<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Evidence of Temporal Artifacts in Social Networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Matt Revelle</string-name>
          <email>revelle@cs.gmu.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Carlotta Domeniconi</string-name>
          <email>carlotta@cs.gmu.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Aditya Johri</string-name>
          <email>ajohri3@gmu.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>George Mason University</institution>
          ,
          <addr-line>Fairfax VA 22030</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <fpage>35</fpage>
      <lpage>42</lpage>
      <abstract>
        <p>There has been extensive research on social networks and methods for speci c tasks such as: community detection, link prediction, and tracing information cascades; and a recent emphasis on using temporal dynamics of social networks to improve method performance. The underlying models are based on structural properties of the network, some of which we believe to be artifacts introduced from common misrepresentations of social networks. Speci cally, representing a social network or series of social networks as an accumulation of network snapshots is problematic. In this paper, we use a dataset with timestamped interactions to demonstrate how cumulative graphs di er from activity-based graphs and may introduce temporal artifacts.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        The modeling of social networks is an expansive and active area of research.
While models may incorporate other network features such as node attributes
[
        <xref ref-type="bibr" rid="ref16 ref24 ref4">4, 24, 16</xref>
        ], nearly all rely on network structure. Many methods are now also
incorporating temporal dynamics [
        <xref ref-type="bibr" rid="ref10 ref12 ref20 ref22">12, 10, 20, 22</xref>
        ], but how the temporal
information is integrated varies. There are various approaches [
        <xref ref-type="bibr" rid="ref20 ref21">20, 21</xref>
        ] to representing a
dynamic social network as a series of networks, but until recently [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] all have
lacked theoretical foundation.
      </p>
      <p>
        Dynamic network representations which capture edge deactivation [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] have
shown to improve task-speci c performance. However, many state-of-the-art
methods [
        <xref ref-type="bibr" rid="ref16 ref23">23, 16</xref>
        ] are based on cumulative graphs and ignore edge deactivation.
The ndings presented in this paper suggest that some existing models may
be designed to accomodate temporal artifacts introduced by not including edge
deactivation in the processing of network data.
      </p>
      <p>
        There are two social network phenomena which motivate our analysis: social
capacity [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] and bursty events [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Social capacity can be viewed as a per-node
limit on the number of incident edges active at any given time and thus con icts
with the claim of densi cation and shrinking diameters in social networks [
        <xref ref-type="bibr" rid="ref11 ref8">8,
11</xref>
        ] unless additional conditions are met. For example, a network where every
new node has a larger social capacity would lead to densi cation and shrinking
diameters. While variation in social capacity based on demographics has been
observed [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] there has been no evidence presented that would indicate social
capacity is a function of when a node joins the network.
      </p>
      <p>
        In order to measure the existence of densi cation and shrinking diameters,
we rst must construct a series of network snapshots which more accurately
captures network structure than simply accumulating all edges over time. We do
this by using communication activity between nodes as evidence that an edge is
active. The bursty dynamics of social communication are accounted for by
measuring the inter-event times and selecting an observation window large enough to
minimize incorrectly deactivating an active edge. Thus we are able to construct
a series of activity graphs which provide a more accurate approximation of the
network state at a given point in time. This method of graph construction has
been used previously on a mobile phone network [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] to improve
understanding of communication strategies. We can then measure and compare evidence of
densi cation and shrinking diameters in both a cumulative graph series and an
activity graph series.
      </p>
      <p>Densi cation and diameter shrinking are accepted as basic characteristics of
dynamic social networks. However, this paper presents results which contradict
those ndings. When edge deactivation is incorporated, we do not nd evidence
of densi cation and diameter shrinking. We suggest this may be an e ect of
social capacity.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related Work</title>
      <p>
        Existing methods for social network tasks have either ignored temporal dynamics
[
        <xref ref-type="bibr" rid="ref16 ref24">16, 24</xref>
        ] or proposed methods to lter edges with a decay function [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] or
sliding window [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. While these attempts to account for temporal dynamics may
be e ective, they are ad-hoc and lack a theoretical justi cation. The work by
Miritello et al. [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] proposes the selection of an observation window size based
on inter-event statistics and a simple method for identifying edge activation and
deactivation. While similar to existing sliding window approaches, this method
is motivated by social interaction patterns (bursty events). This approach is used
to construct the activity graph series for our experiments.
      </p>
      <p>
        Models of dynamic social networks based on node interaction activity [
        <xref ref-type="bibr" rid="ref17 ref9">9, 17</xref>
        ]
have been introduced. These models are capable of generating single network
snapshots which resemble real world networks. The existing models are unable
to produce a graph series which corresponds to a real-world network series.
However, their ability to generate networks with realistic structure indicates they are
an alternative to previous models which heavily rely on preferential attachment
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] or community a liation [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] and ignore social interaction patterns. There
are many types of temporal networks [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and this paper presents observations on
dynamic social networks, speci cally person-to-person communication networks.
      </p>
    </sec>
    <sec id="sec-3">
      <title>Background</title>
      <p>
        The concepts of social capacity [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] and bursty communications [
        <xref ref-type="bibr" rid="ref1 ref19">19, 1</xref>
        ] have been
considered separately and recent literature [
        <xref ref-type="bibr" rid="ref13 ref14 ref15">15, 13, 14</xref>
        ] has attempted to measure
and use these to determine the state of edges in a large social network.
      </p>
      <p>
        Social capacity captures the maximum number of relationships one prefers to
maintain at any given time and there is evidence that social capacity is conserved
over time [
        <xref ref-type="bibr" rid="ref15 ref5 ref7">15, 5, 7</xref>
        ]. The term bursty is used to describe the temporal patterns of
social interactions between pairs of nodes. That is, humans tend to interact in
bursts and these patterns must be considered in order to correctly identify the
activation/deactivation of edges.
      </p>
      <p>
        The observation of social capacity and burstiness of human interaction in
some networks suggests careful consideration is required to construct accurate
static views of these networks. In fact, accepted claims of graph evolution [
        <xref ref-type="bibr" rid="ref11 ref8">8, 11</xref>
        ]
appear to fail when graph series are constructed based on timestamped
interactions rather than accumulated without regard for edge deactivation.
      </p>
      <p>
        Previous literature [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] introduced densi cation and diameter shrinking as
common network characteristics and we brie y describe them here. Densi cation
is the super-linear growth of edges relative to nodes and results in a network
becoming denser over time. Diameter shrinking is the reported tendency for
network diameters to decrease over time as more edges are accumulated. We can
see both how densi cation may lead to diameter shrinking and contradicts the
notion of social capacity.
4
4.1
      </p>
    </sec>
    <sec id="sec-4">
      <title>Evidence of Temporal Artifacts</title>
      <p>
        Dataset Descriptions
A dataset with timestamped interactions is required to construct an accurate
temporal series of networks. We use data from Scratch [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], an online community
where users may write and share projects (programs). There are several ways
by which Scratch users may interact: project comments, project remixes, gallery
curation, and user following. More information about Scratch may be found
in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. We selected a single type of interaction to simplify analysis. Project
comments are a natural choice as they are the most-frequent interaction between
Scratch users and thus a better approximation of edge status (active/inactive).
These project comments serve as a means for users to communicate within the
context of a project. The comments in the Scratch dataset are timestamped and
thus we can create timestamped edges from comment authors to the project
authors.
      </p>
      <p>The dataset spans over March 2007 to December 2011 and includes a large
period of rapid growth in Scratch users, shown in Figure 1, which does not slow
until towards the end of the dataset. There are a total of 7,788,000
interactions between 164,205 users. We use all these interactions when constructing
the graph series. However, there are many short-term interactions and we lter
out directed interactions between pairs which only occur once or twice when
measuring communication behavior. Such interactions have unde ned or trivial
inter-event statistics as there are zero or one inter-event observations when only
one or two interactions are observed. There are a total of 1,799,050 of such
interactions with frequency &lt; 3 which were ltered, leaving 5,988,950 interactions.
The Scratch dataset used to construct the networks may be obtained from the
MIT Media Lab website1.</p>
      <p>
        200,000
s
n
o
it
c
a
tIfr
e
n
o
.
m
u100,000
N
0
As the relationships in the Scratch interaction network are based on
communication events between nodes, we check for evidence of bursty patterns. Bursty
communication can be identi ed by the dispersion of inter-event times between
node pairs. If communication is bursty then the standard deviation of inter-event
time will be larger than the mean. The ratio of the mean and standard
deviation of inter-event times is the coe cient of variation (cv) and used to measure
dispersion. When cv &gt; 1, there is evidence of bursty communication. The use of
dispersion to identify burstiness is further discussed by Miritello et al.[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        We hypothesize the observation of densi cation and diameter shrinking [
        <xref ref-type="bibr" rid="ref11 ref8">8,
11</xref>
        ] may be attributed to the inclusion of deactivated edges in a network. To
test this we construct two graph series. The series are both constructed from the
Scratch dataset and each network in the series captures network activity over
consecutive and non-overlapping three-month periods. The three-month length
of the observation window was selected because it is large enough to account
1 https://llk.media.mit.edu/scratch-data
for the majority of inter-event times (97% of inter-event times are &lt; 62 days)
and conveniently maps to annual quarters. The rst series is a cumulative graph
series where new nodes and edges are added at each consecutive snapshot to the
previous network in the series. The second series is based on node interaction
activity and we refer to it as the activity graph series.
      </p>
      <p>
        Edge activity is determined by tracking the activation and deactivation of
edges based on observations in a three-month window along with the previous
and next three-month periods. A similar approach has been used in previous
literature [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. An edge is considered to activate if it is not present in the three
months preceding the three-month observation window but an event falls within
the observation window. Similarly, an edge is deactivated if an event occurs in
the observation window but not in succeeding three months. Only edges active
in each three-month observation window are used in the corresponding graph in
the activity graph series.
      </p>
      <p>
        The edge-node ratio ( nnuumm::ooffnedogdeess ) is calculated for each graph in both
series and used to measure densi cation. If densi cation is present, we expect the
number of edges to grow super-linearly in the number of nodes [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. We also
measure the diameter of every graph in both series to determine whether diameter
shrinking is observed.
      </p>
      <p>100000
75000
s
r
i
a
P
e
od50000
N
f
o
.
m
u
N
25000
0
−5.0
−2.5
log(cv)
0.0
2.5
5.0
2 ●
0
2010−07
●
● ● ● ●
●
●
● ●</p>
      <p>● ●
As shown in Figure 2, bursty communication patterns are observed as the cv
values are frequently &gt; 1 (log(cv) &gt; 0).</p>
      <p>We see evidence of densi cation in the cumulative series but not in the
activity series, in Figure 3. The accumulation of edges, without removal of deactivated
edges, appears to introduce densi cation as a temporal artifact in the Scratch
interaction network. This is especially clear when the number of interactions
stops growing around July 2010, denoted by dashed vertical line in both Figures
3 and 4.</p>
      <p>Surprisingly, an overall trend of diameter shrinking is not clearly observed
in either network series. Figure 4 shows a generally increasing diameter for both
series and a larger variance in diameter for the activity series. The lack of
diameter shrinking may be due to the growth of the Scratch website during most
of this time period. Both include a vertical line marking the month (July 2010)
when the increase in the number of Scratch interactions slows.</p>
      <p>
        These ndings are not unexpected but they are contrary to previous literature
[
        <xref ref-type="bibr" rid="ref11 ref8">8, 11</xref>
        ] which has served as the basis for state-of-the-art network models. The
edge-node ratio in the cumulative graphs is monotonically increasing over time
and social capacity is ignored. In contrast, the edge-node ratio in activity graphs
may decrease or stabilize as inactive edges are detected and removed.
5
      </p>
    </sec>
    <sec id="sec-5">
      <title>Conclusion</title>
      <p>This paper presents evidence that temporal artifacts may be introduced in
social networks when the relationships represented by edges require allocation of
inelastic resource such as time or attention. Our ndings suggest more accurate
social networks may be derived from ongoing dyadic interactions rather than
one-time events such as \following" or \friending."</p>
      <p>We plan to extend this work to include other datasets, explore how
community a liation correlates to interaction patterns, and ultimately provide a model
of social networks which incorporates knowledge from these ndings.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgment</title>
      <p>We appreciate the Lifelong Kindergarten group at MIT for publicly sharing the
Scratch datasets. This work is partly based upon research supported by U.S.
National Science Foundation (NSF) Awards DUE-1444277 and EEC-1408674. Any
opinions, recommendations, ndings, or conclusions expressed in this material
are those of the authors and do not necessarily re ect the views of NSF.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>A.-L.</given-names>
            <surname>Barabasi</surname>
          </string-name>
          .
          <article-title>The origin of bursts and heavy tails in human dynamics</article-title>
          .
          <source>Nature</source>
          ,
          <volume>435</volume>
          (
          <issue>7039</issue>
          ):
          <volume>207</volume>
          {
          <fpage>211</fpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>A</surname>
            .-L. Baraba^si,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Jeong</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          <string-name>
            <surname>Neda</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Ravasz</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Schubert</surname>
            , and
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Vicsek</surname>
          </string-name>
          .
          <article-title>Evolution of the social network of scienti c collaborations. Physica A: Statistical mechanics</article-title>
          and
          <source>its applications</source>
          ,
          <volume>311</volume>
          (
          <issue>3</issue>
          ):
          <volume>590</volume>
          {
          <fpage>614</fpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>B.</given-names>
            <surname>Goncalves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Perra</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Vespignani</surname>
          </string-name>
          .
          <article-title>Modeling users' activity on twitter networks: Validation of dunbar's number</article-title>
          .
          <source>PloS one</source>
          ,
          <volume>6</volume>
          (
          <issue>8</issue>
          ):e22656,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4. S. Gunnemann,
          <string-name>
            <given-names>B.</given-names>
            <surname>Boden</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.</surname>
          </string-name>
          <article-title>Farber, and</article-title>
          <string-name>
            <given-names>T.</given-names>
            <surname>Seidl</surname>
          </string-name>
          .
          <article-title>E cient mining of combined subspace and subgraph clusters in graphs with feature vectors</article-title>
          .
          <source>In Advances in Knowledge Discovery and Data Mining</source>
          , pages
          <volume>261</volume>
          {
          <fpage>275</fpage>
          . Springer,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>C. A.</given-names>
            <surname>Hidalgo</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Rodriguez-Sickert</surname>
          </string-name>
          .
          <article-title>The dynamics of a mobile phone network</article-title>
          .
          <source>Physica A: Statistical Mechanics and its Applications</source>
          ,
          <volume>387</volume>
          (
          <issue>12</issue>
          ):
          <volume>3017</volume>
          {
          <fpage>3024</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>P.</given-names>
            <surname>Holme</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Sarama</surname>
          </string-name>
          <article-title>ki. Temporal networks</article-title>
          .
          <source>Physics reports</source>
          ,
          <volume>519</volume>
          (
          <issue>3</issue>
          ):
          <volume>97</volume>
          {
          <fpage>125</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>G.</given-names>
            <surname>Kossinets</surname>
          </string-name>
          and
          <string-name>
            <given-names>D. J.</given-names>
            <surname>Watts</surname>
          </string-name>
          .
          <article-title>Empirical analysis of an evolving social network</article-title>
          .
          <source>Science</source>
          ,
          <volume>311</volume>
          (
          <issue>5757</issue>
          ):
          <volume>88</volume>
          {
          <fpage>90</fpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>R.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Novak</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Tomkins</surname>
          </string-name>
          .
          <article-title>Structure and evolution of online social networks</article-title>
          .
          <source>In Link mining: models, algorithms, and applications</source>
          , pages
          <volume>337</volume>
          {
          <fpage>357</fpage>
          . Springer,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>G.</given-names>
            <surname>Laurent</surname>
          </string-name>
          , J. Saramaki, and
          <string-name>
            <given-names>M.</given-names>
            <surname>Karsai</surname>
          </string-name>
          .
          <article-title>From calls to communities: a model for time varying social networks</article-title>
          .
          <source>arXiv preprint arXiv:1506.00393</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>J.</given-names>
            <surname>Leskovec</surname>
          </string-name>
          .
          <article-title>Social media analytics: tracking, modeling and predicting the ow of information through networks</article-title>
          .
          <source>In Proceedings of the 20th international conference companion on World wide web</source>
          , pages
          <volume>277</volume>
          {
          <fpage>278</fpage>
          . ACM,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>J. Leskovec</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Kleinberg</surname>
            , and
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Faloutsos</surname>
          </string-name>
          .
          <article-title>Graph evolution: Densi cation and shrinking diameters</article-title>
          .
          <source>ACM Transactions on Knowledge Discovery from Data (TKDD)</source>
          ,
          <volume>1</volume>
          (
          <issue>1</issue>
          ):
          <fpage>2</fpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>Y.</given-names>
            <surname>Matsubara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sakurai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. A.</given-names>
            <surname>Prakash</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Li</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Faloutsos</surname>
          </string-name>
          .
          <article-title>Rise and fall patterns of information di usion: model and implications</article-title>
          .
          <source>In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining</source>
          , pages
          <volume>6</volume>
          {
          <fpage>14</fpage>
          . ACM,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13. G. Miritello,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Cebrian</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Moro</surname>
          </string-name>
          .
          <article-title>Limited communication capacity unveils strategies for human interaction</article-title>
          .
          <source>Scienti c reports, 3</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14. G. Miritello,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lara</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Moro</surname>
          </string-name>
          .
          <article-title>Time allocation in social networks: correlation between social structure and human communication dynamics</article-title>
          .
          <source>In Temporal Networks</source>
          , pages
          <volume>175</volume>
          {
          <fpage>190</fpage>
          . Springer,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15. G. Miritello, E. Moro,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Mart</surname>
          </string-name>
          nez-Lopez,
          <string-name>
            <given-names>J.</given-names>
            <surname>Belchamber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. G.</given-names>
            <surname>Roberts</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R. I.</given-names>
            <surname>Dunbar</surname>
          </string-name>
          .
          <article-title>Time as a limited resource: Communication strategy in mobile phone networks</article-title>
          .
          <source>Social Networks</source>
          ,
          <volume>35</volume>
          (
          <issue>1</issue>
          ):
          <volume>89</volume>
          {
          <fpage>95</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>F.</given-names>
            <surname>Moser</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Colak</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <article-title>Ra ey</article-title>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Ester</surname>
          </string-name>
          .
          <article-title>Mining cohesive patterns from graphs with feature vectors</article-title>
          .
          <source>In Proceedings of the SIAM International Conference on Data Mining</source>
          , volume
          <volume>9</volume>
          , pages
          <fpage>593</fpage>
          {
          <fpage>604</fpage>
          .
          <string-name>
            <surname>SIAM</surname>
          </string-name>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>N.</given-names>
            <surname>Perra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Goncalves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Pastor-Satorras</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Vespignani</surname>
          </string-name>
          .
          <article-title>Activity driven modeling of time varying networks</article-title>
          .
          <source>Scienti c reports, 2</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>M. Resnick</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Maloney</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Monroy-Hernandez</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Rusk</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Eastmond</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Brennan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Millner</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Rosenbaum</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Silver</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Silverman</surname>
          </string-name>
          , et al.
          <article-title>Scratch: Programming for all</article-title>
          .
          <source>Communications of the ACM</source>
          ,
          <volume>52</volume>
          (
          <issue>11</issue>
          ):
          <volume>60</volume>
          {
          <fpage>67</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>M. T. Rivera</surname>
            ,
            <given-names>S. B.</given-names>
          </string-name>
          <string-name>
            <surname>Soderstrom</surname>
            , and
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Uzzi</surname>
          </string-name>
          .
          <article-title>Dynamics of dyads in social networks: Assortative, relational, and proximity mechanisms</article-title>
          .
          <source>annual Review of Sociology</source>
          ,
          <volume>36</volume>
          :
          <fpage>91</fpage>
          {
          <fpage>115</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <given-names>R.</given-names>
            <surname>Rossi</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Neville</surname>
          </string-name>
          .
          <article-title>Modeling the evolution of discussion topics and communication to improve relational classi cation</article-title>
          .
          <source>In Proceedings of the First Workshop on Social Media Analytics</source>
          , pages
          <volume>89</volume>
          {
          <fpage>97</fpage>
          . ACM,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Rossi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Gallagher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Neville</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Henderson</surname>
          </string-name>
          .
          <article-title>Modeling dynamic behavior in large evolving graphs</article-title>
          .
          <source>In Proceedings of the sixth ACM international conference on Web search and data mining</source>
          , pages
          <volume>667</volume>
          {
          <fpage>676</fpage>
          . ACM,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Tang</surname>
          </string-name>
          , J. Han,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gupta</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhao</surname>
          </string-name>
          .
          <article-title>Community evolution detection in dynamic heterogeneous information networks</article-title>
          .
          <source>In Proceedings of the Eighth Workshop on Mining and Learning with Graphs</source>
          , pages
          <volume>137</volume>
          {
          <fpage>146</fpage>
          . ACM,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <given-names>J.</given-names>
            <surname>Yang</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Leskovec</surname>
          </string-name>
          .
          <article-title>Community-a liation graph model for overlapping network community detection</article-title>
          .
          <source>In Data Mining (ICDM)</source>
          ,
          <year>2012</year>
          IEEE 12th International Conference on, pages
          <volume>1170</volume>
          {
          <fpage>1175</fpage>
          . IEEE,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24. J.
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>McAuley</surname>
            ,
            <given-names>and J.</given-names>
          </string-name>
          <string-name>
            <surname>Leskovec</surname>
          </string-name>
          .
          <article-title>Community detection in networks with node attributes</article-title>
          .
          <source>In IEEE 13th International Conference on Data Mining</source>
          , pages
          <volume>1151</volume>
          {
          <fpage>1156</fpage>
          . IEEE,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>