<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Sub-optimal Recall in Visual Cluster Retrieval: When Clusters Look Like Bridges</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mathieu Jacomy</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>MatildeFicozzi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anders K.Munk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Aalborg Universitet</institution>
          ,
          <country country="DK">Denmark</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Danmarks Tekniske Universitet</institution>
          ,
          <country country="DK">Denmark</country>
        </aff>
      </contrib-group>
      <fpage>1075</fpage>
      <lpage>1085</lpage>
      <abstract>
        <p>Force-directed node placement algorithms, a popular technique to visualise networks, are known to optimize “cluster separability”: when sets of densely connected nodes get represented as well-separated groups of dots. Using these techniques leads us to conceive networks as sets of clusters connected by bridges. This is also how we tend to think of the “community structure” model embedded in clustering techniques like modularity maximization. Yet this mental model has flaws. We specifically address the notion that clusters (“communities”) necessarily look like groups of dots, through the mediation of a node placement algorithm. Although often true, we provide a reproducible counterexample: topological clusters that look like bridges. First, we present an empirical case that we encountered in a real world situation, while mapping the academic landscape of AI and algorithms. Second, we show how to generate a network of arbitrary size where a cluster looks like a bridge. In conclusion, we open a discussion about layout algorithms as a visual mediation of a network's community structure. We contend that when it comes to the accuracy of retrieving clusters visually, node placement algorithms have an imperfect recall despite an excellent precision.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;human-centered computing</kwd>
        <kwd>graph drawing</kwd>
        <kwd>network visualization</kwd>
        <kwd>community detection</kwd>
        <kwd>visual cluster retrieval</kwd>
        <kwd>visual network analysis</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The purpose of drawing a large graph (a.k.a. making a network map) is generally to
mediate its topological features. One aims to produce visual patterns providing insights about its
community structure 2[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The expected visual pattern mainly consists of visually separated
aggregates of dots, that one interprets as clusters or communities, i.e. densely connected sets
of nodes. In practice, one rarely sees a cluster if it does not exist in the topology (although we
do not assess that statement here). And one tends to assume that conversely, if a cluster exists
in the graph topology, it is necessarily visible in the layout. In this paper, we argue that this
assumption can be wrong in common situations. We find that a common topological cluster
pattern could often get mediated diferently from the compact aggregate of dots one generally
expects, for instance as a bridge (Figur1e). In short, some clusters can be dense enough to be
consistently picked up by common clustering techniques, yet not dense enough to be displayed
as visual aggregates by common layout techniques.
      </p>
      <p>In section 2 we report our observations from a real-world situation where we find such
clusters in a co-occurrence network about AI and algorithms in science. In sect3iowne draw on
those observation to build a procedure to generate clusters that look like bridges. We conclude
by framing this issue as an accuracy problem for the task of retrieving clusters visually, more
specifically as a recall issue.</p>
      <sec id="sec-1-1">
        <title>1.1. Related work</title>
        <p>
          If community detection techniques like modularity maximizatio3n, [
          <xref ref-type="bibr" rid="ref12 ref21">12, 21</xref>
          ] have become a
staple of visual network analysis, it is notably because the retrieved communities closely match
the visual clusters produced by force-driven algorithms. This result was voiced by Noack as
“modularity clustering is a force-directed layou1t4”].[
        </p>
        <p>
          Noack formalized graph drawing as an optimization problem about the “separation of
communities” [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. In this mental model, graphs are imagined as communities connected by
bridges. On a practical level, using force-directed layouts and community detection algorithms
to analyze networks reinforces the notion that a network’s community structure solely consists
of clusters connected by bridges (Figur2e). Indeed, the visualizations produced in popular tools
like Cytoscape [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ] Gephi [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] or NodeXL [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ] often feature separated groups of nodes (seen as
clusters) connected by edges or chains of edges (bridges). In this context, it is most reasonable
to assume that a node is either part of a cluster, of a bridge, or neither.
        </p>
        <p>
          In this implicit mental model, the macro-structure is nested and graph-like: clusters play
the role of nodes, and bridges that of edges. Yet as it turns out, relevant patterns in graphs are
not limited to the cluster/bridge dichotomy. We generally consider bridges as made of nodes
[
          <xref ref-type="bibr" rid="ref10 ref18">10, 18</xref>
          ], sometimes made of edges [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], but rarely as a mix of both; yet such structures can
efectively be an important part of the community structure. Intuitively, very dense clusters
may be connected by less dense clusters.
        </p>
        <p>
          The notion of community structure has multiple definitions1[
          <xref ref-type="bibr" rid="ref6">6</xref>
          ], meanings [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ],
computational commitments 5[
          <xref ref-type="bibr" rid="ref17">, 17</xref>
          ] and visual representations2[
          <xref ref-type="bibr" rid="ref22">, 22</xref>
          ]. In the next section, we report on
a real-world case where the community structure has richer patterns than the cluster/bridge
dichotomy. It shows that the nuance and complexity of a network’s structure can be lost in
the translation enacted by the layout, notably when some “communities” get represented as
visually non-compact shapes.
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Case: a co-occurrence network of keywords from articles about AI and algorithms</title>
      <p>Description of the case: We generated this network by extracting expressions co-occurring
in the abstract or title of academic articles mentioning AI, algorithms, or machine learning. Our
motivation was to map what algorithms were doing in science. We present our full
methodology and our statistical analysis of the corpus in another pape1r1][.</p>
      <p>
        This network’s 7,562 nodes represent the most frequent expressions in our corpus, such as
“encrypted”, “image denoising”, or “CNNs”. Each of the 85,215 edges represents a co-occurrence
of connected expressions with a sufÏciently high pointwise mutual information (PMI) score [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
Through clique percolation15[] with  = 7 we uncovered 166 clusters corresponding to various
topics or semantic fields. We rendered the graph as a network map using the layout algorithm
LinLog [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] using the Force Atlas 2 implementation9[]. In order to annotate the network
map and use it as a discussion elicitation device with our project partners, we underwent the
following task: for each cluster, sample the most representative documents, read them, and
produce a short summary of the purpose and agency of AI and algorithms in those publications
[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>The network obtained has a blatant community structure, and at first glance, seems to consist
of clusters connected by bridges (Figur3e).</p>
      <p>Issue at stake: Our annotation task demanded us to explaivnisible clusters, as rendered by
the layout algorithm, while we had computetdopological clusters through clique percolation.
To our surprise, we faced many mismatches: some computed clusters did not look like groups
of dots in the network map, or conversely, some clearly visible clusters were not captured by
the clique percolation process.</p>
      <p>One may think that when there is a mismatch between computed and visualized clusters, the
computation should always take precedence over the visual, because it is more true to the data
(then the mismatch would not be an issue). But that perspective fails to account for the purpose
of annotation, which is to provide a context for the visible patterns. One cannot annotate a
pattern that is not visible, even if it exists in the data; and conversely, onsheould annotate the
artifacts of the method, i.e. anti-patterns that are visible but do not exist in the data (precisely
to mark them as artifacts).</p>
      <p>As soon as a visualization is used, even for exploratory data analysis, accounting for what it
makes visible becomes a methodological necessity.</p>
      <p>Sub-issue 1: granularity level. To retrieve clusters we used clique percolation as we did not
need to annotate the entire network (only dense areas). We picked a clique size =of7 because
it was low enough to capture the smallest relevant clusters. In many cases, this approach
worked: the cluster retrieved looked like what one expects (Fig4u)r.e</p>
      <p>However, this approach had a significant drawback:  was too low to break the bigger
and denser clusters down to subclusters (Figu5r)e. In the most extreme case, one of the
retrieved clusters contained th3e1% of the nodes (the entire semantic field related to health and
medicine).</p>
      <p>Large computed clusters were an issue because they contained multiple smaller visual
clusters. However, this issue was easy to address by subdividing them until we reached the desired
granularity. We chose the modularity maximization by the Leiden metho2d1][for the
convenience of its resolution setting.</p>
      <sec id="sec-2-1">
        <title>Sub-issue 2: clusters not looking like clusters. Some clusters were not only too big, but</title>
        <p>also contained non-compact structures, such as bridges. We could not solve that issue, and had
to live with the trouble. For instance, the recalcitrant cluster of Fig5usreeemed to contain a
mix of clusters and bridges, which appears more clearly if we isolate it from the rest (Fi6g-ure
A). It is not compact, but extremely spiky. Yet from the method, its topology satisfies the same
criterion as the well-behaved cluster of Figu4r:eeach node has at least 6 fully interconnected
neighbors in the cluster.</p>
        <p>The spikiness is partly due to how this cluster is interconnected with the rest of the map,
and partly due to its internal structure. We can observe it by applying the same layout to the
isolated network (Figur6e-B): although the layout is less spiky and more compact, it remains
very elongated. Even when we repeat this process recursively, many clusters keep resisting
and refuse to become compact unless we tear them down to confetti (Figu7r)e.</p>
        <p>We had to accept that some clusters are dense enough to be captured by community detection
(both clique percolation and modularity clustering) yet not dense enough to look like compact
shapes on the map. Many of those clusters looked like bridges, stretching between compact
clusters. We ultimately decided to annotate the compact clusters and the bridge clusters the
same way, the only diference being that compact clusters got attached to a landmark point
while the title of bridge clusters followed the contour of the connection (Fi8g)u.re
Takeaways from the case. By splitting initial clusters to the desired granularity, we settled
on 235 sub-clusters to annotate. Of those, 58 were of the bridge kin2d5(%): at least in this case,
bridge-looking clusters are not a marginal phenomenon.</p>
        <p>We also observed that those bridges were straightforward to explain. The main bridge in
our recalcitrant cluster was aboruetnewable energy storage, and it connected the topics
ofrenewable energy and power distribution with those ofsmart grids and lithium-ion batteries, which
makes a lot of sense. Other examples includesdcanning for cancer bridgingscanners with cancer
research; orlanguage bridgingtext analysis with speech recognition; etc.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Generating clusters that look like bridges</title>
      <p>Drawing on these observations, we devised a method to generate clusters that look like bridges.
An example is shown in Figure1.
Criteria satisfied: The method works for any clique size set in advance. It generates an
arbitrarily large graph such that clique percolation using  sawidill find exactly 3 clusters, one
of which will look like a bridge (it get represented as a visually non-compact set of dots spread
out between the two other clusters).</p>
      <p>Our tests show that modularity clustering by the Louvain and Leiden methods will also find
3 clusters, although it depends on the resolution used (we cannot guarantee the result as those
algorithms are not deterministic). However, the result for clique percolation is granted by
design of the method.</p>
      <p>
        Method: Generate two cliques of a size significantly greater tha n . Generate a “stretching”
[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] by stacking as many cliques of size as desired, as shown in Figure9. Merge  − 2 nodes
from the first clique with as many of the first stacked clique of the stretching; similarly merge
 − 2 nodes of the second clique with thelast stacked clique of the stretching. More details in
the reference implementation(Python).
      </p>
      <p>In the example of Figure1, we used  = 100 ; the cliques had 500 nodes and the stretching
stacked 400 cliques.</p>
      <p>Why it works: Each clique will be retrieved by clique percolation because its size is greater
than  . The stretching will be retrieved because it satisfies clique percolation by construction.
However, the merge o f− 2 creates a bottleneck that prevents clique percolation from joining
the stretching with either clique, because it is smaller than the minimum overlap−o1f nodes
required.</p>
      <p>The stretching will look like a bridge for the same two reasons we mentioned in our
observations. First, it is less compact than a clique by design; in fact, it is just compact enough to
satisfy the criterion of clique percolation at the decided le v.elSecond, it gets pulled in two
opposite directions by the cliques, whose mutual repulsion is dominating the balance of forces
in the layout.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Bridge-like clusters as an accuracy problem for visual cluster retrieval</title>
      <p>
        The situation can be reformulated as an accuracy problem for the task of retrieving clusters
visually, which is the purpose of force-directed layout algorithms as formalized by their authors
(for instance [
        <xref ref-type="bibr" rid="ref13 ref9">13, 9</xref>
        ]; see also [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]). The clusters we see but cannot retrieve by computational
means are the false positives, responsible for the taskp’rsecision, which we assume as generally
good (or at least, it is not the focus of this paper). Conversely, the clusters that do not look like
a compact group of dots and remain undetected are thfaelse negatives responsible for therecall
(Figure10).
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion: visual cluster retrieval has a sub-optimal recall</title>
      <p>We presented an empirical case where clusters retrieved from modularity clustering did not
always look like the compact groups of dots we usually expect. Building on our observations,
we built a method to generate clusters that look like bridges: satisfying the criterion of clique
percolation for an arbitrary clique size, yet looking like bridges stretched between compact
clusters when visualized by a force-directed layout. We do not provide evidence about the
pervasiveness of these visually non-compact clusters, but our generation method shows that
the conditions for their emergence are commonplace in the context of large graphs with a
community structure.</p>
      <p>The existence of bridge-like clusters creates a recall issue for the task of retrieving clusters
visually from a force-directed layout, even when the precision is good: unbeknownst to the
visualization’s reader, some clusters may remain unseen. Being aware of that possibility is an
important insight for the researchers and experts using network maps to explore relational
data.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Bastian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Heymann</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Jacomy</surname>
          </string-name>
          . “
          <article-title>Gephi: an open source software for exploring and manipulating networks”. InP:roceedings of the international AAAI conference on web and social media</article-title>
          . Vol.
          <volume>3</volume>
          .
          <year>2009</year>
          , pp.
          <fpage>361</fpage>
          -
          <lpage>362</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>C.</given-names>
            <surname>Bennett</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ryall</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Spalteholz</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Gooch</surname>
          </string-name>
          . “
          <article-title>The aesthetics of graph visualization</article-title>
          .” In: CAe.
          <year>2007</year>
          , pp.
          <fpage>57</fpage>
          -
          <lpage>64</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V. D.</given-names>
            <surname>Blondel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-L.</given-names>
            <surname>Guillaume</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lambiotte</surname>
          </string-name>
          , and
          <string-name>
            <surname>E. Lefebvre.</surname>
          </string-name>
          “
          <article-title>Fast unfolding of communities in large networks”</article-title>
          .
          <source>InJ:ournal of statistical mechanics: theory and experiment</source>
          <year>2008</year>
          .
          <volume>10</volume>
          (
          <year>2008</year>
          ),
          <fpage>P10008</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>G. Bouma. “</surname>
          </string-name>
          <article-title>Normalized (pointwise) mutual information in collocation extraction”</article-title>
          .
          <source>In: Proceedings of GSCL 30</source>
          (
          <year>2009</year>
          ), pp.
          <fpage>31</fpage>
          -
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Fortunato</surname>
          </string-name>
          . “
          <article-title>Community detection in graphs”</article-title>
          .
          <source>InP:hysics reports 486</source>
          .3-
          <fpage>5</fpage>
          (
          <year>2010</year>
          ), pp.
          <fpage>75</fpage>
          -
          <lpage>174</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>L. C.</given-names>
            <surname>Freeman</surname>
          </string-name>
          . “
          <article-title>The sociological concept of” group”: An empirical test of two models”</article-title>
          .
          <source>In: American journal of sociology 98.1</source>
          (
          <issue>1992</issue>
          ), pp.
          <fpage>152</fpage>
          -
          <lpage>166</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>L.</given-names>
            <surname>HAO</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Liu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>W.</given-names>
            <surname>Wang</surname>
          </string-name>
          . “BBTA:
          <article-title>Detecting communities incrementally from dynamic networks based on tracking of backbones and bridges”</article-title>
          .
          <source>InA:pplied Intelligence</source>
          <volume>53</volume>
          (
          <year>2022</year>
          ).
          <source>doi: 10.1007/s10489-022-03418-2.</source>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Jacomy</surname>
          </string-name>
          . “
          <article-title>Situating Visual Network Analysis”</article-title>
          .
          <source>PhD thesis</source>
          . Aalborg University,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .54337/aau435977255.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M.</given-names>
            <surname>Jacomy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Venturini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Heymann</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Bastian</surname>
          </string-name>
          .
          <article-title>“ForceAtlas2, a continuous graph layout algorithm for handy network visualization designed for the Gephi software”</article-title>
          .
          <source>In: PloS one 9</source>
          .6 (
          <issue>2014</issue>
          ),
          <year>e98679</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>N.</given-names>
            <surname>Meghanathan</surname>
          </string-name>
          . “
          <article-title>Neighborhood-based bridge node centrality tuple for complex network analysis”</article-title>
          .
          <source>In:Applied Network Science</source>
          <volume>6</volume>
          (
          <year>2021</year>
          ). url: https://api.semanticscholar.or g/CorpusID:235691166.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>A. K. Munk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Jacomy</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Ficozzi</surname>
            , and
            <given-names>T. E. Jensen.</given-names>
          </string-name>
          “
          <article-title>Beyond artificial intelligence controversies: What are algorithms doing in the scientific literature?</article-title>
          ”
          <source>IBni:g Data &amp; Society 11.3</source>
          (
          <issue>2024</issue>
          ), p.
          <fpage>20539517241255107</fpage>
          . doi:
          <volume>10</volume>
          .1177/20539517241255107.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M. E.</given-names>
            <surname>Newman</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Girvan</surname>
          </string-name>
          . “
          <article-title>Finding and evaluating community structure in networks”</article-title>
          .
          <source>In:Physical review E 69.2</source>
          (
          <issue>2004</issue>
          ), p.
          <fpage>026113</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Noack</surname>
          </string-name>
          . “
          <article-title>Energy models for graph clustering</article-title>
          .”
          <source>IJn.:Graph Algorithms Appl. 11.2</source>
          (
          <issue>2007</issue>
          ), pp.
          <fpage>453</fpage>
          -
          <lpage>480</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Noack</surname>
          </string-name>
          . “
          <article-title>Modularity clustering is force-directed layout”</article-title>
          .
          <source>PIhny: sical review E 79.2</source>
          (
          <issue>2009</issue>
          ), p.
          <fpage>026102</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>G.</given-names>
            <surname>Palla</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Derényi</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Farkas</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Vicsek</surname>
          </string-name>
          . “
          <article-title>Uncovering the overlapping community structure of complex networks in nature and society”</article-title>
          .
          <source>Inna:ture 435.7043</source>
          (
          <year>2005</year>
          ), pp.
          <fpage>814</fpage>
          -
          <lpage>818</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>L.</given-names>
            <surname>Peel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. B.</given-names>
            <surname>Larremore</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Clauset</surname>
          </string-name>
          . “
          <article-title>The ground truth about metadata and community detection in networks”</article-title>
          .
          <source>In:Science Advances 3.5</source>
          (
          <issue>2017</issue>
          ),
          <year>e1602548</year>
          . doi:
          <volume>10</volume>
          .1126/scia dv.
          <volume>1602548</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>T. P.</given-names>
            <surname>Peixoto</surname>
          </string-name>
          .
          <article-title>Descriptive vs. inferential community detection in networks: Pitfalls, myths and half-truths</article-title>
          . Cambridge University Press,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A. N.</given-names>
            <surname>Rabchevskiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Zayakin</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E. A.</given-names>
            <surname>Rabchevskiy</surname>
          </string-name>
          .
          <article-title>“A Method for Identifying Bridges in Online Social Networks”</article-title>
          .
          <source>InR:ecent Trends in Analysis of Images, Social Networks and Texts - 10th International Conference, AIST</source>
          <year>2021</year>
          , Tbilisi, Georgia,
          <source>December 16- 18</source>
          ,
          <year>2021</year>
          , Revised Supplementary Proceedings. Ed. by
          <string-name>
            <given-names>E.</given-names>
            <surname>Burnaev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. I.</given-names>
            <surname>Ignatov</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. I. 0002</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. Y.</given-names>
            <surname>Khachay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Koltsova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kutuzov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. V.</given-names>
            <surname>Loukachevitch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Panchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Pardalos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Saramäki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Savchenko</surname>
          </string-name>
          , E. Tsymbalov, and
          <string-name>
            <given-names>E.</given-names>
            <surname>Tutubalina</surname>
          </string-name>
          . Vol.
          <volume>1573</volume>
          . Communications in Computer and Information Science. Springer,
          <year>2021</year>
          , pp.
          <fpage>166</fpage>
          -
          <lpage>175</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -15168-2\_
          <fpage>14</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>P.</given-names>
            <surname>Shannon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Markiel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Ozier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. S.</given-names>
            <surname>Baliga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. T.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Ramage</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Amin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Schwikowski</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Ideker</surname>
          </string-name>
          . “
          <article-title>Cytoscape: a software environment for integrated models of biomolecular interaction networks”</article-title>
          .
          <source>IGne:nome research 13.11</source>
          (
          <year>2003</year>
          ), pp.
          <fpage>2498</fpage>
          -
          <lpage>2504</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>M.</given-names>
            <surname>Smith</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Milic-Frayling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Shneiderman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. Mendes</given-names>
            <surname>Rodrigues</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Leskovec</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Dunne</surname>
          </string-name>
          .
          <article-title>NodeXL: a free and open network overview, discovery and exploration add-in for</article-title>
          <source>Excel</source>
          <year>2007</year>
          /
          <year>2010</year>
          .
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>V. A.</given-names>
            <surname>Traag</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Waltman</surname>
          </string-name>
          , and
          <string-name>
            <surname>N. J. Van Eck. “</surname>
          </string-name>
          <article-title>From Louvain to Leiden: guaranteeing wellconnected communities”</article-title>
          .
          <source>In:Scientific reports 9</source>
          .1 (
          <issue>2019</issue>
          ), p.
          <fpage>5233</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>T.</given-names>
            <surname>Venturini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Jacomy</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Jensen</surname>
          </string-name>
          . “
          <article-title>What do we see when we look at networks: Visual network analysis, relational ambiguity, and force-directed layoutsB”</article-title>
          .
          <source>igInD:ata &amp; Society</source>
          <volume>8</volume>
          .1 (
          <issue>2021</issue>
          ), p.
          <fpage>20539517211018488</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>