reconstructing patterns of information diffusion from...

105
Reconstructing Patterns of Information Diffusion from Incomplete Observations Flavio Chierichetti Jon Kleinberg David Liben-Nowell Sapienza University Cornell University Carleton College

Upload: others

Post on 16-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Reconstructing Patterns of Information Diffusion from Incomplete Observations

Flavio ChierichettiJon Kleinberg

David Liben-Nowell

Sapienza UniversityCornell UniversityCarleton College

Page 2: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Internet Activism

• Very important phenomenon.

• Incomplete Traces. How to study partially-visible viral phenomena?

• Chain Letter Petitions: how to estimate the reach?

Page 3: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

NPR Chain LetterPBS, NPR (National Public Radio), and the arts are facing major cutbacks in funding. In spite of the efforts of each station to reduce spending costs and streamline their services, the government officials believe that the funding currently going to these programs is too large a portion of funding for something which is seen as "unworthwhile."

[...]

When this issue comes up in 1996, the funding will be determined for fiscal years 1996-1998.

The only way that our representatives can be aware of the base of support or PBS and funding for these types of programs is by making our voices heard.

Please add your name to this list if you believe in what we stand for. This list will be forwarded to the President of the United States, the Vice President of the United States, the House of Representatives and Congress.

If you happen to be the 50th, 100th, 150th, etc. signer of this petition, please forward to: [email protected] . This way we can keep track of the lists and organize them. Forward this to everyone you know, and help us to keep these programs alive.

Thank you.

1. Elizabeth Weinert, student, University of Northern Colorado, Greeley, Colorado.2. Robert M. Penn; San Francisco, CA3. Gregory S. Williamson, San Francisco, CA4. Daniel C. Knightly, Austin, TX5. Andrew H. Knightly, Los Angeles, CA6. Aaron C. Yeater, Somerville, MA7. Tobie M. Cornejo, Washington, DC8. John T. Mason, Dalton, MA9. Eric W. Fish, Williamstown, MA10. Courtney E. Estill, Hamilton College, NY11. Vanessa Moore, Northfield, MN12. Lynne Raschke, Haverford College, PA (originally Minnesota)13. Deborah Bielak, Haverford, PA14. Morgan Lloyd, Haverford, PA 1904115. Galen Lloyd, Goucher College, MD16. Brian Eastwood, University of Vermont, VT17. Elif Batuman, Harvard University, MA18. Kohar Jones, Yale University, CT19. Claudia Brittenham, Yale University, CT20. Alexandra Block, Yale University, CT21. Susanna Chu, Yale University, CT22. Michelle Chen, Harvard University, MA23. Jessica Hammer, Harvard University, MA24. Ann Pettigrew, Haverford College, PA25. Kirstin Knox, Swarthmore College, PA26. Jason Adler, Swarthmore College, PA27. Daniel Gottlieb, Swarthmore College (but truly from Lawrence, KS)28. Josh Feltman, Tufts University, MA29. Louise Forrest, Massachusetts Institute of Technology, MA30. HongSup Park, Massachusetts Institute of Technology, MA (originally from Portage, Wisconsin)31. Ana Sandoval,Massachusetts Institute of Technology[...]

Page 4: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

NPR Chain LetterPBS, NPR (National Public Radio), and the arts are facing major cutbacks in funding. In spite of the efforts of each station to reduce spending costs and streamline their services, the government officials believe that the funding currently going to these programs is too large a portion of funding for something which is seen as "unworthwhile."

[...]

When this issue comes up in 1996, the funding will be determined for fiscal years 1996-1998.

The only way that our representatives can be aware of the base of support or PBS and funding for these types of programs is by making our voices heard.

Please add your name to this list if you believe in what we stand for. This list will be forwarded to the President of the United States, the Vice President of the United States, the House of Representatives and Congress.

If you happen to be the 50th, 100th, 150th, etc. signer of this petition, please forward to: [email protected] . This way we can keep track of the lists and organize them. Forward this to everyone you know, and help us to keep these programs alive.

Thank you.

1. Elizabeth Weinert, student, University of Northern Colorado, Greeley, Colorado.2. Robert M. Penn; San Francisco, CA3. Gregory S. Williamson, San Francisco, CA4. Daniel C. Knightly, Austin, TX5. Andrew H. Knightly, Los Angeles, CA6. Aaron C. Yeater, Somerville, MA7. Tobie M. Cornejo, Washington, DC8. John T. Mason, Dalton, MA9. Eric W. Fish, Williamstown, MA10. Courtney E. Estill, Hamilton College, NY11. Vanessa Moore, Northfield, MN12. Lynne Raschke, Haverford College, PA (originally Minnesota)13. Deborah Bielak, Haverford, PA14. Morgan Lloyd, Haverford, PA 1904115. Galen Lloyd, Goucher College, MD16. Brian Eastwood, University of Vermont, VT17. Elif Batuman, Harvard University, MA18. Kohar Jones, Yale University, CT19. Claudia Brittenham, Yale University, CT20. Alexandra Block, Yale University, CT21. Susanna Chu, Yale University, CT22. Michelle Chen, Harvard University, MA23. Jessica Hammer, Harvard University, MA24. Ann Pettigrew, Haverford College, PA25. Kirstin Knox, Swarthmore College, PA26. Jason Adler, Swarthmore College, PA27. Daniel Gottlieb, Swarthmore College (but truly from Lawrence, KS)28. Josh Feltman, Tufts University, MA29. Louise Forrest, Massachusetts Institute of Technology, MA30. HongSup Park, Massachusetts Institute of Technology, MA (originally from Portage, Wisconsin)31. Ana Sandoval,Massachusetts Institute of Technology[...]

Page 5: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Chain Letters

Aaron

Page 6: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Chain Letters

Aaron

Betty Charles David

Page 7: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Chain Letters

Aaron

Betty Charles David

Earl Fran

Page 8: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Chain Letters

Aaron

Betty Charles David

Earl Fran George

Hilary

Page 9: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Chain Letters

Aaron

Betty Charles David

Earl Fran George

HilaryABEH

Dear all,an important cause demands your attention.[…]If you care about this, add your name and forward this letter.[…]The signers,AaronBettyEarlHilary

Page 10: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Chain Letters

Aaron

Betty Charles David

Earl Fran George

HilaryABEH

AD

Page 11: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Chain Letters

Aaron

Betty Charles David

Earl Fran George

Hilary

Page 12: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Chain Letters

Aaron

Betty Charles David

Earl Fran George

HilaryG

Page 13: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

George’s Blog

Chain Letters

Aaron

Betty Charles David

Earl Fran

Hilary

Here is something that I sent to my friends today:Dear all,an important cause demands your attention.[…]If you care about this, add your name and forward this letter.[…]The signers,AaronDavidGeorge

G

George

Page 14: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

George’s Blog

Chain Letters

Aaron

Betty Charles David

Earl Fran

HilaryG

George

Here is something that I sent to my friends today:Dear all,an important cause demands your attention.[…]If you care about this, add your name and forward this letter.[…]The signers,AaronDavidGeorge

Page 15: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Chain Letters

Aaron

Betty Charles David

Earl Fran

Hilary

George

Page 16: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Chain Letters

Aaron

Betty Charles David

Earl Fran

Hilary

George

Page 17: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Chain Letters

Aaron

Betty Charles David

Earl Fran

Hilary

George

George and Hilary, by exposing their emails, revealed a subtree of the Chain Letter tree.

Page 18: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Real-World Chain Letters’ Tree

• [Liben-Nowell, Kleinberg, PNAS’08], mined

• web-accessible mailing-lists,

• blog posts.

• They obtained some “exposed” nodes of two Chain Letters’ trees, and

• they produced two “revealed” trees.

Page 19: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

NPR revealed treeLiben-Nowell, Kleinberg, PNAS’08

Page 20: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

NPR revealed treeLiben-Nowell, Kleinberg, PNAS’08

Page 21: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

NPR revealed treeLiben-Nowell, Kleinberg, PNAS’08

Page 22: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

NPR revealed treeLiben-Nowell, Kleinberg, PNAS’08

Non-exponential growth

13K nodes

Page 23: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Iraq Chain LetterDear all:

The US Congress has just authorized the Presidentof the US to go to  war against Iraq. The UN isgathering signatures in an effort to  avoid this tragic world event.

Please consider this an urgent request: UN Petition for Peace - Stand for Peace. Islam is not the Enemy.War is NOT the Answer.

Today we are at a point of imbalance in the worldand are moving  toward what may be the beginning of a THIRD WORLD WAR.

Please COPY (rather than Forward) this e-mail in a new message, sign at the end of the list, and send it to all the people whom you know.

If you receive this list with more than 500 namessigned, please send a copy of the message to:

[email protected]@whitehouse.gov

Even if you decide not to sign, please considerforwarding the petitionon instead ofdeleting it.

1) Suzanne Dathe, Grenoble, France2) Laurence COMPARAT, Grenoble, France3) Philippe MOTTE, Grenoble, France

4) Jok FERRAND, Mont St. Martin, France5) Emmanuelle PIGNOL, St Martin d'Heres, FRANCE6) Marie GAUTHIER, Grenoble, FRANCE7) Laurent VESCALO, Grenoble, FRANCE8) Mathieu MOY, St Egreve, FRANCE9) Bernard BLANCHET, Mont St Martin,FRANCE10) Tassadite FAVRIE, Grenoble, FRANCE11) Loic GODARD, St Ismier, FRANCE12) Benedicte PASCAL, Grenoble, FRANCE13) Khedaidja BENATIA, Grenoble, FRANCE14) Marie-Therese LLORET, Grenoble,FRANCE15) Benoit THEAU, Poitiers, FRANCE16) Bruno CONSTANTIN, Poitiers, FRANCE17) Christian COGNARD, Poitiers, FRANCE18) Robert GARDETTE, Paris, FRANCE19) Claude CHEVILLARD, Montpellier, FRANCE20) Gilles FREISS, Montpellier, FRANCE21) Patrick AUGEREAU, Montpellier, FRANCE22) Jean IMBER! T, Marseille, FRANCE23) Jean-Claude MURAT, Toulouse, France24) Anna BASSOLS, Barcelona, Catalonia25) Mireia DUNACH, Barcelona, Catalonia26) Michel VILLAZ, Grenoble, France27) Pages Frederique, Dijon, France28) Rodolphe FISCHMEISTER,Chatenay-Malabry, France29) Francois BOUTEAU, Paris, France30) Patrick PETER, Paris, France31) Lorenza RADICI, Paris, France32) Monika Siegenthaler, Bern, Switzerland33) Mark Philp,Glasgow,Scotland34) Tomas Andersson, Stockholm, Sweden35) Jonas Eriksson, Stockholm, Sweden36) Karin Eriksson, Stockholm, Sweden...

Page 24: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Iraq Chain LetterDear all:

The US Congress has just authorized the Presidentof the US to go to  war against Iraq. The UN isgathering signatures in an effort to  avoid this tragic world event.

Please consider this an urgent request: UN Petition for Peace - Stand for Peace. Islam is not the Enemy.War is NOT the Answer.

Today we are at a point of imbalance in the worldand are moving  toward what may be the beginning of a THIRD WORLD WAR.

Please COPY (rather than Forward) this e-mail in a new message, sign at the end of the list, and send it to all the people whom you know.

If you receive this list with more than 500 namessigned, please send a copy of the message to:

[email protected]@whitehouse.gov

Even if you decide not to sign, please considerforwarding the petitionon instead ofdeleting it.

1) Suzanne Dathe, Grenoble, France2) Laurence COMPARAT, Grenoble, France3) Philippe MOTTE, Grenoble, France

4) Jok FERRAND, Mont St. Martin, France5) Emmanuelle PIGNOL, St Martin d'Heres, FRANCE6) Marie GAUTHIER, Grenoble, FRANCE7) Laurent VESCALO, Grenoble, FRANCE8) Mathieu MOY, St Egreve, FRANCE9) Bernard BLANCHET, Mont St Martin,FRANCE10) Tassadite FAVRIE, Grenoble, FRANCE11) Loic GODARD, St Ismier, FRANCE12) Benedicte PASCAL, Grenoble, FRANCE13) Khedaidja BENATIA, Grenoble, FRANCE14) Marie-Therese LLORET, Grenoble,FRANCE15) Benoit THEAU, Poitiers, FRANCE16) Bruno CONSTANTIN, Poitiers, FRANCE17) Christian COGNARD, Poitiers, FRANCE18) Robert GARDETTE, Paris, FRANCE19) Claude CHEVILLARD, Montpellier, FRANCE20) Gilles FREISS, Montpellier, FRANCE21) Patrick AUGEREAU, Montpellier, FRANCE22) Jean IMBER! T, Marseille, FRANCE23) Jean-Claude MURAT, Toulouse, France24) Anna BASSOLS, Barcelona, Catalonia25) Mireia DUNACH, Barcelona, Catalonia26) Michel VILLAZ, Grenoble, France27) Pages Frederique, Dijon, France28) Rodolphe FISCHMEISTER,Chatenay-Malabry, France29) Francois BOUTEAU, Paris, France30) Patrick PETER, Paris, France31) Lorenza RADICI, Paris, France32) Monika Siegenthaler, Bern, Switzerland33) Mark Philp,Glasgow,Scotland34) Tomas Andersson, Stockholm, Sweden35) Jonas Eriksson, Stockholm, Sweden36) Karin Eriksson, Stockholm, Sweden...

Page 25: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

18,119 nodes

IRAQ revealed treeLiben-Nowell, Kleinberg, PNAS’08

Page 26: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

18,119 nodes17,079 nodes with one child (94%)

IRAQ revealed treeLiben-Nowell, Kleinberg, PNAS’08

Page 27: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

18,119 nodes17,079 nodes with one child (94%)00,620 exposed nodes00,557 (exposed) leaves

IRAQ revealed treeLiben-Nowell, Kleinberg, PNAS’08

Page 28: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

18,119 nodes17,079 nodes with one child (94%)00,620 exposed nodes00,557 (exposed) leaves

IRAQ revealed treeLiben-Nowell, Kleinberg, PNAS’08

Why is this fraction so high?

Page 29: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

18,119 nodes17,079 nodes with one child (94%)00,620 exposed nodes00,557 (exposed) leaves

IRAQ revealed treeLiben-Nowell, Kleinberg, PNAS’08

Why is this fraction so high?

What can we infer about theoriginal, unknown, Chain Letter Tree?

Page 30: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Tree-Revealing ProcessLiben-Nowell, Kleinberg, PNAS’08

Aaron

Betty Charles David

Earl Fran George

Hilary

Page 31: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Aaron

Betty Charles David

Earl Fran George

Hilary

Each node is exposed independently with prob. � > 0

Tree-Revealing ProcessLiben-Nowell, Kleinberg, PNAS’08

Page 32: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Aaron

Betty Charles David

Earl Fran George

Hilary

Each node is exposed independently with prob. � > 0

Tree-Revealing ProcessLiben-Nowell, Kleinberg, PNAS’08

Page 33: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Aaron

Betty Charles David

Earl Fran George

Hilary

Each node is exposed independently with prob. � > 0

Tree-Revealing ProcessLiben-Nowell, Kleinberg, PNAS’08

Page 34: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Aaron

Betty Charles David

Earl Fran George

Hilary

Each node is exposed independently with prob. � > 0

Tree-Revealing ProcessLiben-Nowell, Kleinberg, PNAS’08

Page 35: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Aaron

Betty David

Earl Fran

Hilary

George

Ancestors of exposed nodes are revealed

Charles

Tree-Revealing ProcessLiben-Nowell, Kleinberg, PNAS’08

Page 36: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Aaron

Betty Charles David

Earl Fran

Hilary

George

Ancestors of exposed nodes are revealed

Tree-Revealing ProcessLiben-Nowell, Kleinberg, PNAS’08

Page 37: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Previous Work

• Golub, Jackson, PNAS’10 perform simulations,

• using branching process trees near the critical threshold as the Chain Letter Trees,

• and exposing nodes as inKleinberg, Liben-Nowell, PNAS’08.

• They observe that the revealed tree has a high fraction of nodes with only one child(and some other properties).

Page 38: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Our Contribution

• Our 1st result, informally, states that the tree-revealing process, is enough to explain the high fraction of single-child nodes,assuming only a degree bound on the unknown chain letter tree.

Page 39: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Our Contribution

• Our 1st result, informally, states that the tree-revealing process, is enough to explain the high fraction of single-child nodesassuming only a degree bound on the unknown chain letter tree.

Page 40: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Revealed vs. UnknownWe see a

“revealed” tree...Aaron

Betty David

Earl

Hilary

George

Page 41: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Aaron

Betty David

Earl

Hilary

George

We see a“revealed” tree...

Aaron

Betty David

Earl

Charles

...we would like to study the “unknown” tree!

Kurt

Hilary

GeorgeFran

Ian Jason

Larry

Revealed vs. Unknown

Page 42: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Aaron

Betty David

Earl

Hilary

George

We see a“revealed” tree...

Aaron

Betty David

Earl

Charles

...we would like to study the “unknown” tree!

Kurt

Hilary

GeorgeFran

Ian Jason

Larry

Revealed vs. Unknown

Size? Width? Height? Degree Distribution? ...

Page 43: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Size? Width? Height? Degree Distribution? ...

Aaron

Betty David

Earl

Hilary

George

We see a“revealed” tree...

Aaron

Betty David

Earl

Charles

...we would like to study the “unknown” tree!

Kurt

Hilary

GeorgeFran

Ian Jason

Larry

Revealed vs. Unknown

Page 44: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Our Contribution

• Our 2nd result, informally, states that (under reasonable assumptions) it is possible to estimate the size of the unknown chain letter tree with a small error, with high probability.

Page 45: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Our Contribution

• Our 2nd result, informally, states that (under reasonable assumptions) it is possible to estimate the size of the unknown chain letter tree with a small error, with high probability.

Observe that we do not knowthe exposing probability �

Page 46: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Our Contribution

• Our 2nd result, informally, states that (under reasonable assumptions) it is possible to estimate the size of the unknown chain letter tree with a small error, with high probability.

We use this theorem to estimate that ~ 173k people that signed the IRAQ chain letterThis estimate is backed by a probability bound

(on the probability space induced by the revealing process)

Page 47: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Our Contribution

• Our 2nd result, informally, states that (under reasonable assumptions) it is possible to estimate the size of the unknown chain letter tree with a small error, with high probability.

We use this theorem to estimate that ~ 173k people that signed the IRAQ chain letter

The chain letter generated ~ 3.5M emails

Page 48: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child Fraction

• Nodes are exposed with probability

• We assume that the unknown tree’s maximum degree is at most

� > 0

k

Page 49: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child Fraction

We partition the tree into subforests,

Page 50: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child Fraction

We partition the tree into subforests,

Page 51: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child Fraction

We partition the tree into subforests,

Page 52: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

We partition the tree into subforests,in such a way that each subforest has nodes

and the median height in the subforest is .

Single-Child Fraction

' ��1

�logk�1 �

�1�

Page 53: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

We partition the tree into subforests,in such a way that each subforest has nodes

and the median height in the subforest is .

Single-Child Fraction

F

' ��1

�logk�1 �

�1�

Page 54: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child Fraction

F

We partition the tree into subforests,in such a way that each subforest has nodes

and the median height in the subforest is .' ��1

�logk�1 �

�1�

Page 55: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child Fraction

F

We partition the tree into subforests,in such a way that each subforest has nodes

and the median height in the subforest is .

�logk�1 �

�1�

' ��1

�logk�1 �

�1�

Page 56: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child Fraction

F

We partition the tree into subforests,in such a way that each subforest has nodes

and the median height in the subforest is .

��1

2

��1

2

�logk�1 �

�1�

' ��1

�logk�1 �

�1�

Page 57: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

We partition the tree into subforests,in such a way that each subforest has nodes

and the median height in the subforest is .

Single-Child Fraction��1

2

��1

2

�logk�1 �

�1�

F

Pr[some node is exposed

in F ’s lower half] = ⇥(1)

' ��1

�logk�1 �

�1�

Page 58: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

We partition the tree into subforests,in such a way that each subforest has nodes

and the median height in the subforest is .

Single-Child Fraction��1

2

��1

2

�logk�1 �

�1�

F

Pr[some node is exposed

in F ’s lower half] = ⇥(1)

' ��1

�logk�1 �

�1�

Page 59: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

We partition the tree into subforests,in such a way that each subforest has nodes

and the median height in the subforest is .

Single-Child Fraction��1

2

��1

2

�logk�1 �

�1�

F

Pr[some node is exposed

in F ’s lower half] = ⇥(1)

If this happens, nodeswill be revealed in .⌦(logk�1 �

�1)

F

' ��1

�logk�1 �

�1�

Page 60: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child Fraction

F

We partition the tree into subforests,in such a way that each subforest has nodes

and the median height in the subforest is .

Pr[some node is exposed

in F ’s lower half] = ⇥(1)

If this happens, nodeswill be revealed in .⌦(logk�1 �

�1)

F

' ��1

�logk�1 �

�1�

Page 61: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child Fraction

F F

We partition the tree into subforests,in such a way that each subforest has nodes

and the median height in the subforest is .

Pr[some node is exposed

in F ’s lower half] = ⇥(1)

If this happens, nodeswill be revealed in .⌦(logk�1 �

�1)

F

# of forests ' n · �

' ��1

�logk�1 �

�1�

Page 62: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child Fraction

F F

Pr[some node is exposed

in F ’s lower half] = ⇥(1)

If this happens, nodeswill be revealed in .⌦(logk�1 �

�1)

F

# of forests ' n · �

Pr[⌦(n · � · logk�1 ��1

) nodes will be revealed] = 1� o(1)

Page 63: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child FractionPr[⌦(n · � · logk�1 �

�1) nodes will be revealed] = 1� o(1)

Page 64: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child FractionPr[⌦(n · � · logk�1 �

�1) nodes will be revealed] = 1� o(1)

Pr[at most 2 · n · � nodes will be exposed] = 1� o(1)

Page 65: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child FractionPr[⌦(n · � · logk�1 �

�1) nodes will be revealed] = 1� o(1)

Pr[at most 2 · n · � nodes will be exposed] = 1� o(1)

Each leaf in the revealed tree is an exposed node.

Page 66: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child FractionPr[⌦(n · � · logk�1 �

�1) nodes will be revealed] = 1� o(1)

Pr[at most 2 · n · � nodes will be exposed] = 1� o(1)

Each leaf in the revealed tree is an exposed node.

Pr[the revealed tree will have at most 2 · n · � leaves] = 1� o(1)

Page 67: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child FractionPr[⌦(n · � · logk�1 �

�1) nodes will be revealed] = 1� o(1)

Pr[at most 2 · n · � nodes will be exposed] = 1� o(1)

Each leaf in the revealed tree is an exposed node.

Pr[the revealed tree will have at most 2 · n · � leaves] = 1� o(1)

In an arbitrary tree, the number of internalnodes with more than one child is

upper-bounded by the number of leaves.

Page 68: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child FractionPr[⌦(n · � · logk�1 �

�1) nodes will be revealed] = 1� o(1)

Pr[at most 2 · n · � nodes will be exposed] = 1� o(1)

Each leaf in the revealed tree is an exposed node.

Pr[the revealed tree will have at most 2 · n · � leaves] = 1� o(1)

In an arbitrary tree, the number of internalnodes with more than one child is

upper-bounded by the number of leaves.

Pr[the revealed tree has 4n� non-single-child nodes] = 1� o(1)

Page 69: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child FractionPr[⌦(n · � · logk�1 �

�1) nodes will be revealed] = 1� o(1)

Pr[the revealed tree has 4n� non-single-child nodes] = 1� o(1)

Page 70: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child FractionPr[⌦(n · � · logk�1 �

�1) nodes will be revealed] = 1� o(1)

Pr[the revealed tree has 4n� non-single-child nodes] = 1� o(1)

Page 71: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child FractionPr[⌦(n · � · logk�1 �

�1) nodes will be revealed] = 1� o(1)

Pr[the revealed tree has 4n� non-single-child nodes] = 1� o(1)

� n · � · logk�1 ��1

Page 72: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child FractionPr[⌦(n · � · logk�1 �

�1) nodes will be revealed] = 1� o(1)

Pr[the revealed tree has 4n� non-single-child nodes] = 1� o(1)

� n · � · logk�1 ��1

Page 73: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child FractionPr[⌦(n · � · logk�1 �

�1) nodes will be revealed] = 1� o(1)

Pr[the revealed tree has 4n� non-single-child nodes] = 1� o(1)

� n · � · logk�1 ��1

⌧ n · �

Page 74: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child FractionPr[⌦(n · � · logk�1 �

�1) nodes will be revealed] = 1� o(1)

Pr[the revealed tree has 4n� non-single-child nodes] = 1� o(1)

� n · � · logk�1 ��1

⌧ n · �

1

logk�1 ��1A fraction of the set.

Page 75: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child FractionPr[⌦(n · � · logk�1 �

�1) nodes will be revealed] = 1� o(1)

Pr[the revealed tree has 4n� non-single-child nodes] = 1� o(1)

Pr [the fraction of single-child nodes in the

revealed tree is � 1�O

✓1

logk�1 ��1

◆�= 1� o(1)

Page 76: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Single-Child FractionPr[⌦(n · � · logk�1 �

�1) nodes will be revealed] = 1� o(1)

Pr[the revealed tree has 4n� non-single-child nodes] = 1� o(1)

The high single-child fraction can be explainedby assuming just a degree bound on the unknown tree

Pr [the fraction of single-child nodes in the

revealed tree is � 1�O

✓1

logk�1 ��1

◆�= 1� o(1)

Page 77: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

How to guess the size of the unknown tree?

Aaron

Betty David

Earl

Hilary

George

Revealed Tree

Aaron

Betty David

Earl

Charles

Unknown Tree

Kurt

Hilary

GeorgeFran

Ian Jason

Larry

Number of Signers

Page 78: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Unknown Tree Exposure

Page 79: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

?

Unknown Tree Exposure

?

? ?

? ? ?

? ? ?

?

?

? ? ? ?

?? ? ?

Page 80: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

?

Unknown Tree Exposure

?

? ?

? ? ?

? ? ?

?

?

? ? ? ?

?? ? ?

Page 81: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

?

Unknown Tree Exposure

?

? ?

? ? ?

? ? ?

?

?

? ? ? ?

?? ? ?

Page 82: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Unknown Tree Exposure

?

? ?

? ? ?

? ? ?

?

?

? ? ? ?

?? ? ?

Page 83: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Unknown Tree Exposure

?

? ?

? ? ?

? ? ?

?

?

? ? ? ?

?? ? ?

Page 84: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Unknown Tree Exposure

?

? ?

? ? ?

? ? ?

?

?

? ? ? ?

?? ?

Page 85: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Unknown Tree Exposure

?

? ?

? ? ?

? ? ?

?

?

? ? ? ?

?? ?

Page 86: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Unknown Tree Exposure

?

? ?

? ? ?

? ? ?

?

?

? ? ? ?

???

Page 87: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Unknown Tree Exposure

?

? ?

? ? ?

? ? ?

?

Page 88: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Revealed Tree?

? ?

? ? ?

? ? ?

?

Page 89: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Revealed Tree?

? ?

? ? ?

? ? ?

?

Nodes exposures are IID here!

Page 90: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Size Estimation?

? ?

? ? ?

? ? ?

?

Nodes exposures are IID here!

1. Estimate �

Page 91: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Size EstimationNodes exposures are IID here!

1. Estimate �

Page 92: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Size EstimationNodes exposures are IID here!

� ' 3

10

1. Estimate �

Page 93: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Size EstimationNodes exposures are IID here!

2. Estimate using the number of exposed nodes in the revealed tree

� ' 3

10

n · �

Page 94: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Size EstimationNodes exposures are IID here!

� ' 3

10

n · � ' 7

2. Estimate using the number of exposed nodes in the revealed tree

n · �

Page 95: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Size EstimationNodes exposures are IID here!

� ' 3

10

n · � ' 7

n ' 23.3

3. Take the ratio

Page 96: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Size EstimationNodes exposures are IID here!

� ' 3

10

n · � ' 7

n ' 23.3

What can go wrong?

Page 97: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Size EstimationNodes exposures are IID here!

� ' 3

10

n · � ' 7

n ' 23.3

The “yellow area” could contain too few nodes for the estimation of to be successful.�

Page 98: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Size Estimation

The “yellow area” could contain too few nodes for the estimation of to be successful.�

?

Page 99: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Size Estimation

The “yellow area” could contain too few nodes for the estimation of to be successful.�

?

Page 100: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Theorem• The previous algorithm can guess the size

with high probability if

is the maximum number of children in the unknown tree, is the exposing probability.

• No algorithm can do it otherwise.

n > ˜

�max

���2, ��1 · k

��

k

Page 101: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Theorem

k < O�p

n�

� > ⌦

r1

n

!satisfy the

requirement

n > ˜

�max

���2, ��1 · k

��

k

• The previous algorithm can guess the size with high probability if

is the maximum number of children in the unknown tree, is the exposing probability.

• No algorithm can do it otherwise.

Page 102: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Theorem• The previous algorithm can guess the size

with high probability if

is the maximum number of children in the unknown tree, is the exposing probability.

• No algorithm can do it if is smaller.n

n > ˜

�max

���2, ��1 · k

��

k

Page 103: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

IRAQ Tree Size

• We refined our asymptotic theorem for the IRAQ revealed tree (18k nodes)

• Assuming the tree-revealing model,we estimate thatthe number of signers of the IRAQ petition is within a factor of 2 of 173kwith probability

Page 104: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

IRAQ Tree Size

• We refined our asymptotic theorem for the IRAQ revealed tree (18k nodes)

• Assuming the tree-revealing model,we estimate thatthe number of signers of the IRAQ petition is within a factor of 2 of 173kwith probability � 95%

Page 105: Reconstructing Patterns of Information Diffusion from ...phdopen.mimuw.edu.pl/lato13/panconesi-slides/ChainLetters.pdfReconstructing Patterns of Information Diffusion from Incomplete

Conclusion• We gave a mathematical explanation of

some odd properties observed in real-world revealed trees,

• we used the available revealed trees to guess properties of unknown chain-letter trees.

• We applied our technique to a real-world dataset, giving the first estimate of the number of signers of the IRAQ chain letter.

http://petitions.cs.cornell.edu/