Heuristics for Speeding Up Betweenness Centrality Computation

dc.contributor.authorPuzis, Rami
dc.contributor.authorZilberman, Polina
dc.contributor.authorElovici, Yuval
dc.contributor.authorDolev, Shlomi
dc.contributor.authorBrandes, Ulrik
dc.date.accessioned2017-01-24T13:33:47Z
dc.date.available2017-01-24T13:33:47Z
dc.date.issued2012-09eng
dc.description.abstractWe propose and evaluate two complementary heuristics to speed up exact computation of the shortest-path between ness centrality. Both heuristics are relatively simple adaptations of the standard algorithm for between ness centrality. Consequently, they generalize the computation of edge between ness and most other variants, and can be used to further speed up between ness estimation algorithms, as well. In the first heuristic, structurally equivalent vertices are contracted based on the observation that they have the same centrality and also contribute equally to the centrality of others. In the second heuristic, we first apply a linear-time between ness algorithm on the block-cut point tree and then compute the remaining contributions separately in each biconnected component. Experiments on a variety of large graphs illustrate the efficiency and complementarity of our heuristics.eng
dc.description.versionpublishedeng
dc.identifier.doi10.1109/SocialCom-PASSAT.2012.66eng
dc.identifier.urihttps://kops.uni-konstanz.de/handle/123456789/36929
dc.language.isoengeng
dc.subject.ddc004eng
dc.titleHeuristics for Speeding Up Betweenness Centrality Computationeng
dc.typeINPROCEEDINGSeng
dspace.entity.typePublication
kops.citation.bibtex
@inproceedings{Puzis2012-09Heuri-36929,
  year={2012},
  doi={10.1109/SocialCom-PASSAT.2012.66},
  title={Heuristics for Speeding Up Betweenness Centrality Computation},
  isbn={978-1-4673-5638-1},
  publisher={IEEE},
  address={Piscataway, NJ},
  booktitle={2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing (PASSAT-SocialCom 2012)},
  pages={302--311},
  author={Puzis, Rami and Zilberman, Polina and Elovici, Yuval and Dolev, Shlomi and Brandes, Ulrik}
}
kops.citation.iso690PUZIS, Rami, Polina ZILBERMAN, Yuval ELOVICI, Shlomi DOLEV, Ulrik BRANDES, 2012. Heuristics for Speeding Up Betweenness Centrality Computation. 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust. Amsterdam, Netherlands, 3. Sept. 2012 - 5. Sept. 2012. In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing (PASSAT-SocialCom 2012). Piscataway, NJ: IEEE, 2012, pp. 302-311. ISBN 978-1-4673-5638-1. Available under: doi: 10.1109/SocialCom-PASSAT.2012.66deu
kops.citation.iso690PUZIS, Rami, Polina ZILBERMAN, Yuval ELOVICI, Shlomi DOLEV, Ulrik BRANDES, 2012. Heuristics for Speeding Up Betweenness Centrality Computation. 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust. Amsterdam, Netherlands, Sep 3, 2012 - Sep 5, 2012. In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing (PASSAT-SocialCom 2012). Piscataway, NJ: IEEE, 2012, pp. 302-311. ISBN 978-1-4673-5638-1. Available under: doi: 10.1109/SocialCom-PASSAT.2012.66eng
kops.citation.rdf
<rdf:RDF
    xmlns:dcterms="http://purl.org/dc/terms/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:bibo="http://purl.org/ontology/bibo/"
    xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
    xmlns:foaf="http://xmlns.com/foaf/0.1/"
    xmlns:void="http://rdfs.org/ns/void#"
    xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > 
  <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36929">
    <bibo:uri rdf:resource="https://kops.uni-konstanz.de/handle/123456789/36929"/>
    <foaf:homepage rdf:resource="http://localhost:8080/"/>
    <dc:contributor>Zilberman, Polina</dc:contributor>
    <dc:creator>Elovici, Yuval</dc:creator>
    <dc:contributor>Elovici, Yuval</dc:contributor>
    <dc:creator>Brandes, Ulrik</dc:creator>
    <dc:contributor>Puzis, Rami</dc:contributor>
    <dc:contributor>Dolev, Shlomi</dc:contributor>
    <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2017-01-24T13:33:47Z</dc:date>
    <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
    <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2017-01-24T13:33:47Z</dcterms:available>
    <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dc:contributor>Brandes, Ulrik</dc:contributor>
    <dcterms:abstract xml:lang="eng">We propose and evaluate two complementary heuristics to speed up exact computation of the shortest-path between ness centrality. Both heuristics are relatively simple adaptations of the standard algorithm for between ness centrality. Consequently, they generalize the computation of edge between ness and most other variants, and can be used to further speed up between ness estimation algorithms, as well. In the first heuristic, structurally equivalent vertices are contracted based on the observation that they have the same centrality and also contribute equally to the centrality of others. In the second heuristic, we first apply a linear-time between ness algorithm on the block-cut point tree and then compute the remaining contributions separately in each biconnected component. Experiments on a variety of large graphs illustrate the efficiency and complementarity of our heuristics.</dcterms:abstract>
    <dcterms:issued>2012-09</dcterms:issued>
    <dc:creator>Puzis, Rami</dc:creator>
    <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
    <dc:creator>Dolev, Shlomi</dc:creator>
    <dc:creator>Zilberman, Polina</dc:creator>
    <dcterms:title>Heuristics for Speeding Up Betweenness Centrality Computation</dcterms:title>
    <dc:language>eng</dc:language>
  </rdf:Description>
</rdf:RDF>
kops.conferencefield2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust, 3. Sept. 2012 - 5. Sept. 2012, Amsterdam, Netherlandsdeu
kops.date.conferenceEnd2012-09-05eng
kops.date.conferenceStart2012-09-03eng
kops.flag.knbibliographytrue
kops.location.conferenceAmsterdam, Netherlandseng
kops.sourcefield<i>2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing (PASSAT-SocialCom 2012)</i>. Piscataway, NJ: IEEE, 2012, pp. 302-311. ISBN 978-1-4673-5638-1. Available under: doi: 10.1109/SocialCom-PASSAT.2012.66deu
kops.sourcefield.plain2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing (PASSAT-SocialCom 2012). Piscataway, NJ: IEEE, 2012, pp. 302-311. ISBN 978-1-4673-5638-1. Available under: doi: 10.1109/SocialCom-PASSAT.2012.66deu
kops.sourcefield.plain2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing (PASSAT-SocialCom 2012). Piscataway, NJ: IEEE, 2012, pp. 302-311. ISBN 978-1-4673-5638-1. Available under: doi: 10.1109/SocialCom-PASSAT.2012.66eng
kops.title.conference2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trusteng
relation.isAuthorOfPublicationfa1660c9-a071-4d01-9bdd-7adcd0e2d7d7
relation.isAuthorOfPublication.latestForDiscoveryfa1660c9-a071-4d01-9bdd-7adcd0e2d7d7
source.bibliographicInfo.fromPage302eng
source.bibliographicInfo.toPage311eng
source.identifier.isbn978-1-4673-5638-1eng
source.publisherIEEEeng
source.publisher.locationPiscataway, NJeng
source.title2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing (PASSAT-SocialCom 2012)eng

Dateien