US20090070679A1 - Method and system for social network analysis - Google Patents
Method and system for social network analysis Download PDFInfo
- Publication number
- US20090070679A1 US20090070679A1 US11/967,221 US96722107A US2009070679A1 US 20090070679 A1 US20090070679 A1 US 20090070679A1 US 96722107 A US96722107 A US 96722107A US 2009070679 A1 US2009070679 A1 US 2009070679A1
- Authority
- US
- United States
- Prior art keywords
- users
- necktie
- accordance
- social network
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 79
- 238000003012 network analysis Methods 0.000 title claims abstract description 52
- 230000003993 interaction Effects 0.000 claims abstract description 81
- 238000004458 analytical method Methods 0.000 claims abstract description 34
- 238000010586 diagram Methods 0.000 description 22
- 230000000977 initiatory effect Effects 0.000 description 21
- 230000006870 function Effects 0.000 description 8
- 230000008859 change Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 6
- 230000007246 mechanism Effects 0.000 description 6
- 230000015654 memory Effects 0.000 description 6
- 238000007726 management method Methods 0.000 description 5
- 230000004075 alteration Effects 0.000 description 4
- 230000004069 differentiation Effects 0.000 description 4
- RWSOTUBLDIXVET-UHFFFAOYSA-N Dihydrogen sulfide Chemical compound S RWSOTUBLDIXVET-UHFFFAOYSA-N 0.000 description 3
- 238000003384 imaging method Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000001737 promoting effect Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000003997 social interaction Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000003796 beauty Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000004438 eyesight Effects 0.000 description 1
- 230000007274 generation of a signal involved in cell-cell signaling Effects 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 235000019239 indanthrene blue RS Nutrition 0.000 description 1
- UHOKSCJSTAHBSO-UHFFFAOYSA-N indanthrone blue Chemical compound C1=CC=C2C(=O)C3=CC=C4NC5=C6C(=O)C7=CC=CC=C7C(=O)C6=CC=C5NC4=C3C(=O)C2=C1 UHOKSCJSTAHBSO-UHFFFAOYSA-N 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000005291 magnetic effect Effects 0.000 description 1
- 230000005541 medical transmission Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 239000000047 product Substances 0.000 description 1
- 230000001568 sexual effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
Definitions
- the web is evolving from a content and commerce space to a space of social interactions.
- users may interact with one another in both commercial settings and non-commercial settings (e.g., an information only exchange).
- FIG. 1 is a block diagram of a system, according to an example embodiment
- FIG. 2 is a block diagram of an example graphing subsystem that may be deployed within the system of FIG. 1 according to an example embodiment
- FIG. 3 is a block diagram of an example social strength subsystem that may be deployed within the system of FIG. 1 according to an example embodiment
- FIG. 4 is a block diagram of an example motif subsystem that may be deployed within the system of FIG. 1 according to an example embodiment
- FIG. 5 is a block diagram of an example plotting subsystem that may be deployed within the system of FIG. 1 according to an example embodiment
- FIG. 6 is a flowchart illustrating a method for graphing according to an example embodiment
- FIG. 7 is a flowchart illustrating a method for graph generation according to an example embodiment
- FIGS. 8A-8E are block diagrams of graphs according to an example embodiment
- FIG. 9 is a block diagram of a table according to an example embodiment.
- FIGS. 10 and 11 are flowcharts illustrating a method for graph utilization according to an example embodiment
- FIG. 12 is a flowchart illustrating a method for graph usage according to an example embodiment
- FIG. 13 is a flowchart illustrating a method for conducting social strength analysis according to an example embodiment
- FIG. 14 is a flowchart illustrating a method for accessing social network values according to an example embodiment
- FIG. 15 is a flowchart illustrating a method for social strength utilization according to an example embodiment
- FIGS. 16 and 17 are block diagrams of charts according to an example embodiment
- FIG. 18 is a flowchart illustrating a method for conducting social strength analysis according to an example embodiment
- FIG. 19 is a flowchart illustrating a method for conducting motif analysis according to an example embodiment
- FIG. 20 is a flowchart illustrating a method for motif utilization according to an example embodiment
- FIG. 21 is a block diagram of an example motif display according to an example embodiment
- FIG. 22 is a flowchart illustrating a method for differentiated plotting analysis according to an example embodiment
- FIG. 23 is a flowchart illustrating a method for differentiated plotting utilization according to an example embodiment
- FIGS. 24-26 are diagrams of example differentiated plottings according to an example embodiment
- FIG. 27 is a network diagram depicting a network system, according to one embodiment, having a client server architecture configured for exchanging data over a network;
- FIG. 28 is a block diagram illustrating an example embodiment of multiple network and marketplace applications, which are provided as part of the network-based marketplace.
- FIG. 29 is a block diagram diagrammatic representation of machine in the example form of a computer system within which a set of instructions for causing the machine to perform any one or more of the methodologies discussed herein may be executed.
- Example methods and systems for social network analysis are described.
- numerous specific details are set forth in order to provide a thorough understanding of example embodiments. It will be evident, however, to one skilled in the art that the present invention may be practiced without these specific details.
- user interaction data of a time period for a plurality of users in a social network may be accessed.
- Network analysis may be performed on the user interaction data.
- a necktie-shaped graph may be generated from the user interaction data in accordance with the performing of the network analysis. The necktie-shaped graph may be utilized for analysis of the social network.
- a strongly connected component value, an in-component value, an out-component value, a disconnected component value, a tendril value, and a tube value of a social network for a time period may be accessed.
- a social strength of the social network for the time period may be calculated by combining the strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and the tube value.
- the social strength of the social network for the time period may be utilized for analysis of the social network.
- the strongly connected component value may have a greatest weight and the disconnected component value may have the lowest weight in the combining.
- a strongly connected component value, an in-component value, an out-component value, a disconnected component value, a tendril value, and a tube value of a social network for a time period may be accessed.
- a social strength of the social network for the time period may be calculated by combining the strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and the tube value.
- One or more users associated with the strongly connected component may be identified.
- the strongly connected component value may be a value of the strongly connected component for the time period.
- An aspect of the social network associated with the one or more users may be modified.
- the strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and the tube value of the social network for an additional time period may be accessed.
- the additional time period may be after the modifying of the aspect.
- the social strength of the social network for the additional time period may be calculated by combining the strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and the tube value.
- the social strength of the social network for the time period and the additional time period may be utilized for analysis in accordance with the modifying of the aspect of the social network.
- user interaction data associated for a plurality of users for a time period in a social network may be accessed.
- Network analysis may be performed on the user interaction data.
- a plurality of example users within the social network may be selected.
- Each of the example users may be associated with reputation information.
- a motif may be generated for the plurality of example users for the time period in accordance with the performing of the network analysis.
- a node of the motif may be associated with a particular example user of the example users.
- the motif may define an expected relationship between the plurality of example users in the social network.
- the node of the plurality of example users may be distinguished in accordance with the reputation information of a respective example user.
- the motif with a plurality of distinguished nodes may be utilized for analysis of the social network.
- reputation information associated with a plurality of initiating users and a plurality of responding users in a social network for a time period may be accessed.
- Interaction frequency data associated with the plurality of initiating users and the plurality of responding users for the time period may be accessed.
- An aggregated correlation between the plurality of initiating users and the plurality of responding users may be plotted in accordance with the reputation information.
- the plotting of the aggregated correlation may be differentiated in accordance with the interaction frequency data.
- the differentiated plotting of the aggregated correlation may be utilized.
- FIG. 1 illustrates an example system 100 in which a community of users may use a number of client machines 102 . 1 - 102 . n to be involved in a social network.
- the client machine 102 may be a computing system, mobile phone, a personal digital assistant (PDA), a gaming unit, a portable computing unit, and the like.
- the social network may be a social commerce network over with the users operating the machines may be involved in commercial exchange (e.g., buying or selling). However, other types of social networks (e.g., informational social networks) may also be used.
- the social network may be a social structure made of nodes (e.g., individuals or organizations) that are tied by one or more specific types of interdependency including, by way of example, values, visions, idea, commerce, friends, kinship, dislike, conflict, web links, sexual relations, disease transmission, or airline routes.
- nodes e.g., individuals or organizations
- a social commerce network may be a network that includes a commercial interdependency.
- the client machines 102 . 1 - 102 . n may participate in the social network by communicating over a provider network 104 with a network analyzer 106 .
- the provider network 104 may be a Global System for Mobile Communications (GSM) network, an Internet Protocol (IP) network, a Wireless Application Protocol (WAP) network, a WiFi network, or a IEEE 802.11 standards network as well as various combinations thereof.
- GSM Global System for Mobile Communications
- IP Internet Protocol
- WAP Wireless Application Protocol
- WiFi Wireless Fidelity
- IEEE 802.11 IEEE 802.11
- the network analyzer 106 may enable the social network to be provided to the users of the client machines 102 . 1 - 102 . n .
- the network analyzer 106 may be used to analyze the social network by using a graphing subsystem 108 , a social strength subsystem 110 , a motif subsystem 112 , and/or a plotting subsystem 114 .
- Example embodiments of the subsystems 108 - 114 are described in greater detail below.
- FIG. 2 is an example of a graphing subsystem 108 that may be deployed in the network analyzer 106 of the system 100 (see FIG. 1 ) or another system according to an example embodiment.
- the graphing subsystem 108 may include a user interaction data access module 202 , a network analysis performance module 204 , a graph generation module 206 , a graph utilization module 208 , a reputation information access module 210 , a interaction frequency data access module 212 , a transactional financial data access module 214 , a texture application module 216 , a graph analysis module 218 , a shape change measurement module 220 , a decision making module 222 , a network alteration module 224 , a graph provider module 226 , an aspect alteration module 228 , and/or a difference provider module 230 .
- Other modules may also be used.
- the user interaction data access module 202 accesses user interaction data of a time period for a number of users in a social network and/or accesses additional user interaction data associated with the social network during a different time period.
- the network analysis performance module 204 performs network analysis on user interaction data and/or additional user interaction data.
- the user interaction data may be based on communications between users.
- the user interaction data may include, by way of example, transactional relationship data that relates to a transaction (e.g., a sale or item exchange) that has occurred between users, communication interaction data that relates to a communication (e.g., an e-mail, an instant message, or a voice over IP call) that has occurred between users, and the like.
- the graph generation module 206 generates a graph (e.g., a necktie-shaped graph) from the user interaction data and/or an additional graph from the additional user interaction data in accordance with the performing of the network analysis.
- a graph e.g., a necktie-shaped graph
- the graph utilization module 208 uses a graph and/or an additional graph for analysis of the social network.
- the reputation information access module 210 accesses reputation information associated with the number of users.
- the reputation information may include, by way of example, user feedback (e.g., as provided by eBay Inc., of San Jose, Calif.), a rating of a posting, or the like.
- the interaction frequency data access module 212 accesses interaction frequency data associated with the number of users.
- the transactional financial data access module 214 accesses transactional financial data associated with the number of users.
- the texture application module 216 applies a texture to the graph in accordance with reputation information, interaction frequency data and/or transactional financial data.
- the graph analysis module 218 analyzes the graph.
- the shape change measurement module 220 measures a shape change between the graph and the additional graph.
- the decision making module 222 makes a decision regarding the social network in accordance with the analyzing of the graph and/or the measuring of the shape change.
- the network alteration module 224 alters an aspect of the social network in accordance with the making of the decision.
- the graph provider module 226 provides the graph and/or the additional graph for presentation.
- the aspect alteration module 228 alters an aspect of the social network in accordance with the making of the decision.
- the difference provider module 230 provides a difference between the graph and the additional graph for presentation.
- FIG. 3 is an example of a social strength subsystem 110 that may be deployed in the network analyzer 106 of the system 100 (see FIG. 1 ) or another system according to an example embodiment.
- the social strength subsystem 110 may include a user identification module 302 , an aspect modification module 304 , a value access module 306 , a social strength calculation module 308 , a social strength provider module 310 , a social strength utilization module 312 , and/or a difference provider module 314 . Other modules may also be used.
- the user identification module 302 identifies one or more users associated with the strongly connected component.
- the strongly connected component value may be a value of the strongly connected component for the time period.
- the aspect modification module 304 modifies an aspect of the social network associated with the one or more users.
- the value access module 306 accesses a strongly connected component value, an in-component value, an out-component value, a disconnected component value, a tendril value, and a tube value of a social network for a time period and/or an additional time period.
- the social strength calculation module 308 calculates a social strength of the social network or the social strength of the social network for the categories for the time period and/or an addition time period by combining the strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and the tube value.
- the combination may be by a linear combination, a quadratic equation, or the like.
- the social strength provider module 310 provides the social strength of the social network and/or one or more categories in the social network for the time period and/or an addition time period for presentation.
- the social strength utilization module 312 uses the social strength of the social network and/or for a number of categories of the social network for the time period and/or the additional time period for analysis of the social network.
- the difference provider module 314 provides a difference between the social strength of the social network for the time period and the additional time period for presentation.
- FIG. 4 is an example of a motif subsystem 112 that may be deployed in the network analyzer 106 of the system 100 (see FIG. 1 ) or another system according to an example embodiment.
- the motif subsystem 112 may include a data access module 402 , a network analysis performance module 404 , an example user selection module 406 , a motif generation module 408 , a node distinguishing module 410 , a texture application module 412 , a motif provider module 414 , a template analysis module 416 , and/or a decision making module 418 .
- Other modules may also be used.
- the data access module 402 accesses user interaction data, interaction frequency data, and/or transactional financial data associated for a number of users for a time period in a social network.
- the network analysis performance module 404 performs network analysis on the user interaction data.
- the example user selection module 406 selects a number of example users within the social network, each of the example users being associated with reputation information.
- the motif generation module 408 generates a motif for the number of example users for the time period in accordance with the performing of the network analysis.
- the node distinguishing module 410 distinguishes a node of the example users in accordance with the reputation information of a respective example user.
- the texture application module 412 applies a texture to at least one connecting line of the motif in accordance with the interaction frequency data and/or the transactional financial data.
- the interaction frequency data may include the number of times with which users interacted with one another.
- the motif provider module 414 provides the motif with the number of distinguished nodes for presentation.
- the template analysis module 416 analyzes a template including the motif and a number of additional motifs.
- the decision making module 418 makes a decision regarding the social network in accordance with the analyzing of the template.
- FIG. 5 is an example of a plotting subsystem 500 that may be deployed in the network analyzer 106 of the system 100 (see FIG. 1 ) or another system according to an example embodiment.
- the plotting subsystem 500 may include a reputation information access module 502 , a interaction frequency data access module 504 , an aggregated correlation plotting module 506 , a plotting differentiation module 508 , a plotting provider module 510 , and/or a plotting utilization module 512 .
- Other modules may also be used.
- the reputation information access module 502 accesses reputation information associated with initiating users (e.g., buyers) and responding users (e.g., sellers) in a social network for a time period and/or an additional time period.
- the interaction frequency data access module 504 accesses interaction frequency data associated with the initiating users and the responding users for the time period and/or the additional time period.
- the aggregated correlation plotting module 506 plots an aggregated correlation between the initiating users and the receiving users in accordance with the reputation information and/or the assorted initiating users and the assorted initiating users in accordance with the reputation information.
- the assorted initiating users may include one or more of the initiating users.
- the assorted receiving users may include one or more of the receiving users.
- the plotting differentiation module 508 differentiates the plotting of the aggregated correlation in accordance with the interaction frequency data.
- the plotting provider module 510 provides the differentiated plotting of the aggregated correlation for presentation.
- the plotting utilization module 512 uses the differentiated plotting of the aggregated correlation for the time period and the additional time period for the analysis of the social network.
- FIG. 6 illustrates a method 600 for graphing according to an example embodiment.
- the method 600 may be performed by the network analyzer 106 (see FIG. 1 ) in the system 100 or another system.
- User interaction data of a time period for users in a social network is accessed at block 602 .
- the user interaction data may be associated with a single transaction category or multiple transaction categories.
- Network analysis is performed on the user interaction data at block 604 .
- a graph is generated from the user interaction data in accordance with the performing of the network analysis at block 606 .
- the graph may be a necktie-shaped graph, a bowtie shaped graph, or be in a different shape.
- the graphs may have different sized dimensions based on a particular representation.
- the additional user data may include, by way of example, interaction frequency data, reputation information, transactional financial data, or other data associated with the users.
- the texture applied to the graph may include colorization, striping, and the like.
- the texture may better enable a user to more easily understand more about the relationship of the users reflected in the graph. For example, users in a particular component of the graph may be making a large number of interactions or a small number of interactions.
- the method 600 may proceed to block 614 .
- the graph is utilized for analysis of the social network at block 614 .
- the graph may be provided for presentation.
- FIG. 7 illustrates a method 700 for graph generation according to an example embodiment.
- the method 700 may be performed at block 604 or otherwise performed.
- a strongly connected component of the graph is generated in accordance with the performing of the network analysis at block 702 .
- An in-component of the graph is generated in accordance with the performing of the network analysis at block 704 .
- An out-component of the graph is generated in accordance with the performing of the network analysis at block 706 .
- the in-component of the graph may be smaller than the out-component of the graph.
- a tube is used to connect the in-component to the out-component.
- One or more tendrils may be generated in accordance with the performing of the network analysis at block 710 .
- the one or more tendrils may be connected to the in-component or the out-component.
- a disconnected part may be generated in accordance with the performing of the network analysis at block 712 .
- the disconnected part may be disconnected from the strongly connect component, the in-component, and the out-component in the graph.
- FIG. 8A is a diagram of an example necktie-shaped graph 800 according to an example embodiment.
- the necktie-shaped graph 800 is an example representation of a graph that may be generated in accordance with the method 700 (see FIG. 7 ). However, other representations of the same or different types of graphs may also be generated.
- a strongly connected component 802 may be connected to an in-component 804 and an out-component 806 . While the representation of the example necktie-shaped graph 800 reflects a strongly connected component value of 5.83%, an in-component value of 3.03%, and an out-component value of 65.83%, other values may be used in other representations.
- the in-component 804 and the out-component 806 may be connected through a tube 808 .
- the tube value in the presentation representation is 0.64%, however other values may be used in other representations.
- One or more tendrils 810 . 1 - 810 . 6 may be connected to the in-component 804 or the out-component 806 . However, a different number of tendrils 810 . 1 - 810 . 6 may be used in a different representation.
- the tendril value in the presentation representation is 23.59%, however other values may be used in other representations.
- a disconnected component 812 may not be connected to the strongly connected component 802 , the in-component 804 , the out-component 806 , the tube 808 , and/or the tendrils 810 . 1 - 810 . 6 .
- the disconnected component value in the presentation representation is 1.09%, however other values may be used in other representations.
- FIGS. 8B-8E are diagrams of example graphs 820 , 840 , 860 , 880 according to example embodiments.
- Each of the graphs 820 , 840 , 860 , 880 include a strongly connected component, an in-component, an out-component, a tube, one or more tendrils, and a disconnected component.
- the graph 820 may represent an Antiques category
- the graph 840 may represent a Collectibles category
- the graph 860 may represent a Sports Memorabilia and Cards category
- the graph 880 may represent a Stamps category.
- FIG. 9 illustrates a block diagram of an example table 900 according to an example embodiment.
- the table 900 is an example representation that may reflect a distribution of various components of a graph (e.g., the necktie-shaped graph 800 of FIG. 8 ). However, other representations containing different values and/or components may also be used.
- the size row 902 of the table 900 may reflect a size percentage of various components of a graph.
- the average feedback row 904 may contain values that reflect an average feedback store of users associated with a particular component.
- the purchases row 906 may contain values that reflect an average and percentage of purchases associated with a particular component.
- the sales row 908 may contain values that reflect an average and percentage of sales associated with a particular component.
- the columns 910 - 029 are associated with particular components of a graph.
- FIG. 10 illustrates a method 1000 for graph utilization according to an example embodiment.
- the method 1000 may be performed at block 614 or otherwise performed.
- the graph is analyzed at block 1002 .
- a decision regarding the social network is made in accordance with the analyzing of the graph at block 1004 .
- an area of weakness may be identified in the social network.
- an aspect of the social network is altered in accordance with the making of the decision.
- FIG. 11 illustrates a method 1100 for graph utilization according to an example embodiment.
- the method 1100 may be performed at block 614 or otherwise performed.
- additional user interaction data associated with the social network is accessed during a different time period.
- Network analysis is performed on the additional user interaction data at block 1104 .
- An additional graph is generated from the additional user interaction data in accordance with the performing of the network analysis at block 1106 .
- the graph and the additional graph are used for analysis of the social network.
- the graph and the additional graph may be provided for presentation and/or a difference between the graph and the additional graph may be provided for presentation.
- FIG. 12 illustrates a method 1200 for graph usage according to an example embodiment.
- the method 1200 may be performed at block 1108 or otherwise performed.
- a shape change between the graph and the additional graph is measured at block 1202 .
- a decision regarding the social network is made in accordance with the measuring of the shape change at block 1204 .
- the decision may include providing one or more users with an incentive to become associated with a component, to exclude users from the social network, or the like.
- An aspect of the social network is altered in accordance with the making of the decision at block 1206 .
- FIG. 13 illustrates a method 1300 for conducting social strength analysis according to an example embodiment.
- the method 1300 may be performed by the network analyzer 106 (see FIG. 1 ) in the system 100 or another system.
- a strongly connected component value, an in-component value, an out-component value, a disconnected component value, a tendril value, and/or a tube value of a social network (e.g., a social commerce network) for a time period is accessed at block 1302 .
- a social network e.g., a social commerce network
- social strength of the social network is calculated for the time period by combining the strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and/or the tube value.
- the social strength may be calculated for the entire social network and/or a number of categories in the social network for the time period.
- the combination may be through a linear combination or a different type of function.
- the strongly connected component value may have greatest weight in the combination.
- the disconnected component value may have the lowest weight in the combination.
- the weight of the in-component, the out-component, and the tube may be equally weighted.
- the weight of the strongly connected component value may be double the weight of the in-component and the out-component and the weight of the disconnected component value may be half the weight of the in-component and the out-component in the linear combination.
- other weightings in the combination may also be used.
- the social strength of the social network for the time period is utilized for analysis of the social network at block 1306 .
- the social strength of the social network for the time period may be provided for presentation.
- FIG. 14 illustrates a method 1400 for accessing social network values according to an example embodiment.
- the method 1400 may be performed at block 614 , block 1302 , or otherwise performed.
- a strongly connected component value is determined in accordance with a graph percentage of a strongly connected component of the social network at block 1402 .
- An in-component value is determined in accordance with the graph percentage of an in-component of the social network at block 1404 .
- An out-component value is determined in accordance with the graph percentage of an out-component of the social network at block 1406 .
- a disconnected component value may be determined in accordance with the graph percentage of a disconnected component of the social network at block 1408 .
- a tendril value may be determined in accordance with the graph percentage of one or more tendrils of the social network at block 1410 .
- a tube value may be determined in accordance with the graph percentage of a tube of the social network at block 1412 .
- FIG. 15 illustrates a method 1500 for accessing social strength utilization according to an example embodiment.
- the method 1500 may be performed at block 1306 or otherwise performed.
- the strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and/or the tube value of the social network is accessed for an additional time period at block 1502 .
- the social strength of the social network for the time period and the additional time period is used for analysis of the social network at block 1506 .
- the social strength of the social network for the time period and the additional time period and/or a difference between the social strength of the social network for the time period and the additional time period may be provided for presentation.
- the provided social strength may be for one or more categories of the social network or the entire social network.
- FIG. 16 is a block diagram of a chart 1600 according to an example embodiment.
- the chart 1600 is an example comparison of the network shapes of multiple categories of an example social network.
- the categories reflected in the social network of the chart 1600 include an entire network, Antiques, Art, Baby, Books, Business & Industrial, Cameras & Photo, Clothing, Shoes & Apparel, Collectibles, Computers & Networking, Consumer Electronics, Crafts, Dolls & Bears, DVDs & Movies, Entertainment Memorabilia, Everything Else, Gift Certificates, Health & Beauty, Home & Garden, Jewelry & Watches, Live Auctions, Music, Musical Instruments, Pottery & Glass, Real Estate, Specialty Services, Sporting Goods, Sports Memorabilia & Cards, Stamps, Tickets, Toys & Hobbies, Travel, and Video Games.
- Other social networks may be categorized with a different number of categories and/or different types of categories.
- FIG. 17 is a block diagram of a chart 1700 according to an example embodiment.
- the chart 1700 is an example comparison of the social strength of multiple categories in a social network.
- other comparisons may also be used.
- other social networks may be categorized with a different number of categories and/or different types of categories.
- FIG. 18 illustrates a method 1800 for conducting social strength analysis according to an example embodiment.
- the method 1800 may be performed by the network analyzer 106 (see FIG. 1 ) in the system 100 or another system.
- a strongly connected component value, an in-component value, an out-component value, a disconnected component value, a tendril value, and/or a tube value of a social network for a time period is accessed at block 1802 .
- a social strength of the social network for the time period is calculated by taking a linear combination of the strongly connected component value (e.g., a value of a strongly connected component), the in-component value, the out-component value, the disconnected component value, the tendril value, and the tube value.
- the strongly connected component value e.g., a value of a strongly connected component
- One or more users associated with the strongly connected component are identified at block 1806 .
- An aspect of the social network associated with the one or more users may be modified at block 1808 .
- the one or more users may be provided with an incentive to have a number of other users utilize a feature of the social network and/or with a designated status in the social network.
- Other aspects of the social network may also be modified.
- the strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and the tube value of the social network may be accessed for an additional time period.
- the additional time period may be after the modifying of the aspect performed at the block 1808 .
- the social strength of the social network is calculated for the additional time period by taking the linear combination of the strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and/or the tube value.
- the social strength of the social network for the time period and the additional time period is used for analysis at block 1814 .
- User interaction data associated for users for a time period in a social network is accessed at block 1902 .
- Network analysis is performed on the user interaction data at block 1904 .
- Example users within the social network are selected at block 1906 .
- the example users may be associated with reputation information (e.g., user feedback).
- a motif for the example users for the time period is generated in accordance with the performing of the network analysis at block 1908 .
- a node of the motif may be associated with an example user.
- the motif may define an expected relationship between a number of example users in the social network. For example, a four node motif may be generated.
- the node of the example users may be distinguished in accordance with the reputation information of a respective example user at block 1910 .
- the node of the example users may be colored in accordance with the reputation information.
- the additional user data may include interaction frequency data and/or transaction financial data associated with the users. If a determination is made not to apply the texture at decision block 1912 or upon completion of the operations at block 1916 , the method 1900 may proceed to the block 1918 .
- FIG. 20 illustrates a method 2000 for motif utilization according to an example embodiment.
- the method 2000 may be performed at block 1918 or otherwise performed.
- the method 2000 may be performed at block 1918 or otherwise performed.
- a template including the motif and a number of additional motifs is analyzed at block 2002 .
- a decision regarding the social network is made in accordance with the analyzing of the template at block 2004 .
- At block 2006 at least one aspect of the social network is altered in accordance with the making of the decision.
- FIG. 21 is a block diagram of example motif display 2100 according to an example embodiment.
- the motif display 2100 is an example representation of four node motifs from two categories of a social network. However, motifs may be made for other categories of the social network or the entire social network. Motifs containing a different number of nodes may also be used.
- the motif display 2100 includes a number of motifs 2126 - 2144 for a first category 2102 and a number of motifs 2146 for a second category 2164 .
- a distinguishing legend 2106 may include a series of distinguishing levels 2180 - 2124 that reflect different reputation information associated with users of the motifs 2126 - 2164 .
- the nodes of the motif 2126 includes a first node with a distinguishing level 2118 , a second node with a distinguishing level 2120 , a third node with a distinguishing level 2122 , and a fourth node with a distinguishing level 2124 .
- FIG. 22 illustrates a method 2200 for differentiated plotting analysis according to an example embodiment.
- the method 2200 may be performed by the network analyzer 106 (see FIG. 1 ) in the system 100 or another system.
- Reputation information associated with a number of initiating users and a number of responding users in a social network for a time period is accessed at block 2202 .
- Interaction frequency data associated with the initiating users and the responding users for the time period is accessed at block 2204 .
- An aggregated correlation between the initiating users and the responding users is plotted in accordance with the reputation information at block 2206 .
- the plotting of the aggregated correlation is differentiated in accordance with the interaction frequency data at block 2208 .
- the differentiated plotting of the aggregated correlation is utilized at block 2210 .
- the differentiated plotting of the aggregated correlation may be provided for presentation.
- the differentiated plotting may be used to determine users' tendency to interact with others with respect of their reputation information (e.g., feedback scores). For example, the differentiated plotting may help identify whether users with high reputation information (e.g., high feedback scores) tend to interact with other users that also have high reputation information. Assortative mixing may be used to show the extent to which nodes (e.g., users) connect preferentially to other nodes with similar characteristics.
- FIG. 23 illustrates a method 2300 for differentiated plotting utilization according to an example embodiment.
- the method 2300 may be performed at block 2210 or otherwise performed.
- Reputation information associated with assorted initiating users and a assorted responding users in a social network for an additional time period is accessed at block 2302 .
- interaction frequency data associated with the assorted initiating users and the assorted responding users for the additional time period is accessed.
- the plotting of the aggregated correlation of the additional time period is differentiated in accordance with the interaction frequency data at block 2206 .
- the aggregated correlation between the assorted initiating users and the assorted initiating users is plotted in accordance with the reputation information at block 2308 .
- the differentiated plotting of the aggregated correlation for the time period and the additional time period is used for the analysis of the social network at block 2310 .
- FIGS. 24-26 are diagrams of example differentiated plottings 2400 , 2500 , 2600 .
- the differentiated plottings 2400 , 2500 , 2600 are example representations of differentiated plottings that may be plotted in accordance with the method 2200 and/or the method 2300 . However, other representations of the differentiated plottings may also be used.
- the differentiated plottings 2400 , 2500 , 2600 plot the aggregated correlation between initiating users' reputation information (e.g., sellers' feedback scores) and receiving users' reputation information (e.g., buyers' feedback scores).
- initiating users' reputation information e.g., sellers' feedback scores
- receiving users' reputation information e.g., buyers' feedback scores
- the x axis of the differentiated plottings 2400 , 2500 , 2600 denotes users' reputation information
- the y axis denotes receiving users reputation information.
- the axes of the differentiated plottings 2400 , 2500 , 2600 may be logarithmically binned.
- the differentiation on the differentiated plottings 2400 , 2500 , 2600 based on interaction frequency data may be color. For example, a score of zero to two hundred is reflected by a dark blue color, a score of two hundred to four hundred is reflect by a medium blue color, a score of four hundred to six hundred is reflected by a light blue color, a score of six hundred to eight hundred is reflected by a blue/green color, a score of eight hundred to one thousand is reflected by a green/yellow color, a score of one thousand to one thousand two hundred is reflect by a yellow/orange color, a score of one thousand two hundred to one thousand four hundred is reflect by an orange/red color, and one thousand four hundred is reflected by a red color.
- the colors in the legend are shown in the differentiated plottings 2400 , 2500 , 2600 as being gradient. However other types of representations of the differentiation may be used.
- the color of each block of the differentiated plottings 2400 , 2500 , 2600 may be determined by the number of interactions (e.g., transactions) that happed between pairs of users with corresponding reputation information.
- the differentiated plotting 2400 may represent a number of transactions of a particular category (e.g., crafts) in which most interactions (e.g., transactions) are between initiating users (e.g., buyers) that have a feedback score between twenty and five hundred and responding users (e.g., sellers) that have a feedback score between ten and ninety.
- a particular category e.g., crafts
- most interactions e.g., transactions
- initiating users e.g., buyers
- responding users e.g., sellers
- the differentiated plotting 2500 may represent a number of transactions of a particular category in which most interactions are between initiating users that have a feedback score between sixteen and sixty and responding users that have a feedback score between one hundred fifty and two seven hundred.
- the differentiated plotting 2600 may represent a number of transactions of a particular category (e.g., collectables) in which most interactions are between initiating users that have a feedback score between ten and seventy and responding users that have a feedback score between one hundred and three thousand.
- a particular category e.g., collectables
- FIG. 27 is a network diagram depicting a client-server system 2700 , within which one example embodiment may be deployed.
- a network 2704 may include the functionality of the provider network 104
- the network analyzer 106 may be deployed within an application server 2718
- the client machines 102 . 1 - 102 . n may include the functionality of a client machine 2710 or a client machine 2712 .
- the system 100 may also be deployed in other systems.
- a networked system 2702 in the example forms of a network-based marketplace or publication system, provides server-side functionality, via a network 2704 (e.g., the Internet or Wide Area Network (WAN)) to one or more clients.
- a network 2704 e.g., the Internet or Wide Area Network (WAN)
- FIG. 27 illustrates, for example, a web client 2706 (e.g., a browser, such as the Internet Explorer browser developed by Microsoft Corporation of Redmond, Wash. State), and a programmatic client 2708 executing on respective client machines 2710 and 2712 .
- a web client 2706 e.g., a browser, such as the Internet Explorer browser developed by Microsoft Corporation of Redmond, Wash. State
- programmatic client 2708 executing on respective client machines 2710 and 2712 .
- An Application Program Interface (API) server 2714 and a web server 2716 are coupled to, and provide programmatic and web interfaces respectively to, one or more application servers 2718 .
- the application servers 2718 host one or more marketplace applications 2720 and authentication providers 2722 .
- the application servers 2718 are, in turn, shown to be coupled to one or more databases servers 2724 that facilitate access to one or more databases 2726 .
- the marketplace applications 2720 may provide a number of marketplace functions and services to users that access the networked system 2702 .
- the authentication providers 2722 may likewise provide a number of payment services and functions to users.
- the authentication providers 2722 may allow users to accumulate value (e.g., in a commercial currency, such as the U.S. dollar, or a proprietary currency, such as “points”) in accounts, and then later to redeem the accumulated value for products (e.g., goods or services) that are made available via the marketplace applications 2720 . While the marketplace and authentication providers 2720 and 2722 are shown in FIG. 27 to both form part of the networked system 2702 , in alternative embodiments the authentication providers 2722 may form part of a payment service that is separate and distinct from the networked system 2702 .
- system 2700 shown in FIG. 27 employs a client-server architecture
- present invention is of course not limited to such an architecture, and could equally well find application in a distributed, or peer-to-peer, architecture system, for example.
- the various marketplace and authentication providers 2720 and 2722 could also be implemented as standalone software programs, which need not have networking capabilities.
- the web client 2706 accesses the various marketplace and authentication providers 2720 and 2722 via the web interface supported by the web server 2716 .
- the programmatic client 2708 accesses the various services and functions provided by the marketplace and authentication providers 2720 and 2722 via the programmatic interface provided by the API server 2714 .
- the programmatic client 2708 may, for example, be a seller application (e.g., the TurboListerTM application developed by eBay Inc., of San Jose, Calif.) to enable sellers to author and manage listings on the networked system 2702 in an off-line manner, and to perform batch-mode communications between the programmatic client 2708 and the networked system 2702 .
- FIG. 27 also illustrates a third party application 2728 , executing on a third party server machine 2730 , as having programmatic access to the networked system 2702 via the programmatic interface provided by the API server 2714 .
- the third party application 2728 may, utilizing information retrieved from the networked system 2702 , support one or more features or functions on a website hosted by the third party.
- the third party may, for example, provide one or more promotional, marketplace or payment functions that are supported by the relevant applications of the networked system 2702 .
- FIG. 28 is a block diagram illustrating multiple applications 2720 and 2722 that, in one example embodiment, are provided as part of the networked system 2702 (see FIG. 27 ).
- the applications 2720 may be hosted on dedicated or shared server machines (not shown) that are communicatively coupled to enable communications between server machines.
- the applications themselves are communicatively coupled (e.g., via appropriate interfaces) to each other and to various data sources, so as to allow information to be passed between the applications or so as to allow the applications to share and access common data.
- the applications may furthermore access one or more databases 2726 via the database servers 2724 .
- the networked system 2702 may provide a number of publishing, listing and price-setting mechanisms whereby a seller may list (or publish information concerning) goods or services for sale, a buyer can express interest in or indicate a desire to purchase such goods or services, and a price can be set for a transaction pertaining to the goods or services.
- the marketplace applications 2720 are shown to include at least one publication application 1110 and one or more auction applications 2802 which support auction-format listing and price setting mechanisms (e.g., English, Dutch, Vickrey, Chinese, Double, Reverse auctions etc.).
- the various auction applications 2802 may also provide a number of features in support of such auction-format listings, such as a reserve price feature whereby a seller may specify a reserve price in connection with a listing and a proxy-bidding feature whereby a bidder may invoke automated proxy bidding.
- a reserve price feature whereby a seller may specify a reserve price in connection with a listing
- a proxy-bidding feature whereby a bidder may invoke automated proxy bidding.
- a number of fixed-price applications 2804 support fixed-price listing formats (e.g., the traditional classified advertisement-type listing or a catalogue listing) and buyout-type listings.
- buyout-type listings e.g., including the Buy-It-Now (BIN) technology developed by eBay Inc., of San Jose, Calif.
- BIN Buy-It-Now
- auction-format listings may be offered in conjunction with auction-format listings, and allow a buyer to purchase goods or services, which are also being offered for sale via an auction, for a fixed-price that is typically higher than the starting price of the auction.
- Store applications 2806 allow a seller to group listings within a “virtual” store, which may be branded and otherwise personalized by and for the seller. Such a virtual store may also offer promotions, incentives and features that are specific and personalized to a relevant seller.
- Reputation applications 2808 allow users that transact, utilizing the networked system 2702 , to establish, build and maintain reputations, which may be made available and published to potential trading partners.
- the reputation applications 2808 allow a user, for example through feedback provided by other transaction partners, to establish a reputation within the networked system 2702 over time. Other potential trading partners may then reference such a reputation for the purposes of assessing credibility and trustworthiness.
- Personalization applications 2810 allow users of the networked system 2702 to personalize various aspects of their interactions with the networked system 2702 . For example a user may, utilizing an appropriate personalization application 2810 , create a personalized reference page at which information regarding transactions to which the user is (or has been) a party may be viewed. Further, a personalization application 2810 may enable a user to personalize listings and other aspects of their interactions with the networked system 2702 and other parties.
- the networked system 2702 may support a number of marketplaces that are customized, for example, for specific geographic regions.
- a version of the networked system 2702 may be customized for the United Kingdom, whereas another version of the networked system 2702 may be customized for the United States.
- Each of these versions may operate as an independent marketplace, or may be customized (or internationalized and/or localized) presentations of a common underlying marketplace.
- the networked system 2702 may accordingly include a number of internationalization applications 2812 that customize information (and/or the presentation of information) by the networked system 2702 according to predetermined criteria (e.g., geographic, demographic or marketplace criteria).
- predetermined criteria e.g., geographic, demographic or marketplace criteria.
- the internationalization applications 2812 may be used to support the customization of information for a number of regional websites that are operated by the networked system 2702 and that are accessible via respective web servers 2716 .
- Navigation of the networked system 2702 may be facilitated by one or more navigation applications 2814 .
- a search application (as an example of a navigation application) may enable key word searches of listings published via the networked system 2702 .
- a browse application may allow users to browse various category, catalogue, or system inventory structures according to which listings may be classified within the networked system 2702 .
- Various other navigation applications may be provided to supplement the search and browsing applications.
- the marketplace applications 2720 may include one or more imaging applications 2816 utilizing which users may upload images for inclusion within listings.
- An imaging application 2816 also operates to incorporate images within viewed listings.
- the imaging applications 2816 may also support one or more promotional features, such as image galleries that are presented to potential buyers. For example, sellers may pay an additional fee to have an image included within a gallery of images for promoted items.
- Listing creation applications 2818 allow sellers conveniently to author listings pertaining to goods or services that they wish to transact via the networked system 2702
- listing management applications 2820 allow sellers to manage such listings. Specifically, where a particular seller has authored and/or published a large number of listings, the management of such listings may present a challenge.
- the listing management applications 2820 provide a number of features (e.g., auto-relisting, inventory level monitors, etc.) to assist the seller in managing such listings.
- One or more post-listing management applications 2822 also assist sellers with a number of activities that typically occur post-listing. For example, upon completion of an auction facilitated by one or more auction applications 2802 , a seller may wish to leave feedback regarding a particular buyer. To this end, a post-listing management application 2822 may provide an interface to one or more reputation applications 2808 , so as to allow the seller conveniently to provide feedback regarding multiple buyers to the reputation applications 2808 .
- Dispute resolution applications 2824 provide mechanisms whereby disputes arising between transacting parties may be resolved.
- the dispute resolution applications 2824 may provide guided procedures whereby the parties are guided through a number of steps in an attempt to settle a dispute. In the event that the dispute cannot be settled via the guided procedures, the dispute may be escalated to a merchant mediator or arbitrator.
- a number of fraud prevention applications 2826 implement fraud detection and prevention mechanisms to reduce the occurrence of fraud within the networked system 2702 .
- Messaging applications 2828 are responsible for the generation and delivery of messages to users of the networked system 2702 , such messages for example advising users regarding the status of listings at the networked system 2702 (e.g., providing “outbid” notices to bidders during an auction process or to provide promotional and merchandising information to users). Respective messaging applications 2828 may utilize any one have a number of message delivery networks and platforms to deliver messages to users.
- messaging applications 2828 may deliver electronic mail (e-mail), instant message (IM), Short Message Service (SMS), text, facsimile, or voice (e.g., Voice over IP (VoIP)) messages via the wired (e.g., the Internet), Plain Old Telephone Service (POTS), or wireless (e.g., mobile, cellular, WiFi, WiMAX) networks.
- e-mail electronic mail
- IM instant message
- SMS Short Message Service
- text e.g., text
- facsimile e.g., facsimile
- voice e.g., Voice over IP (VoIP)
- POTS Plain Old Telephone Service
- wireless e.g., mobile, cellular, WiFi, WiMAX
- Merchandising applications 2830 support various merchandising functions that are made available to sellers to enable sellers to increase sales via the networked system 2702 .
- the merchandising applications 2830 also operate the various merchandising features that may be invoked by sellers, and may monitor and track the success of merchandising strategies employed by sellers.
- a network analyzer application 2834 may analyze the social network amount a number of users of the system 100 .
- FIG. 29 shows a diagrammatic representation of machine in the example form of a computer system 2900 within which a set of instructions may be executed causing the machine to perform any one or more of the methods, processes, operations, or methodologies discussed herein.
- the network analyzer 106 may operate on or more computer systems 2900 and/or the client machines 102 . 1 - 102 . n may include the functionality of the computer system 2900 .
- the machine operates as a standalone device or may be connected (e.g., networked) to other machines.
- the machine may operate in the capacity of a server or a client machine in server-client network environment, or as a peer machine in a peer-to-peer (or distributed) network environment.
- the machine may be a server computer, a client computer, a personal computer (PC), a tablet PC, a set-top box (STB), a Personal Digital Assistant (PDA), a cellular telephone, a web appliance, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.
- PC personal computer
- PDA Personal Digital Assistant
- the example computer system 2900 includes a processor 2902 (e.g., a central processing unit (CPU) a graphics processing unit (GPU) or both), a main memory 2904 and a static memory 2906 , which communicate with each other via a bus 2908 .
- the computer system 2900 may further include a video display unit 2910 (e.g., a liquid crystal display (LCD) or a cathode ray tube (CRT)).
- the computer system 2900 also includes an alphanumeric input device 2912 (e.g., a keyboard), a cursor control device 2914 (e.g., a mouse), a drive unit 2916 , a signal generation device 2918 (e.g., a speaker) and a network interface device 2920 .
- the drive unit 2916 includes a machine-readable medium 2922 on which is stored one or more sets of instructions (e.g., software 2924 ) embodying any one or more of the methodologies or functions described herein.
- the software 2924 may also reside, completely or at least partially, within the main memory 2904 and/or within the processor 2902 during execution thereof by the computer system 2900 , the main memory 2904 and the processor 2902 also constituting machine-readable media.
- the software 2924 may further be transmitted or received over a network 2926 via the network interface device 2920 .
- machine-readable medium 2922 is shown in an example embodiment to be a single medium, the term “machine-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions.
- the term “machine-readable medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present invention.
- the term “machine-readable medium” shall accordingly be taken to include, but not be limited to, solid-state memories, optical and magnetic media, and carrier wave signals.
- a module or a mechanism may be a unit of distinct functionality that can provide information to, and receive information from, other modules. Accordingly, the described modules may be regarded as being communicatively coupled. Modules may also initiate communication with input or output devices, and can operate on a resource (e.g., a collection of information).
- the modules be implemented as hardware circuitry, optical components, single or multi-processor circuits, memory circuits, software program modules and objects, firmware, and combinations thereof, as appropriate for particular implementations of various embodiments.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Economics (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- General Business, Economics & Management (AREA)
- Computing Systems (AREA)
- Entrepreneurship & Innovation (AREA)
- Game Theory and Decision Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Primary Health Care (AREA)
- Tourism & Hospitality (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Methods and system for social network analysis are described. In one embodiment, user interaction data of a time period for a plurality of users in a social network may be accessed. Network analysis may be performed on the user interaction data. A necktie-shaped graph may be generated from the user interaction data in accordance with the performing of the network analysis. The necktie-shaped graph may be utilized for analysis of the social network.
Description
- This application claims the benefit of United States Provisional Patent Applications entitled “Social Network Analysis”, Ser. No. 60/971,904, filed Sep. 12, 2007 and entitled “Analysis of a Social Commerce Network”, Ser. No.: 60/984,677, filed Nov. 1, 2007, the entire contents of which are herein incorporated by reference.
- The web is evolving from a content and commerce space to a space of social interactions. With the space of social interactions, users may interact with one another in both commercial settings and non-commercial settings (e.g., an information only exchange).
- Some embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings in which:
-
FIG. 1 is a block diagram of a system, according to an example embodiment; -
FIG. 2 is a block diagram of an example graphing subsystem that may be deployed within the system ofFIG. 1 according to an example embodiment; -
FIG. 3 is a block diagram of an example social strength subsystem that may be deployed within the system ofFIG. 1 according to an example embodiment; -
FIG. 4 is a block diagram of an example motif subsystem that may be deployed within the system ofFIG. 1 according to an example embodiment; -
FIG. 5 is a block diagram of an example plotting subsystem that may be deployed within the system ofFIG. 1 according to an example embodiment; -
FIG. 6 is a flowchart illustrating a method for graphing according to an example embodiment; -
FIG. 7 is a flowchart illustrating a method for graph generation according to an example embodiment; -
FIGS. 8A-8E are block diagrams of graphs according to an example embodiment; -
FIG. 9 is a block diagram of a table according to an example embodiment; -
FIGS. 10 and 11 are flowcharts illustrating a method for graph utilization according to an example embodiment; -
FIG. 12 is a flowchart illustrating a method for graph usage according to an example embodiment; -
FIG. 13 is a flowchart illustrating a method for conducting social strength analysis according to an example embodiment; -
FIG. 14 is a flowchart illustrating a method for accessing social network values according to an example embodiment; -
FIG. 15 is a flowchart illustrating a method for social strength utilization according to an example embodiment; -
FIGS. 16 and 17 are block diagrams of charts according to an example embodiment; -
FIG. 18 is a flowchart illustrating a method for conducting social strength analysis according to an example embodiment; -
FIG. 19 is a flowchart illustrating a method for conducting motif analysis according to an example embodiment; -
FIG. 20 is a flowchart illustrating a method for motif utilization according to an example embodiment; -
FIG. 21 is a block diagram of an example motif display according to an example embodiment; -
FIG. 22 is a flowchart illustrating a method for differentiated plotting analysis according to an example embodiment; -
FIG. 23 is a flowchart illustrating a method for differentiated plotting utilization according to an example embodiment; -
FIGS. 24-26 are diagrams of example differentiated plottings according to an example embodiment; -
FIG. 27 is a network diagram depicting a network system, according to one embodiment, having a client server architecture configured for exchanging data over a network; -
FIG. 28 is a block diagram illustrating an example embodiment of multiple network and marketplace applications, which are provided as part of the network-based marketplace; and -
FIG. 29 is a block diagram diagrammatic representation of machine in the example form of a computer system within which a set of instructions for causing the machine to perform any one or more of the methodologies discussed herein may be executed. - Example methods and systems for social network analysis are described. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of example embodiments. It will be evident, however, to one skilled in the art that the present invention may be practiced without these specific details.
- In an example embodiment, user interaction data of a time period for a plurality of users in a social network may be accessed. Network analysis may be performed on the user interaction data. A necktie-shaped graph may be generated from the user interaction data in accordance with the performing of the network analysis. The necktie-shaped graph may be utilized for analysis of the social network.
- In an example embodiment, a strongly connected component value, an in-component value, an out-component value, a disconnected component value, a tendril value, and a tube value of a social network for a time period may be accessed. A social strength of the social network for the time period may be calculated by combining the strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and the tube value. The social strength of the social network for the time period may be utilized for analysis of the social network. The strongly connected component value may have a greatest weight and the disconnected component value may have the lowest weight in the combining.
- In an example embodiment, a strongly connected component value, an in-component value, an out-component value, a disconnected component value, a tendril value, and a tube value of a social network for a time period may be accessed. A social strength of the social network for the time period may be calculated by combining the strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and the tube value. One or more users associated with the strongly connected component may be identified. The strongly connected component value may be a value of the strongly connected component for the time period. An aspect of the social network associated with the one or more users may be modified. The strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and the tube value of the social network for an additional time period may be accessed. The additional time period may be after the modifying of the aspect. The social strength of the social network for the additional time period may be calculated by combining the strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and the tube value. The social strength of the social network for the time period and the additional time period may be utilized for analysis in accordance with the modifying of the aspect of the social network.
- In an example embodiment, user interaction data associated for a plurality of users for a time period in a social network may be accessed. Network analysis may be performed on the user interaction data. A plurality of example users within the social network may be selected. Each of the example users may be associated with reputation information. A motif may be generated for the plurality of example users for the time period in accordance with the performing of the network analysis. A node of the motif may be associated with a particular example user of the example users. The motif may define an expected relationship between the plurality of example users in the social network. The node of the plurality of example users may be distinguished in accordance with the reputation information of a respective example user. The motif with a plurality of distinguished nodes may be utilized for analysis of the social network.
- In an example embodiment, reputation information associated with a plurality of initiating users and a plurality of responding users in a social network for a time period may be accessed. Interaction frequency data associated with the plurality of initiating users and the plurality of responding users for the time period may be accessed. An aggregated correlation between the plurality of initiating users and the plurality of responding users may be plotted in accordance with the reputation information. The plotting of the aggregated correlation may be differentiated in accordance with the interaction frequency data. The differentiated plotting of the aggregated correlation may be utilized.
-
FIG. 1 illustrates anexample system 100 in which a community of users may use a number of client machines 102.1-102.n to be involved in a social network. The client machine 102 may be a computing system, mobile phone, a personal digital assistant (PDA), a gaming unit, a portable computing unit, and the like. The social network may be a social commerce network over with the users operating the machines may be involved in commercial exchange (e.g., buying or selling). However, other types of social networks (e.g., informational social networks) may also be used. - In an example embodiment, the social network may be a social structure made of nodes (e.g., individuals or organizations) that are tied by one or more specific types of interdependency including, by way of example, values, visions, idea, commerce, friends, kinship, dislike, conflict, web links, sexual relations, disease transmission, or airline routes. For example, a social commerce network may be a network that includes a commercial interdependency.
- The client machines 102.1-102.n may participate in the social network by communicating over a
provider network 104 with anetwork analyzer 106. Theprovider network 104 may be a Global System for Mobile Communications (GSM) network, an Internet Protocol (IP) network, a Wireless Application Protocol (WAP) network, a WiFi network, or a IEEE 802.11 standards network as well as various combinations thereof. Other conventional and/or later developed wired and wireless networks may also be used. - The
network analyzer 106 may enable the social network to be provided to the users of the client machines 102.1-102.n. Thenetwork analyzer 106 may be used to analyze the social network by using agraphing subsystem 108, asocial strength subsystem 110, amotif subsystem 112, and/or aplotting subsystem 114. Example embodiments of the subsystems 108-114 are described in greater detail below. -
FIG. 2 is an example of agraphing subsystem 108 that may be deployed in thenetwork analyzer 106 of the system 100 (seeFIG. 1 ) or another system according to an example embodiment. - The
graphing subsystem 108 may include a user interactiondata access module 202, a networkanalysis performance module 204, agraph generation module 206, agraph utilization module 208, a reputationinformation access module 210, a interaction frequencydata access module 212, a transactional financialdata access module 214, atexture application module 216, agraph analysis module 218, a shapechange measurement module 220, adecision making module 222, anetwork alteration module 224, agraph provider module 226, anaspect alteration module 228, and/or adifference provider module 230. Other modules may also be used. - The user interaction
data access module 202 accesses user interaction data of a time period for a number of users in a social network and/or accesses additional user interaction data associated with the social network during a different time period. - The network
analysis performance module 204 performs network analysis on user interaction data and/or additional user interaction data. The user interaction data may be based on communications between users. For example, the user interaction data may include, by way of example, transactional relationship data that relates to a transaction (e.g., a sale or item exchange) that has occurred between users, communication interaction data that relates to a communication (e.g., an e-mail, an instant message, or a voice over IP call) that has occurred between users, and the like. - The
graph generation module 206 generates a graph (e.g., a necktie-shaped graph) from the user interaction data and/or an additional graph from the additional user interaction data in accordance with the performing of the network analysis. - The
graph utilization module 208 uses a graph and/or an additional graph for analysis of the social network. The reputationinformation access module 210 accesses reputation information associated with the number of users. The reputation information may include, by way of example, user feedback (e.g., as provided by eBay Inc., of San Jose, Calif.), a rating of a posting, or the like. - The interaction frequency
data access module 212 accesses interaction frequency data associated with the number of users. The transactional financialdata access module 214 accesses transactional financial data associated with the number of users. - The
texture application module 216 applies a texture to the graph in accordance with reputation information, interaction frequency data and/or transactional financial data. Thegraph analysis module 218 analyzes the graph. - The shape
change measurement module 220 measures a shape change between the graph and the additional graph. Thedecision making module 222 makes a decision regarding the social network in accordance with the analyzing of the graph and/or the measuring of the shape change. - The
network alteration module 224 alters an aspect of the social network in accordance with the making of the decision. Thegraph provider module 226 provides the graph and/or the additional graph for presentation. - The
aspect alteration module 228 alters an aspect of the social network in accordance with the making of the decision. Thedifference provider module 230 provides a difference between the graph and the additional graph for presentation. -
FIG. 3 is an example of asocial strength subsystem 110 that may be deployed in thenetwork analyzer 106 of the system 100 (seeFIG. 1 ) or another system according to an example embodiment. - The
social strength subsystem 110 may include auser identification module 302, anaspect modification module 304, avalue access module 306, a socialstrength calculation module 308, a socialstrength provider module 310, a socialstrength utilization module 312, and/or adifference provider module 314. Other modules may also be used. - The
user identification module 302 identifies one or more users associated with the strongly connected component. The strongly connected component value may be a value of the strongly connected component for the time period. Theaspect modification module 304 modifies an aspect of the social network associated with the one or more users. - The
value access module 306 accesses a strongly connected component value, an in-component value, an out-component value, a disconnected component value, a tendril value, and a tube value of a social network for a time period and/or an additional time period. - The social
strength calculation module 308 calculates a social strength of the social network or the social strength of the social network for the categories for the time period and/or an addition time period by combining the strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and the tube value. The combination may be by a linear combination, a quadratic equation, or the like. - The social
strength provider module 310 provides the social strength of the social network and/or one or more categories in the social network for the time period and/or an addition time period for presentation. The socialstrength utilization module 312 uses the social strength of the social network and/or for a number of categories of the social network for the time period and/or the additional time period for analysis of the social network. - The
difference provider module 314 provides a difference between the social strength of the social network for the time period and the additional time period for presentation. -
FIG. 4 is an example of amotif subsystem 112 that may be deployed in thenetwork analyzer 106 of the system 100 (seeFIG. 1 ) or another system according to an example embodiment. - The
motif subsystem 112 may include adata access module 402, a networkanalysis performance module 404, an exampleuser selection module 406, amotif generation module 408, anode distinguishing module 410, atexture application module 412, amotif provider module 414, atemplate analysis module 416, and/or adecision making module 418. Other modules may also be used. - The
data access module 402 accesses user interaction data, interaction frequency data, and/or transactional financial data associated for a number of users for a time period in a social network. - The network
analysis performance module 404 performs network analysis on the user interaction data. The exampleuser selection module 406 selects a number of example users within the social network, each of the example users being associated with reputation information. - The
motif generation module 408 generates a motif for the number of example users for the time period in accordance with the performing of the network analysis. Thenode distinguishing module 410 distinguishes a node of the example users in accordance with the reputation information of a respective example user. - The
texture application module 412 applies a texture to at least one connecting line of the motif in accordance with the interaction frequency data and/or the transactional financial data. The interaction frequency data may include the number of times with which users interacted with one another. - The
motif provider module 414 provides the motif with the number of distinguished nodes for presentation. Thetemplate analysis module 416 analyzes a template including the motif and a number of additional motifs. Thedecision making module 418 makes a decision regarding the social network in accordance with the analyzing of the template. -
FIG. 5 is an example of aplotting subsystem 500 that may be deployed in thenetwork analyzer 106 of the system 100 (seeFIG. 1 ) or another system according to an example embodiment. - The plotting
subsystem 500 may include a reputationinformation access module 502, a interaction frequencydata access module 504, an aggregatedcorrelation plotting module 506, a plottingdifferentiation module 508, a plottingprovider module 510, and/or a plottingutilization module 512. Other modules may also be used. - The reputation
information access module 502 accesses reputation information associated with initiating users (e.g., buyers) and responding users (e.g., sellers) in a social network for a time period and/or an additional time period. - The interaction frequency
data access module 504 accesses interaction frequency data associated with the initiating users and the responding users for the time period and/or the additional time period. - The aggregated
correlation plotting module 506 plots an aggregated correlation between the initiating users and the receiving users in accordance with the reputation information and/or the assorted initiating users and the assorted initiating users in accordance with the reputation information. The assorted initiating users may include one or more of the initiating users. The assorted receiving users may include one or more of the receiving users. - The plotting
differentiation module 508 differentiates the plotting of the aggregated correlation in accordance with the interaction frequency data. The plottingprovider module 510 provides the differentiated plotting of the aggregated correlation for presentation. The plottingutilization module 512 uses the differentiated plotting of the aggregated correlation for the time period and the additional time period for the analysis of the social network. - Necktie-Shape Graphing
-
FIG. 6 illustrates amethod 600 for graphing according to an example embodiment. Themethod 600 may be performed by the network analyzer 106 (seeFIG. 1 ) in thesystem 100 or another system. - User interaction data of a time period for users in a social network (e.g., a social commerce network) is accessed at
block 602. The user interaction data may be associated with a single transaction category or multiple transaction categories. - Network analysis is performed on the user interaction data at
block 604. A graph is generated from the user interaction data in accordance with the performing of the network analysis atblock 606. The graph may be a necktie-shaped graph, a bowtie shaped graph, or be in a different shape. In addition, the graphs may have different sized dimensions based on a particular representation. - At
decision block 608, a determination may be made whether to apply a texture to the graph. If a determination is made to apply a texture, additional user data may be accessed atblock 610 and a textured may be applied to the graph in accordance with the additional user data atblock 612. The additional user data may include, by way of example, interaction frequency data, reputation information, transactional financial data, or other data associated with the users. - The texture applied to the graph may include colorization, striping, and the like. The texture may better enable a user to more easily understand more about the relationship of the users reflected in the graph. For example, users in a particular component of the graph may be making a large number of interactions or a small number of interactions.
- If a determination is made at
decision block 608 not to apply a texture or upon completion of the operations atblock 612, themethod 600 may proceed to block 614. - The graph is utilized for analysis of the social network at
block 614. For example, the graph may be provided for presentation. -
FIG. 7 illustrates amethod 700 for graph generation according to an example embodiment. Themethod 700 may be performed atblock 604 or otherwise performed. - A strongly connected component of the graph is generated in accordance with the performing of the network analysis at
block 702. An in-component of the graph is generated in accordance with the performing of the network analysis atblock 704. - An out-component of the graph is generated in accordance with the performing of the network analysis at
block 706. The in-component of the graph may be smaller than the out-component of the graph. - At
block 708, a tube is used to connect the in-component to the out-component. One or more tendrils may be generated in accordance with the performing of the network analysis atblock 710. The one or more tendrils may be connected to the in-component or the out-component. - A disconnected part may be generated in accordance with the performing of the network analysis at
block 712. The disconnected part may be disconnected from the strongly connect component, the in-component, and the out-component in the graph. -
FIG. 8A is a diagram of an example necktie-shapedgraph 800 according to an example embodiment. The necktie-shapedgraph 800 is an example representation of a graph that may be generated in accordance with the method 700 (seeFIG. 7 ). However, other representations of the same or different types of graphs may also be generated. - A strongly connected
component 802 may be connected to an in-component 804 and an out-component 806. While the representation of the example necktie-shapedgraph 800 reflects a strongly connected component value of 5.83%, an in-component value of 3.03%, and an out-component value of 65.83%, other values may be used in other representations. - The in-
component 804 and the out-component 806 may be connected through atube 808. The tube value in the presentation representation is 0.64%, however other values may be used in other representations. - One or more tendrils 810.1-810.6 may be connected to the in-
component 804 or the out-component 806. However, a different number of tendrils 810.1-810.6 may be used in a different representation. The tendril value in the presentation representation is 23.59%, however other values may be used in other representations. - A
disconnected component 812 may not be connected to the strongly connectedcomponent 802, the in-component 804, the out-component 806, thetube 808, and/or the tendrils 810.1-810.6. The disconnected component value in the presentation representation is 1.09%, however other values may be used in other representations. -
FIGS. 8B-8E are diagrams ofexample graphs graphs graph 820 may represent an Antiques category, thegraph 840 may represent a Collectibles category, thegraph 860 may represent a Sports Memorabilia and Cards category, and thegraph 880 may represent a Stamps category. -
FIG. 9 illustrates a block diagram of an example table 900 according to an example embodiment. The table 900 is an example representation that may reflect a distribution of various components of a graph (e.g., the necktie-shapedgraph 800 ofFIG. 8 ). However, other representations containing different values and/or components may also be used. - The
size row 902 of the table 900 may reflect a size percentage of various components of a graph. Theaverage feedback row 904 may contain values that reflect an average feedback store of users associated with a particular component. The purchases row 906 may contain values that reflect an average and percentage of purchases associated with a particular component. Thesales row 908 may contain values that reflect an average and percentage of sales associated with a particular component. The columns 910-029 are associated with particular components of a graph. -
FIG. 10 illustrates amethod 1000 for graph utilization according to an example embodiment. Themethod 1000 may be performed atblock 614 or otherwise performed. - The graph is analyzed at
block 1002. A decision regarding the social network is made in accordance with the analyzing of the graph atblock 1004. For example, an area of weakness may be identified in the social network. - At
block 1006, an aspect of the social network is altered in accordance with the making of the decision. -
FIG. 11 illustrates amethod 1100 for graph utilization according to an example embodiment. Themethod 1100 may be performed atblock 614 or otherwise performed. - At
block 1102, additional user interaction data associated with the social network is accessed during a different time period. Network analysis is performed on the additional user interaction data atblock 1104. - An additional graph is generated from the additional user interaction data in accordance with the performing of the network analysis at
block 1106. - At
block 1108, the graph and the additional graph are used for analysis of the social network. For example, the graph and the additional graph may be provided for presentation and/or a difference between the graph and the additional graph may be provided for presentation. -
FIG. 12 illustrates amethod 1200 for graph usage according to an example embodiment. Themethod 1200 may be performed atblock 1108 or otherwise performed. - A shape change between the graph and the additional graph is measured at
block 1202. A decision regarding the social network is made in accordance with the measuring of the shape change atblock 1204. For example, the decision may include providing one or more users with an incentive to become associated with a component, to exclude users from the social network, or the like. An aspect of the social network is altered in accordance with the making of the decision atblock 1206. - Social Strength Analysis
-
FIG. 13 illustrates amethod 1300 for conducting social strength analysis according to an example embodiment. Themethod 1300 may be performed by the network analyzer 106 (seeFIG. 1 ) in thesystem 100 or another system. - A strongly connected component value, an in-component value, an out-component value, a disconnected component value, a tendril value, and/or a tube value of a social network (e.g., a social commerce network) for a time period is accessed at
block 1302. - At
block 1304, social strength of the social network is calculated for the time period by combining the strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and/or the tube value. The social strength may be calculated for the entire social network and/or a number of categories in the social network for the time period. The combination may be through a linear combination or a different type of function. - The strongly connected component value may have greatest weight in the combination. The disconnected component value may have the lowest weight in the combination. The weight of the in-component, the out-component, and the tube may be equally weighted. For example, the weight of the strongly connected component value may be double the weight of the in-component and the out-component and the weight of the disconnected component value may be half the weight of the in-component and the out-component in the linear combination. However, other weightings in the combination may also be used.
- The social strength of the social network for the time period is utilized for analysis of the social network at
block 1306. For example, the social strength of the social network for the time period may be provided for presentation. -
FIG. 14 illustrates amethod 1400 for accessing social network values according to an example embodiment. Themethod 1400 may be performed atblock 614,block 1302, or otherwise performed. - A strongly connected component value is determined in accordance with a graph percentage of a strongly connected component of the social network at
block 1402. - An in-component value is determined in accordance with the graph percentage of an in-component of the social network at
block 1404. An out-component value is determined in accordance with the graph percentage of an out-component of the social network atblock 1406. A disconnected component value may be determined in accordance with the graph percentage of a disconnected component of the social network atblock 1408. - A tendril value may be determined in accordance with the graph percentage of one or more tendrils of the social network at
block 1410. A tube value may be determined in accordance with the graph percentage of a tube of the social network atblock 1412. -
FIG. 15 illustrates amethod 1500 for accessing social strength utilization according to an example embodiment. Themethod 1500 may be performed atblock 1306 or otherwise performed. - The strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and/or the tube value of the social network is accessed for an additional time period at
block 1502. - At
block 1504, the social strength of the social network is calculated for the additional time period by taking the linear combination of the strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and/or the tube value. The social strength may be calculated for the entire social network and/or a number of categories in the social network for the additional time period. - The social strength of the social network for the time period and the additional time period is used for analysis of the social network at
block 1506. For example, the social strength of the social network for the time period and the additional time period and/or a difference between the social strength of the social network for the time period and the additional time period may be provided for presentation. The provided social strength may be for one or more categories of the social network or the entire social network. -
FIG. 16 is a block diagram of achart 1600 according to an example embodiment. Thechart 1600 is an example comparison of the network shapes of multiple categories of an example social network. For example, the categories reflected in the social network of thechart 1600 include an entire network, Antiques, Art, Baby, Books, Business & Industrial, Cameras & Photo, Clothing, Shoes & Apparel, Collectibles, Computers & Networking, Consumer Electronics, Crafts, Dolls & Bears, DVDs & Movies, Entertainment Memorabilia, Everything Else, Gift Certificates, Health & Beauty, Home & Garden, Jewelry & Watches, Live Auctions, Music, Musical Instruments, Pottery & Glass, Real Estate, Specialty Services, Sporting Goods, Sports Memorabilia & Cards, Stamps, Tickets, Toys & Hobbies, Travel, and Video Games. Other social networks may be categorized with a different number of categories and/or different types of categories. -
FIG. 17 is a block diagram of achart 1700 according to an example embodiment. Thechart 1700 is an example comparison of the social strength of multiple categories in a social network. However, other comparisons may also be used. For example, other social networks may be categorized with a different number of categories and/or different types of categories. -
FIG. 18 illustrates amethod 1800 for conducting social strength analysis according to an example embodiment. Themethod 1800 may be performed by the network analyzer 106 (seeFIG. 1 ) in thesystem 100 or another system. - A strongly connected component value, an in-component value, an out-component value, a disconnected component value, a tendril value, and/or a tube value of a social network for a time period is accessed at
block 1802. - At
block 1804, a social strength of the social network for the time period is calculated by taking a linear combination of the strongly connected component value (e.g., a value of a strongly connected component), the in-component value, the out-component value, the disconnected component value, the tendril value, and the tube value. - One or more users associated with the strongly connected component are identified at
block 1806. An aspect of the social network associated with the one or more users may be modified atblock 1808. For example, the one or more users may be provided with an incentive to have a number of other users utilize a feature of the social network and/or with a designated status in the social network. Other aspects of the social network may also be modified. - At
block 1810, the strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and the tube value of the social network may be accessed for an additional time period. The additional time period may be after the modifying of the aspect performed at theblock 1808. - At
block 1812, the social strength of the social network is calculated for the additional time period by taking the linear combination of the strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and/or the tube value. - The social strength of the social network for the time period and the additional time period is used for analysis at
block 1814. - Motifs
-
FIG. 19 illustrates amethod 1900 for conducting motif analysis according to an example embodiment. Themethod 1900 may be performed by the network analyzer 106 (seeFIG. 1 ) in thesystem 100 or another system. - User interaction data associated for users for a time period in a social network (e.g., a social commerce network) is accessed at
block 1902. Network analysis is performed on the user interaction data atblock 1904. - Example users within the social network are selected at
block 1906. The example users may be associated with reputation information (e.g., user feedback). - A motif for the example users for the time period is generated in accordance with the performing of the network analysis at
block 1908. A node of the motif may be associated with an example user. The motif may define an expected relationship between a number of example users in the social network. For example, a four node motif may be generated. - The node of the example users may be distinguished in accordance with the reputation information of a respective example user at
block 1910. For example, the node of the example users may be colored in accordance with the reputation information. - At
decision block 1912, a determination may be made whether to apply a texture to the motif. If a determination is made to apply a texture, additional user data may be accessed atblock 1914 and the texture may be applied to one or more connected lines of the motif in accordance with the additional user data atblock 1916. For example, the additional user data may include interaction frequency data and/or transaction financial data associated with the users. If a determination is made not to apply the texture atdecision block 1912 or upon completion of the operations atblock 1916, themethod 1900 may proceed to theblock 1918. - The motif with the distinguished nodes may be utilized for analysis of the social network at
block 1918. For example, the motif with the distinguished nodes may be provided for presentation. -
FIG. 20 illustrates amethod 2000 for motif utilization according to an example embodiment. Themethod 2000 may be performed atblock 1918 or otherwise performed. - The
method 2000 may be performed atblock 1918 or otherwise performed. A template including the motif and a number of additional motifs is analyzed atblock 2002. - A decision regarding the social network is made in accordance with the analyzing of the template at
block 2004. Atblock 2006, at least one aspect of the social network is altered in accordance with the making of the decision. -
FIG. 21 is a block diagram ofexample motif display 2100 according to an example embodiment. Themotif display 2100 is an example representation of four node motifs from two categories of a social network. However, motifs may be made for other categories of the social network or the entire social network. Motifs containing a different number of nodes may also be used. - The
motif display 2100 includes a number of motifs 2126-2144 for afirst category 2102 and a number of motifs 2146 for asecond category 2164. - A distinguishing
legend 2106 may include a series of distinguishing levels 2180-2124 that reflect different reputation information associated with users of the motifs 2126-2164. For example, the nodes of themotif 2126 includes a first node with adistinguishing level 2118, a second node with adistinguishing level 2120, a third node with adistinguishing level 2122, and a fourth node with adistinguishing level 2124. - Differentiated Plotting
-
FIG. 22 illustrates amethod 2200 for differentiated plotting analysis according to an example embodiment. Themethod 2200 may be performed by the network analyzer 106 (seeFIG. 1 ) in thesystem 100 or another system. - Reputation information associated with a number of initiating users and a number of responding users in a social network for a time period is accessed at
block 2202. - Interaction frequency data associated with the initiating users and the responding users for the time period is accessed at
block 2204. An aggregated correlation between the initiating users and the responding users is plotted in accordance with the reputation information atblock 2206. - The plotting of the aggregated correlation is differentiated in accordance with the interaction frequency data at
block 2208. The differentiated plotting of the aggregated correlation is utilized atblock 2210. For example, the differentiated plotting of the aggregated correlation may be provided for presentation. - In an example embodiment, the differentiated plotting may be used to determine users' tendency to interact with others with respect of their reputation information (e.g., feedback scores). For example, the differentiated plotting may help identify whether users with high reputation information (e.g., high feedback scores) tend to interact with other users that also have high reputation information. Assortative mixing may be used to show the extent to which nodes (e.g., users) connect preferentially to other nodes with similar characteristics.
-
FIG. 23 illustrates amethod 2300 for differentiated plotting utilization according to an example embodiment. Themethod 2300 may be performed atblock 2210 or otherwise performed. - Reputation information associated with assorted initiating users and a assorted responding users in a social network for an additional time period is accessed at
block 2302. - At
block 2304, interaction frequency data associated with the assorted initiating users and the assorted responding users for the additional time period is accessed. - The plotting of the aggregated correlation of the additional time period is differentiated in accordance with the interaction frequency data at
block 2206. - The aggregated correlation between the assorted initiating users and the assorted initiating users is plotted in accordance with the reputation information at
block 2308. - The differentiated plotting of the aggregated correlation for the time period and the additional time period is used for the analysis of the social network at block 2310.
-
FIGS. 24-26 are diagrams of example differentiated plottings 2400, 2500, 2600. The differentiated plottings 2400, 2500, 2600 are example representations of differentiated plottings that may be plotted in accordance with themethod 2200 and/or themethod 2300. However, other representations of the differentiated plottings may also be used. - The differentiated plottings 2400, 2500, 2600 plot the aggregated correlation between initiating users' reputation information (e.g., sellers' feedback scores) and receiving users' reputation information (e.g., buyers' feedback scores).
- The x axis of the differentiated plottings 2400, 2500, 2600 denotes users' reputation information, and the y axis denotes receiving users reputation information. The axes of the differentiated plottings 2400, 2500, 2600 may be logarithmically binned.
- The differentiation on the
differentiated plottings differentiated plottings - The color of each block of the differentiated plottings 2400, 2500, 2600 may be determined by the number of interactions (e.g., transactions) that happed between pairs of users with corresponding reputation information.
- The
differentiated plotting 2400 may represent a number of transactions of a particular category (e.g., crafts) in which most interactions (e.g., transactions) are between initiating users (e.g., buyers) that have a feedback score between twenty and five hundred and responding users (e.g., sellers) that have a feedback score between ten and ninety. - The
differentiated plotting 2500 may represent a number of transactions of a particular category in which most interactions are between initiating users that have a feedback score between sixteen and sixty and responding users that have a feedback score between one hundred fifty and two seven hundred. - The
differentiated plotting 2600 may represent a number of transactions of a particular category (e.g., collectables) in which most interactions are between initiating users that have a feedback score between ten and seventy and responding users that have a feedback score between one hundred and three thousand. - Platform
-
FIG. 27 is a network diagram depicting a client-server system 2700, within which one example embodiment may be deployed. By way of example, anetwork 2704 may include the functionality of theprovider network 104, thenetwork analyzer 106 may be deployed within anapplication server 2718, and the client machines 102.1-102.n may include the functionality of aclient machine 2710 or aclient machine 2712. Thesystem 100 may also be deployed in other systems. - A
networked system 2702, in the example forms of a network-based marketplace or publication system, provides server-side functionality, via a network 2704 (e.g., the Internet or Wide Area Network (WAN)) to one or more clients.FIG. 27 illustrates, for example, a web client 2706 (e.g., a browser, such as the Internet Explorer browser developed by Microsoft Corporation of Redmond, Wash. State), and aprogrammatic client 2708 executing onrespective client machines - An Application Program Interface (API)
server 2714 and aweb server 2716 are coupled to, and provide programmatic and web interfaces respectively to, one ormore application servers 2718. Theapplication servers 2718 host one ormore marketplace applications 2720 andauthentication providers 2722. Theapplication servers 2718 are, in turn, shown to be coupled to one ormore databases servers 2724 that facilitate access to one ormore databases 2726. - The
marketplace applications 2720 may provide a number of marketplace functions and services to users that access thenetworked system 2702. Theauthentication providers 2722 may likewise provide a number of payment services and functions to users. Theauthentication providers 2722 may allow users to accumulate value (e.g., in a commercial currency, such as the U.S. dollar, or a proprietary currency, such as “points”) in accounts, and then later to redeem the accumulated value for products (e.g., goods or services) that are made available via themarketplace applications 2720. While the marketplace andauthentication providers FIG. 27 to both form part of thenetworked system 2702, in alternative embodiments theauthentication providers 2722 may form part of a payment service that is separate and distinct from thenetworked system 2702. - Further, while the
system 2700 shown inFIG. 27 employs a client-server architecture, the present invention is of course not limited to such an architecture, and could equally well find application in a distributed, or peer-to-peer, architecture system, for example. The various marketplace andauthentication providers - The
web client 2706 accesses the various marketplace andauthentication providers web server 2716. Similarly, theprogrammatic client 2708 accesses the various services and functions provided by the marketplace andauthentication providers API server 2714. Theprogrammatic client 2708 may, for example, be a seller application (e.g., the TurboLister™ application developed by eBay Inc., of San Jose, Calif.) to enable sellers to author and manage listings on thenetworked system 2702 in an off-line manner, and to perform batch-mode communications between theprogrammatic client 2708 and thenetworked system 2702. -
FIG. 27 also illustrates athird party application 2728, executing on a thirdparty server machine 2730, as having programmatic access to thenetworked system 2702 via the programmatic interface provided by theAPI server 2714. For example, thethird party application 2728 may, utilizing information retrieved from thenetworked system 2702, support one or more features or functions on a website hosted by the third party. The third party may, for example, provide one or more promotional, marketplace or payment functions that are supported by the relevant applications of thenetworked system 2702. -
FIG. 28 is a block diagram illustratingmultiple applications FIG. 27 ). Theapplications 2720 may be hosted on dedicated or shared server machines (not shown) that are communicatively coupled to enable communications between server machines. The applications themselves are communicatively coupled (e.g., via appropriate interfaces) to each other and to various data sources, so as to allow information to be passed between the applications or so as to allow the applications to share and access common data. The applications may furthermore access one ormore databases 2726 via thedatabase servers 2724. - The
networked system 2702 may provide a number of publishing, listing and price-setting mechanisms whereby a seller may list (or publish information concerning) goods or services for sale, a buyer can express interest in or indicate a desire to purchase such goods or services, and a price can be set for a transaction pertaining to the goods or services. To this end, themarketplace applications 2720 are shown to include at least one publication application 1110 and one ormore auction applications 2802 which support auction-format listing and price setting mechanisms (e.g., English, Dutch, Vickrey, Chinese, Double, Reverse auctions etc.). Thevarious auction applications 2802 may also provide a number of features in support of such auction-format listings, such as a reserve price feature whereby a seller may specify a reserve price in connection with a listing and a proxy-bidding feature whereby a bidder may invoke automated proxy bidding. - A number of fixed-
price applications 2804 support fixed-price listing formats (e.g., the traditional classified advertisement-type listing or a catalogue listing) and buyout-type listings. Specifically, buyout-type listings (e.g., including the Buy-It-Now (BIN) technology developed by eBay Inc., of San Jose, Calif.) may be offered in conjunction with auction-format listings, and allow a buyer to purchase goods or services, which are also being offered for sale via an auction, for a fixed-price that is typically higher than the starting price of the auction. -
Store applications 2806 allow a seller to group listings within a “virtual” store, which may be branded and otherwise personalized by and for the seller. Such a virtual store may also offer promotions, incentives and features that are specific and personalized to a relevant seller. -
Reputation applications 2808 allow users that transact, utilizing thenetworked system 2702, to establish, build and maintain reputations, which may be made available and published to potential trading partners. Consider that where, for example, thenetworked system 2702 supports person-to-person trading, users may otherwise have no history or other reference information whereby the trustworthiness and credibility of potential trading partners may be assessed. Thereputation applications 2808 allow a user, for example through feedback provided by other transaction partners, to establish a reputation within thenetworked system 2702 over time. Other potential trading partners may then reference such a reputation for the purposes of assessing credibility and trustworthiness. -
Personalization applications 2810 allow users of thenetworked system 2702 to personalize various aspects of their interactions with thenetworked system 2702. For example a user may, utilizing anappropriate personalization application 2810, create a personalized reference page at which information regarding transactions to which the user is (or has been) a party may be viewed. Further, apersonalization application 2810 may enable a user to personalize listings and other aspects of their interactions with thenetworked system 2702 and other parties. - The
networked system 2702 may support a number of marketplaces that are customized, for example, for specific geographic regions. A version of thenetworked system 2702 may be customized for the United Kingdom, whereas another version of thenetworked system 2702 may be customized for the United States. Each of these versions may operate as an independent marketplace, or may be customized (or internationalized and/or localized) presentations of a common underlying marketplace. Thenetworked system 2702 may accordingly include a number ofinternationalization applications 2812 that customize information (and/or the presentation of information) by thenetworked system 2702 according to predetermined criteria (e.g., geographic, demographic or marketplace criteria). For example, theinternationalization applications 2812 may be used to support the customization of information for a number of regional websites that are operated by thenetworked system 2702 and that are accessible viarespective web servers 2716. - Navigation of the
networked system 2702 may be facilitated by one ormore navigation applications 2814. For example, a search application (as an example of a navigation application) may enable key word searches of listings published via thenetworked system 2702. A browse application may allow users to browse various category, catalogue, or system inventory structures according to which listings may be classified within thenetworked system 2702. Various other navigation applications may be provided to supplement the search and browsing applications. - In order to make listings available via the
networked system 2702 as visually informing and attractive as possible, themarketplace applications 2720 may include one ormore imaging applications 2816 utilizing which users may upload images for inclusion within listings. Animaging application 2816 also operates to incorporate images within viewed listings. Theimaging applications 2816 may also support one or more promotional features, such as image galleries that are presented to potential buyers. For example, sellers may pay an additional fee to have an image included within a gallery of images for promoted items. -
Listing creation applications 2818 allow sellers conveniently to author listings pertaining to goods or services that they wish to transact via thenetworked system 2702, andlisting management applications 2820 allow sellers to manage such listings. Specifically, where a particular seller has authored and/or published a large number of listings, the management of such listings may present a challenge. Thelisting management applications 2820 provide a number of features (e.g., auto-relisting, inventory level monitors, etc.) to assist the seller in managing such listings. One or morepost-listing management applications 2822 also assist sellers with a number of activities that typically occur post-listing. For example, upon completion of an auction facilitated by one ormore auction applications 2802, a seller may wish to leave feedback regarding a particular buyer. To this end, apost-listing management application 2822 may provide an interface to one ormore reputation applications 2808, so as to allow the seller conveniently to provide feedback regarding multiple buyers to thereputation applications 2808. -
Dispute resolution applications 2824 provide mechanisms whereby disputes arising between transacting parties may be resolved. For example, thedispute resolution applications 2824 may provide guided procedures whereby the parties are guided through a number of steps in an attempt to settle a dispute. In the event that the dispute cannot be settled via the guided procedures, the dispute may be escalated to a merchant mediator or arbitrator. - A number of
fraud prevention applications 2826 implement fraud detection and prevention mechanisms to reduce the occurrence of fraud within thenetworked system 2702. -
Messaging applications 2828 are responsible for the generation and delivery of messages to users of thenetworked system 2702, such messages for example advising users regarding the status of listings at the networked system 2702 (e.g., providing “outbid” notices to bidders during an auction process or to provide promotional and merchandising information to users).Respective messaging applications 2828 may utilize any one have a number of message delivery networks and platforms to deliver messages to users. For example,messaging applications 2828 may deliver electronic mail (e-mail), instant message (IM), Short Message Service (SMS), text, facsimile, or voice (e.g., Voice over IP (VoIP)) messages via the wired (e.g., the Internet), Plain Old Telephone Service (POTS), or wireless (e.g., mobile, cellular, WiFi, WiMAX) networks. -
Merchandising applications 2830 support various merchandising functions that are made available to sellers to enable sellers to increase sales via thenetworked system 2702. Themerchandising applications 2830 also operate the various merchandising features that may be invoked by sellers, and may monitor and track the success of merchandising strategies employed by sellers. - The
networked system 2702 itself, or one or more parties that transact via thenetworked system 2702, may operate loyalty programs that are supported by one or more loyalty/promotions applications 2832. For example, a buyer may earn loyalty or promotions points for each transaction established and/or concluded with a particular seller, and may be offered a reward for which accumulated loyalty points can be redeemed. - A
network analyzer application 2834 may analyze the social network amount a number of users of thesystem 100. -
FIG. 29 shows a diagrammatic representation of machine in the example form of acomputer system 2900 within which a set of instructions may be executed causing the machine to perform any one or more of the methods, processes, operations, or methodologies discussed herein. Thenetwork analyzer 106 may operate on ormore computer systems 2900 and/or the client machines 102.1-102.n may include the functionality of thecomputer system 2900. - In an example embodiment, the machine operates as a standalone device or may be connected (e.g., networked) to other machines. In a networked deployment, the machine may operate in the capacity of a server or a client machine in server-client network environment, or as a peer machine in a peer-to-peer (or distributed) network environment. The machine may be a server computer, a client computer, a personal computer (PC), a tablet PC, a set-top box (STB), a Personal Digital Assistant (PDA), a cellular telephone, a web appliance, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. Further, while only a single machine is illustrated, the term “machine” shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.
- The
example computer system 2900 includes a processor 2902 (e.g., a central processing unit (CPU) a graphics processing unit (GPU) or both), amain memory 2904 and astatic memory 2906, which communicate with each other via abus 2908. Thecomputer system 2900 may further include a video display unit 2910 (e.g., a liquid crystal display (LCD) or a cathode ray tube (CRT)). Thecomputer system 2900 also includes an alphanumeric input device 2912 (e.g., a keyboard), a cursor control device 2914 (e.g., a mouse), adrive unit 2916, a signal generation device 2918 (e.g., a speaker) and anetwork interface device 2920. - The
drive unit 2916 includes a machine-readable medium 2922 on which is stored one or more sets of instructions (e.g., software 2924) embodying any one or more of the methodologies or functions described herein. Thesoftware 2924 may also reside, completely or at least partially, within themain memory 2904 and/or within theprocessor 2902 during execution thereof by thecomputer system 2900, themain memory 2904 and theprocessor 2902 also constituting machine-readable media. - The
software 2924 may further be transmitted or received over anetwork 2926 via thenetwork interface device 2920. - While the machine-
readable medium 2922 is shown in an example embodiment to be a single medium, the term “machine-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term “machine-readable medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present invention. The term “machine-readable medium” shall accordingly be taken to include, but not be limited to, solid-state memories, optical and magnetic media, and carrier wave signals. - Certain systems, apparatus, applications or processes are described herein as including a number of modules or mechanisms. A module or a mechanism may be a unit of distinct functionality that can provide information to, and receive information from, other modules. Accordingly, the described modules may be regarded as being communicatively coupled. Modules may also initiate communication with input or output devices, and can operate on a resource (e.g., a collection of information). The modules be implemented as hardware circuitry, optical components, single or multi-processor circuits, memory circuits, software program modules and objects, firmware, and combinations thereof, as appropriate for particular implementations of various embodiments.
- Thus, methods and systems for social network analysis have been described. Although the present invention has been described with reference to specific example embodiments, it will be evident that various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of the invention. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.
- The Abstract of the Disclosure is provided to comply with 37 C.F.R. §1.72(b), requiring an abstract that will allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separate embodiment.
Claims (25)
1. A method comprising:
accessing user interaction data of a time period for a plurality of users in a social network;
performing network analysis on the user interaction data;
generating a necktie-shaped graph from the user interaction data in accordance with the performing of the network analysis; and
utilizing the necktie-shaped graph for analysis of the social network.
2. The method of claim 1 , further comprising:
accessing reputation information associated with the plurality of users; and
applying a texture to the necktie-shaped graph in accordance with the reputation information.
3. The method of claim 1 , further comprising:
accessing interaction frequency data associated with the plurality of users; and
applying a texture to the necktie-shaped graph in accordance with the interaction frequency data.
4. The method of claim 1 , further comprising:
accessing transactional financial data associated with the plurality of users; and
applying a texture to the necktie-shaped graph in accordance with the transactional financial data.
5. The method of claim 1 , wherein the generating comprises:
generating a strongly connected component of the necktie-shaped graph in accordance with the performing of the network analysis;
generating an in-component of the necktie-shaped graph in accordance with the performing of the network analysis; and
generating an out-component of the necktie-shaped graph in accordance with the performing of the network analysis; and
using a tube to connect the in-component to the out-component,
wherein the in-component of the necktie-shaped graph is smaller than the out-component of the necktie-shaped graph.
6. The method of claim 5 , further comprising:
generating one or more tendrils in accordance with the performing of the network analysis, a particular tendril of the one or more tendrils connected to the in-component or the out-component.
7. The method of claim 5 , further comprising:
generating a disconnected part in accordance with the performing of the network analysis, the disconnected part being disconnected from the strongly connect component, the in-component, and the out-component in the necktie-shaped graph.
8. The method of claim 1 , wherein the utilizing comprises:
analyzing the necktie-shaped graph;
making a decision regarding the social network in accordance with the analyzing of the necktie-shaped graph; and
altering an aspect of the social network in accordance with the making of the decision.
9. The method of claim 1 , wherein the utilizing comprises:
providing the necktie-shaped graph for presentation.
10. The method of claim 1 , wherein the utilizing comprises:
accessing additional user interaction data associated with the social network during a different time period;
performing the network analysis on the additional user interaction data;
generating an additional necktie-shaped graph from the additional user interaction data in accordance with the performing of the network analysis; and
using the necktie-shaped graph and the additional necktie-shaped graph for analysis of the social network.
11. The method of claim 10 , wherein the using comprises:
providing a difference between the necktie-shaped graph and the additional necktie-shaped graph for presentation.
12. The method of claim 1 , wherein the user interaction data is associated with a single transaction category.
13. A method comprising:
accessing user interaction data associated for a plurality of users for a time period in a social network;
performing network analysis on the user interaction data;
selecting a plurality of example users within the social network, each of the example users being associated with reputation information;
generating a motif for the plurality of example users for the time period in accordance with the performing of the network analysis, a node of the motif being associated with a particular example user of the example users, the motif defining an expected relationship between the plurality of example users in the social network;
distinguishing the node of the plurality of example users in accordance with the reputation information of a respective example user; and
utilizing the motif with a plurality of distinguished nodes for analysis of the social network.
14. The method of claim 13 , wherein the utilizing comprises:
providing the motif with the plurality of distinguished nodes for presentation.
15. The method of claim 13 , wherein the utilizing comprises:
analyzing a template including the motif and a plurality of additional motifs; and
making a decision regarding the social network in accordance with the analyzing of the template.
16. The method of claim 13 , further comprising:
accessing interaction frequency data associated with the plurality of users; and
applying a texture to at least one connecting line of the motif in accordance with the interaction frequency data.
17. The method of claim 13 , further comprising:
accessing transactional financial data associated with the plurality of users; and
applying a texture to at least one connecting line of the motif in accordance with the transactional financial data.
18. The method of claim 13 , wherein the distinguishing comprises:
colorizing the node of the plurality of example users in accordance with the reputation information.
19. The method of claim 13 , wherein the social network is a social commerce network.
20. A machine-readable medium comprising instructions, which when implemented by one or more processors perform the following operations:
access user interaction data of a time period for a plurality of users in a social network;
perform network analysis on the user interaction data;
generate a necktie-shaped graph from the user interaction data in accordance with the performing of the network analysis; and
utilize the necktie-shaped graph for analysis of the social network.
21. The machine-readable medium of claim 20 , wherein the one or more operations to generate the necktie-shaped graph include:
generate a strongly connected component of the necktie-shaped graph in accordance with the performing of the network analysis;
generate an in-component of the necktie-shaped graph in accordance with the performing of the network analysis; and
generate an out-component of the necktie-shaped graph in accordance with the performing of the network analysis; and
use a tube to connect the in-component to the out-component;
wherein the in-component of the necktie-shaped graph is smaller than the out-component of the necktie-shaped graph.
22. A machine-readable medium comprising instructions, which when implemented by one or more processors perform the following operations:
access user interaction data associated for a plurality of users for a time period in a social network;
perform network analysis on the user interaction data;
select a plurality of example users within the social network, each of the example users being associated with reputation information;
generate a motif for the plurality of example users for the time period in accordance with the performing of the network analysis, a node of the motif being associated with a particular example user of the example users, the motif defining an expected relationship between the plurality of example users in the social network;
distinguish the node of the plurality of example users in accordance with the reputation information of a respective example user; and
utilize the motif with a plurality of distinguished nodes for analysis of the social network.
23. The machine-readable medium of claim 22 further comprising instructions, which when implemented by one or more processors perform the following operations:
access interaction frequency data associated with the plurality of users; and
apply a texture to at least one connecting line of the motif in accordance with the interaction frequency data.
24. A system comprising:
a transaction relationship data access module to access user interaction data of a time period for a plurality of users in a social network;
a network analysis performance module to perform network analysis on the user interaction data accessed by the transaction relationship data access module;
a graph generation module to generate a necktie-shaped graph from the user interaction data in accordance with the performing of the network analysis by the network analysis performance module; and
a graph provider module to provide the necktie-shaped graph generated by the graph generation module for presentation.
25. The system of claim 24 , further comprising:
a reputation information access module to access reputation information associated with the plurality of users; and
a texture application module to apply a texture to the necktie-shaped graph generated by the graph generation module in accordance with the reputation information.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/967,221 US20090070679A1 (en) | 2007-09-12 | 2007-12-30 | Method and system for social network analysis |
US12/958,785 US20110161191A1 (en) | 2007-09-12 | 2010-12-02 | Method and system for social network analysis |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US97190407P | 2007-09-12 | 2007-09-12 | |
US98467707P | 2007-11-01 | 2007-11-01 | |
US11/967,221 US20090070679A1 (en) | 2007-09-12 | 2007-12-30 | Method and system for social network analysis |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/958,785 Continuation US20110161191A1 (en) | 2007-09-12 | 2010-12-02 | Method and system for social network analysis |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090070679A1 true US20090070679A1 (en) | 2009-03-12 |
Family
ID=40433064
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/967,221 Abandoned US20090070679A1 (en) | 2007-09-12 | 2007-12-30 | Method and system for social network analysis |
US11/967,222 Abandoned US20090070460A1 (en) | 2007-09-12 | 2007-12-30 | Method and system for social network analysis |
US12/957,327 Expired - Fee Related US8473422B2 (en) | 2007-09-12 | 2010-11-30 | Method and system for social network analysis |
US12/958,785 Abandoned US20110161191A1 (en) | 2007-09-12 | 2010-12-02 | Method and system for social network analysis |
US13/922,078 Abandoned US20140108281A1 (en) | 2007-09-12 | 2013-06-19 | Method and system for social network analysis |
Family Applications After (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/967,222 Abandoned US20090070460A1 (en) | 2007-09-12 | 2007-12-30 | Method and system for social network analysis |
US12/957,327 Expired - Fee Related US8473422B2 (en) | 2007-09-12 | 2010-11-30 | Method and system for social network analysis |
US12/958,785 Abandoned US20110161191A1 (en) | 2007-09-12 | 2010-12-02 | Method and system for social network analysis |
US13/922,078 Abandoned US20140108281A1 (en) | 2007-09-12 | 2013-06-19 | Method and system for social network analysis |
Country Status (1)
Country | Link |
---|---|
US (5) | US20090070679A1 (en) |
Cited By (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090070130A1 (en) * | 2007-09-12 | 2009-03-12 | Neelakantan Sundaresan | Reputation scoring |
US20090213133A1 (en) * | 2008-02-21 | 2009-08-27 | Kabushiki Kaisha Toshiba | Display-data generating apparatus and display-data generating method |
US20100205430A1 (en) * | 2009-02-06 | 2010-08-12 | Shin-Yan Chiou | Network Reputation System And Its Controlling Method Thereof |
US20110055096A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Personalized plan development based on identification of one or more relevant reported aspects |
US20110055270A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of State Of Delaware | Identification and provision of reported aspects that are relevant with respect to achievement of target outcomes |
US20110055143A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Template modification based on deviation from compliant execution of the template |
US20110055142A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Detecting deviation from compliant execution of a template |
US20110054867A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Detecting deviation from compliant execution of a template |
US20110055126A1 (en) * | 2009-09-03 | 2011-03-03 | Searete LLC, a limited liability corporation of the state Delaware. | Target outcome based provision of one or more templates |
US20110054940A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Template modification based on deviation from compliant execution of the template |
US20110055124A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Development of personalized plans based on acquisition of relevant reported aspects |
US20110054941A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Template development based on reported aspects of a plurality of source users |
US20110055094A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Personalized plan development based on outcome identification |
US20110055144A1 (en) * | 2009-09-03 | 2011-03-03 | Searete LLC, a limited liability corporation ot the State of Delaware | Template development based on reported aspects of a plurality of source users |
US20110055269A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Identification and provision of reported aspects that are relevant with respect to achievement of target outcomes |
US20110055125A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Template development based on sensor originated reported aspects |
US20110055265A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Target outcome based provision of one or more templates |
US20110055262A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Personalized plan development based on one or more reported aspects' association with one or more source users |
US20110055105A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Personalized plan development based on identification of one or more relevant reported aspects |
US20110055705A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Source user based provision of one or more templates |
US20110055717A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Source user based provision of one or more templates |
US20110055097A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Template development based on sensor originated reported aspects |
US20110055225A1 (en) * | 2009-09-03 | 2011-03-03 | Searete LLC, limited liability corporation of the state of Delaware | Development of personalized plans based on acquisition of relevant reported aspects |
US20110054866A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Personalized plan development |
US20110055095A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Personalized plan development based on outcome identification |
US20110071953A1 (en) * | 2007-09-12 | 2011-03-24 | Ebay Inc. | Method and system for social network analysis |
US20120124192A1 (en) * | 2010-11-12 | 2012-05-17 | Ebay Inc. | Using behavioral data in rating user reputation |
US20120158851A1 (en) * | 2010-12-21 | 2012-06-21 | Daniel Leon Kelmenson | Categorizing Social Network Objects Based on User Affiliations |
US8280746B2 (en) | 2009-09-03 | 2012-10-02 | The Invention Science Fund I, Llc | Personalized plan development |
US8392205B2 (en) | 2009-09-03 | 2013-03-05 | The Invention Science Fund I, Llc | Personalized plan development based on one or more reported aspects' association with one or more source users |
US9311682B2 (en) | 2013-01-10 | 2016-04-12 | The Nielsen Company (Us), Llc | Systems and methods to identify candidates for targeted advertising in an online social gaming environment |
US10728105B2 (en) * | 2018-11-29 | 2020-07-28 | Adobe Inc. | Higher-order network embedding |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8514226B2 (en) * | 2008-09-30 | 2013-08-20 | Verizon Patent And Licensing Inc. | Methods and systems of graphically conveying a strength of communication between users |
US20140074551A1 (en) | 2012-09-09 | 2014-03-13 | Oracle International Corporation | Method and system for implementing a social media marketing and engagement application |
US10339541B2 (en) | 2009-08-19 | 2019-07-02 | Oracle International Corporation | Systems and methods for creating and inserting application media content into social media system displays |
US11620660B2 (en) | 2009-08-19 | 2023-04-04 | Oracle International Corporation | Systems and methods for creating and inserting application media content into social media system displays |
US20120011432A1 (en) | 2009-08-19 | 2012-01-12 | Vitrue, Inc. | Systems and methods for associating social media systems and web pages |
US9277021B2 (en) * | 2009-08-21 | 2016-03-01 | Avaya Inc. | Sending a user associated telecommunication address |
US20120158935A1 (en) * | 2010-12-21 | 2012-06-21 | Sony Corporation | Method and systems for managing social networks |
US8117080B1 (en) * | 2011-04-11 | 2012-02-14 | Sung Wan Ban | Pooling method for auction or raffle in a social network system |
US8560681B2 (en) * | 2011-05-10 | 2013-10-15 | Telefonica, S.A. | Method of characterizing a social network communication using motifs |
US20130151307A1 (en) * | 2011-12-12 | 2013-06-13 | International Business Machines Corporation | Deriving market intelligence from social content |
US8976710B2 (en) | 2011-12-27 | 2015-03-10 | Infosys Limited | Methods for discovering and analyzing network topologies and devices thereof |
US9692651B2 (en) * | 2012-04-13 | 2017-06-27 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for improving network performance |
US20130339839A1 (en) * | 2012-06-14 | 2013-12-19 | Emre Yavuz Baran | Analyzing User Interaction |
US10417701B2 (en) * | 2012-09-19 | 2019-09-17 | Capital One Services, Llc | System and method for determining social statements |
US9792658B1 (en) * | 2013-06-27 | 2017-10-17 | EMC IP Holding Company LLC | HEALTHBOOK analysis |
US9477994B2 (en) * | 2013-06-27 | 2016-10-25 | National Taiwan University | Global relationship model and a relationship search method for internet social networks |
US9646057B1 (en) * | 2013-08-05 | 2017-05-09 | Hrl Laboratories, Llc | System for discovering important elements that drive an online discussion of a topic using network analysis |
US10108950B2 (en) * | 2014-08-12 | 2018-10-23 | Capital One Services, Llc | System and method for providing a group account |
US9660869B2 (en) * | 2014-11-05 | 2017-05-23 | Fair Isaac Corporation | Combining network analysis and predictive analytics |
CN105654387B (en) * | 2015-03-17 | 2020-03-17 | 重庆邮电大学 | Time-varying network community evolution visualization method introducing quantization index |
US20170262451A1 (en) * | 2016-03-08 | 2017-09-14 | Lauren Elizabeth Milner | System and method for automatically calculating category-based social influence score |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6285999B1 (en) * | 1997-01-10 | 2001-09-04 | The Board Of Trustees Of The Leland Stanford Junior University | Method for node ranking in a linked database |
US20030204502A1 (en) * | 2002-04-25 | 2003-10-30 | Tomlin John Anthony | System and method for rapid computation of PageRank |
US20040122803A1 (en) * | 2002-12-19 | 2004-06-24 | Dom Byron E. | Detect and qualify relationships between people and find the best path through the resulting social network |
US6895385B1 (en) * | 2000-06-02 | 2005-05-17 | Open Ratings | Method and system for ascribing a reputation to an entity as a rater of other entities |
US20060095430A1 (en) * | 2004-10-29 | 2006-05-04 | Microsoft Corporation | Web page ranking with hierarchical considerations |
US20060122998A1 (en) * | 2004-12-04 | 2006-06-08 | International Business Machines Corporation | System, method, and service for using a focused random walk to produce samples on a topic from a collection of hyper-linked pages |
US20060136098A1 (en) * | 2004-12-17 | 2006-06-22 | International Business Machines Corporation | Dynamically ranking nodes and labels in a hyperlinked database |
US20060287842A1 (en) * | 2003-09-22 | 2006-12-21 | Advanced Structure Monitoring, Inc. | Methods of networking interrogation devices for structural conditions |
US20070124291A1 (en) * | 2005-11-29 | 2007-05-31 | Hassan Hany M | Method and system for extracting and visualizing graph-structured relations from unstructured text |
US20080189380A1 (en) * | 2007-02-02 | 2008-08-07 | Andrew Bosworth | System and method for curtailing objectionable behavior in a web-based social network |
US20080229244A1 (en) * | 2004-09-15 | 2008-09-18 | Markus Michael J | Collections of linked databases |
US20080228740A1 (en) * | 2007-03-16 | 2008-09-18 | Benjamin Weiss | Systems and methods for searching a network of distributed content servers |
US20090037211A1 (en) * | 2007-07-31 | 2009-02-05 | Mcgill Robert E | System and method of managing community based and content based information networks |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6594673B1 (en) * | 1998-09-15 | 2003-07-15 | Microsoft Corporation | Visualizations for collaborative information |
US20050039123A1 (en) * | 2003-08-14 | 2005-02-17 | Kuchinsky Allan J. | Method and system for importing, creating and/or manipulating biological diagrams |
US7076483B2 (en) * | 2001-08-27 | 2006-07-11 | Xyleme Sa | Ranking nodes in a graph |
US7167910B2 (en) * | 2002-02-20 | 2007-01-23 | Microsoft Corporation | Social mapping of contacts from computer communication information |
US7249123B2 (en) * | 2002-10-31 | 2007-07-24 | International Business Machines Corporation | System and method for building social networks based on activity around shared virtual objects |
US7177880B2 (en) * | 2002-12-19 | 2007-02-13 | International Business Machines Corporation | Method of creating and displaying relationship chains between users of a computerized network |
US7069308B2 (en) * | 2003-06-16 | 2006-06-27 | Friendster, Inc. | System, method and apparatus for connecting users in an online computer system based on their relationships within social networks |
US7280977B2 (en) * | 2003-10-09 | 2007-10-09 | General Motors Corporation | System and model for performance value based collaborative relationships |
US7526459B2 (en) * | 2003-11-28 | 2009-04-28 | Manyworlds, Inc. | Adaptive social and process network systems |
NO321340B1 (en) * | 2003-12-30 | 2006-05-02 | Telenor Asa | Method of managing networks by analyzing connectivity |
US7464076B2 (en) * | 2004-05-15 | 2008-12-09 | International Business Machines Corporation | System and method and computer program product for ranking logical directories |
US20060218153A1 (en) * | 2005-03-28 | 2006-09-28 | Voon George H H | Building social networks using shared content data relating to a common interest |
US7685530B2 (en) * | 2005-06-10 | 2010-03-23 | T-Mobile Usa, Inc. | Preferred contact group centric interface |
US20060287910A1 (en) * | 2005-06-21 | 2006-12-21 | Kuchar Olga A | Scenario analysis methods, scenario analysis devices, articles of manufacture, and data signals |
US20070005526A1 (en) * | 2005-06-21 | 2007-01-04 | Paul Whitney | Scenario representation manipulation methods, scenario analysis devices, articles of manufacture, and data signals |
US7258928B2 (en) * | 2005-07-29 | 2007-08-21 | Ut-Battelle, Llc | Doped Y2O3 buffer layers for laminated conductors |
US20070179834A1 (en) | 2006-02-01 | 2007-08-02 | Novell, Inc. | Federation and attestation of online reputations |
US7856411B2 (en) * | 2006-03-21 | 2010-12-21 | 21St Century Technologies, Inc. | Social network aware pattern detection |
US8533269B2 (en) * | 2007-12-03 | 2013-09-10 | Stephen J. Brown | User-calibrated activity newsfeed on a social network |
US8156064B2 (en) * | 2007-07-05 | 2012-04-10 | Brown Stephen J | Observation-based user profiling and profile matching |
US20090070130A1 (en) | 2007-09-12 | 2009-03-12 | Neelakantan Sundaresan | Reputation scoring |
US20090070679A1 (en) | 2007-09-12 | 2009-03-12 | Ebay Inc. | Method and system for social network analysis |
-
2007
- 2007-12-30 US US11/967,221 patent/US20090070679A1/en not_active Abandoned
- 2007-12-30 US US11/967,222 patent/US20090070460A1/en not_active Abandoned
-
2010
- 2010-11-30 US US12/957,327 patent/US8473422B2/en not_active Expired - Fee Related
- 2010-12-02 US US12/958,785 patent/US20110161191A1/en not_active Abandoned
-
2013
- 2013-06-19 US US13/922,078 patent/US20140108281A1/en not_active Abandoned
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6285999B1 (en) * | 1997-01-10 | 2001-09-04 | The Board Of Trustees Of The Leland Stanford Junior University | Method for node ranking in a linked database |
US6895385B1 (en) * | 2000-06-02 | 2005-05-17 | Open Ratings | Method and system for ascribing a reputation to an entity as a rater of other entities |
US20030204502A1 (en) * | 2002-04-25 | 2003-10-30 | Tomlin John Anthony | System and method for rapid computation of PageRank |
US7089252B2 (en) * | 2002-04-25 | 2006-08-08 | International Business Machines Corporation | System and method for rapid computation of PageRank |
US20040122803A1 (en) * | 2002-12-19 | 2004-06-24 | Dom Byron E. | Detect and qualify relationships between people and find the best path through the resulting social network |
US20060287842A1 (en) * | 2003-09-22 | 2006-12-21 | Advanced Structure Monitoring, Inc. | Methods of networking interrogation devices for structural conditions |
US20080229244A1 (en) * | 2004-09-15 | 2008-09-18 | Markus Michael J | Collections of linked databases |
US20060095430A1 (en) * | 2004-10-29 | 2006-05-04 | Microsoft Corporation | Web page ranking with hierarchical considerations |
US20060122998A1 (en) * | 2004-12-04 | 2006-06-08 | International Business Machines Corporation | System, method, and service for using a focused random walk to produce samples on a topic from a collection of hyper-linked pages |
US7640488B2 (en) * | 2004-12-04 | 2009-12-29 | International Business Machines Corporation | System, method, and service for using a focused random walk to produce samples on a topic from a collection of hyper-linked pages |
US20060136098A1 (en) * | 2004-12-17 | 2006-06-22 | International Business Machines Corporation | Dynamically ranking nodes and labels in a hyperlinked database |
US20070124291A1 (en) * | 2005-11-29 | 2007-05-31 | Hassan Hany M | Method and system for extracting and visualizing graph-structured relations from unstructured text |
US20080189380A1 (en) * | 2007-02-02 | 2008-08-07 | Andrew Bosworth | System and method for curtailing objectionable behavior in a web-based social network |
US20080228740A1 (en) * | 2007-03-16 | 2008-09-18 | Benjamin Weiss | Systems and methods for searching a network of distributed content servers |
US20090037211A1 (en) * | 2007-07-31 | 2009-02-05 | Mcgill Robert E | System and method of managing community based and content based information networks |
Cited By (64)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090070130A1 (en) * | 2007-09-12 | 2009-03-12 | Neelakantan Sundaresan | Reputation scoring |
US20110071953A1 (en) * | 2007-09-12 | 2011-03-24 | Ebay Inc. | Method and system for social network analysis |
US20110161191A1 (en) * | 2007-09-12 | 2011-06-30 | Ebay Inc. | Method and system for social network analysis |
US8473422B2 (en) | 2007-09-12 | 2013-06-25 | Ebay Inc. | Method and system for social network analysis |
US20090213133A1 (en) * | 2008-02-21 | 2009-08-27 | Kabushiki Kaisha Toshiba | Display-data generating apparatus and display-data generating method |
US9141729B2 (en) * | 2008-02-21 | 2015-09-22 | Kabushiki Kaisha Toshiba | Display-data generating apparatus and display-data generating method |
US20100205430A1 (en) * | 2009-02-06 | 2010-08-12 | Shin-Yan Chiou | Network Reputation System And Its Controlling Method Thereof |
US8312276B2 (en) * | 2009-02-06 | 2012-11-13 | Industrial Technology Research Institute | Method for sending and receiving an evaluation of reputation in a social network |
US8249887B2 (en) | 2009-09-03 | 2012-08-21 | The Invention Science Fund I, Llc | Personalized plan development based on identification of one or more relevant reported aspects |
US8255237B2 (en) | 2009-09-03 | 2012-08-28 | The Invention Science Fund I, Llc | Source user based provision of one or more templates |
US20110054867A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Detecting deviation from compliant execution of a template |
US20110055126A1 (en) * | 2009-09-03 | 2011-03-03 | Searete LLC, a limited liability corporation of the state Delaware. | Target outcome based provision of one or more templates |
US20110054940A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Template modification based on deviation from compliant execution of the template |
US20110055124A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Development of personalized plans based on acquisition of relevant reported aspects |
US20110054941A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Template development based on reported aspects of a plurality of source users |
US20110055094A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Personalized plan development based on outcome identification |
US20110055144A1 (en) * | 2009-09-03 | 2011-03-03 | Searete LLC, a limited liability corporation ot the State of Delaware | Template development based on reported aspects of a plurality of source users |
US20110055269A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Identification and provision of reported aspects that are relevant with respect to achievement of target outcomes |
US20110055125A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Template development based on sensor originated reported aspects |
US20110055265A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Target outcome based provision of one or more templates |
US20110055262A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Personalized plan development based on one or more reported aspects' association with one or more source users |
US20110055105A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Personalized plan development based on identification of one or more relevant reported aspects |
US20110055705A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Source user based provision of one or more templates |
US20110055717A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Source user based provision of one or more templates |
US20110055097A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Template development based on sensor originated reported aspects |
US20110055225A1 (en) * | 2009-09-03 | 2011-03-03 | Searete LLC, limited liability corporation of the state of Delaware | Development of personalized plans based on acquisition of relevant reported aspects |
US20110054866A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Personalized plan development |
US20110055095A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Personalized plan development based on outcome identification |
US8229756B2 (en) | 2009-09-03 | 2012-07-24 | The Invention Science Fund I, Llc | Personalized plan development based on outcome identification |
US8234123B2 (en) | 2009-09-03 | 2012-07-31 | The Invention Science Fund I, Llc | Personalized plan development based on identification of one or more relevant reported aspects |
US8244553B2 (en) | 2009-09-03 | 2012-08-14 | The Invention Science Fund I, Llc | Template development based on sensor originated reported aspects |
US8244552B2 (en) | 2009-09-03 | 2012-08-14 | The Invention Science Fund I, Llc | Template development based on sensor originated reported aspects |
US20110055143A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Template modification based on deviation from compliant execution of the template |
US8249888B2 (en) | 2009-09-03 | 2012-08-21 | The Invention Science Fund I, Llc | Development of personalized plans based on acquisition of relevant reported aspects |
US8255236B2 (en) | 2009-09-03 | 2012-08-28 | The Invention Science Fund I, Llc | Source user based provision of one or more templates |
US20110055142A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Detecting deviation from compliant execution of a template |
US8255400B2 (en) * | 2009-09-03 | 2012-08-28 | The Invention Science Fund I, Llc | Development of personalized plans based on acquisition of relevant reported aspects |
US8260626B2 (en) | 2009-09-03 | 2012-09-04 | The Invention Science Fund I, Llc | Detecting deviation from compliant execution of a template |
US8260624B2 (en) | 2009-09-03 | 2012-09-04 | The Invention Science Fund I, Llc | Personalized plan development based on outcome identification |
US8260807B2 (en) | 2009-09-03 | 2012-09-04 | The Invention Science Fund I, Llc | Identification and provision of reported aspects that are relevant with respect to achievement of target outcomes |
US8260625B2 (en) | 2009-09-03 | 2012-09-04 | The Invention Science Fund I, Llc | Target outcome based provision of one or more templates |
US8265946B2 (en) | 2009-09-03 | 2012-09-11 | The Invention Science Fund I, Llc | Template modification based on deviation from compliant execution of the template |
US8265944B2 (en) | 2009-09-03 | 2012-09-11 | The Invention Science Fund I, Llc | Detecting deviation from compliant execution of a template |
US8265945B2 (en) | 2009-09-03 | 2012-09-11 | The Invention Science Fund I, Llc | Template modification based on deviation from compliant execution of the template |
US8265943B2 (en) | 2009-09-03 | 2012-09-11 | The Invention Science Fund I, Llc | Personalized plan development |
US8271524B2 (en) | 2009-09-03 | 2012-09-18 | The Invention Science Fund I, Llc | Identification and provision of reported aspects that are relevant with respect to achievement of target outcomes |
US8275628B2 (en) | 2009-09-03 | 2012-09-25 | The Invention Science Fund I, Llc | Personalized plan development based on one or more reported aspects' association with one or more source users |
US8275629B2 (en) | 2009-09-03 | 2012-09-25 | The Invention Science Fund I, Llc | Template development based on reported aspects of a plurality of source users |
US8280746B2 (en) | 2009-09-03 | 2012-10-02 | The Invention Science Fund I, Llc | Personalized plan development |
US8311846B2 (en) | 2009-09-03 | 2012-11-13 | The Invention Science Fund I, Llc | Target outcome based provision of one or more templates |
US8321233B2 (en) | 2009-09-03 | 2012-11-27 | The Invention Science Fund I, Llc | Template development based on reported aspects of a plurality of source users |
US8392205B2 (en) | 2009-09-03 | 2013-03-05 | The Invention Science Fund I, Llc | Personalized plan development based on one or more reported aspects' association with one or more source users |
US20110055270A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of State Of Delaware | Identification and provision of reported aspects that are relevant with respect to achievement of target outcomes |
US20110055096A1 (en) * | 2009-09-03 | 2011-03-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Personalized plan development based on identification of one or more relevant reported aspects |
US20120124192A1 (en) * | 2010-11-12 | 2012-05-17 | Ebay Inc. | Using behavioral data in rating user reputation |
US9213980B2 (en) * | 2010-11-12 | 2015-12-15 | Ebay Inc. | Using behavioral data in rating user reputation |
US9595052B2 (en) | 2010-11-12 | 2017-03-14 | Ebay Inc. | Using behavioral data in rating user reputation |
US20120158851A1 (en) * | 2010-12-21 | 2012-06-21 | Daniel Leon Kelmenson | Categorizing Social Network Objects Based on User Affiliations |
US8738705B2 (en) * | 2010-12-21 | 2014-05-27 | Facebook, Inc. | Categorizing social network objects based on user affiliations |
US20140222821A1 (en) * | 2010-12-21 | 2014-08-07 | Facebook, Inc. | Categorizing social network objects based on user affiliations |
US9672284B2 (en) * | 2010-12-21 | 2017-06-06 | Facebook, Inc. | Categorizing social network objects based on user affiliations |
US10013729B2 (en) * | 2010-12-21 | 2018-07-03 | Facebook, Inc. | Categorizing social network objects based on user affiliations |
US9311682B2 (en) | 2013-01-10 | 2016-04-12 | The Nielsen Company (Us), Llc | Systems and methods to identify candidates for targeted advertising in an online social gaming environment |
US10728105B2 (en) * | 2018-11-29 | 2020-07-28 | Adobe Inc. | Higher-order network embedding |
Also Published As
Publication number | Publication date |
---|---|
US20110161191A1 (en) | 2011-06-30 |
US20110071953A1 (en) | 2011-03-24 |
US8473422B2 (en) | 2013-06-25 |
US20140108281A1 (en) | 2014-04-17 |
US20090070460A1 (en) | 2009-03-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20090070679A1 (en) | Method and system for social network analysis | |
US10902460B2 (en) | Product-based advertising | |
US20210383015A1 (en) | Sharing information on a network-based social platform | |
US9824120B2 (en) | Method and system for presenting search results in a plurality of tabs | |
US7870031B2 (en) | Suggested item category systems and methods | |
US9043227B2 (en) | Viewing shopping information on a network based social platform | |
US11842386B2 (en) | Method and system for watching items for sale in an auction system | |
US10133772B2 (en) | Multi-dimensional query statement modification | |
US9406042B2 (en) | System and method for supplementing an image gallery with status indicators | |
US20170046720A1 (en) | System and method to provide altered benefit based on preferred status | |
CN106233281A (en) | The automatic machine translation using user feedback improves | |
US20200193452A1 (en) | User definition and identification | |
US7801949B2 (en) | Configurable interfaces | |
US20060271387A1 (en) | System for providing a user with shipping information | |
US20140156391A1 (en) | Publishing information for available products and services within private networks | |
US10802840B2 (en) | Configurable interfaces | |
US20120130864A1 (en) | Systems and methods to analyze a seller inventory offered for sale on a network-based marketplace | |
US8429020B2 (en) | Currency weighted cross border listing exposure |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: EBAY INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SHEN, ZEQIAN;SUNDARESAN, NEELAKANTAN;REEL/FRAME:020623/0678;SIGNING DATES FROM 20080118 TO 20080121 |
|
STCB | Information on status: application discontinuation |
Free format text: EXPRESSLY ABANDONED -- DURING EXAMINATION |