Bridge-Driven Search in Social Internetworking Scenarios

Similar documents
Uncovering the Small Community Structure in Large Networks: A Local Spectral Approach

A Propagation-based Algorithm for Inferring Gene-Disease Associations

SOCIAL MEDIA MINING. Behavior Analytics

Artificial Intelligence Breadth-First Search and Heuristic

Final Project - Social and Information Network Analysis

Predicting ratings of peer-generated content with personalized metrics

Multiple Equilibria and Selection by Learning in an Applied Setting

Software Next Release Planning Approach through Exact Optimization

The Interaction-Interaction Model for Disease Protein Discovery

The effect of Product Ratings on Viral Marketing CS224W Project proposal

Identifying Influencers from Sampled Social Networks

HybridRank: Ranking in the Twitter Hybrid Networks

Application of Decision Trees in Mining High-Value Credit Card Customers

Disease Protein Pathway Discovery using Higher-Order Network Structures

Ant Colony Optimization

LOAD SHARING IN HETEROGENEOUS DISTRIBUTED SYSTEMS

Influence of First Steps in a Community on Ego-Network: Growth, Diversity, and Engagement

A STUDY ON SNA: MEASURE AVERAGE DEGREE AND AVERAGE WEIGHTED DEGREE OF KNOWLEDGE DIFFUSION IN GEPHI

Analysis of Data and Relations in Social Networks LU LIU 10/03/2016

Increasing Wireless Revenue with Service Differentiation

The Science of Social Media. Kristina Lerman USC Information Sciences Institute

Discovering Emerging Businesses

Introduction to Artificial Intelligence. Prof. Inkyu Moon Dept. of Robotics Engineering, DGIST

Clock-Driven Scheduling

Metaheuristics for scheduling production in large-scale open-pit mines accounting for metal uncertainty - Tabu search as an example.

Evolutionary Algorithms

Can Cascades be Predicted?

Co-evolution of Social and Affiliation Networks

Parameters tuning boosts hypersmurf predictions of rare deleterious non-coding genetic variants

Modeling Heterogeneous User. Churn and Local Resilience of Unstructured P2P Networks

CS425: Algorithms for Web Scale Data

Control-theoretical CPU allocation: Design and Implementation with Feedback Control

Algoritmi Distribuiti e Reti Complesse (modulo II) Luciano Gualà

Path Optimization for Inter-Switch Handoff in Wireless ATM Networks

Group #2 Project Final Report: Information Flows on Twitter

Cascading Behavior in Networks. Anand Swaminathan, Liangzhe Chen CS /23/2013

What about streaming data?

Fault Detection of Large Amounts of Photovoltaic Systems

A Viral Systems Algorithm for the Traveling Salesman Problem

Introduction To Genetic Algorithms

Networked Life (CSE 112)

Waldemar Jaroński* Tom Brijs** Koen Vanhoof** COMBINING SEQUENTIAL PATTERNS AND ASSOCIATION RULES FOR SUPPORT IN ELECTRONIC CATALOGUE DESIGN

Characterizing User Interactions in Flickr Social Network

Shengru Tu University of New Orleans Computer Science Dept. New Orleans, LA.

Gang Scheduling Performance on a Cluster of Non-Dedicated Workstations

The Price of Anarchy in an Exponential Multi-Server

The Metaphor. Individuals living in that environment Individual s degree of adaptation to its surrounding environment

A TABU SEARCH METAHEURISTIC FOR ASSIGNMENT OF FLOATING CRANES

A. ( ) ( ) 2. A process that is in statistical control necessarily implies that the process is capable of meeting the customer requirements.

Job co-allocation strategies for multiple high performance computing clusters

CHAPTER 4 PROPOSED HYBRID INTELLIGENT APPROCH FOR MULTIPROCESSOR SCHEDULING

Understanding Customer Choice Processes Using Neural Networks. Walter A. Kosters, Han La Poutré and Michiel C. van Wezel

Final Report Evaluating Social Networks as a Medium of Propagation for Real-Time/Location-Based News

Homophily and Influence in Social Networks

A Framework for the Optimizing of WWW Advertising

A COMPARATIVE ANALYSIS OF SCHEDULING POLICIES IN A DISTRIBUTED SYSTEM USING SIMULATION

Motivation. Types of Scheduling

Designing the integration of register and survey data in earning statistics

VMware vcenter Operations Standard

Preference Elicitation for Group Decisions

initial set of random solutions called population satisfying boundary and/or system

The Efficient Allocation of Individuals to Positions

LOGISTICAL ASPECTS OF THE SOFTWARE TESTING PROCESS

Behavioral Data Mining. Lecture 22: Network Algorithms II Diffusion and Meme Tracking

CS190 Part 3: The Social Web. Online Social Network Analysis

Multiagent Systems: Spring 2006

Neighbor selection for cold users in collaborative filtering with positive-only feedback

Intro to O/S Scheduling. Intro to O/S Scheduling (continued)

Do We Really Need to Catch Them All? A New User-Guided Social Media Crawling Method

Inference and computing with decomposable graphs

Economics of Information Networks

On Facebook, Most Ties Are Weak

Energy Efficient Fixed-Priority Scheduling for Real-Time Systems on Variable Voltage Processors

The Heterogeneity Principle in Evaluation Measures for Automatic Summarization

Chapter 8: Exchange. 8.1: Introduction. 8.2: Exchange. 8.3: Individual A s Preferences and Endowments

PERFORMANCE EVALUATION OF DEPENDENT TWO-STAGE SERVICES

EFFICACY OF ROBUST REGRESSION APPLIED TO FRACTIONAL FACTORIAL TREATMENT STRUCTURES MICHAEL MCCANTS

Clairvoyant Site Allocation of Jobs with Highly Variable Service Demands in a Computational Grid

Minimizing Makespan for Machine Scheduling and Worker Assignment Problem in Identical Parallel Machine Models Using GA

The XBOSoft 2012 Scrum Testing Survey

Reaction Paper Influence Maximization in Social Networks: A Competitive Perspective

Lecture 18: Toy models of human interaction: use and abuse

Single machine scheduling with two agents for total completion time objectives

A Solution Approach for the Joint Order Batching and Picker Routing Problem in Manual Order Picking Systems

Application of SAS in Product Testing in a Retail Business

Time Optimal Profit Maximization in a Social Network

User Profiling in an Ego Network: Co-profiling Attributes and Relationships

Financial Time Series Segmentation Based On Turning Points

Analysis of Price Competition under Peering and Transit Agreements in Internet Service Provision to Peer-to-Peer Users

Machine Learning: Algorithms and Applications

Chapter 12. Sample Surveys. Copyright 2010 Pearson Education, Inc.

Research is a formalized curiosity. It is poking and prying with a purpose.

Hybrid WOM Collection and Visualization Method for Reputation Rating in Online Community

TOWARD MORE DIVERSE RECOMMENDATIONS: ITEM RE-RANKING METHODS FOR RECOMMENDER SYSTEMS

TEACHER NOTES MATH NSPIRED

Eyal Carmi. Google, 76 Ninth Avenue, New York, NY U.S.A. Gal Oestreicher-Singer and Uriel Stettner

Towards Modelling-Based Self-adaptive Resource Allocation in Multi-tiers Cloud Systems

Optimal, Efficient Reconstruction of Phylogenetic Networks with Constrained Recombination

Scheduling II. To do. q Proportional-share scheduling q Multilevel-feedback queue q Multiprocessor scheduling q Next Time: Memory management

CS 101C: Bayesian Analysis Convergence of Markov Chain Monte Carlo

Transcription:

Bridge-Driven Search in Social Internetworking Scenarios Francesco Buccafurri, Gianluca Lax, Antonino Nocera and Domenico Ursino DIIES, Università Mediterranea di Reggio Calabria, {bucca,lax,a.nocera,ursino}@unirc.it Corresponding Author Discussion Paper Abstract. In new generation social networks, Social Network Scenarios (SISs, for short) are becoming more and more important. In this new scenario, the role of Social Network Analysis is of course still crucial but the preliminary step to do is designing a good way to crawl the underlying graph. While this aspect has been deeply investigated in the field of social networks, it is an open issue when moving towards SISs. Indeed, we cannot expect that a crawling strategy which is good for social networks, is still valid in a Social Internetworking Scenario, due to its specific topological features. In this paper, we first confirm the above claim and, then, define a new crawling strategy specifically conceived for SISs. Finally, we show that it fully overcomes the drawbacks of the state-of-the-art crawling strategies. 1 Introduction In the last years, social networks have become one of the most popular communication media on the Internet [5]. The resulting universe is a constellation of several social networks, each forming a community with specific connotations, also reflecting multiple aspects of people personal life. Despite this inherent heterogeneity, the possible interaction among distinct social networks is the basis of a new emergent Social Internetworking Scenario (SIS, for short) [3] enabling a lot of strategic applications, whose main strength will be just the integration of possibly different communities yet preserving their diversity and autonomy. In this new scenario, the role of Social Network Analysis is of course still crucial in studying the evolution of structures, individuals, interactions, and so on, and in extracting powerful knowledge from them. But the necessary prerequisite is to have a good way to crawl the underlying graph. In the past, several crawling strategies for single social networks have been proposed. Among them the most representative ones are Breadth First Search (BFS, for short) [8], Random Walk This paper is a short version of the paper entitled Experiences using BDS, a crawler for Social Internetworking Scenarios, accepted with minor revision for publication to Edited Books from Social Network Analysis and Mining (EB-SNAM 2012).

2 F. Buccafurri, G. Lax, A. Nocera, D. Ursino (RW, for short) [7] and Metropolis-Hastings Random Walk (MH, for short) [4]. They were largely investigated for single social networks highlighting their pros and cons [4, 6]. But, what happens when we move towards Social Interneworking Scenarios? The question opens in fact a new issue that, to the best our knowledge, has not been investigated in the literature. Indeed, this issue is far to be trivial, since we cannot presumably expect that a crawling strategy which is good for social networks, is still valid in a Social Internetworking Scenario, due to its specific topological features. This paper gives a contribution in this setting. In particular, through a deep experimental analysis of the above existing crawling strategies, conducted in a multi-social-network setting, it reaches the conclusion that they are little adequate to this new context, thus enforcing the need of designing new crawling strategies specific for SISs. Starting from this result, it gives its second important contribution, consisting in the definition of a new crawling strategy, called Bridge-Driven Search (BDS, for short), which relies on a feature strongly characterizing a SIS. Indeed BDS is centered on the concept of bridge, which represents the structural element that interconnects different social networks. Bridges are those nodes of the graph corresponding to users who joined more than one social network and explicitly declared their different accounts. By an experimental analysis we show that BDS fits the desired features, thus overcoming the drawbacks of existing strategies. The plan of this paper is as follows: the state-of-the-art crawling strategies BFS, RW and MH are analyzed in Section 2, showing why they are not adequate for a SIS. In Section 3, our crawling strategy is illustrated. Section 4 is devoted to the presentation of the experiments carried out to evaluate BDS. Finally, Section 5 provides a look at our future research efforts. 2 Motivations Several crawling strategies for single social networks have been proposed in the literature. Among these strategies, two very popular ones are BFS and RW. BFS implements the classical Breadth First Search visit, whereas RW selects the next node to be visited uniformly at random among the neighbors of the current node. A more recent strategy is MH [4]. At each iteration, it randomly selects a node w from the neighbors of the current node v. Then, it randomly generates a number p belonging to the real interval [0,1]. If p Γ(v) Γ(w), where Γ(v) (Γ(w), resp.) is the outdegree of v (w, resp.), then it moves from v to w. Otherwise, it stays in v. Observe that the higher the degree of a node, the higher the probability that MH discards it. In the past, these crawling strategies were deeply investigated when applied on a single social network. This analysis showed that none of them is always better than the other ones. Indeed, each of them could be the optimal one for a specific set of analyses. However, no investigation about the application of these strategies in a SIS has been carried out. Thus, we have no evidence that they are still valid in this new context. In order to reason about this, let us start by considering a structural peculiarity of a SIS, which is the existence of bridges. We expect that these nodes play a crucial role in the

Bridge-Driven Search in Social Internetworking Scenarios 3 crawling of a SIS since they allow the crossing of different social networks. Bridges are not standard nodes, due to their role; as a consequence, we cannot see a SIS just as a huge social network. Besides these intuitive considerations about bridges, we can help our reasoning also with two results obtained in [3], namely: Fact (i) the fraction of bridges in a social network is low, and Fact (ii) bridges have high degrees on average. Now, the question is, what about the capability of existing crawling strategies of finding bridges? The deep knowledge about BFS, RW and MH provided by the literature allows the following conjectures to be drawn: (1) BFS tends to explore a local neighborhood of the seed it starts from. As a consequence, if bridges are not present in this neighborhood or their number is low (and this is highly probable due to Fact (i)), the crawled sample fails in covering many social networks. Furthermore, it is well known that BFS tends to favor power users and, therefore, presents bias in some network parameters (e.g., the average degree of the nodes of the crawled portions are overestimated) [6]. (2) Differently from BFS, RW does not consider only a local neighborhood of the seed. In fact, it selects the next node to be visited uniformly at random among the neighbors of the current node. Again, due to Fact (i), the probability that RW selects a bridge as the next node is low. As a consequence, the crawled sample does not cover many social networks and, if more than one social network is represented in it, the coupling degree of the crawled portions of social networks is low. Finally, analogously to BFS, RW tends to favor power users (and, consequently, to present bias in some network parameters [6]); this feature only marginally influences the capability of RW to find bridges since, in any case, their number is low. (3) MH has been conceived to unfavor power users and, more in general, nodes having high degrees which are, instead, favored by BFS and RW. It performs very well in a single social network [4] especially in the estimation of the averagedegreeof nodes. However,due to Fact (ii), MH will penalize bridges. As a consequence, the sample crawled by MH does not cover many social networks present in the SIS. In sum, from the above reasoning, we expect that both BFS, RW and MH are substantially inadequate in the context of SISs. As it will be described in Section 4, this conclusion is fully confirmed by a deep experimental campaign, which clearly highlights the above drawbacks. Thus we need to design a specific crawling strategy for SISs. 3 Proposed Crawling Strategy In the design of the proposed crawling strategy we start by the analysis of some aspects limiting BFS, RW and MH in a SIS, in order to overcome them. Recall that BFS performs a breadth first searchon a local neighborhoodofaseed. Now, the average distance between two nodes of a single social network is generally less than the one between two nodes of different social networks. Indeed, in order to pass from a social network to another, it is necessary to cross a bridge, and since bridges are few, it could be necessary to generate a long path before reaching one of them. As a consequence, the local neighborhood considered by BFS includes one or a small number of social networks. To overcome this problem,

4 F. Buccafurri, G. Lax, A. Nocera, D. Ursino a depth first search, instead of a breadth first search, could be performed. For this purpose, the way of proceeding of RW and MH could be included in our crawling strategy. However, since the number of bridges in a social network is low, the simple choice to go in-depth blindly does not favor the crossing from a social network to another. Even worse, since MH penalizes the nodes with a high degree, it tends to unfavor bridges, rather than favor them. Again, in the above reasoning, we have exploited Facts(i) and(ii) introduced in the previous section. A solution that overcomes the above problems could consist in implementing a non-blind depth first search in such a way as to favor bridges in the choice of the next node to visit. This is the choice we have done, and the name we give to our strategy, i.e., Bridge-Driven Search (BDS, for short), clearly reflects this approach. However, in this way, it becomes impossible to explore (at least partially) the neighborhood of the current node because the visit proceeds in-depth veryquickly and, furthermore, assoon as a bridge is encountered, there is a cross to another social network. The overall result of this way of proceeding would be an extremely fragmented crawled sample. In order to face this problem, given the current node, our crawling strategy explores a fraction of its neighbors before performing an in-depth search of the next node to visit. In order to formalize our crawling strategy, we need to introduce the following parameters: (1) nf (node fraction). It represents the fraction of the non-bridge neighbors of the current node which should be visited. It ranges in the real interval (0,1]. This parameter is used to tune the portion of the current node neighborhood which has to be taken into account and, hence, it balances the breadth and depth of the visit. (2) bf (bridge fraction). It represents the fraction of the bridge neighbors of the current node which should be visited. Like nf, it ranges in the real interval (0,1]. Clearly, this parameter is greater than 0 in order to allow the visit of at least one bridge (if any), thus resulting in crossing to another social network. (3) btf (bridge tuning factor). It is a real number belonging to [0,1] which allows the filtering of the bridges to be visited among the available ones, on the basis of their degree (see below). Its role will be explained in the following. The pseudo-code of BDS is shown in Algorithm 1. 4 Experiments In this section, we present our experiment campaign conceived to determine the performances of BDS and to compare it with BFS, RW and MH when they operate in a SIS. In order to perform our experiments, we implemented the four crawling strategies. Since we wanted to analyze the behavior of these strategies on a SIS, we had to extract not only connections among the accounts of different users in the same social network but also connections among the accounts of the same user in different social networks. For detecting these connections, two standards encoding human relationships, namely XFN [1] and FOAF [2], are generally exploited. Interestingly, they allow the identification of bridge nodes as those nodes linked by me edges. In our experiments, we considered a SIS consisting of four social networks, namely Twitter, LiveJournal, YouTube and

Algorithm 1 BDS Bridge-Driven Search in Social Internetworking Scenarios 5 Notation We denote by N(x) the function returning the number of the non-bridge neighbors of the node x, and by B(x) the function returning the number of the bridges belonging to the neighborhood of x Input s: the seed node Output SeenNodes, VisitedNodes: a set of nodes Constant n it {The number of iterations}; nf {The node fraction parameter} Constant bf {The bridge fraction parameter}; btf {The bridge tuning factor parameter} Variable v, w: a node; p: a number in the real interval (0,1); c: an integer number Variable NodeQueue: a queue of nodes; BridgeSet: a set of bridge-nodes 1: SeenNodes:=, VisitedNodes:=, NodeQueue:=, BridgeSet:= 2: insert s into NodeQueue 3: for i := 1 to n it do 4: poll the queue and extract a node v 5: insert v into VisitedNodes 6: insert all the nodes adjacent to v into SeenNodes 7: if (B(v) 1) then 8: clear NodeQueue 9: c = 0 10: while c < bf B(v) do 11: let w be one of the bridge-nodes adjacent to v not in BridgeSet selected uniformly at random 12: generate uniformly at random a number p in the real interval (0,1) 13: if (p btf N(v) N(w) ) then 14: insert w into NodeQueue and BridgeSet 15: c = c + 1 16: end if 17: end while 18: else 19: c = 0 20: while c < nf N(v) do 21: let w be one of the nodes adjacent to v selected uniformly at random 22: generate uniformly at random a number p in the real interval (0,1) 23: if (p N(v) N(w) ) then 24: insert w into NodeQueue 25: c = c + 1 26: end if 27: end while 28: end if 29: end for Flickr. These networks are compliant with the XFN and FOAF standards and have been largely analyzed in the past in Social Network Analysis. For our experiments, we exploited a server equipped with a 2 Quad-Core E5440 processor and 16GB of RAM with the CentOS 6.0 Serveroperating system. We performed the crawling tasks from November 5, 2011 to January 22, 2012. Collected data can be found at the URL http://www.ursino.unirc.it/sebd13.html 1. A first needed step was to define reasonable metrics able to evaluate the performances of crawlers operating on a SIS. Even though this point could appear very critical and also prone to unfair choices, it is immediate to realize that the following chosen metrics are a good way to highlight some desired features of a crawling strategy in a SIS: (1) Bridge Ratio (BR): this is a real number in the interval [0,1] defined as the ratio of the number of the bridges discovered to the number of all the nodes in the sample. (2) Crossings (CR): this is a non-negative integer and measures how many times the crawler switches from one social network to another. (3) Covering (CV): this is a positive integer and measures how many different social networks are visited by the crawler. (4) Balancing (BL): this is a non-negative real number and is defined as the standard deviation of the percentages of nodes discovered for each social network w.r.t. the overall number 1 The password to open the archive is 564325.

6 F. Buccafurri, G. Lax, A. Nocera, D. Ursino of nodes discovered in the sample. Observe that Balancing ranges from 0 to a maximum value corresponding to the case in which all sampled nodes belong to a social network. (4) Degree Bias (DB): this is a real number computed as the root mean squared error, for each social network of the SIS, of the average node degree estimated by the crawler and the one estimated by MH, which is considered the best one in estimating the node degree for a social network in the literature [6,4]. If the crawled sample does not cover one or more social networks, then these last ones are not considered in the computation of Degree Bias. It is worth pointing out that, as for the first three metrics, the higher their value the higher the performance of the crawling strategy. By contrast, as for the fourth and the fifth metrics, the lower their values the higher the performance of the crawling strategy. Observe that Covering is related to the crawler capability of covering many social networks. Balancing is related to the crawler capability of uniformly sampling all the social networks. Furthermore, observe that, even though one could intuitively think that a fair sampling should sample different social networks proportionally to their respective overall size, a similar behavior of the crawler could result in incomplete samples in case of high variance of these sizes. Indeed, it could happen that some small social networks would be not represented in the sample or represented in a insufficient way. Bridge Ratio and Crossing are related to the coupling degree, while Degree Bias to the average degree. We analyze, now, the performances of BFS, RW, MH and BDS, when applied on a SIS. For the first three crawling strategies we randomly chose 4 seeds, each belonging to one of the social networks of our SIS, and, for each crawling strategy, we run the corresponding crawler starting from each of the seeds. The number of iterations of each crawling run was 5,000. The overall number of seen nodes considered for the analysis of MH (resp., RW, BFS and BDS) was 135,163 (resp., 941,303, 726,743 and 360,238). In Table 1, we show the values of our metrics, along with the values of the other parameters we consider particularly significant (i.e., the average degree of the nodes of each social network), obtained for the four crawling strategies into consideration. We start our analysis by considering the three classical crawling strategies, namely MH, BFS and RW. BDS is examined later. As for the first three strategies,we candrawthe followingconclusions:(1) The value ofbridgeratio isvery low for all these crawling strategies. For MH there are 2.5 bridges for each 1000 crawled nodes on average. BFS behaves worse than MH and RW is the worst one. (2) The value of Crossing is generally low for all these crawling strategies. For BFS an increase of the value can be observed only when the seed belongs to YouTube. RW shows again the worst value. This result is clearly related to the low value of Bridge Ratio, since the few discovered bridges do not allow the crawlers to sufficiently cross different social networks. (3) The value of Covering is quite low for all these techniques. On overage only two of the social networks of the SIS are visited. Also this result is related to the low values of Bridge Ratio and Crossing. (4) The value of Balancing is very high for all these techniques, very close to the maximum one (i.e., 50). This indicates that, as far as this metric is concerned, they behaves very badly. Indeed, it happens that they often

Bridge-Driven Search in Social Internetworking Scenarios 7 MH BFS RW BDS Twitter YouTube Flickr LiveJournal Overall Bridge Ratio 0.0028 0.0038 0.0 0.0024 0.0025 Crossing 5 3 0 4 3 Covering 2 2 1 3 2 Balancing 32.5503 40.6103 50 31.1253 38.5715 Degree Bias 0 Twitter Avg. Deg. 37.9189 37.0789-38.2842 37.76067 YouTube Avg. Deg. 9.6064 10.0379-10.4144 10.01957 Flickr Avg. Deg. - - 104.3497-104.3497 LiveJournal Avg. Deg. - - - 40.5604 40.5604 Bridge Ratio 0.0008 0.0054 0.0 0.0 0.0016 Crossing 7 43 0 0 12.5 Covering 2 3 1 1 1.75 Balancing 49.9350 42.0286 50 49.9866 47.9876 Degree Bias 103.9339 Twitter Avg. Deg. 21.92 - - - 21.92 YouTube Avg. Deg. - 9.5106 - - 9.5106 Flickr Avg. Deg. - - 311.6118-311.6118 LiveJournal Avg. Deg. - - - 40.0136 40.0136 Bridge Ratio 0.0 0.00067 0.0 0.0 0.00017 Crossing 0 4 0 0 1 Covering 1 3 1 1 1.5 Balancing 49.7469 40.1363 50 50 47.4708 Degree Bias 180.8260 Twitter Avg. Deg. 39.0 41.9489 - - 40.4745 YouTube Avg. Deg. - 12.5081 - - 12.5081 Flickr Avg. Deg. - 476.6446 455.3002-465.9724 LiveJournal Avg. Deg. - - - 43.3333 43.3333 Bridge Ratio - - - - 0.0965 Crossing - - - - 286 Covering - - - - 4 Balancing - - - - 13.5103 Degree Bias - - - - 19.0145 Twitter Avg. Deg. - - - - 42.0383 YouTube Avg. Deg. - - - - 11.9278 Flickr Avg. Deg. - - - - 129.5833 LiveJournal Avg. Deg. - - - - 68.6234 Table 1. Performances of the crawling strategies into examination stay substantially bounded in the social network of the starting seed. BFS and RW are even worse than MH. (5) As for the average degrees of nodes, it is well known that MH is the crawling strategy that best estimates them in a single social network [6, 4]. From the previous reasoning on Balancing it is possible to deduce that each run of MH visits one or at most two social networks. As a consequence, we can assume that the average degrees it provides are also those of reference for the social networks of the SIS, provided that at least one run of MH starting from each social network is performed. On the basis of these reference values, we detect that BFS presents a high value of Degree Bias. This fact is well known in the literature for a scenario consisting of a single social network, and thus we confirm this conclusion also in the context of SISs. RW is even worse than BFS. In sum, we may conclude that the conjectures given in Section 2 are fully confirmed by experiments. Now we have to see how our crawling strategy behaves on the same SIS. In order to analyze BDS we first performed a large set of experiments to identify the best values of nf, bf and btf. Due to space reasons, we cannot report here the details of these experiments. The interested reader can find them at the URL http://www.ursino.unirc.it/sebd13.html. We only say that a parameter configuration generally guaranteeing satisfactory values for all the metrics into consideration is nf = 0.10, bf = 0.25, btf = 0.25. However, there could be some applications in which some metrics are much more important than the other ones. BDS is highly flexible and, in these cases, allows the choice of the configuration which favors that metric. The values of our metrics obtained by BDS with the chosen configuration are reported in the last part oftable1.fromthe analysisofthesevaluesitclearlyemergesthat, whenoperating on a SIS, BDS highly outperforms the other approaches. The only exception

8 F. Buccafurri, G. Lax, A. Nocera, D. Ursino is MH for Degree Bias since, according to [4,6], we have assumed that MH is the best method to estimate the average node degree. However, also for this metric, BDS obtains very satisfactory results. As a final remark we highlight that, besides the capability shown by BDS of crossing through different social networks, overcoming the drawbacks of compared crawler strategies, BDS presents a good behavior also from an intra-social-network point of view. This claim is supported from both the results obtained for the Degree Bias, and the consideration that our crawling algorithm, in absence of bridges, can be located between BFS and MH, thus producing intra-social-network results that reasonably cannot differ significantly from the ones of these strategies. 5 Conclusion and Future Work We think that SIS analysis is a very promising research field and so we plan to perform further research efforts in the future. In particular, one of the most challenging issue could be the improvement of the BDS crawling strategy in such a way that the values of nf, bf and btf dynamically change during the crawling activity to adapt to the specificities of the crawled SIS. Furthermore, we plan to investigate the possible connections of our approach with the information integration ones as well as to deal with the privacy issue in crawling with SIS settings. Acknowledgement. This work has been partially supported by the TENACE PRIN Project (n. 20103P34XC) funded by MIUR. References 1. XFN - XHTML Friends Network. http://gmpg.org/xfn, 2012. 2. D. Brickley and L. Miller. The Friend of a Friend (FOAF) project. http://www.foaf-project.org/, 2012. 3. F. Buccafurri, V.D. Foti, G. Lax, A. Nocera, and D. Ursino. Bridge Analysis in a Social Internetworking Scenario. Information Sciences, 224:1 18, 2013. 4. M. Gjoka, M. Kurant, C.T. Butts, and A. Markopoulou. Walking in Facebook: A case study of unbiased sampling of OSNs. In Proc. of the International Conference on Computer Communications (INFOCOM 10), pages 1 9, San Diego, CA, USA, 2010. IEEE. 5. J. Kleinberg. The convergence of social and technological networks. Communications of the ACM, 51(11):66 72, 2008. 6. M. Kurant, A. Markopoulou, and P. Thiran. On the bias of BFS (Breadth First Search). In Proc. of the International Teletraffic Congress (ITC 22), pages 1 8, Amsterdam, The Netherlands, 2010. IEEE. 7. L. Lovász. Random walks on graphs: A survey. Combinatorics, Paul Erdos is Eighty, 2(1):1 46, 1993. 8. S. Ye, J. Lang, and F. Wu. Crawling online social graphs. In Proc. of the International Asia-Pacific Web Conference (APWeb 10), pages 236 242, Busan, Korea, 2010. IEEE.