Social Information Retrival Thesis
Social Information Retrival Thesis
Social Information Retrival Thesis
Diplomarbeit nach der Diplomprfungsordnung fr den Studiengang Informatik an der Rheinischen Friedrich-Wilhelms-Universitt Bonn vom 14. Mrz 2003.
Abstract
In this diploma thesis, we research whether the inclusion of information about an information users social environment and his position in the social network of his peers leads to an improval in search eectiveness. Traditional information retrieval methods fail to address the fact that information production and consumption are social activities. We ameliorate this problem by extending the domain model of information retrieval to include social networks. We describe two dierent techniques for information retrieval in such an enviroment. We evaluate these techniques in comparison to vector space retrieval.
ii
Acknowledgements
I thank my advisor Prof. Dr. Armin B. Cremers for giving me the opportunity to work on this interesting subject, and for his support during the preparation of this thesis. Thanks to Dipl.-Inform. Melanie Gnasa for advising me on the details of my thesis and for invaluable discussions and advice. Further thanks to Andreas Behrend, Julia Kuck, Patrick Lay, Stefan Lttringhaus-Kappel and Oliver Speidel of the Institut fr Informatik III. I thank my parents for their support, and my partner for his appreciation and encouragement. I am greatly indebted to the authors of various open-source software packages that eased the implementation of a prototype system. Specically, I would like to thank the authors of the Lucene library, the jung library and the Colt package.
iii
Contents
1 Introduction 1.1 Information Retrieval and the Social Realm . . . . . . . . . . . . . . . 1.2 The Internet: A Social Medium? . . . . . . . . . . . . . . . . . . . . . 1.2.1 Scientic Community . . . . . . . . . . . . . . . . . . . . . . . 1.2.2 Wikis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2.3 Blogs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2.4 Messenging Systems . . . . . . . . . . . . . . . . . . . . . . . . 1.2.5 ISKODOR: Congenial Web Search . . . . . . . . . . . . . . . . 1.2.6 Semantic Web . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3 Paving the Way: Personalized and Collaborative Information Retrieval 1.4 Social Retrieval and the World Wide Web . . . . . . . . . . . . . . . . 1.5 Research Contribution . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.6 Outline of the Thesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1 2 2 3 3 4 4 5 5 6 7 7 9 9 9 11 11 12 13 14 14 16 17 19 21 24 26 27 27
. . . . . . . . . . . .
. . . . . . . . . . . .
2 Notation and Terminology 2.1 Notation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 State of the Art 3.1 Information Retrieval Models . . . . . . . 3.1.1 The Vector Space Model . . . . . . 3.1.2 Associative Retrieval . . . . . . . . 3.1.3 Hypertext Retrieval . . . . . . . . 3.2 Link Analysis with PageRank . . . . . . . 3.3 Personalized and Collaborative Retrieval . 3.4 Statistical Network Analysis . . . . . . . . 3.5 Semantic and Associative Networks . . . . 3.6 Spreading Activation Search . . . . . . . . 3.7 Retrieval Performance Evaluation . . . . . 3.7.1 Precision and Recall . . . . . . . . 3.7.2 Metrics for Known-item Retrieval . 3.8 Summary . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
. . . . . . . . . . . . .
iv
Contents 4 Related Work 4.1 Google . . . . . . . . . . . . . . . . . . . . . . . . 4.2 ReferralWeb . . . . . . . . . . . . . . . . . . . . . 4.3 Collaborative Information Retrieval Environment 4.4 I-SPY . . . . . . . . . . . . . . . . . . . . . . . . 4.5 Summary . . . . . . . . . . . . . . . . . . . . . . 29 29 30 31 32 33 34 34 36 37 37 38 39 41 42 42 43 44 44 48 48 49 49 52 55 56 56 56 58 61 61 64 65 66 67 71
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
5 Models 5.1 A Domain Model for Social IR . . . . . . . . . . . . . 5.2 Mediums for Social IR . . . . . . . . . . . . . . . . . . 5.3 Additional Aspects . . . . . . . . . . . . . . . . . . . . 5.3.1 Bootstrapping the Social Network . . . . . . . 5.3.2 Privacy, Anonymity, and Plausible Deniability 5.4 Classication and Comparison to Other Approaches . 5.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . 6 Techniques 6.1 Associative Network Model . . . . . . . 6.2 Vector-Space Model . . . . . . . . . . . 6.3 PageRank . . . . . . . . . . . . . . . . . 6.3.1 Applicability of PageRank . . . . 6.3.2 Applying PageRank to Social IR 6.3.3 Integrating PageRank . . . . . . 6.4 Spreading Activation Search . . . . . . . 6.4.1 Adjustments and Constraints . . 6.4.2 Example . . . . . . . . . . . . . . 6.5 Summary . . . . . . . . . . . . . . . . .
. . . . . . .
. . . . . . .
. . . . . . .
. . . . . . .
. . . . . . .
. . . . . . .
. . . . . . .
. . . . . . .
. . . . . . .
. . . . . . .
. . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
7 Evaluation 7.1 Corpora . . . . . . . . . . . . . . . . . . . . . . . . 7.1.1 Mailing List Archives . . . . . . . . . . . . 7.1.2 SIGIR Corpus . . . . . . . . . . . . . . . . 7.2 Methodology for Choosing Search Queries . . . . . 7.2.1 Mailing List Archives . . . . . . . . . . . . 7.2.2 SIGIR Corpus . . . . . . . . . . . . . . . . 7.3 Evaluation Tasks . . . . . . . . . . . . . . . . . . . 7.3.1 Known-item Retrieval on Mailing List Data 7.3.2 Known-item Retrieval on the SIGIR Corpus 7.4 Summary . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
Contents 8 Implementation Notes 8.1 Design Criteria . . . . . . . 8.2 Technology . . . . . . . . . 8.3 Components . . . . . . . . . 8.3.1 Associative Network 8.3.2 Storage . . . . . . . 8.3.3 Search . . . . . . . . 8.3.4 Indexing . . . . . . . 8.3.5 Evaluation . . . . . 8.4 Conguration Files . . . . . 8.5 Summary . . . . . . . . . . 73 73 74 74 75 76 76 79 79 80 84
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
. . . . . . . . . .
vi
List of Figures
3.1 3.2 3.3 3.4 4.1 5.1 5.2 5.3 6.1 6.2 6.3 7.1 7.2 7.3 7.4 8.1 8.2 8.3 8.4 Dierent views of the document-term space . . . . An example semantic network for the word plant Activity diagram for spreading activation . . . . . Confusion matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 20 22 25
Screenshot of the ReferralWeb 2.0 prototype . . . . . . . . . . . . . . . . . 31 Traditional domains of information retrieval and social network analysis . 35 A domain model for social information retrieval . . . . . . . . . . . . . . . 35 Classication of social networks in information retrieval . . . . . . . . . . 40 Model for a concrete social ir task . . . . . . . . . . . . . . . . . . . . . . 43 Associative network for spreading activation search . . . . . . . . . . . . . 50 Spread of activation through the associative network . . . . . . . . . . . . 53 Distribution of vertex degrees for individuals in the origami-l corpus . Distribution of vertex degrees for individuals in the origami-l corpus, logarithmic scale . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Distribution of vertex degrees for coauthors in the SIGIR corpus . . . . Correlation between n-grams and authors . . . . . . . . . . . . . . . . . Class Class Class Class diagram diagram diagram diagram of graph architecture . . of storage architecture . . of search architecture . . for the evaluation classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 . 59 . 61 . 64 . . . . 75 77 78 80
vii
List of Tables
6.1 6.2 7.1 7.2 7.3 7.4 7.5 7.6 7.7 PageRank scores for the SIGIR corpus . . . . . . . . . . . . . . . . . . . . 46 PageRank scores for the origami-l corpus . . . . . . . . . . . . . . . . . . 47 Statistical characteristics of the origami-l corpus. . . . . Statistical characteristics of the sigir corpus. . . . . . . . Scoring of n-grams for query term selection . . . . . . . . Most-cited documents in the SIGIR corpus . . . . . . . . Known-item retrieval on mailing list data from 2004 . . . Known-item retrieval on mailing list data from 20002005 Known-item retrieval on the SIGIR corpus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 60 63 65 68 69 70
viii
Chapter 1 Introduction
The goal of information retrieval (ir) is facilitating a users access to information that is relevant to his information needs. According to Baeza-Yates and Ribeiro-Neto (1999), an information retrieval system should provide the user with easy access to the information in which he is interested. Earlier denitions took a narrower and more technical view on the purpose of a retrieval system, for example Lancaster (1968): An information retrieval system does not inform (i. e. change the knowledge of) the user on the subject of his inquiry. It merely informs on the existence (or non-existence) and whereabouts of documents relating to his request., or Frakes and Baeza-Yates (1992): An ir system matches user queries formal statements of information needs to documents stored in a database. Manber (1992) traces the history of information retrieval back to the rst Sumerian literary catalogues, about four thousand years ago. An information retrieval system must rst determine the exact nature of the users information needs, then select a subset of documents that help him satisfy his information need, and nally rank the selected documents according to which documents are most likely to provide a satisfactory answer.
Chapter 1 Introduction also secondary aspects, for example the providers subjective evaluation, the ability to further discuss the topic with the provider, and obtain references to other relevant pieces of information. Only when ones immediate contacts are not able to satisfy the information need or more in-depth information about a topic is required, one turns to secondary sources equipped with the information acquired by asking within the community. Information retrieval meets the social realm at another, more subtle point: Information is also produced in social situations. Few authors work in a social vacuum. Participation in the community and active exchange with like-minded persons fosters information production and improves the quality of the work. Granovetter (1973) notes that weak ties ties between acquaintances rather than between close friends or family are particularly important for information dissemination and diusion: Weak ties allow information to spread from one closely-knit community to another. Individuals with many weak ties hubs in the social network are important for the adoption of new ideas, since their authority is accepted by a large number of immediate acquaintances. We conclude that social networks are an important factor for nding and spreading information, and that an individuals position in the social network of his peers is indicative of his authority and inuence. Accordingly, we dene social information retrieval as the incorporation of information about social networks and relationships into the information retrieval process.
Chapter 1 Introduction A famous anecdotal application of network analysis in the natural sciences is a persons Erds number1 : The minimum length of a path in the co-authorship network between the Hungarian mathematician Paul Erds and a given person. Network analysis in the scientic community is usually conducted on the basis of publications in well-known journals or conference proceedings, as well as the cited publications. These documents usually do not capture the full extent of social relationships between authors, since much communication occurs via secondary channels, such as email. The observable content is of very high quality. A number of databases of scientic publications exist, for example MathSciNet2 , PubMed3 and CiteSeer4 . Some databases, most notably CiteSeer, support download of records via the Open Archive Initiative Protocol for Metadata Harvesting5 , making social retrieval on scientic publications possible. A corpus with data from 25 years of sigir proceedings, stemming from work on (Smeaton et al., 2002) and enhanced locally, is used for evaluation in subsequent chapters.
1.2.2 Wikis
Wikis are a form of collaborative authoring environment that is characterized by the fact that every user can add, edit, and delete content at will. The rst wiki was WikiWikiWeb6 , launched by Ward Cunningham in 1995 as a supplement to the Portland Pattern Repository, a web site about software design patterns. A number of software packages and similar projects followed; the largest wiki is purported to be Wikipedia7 , an online encyclopedia that employs the wiki principles. Wikis usually have a at structure, with one designated entry page that links to other pages; some use xed number of categories. Most wikis keep a revision history that allows changes to be linked to individual users. Direct interaction between users usually occurs on the users home page. The quality of published content varies wildly; some wikis contain nothing more than a few quickly written ideas, others, like Wikipedia, aim for publication-quality content.
1.2.3 Blogs
Weblogs or blogs are an internet phenomenon originating in the late 1990s: Websites that continually publish new articles on their front page, written by one individual or
1 2
http://www.oakland.edu/enp/, last visit on 2005/03/08. http://www.ams.org/mathscinet, last visit on 2005/03/08. 3 http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed, last visit on 2005/03/08. 4 http://citeseer.ist.psu.edu/, last visit on 2005/03/08. 5 http://www.openarchives.org/OAI/openarchivesprotocol.html, last visit on 2005/05/02. 6 http://c2.com/cgi/wiki?WikiWikiWeb, last visit on 2005/03/08. 7 http://www.wikipedia.org/, last visit on 2005/08/03.
Chapter 1 Introduction a group of people. Blog entries can be tied to their author; linking between entries is supported in the form of comments or so-called trackback links, in which the author of another blog refers in his entry to the original entry. Blogs can take many forms: personal blogs usually form a sort of diary of the owners thoughts and interests. Topical blogs are usually edited by several people and publish information about a specic topic. Corporate blogs may give the executives and other employees a platform for publishing news articles. A number of service provides exist on the internet that allow one to create a blog free of charge; examples are BlogSpot8 (now owned by Google) and LiveJournal9 . Another typical feature is the so-called blogroll: A list of other blogs the author reads regularly. This may be used to determine social links between authors, but it is not universally adopted.
Chapter 1 Introduction An iskodor peer can keep track of the quality of the results provided by its peers and re-rank results according to the peer that supplied it. This peer relevance judgement leads to a network of trusted peers that produce the most relevant results. Social search techniques can be applied in this network of trusted peers, to provide better search results and nd peers that are well versed in a specic topic. Thus, social information retrieval can be used to improve web search eectiveness.
Chapter 1 Introduction will be relevant to the majority of its users, but not to the actual user who submitted a query. Personalization seeks to solve this problem by keeping a record of the users previous activity and using it to attune the results to his prole. Implementations of personalized search exist, but are not yet in widespread use; examples are Amazons a9.com16 and Eurekster17 , which are implemented as a central service, or SearchPad (Bharat, 2000), a client application. A collaborative element can be added by comparing and combining the proles of dierent users. This approach is popular in information ltering systems such as the GroupLens system (Konstan et al., 1997) for ltering Usenet posts. It has also been used in information retrieval systems, for example in the aforementioned Eurekster system, or the experimental I-Spy18 search engine (Freyne and Smyth, 2004). Personalization strategies and collaborative retrieval attack the problem of determining a users information needs from dierent angles. Personalization aims to infer a more detailed view of the information needs based on past usage, whereas collaborative ranking acknowledges that the information seeker is part of a community of like-minded individuals.
Chapter 1 Introduction web has been on automated information retrieval, not manual indexes, for several years. Recent eorts in collaborative projects have shown that it is possible to garner a large, active user community, in the tens of thousands or even millions of users, within a few months. Projects such as Wikipedia23 show that large undertakings purely on the basis of volunteer labour are possible. In this sense, PageRank (Page et al., 1999) is also a collaborative eort in information retrieval and ranking, since it uses link information published on millions of web pages. These examples motivate a vision for the future of web search that is not dominated by centralistic eorts of single companies, providing us with results derived from a global view of the web. One may envision a service that provides each user with results that are tailored to his individual information needs, and that derives its results by collaborating with other users, sharing information and relevance assessments. Such a tool would be an ideal application for social information retrieval, since it combines the social network with the wealth of information available on the World Wide Web.
Chapter 1 Introduction Chapter 9 concludes the thesis by discussing its impact and limitations of the described methods, and listing future work.
2.1 Notation
Vectors are denoted by bold lowercase letters: v Rn is a vector in the vector space Rn . The components of a vector are denoted by a subscript: v = (v1 , . . . , vn ). Matrices are denoted by uppercase letters: M Mmn (R) is a matrix with m rows and n columns, where the components are real numbers. (M)ij denoted the component in row i and column j of matrix M. 1 denotes a matrix of appropriate dimensions where every component is equal to 1: (1)ij 1. For variables which change over time, the time is denoted by a superscript: xt is the value of x at time t. For a set of values x1 , . . . , xl , the average of the values is x.
2.2 Terminology
A graph G = (V, E) consists of a nite set of nodes (or vertices) V and a set of edges E connecting the nodes. An edge is either directed, in which case it is a tuple (v, v ) V V, or undirected, in which case it is a set {v, v } 2V . A graph which has only directed edges is called a directed graph, a graph with only undirected edges is an undirected graph. The underlying undirected graph of a directed graph is a graph G = (V, E ) with E = v, v | (v, v ) E (v , v) E
The degree of a node in an undirected graph is the number of edges containing the node: (v) = |{e E | v e}| For directed graphs, we distinguish between the indegree , which is the number of edges terminating in a node, and the outdegree + , the number of edges emanating from
(v , v ) E | v = v (v , v ) E | v = v
A path between two nodes v and v is a sequence of nodes v0 , . . . , vk with v0 = v and vk = v , such that (vi , vi+1 ) E (in the directed case) respectively {vi , vi+1 } E (in the undirected case) for 0 i < k. The length of the path is k; there is a trivial path from v to v with length 0 for every node. The distance of two nodes v and v is the minimal length of a path connecting them. A graph G = (V , E ) is a subgraph of G = (V, E), if V V and E E. The induced subgraph G[V ] is the graph G[V ] = (V , E (V V )) respectively G[V ] = (V , E 2V ) An undirected graph G is connected if there exists a path in G from v to v for every pair of nodes in V. A connected component of an undirected graph is a maximal subgraph G = (V , E ) such that G is connected. A directed graph G is strongly connected if there exists a path in G from v to v and a path from v to v for every pair of nodes in V. A strongly connected component of a directed graph is a maximal subgraph G = (V , E ) such that G is strongly connected. A subgraph G = (V , E ) is a weak component of a directed graph if the underlying undirected graph of G is a connected component of the underlying undirected graph of G. A graph is weighted if there is a weight ce R associated every edge e E. For a graph with a set of nodes V = {v1 , . . . , vn }, we often write eij for the edge from vi to vj ; likewise, cij is the weight associated with eij . The adjacency matrix is the matrix A M|V||V| (R) with (A)ij = 1 if eij E 0 otherwise
For a weighted graph, the adjacency matrix is (A)ij = cij 0 if eij E otherwise
10
11
d1 d2 d3
t1 t2 t3 t4 t5 0 0 1 1 0 0 1 0 1 0 1 1 0 0 1
doc d1 d2 d3
terms t3 , t4 t2 , t4 t1 , t2 , t5
t1
t2
t3
t4
t5
d1
d2
d3
Figure 3.1: Dierent views of the document-term space (examples reproduced from Preece, 1981, page 11)
Dierent weighting functions have been proposed for weighting of features in queries and documents, see for example (Salton and Buckley, 1988b). A popular choice is the tf idf weighting scheme weighttf idf (d, t) = tf(t, d) idf(t) where the term frequency tf(t, d) is the number of times the indexing feature t occurs in the document d. idf(t) is the inverse document frequency idf(t) = 1 , log(df(t)) + 1
12
Chapter 3 State of the Art where df(t) is the number of documents the feature t occurs in. The tf idf scheme expresses that idea that an index feature is more important for characterizing a document if it occurs often in the document, but seldom in the document collection. The vector space model with tf idf weighting or one of its variations is currently the most popular model in commercial and other information retrieval applications. It provides implicit ranking through the similarity measure, it is reasonably fast to implement, and it provides support for partial matches. Despite its simple design, it exhibits a consistently high performance. Since documents and queries are represented as vectors in the same vector space, this model lends itself easily to techniques for relevance feedback and query expansion. A recent development in vector space retrieval is latent semantic indexing, or lsi (Deerwester et al., 1990). Latent semantic indexing aims to compress the term vector space into a lower-dimensional space by means of singular value decomposition of the document-term matrix. By projecting the term vector space onto a lower-dimensional space, associations between terms become apparent. lsi is designed to handle the synonymy problem: Authors use dierent words for the same concept, but searchers usually use just one term in the query formulation. lsi retrieves documents relevant to the query concept even if the query keywords are not present in the document, thus improving the number of relevant documents found.
13
Chapter 3 State of the Art of associations between nodes is easily achieved; for an example see (Pirolli et al., 1996).
14
Chapter 3 State of the Art The PageRank algorithm is usually formulated based on a random surfer model: A user starts on a random web page and follows one outlink of this page at random and repeats this process on every page he reaches. Assuming that the link graph consists of a single strongly connected component (ie. there is a path from every page to every other page), the random surfer will eventually visit every page in the web graph. One may consider this sequence of pages as a Markov chain and compute the stationary probability of the random surfer being on a given page at any time. The stationary probability can be computed using an iterative process. For a directed graph G = (V, E) with nodes V = {v1 , . . . , vn }, one assigns an initial probability at time 1 t = 0 of r0 = |v| to every node. In every iteration, ri is updated according to i rt+1 i =
(vj ,vi )E
cji rt j
(vj ,vk )E cjk
where cij is the weight of the edge from vi to vj , or 1 if the graph is unweighted. The iterative process stops when the probability vector r = (r1 , . . . , rn ) converges. For graphs that do not consist of a single strongly connected component, this calculation may lead to undesirable results, and may not converge. If the graph contains a sink, ie. a page with outdegree + (v) = 0, the stationary probability of the random surfer being on that page converges to 1, with the probability of being on any other page converging to 0. To ameliorate these eects, a dampening factor on the transitions of the underlying markov chain is introduced, in the form of a teleportation step: On every visited page, the random surfer teleports to a random page with a probability of 0 1, or chooses one of the outlinks with a probability (1 ). This step ensures that the random surfer has a nite probability of visiting every page, and that he does not get stuck on a sink page. The teleportation step is carried out while updating the probability scores: rt+1 = i |V| + (1 )
(vj ,vi )E
cji rt j
(vj ,vk )E cjk
(3.1)
is usually set to a value between 0.1 and 0.3. The stationary probability may also be computed using linear algebra methods: Let A be the adjacency matrix of the web graph G. Let M be a row-normalized version of (A)ij A, that is (M)ij = (A)ik . Then the PageRank vector r is the maximal eigenvector of
k
|V|
1 + (1 )M
provided that G is ergodic (Flake et al., 2004). Reformulating equation (3.1) as a vector equation shows the kinship between PageRank computation and the power method for computing the dominant eigenvector of a matrix: rt+1 = |V| 1 + (1 )M rt
15
Chapter 3 State of the Art If G is not ergodic, r needs to be normalized after each iteration. The PageRank score ri is used for ranking web pages according to their overall popularity. This score may be used to boost popular pages in cases where there are many relevant documents for a query. Evidence for the importance of PageRank in web retrieval is still scarce: According to Craswell and Hawking (2004), only 11 of 74 submitted runs at the trec-2004 Web track used PageRank, and only one of the top systems used it. How to combine PageRank and query-specic relevance measures is also an unsolved problem. Zaragoza et al. (2004) reported the following method for their top-ranking system at trec-2004: They normalized the PageRank scores, transformed them by f(ri ) = w 1+ e log(ri )+b
and added this factor to the query-specic relevance score. w and b were determined empirically using queries from the trec-2003 Web track; no indication is given in their report regarding the magnitude of these parameters.
http://www.a9.com, last visit on 2005/04/11. http://eurekster.com, last visit on 2005/04/11. 4 http://www.google.com/searchhistory/, last visit on 2005/07/02.
3
16
Chapter 3 State of the Art result lists and presents them to the user. i-spy logs queries to the search engine, as well as which pages from the result list users select for further inspection. The number of hits on a page p P for a query q Q is stored in a hit matrix H M|Q||P| (R). For previously-selected pages and queries, the relevance of a page pk for a query ql is determined by Hlk relevance(pk , ql ) = |P| i=1 Hli The output is a stratied result list, the rst part containing previously-encountered pages, sorted according to their relevance score, and the second part containing results from the meta-search engine.
17
Chapter 3 State of the Art (Watts and Strogatz (1998) use a slightly dierent formuation.) Here, a connected triple is a node that is connected directly to two other nodes. The clustering coecient is the probability, averaged over the network, that two neighbours of a node will also be neighbours of each other. For a random network, the expected clustering coecient is C= (k2 k)2 nk
3
First evidence that social networks have a very low average shortest path length was presented by Milgram (1967). In this experiment, participants were asked to send a letter to a specic recipient, but only by passing them on in person to an immediate acquaintance. Similar experiments were conducted later, for example by Dodds et al. (2003). The resulting chains of acquaintance were surprisingly low, with typical chain lengths between ve and seven. The fact that two friends of a person are more likely to be friends of each other leading to a high clustering coecient was predicted by Granovetter (1973); large-scale investigations of social networks (for example by Newman, 2001) conrmed this claim. Watts and Strogatz (1998) coined the term small-world network for networks that exhibit a high clustering coecient while at the same time retaining a small average shortest path length between two nodes. They showed that a small amount of randomness introduced into a regular network (with a high average path length and high clustering coecient) will suce to drastically lower the average path length, while aecting the clustering coecient hardly at all. Newman and Park (2003) conjecture that while a high degree of clustering is a natural state for small networks, large social networks exhibit a far higher degree of clustering than can be explained by the random model. The degree correlation is the correlation between the degree of neighbouring nodes in a social network. Let Pr() be the degree distribution of a network, that is, Pr( = k) is the probability of a node v having degree k. For an edge e connecting nodes vi and vj the excess degree e of the nodes connected by e is one less than their degree (vi ) resp. (vj ). The normalized distribution of the excess degree is Pr(e = k) = (k + 1)Pr( = k + 1) k kPr( = k)
The joint distribution Pr(e = j, e = k) is the probability that a randomly chosen edge connectes two nodes with excess degree j and k. If the excess degrees of neighbouring nodes are uncorrelated, then Pr(e = j, e = k) = Pr(e = j)Pr(e = k); this is the null model. The degree correlation in comparison to the null model is r= 1 2 jk(Pr(e = j, e = k) Pr(e = j)Pr(e = k)),
j,k
18
Chapter 3 State of the Art where 2 = k k2 Pr(e = k) ( k kPr(e = k))2 is the variance of Pr(e ). Newman and Park (2003) note that a number of examined social networks have been found to have a positive degree correlation, ie. nodes with a high degree tend to be connected to other nodes with a high degree. In dierence to this, non-social small-world networks usually exhibit a negative degree correlation: nodes with a high degree are usually connected to nodes with low degree. Examples for this phenomenon are neural networks, food webs, peer-to-peer networks, or the internet. In the case of the internet, a comparatively small number of primary hubs distribute trac to other autonomous systems. One may conjecture that in communication networks, negative degree correlation is a matter of economy: A highly-connected node requires a large investment and high maintenance costs, but can provide connectivity to a disproportionately large number of poorly connected nodes. In social networks, the number of social relations maintained by a person is a matter of personality: A introverted person has fewer social relations than a highly social person. Since individuals tend to associate with people similar to themselves, social persons associate with other social persons, whereas solitary persons associate with other solitary persons leading to a positive degree correlation.
19
Figure 3.2: An example semantic network, illustrating three meanings for the word plant (reproduced from Quillian, 1968, page 225). from
dd d d E water E food
Semantic networks were a rst attempt to represent knowledge using a network structure; they do not support formal semantics or an inference mechanisms (Woods, 1975). Successor to semantic networks were description logics (Baader et al., 2003), which specied formal semantics while avoiding the problems of undecidability and computational complexity of full rst-order logics. The semantic web initiative (Berners-Lee et al., 2001) recently rekindled interest in ontologies and knowledge representation. One of the cornerstones of the semantic web, the Web Ontology Language owl5 , uses description logics as part of its specication. Associative networks are a simplied precursor of semantic networks: An associative network contains only associations between concepts, but does not distinguish between dierent types of relations. The strength of the association between two concepts is expressed by the weight of the link connecting them, but no data is available
5
20
Chapter 3 State of the Art as to why the two concepts are related. Associative networks are the foundation of associative retrieval (section 3.1.2).
it i
=
j=1
ot cji j
21
pre-adjustment decay
one pulse
spreading
selection
Figure 3.3: Activity diagram for spreading activation (after Preece, 1981)
22
Chapter 3 State of the Art 3. post-adjustment, decay: The activation level for each node is determined from its input energy and its activation level at the last iteration: at = fa (at1 ) + fi (it ) i i i 4. termination check: When a xed number of iterations has been reached, or other conditions have been met (for example, the amount of activation energy dissipated in the current iteration is zero, or is lower than a xed threshold), the algorithm stops. Spreading activation energy is an extremely exible model. By carefully chosing the edge weights, the functions fa , fi and fo , and the termination condition, a number of dierent search strategies can be implemented. Preece (1981) distinguishes three types of pre-adjustment: full strength spreading: each neighbouring node receives the full activation energy of the source node: ot = at1 i i unit spreading: From each activated node, neighbouring nodes receive a xed amount of energy, regardless of its activation energy: ot = i 1 if at1 > 0 i 0 otherwise
equal distribution spreading: Each receiving node gets an equal share of the output energy of the source node: t1 ai ot = i 1j|V| cij
(vi ,vj )E
During post-adjustment, the eect of the received energy is changed at the destination node. Several stratagies are used in this stage to limit the spread of activation: retention: One may choose to not retain the previous activation level (fa 0), or to decrease it by a xed factor (fa (a) = a for 0 < < 1). thresholding: If the received energy is smaller than a predened threshold , it may be dropped. A threshold function on the received energy acts as a noise lter, canceling out small changes in activation energy and limiting the number of activated nodes. Popular choices for the threshold function are the Heaviside function ((x) = 0 for x 0, (x) = 1 otherwise), or sigmoidal functions like the tangens hyperbolicus: fi (it ) = it (it ) or fi (it ) = it tanh(it ) i i i i i i
23
Chapter 3 State of the Art inverse destination frequency spreading: The input energy is divided by the sum of the weights of the incoming edges over which it was received: fi (it ) = i it i
1j|V| cji (ej ,ei )E
A system with equal distribution spreading, no retention of activation energy, and no thresholding conserves the total energy in the system. When using spreading activation search in a dense graph, one must take care to limit the spread of activation through the graph; otherwise, the whole graph will be activated after a few pulses. Constrained spreading activation adds further methods of limiting the dissipation of activation energy in the network. Commonly used heuristics include (Crestani, 1997): distance constraint: Spread should stop after a certain distance from the originally activated nodes has been reached; this prevents the search from arriving at nodes that only have a tenuous connection, via several links, to the original nodes. fan-out constraint: Spread should stop at nodes with a high fan-out, since these usually denote a very general concept, and further exploration from this concept is unlikely to lead to helpful results. path constraint: The spread of activation energy should prefer links that contain more meaningful information if possible, and resort to links of certain other categories only if no other are available. activation constraint: Activation is disseminated only from nodes whose initial activation value exceeds a certain threshold, which may dier depending on the node type. The application of spreading activation search for text retrieval was studied by Salton and Buckley (1988a), who found its performance to be comparable to vector-space methods. Pirolli et al. (1996) used spreading activation to unify content-based and link-based information for searching the World Wide Web. It was also used by Crestani and Lee (2000) as part of the WebSCSA system, an agent browser that follows outgoing links from visited web pages and correlates them with the users past interests. An overview of spreading activation in information retrieval is found in (Crestani, 1997), who notes that the eectiveness of spreading activation search depends crucially on the structure of the network graph. Despite various prototype systems described in the literature, no commercial system implementing spreading activation search is available.
24
Chapter 3 State of the Art D (total documents) Pos (positive examples) Neg = D \ Pos (negative examples) PPos (predicted positive examples) TP = Pos PPos (true positives) FP = PPos \ Pos (false positives) PNeg = D \ PPos (predicted negative examples) FN = PNeg \ Neg (false negatives) TN = Neg PNeg (true negatives)
Figure 3.4: The confusion matrix lists possible subdivisions of the sets D, Pos and PPos. performance. The choice of setting also determines the appropriate evaluation metrics. We can distinguish broadly between interactive evaluation scenarios and batch scenarios. In an interactive setting, we measure the ability of a user to solve the evaluation task, using the information retrieval system under evaluation. An example task for this setting is nding out the answers for a questionnaire. We would measure the performance of the system in terms of the average number of questions attempted, the average number of questions answered correctly, and the time taken to ll out the questionnaire. In a batch (or non-interactive) setting, we measure the ability of the system to nd relevant documents as regards a query and rank them accordingly. Because the performance evaluation does not depend on the abilities of the users, experiments using batch settings are easily repeatable and comparable. A number of standard test collections for batch retrieval exist. For a non-interactive setting, the individual evaluation task consists of a set of documents D and an information request q. The set of documents relevant to this query Pos D is usually determined by a human expert. The information retrieval system returns a set of answers d1 , . . . , dk PPos D in respect to the information request q, as well as a ranking function rank : PPos {1, . . . , k}. The ranking function imposes an order on the returned documents. The document sets D, Pos and PPos can be further subdivided as seen in gure 3.7. True positives are documents deemed relevant by both the human expert and the information retrieval system. False positives are returned by the ir system, but were reckoned irrelevant to the query by the human expert. False negatives are documents relevant to the query which are not found by the system. True negatives are not returned by the system and are considered irrelevant by the human expert. In cases where the ranking of the result list is not unique, interval arithmetic (Hayes, 2003) may be used. This phenomenon occurs in scoring information retrieval systems, when two or more documents are assigned the same score, and the desired document is one of these documents. Take for example, an ir system which returns three documents with the same score on rank 3, 4 and 5 of the result list, and returns the desired document d on rank 5. In this case, reporting the rank of d as 5 would be pessimistic, since the system might have returned it on rank 3 or 4 under other circumstances. Instead, the
25
Chapter 3 State of the Art rank is an interval: rank(d) = [3, 5] or rank(d) = 4 1. Average rank and other statistics need to be computed using interval arithmetic. Alternatively, one may choose to report only the midpoint of the interval, or the actual rank reported by the ir system. Where detailed information about the ranking mechanisms is not available, the latter may be the only option. Important evaluation metrics for non-interactive retrieval are introduced in the following subsections.
Precision and recall do not take a ranking of the documents into account. They presume that an ir system returns a xed set of answers for a given query, and that all returned documents are subsequently examined by the user an appropriate assumption for early boolean retrieval systems. In order to adapt this measure to ranking models, the result list is examined in order of increasing rank, and precision is measured when a specied recall level has been reached, ie. when a specied fraction of the relevant documents has been seen. An average precision is computed by averaging over the precision at certain standard recall levels. (For example, at a recall of 75%, 50% and 25%; interpolation may be necessary if the precision at the exact recall level cannot be determined.) Average precision at seen relevant documents averages over the precision at every relevant document in the result list. For very large collections, the set of relevant documents Pos can be dicult (and expensive) to determine, as this task presumes knowledge of all documents in the collection. Precision and recall are similar to the roc (receiver operating characteristics) model (Hanley and McNeil, 1982) popular in machine learning. In dierence to the roc model, precision and recall do not take the number of true negatives into account. True negatives usually dominate in information retrieval, since only few documents in the document collection are relevant to a specic query. (See also (Frnkranz and Flach, 2003) for a comparison of evaluation metrics.)
26
Another popular measure is the harmonic mean of the rank at which the desired document occurs; this is also called inverse average inverse rank in the known item retrieval context and is dened as IAIR = k
k 1 i=1 (rank(di ))
Both average rank and inverse average inverse rank score 1.0 for perfect retrieval; inverse average inverse rank has the advantage of rewarding systems that return the desired document early in the result list.
3.8 Summary
We describe three dierent models for information retrieval: Vector-space retrieval treats documents and queries as vectors in a term vector space; relevance measures are based on the similarity of document vectors and the query vector. Weighting schemes like the tf idf scheme improve the performance of vector-space retrieval. Associative retrieval models terms and documents as nodes in an associative network and uses graph-based search techniques. In hyperlinked environments, spectral methods on the adjacency matrix of the hyperlink graph are common. One such spectral method is described in detail: The PageRank algorithm is a wellknown algorithm for link analysis and is commonly used for web retrieval. We describe the model it is based on, methods for computing it, and how to integrate it into an ir system. A brief overview of personalized and collaborative retrieval describes existing attempts at integrating a user model into ir systems. User models are based on past interactions of the users with the system. Statistical network analysis describes the properties of naturally occuring networks and devises models for them. Measures describing the characteristics of networks such as the web graph or social networks are introduced.
27
Chapter 3 State of the Art Semantic and associative networks are formalisms for knowledge representation. Together with spreading activation search, they form the basis for many early models of the human mind. Spreading activation search, especially when used with constraints, is a current ir technique for many applications. We conclude the chapter by describing methods for evaluating the performance of an ir system. We distinguish between interactive and non-interactive evaluation scenarios and describe metrics for two variants of non-interactive evaluation.
28
4.1 Google
Google1 was one of the rst web search engines to incorporate analysis of the web graph into its ranking algorithms. The PageRank algorithm (see Brin and Page, 1998; Page et al., 1999) was a novelty among search engines at the time and was quickly singled out among independent observers as the main factor for its success. The publication of a tool for determining the PageRank value of a specic page (on a scale from one to ten) led to a frenzy among search engine optimizers consultants concerned with achieving a high rank for a specic page and query on leading search engines. The quest for a high PageRank value shaped the topological nature of the web graph. Common tactics include selling links from high PageRank sites to promote sites with lower PageRank, and installing link farms: autonomous networks of highly interlinked web sites with little and highly similar content, all for the purpose of increasing the PageRank value of a given web page. Google today is a successful publicly traded corporation with a market capitalization of more than 80 billion U. S. dollar. It provides numerous free services, for example an email service2 , a UseNet archive3 , a photo organizer4 , and several specialized search engines for images5 , scholarly articles6 , weblogs7 and others. The main source of revenue
1 2
http://www.google.com/, last visit on 2005/09/18. http://www.gmail.com/ 3 http://news.google.com/ 4 http://picasa.google.com 5 http://images.google.com/ 6 http://scholar.google.com/ 7 http://blogsearch.google.com/
29
Chapter 4 Related Work for Google is its advertisement service that allows clients to place text-only ads on the result pages of the search engine. The impact of PageRank on the quality of Googles search results is not known; as is common for a web search engine, the innards of its scoring algorithm are kept secret. Several other factors may account for its singular position among search engines today: Googles homepage is very clean and uncluttered, compared to competitors like Yahoo!8 . This may account for its popularity among users and its perceived quality. For a long time, Google crawled a much larger portion of the web than any of its competitors, thereby enabling it to nd pages buried much deeper in the web. The depth of Googles index was only recently surpassed by Yahoo!9 ; its result quality however, by popular opinion, was not. Google implemented a highly scalable and easily adaptable processing and storage architecture, centered around the map-reduce paradigm borrowed from functional programming languages, and GoogleFS, a fault-tolerant distributed lesystem. The size of Googles compute grid is estimated to comprise between 10 000 and 100 000 cpus, thus ensuring consistently high performance and availability. To summarize, Google pioneered link analysis in information retrieval and managed to incorporate it into a highly successful product.
4.2 ReferralWeb
ReferralWeb (Kautz et al., 1997b,a) is a system for mining social relations from the web and exploring social networks. The authors describe it as combining of social networks and collaborative ltering; its focus is extracting a social network from web pages, nding experts for a topic and linking the searcher to the expert by a path in the social network. The ReferralWeb prototype bootstraps the social network by searching for web pages with an individuals name. From the result pages, proper names are extracted, using techniques from information extraction (Sundheim and Grishman, 1995). Social links between two individuals are determined by the ratio of web pages containing both names and web pages containing only a single name. This process is repeated recursively to determine the social neighbourhood of an individual. Social networks are also extracted from Usenet archives, coauthorships of scientic publications and organization charts. Several operations are supported on the resulting social network. Paths from one person to another are used to determine a chain of referrals that links a searcher to an expert for a specic topic. A user can search for an expert on a topic either on the whole
8 9
30
Figure 4.1: Screenshot of the ReferralWeb 2.0 prototype social network, or just in his neighbourhood. The system also supports visualizing and exploring the social network in an interactive, graphical manner. ReferralWeb diers from other social networking applications because it extracts social links from publicly available information on the web; it does not require the user to sign up with a service and explicitly name his colleagues and collaborators. The prototype system was developed as part of Mehul A. Shahs masters thesis (Shah, 1997); a second implementation was performed by Yooki Park and is available on the web10 (see also gure 4.1). A formal evaluation of ReferralWebs eectiveness, as compared to other information retrieval systems, was not conducted to our knowledge.
31
Chapter 4 Related Work elements to access the collaborative features of the system. The users familiarity with this interface ensures a gentle learning curve for new users. cire stores information about past queries, past results, and the browsing history of its users, as well as comments and relevance judgements for individual pages, thereby serving as a search memory for users. This information is also shared between users. The asynchronous nature of the system allows users to search collaboratively even if they are geographically or temporally distributed. By accessing other users queries and annotations, one can continue a research task where another user left o. The search memory also allows novice users to gain familiarity with the way experts use the system. Romano et al. (1999) note that the collaborative features of the system were often ignored or forgotten by users; this is attributed to the non-intrusive nature of the systems user interface.
4.4 I-SPY
i-spy is an experimental meta search engine developed at University College, Dublin, Ireland. As a meta search engine, it does not maintain its own index of web pages; instead, it relies on another web search engine (Google in i-spys case) for results. Results from the underlying search engine are re-ranked and presented to the user. i-spy implements collaborative ranking, borrowing ideas from collaborative ltering: It aggregates relevance judgements from a community of people and uses them in later searches for the same keywords to boost pages which are known to be good. The result list is stratied: Previously ranked pages are displayed rst, followed by other pages from the result list of the underlying search engine. If the impact of relevance judgements is not discounted with time, this may lead to a fossilization of the result lists, presenting pages as relevant which have long since changed or become out of date. Users are required to join a specic community before executing a query. Anonymity is thus ensured, as the usage data is aggregated among one community and cannot be traced back to one specic member. One user can only be part of one community at a time, requiring the user to change the community as the subject matter of his search changes. Since this step must be executed consciously by the user, it often leads to communities of one: Communities which consist only of one user (with names such as Petes searches) and used only to track the search history a task which could also be accomplished using simpler personalization systems. i-spy does not facilitate the formation of a community. It does not use information about the social relations between its users, and does not facilitate the formation of such relations. The inuence of collaborative ranking methods on user performance was evaluated in (Freyne and Smyth, 2004): Students were issued with a questionnaire of 25 questions and were asked to solve it, using I-Spy as a web search engine. A training group did not use collaborative ranking, but the usage data from the training group was fed into
32
Chapter 4 Related Work the collaborative ranking process. The test group solved the same questionnaire, using collaborative ranking with usage data from the training group. Using a training group of 45 students and a test group of 47 students, it was concluded that the test group indeed benetted from the usage information from the training group: both the number of attempted questions and correctly solved questions increased, and the average position of results clicked signicantly decreased.
4.5 Summary
We describe four systems that pioneered components of a social ir system: Google is currently one of the most successful web retrieval companies. Google pioneered link analysis for web retrieval, which was quickly determined as one of the factors responsible for its success. ReferralWeb mines social relations from the web and visualizes them. Its primary purpose is nding experts on a topic and nding paths of referrals between individuals. The Collaborative Information Retrieval Environment cire combines information retrieval systems and group support systems, allowing users to collaborate on a retrieval task. The i-spy search engine implements collaborative ranking by keeping track of previously entered queries and documents, and re-ranking documents accordingly. Documents are promoted to the top of the rank list if they were previously selected for a similar query.
33
Chapter 5 Models
This chapter introduces a domain model for social information retrieval. The domain model identies entities pertinent to the retrieval task, as well as their relations. It forms the basis for the retrieval techniques described in chapter 6.
34
Chapter 5 Models
related to
individual
information retrieval
document
query
references
similar to
Figure 5.1: Traditional domains of information retrieval and social network analysis
related to
individual
ed ne s se on es ati le pr b ex form gea out in led ab ow kn
pr o
r du este d ce in d by
in te
document
query
35
Chapter 5 Models it is always produced by an individual as an expression of his state of mind. This implies that any judgement about the product can be used to infer a judgement about the producer, and vice-versa. Social ir uses this observation to apply judgements about the information producer to his products. Judgements about the producer are derived from an analysis of the social network. The producers relationship with his peers is used to draw conclusions about the nature of his products. Understanding the social fabric in which information production takes place is especially important when only limited understanding of the documents or the information needs is available. Traditional information retrieval techniques which are based solely on analysing document content, while very successful in many contexts, fail badly when the information need is underspecied, and when a large number of relevant documents exist. In this sense, social ir can be understood as a formalization of search techniques we commonly use to assess the quality of information by looking at the authors standing in his community. An example may serve to clarify this point: Suppose that we try to nd an authoritative scientic paper on a certain topic. A search in a database reveals publications by ve dierent authors. Further searches reveal that the rst author has collaborated with three of the others, whereas the last author is a lone ranger and has not collaborated with any of the other authors. When trying to choose where to begin, we would probably chose a paper by the rst author, because he has the best standing in the community of his peers, and as such may be presumed to be the most authoritative source. We would probably disregard the last author, since he has no connections to other people studying the same eld. The same principle can be applied to other instances of information production in a social environment: We tend to favour authors who engage in active collaboration and exchange of ideas; this is usually seen as a sign of thorough and diligent work.
36
Chapter 5 Models sons interests are expressed with the <foaf:interest> property. The OpenSearch standard allows one to publish information about which documents are relevant to a specic query. Combined, these three standards allow for a complete and machine-readable description of all parts of the domain. Mailing list archives (section 1.2.4) contain less explicit information. Individual users are identied by their email address; thus, authorship information is easily available for each message. References between messages are extracted from the In-Reply-To: and References: header lines; these are not fully supported by every email client and may lead to information loss. Information extraction techniques may also be used to identify follow-up messages. Relations between individuals are identied based on whether two individuals corresponded with each other on the mailing list. A conventional text search engine provides relevance assessments for queries and documents. Note that in this case, no explicit relation between queries and individuals is extracted; rather, a persons interests are characterized by the union of the messages he wrote. While the previous two examples were primarily concerned with modeling the information production process, the iskodor system (introduced in section 1.2.5) contains a dierent subset of the social ir model: the information retrieval process. Individuals submit queries to the system and thereby express their information needs. Explicit feedback determines which document is relevant to a query. By recording the individual who submitted the feedback, associations between individuals and documents are stored. Measures like peer relevance (Gl, 2004) express relations between users. iskodor lacks associations between documents or between queries; it nevertheless contains all components to enable the use of social search techniques. From this comparison, we see that the social ir model is applicable in diverse situations. Its key concepts can be identied in information retrieval environments as well as information production and sharing environments.
37
Chapter 5 Models for example, the coauthorship network of scientic publications is such a social network. One may also use social networks that are completely unrelated to the produced content, for example by asking the authors to name their peers in the network explicitly. In the latter case, it can be dicult to persuade users of an existing system to enter data about their personal contacts, especially if they do not perceive an immediate advantage in doing so. On the other hand, experiences with existing systems, for example social networking services like Friendster1 , Orkut2 or openBC3 , show that participants readily connect to other users of the same system, forming an intricate and reasonably complete social network. The perceived value of disclosing ones social neighbourhood seems to outweigh potential privacy concerns. A combination of such systems and an information retrieval system constitutes a fertile ground for the application of social search techniques. Unsuccessful formation of the social network results in performance degradation of the retrieval process. In particular, algorithms that use the global structure of the social network are ineective if the network is very sparse or fractured into many dierent components; one such network is described in section 7.1.2. In this case, one has to resort to other ir methods, or limit the inuence of the social component of the retrieval system.
http://www.friendster.com/, last visit on 2005/10/11. http://www.orkut.com/, last visit on 2005/10/11. 3 http://www.openbc.com/, last visit on 2005/10/11.
2
38
Chapter 5 Models
39
Chapter 5 Models
...
keywords
stemming content analysis structure analysis latent semantic indexing ... information needs query expansion past needs (personalization) ...
query languages
Figure 5.3: Classication of social networks in information retrieval. Social networks are a form of metadata for retrievable content, closely related to other association analysis like bibliographic reference analysis.
40
Chapter 5 Models Collaborative ranking systems aggregate explicit relevance judgements from a group of people. These relevance judgements are used for ranking of result lists. Collaborative ranking systems usually treat the group as uniform: A relevance judgement of any member is worth the same as any other. Expert location may be considered the inverse of social ir: In expert location, one tries to determine the authority of a person based on the content they produce, whereas in social ir, we try to determine the quality of content based on the authority of the author. Trust models treat links in a social network as a measure of trust or distrust. In dierence to this, links in social ir are not an explicit measure of trust, but rather one of social interaction.
5.5 Summary
We describe a domain model for social information retrieval that includes three prominent types of entities: documents, queries and individuals. Possible associations between these entities are given in order to justify their inclusion in the retrieval model. We illustrate the application of the domain model, using mediums from section 1.2 as examples. Practical issues for the application of the domain model are discussed, as well as privacy concerns and acceptance problems. Social information retrieval is classied as a kind of metadata analysis and related to other types of association analysis. It is compared to similar approaches that lack important characteristics of a social ir system.
41
Chapter 6 Techniques
As detailed in chapter 5, what sets social ir apart from other information retrieval settings is the inclusion of a social network. The constituents of the social network are not the objective of the retrieval process; instead, they provide additional information about the retrievable items. This information needs to be integrated in the retrieval process in a meaningful way.
42
Chapter 6 Techniques
related to
individual
pr o
du c
ed
by
query
Figure 6.1: A model for a concrete social ir task, using only a subset of the associations present in the general domain model. We describe two techniques for this task: one global technique, based on the PageRank algorithm, and one local technique, based on spreading activation search. The global technique is motivated by the idea that we would be more interested to read what an authoritative person has to say about a topic, regardless of what the topic is. The local techniques implements the notion that an author is knowledgeable about a subject if he is connected to other authors working in the same eld.
43
|D| +1 df(t) + 1
Scores are normalized to fall in a range of 0.0 to 1.0. This weighting scheme is easily related to the standard vector-space model by using tf(t, d) instead of tf(t, d) and dening tf(t, q) 1. Then score(q, d) = cos (q, d) = =
tT tT
qd q d tf(t, q) idf(t)
2
tf(t, d) idf(t)
2 tT
tf(t, q) idf(t)
tq
tf(t, d) idf(t)
tf(t, d) idf(t)2
2 td tf(t, d) idf(t)
2 tq idf(t)
2 By omitting the term idf(t)2 from the term td tf(t, d) idf(t) in the denominator, one arrives at the main scoring formula in equation (6.1). Omitting the inverse document frequency from the document normalization factor allows one to precompute this factor and store it in the index; otherwise it would be necessary to recompute the normalization factors every time a document is added or deleted from the index. Lucene includes various modications of the scoring method to account for partial matches and for the proximity of terms; these are not used in our experiments in section 7 and are not described here. The exact formulation of the weighting formula is not crucial; one could also replace the baseline method by dierent version of the vector-space model, or use a probabilistic approach. This fact allows us to replace the text retrieval component by a state of the art implementation.
6.3 PageRank
PageRank is a global authority measure for graphs; how to compute it is described in section 3.2. Its primary use is an authority measure for web pages.
44
Chapter 6 Techniques is always 1. Therefore, the convergence of PageRank depends on the magnitude of 2 , which is small compared to 1 for power-law graphs. The power law holds true for the web graph; recent studies have determined that the in-degree of nodes on the web graph follows a power-law distribution with an exponent of about 2.1, thus ensuring rapid convergence of the PageRank computation. The same power law is applicable to social networks, making them similarly suited for PageRank analysis. Another prerequisite for convergence of the PageRank algorithm is that the underlying Markov chain is ergodic, ie. that the random walker has a nite probability of re-visiting every node. This is usually ensured by introducing the teleportation step; but even with teleportation, unintentional eects occur on graphs with several connected components. For example, a small component that is heavily interlinked (or even a single node linking to itself) may have a disproportionate amount of PageRank bestowed on it, compared to nodes in larger connected components. Increasing the parameter in equation (3.1) ameliorates this problem, but does not solve it. Empirical analysis of the web graph (Broder et al., 2000) showed that 91% of all surveyed pages are part of a single giant weak component. This number is well in agreement with random graph theory, which predicts that a random graph with more than log |V| edges per node will consist of one giant connected component of size (|V|) (see for example Janson et al., 1993). If one takes the direction of hyperlinks into account, the largest strongly connected component contains only 28% of all nodes, and that the probability of a path existing from randomly chosen source and destination nodes is just 24%. This is a signicant deviation from PageRanks premise that every page can be reached from every other page. It is still unclear whether this structure is an artifact of the web, or whether it is indeed typical for random directed power-law graphs. Preliminary results from Newman et al. (2001) indicate that the bow-tie structure of the web (a term coined by Broder et al. (2000)) is close to that of a random directed power-law graph. Similar analysis of social networks (from Newman, 2001) was conducted on scientic collaboration networks. For a collaboration network extracted from the medline database, 91% of all authors are part of a single connected component. Most models treat social networks as undirected graphs, which accounts for the larger percentage of nodes that are reachable from each other. No survey is available that examines directed social networks; if the bow-tie structure is indeed a characteristic of random directed power-law graphs, it is also to be expected for social networks. The similarities in structure of the web graph and social networks suggest the use of PageRank as an importance measure for individuals in a social network. For the web graph, PageRank has a very intuitive interpretation; namely, it is the amount of time a random surfer would spend on a given page. For social networks, especially in the context of information production, there is no such intuitive interpretation. One might imagine a book of knowledge that is passed along social links, for every author
45
Chapter 6 Techniques
Table 6.1: PageRank scores for the coauthorship network of the sigir corpus. Scores are normalized and are computed with a teleportation probability of = 0.3. rank 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. name Bruce W. Croft Clement T. Yu James P. Callan Norbert Fuhr Susan T. Dumais Mark Sanderson Nicholas J. Belkin Vijay V. Raghavan James Allan Jan O. Pedersen Justin Zobel Jian Yun Nie Stephen E. Robertson C. J. van Rsbergen Peter Bruza Alistair Moat Maristella Agosti Yasushi Ogawa Gareth J. Jones Sung Hyon Myaeng PageRank 7.929 4.716 4.092 3.731 3.731 3.601 3.518 3.303 3.200 3.135 2.992 2.982 2.959 2.856 2.779 2.757 2.588 2.544 2.493 2.492
to look at while it is in his possession. Under this interpretation, the PageRank value of an author would be the amount of time that this book is in his possession, ie. the amount of time he has to copy material from the book of knowledge. (The hungarian mathematician Paul Erds frequently referred to The Book, an imaginary book which contains all the most elegant mathematical proofs.) In order to get an idea of the application of PageRank to a social network, it is instructive to compute the PageRank scores for a well-known social network. We computed PageRank scores for a coauthorship network extracted from 25 years of sigir proceedings (from 19782003); the twenty highest-ranking authors are listed in table 6.1. For anyone working in information retrieval, most if not all of the names in the list will be very familiar and will be recognized as authorities of the eld. We also computed PageRank scores for the social network extracted from a mailing list archive of the origami-l mailing list; the highest-ranking individuals are listed in table 6.2 and will be equally recognizable if one is familiar with the mailing list. As far as we can conclude from these examples, PageRank is a measure that corre-
46
Chapter 6 Techniques
Table 6.2: PageRank scores for the social network of the origami-l corpus. Scores are normalized and are computed with a teleportation probability of = 0.3. rank 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. name David Lister Joseph Wu Michael Ujin Sanders Jose Tomas Buitrago Mark Kennedy Julia Paly Candice Bradley Lar deSouza Dorothy Engleman Leong Cheng Chit Dorothy Kaplan J. C. Neal Joshua Koppel Juan Carlo Rodrigues Rick Beech Zack Brown Nathan Janet Hamilton Marilyn Lewis Kenneth Kawamura address DLister891@. . . josephwu@. . . ghtipnfold@. . . buitrago@. . . KennedyM@. . . jupaly@. . . candice.bradley@. . . fresco@. . . FoldingCA@. . . leongccr@. . . DORIGAMI@. . . jcneal@. . . Skiy1@. . . juancarlor@. . . Ricknbeech@. . . zbrown@. . . rockmanex6@. . . mikeinnj@. . . Abbmackdes@. . . MadHawn@. . . PageRank 8.831 8.377 8.179 7.452 6.898 6.681 6.173 5.943 5.007 4.670 4.660 4.308 4.285 4.102 4.068 4.067 3.905 3.894 3.880 3.847
47
48
Chapter 6 Techniques browsing an ontology or a document catalog, one may choose to order the documents in one category by their score rd , in order to display the most important documents rst. A linear combination of relevance scores score(q, d) + rd oers a rich potential for optimizing the impact of the PageRank score in regard to the relevance score. Because of the diering distributions of score and r, it may be necessary to transform the PageRank scores. Zaragoza et al. (2004) suggest using log r or (1 + exp( log r + b))1 instead of r, after normalizing the PageRank scores. The parameters , and b need to determined by experimentation. A very simple method of combining PageRank and relevance scores is rd score(q, d) (6.2)
For our purposes, this method has the advantage of not having tunable parameters, and being invariant to normalization. We choose this method for the experiments in chapter 7.
49
Chapter 6 Techniques
query
individuals documents
Figure 6.2: An associative network models the relationship between users as well as between items of content. Query nodes (denoted by ?) are transient nodes introduced into the network to express the relevance of a document as regards a query. The initial relevance of a document as regards a query is determined using an automatic information retrieval system; we use a system based on the vector-space model as in section 6.2. Authors of relevant documents are presumed to be experts as regards the query topic. An author is presumed to be authoritative if he has social ties with many experts. Likewise, he is presumed to be authoritative if he has written many documents about the topic. The relevance of a message depends on both its initial relevance (as estimated by a text retrieval system) and the authority of the author. We implement spreading activation search on an associative network as in gure 6.2. The users information needs are represented by a query node (denoted by ? in gure 6.2), which stores the query keywords. The underlying text retrieval system estimates the relevance of the documents as regards the query keywords and adds edges from the query nodes to the document nodes accordingly. The edges are weighted according to the relevance score produced by the underlying retrieval system and are in a range between 0.0 and 1.0.
50
Chapter 6 Techniques The query node is initially activated with a xed amount of activation energy. Spreading activation proceeds according to the following rules and constraints: We constrain spread to nodes with a distance of two links or less to the initial query node. This constraint allows activation of neighbouring document nodes of the query node (with a distance of one) and their author nodes (with a distance of two). Spreading terminates after four iterations. Combined with a distance constraint of two, four iterations spread the activation energy from the query node to the author nodes, and back to the document nodes. In the pre-adjustment stage, we use full strength spreading, as this type of preadjustment rewards nodes with a high degree: Nodes with a high fan-out serve as multipliers and increase the amount of activation spreading through the network. We do not use equal distribution spreading since it conserves the amount of activation energy, and penalizes nodes with a high fan-out. We use an activation decay of 0.1: After each pulse, the residual activation of a node is reduced to one tenth before adding it to the incoming activation energy. This factor limits the eect of the initial activation. Because the spreading activation algorithm does not distinguish between node types, we use custom parameters in two of the ve iterations: During the rst pulse, we use an activation decay of 0.0. At this time, only the query node is activated, and activation spreads from the query node to the initial document nodes. By using an activation decay of 0.0, we ensure that the query nodes activation is 0.0 after the rst pulse, and that it does not re-activate the initial document nodes. During the third pulse, we constrain spreading to edges between author nodes. At this stage, activation has arrived at author nodes, and activation energy from multiple messages by the same author has been accumulated. By constraining spread to author nodes in this activation, we emphasize the importance of the social network. After the fourth pulse, the initially activated documents are returned, sorted by their activation level. The described adjustments and constraints are chosen to express an intuitive notion of social search. Dierent applications will require a dierent set of constraints. The large number of possible constraints and parameters make it infeasibel to search through this conguration space in a systematic manner. Small changes in parameters or the stage at which adjustments and constraints are applied can have a profound eect on the resulting activation levels. Whether other parameter sets for social search exist with a similar or better performance is subject to extensive experimentation.
51
Chapter 6 Techniques
6.4.2 Example
A schematic depiction of the spread of activation through the associative network is in gure 6.3. The domain is similar to the one described in the example in section 5.1: It contains ve individuals i1 , . . . , i5 and ve documents d1 , . . . , d5 . The rst individual i1 has social ties with the next three individuals i2 , i3 and i4 , whereas i5 has no social ties with another individual. A query node q points to all ve documents, and every document is associated with its author. We see that activation spreads from the query node to the document nodes in the rst iteration, after which the activation of the query node drops to zero. After the second pulse, activation arrives at author nodes; in the third iteration, document nodes retain part of their activation level, while activation accumulates in the dominant nodes of the social network. In the fourth iteration, this accumulated activation is spread back to the document nodes. As described in the last subsection, we use an activation adjustment in the postadjustment phase of f24 (x) = 0.1x. In the rst iteration, we use f1 (x) 0. The a a distance constraint is not active in the example network, as all nodes have a distance of two or less from the query node.
Initially, the only activated node is the query node q with an activation energy of 100: a0 = 100 q
In the rst iteration, the full activation energy is spread from the query node q to the document nodes d1 , . . . , d5 . No preadjustments are active, causing the document nodes to receive the full activation energy. Because an activation decay of 0.0 is active in this iteration, the activation of the query node drops to zero, causing it to become deactivated: a1 = f1 (a0 ) = 0 q a q a1 1 = a0 = 100 q d . . . a1 5 = a0 = 100 q d
In the second iteration, the energy of the document nodes d1 , . . . , d5 is spread to their respective author nodes i1 , . . . , i5 . Because an activation decay of 0.1 is
52
Chapter 6 Techniques
i4 i3 i2 i1
(0) (0) (0) (0)
i4 i3 i2 i5
(0) (0) (0)
i1
(0)
(0)
i5
(0)
q
(100)
q
(0)
d1
(0)
d2
(0)
d3
(0)
d4
(0)
d5
(0)
d1
(100)
d2
(100)
d3
(100)
d4
(100)
d5
(100)
i4 i3 i2 i1
(100) (100) (100) (100)
i4 i3 i2 i5
(100) (110) (110)
i1
(310)
(110)
i5
(10)
q
(0)
q
(0)
d1
(10)
d2
(10)
d3
(10)
d4
(10)
d5
(10)
d1
(1)
d2
(1)
d3
(1)
d4
(1)
d5
(1)
i4 i3 i2 i1
(362) (322) (322) (322)
i4 i3 i2 i5
(2) (322) (322)
i1
(362)
(322)
i5
(2)
q
(0)
q
(0)
d1
(310.1)
d2
(110.1)
d3
(110.1)
d4
(110.1)
d5
(10.1)
d1
(310.1)
d2
(110.1)
d3
(110.1)
d4
(110.1)
d5
(10.1)
(f) result
Figure 6.3: Schematic depiction of activation spread through the associative network. Numbers in parentheses are the activation level of the node in this iteration; red arrows signify activated edges.
53
Chapter 6 Techniques active, the energy of the document nodes drops to one tenth of its value:
a21 = a1 1 = 100 i d . . . a25 = a1 5 = 100 i d a2 1 = f2 (a1 1 ) = 0.1 100 = 10 a d d . . . a2 5 = f2 (a1 5 ) = 0.1 100 = 10 a d d
In the third iteration, spread is constrained to author nodes: i1 receives additional activation from i2 , i3 and i4 , in addition to its initial activation of ai4 reduced to one tenth. The activation of document nodes drops to one tenth, as does the activation of all other nodes:
a31 = a22 + a22 + a22 + f3 (a21 ) a i i i i i = 100 + 100 + 100 + 0.1 100 = 310 a32 = a21 + f3 (a22 ) = 100 + 0.1 100 = 110 a i i i . . . a34 = a21 + f3 (a24 ) = 100 + 0.1 100 = 110 a i i i a35 = f3 (a25 ) = 0.1 100 = 10 a i i a3 1 = f3 (a2 1 ) = 0.1 10 = 1 a d d . . . a3 5 = f3 (a2 5 ) = 0.1 10 = 1 a d d
In the last iteration, energy is spread from the author nodes back to the document
54
Chapter 6 Techniques nodes. Author nodes also receive activation from document nodes: a41 = a32 + a33 + a34 + a3 1 + f4 (a31 ) = 110 + 110 + 110 + 1 + 0.1 310 = 362 a i i i i i d a42 = a31 + a3 2 + f4 (a32 ) = 310 + 1 + 0.1 110 = 322 a i i i d . . . a44 = a31 + a3 4 + f4 (a34 ) = 310 + 1 + 0.1 110 = 322 a i i i d a45 = a3 5 + f4 (a35 ) = 1 + 0.1 10 = 2 a i i d a4 1 = a31 + f4 (a3 1 ) = 310 + 0.1 1 = 310.1 a d d i a4 2 = a32 + f4 (a3 2 ) = 110 + 0.1 1 = 110.1 a d d i . . . a4 4 = a34 + f4 (a3 4 ) = 110 + 0.1 1 = 110.1 a d d i a4 5 = a35 + f4 (a3 5 ) = 10 + 0.1 1 = 10.1 a d d i
We see that spreading activation search achieves our desired result of promoting authors with many social links, while penalizing solitary authors.
6.5 Summary
We describe an associative network model for one concrete information retrieval task, namely keyword-based retrieval on a domain where author information and a social network between authors is available. Vector-space retrieval is used as the underlying text retrieval method, and is used as a baseline performance measure in evaluation. Two techniques are described, one based on a global authority measure for the social network, and one based on exploring local links in the associative network. The global technique is based on the PageRank authority measure; PageRank scores are computed for the social network and combined with relevance scores from vectorspace retrieval to determine the ranking of results. The suitability of PageRank as a measure of authority is demonstrated on two example networks. Spreading activation search is used as a local technique; it is based on exploring the social neighbourhood of a relevant documents author. An intuitive method of assessing a documents relevance based on the authors social network is given. This method is implemented as a set of constraints and adjustments for spreading activation search.
55
Chapter 7 Evaluation
In this section, we evaluate the eectiveness of social retrieval techniques, as described in chapter 6, in comparison with conventional retrieval techniques. Due to the absence of standard corpora with suitable characteristics, we use two locally compiled corpora. We evaluate the techniques in a known-item retrieval setting and compare them to the baseline technique described in section 6.2 using the metrics average rank and inverse average inverse rank as in section 3.7.2. Evaluation based on the precision and recall metrics as in section 3.7.1 requires labour-intensive screening of the complete corpora, as well as the collaboration of several experts in the domain of the corpora. In comparison, a known-item retrieval setting reduces the amount of manual labour required and allows a semi-automatic selection of items, as described in the following sections. By comparing with a baseline technique on the same index, we eliminate external factors that may account for dierences in performance; this allows us to gauge the impact of social retrieval techniques on retrieval performance.
7.1 Corpora
The domain model for social information retrieval as in gure 6.1 requires that a social network between individuals is present in the evaluation corpus, as well as associations between individuals and documents. In this section, we describe two corpora that satisfy these requirements and which are used for evaluating the eectiveness of social ir techniques. We explain how a full-text index is constructed and how the social network between the authors of the document is extracted. We also include statistical characteristics of the corpora and of the extracted social networks. We examine whether the social networks display the expected characteristics from statistical network analysis as described in section 3.4.
56
Chapter 7 Evaluation in rfc 822 format (Crocker, 1982) is available. For evaluation, two dierent subsets of the corpus are used, one containing messages from 20002005, and one from 2004. For the full-text index, the following strategy is used: 1. Both the message body and the Subject: line are included in the full-text index. When choosing evaluation queries as in section 7.2.1, this ensures that the desired document for known-item retrieval is found in any case. 2. Heuristics are used to detect common types of markup for signatures and quoted text; these parts are removed. This step ensures that only content actually produced by the author of the messages is included in the full-text index. 3. Remaining content is tokenized and lowercased. 4. Stopwords are removed, using a stopword list by Jacques Savoy2 . 5. For statistical purposes, bi- and trigrams are extracted; they are not used for searching. In addition to the full-text index, an associative network is constructed from the messages: An author node is constructed for each email address. No eort is made to reconcile dierent email addresses of one person. Every message is linked to its author, and every author is linked to his messages. Messages are linked to their follow-ups, and vice-versa. Whether a message is a follow-up to another is determined from the In-Reply-To: and References: header lines. No attempt is made to match messages to their follow-ups by textual means. Authors are linked to each other based on how often they respond to one anothers messages. Statistics of the two subsets are listed in table 7.1; the degree distribution for the social network is in gure 7.1. When calculating statistics for the social network, we use the underlying undirected graph, ie. we treat all social links as undirected links. This is in accordance with the usual techniques in social network analysis, which are mostly concerned with undirected graphs. The social networks extracted from the corpus share typical characteristics with other social networks examined by Newman (2001). The giant connected components comprise about 70% of all nodes; less than the more than 90% commonly cited for the network of movie actors or the coauthorship network for the medline database, but on par with
2
57
Chapter 7 Evaluation Table 7.1: Statistical characteristics of the origami-l corpus. 20002005 44108 1834 7.959 1.093 1271 69.3 2 2.983 9 0.647 2004 4411 464 4.838 1.078 331 71.3 2 3.108 6 0.578
no. of messages no. of email addresses mean neighbours per address exponent size of giant connected component (gcc) as percentage [%] size of next-largest component average shortest path length in gcc diameter of gcc mean clustering coecient
smaller networks. The size of the next-largest weak components is very small compared to the size of the largest component. The average shortest path length in the giant connected component is very low at about three, and the diameters are 6 for the smaller corpus and 9 for the larger corpus. This makes the social network of the mailing list corpus a very small world. The degree distribution seems to follow a power law with an exponent of 1.1, similar to smaller coauthorship networks surveyed by Newman (2001). A graphical plot of the degree distribution is in gures 7.1 and 7.2. The regression curves were tted to the data using nonlinear least squares regression.
58
Chapter 7 Evaluation
100
300
80 60 40 20 0 10 20 30 40 50 60 70
200
100
Figure 7.1: The distribution of vertex degrees for the social network of the origami-l corpus. Vertices with degree (v) = 0 are omitted in the graph. The red line is a regression curve for the power-law distribution Pr((v) = k) k with as in table 7.1.
500
100
5 10 20 50 100200
50 20 10 5 2 1 1
5
(b) 2004
10
20
50
Figure 7.2: The distribution of vertex degrees for the social network of the origami-l corpus, plotted on a log-log scale; again, vertices with degree (v) = 0 were omitted. The logarithmic scale makes it evident that the graph follows a power-law distribution, as the regression curve becomes a straight line. The slope of the regression curve is the same as the exponent in table 7.1.
59
Chapter 7 Evaluation Table 7.2: Statistical characteristics of the sigir corpus. no. of documents no. of authors mean collaborators per author exponent size of giant connected component (gcc) as percentage [%] size of next-largest component average shortest path length in gcc diameter of gcc mean clustering coecient 1041 1397 2.863 312 22.3 146 6.303 16 0.902
constructing the social network implies that the network is undirected. As can be seen from the statistics for the sigir corpus in table 7.2, the corpus is rather small at just over one thousand documents; furthermore, it contains more authors than documents. Each author has on average less than three collaborators. The giant connected component is fairly small, comprising 22% of the coauthorship graph; this gure is markedly lower than the corresponding gure for the mailing list corpus, and also lower than the gures reported by Newman (2001). We presume that this is due to the small size of the corpus. Average shortest path length and diameter of the giant connected component are higher than the gures for the mailing list corpus, but comparable to gures reported for larger coauthorship networks. The degree distribution of the social network does not appear to follow a power law; instead, the probability of a vertex having degree k appears closer to Pr((v) = k) exp k kc
where kc is a constant. This may result from the small size of the corpus: Newman (2001) observed degree distributions for smaller social networks that were closer to a power law with an exponential cuto, that is Pr((v) = k) k exp k kc ;
He speculates that it is a result of the underlying distribution following a power law, with an external constraint that limits the maximum degree of a node. In our case, the constraint arises from the limited time frame and the small number of documents: An author can only have a limited number of publications in the sigir proceedings, and thus can only collaborate with a limited number of other individuals. As can be seen from gure 7.3, the degree distribution can be adequately explained using exponential decay (with kc 2.9); the power law hardly seems to aect the distribution.
60
Chapter 7 Evaluation
500
300
200 100 50 20 10 5 2 1 1 2
20
200
100
0 5 10 15 20 25 30 35 5 10
Figure 7.3: The degree distribution of the sigir corpus does not appear to follow a power law; it seems closer to an exponential distribution. Vertices with degree (v) = 0 are omitted in the graph. The red line is a regression line k for an exponential distribution Pr((v) = k) exp( kc ) with kc 2.9.
61
Chapter 7 Evaluation Selecting n-grams by frequency alone is sub-optimal, as some frequent n-grams correlate highly with the author of the containing messages (for example, periodic announcements usually contain the same Subject: line and are by the same author.) In order to remove these n-grams, the mutual information of the occurence of a specic n-gram in the Subject: line and the author of the messages is determined. Mutual Information, also called information gain in the context of machine learning, measures the amount of information shared by two random variables. The mutual information of two random variables X and Y is usually dened as I(X, Y) =
x y
Pr(X = x, Y = y) log2
An equivalent denition is (Hamming, 1980) I(X, Y) = H(X) H(X|Y) = H(Y) H(Y|X) where the entropy of X is H(X) =
x
Pr(Y = y)H(X|Y = y)
A high mutual information between the occurrence of a specic n-gram and the author of the containing messages is an indicator for an idiom that is used exclusively by few authors, and is not a good query phrase for evaluation. A desirable n-gram for use as a query phrase therefore has a low mutual information with the author, and a high document frequency at the same time. We sort n-grams by information gain divided by the frequency and use the n-grams with the lowest score for evaluation: score(n-gram) = I(n-gram, author) df(n-gram) (7.1)
Figure 7.2.1 shows the correlation between messages containing a specic n-gram and the author of the messages, as regards the document frequency. As the document frequency decreases, the correlation decreases as well, since distributions become more ordered. In the gure, one can discern a number of n-grams that have an unusually high correlation to one specic author. Table 7.3 lists the n-grams with the lowest score for the Subject: lines, for the origami-l corpus for 2004. Terms printed in italics are chosen as query terms for known-item retrieval. In the case of overlap between n-grams, the longest n-gram is chosen.
62
Chapter 7 Evaluation
Table 7.3: n-grams from Subject: headers, sorted by score. Terms in italics are selected as query terms for known-item retrieval. (data: origami-l archives for 2004, scores as in equation 7.1.) n-gram origami sighting crease patterns 5 favorite favorite models 5 favorite models rose polygon art craft roses project cp short cp short cruel current model favorite current favorite current model cruel punishment short cruel short cruel punishment collector accumulator folding clothes tension folding rolling ball identify image nick robinson teaching origami lang origami sh model df(n-gram) 98 42 36 36 36 20 36 15 26 26 15 15 15 29 29 29 15 11 13 10 12 21 12 11 17 score(n-gram) 104 5.148 5.884 6.966 6.966 6.966 7.143 7.158 7.618 7.692 7.692 7.704 7.704 7.704 7.842 7.842 7.842 8.122 8.161 8.199 8.214 8.321 8.326 8.341 8.595 8.612
63
Chapter 7 Evaluation
0.003
I(n-gram, author)
0.03
0.02
0.01
0 0
10 20 30
0.002
0.001
0 0 10 20 30 40
40
df(n-gram)
(a) information gain vs. doc. frequency
df(n-gram)
(b) information gain divided by doc. frequency vs. doc. frequency
Figure 7.4: Measuring the correlation between the occurence of a specic n-gram in the subject of emails and the author of the message. (data: origami-l archives for 2004) For each of the ten queries, one message is chosen as the known item, the objective of this search: Only messages from 2004 are considered as relevant, and only those messages are assessed that actually contain the sequence of query terms in the Subject: line. The criteria for relevance are selected to mimic a searcher looking for an item he has seen before: He would probably remember the subject of the message, and from the pool of messages with a matching subject, the most memorable one is chosen. The items to be retrieved are chosen by the author, who is an expert in the subject matter, and by a complete novice as regards paperfolding. Using two dierent relevance assessments allows us to evaluate whether a social ir system caters more to novice users who desire more general results of high quality, but know next to nothing about the authors, or expert users who may have more specic interests, and can judge a persons authority within the community without assistance of the social ir system.
64
Chapter 7 Evaluation
Table 7.4: The ten most-cited documents in the sigir corpus, with query phrases derived from the document title document A language modeling approach to information retrieval (Ponte and Croft, 1998) Reexamining the cluster hypothesis: scatter/gather on retrieval results (Hearst and Pedersen, 1996) A hidden Markov model information retrieval system (Miller et al., 1999) Relevance feedback revisited (Harman, 1992) Pivoted document length normalization (Singhal et al., 1996) Automatic phrase indexing for document retrieval (Fagan, 1987) Information retrieval as statistical translation (Berger and Laerty, 1999) Inference networks for document retrieval (Turtle and Croft, 1990) Probabilistic Models of Indexing and Searching (Robertson et al., 1981) Towards interactive query expansion (Harman, 1988) query phrase language modeling citations 13
scatter gather
11
hidden markov model relevance feedback document length normalization automatic phrase indexing statistical translation inference networks probabilistic models interactive query expansion
11 11 11 10 10 9 9 8
further biased by inadequacies in the information extraction methods used to extract the citations. We select the ten most-cited documents as the most inuential (or authoritative) documents in the corpus, and use those as known items in a known-item retrieval setting. Query phrases are determined from the title of the publication. Table 7.4 lists the selected documents, as well as query phrases and the number of citations. The mostcited publications include documents from 19811999; we surmise that newer documents have not been available long enough to acquire a signicant number of citations.
65
Chapter 7 Evaluation Rankings are not necessarily unique, as they rely on sorting according to a numerical score. In case of ambiguities, we report the ranks and derived metrics as intervals.
66
Chapter 7 Evaluation baseline method, inverse average inverse rank 14.018 0.089 versus 8.787 0.040 for the baseline method.) Comparable results are achieved for the novice searcher (average rank 52.9 versus 39.35 0.35 for the baseline, inverse average inverse rank 14.358 versus 4.962 0.013 for the baseline.) As noted by Crestani (1997), the eectiveness of spreading activation search depends crucially on the structure of the associative network. In particular, nodes with a high degree, which are found more frequently in the larger subset of the mailing list corpus, often need special treatment. Further experiments are needed to determine suitable procedures for the treatment of nodes with a high degree in the social network.
67
Table 7.5: Known-item retrieval on mailing list data, using messages from 2004. Columns labelled VS contain ranks from vector-space search as in section 6.2, columns labelled PRVS contain ranks scored by pagerank times vector space score as in equation 6.2 in section 6.3, and columns labelled SA contain ranks using spreading activation search as detailed in section 6.4. Rows rank change and IAIR change contain the change compared to the baseline method VS in percent. method: searcher: VS expert PRVS expert SA expert VS novice PRVS novice SA novice
Chapter 7 Evaluation
68 14.75 0.25 7.548 0.032 17.95 0.05 +21.7 2.4 7.082 0.010 6.2 0.5 15.75 0.05 +6.8 2.1 3.814 0.008 49.5 0.3
crease patterns 5 favourite models rose polygon art craft roses project favourite current model short cruel punishment collector accumulator folding clothes tension folding
44 0 25 0 40 25 0 15.5 0.5 14 0 29 0 30 20 18 0
40 0 11 0 50 35 0 9.5 0.5 14 0 24 0 10 10 17 0
Chapter 7 Evaluation
Table 7.6: Known-item retrieval on mailing list data, using messages from 20002005. Columns labelled VS contain ranks from vector-space search as in section 6.2, columns labelled PRVS contain ranks scored by pagerank times vector space score as in equation 6.2 in section 6.3. Rows rank change and IAIR change contain the change compared to the baseline method VS in percent. method: searcher: crease patterns 5 favourite models rose polygon art craft roses project favourite current model short cruel punishment collector accumulator folding clothes tension folding rank: rank change [%]: IAIR: IAIR change [%]: VS expert 71 0 34.5 0.5 50 40.5 0.5 15.5 0.5 80 25.5 1.5 90 20 33 0 24.4 0.3 8.787 0.040 PRVS expert 279 0 29 0 30 11 0 13.5 0.5 22 0 29 0 20 30 23 0 41.45 0.05 +69.9 2.3 6.697 0.012 24.6 0.5 VS novice 167 1 48.5 0.5 50 89 0 10 80 20 2 13 0 20 40 0 39.35 0.35 4.962 0.013 PRVS novice 145 0 51 0 30 117 0 30 22 0 12 0 13 0 30 27 0 39.6 0 +0.6 0.9 7.86 0 +58.4 0.4
69
Table 7.7: Known-item retrieval on the sigir corpus. Columns labelled VS contain ranks from vector-space search as in section 6.2, columns labelled PRVS contain ranks scored by pagerank times vector space score as in equation 6.2 in section 6.3. Rows rank change and IAIR change contain the change compared to the baseline method VS in percent. method: source: VS title PRVS title VS abstract PRVS abstract VS fulltext PRVS fulltext
Chapter 7 Evaluation
70 1.35 0.35 1.159 0.159 rank: rank change [%]: IAIR: IAIR change [%]: 2.25 0.05 +79.7 50.3 1.362 0.046 +20.3 20.5
language modeling scatter gather hidden markov model relevance feedback document length normalization automatic phrase indexing statistical translation inference networks probabilistic models interactive query expansion 2.5 0 1.215 0
10 10 10 10 0 10 10 20 1.5 0.5 20 20
12 0 10 10 10 10 10 20 10
30 10 30 60 10 30 20 10
Chapter 7 Evaluation well-connected individuals at the center of the social network: If no hub in the network lends authority to a new idea and serves as a multiplier, it is unlikely to spread through the social network at all. Examining the rst-ranked documents, we nd that in ve out of eight times, the desired document is listed in the bibliography; in one case, there is a citation trail of length two between the rst-ranked document and the desired document. This substantiates our claim that the highest-ranking individuals serve as disseminators of information. We conclude that social ir is not applicable in this evaluation setting. There are several reasons limiting the eectivity of social ir in this setting, caused both by characteristics of the corpus and by the evaluation methodology: It is widely believed that the benets of link analysis for information retrieval are greatest for underspecied queries, combined with a large document collection containing many relevant documents that dier widely in quality. Both conditions are violated by the sigir corpus, since it is very small, focused on a narrow domain, and contains only high-quality documents. The queries are not under-specied, but are chosen to match one specic document. The methodology of selecting known documents is biased towards innovators, whereas the social retrieval techniques are biased towards multipliers.
7.4 Summary
Two techniques for social search, one based on PageRank and one based on spreading activation search, are compared to conventional vector-space search in a known-item retrieval task. Evaluation is carried out on two corpora: A mailing list archive containg messages from the years 20002005 from the origami-l mailing list, and a set of publications from the proceedings of the acm sigir conference from 19782003. Query phrases for evaluation on the mailing list corpus are derived from frequent biand trigrams in the Subject: lines of the messages; known items are selected by human experts. For the corpus of conference proceedings, the most-cited documents in the corpus are selected as known items; query phrases are derived from their titles. Two evaluation metrics are used for comparing the performance of the retrieval methods: average rank and inverse average inverse rank, as in section 3.7.2. On the mailing list corpus, the social retrieval method based on PageRank shows a marked improvement of inverse average inverse rank in three out of four scenarios; social search with PageRank decreases the average rank in one out of four scenarios. Spreading activation search halves the inverse average inverse rank on a subset of the mailing list corpus which contains messages from one year, and decreases the average rank by one fth in one scenario. On the full mailing list archive, no improvement can be detected when using spreading activation search, as regards both average rank and inverse average inverse rank. On the corpus of conference proceedings, neither social search technique shows an improvement. It is conjectured that this is an eect of the method for choosing evaluation
71
72
73
8.2 Technology
The prototype system is written in the Java language, using the j2se 1.4.2 sdk. In addition to the components provided by the sdk, the following open-source components were used: Apache Lucene1 (see Gospodneti and Hatcher, 2005) is a text search engine library which implements the vector-space model (see section 6.2). Lucene stores the index in a set of les; the index is used for storing both the full-text index and the associative network. jung Java Universal Graph/Network Framework2 (see OMadadhain et al., 2005) is a library for modeling, analyzing and visualizing a wide variety of graphs. The classes used in the prototype for representing the associative network are directly derived from appropriate jung classes; we also use jungs PageRank implementation as well as statistics. Sun JavaMail3 is a framework for mail and messaging applications; it is used for parsing email archives in rfc 822 format. Colt4 is a set of libraries for high-performance scientic and technical computing. It is used in the prototype for linear algebra, matrix arithmetic and descriptive statistics. jdom5 is a library for reading, manipulating and writing xml documents; it is used in the prototype for processing conguration les. In general, we tried to nd open-source components for common tasks, in order to reduce development time.
8.3 Components
The prototype is subdivided into several components, which are described in this chapter. It contains components for modeling the associative network, for reading a network from external storage, and for searching the network. Indexing and extraction of the network is separated from the storage and retrieval architecture. Evaluation is performed by dedicated classes.
74
SearchNode # factory: SearchNodeFactory + + + + + + + + + SearchNode(type, id) getFactory() setFactory(factory) getId() setId(id) getType() setType(type) putDatum(key, value) getDatum(key)
SearchNodeFactory + SearchNodeFactory(cong)
http://lucene.apache.org/java/, last visit on 2005/10/18. http://jung.sourceforge.net/, last visit on 2005/10/18. 3 http://java.sun.com/products/javamail/, last visit on 2005/10/18. 4 http://dsd.lbl.gov/~hoschek/colt/, last visit on 2005/10/18. 5 http://www.jdom.org/, last visit on 2005/10/18.
75
Chapter 8 Implementation Notes always associated with the factory that produced them. A SearchGraph may be initialized with a conguration le in xml format, in which case factories for the types declared in the conguration le will be created automatically; for the format of the conguration les see section 8.4. The storage component supports lazy loading of nodes; the boolean load argument of the SearchGraph constructor determines whether the complete graph is loaded into memory at initialization time, or whether it is loaded on demand.
8.3.2 Storage
The storage component (gure 8.2) is centered around the concept of a backing store that provides access to parts of the associative network stored in external memory. A backing store provides methods to fetch a new node identied by its type and its id, as well as fetch the neighbours of a node. One backing store may provide access to several dierent types of nodes. Two implementations of a backing store are available: A JDBCBackingStore provides access to nodes stored in a relational database, using a jdbc driver; a LuceneBackingStore interfaces with a Lucene index. The JDBCBackingStore currently does not support full-text queries, since full-text search is not a standard feature of relational databases. A query node is produced by requesting a node of the appropriate type (stored as a constant in the SearchNodeBackingStore interface) from the backing store. The query phrase is attached to the query node; when fetching the neighbours of the query node, the query is automatically executed, and edges to matching documents are added. Applications typically do not use backing stores directly; instead, a SearchNodeFactory is created, which initializes the backing stores and registers itself to the SearchNodeFactoryManager. The factory manager provides access to the factory for a given type. A factory also includes a cache for nodes which have already been fetched from the backing store.
8.3.3 Search
The SocialSearch class provides a common interface for social search algorithms (gure 8.3). The class returns a SearchHits object, which contains the nodes matched by the search, in order of their score. The hits can be ltered by a eld value, and can be restricted to a set of nodes. Two algorithms are implemented, one based on PageRank (described in section 6.3), and one based on spreading activation search (section 6.4). The PageRank class implements PageRank search; it needs to be supplied with a bias value, the type identier of the person nodes, and the graph for which PageRank values should be computed. PageRank computation is perfomed when the class is initialized.
76
interface SearchNodeBackingStore DEFAULTWEIGHT: double QUERYTYPE: String QUERYKEYWORD: String + + + + + fetch(type, id) fetchNeighbours(node) listTypes() listIds(type) fetchWeight(from, to)
SearchNodeFactory + SearchNodeFactory(cong)
SearchNodeCache
inner class JDBCTypeBackingStore inner class LuceneTypeBackingStore inner class inner class LuceneQueryFactory JDBCLinkBackingStore
77
returns
SpreadingSearch + + + + + + + + SpreadingSearch(cong) activateNode(node, amount) addPreAdjustment(adj) addPostAdjustment(adj) addActivationAdjustment(adj) addConstraint(constraint) addTerminationCheck(check) clear()
inner interface Adjustment + + + + + + apply(node, value) fromIteration(int) toIteration(int) init() beginIteration(int) endIteration(int)
inner interface Constraint + + + + + + + accept(edge) fromIteration(int) toIteration(int) init() beginIteration(int) endIteration(int) reset()
Decay + Decay(amount)
DistanceConstraint + DistanceConstraint(dist)
MaxIterations + MaxIterations(int)
Constant + Constant(amount)
EmptyActiveSet
EqualDistributionSpreading
UnitSpreading + UnitSpreading(amount)
Threshold + Threshold(amount)
Chapter 8 Implementation Notes The SpreadingSearch implements spreading activation search. Adjustments, constraints and termination checks are implemented as inner classes; they are executed in the order in which they are added to the SpreadingSearch object. They may be activated in specic iterations only. An adjustment changes the activation value for a particular node; it is applied to the output energy, the input energy, or the activation energy of a node, depending on the stage to which it is added. Several adjustments may be active in one stage and are applied in the order in which they were added to the SpreadingSearch object. A constraint determines whether activation spreads via an edge during the spreading stage. Constraints are also taken into account during pre- and post-adjustment, for example when determining the outgoing edges for equal distribution spreading.
8.3.4 Indexing
Indexing is separated from the storage and retrieval architecture; it is implemented in utility classes which convert from the source representation to a Lucene index. For the mailing list archive, the source representation is a set of les which contain one email each, in rfc 822 format. Indexing of emails is a two-pass process, because the Lucene index structure does not support updating individual elds of a document once it has been written to the index. In the rst pass, messages are read from the source les, using the JavaMail api, and are added to the index. An integer identier is assigned to each message. For each newly encountered email address, a person record is added to the index. The result of the rst pass is a full-text index of the email messages, which lacks the social network between authors as well as references between messages. In the second pass, the index from the rst pass is used to resolve references between messages. A new index index is written, containing all the information in the rst-pass index, with references added. The social network of authors is extracted, based on how often an author replied to messages by another. This information is also added to the second-pass index. In the case of the sigir corpus, detailed information about the documents and their authors is already available in a relational database. The documents are available electronically in pdf format and have been converted to plain text. The indexer reads meta-information from the database and and adds it to the index; the document text is read from the converted pdf les.
8.3.5 Evaluation
Evaluation is performed by two classes, one performing evaluation of the baseline method and one performing evaluation of social search techniques; they are derived from a common superclass (see gure 8.4.) A known-item retrieval task consists of a dataset, a
79
KnownItemRetrievalLucene
KnownItemRetrievalSocial
Figure 8.4: Class diagram for the evaluation classes retrieval method, and a number of known items. A known item consists of the desired document and the associated query terms. The evaluation classes read a description of the dataset, the retrieval method and the known items from a conguration le, execute the queries and report the rank at which the desired document is found. Average rank and inverse average inverse rank are also reported; their calculation is performed using interval arithmetic. The format of the conguration les is described in detail in section 8.4.
The parameters of the retrieval method are described by the <searchparams> tag:
73 < searchparams >
80
Chapter 8 Implementation Notes Adjustments, constraints and termination checks for spreading activation search are dened using the corresponding tags <adjustment>, <constraint> and <terminationcheck>. The type attribute contains the type; in general, the type corresponds to the name of the implementing class in gure 8.3. The from and to tags determine in which iteration the class is active. For adjustments, the stage attribute determines the stage in which the adjustment is applied:
74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 < adjustment stage = " activation " type = " Decay " value = " 0.1 " / > < constraint type = " Di sta nce Cons tra int " value = " 2 " / > < terminationcheck type = " MaxIterations " value = " 4 " / > < adjustment stage = " activation " type = " Decay " value = " 0.0 " from = " 0 " to = " 0 " / > < constraint type = " TypeConstraint " fromtype = " person " totype = " person " from = " 2 " to = " 2 " / >
Parameters for PageRank search are congured using the <pagerank> tag; it has two attributes: type holds the type string of the person nodes, and bias attribute contains the bias for PageRank computation:
89 90 < pagerank type = " person " bias = " 0.3 " / > </ searchparams >
The dataset is congured using the <backingstore> "lucene" for a dataset contained in a Lucene index, compliant database. The <directory> tag contains index resides; the <analyzer> tag contains the class parsing query strings:
91 92 93 94 95 96 97
tag; its attribute type is either or "db" for a dataset in a jdbc the directory where the Lucene name of the analyzer to use for
< backingstore type = " lucene " > < directory > data / origami - l / indexplus / </ directory > < analyzer > org . apache . lucene . analysis . MessageAnalyzer </ analyzer >
The <type> tags dene node types contained in the dataset; the attribute name contains the type string, whereas the attribute keyword contains the keyword used to identify nodes of this type in the dataset. <field> tags describe elds which contain additional
81
Chapter 8 Implementation Notes information about the node. <link> tags describe links to other nodes; the target attribute contains the type of the target node, and the field tag holds the eld containing the id of the target node:
98 99 100 101 102 103 104 105 106 107 108 109 < type name = " person " keyword = " person " > < field > address </ field > < link target = " message " field = " message " / > < link target = " person " field = " followuplink " / > </ type > < type name = " message " keyword = " message " > < field > from </ field > < field > subject </ field > < field > date </ field > < field > filename </ field > < link target = " person " field = " fromlink " / > </ type >
The <query> tag describes the elds which are searched when executing full-text queries:
110 111 112 113 114 < query maxhits = " 5000 " > < field > text </ field > </ query > </ backingstore > </ experiments >
The following dtd describes the format of the conguration les in a concise manner:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 <? xml version = " 1.0 " encoding = " UTF -8 " ? > <! DOCTYPE experiments [ <! ELEMENT adjustment EMPTY > <! ATTLIST adjustment from NMTOKEN # IMPLIED stage NMTOKEN # REQUIRED to NMTOKEN # IMPLIED type NMTOKEN # REQUIRED value NMTOKEN # IMPLIED > <! ELEMENT analyzer (# PCDATA ) > <! ELEMENT backingstore ((( directory , analyzer )| database ) , type + , query ) > <! ATTLIST backingstore type ( lucene | db ) # REQUIRED > <! ELEMENT constraint EMPTY > <! ATTLIST constraint from NMTOKEN # IMPLIED fromtype NMTOKEN # IMPLIED to NMTOKEN # IMPLIED totype NMTOKEN # IMPLIED type NMTOKEN # REQUIRED
82
83
8.5 Summary
The prototype system implements the model and the techniques described in sections 5 and 6. It is implemented in the Java programming language, using the j2se 1.4.2 sdk. Open-source componets are employed for parts of the prototype. The prototype is implemented as a batch retrieval system, using a modular structure which allows for rapid implementation of dierent retrieval methods. The architecture supports storing the dataset in two formats: In a relational database with a jdbc driver, or in a Lucene index. Conguration of the system is performed using xml les. The conguration les contain a complete description of a known-item retrieval task, including the knownitem queries, the desired documents, the parameters of the retrieval methods, and a description of the dataset.
84
Chapter 9 Conclusion
In this thesis, we research how to integrate social networks in the information retrieval process and whether this integration leads to a performance improvement. We examine the process of information retrieval and production and how social interaction is present in these activities. In particular, several applications of the internet are identied as social media, for example wikis, blogs, or mailing lists. We propose a model for social information retrieval, which integrates the domains of social network analysis and information retrieval. Meaningful associations become apparent which are not part of the traditional models. We dene social information retrieval as a retrieval process which includes a well-dened subset of the constituents of the social ir model. Two techniques are described which implement social ir. Both techniques are inspired by previous attempts at graph-based information retrieval: The PageRank algorithm, which is widely used for link analysis in the world wide web, and spreading activation search, a search technique for semantic and associative networks. The algorithms dier in that PageRank is a technique which uses global properties of the graph, whereas spreading activation search uses local links. We evaluate the techniques in a known-item retrieval scenario. We compare the characteristics of our corpora with the web graph and with previously examined social networks. The similarities between social networks and the web graph in particular motivate the application of web retrieval techniques to social information retrieval. We conclude that social network analysis is an important tool for information retrieval. The main argument supporting this conclusion is the importance of social interaction for information retrieval and production.
9.1 Impact
We apply graph-based techniques to social networks, using them outside their traditional domains within information retrieval, namely web retrieval and retrieval on semantic networks. We thereby extend the state of the art in graph-based retrieval techniques. We acknowledge recent developments in statistical network analysis and theory of random graphs and apply them in the context of information retrieval. We hope that
85
Chapter 9 Conclusion further developments in the young eld of statistical network analysis will continue to cross-pollinate information retrieval. There is currently an indisputable interest in social software, exemplied by the popularity of blogs and wikis, social tagging systems, and social bookmarking. The number of mentions of Wikipedia, a project founded on social software principles, in reputable publications like the New York Times or the Guardian alone is witness to this trend. The commonly cited benets of social software, for example improved communication among group members or emergence of communities, is important but intangible. We aim to derive tangible benets from the application of social networks, namely improved retrieval performance by providing retrieval techniques which are tailored to the emerging eld of social software. We believe that these tangible benets will accelerate the adoption of social software.
9.2 Limitations
The main limitation of social ir follows from its domain model: it is only applicable where a social network is present in the domain, or can be derived. Furthermore, the quality of the social network is crucial: We see in section 7.3.2 that a poorly formed social network can lead to a failure of social retrieval methods. Limitations of other graph-based retrieval methods also apply to social information retrieval. Commonly cited limitations of PageRank are that its benets are greatest for underspecied queries with many relevant results; for spreading activation search, the structure of the network is of crucial importance. The position of an author in the social network may be misleading as regards his authority. In particular, we see that social retrieval techniques are good at identifying multipliers, but fail to identify innovators.
86
Chapter 9 Conclusion of the result presentation of a social ir system. The techniques and evaluation scenarios described in this thesis use only a subset of the possible relations present in the social ir domain model. It will be instructive to apply social retrieval techniques to domains exhibiting dierent subsets of the domain model. When choosing algorithms for social ir, we limit the evaluation to two popular algorithms for graph-based retrieval. Other algorithms need to be examined to determine their suitability for social ir. Topic-sensitive PageRank (Haveliwala, 2002) in particular is a promising candidate, as it allows for a social authority measure tailored to a community or a single individual.
87
Bibliography
John R. Anderson. The Architecture of Cognition. Cognitive Science Series. Harvard University Press, 1983. ISBN 0-674-04425-8. Franz Baader, Diego Calvanese, Deborah L. McGuinness, Daniele Nardi, and Peter F. Patel-Schneider, editors. The Description Logic Handbook: Theory, Implementation and Applications. Cambridge University Press, 2003. Ricardo Baeza-Yates and Berthier Ribeiro-Neto. Addison-Wesley, 1999. Modern Information Retrieval.
Albert-Lszl Barabsi and Rka Albert. Emergence of scaling in random networks. Science, 286:509512, October 1999. doi: http://dx.doi.org/10.1126/science.286.5439. 509. Adam Berger and John Laerty. Information retrieval as statistical translation. In SIGIR 99: Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval, pages 222229, New York, NY, USA, 1999. ACM Press. ISBN 1-58113-096-1. doi: http://doi.acm.org/10.1145/ 312624.312681. Tim Berners-Lee, Robert Cailliau, Ari Luotonen, Henrik Frystyk Nielsen, and Arthur Secret. The World-Wide Web. Communications of the ACM, 37(8):7682, 1994. ISSN 0001-0782. doi: http://doi.acm.org/10.1145/179606.179671. Tim Berners-Lee, James Hendler, and Ora Lassila. The semantic web. Scientic American, 284(5):3443, May 2001. URL http://www.scientificamerican.com/article. cfm?articleID=00048144-10D2-1C70-84A9809EC588EF21&catID=2. Krishna Bharat. SearchPad: explicit capture of search context to support Web search. Computer Networks, 33(1-6):493501, 2000. ISSN 1389-1286. doi: http://dx.doi. org/10.1016/S1389-1286(00)00047-5. Sergey Brin and Lawrence Page. The anatomy of a large-scale hypertextual Web search engine. Computer Networks and ISDN Systems, 30(17):107117, 1998. URL ftp: //db.stanford.edu/pub/papers/google.pdf. Andrei Broder, Ravi Kumar, Farzin Maghoul, Prabhakar Raghavan, Sridhar Rajagopalan, Raymie Stata, Andrew Tomkins, and Janet Wiener. Graph structure in
88
Bibliography the web. Computer Networks, 33:309320, 2000. URL http://www.people.cornell. edu/pages/dc288/Paper1.pdf. Nick Craswell and David Hawking. Overview of the TREC-2004 Web track. In E. M. Voorhees and Lori P. Buckland, editors, Proceedings of the Thirteenths Text REtrieval Conference (TREC 2004), number 500-261 in NIST Special Publications, Gaithersburg, MD, November 2004. U. S. National Institute of Standards and Technology. URL http://trec.nist.gov/pubs/trec13/papers/WEB.OVERVIEW.pdf. F. Crestani. Application of spreading activation techniques in information retrieval. Articial Intelligence Review, 11(6):453482, 1997. ISSN 0269-2821. doi: http: //dx.doi.org/10.1023/A:1006569829653. Fabio Crestani and Puay Leng Lee. Searching the web by constrained spreading activation. Information Processing and Management, 36(4):585605, 2000. ISSN 0306-4573. doi: http://dx.doi.org/10.1016/S0306-4573(99)00073-4. D. Crocker. Standard for the format of ARPA Internet text messages. RFC 822 (Standard), August 1982. URL http://www.ietf.org/rfc/rfc822.txt. Obsoleted by RFC 2822, updated by RFCs 1123, 1138, 1148, 1327, 2156. Scott C. Deerwester, Susan T. Dumais, Thomas K. Landauer, George W. Furnas, and Richard A. Harshman. Indexing by latent semantic analysis. Journal of the American Society of Information Science, 41(6):391407, 1990. URL http://citeseer.ist. psu.edu/deerwester90indexing.html. Peter Sheridan Dodds, Roby Muhamad, and Duncan J. Watts. An experimental study of search in global social networks. Science, 301:827829, August 2003. J. Fagan. Automatic phrase indexing for document retrieval. In SIGIR 87: Proceedings of the 10th annual international ACM SIGIR conference on Research and development in information retrieval, pages 91101, New York, NY, USA, 1987. ACM Press. ISBN 0-89791-232-2. doi: http://doi.acm.org/10.1145/42005.42016. Gary William Flake, Kostas Tsioutsiouliklis, and Leonid Zhukov. Methods for mining web communities: Bibliometric, spectral, and ow. In Alexandra Poulovassilis and Mark Levene, editors, Web Dynamics, chapter 4, pages 4568. Springer Verlag, 2004. ISBN 3-540-40676-X. URL http://research.yahoo.com/publications/4.pdf. William B. Frakes and Ricardo Baeza-Yates, editors. Information Retrieval. Data Structures & Algorithms. Prentice Hall, 1992. Jill Freyne and Barry Smyth. An experiment in social search. In Wolfgang Nejdl and Paul De Bra, editors, Adaptive Hypermedia and Adaptive Web-Based Systems, Third International Conference, AH 2004, Eindhoven, The Netherlands, August
89
Bibliography 23-26, 2004, Proceedings, volume 3137 of Lecture Notes in Computer Science, pages 95103. Springer, 2004. ISBN 3-540-22895-0. J. Frnkranz and P. A. Flach. An analysis of rule evaluation metrics. In Proceedings of the 20th International Conference on Machine Learning (ICML03), pages 202 209. AAAI Press, January 2003. ISBN 1-57735-189-4. URL http://www.cs.bris.ac. uk/Publications/Papers/1000705.pdf. John S. Garofolo, Ellen M. Voorhees, Vincent M. Stanford, and Karen Sprck Jones. TREC-6 1997 spoken document retrieval track overview and results. In E. M. Voorhees and D. K. Harman, editors, Proceedings of the Sixth Text REtrieval Conference TREC-6, number 500-240 in NIST Special Publications. U.S. National Institute of Standards and Technology (NIST), 1997. URL http://trec.nist.gov/pubs/trec6/ papers/sdr97.ps.gz. Melanie Gnasa, Sascha Alda, Jasmin Grigull, and Armin B. Cremers. Towards virtual knowledge communities in peer-to-peer networks. In Jamie Callan, Fabio Crestani, and Mark Sanderson, editors, Distributed Multimedia Information Retrieval, volume 2924 of Lecture Notes in Computer Science, pages 143155. Springer, 2003. URL http://www.springerlink.com/index/NUR92TH9821N5TPJ. Melanie Gnasa, Markus Won, and Armin B. Cremers. Three pillars for congenial web search. Continuous evaluation for enhancing web search eectiveness. Journal of Web Engineering, 3(3&4):252280, 2004. ISSN 1540-9589. URL http://www.informatik. uni-bonn.de/~won/Download/wwwjournal2004.pdf. Otis Gospodneti and Erik Hatcher. Lucene in Action. Manning, 2005. URL http: //www.lucenebook.com/. Mark S. Granovetter. The strength of weak ties. American Journal of Sociology, 78(6): 13601380, May 1973. URL http://www.stanford.edu/dept/soc/people/faculty/ granovetter/documents/TheStrengthofWeakTies.pdf. Nadir Gl. MyPush Ein kollaborativer Push Dienst fr die automatische Informationsbeschaung in einem Peer-to-Peer Netzwerk. Diploma thesis, Rheinische FriedrichWilhelms-Universitt Bonn, March 2004. Richard W. Hamming. Coding and information theory. Prentice-Hall, Englewood Clis, 1980. ISBN 0-13-139139-9. J. A. Hanley and B. J. McNeil. The meaning and use of the area under a receiver operating characteristic (ROC) curve. Radiology, 143(1):2936, April 1982. URL http://www.med.mcgill.ca/epidemiology/hanley/software/Hanley_ McNeil_Radiology_82.pdf.
90
Bibliography D. Harman. Towards interactive query expansion. In SIGIR 88: Proceedings of the 11th annual international ACM SIGIR conference on Research and development in information retrieval, pages 321331, New York, NY, USA, 1988. ACM Press. ISBN 2-7061-0309-4. doi: http://doi.acm.org/10.1145/62437.62469. Donna Harman. Relevance feedback revisited. In SIGIR 92: Proceedings of the 15th annual international ACM SIGIR conference on Research and development in information retrieval, pages 110, New York, NY, USA, 1992. ACM Press. ISBN 0-89791-523-2. doi: http://doi.acm.org/10.1145/133160.133167. Taher H. Haveliwala. Topic-sensitive PageRank. In WWW 02: Proceedings of the eleventh international conference on World Wide Web, pages 517526. ACM Press, 2002. ISBN 1-58113-449-5. doi: http://doi.acm.org/10.1145/511446.511513. Brian Hayes. A lucid interval. American Scientist, 91(6):484488, NovemberDecember 2003. URL http://www.cs.utep.edu/interval-comp/hayes.pdf. Marti A. Hearst and Jan O. Pedersen. Reexamining the cluster hypothesis: scatter/gather on retrieval results. In SIGIR 96: Proceedings of the 19th annual international ACM SIGIR conference on Research and development in information retrieval, pages 7684, New York, NY, USA, 1996. ACM Press. ISBN 0-89791-792-8. doi: http://doi.acm.org/10.1145/243199.243216. Svante Janson, Donald E. Knuth, Tomasz uczak, and Boris Pittel. The birth of the giant component. Random Structures & Algorithms, 4(3):233358, 1993. URL http://arxiv.org/pdf/math.PR/9310236. Paul B. Kantor and Ellen M. Voorhees. Report on the TREC-5 confusion track. In E. M. Voorhees and D. K. Harman, editors, Proceedings of the Fifth Text REtrieval Conference TREC-5, number 500-238 in NIST Special Publications. U.S. National Institute of Standards and Technology (NIST), 1996. URL http://trec.nist.gov/ pubs/trec5/papers/confusion_track.ps.gz. Henry Kautz, Bart Selman, and Mehul Shah. Referral web: combining social networks and collaborative ltering. Commununications of the ACM, 40(3):6365, 1997a. ISSN 0001-0782. doi: http://doi.acm.org/10.1145/245108.245123. Henry Kautz, Bart Selman, and Mehul Shah. The hidden web. AI Magazine, 18(2):27 36, 1997b. URL http://www.cs.washington.edu/homes/kautz/referralweb/doc/ aimag.pdf. Jon M. Kleinberg. Authoritative sources in a hyperlinked environment. Journal of the ACM, 46(5):604632, 1999. ISSN 0004-5411. doi: http://doi.acm.org/10.1145/ 324133.324140.
91
Bibliography Joseph A. Konstan, Bradley N. Miller, David Maltz, Jonathan L. Herlocker, Lee R. Gordon, and John Riedl. GroupLens: applying collaborative ltering to Usenet news. Communications of the ACM, 40(3):7787, 1997. ISSN 0001-0782. doi: http://doi. acm.org/10.1145/245108.245126. F. W. Lancaster. Information Retrieval Systems: Characteristics, Testing, and Evaluation. Wiley, New York, 1968. Udi Manber. Foreword. In William B. Frakes and Ricardo Baeza-Yates, editors, Information Retrieval. Data Structures & Algorithms, pages vvi. Prentice Hall, 1992. Stanley Milgram. The small-world problem. Psychology Today, 2:6067, 1967. David R. H. Miller, Tim Leek, and Richard M. Schwartz. A hidden markov model information retrieval system. In SIGIR 99: Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval, pages 214221, New York, NY, USA, 1999. ACM Press. ISBN 1-58113-096-1. doi: http://doi.acm.org/10.1145/312624.312680. M. E. Newman. The structure of scientic collaboration networks. Proceedings of the National Academy of Sciences of the United States of America, 98(2):404409, January 2001. doi: 10.1073/pnas.021544898. URL http://dx.doi.org/10.1073/ pnas.021544898. M. E. J. Newman and Juyong Park. Why social networks are dierent from other types of networks. Physical Review E, 68:036122, September 2003. doi: 10.1103/ PhysRevE.68.036122. URL http://www.ncbi.nlm.nih.gov/entrez/query.fcgi? cmd=Retrieve&db=pubmed&list_uids=14524847. M. E. J. Newman, S. H. Strogatz, and D. J. Watts. Random graphs with arbitrary degree distributions and their applications. Physical Review E, 64:026118, 2001. doi: http://dx.doi.org/10.1103/PhysRevE.64.026118. URL http://link.aps.org/ abstract/PRE/v64/e026118. Joshua OMadadhain, Danyel Fisher, Padhraic Smyth, Scott White, and Yan-Biao Boey. Analysis and visualization of network data using JUNG. Journal of Statistical Software, 2005. URL http://jung.sourceforge.net/doc/JUNG_journal.pdf. To appear. Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. The PageRank citation ranking: Bringing order to the Web. Technical report, Stanford University, November 1999. URL http://dbpubs.stanford.edu:8090/pub/1999-66. Gabriel Pinski and Francis Narin. Citation inuence for journal aggregates of scientic publications: Theory, with application to the literature of physics. Information
92
Bibliography Processing and Management, 12(5):297312, 1976. doi: http://dx.doi.org/10.1016/ 0306-4573(76)90048-0. Peter Pirolli, James Pitkow, and Ramana Rao. Silk from a sows ear: extracting usable structures from the Web. In CHI 96: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 118125, New York, NY, USA, 1996. ACM Press. ISBN 0-89791-777-4. doi: http://doi.acm.org/10.1145/238386.238450. URL http://www.pitkow.com/docs/1996-CHI-Silk.pdf. James Pitkow, Hinrich Schtze, Todd Cass, Rob Cooley, Don Turnbull, Andy Edmonds, Eytan Adar, and Thomas Breuel. Personalized search. Commununications of the ACM, 45(9):5055, 2002. ISSN 0001-0782. doi: http://doi.acm.org/10.1145/567498. 567526. Jay M. Ponte and W. Bruce Croft. A language modeling approach to information retrieval. In SIGIR 98: Proceedings of the 21st annual international ACM SIGIR conference on Research and development in information retrieval, pages 275281, New York, NY, USA, 1998. ACM Press. ISBN 1-58113-015-5. doi: http://doi.acm. org/10.1145/290941.291008. Scott Everett Preece. A Spreading Activation Network Model for Information Retrieval. PhD thesis, University of Illinois at Urbana-Champaign, 1981. URL http://wwwlib.umi.com/dissertations/fullcit/8203555. M. Ross Quillian. Semantic memory. In Marvin Minsky, editor, Semantic Information Processing. MIT Press, Cambridge, Mass., 1968. Paul Resnick, Neophytos Iacovou, Mitesh Suchak, Peter Bergstrom, and John Riedl. GroupLens: an open architecture for collaborative ltering of netnews. In CSCW 94: Proceedings of the 1994 ACM conference on Computer supported cooperative work, pages 175186, New York, NY, USA, 1994. ACM Press. ISBN 0-89791-689-1. doi: http://doi.acm.org/10.1145/192844.192905. S. E. Robertson, C. J. van Rijsbergen, and M. F. Porter. Probabilistic models of indexing and searching. In SIGIR 80: Proceedings of the 3rd annual ACM conference on Research and development in information retrieval, pages 3556, Kent, UK, 1981. Butterworth & Co. ISBN 0-408-10775-8. Nicholas C. Romano, Jr, Dmitri Roussinov, Jay F. Nunamaker, Jr, and Hsinchun Chen. Collaborative information retrieval environment: Integration of information retrieval with group support systems. In HICSS 99: Proceedings of the Thirty-Second Annual Hawaii International Conference on System Sciences-Volume 1, pages 10531062, Washington, DC, USA, 1999. IEEE Computer Society. ISBN 0-7695-00013.
93
Bibliography Thorsten Ruhl. Personal Search Memory Design und Realisierung einer Suchschnittstelle zur kombinierten Suche in frheren und neuen Suchergebnissen. Diploma thesis, Rheinische Friedrich-Wilhelms-Universitt Bonn, 2003. Gerard Salton. Associative document retrieval techniques using bibliographic information. Journal of the ACM, 10(4):440457, 1963. ISSN 0004-5411. doi: http: //doi.acm.org/10.1145/321186.321188. Gerard Salton and Chris Buckley. On the use of spreading activation methods in automatic information retrieval. In Proceedings of the ACM SIGIR, Grenoble, France, June 1988a. URL http://doi.acm.org/10.1145/62437.62447. Gerard Salton and Chris Buckley. Term-weighting approaches in automatic information retrieval. Information Processing and Management, 24(5):513523, 1988b. Mehul Shah. ReferralWeb: A resource location system guided by personal relations. Masters thesis, Massachusetts Institute of Technology, May 1997. Craig Silverstein, Hannes Marais, Monika Henzinger, and Michael Moricz. Analysis of a very large web search engine query log. SIGIR Forum, 33(1):612, 1999. ISSN 0163-5840. doi: http://doi.acm.org/10.1145/331403.331405. Amit Singhal, Chris Buckley, and Mandar Mitra. Pivoted document length normalization. In SIGIR 96: Proceedings of the 19th annual international ACM SIGIR conference on Research and development in information retrieval, pages 2129, New York, NY, USA, 1996. ACM Press. ISBN 0-89791-792-8. doi: http: //doi.acm.org/10.1145/243199.243206. Alan F. Smeaton, Gary Keogh, Cathal Gurrin, Kieran McDonald, and Tom Sdring. Analysis of papers from twenty-ve years of SIGIR conferences: What have we been doing for the last quarter of a century? SIGIR Forum, 36(2):3943, 2002. ISSN 0163-5840. doi: http://doi.acm.org/10.1145/792550.792556. URL http://portal. acm.org/citation.cfm?id=792556. Beth Sundheim and Ralph Grishman, editors. MUC6 95: Proceedings of the 6th conference on Message understanding, Morristown, NJ, USA, 1995. Association for Computational Linguistics. ISBN 1-55860-402-2. H. Turtle and W. B. Croft. Inference networks for document retrieval. In SIGIR 90: Proceedings of the 13th annual international ACM SIGIR conference on Research and development in information retrieval, pages 124, New York, NY, USA, 1990. ACM Press. ISBN 0-89791-408-2. doi: http://doi.acm.org/10.1145/96749.98006. Duncan J. Watts and Steven H. Strogatz. Collective dynamics of small-world networks. Nature, 393:440442, June 1998. ISSN 0028-0836. URL http://dx.doi.org/10. 1038/30918.
94
Bibliography Etienne Wenger. How we learn. Communities of practice. The social fabric of a learning organization. Healthcare Forum Journal, 39(4):2026, 1996. URL http://www. ewenger.com/pub/pubhealthcareforum.htm. Scott White and Padhraic Smyth. Algorithms for estimating relative importance in networks. In KDD 03: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 266275, New York, NY, USA, 2003. ACM Press. ISBN 1-58113-737-0. doi: http://doi.acm.org/10.1145/ 956750.956782. T. D. Wilson. On user studies and information needs. Journal of Librarianship, 37 (1):315, 1981. URL http://informationr.net/tdw/publ/papers/1981infoneeds. html. T. D. Wilson. Information needs and uses: fty years of progress. In B. C. Vickery, editor, Fifty years of information progress: a Journal of Documentation review, pages 1551. Aslib, London, 1994. URL http://informationr.net/tdw/publ/ papers/1994FiftyYears.html. William A. Woods. Whats in a link: Foundations for semantic networks. In Daniel G. Bobrow and Allan Collins, editors, Representation and Understanding. Academic Press, New York, 1975. ISBN 0-12-108550-3. Hugo Zaragoza, Nick Craswell, Michael Taylor, Suchi Saria, and Stephen Robertson. Microsoft Cambridge and TREC-13: Web and HARD tracks. In E. M. Voorhees and Lori P. Buckland, editors, Proceedings of the Thirteenths Text REtrieval Conference (TREC 2004), number 500-261 in NIST Special Publications, Gaithersburg, MD, November 2004. U. S. National Institute of Standards and Technology. URL http://trec.nist.gov/pubs/trec13/papers/microsoft-cambridge. web.hard.pdf.
95
Ehrenwrtliche Erklrung
Ich erklre hiermit ehrenwrtlich, dass ich die vorliegende Arbeit Social Information Retrieval selbstndig angefertigt habe; die aus fremden Quellen direkt oder indirekt bernommenen Gedanken sind als solche gekennzeichnet.