perform better than other approaches based on local measures, this shows that in most systems the pattern of connections depends on the broader structure of interactions. This dependence of the behaviour of systems on structure beyond nearest neighbours is the crucial motivation for using the language of networks rather than just looking at the statistics of pairs73. For instance, the Katz method counts the number of paths between each pair of nodes, probing all paths though giving less weight to longer paths, so nearest neighbours contribute the most.
The results for theTurkish Shareholder networks were a little different. In this case, predictions based on local measurements (paths of length two), the semi-local Local Path Index method (LPI), as well as our non-local triplet transition method outperformed the other global methods in terms of AUC, see Table 4. The global methods also perform poorly on precision, see Table 5. An algorithm with low precision and high AUC, such as Jaccard Coefficient (JC), is predicting the disconnected pairs well.
Discussion
In this paper, we considered the temporal evolution of networks by looking at a sequence of snapshots of each network. The network \(\mathscr {G}(s)\) defined for snapshot s contains all the links present between nodes for a certain period, \(\Delta t\). Each snapshot s covers the period \(\Delta t\) immediately following the latest time included in the previous snapshot. In some cases, we have looked at the effect of changing the size of the temporal windows \(\Delta t\) on our results. The main tool we use to study the network evolution is the transition matrix \(\mathsf {T}\) of Eq. (2) which are derived from the evolution of three-node combinations in a network from one temporal snapshot \(\mathscr {G}(s-1)\) to the next \(\mathscr {G}(s)\). These transition matrices are obtained from real data by counting the different states of three nodes found in consecutive network snapshots.
To decode the higher-order interaction patterns of network dynamics, we fitted a pairwise interaction model to the real data and computed the transition matrices from the fitted parameters. By comparing the actual transition matrices found numerically with those predicted using a simple pairwise model, as shown in Fig. 3, we demonstrated that higher-order interactions are needed to understand the evolution of networks. For example, in the Email network, derived from the emails within an EU Institution, if three nodes are connected in the previous temporal snapshot, they are less likely to be disconnected in the following snapshot.
To show that we must look beyond the interactions of neighbours, we then designed a link prediction algorithm based on the transition matrix \(\mathsf {T}\) of Eq. (2), our Triplet Transition (TT) method. We compared this method with nine other link prediction methods as well as to simple baseline measures. What we found was that on a range of different temporal networks, the Triplet Transition method was as good as two methods based on non-local (global) information in the network, namely, the Katz Index method60,61,66 and the Matrix Forest Index (MFI) method64. While not always the best on every network or every measure, these three global methods were usually better than the other methods we studied, all of which used information on paths of length two in the network. Intriguingly, the one other method that used paths of length three, Local Path Index61,63 (LPI), often performed well too though rarely as well as the top three global methods.
Since the most successful methods in our tests were those that access non-local information, it seems that such information is essential in the evolution of most networks and therefore, it is important to include this in network measures. However, including information from the whole network is numerically intensive and, for any reasonably sized network, the evolution of a link is unlikely to depend directly on what is happening a long way from that link. One reason why our Transition Triplet method works well is that it does not emphasise the vast majority of the network. Most of the information in the transition matrix network is based on neighbours of one or other of the link of interest. For large networks, we use sampling to add the necessary global information into the transition matrices. The Katz index method does include information from all scales but suppresses contributions from more distant parts of the network. The success of the transition triplet approach suggests that there is no need to access all of the global information of a network in order to know what is going on locally. Notably, the overall better performance of the Triplet Transition method reveals that the information of different higher-order interaction patterns can help understand and predict different dynamics of networks.
There is also another reason why our Triplet Transition method may work better than the local methods we look at, and that is because our method is also probing a longer time scale as well as a longer spatial scale. That is we use two snapshots, \(\mathscr {G}(s-1)\) and \(\mathscr {G}(s)\) in order to create the transition matrix \(\mathsf {T}\) which in turn we use for the predictions in snapshot \(\mathscr {G}(s+1)\). All the other methods used here are based on information from one snapshot \(\mathscr {G}(s)\). So again, the success of the Triplet Transition method points to correlations over short but non-trivial time scales as being important in understanding network evolution. In our case, the dependence of results on the time intervals can be seen in the effect of \(\Delta t\) used to define the transition matrices are important. For different data sets, we found different \(\Delta t\) gave optimal results which of course reflects inherently different timescales in the processes encoded by our different data sets. So another conclusion is that higher order effects in terms of both time and space are needed to understand the evolution of temporal networks and to make effective predictions for links. The inclusion of higher-order order effects in terms of time remains undeveloped relative to the work on higher-order spatial network features.
In our approach we have focused on changes in the edges and ignored changes in the set of nodes. Our method can include nodes which are not connected in some or even all our snapshots provided these nodes are known. However, in many cases the data sets may only record interactions, our edges, and our set of nodes is only inferred from that. As a result we often have no information about such (totally isolated) nodes. Suppose we are given a list of emails, our edges, sent at a given time between email accounts, our nodes. We cannot distinguish accounts which are dormant from those that are deleted or added to the system without additional information. Should we have such data on node birth and death, then in some cases it might be an important process to include, but it is not one we address in our approach.
Currently constructing optimal higher order models is a timely topic5. Our method can be generalised to include even higher order interactions, such as quadruplet and so on. The method can be used to indicate higher order evolutionary mechanisms in a network and suggest what is the most likely order of interaction. Our work shows that studying the evolution of small graphs over short time periods can reveal important information and predictions regarding network evolution.
References
Anderson, P. W. More is different. Science 177(4047), 393–396 (1972).
Battiston, F. et al. Networks beyond pairwise interactions: Structure and dynamics. Phys. Rep. 874, 1–92 (2020).
Newman, M. Networks (Oxford University Press, Oxford, 2018).
Strogatz, S. Exploring complex networks. Nature 410, 268–276 (2001).
Lambiotte, R., Rosvall, M. & Scholtes, I. From networks to optimal higher-order models of complex systems. Nat. Phys. 15, 313–320 (2019).
Benson, A., David, F. & Jure, L. Higher-order organization of complex networks. Science 353, 163–166 (2016).
Rapoport, A. A Spread of information through a population with socio-structural bias. I. Assumption of transitivity. Bull. Math. Biol. 15, 523–533 (1953).
Granovetter, M. The strength of weak ties. Am. J. Sociol. 78, 1360 (1973).
Expert, P. et al. Self-similar correlation function in brain resting-state functional magnetic resonance imaging. J. R. Soc. Interface 8, 472–479 (2011).
Petri, G. et al. Homological scaffolds of brain functional networks. J. R. Soc. Interface 11, 20140873 (2014).
Expert, P. Lord, L, Kringelbach, Morten L, & Petri. G. Topological neuroscience 3, 653–655 (2019).
Sanchez-Gorostiaga, A., Bajic, D., Osborne, M. L., Poyatos, J. F. & Sanchez, A. High-order interactions dominate the functional landscape of microbial consortia. PLoS Biol. 17, e3000550 (2019).
Bairey, E., Eric, D. & Roy, K. High-order species interactions shape ecosystem diversity. Nat. Commun. 7(1), 1–7 (2016).
Berge, C. Graphs and Hypergraphs (North-Holland Publishing Co, Paris, 1973).
Berge, C. Graphes et hypergraphes (Dunod, Paris, 1967).
Johnson, J. Hypernetworks in the science of complex systems (World Scientific, New York, 2013).
Milo, R. et al. Network motifs: Simple building blocks of complex networks. Science 298, 824–827 (2002).
Pržulj, N., Corneil, D. G. & Jurisica, I. Modeling interactome: Scale-free or geometric?. Bioinformatics 20, 3508–3515 (2004).
Przulj, N. Biological network comparison using graphlet degree distribution. Bioinformatics 23, e177–e183 (2007).
Scholtes, I. When is a Network a Network? Multi-Order Graphical Model Selection in Pathways and Temporal Networks. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD’17 1037–1046 (2017).
Grover, A., & Leskovec, J. node2vec:Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD’16 855-864 (2016).
Freeman, L. C. The sociological concept of group: An empirical test of two models. Am. J. Sociol. 98, 152 (1992).
Evans, T. S. Clique graphs and overlapping communities. J. Stat. Mech. https://doi.org/10.1088/1742-5468/2010/12/P12037 (2010).
Derényi, I. & Palla, G. Clique percolation in random networks. Phys. Rev. Lett. 94, 16202 (2005).
Muhammad, A., & Egerstedt, M. Control using higher order Laplacians in network topologies. In Proc. of 17th International Symposium on Mathematical Theory of Networks and Systems, pp. 1024-1038. (Citeseer, 2006).
Horak, D., Maletić, S. & Rajković, M. Persistent homology of complex networks. J. Stat. Mech. Theory Exp. 3, P03034 (2009).
Giusti, C., Ghrist, R. & Bassett, D. S. Twos company, three (or more) is a simplex. J. Comput. Neurosci. 41, 1–14 (2016).
Bianconi, G. & Rahmede, C. Emergent hyperbolic network geometry. Sci. Rep. 6, 1–9 (2017).
Petri, G. & Barrat, A. Simplicial activity driven model. Phys. Rev. Lett. 121, 228301 (2018).
Millan, A. P., Torres, J. J. & Bianconi, G. Complex network geometry and frustrated synchronization. Sci. Rep. 8, 1–10 (2018).
Millan, A. P., Torres, J. J. & Bianconi, G. Synchronization in network geometries with finite spectral dimension. Phys. Rev. E 99, 218301 (2019).
Skardal, P. S. & Arenas, A. Abrupt desynchronization and extensive multistability in globally coupled oscillator simplexes. Phys. Rev. Lett. 122, 248301 (2019).
Millán, A. P., Torres, J. J. & Bianconi, G. Explosive higher-order Kuramoto dynamics on simplicial complexes. Phys. Rev. Lett. 124, 022307 (2020).
Iacopini, I., Petri, G., Barrat, A. & Latora, V. Simplicial models of social contagion. Nat. Commun. 10, 1–9 (2019).
Matamalas, J. T., Gómez, S. & Arenas, A. Abrupt phase transition of epidemic spreading in simplicial complexes. Phys. Rev. Res. 2, 108701 (2020).
Starnini, M., Baronchelli, A. & Pastor-Satorras, R. Modeling human dynamics of face-to-face interaction networks. Phys. Rev. Lett. 110, 012049 (2013).
Van Mieghem, P. & Van de Bovenkamp, R. Non-Markovian infection spread dramatically alters the susceptible-infected-susceptible epidemic threshold in networks. Phys. Rev. Lett. 110, 169701 (2013).
Scholtes, I. et al. Causality-driven slow-down and speed-up of diffusion in non-Markovian temporal networks. Nat. Commun. 5, 1–9 (2014).
Delvenne, J. C., Lambiotte, R. & Rocha, L. E. Diffusion on networked systems is a question of time or structure. Nat. Commun. 6, 1–10 (2015).
Williams, O. E., Lillo, F. & Latora, V. Effects of memory on spreading processes in non-Markovian temporal networks. New J. Phys. 21, 043028 (2019).
Williams, O.E., Lacasa, L., Millan, A. P., & Latora, V. The shape of memory in temporal networks. Preprint at: arXiv:2004.12784 2020.
Masuda, N. & Lamboitte, R. Temporal Network (Imperial College Press, New York, 2016).
Holme, P. & Saramäki, J. Temporal networks. Phys. Rep. 519, 97–125 (2012).
Pfitzner, R., Scholtes, I., Garas, A., Tessone, C. J. & Schweitzer, F. Betweenness preference: Quantifying correlations in the topological dynamics of temporal networks. Phys. Rev. Lett. 110, 198701 (2013).
Scholtes, I., Wider, N. & Garas, A. Higher-order aggregate networks in the analysis of temporal networks: Path structures and centralities. Eur. Phys. J. B 89, 1–15 (2016).
Scholtes, I. When is a network a network? Multi-order graphical model selection in pathways and temporal networks. In Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining, 1037–1046 (2017).
Bianconi, G., Darst, R. K., Iacovacci, J. & Fortunato, S. Triadic closure as a basic generating mechanism of communities in complex networks. Phys. Rev. E 90, 042806 (2014).
Krackhardt, D. & Mark, H. Heider vs Simmel: Emergent Features in Dynamic Structure. In The Network Workshop. Proceedings Statistical Network Analysis: Models, Issues and New Directions 14–27 (Springer, New York, 2007).
Burt, R. S. Structural holes and good ideas. Am. J. Sociol. 110, 349–399 (2004).
Zhang, X., Moore, C. & Newman, M. E. Random graph models for dynamic networks. Eur. Phys. J. B 90, 1–14 (2017).
Yao, Q., Evans, T. S. & Christensen, K. How the network properties of shareholders vary with investor type and country. PLoS ONE 14, 0220965. https://doi.org/10.1371/journal.pone.0220965 (2019).
Chen, B., Lin, Z., & Evans, T.S. Analysis of the Wikipedia Network of Mathematicians. Preprint at https://arXiv.org/abs/1902.07622 (2019).
Leskovec, J., & Krevl, A. SNAP Datasets: Stanford Large Network Dataset Collection, http://snap.stanford.edu/data (2014).
Opsahl, T. & Panzarasa, P. Clustering in weighted networks. Soc. Netw. 31, 155–163 (2009).
Panzarasa, P., Opsahl, T. & Carley, K. M. Patterns and dynamics of users behavior and interaction: Network analysis of an online community. J. Am. Soc. Inf. Sci. Technol. 60, 911–93 (2009).
Kunegis, J. KONECT-The Koblenz Network Collection. Proc. Int. Conf. on World Wide Web Companion,1343–1350(2013).
Isella, L. et al. Whats in a crowd? Analysis of face-to-face behavioral networks. J. Theor. Biol. 271, 166–180 (2011).
Kunegis, J. KONECT—The Koblenz Network Collection. In Proc. Int. Conf. on World Wide Web Companion. 1343–1350 (2013).
Leskovec, J., Kleinberg, J. & Faloutsos, C. Graph evolution: Densification and shrinking diameters. ACM Trans. Knowl. Discov. Data (TKDD) 1, 2 (2007).
Liben-Nowell, D. & Kleinberg, J. The link-prediction problem for social networks. J. Am. Soc. Inform. Sci. Technol. 58, 1019–1031 (2007).
Lü, L., Jin, C. H. & Zhou, T. Similarity index based on local paths for link prediction of complex networks. Phys. Rev. E 80, 046122 (2009).
Leicht, E. A., Holme, P. & Newman, M. E. Vertex similarity in networks. Phys. Rev. E 73, 026120 (2006).
Zhou, T., Lü, L. & Zhang, Y.-C. Predicting missing links via local information. Eur. Phys. J. B 71, 623–630 (2009).
Chebotarev, P. & Shamis, E. The matrix-forest theorem and measuring relations in small social groups. Autom. Remote. Control. 58, 1505 (1997).
Hagberg, A., Swart, P., & S Chult, D. and Exploring network structure, dynamics, and function using NetworkX. Los Alamos National Lab.(LANL), Los Alamos, NM (United States) (2008).
Abuoda, G., Morales, G. D. F. & Aboulnaga, A. Link prediction via higher-order motif features. Jt. Eur. Conf. Mach. Learn. Knowl. Discov. Databases 4, 412–429 (2019).
Barandela, R., Sánchez, J. S., Garca, V. & Rangel, E. Strategies for learning in class imbalance problems. Pattern Recogn. 36, 849–851 (2003).
Salton, G. & McGill, M. J. Introduction to Modern Information Retrieval (McGrawHill, New York, 1983).
Molloy, M. & Reed, B. A critical point for random graphs with a given degree sequence. Random Struct. Algorithms 6, 161–180 (1995).
Newman, M. E. Scientific collaboration networks I Network construction and fundamental results. Phys. Rev. E 64, 0166131 (2001).
Barabási, A. L. et al. Evolution of the social network of scientific collaborations. Phys. A 311, 590–614 (2002).
Lü, L. & Zhou, T. Link prediction in complex networks: A survey. Phys. A 390, 1150–1170 (2011).
Brandes, U., Robins, G., McCranie, A. & Wasserman, S. What is network science?. Netw. Sci. 1, 1–15 (2013).
Acknowledgements
This research is supported by the Centre for Complexity science group at Imperial College London. We thank Nanxin Wei, from Imperial College London and Junming Huang, from Princeton University for developing early ideas of this paper. We thank Hardik Rajpal and Fernando Rosas for valuable discussion of the triplets in the graph. We also appreciate another colleague Hayato Goto for valuable interoperation of machine learning methods and its application.
Author information
Authors and Affiliations
Contributions
Q.Y. and B.C. conducted the numerical simulations and data analysis. Q.Y., B.C., T.E. and K.C. analysed and interpreted the results, and wrote the manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supplementary Information
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Yao, Q., Chen, B., Evans, T.S. et al. Higher-order temporal network effects through triplet evolution. Sci Rep 11, 15419 (2021). https://doi.org/10.1038/s41598-021-94389-w
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-021-94389-w
- Springer Nature Limited