Academia.eduAcademia.edu

2014 (with: A. Wanger, S. Kedar, K. Abraham, Y. Cohen, R. Zadok) Quantitative Social Network Analysis (SNA) and the Study of Cuneiform Archives, Akkadika 134: 117-134.

Social Network Analysis (SNA) is increasingly applied to study archival data, including cuneiform archives, especially Neo and Late Babylonian materials. This paper demonstrates the use and potential of quantitative SNA by means of one example. A network based on 75 documents from the Murašû archive is constructed in order to show a computational, automatic procedure, that demonstrates the potential value of quantitave SNA to cuneiform studies.

Quantitative Social Network Analysis (SNA) and the Study of Cuneiform Archives : A Test-case based on the Murašû Archive A. Wagner, Y. Levavi, S. Kedar, K. Abraham, Y. Cohen, R. Zadok* Abstract : Social network analysis (SNA) is increasingly applied to study archival data, including cuneiform archives, and especially Neo- and Late-Babylonian materials. This paper demonstrates the use of quantitative SNA by means of one example. A network based on 75 documents from the Murašû archive is constructed in order to show a computational, automatic procedure, that demonstrates the potential value of quantitative SNA to cuneiform studies. Keywords : Neo-Babylonian studies, archival studies, social network analysis, network clustering, document classification INTRODUCTION This paper presents a case-study which demonstrates how advanced social network analysis (SNA) can be applied to a cuneiform archive dating to the Late Babylonian period— the (multi-generational) Murašû archive. SNA is common in many fields, yet only recently its utility came to be considered in cuneiform studies. One of the obstacles to successful adoption of SNA methods and perspectives is their reliance on advanced mathematics. The purpose of this paper is to exemplify where quantitative SNA can be useful ; at the same time it aims to be self-contained and accessible to scholars with no training in higher mathematics. Technical and mathematical discussion is therefore limited to the footnotes as much as possible. For the reader’s convenience, technical SNA terms are given in italics when they are first introduced and defined. * This is an extended version of a paper presented by Allon Wagner at the 58th Rencontre Assyriologique Internationale, Leiden, July 18th 2012. This paper is the result of research of the CTIJ (Cuneiform Texts Mentioning Judean and Israelites) group. The research was supported by “Ancient Israel” (New Horizons) Research Program, Tel Aviv University, and by the Interuniversity Attraction Poles Programme initiated by the Belgian Science Policy Office. The bulk of this paper was written by Allon Wagner (Tel Aviv University, Ramat-Aviv 69778, Israel, [email protected]) ; Yuval Levavi (University of Vienna, Spitalgasse 2/4, 1090 Wien, Austria, [email protected]) and Sivan Kedar (Tel Aviv University, Ramat-Aviv 69778, Israel, [email protected]) assisted in data collection and interpretation of the results ; assyriological and editorial assistance were provided by Yoram Cohen (Tel Aviv University, Ramat-Aviv 69778, Israel, ycohen1@ post.tau.ac.il) and Ran Zadok (Tel Aviv University, Ramat-Aviv 69778, Israel, [email protected]) and by Kathleen Abraham (University of Leuven, Blijde Inkomststraat 21/3318, 3000 Leuven, Belgium, kathleen. [email protected]). Sincere thanks are extended to Caroline Waerzeggers for sharing her thoughts and unpublished research with us. Bibliographical abbreviations in this paper follow CDLI (http ://cdli.ox.ac.uk/wiki/doku. php ?id=abbreviations_for_assyriology), with the following addition : “Stolper, JCS 53” refers to : Stolper, M., 2001 : « Fifth Century Nippur : Texts of the Murašûs and from their Surroundings », JCS 53, 83–132. Akkadica 134 (2013), pp. 117-134. OFFPRINT AKKADICA 134 (2013), fasc. 2 - COPYRIGHT CENTRE ASSYRIOLOGIQUE GEORGES DOSSIN THIS DOCUMENT MAY BE PRINTED FOR PRIVATE USE ONLY. THIS DOCUMENT MAY NOT BE DISTRIBUTED, STORED IN A RETRIEVAL SYSTEM WITHOUT PERMISSION OF THE PUBLISHER 117 Akkadica 134 (2013) Network theory is an established scientific discipline at whose foundation lies the understanding that a complex system cannot be fully understood by a reductionist approach, i.e., by studying each participating component in isolation. Rather, network theory shifts the focus of the study by viewing the interactions themselves within the system as components that determine much of its behavior. Network-based analysis has been successfully applied to various fields, such as transportation networks, computer networks and biological networks to name a few.1 One of the thriving sub-disciplines of network theory is social network analysis (SNA), a science that studies the interplay between an individual’s2 attributes (e.g., wealth, authority etc.) and the pattern of interactions this individual keeps with others.3 SNA is a common tool in social sciences, where on the basis of questionnaires and analysis of available datasets social interactions of test-subjects can be reconstructed. There have also been several influential studies that have analyzed historical trajectories on the basis of pertinent primary sources from the perspective of network theory. Padgett and Ansell’s study of the rise of the Medicis to power in 15th century Florence is perhaps best known in this respect (Padgett and Ansell 1993). Their study compellingly demonstrates how the Medicis’ rise to power was mediated by the artful spinning of an intricate network that brought together, through business ties and marriage contracts, families that were not part of the ruling oligarchy. Fig. 1 presents their reconstruction of marriage ties between prominent Florentine families of the era. In the SNA terminology we will shortly introduce, this figure displays a network in which nodes represent families, and edges are drawn according to marriage ties. 1 2 3 BARABÁSI (2002) offers an accessible and non-mathematical introduction to the field. See NEWMAN 2003 ; WATTS 2004 ; NEWMAN, BARABÁSI and WATTS 2006 ; and NEWMAN 2010 for a more thorough treatment. It is quite astounding, as NEWMAN, BARABÁSI and WATTS (2006, 2–3) note, that the same methodology, and the same descriptive language, cast light on manifold phenomena, both man-made and natural. This is one of the most appealing traits of network-based studies. BORNHOLDT and SCHUSTER (2003) present some of the less conventional applications of network-oriented research, such as modeling food-webs, vehicular traffic engineering, and biological networks. For simplicity, we will often refer to the participants in social networks as “individuals” or “persons”. In SNA terminology the participants are rather referred to as actors (or nodes when focusing on network perspectives). Note that actors can represent individuals, but also larger social structures such as families or organizations ; see for instance PADGETT and ANSELL (1993) discussed below. Network nodes do not necessarily represent human entities. In this work, for example, we discuss a network whose nodes are cuneiform texts. Studies of cuneiform societies are likely to benefit from network studies with the nodes being linguistic elements, concepts, or archives. See for instance WAERZEGGERS 2012 for an analysis of a network in which nodes are Neo- and Late-Babylonian cuneiform archives. See the following introductions to social network analysis : WASSERMAN and FAUST 1994 ; DEGENNE and FORSÉ 1999 ; SCOTT 1991 ; PRELL 2011. An historical perspective on the development of the field is offered by SCOTT 1991, 7–38 ; FREEMAN 2004 ; PRELL 2011, 19–50. Many of the developments in SNA were made independently, and predate modern network theory (although not the mathematical branch of graph theory). However, the modern form of SNA (and especially the quantitative aspects stressed in our discussion) relies on mathematics that can be used to describe any network. For this reason our discussion places SNA in the more general context of modern network studies. 118 OFFPRINT AKKADICA 134 (2013), fasc. 2 - COPYRIGHT CENTRE ASSYRIOLOGIQUE GEORGES DOSSIN THIS DOCUMENT MAY BE PRINTED FOR PRIVATE USE ONLY. THIS DOCUMENT MAY NOT BE DISTRIBUTED, STORED IN A RETRIEVAL SYSTEM WITHOUT PERMISSION OF THE PUBLISHER A. Wagner, Y. Levavi, S. Kedar, K. Abraham, Y. Cohen, R. Zadok, Quantitative Social Network Fig. 1. The network of marriage ties between prominent 15th century Florentine families, according to PADGETT and ANSELL 1993. One family, the Puccis, which had no marriage ties with others, is omitted from the figure. After BORGATTI 2005, 65. It is evident that the Medici family takes a central place in the network. One can even intuitively see that their position is more advantageous than the position of the Strozzis, their rivals. Incidentally, we should mention that the amorphous notion of having an advantageous position in one’s social network is amenable to formal mathematical analysis, and it has been conclusively shown that the Medicis’ position in the network outranks that of the Strozzi family in many aspects.4 Can social network analysis shed new light on cuneiform archives ? This question has been first set forth by Caroline Waerzeggers, who carefully delineated the prospects and limitations of utilizing SNA in Assyriological research.5 Her study also presented, to the best of our knowledge, the first quantitative analysis of a social network reconstructed from cuneiform sources : it demonstrates that the business profile of two Neo-Babylonian individuals is well reflected in the composition of their respective social networks. Waerzeggers concluded her study by stating that despite the challenges which the nature of cuneiform evidence presents,6 “SNA can be an important support tool for Assyriologists ; it will also 4 5 6 See WASSERMAN and FAUST 1994, 169–219 and NEWMAN 2010, 168–193 for a general discussion of quantitative centrality measures, and particularly WASSERMAN and FAUST 1994, 182–183, 192, 197–198 ; NEWMAN 2005, 51–52 ; BORGATTI 2005, 65–69 for the Florentine marriage-network test-case. WAERZEGGERS, forthcoming. The foremost challenges for SNA-based research are incomplete data and difficulties in discerning homonymous individuals (or alternatively identifying persons referred to by two names). See WAERZEGGERS, 15–16. Another aspect of the paucity of data is the lack of panoramic primary sources that give an overview of the entire social fabric in a given time period, e.g. marriage lists. In Assyriology, we are mostly limited to data revolving around one institution, family etc. Consequently, cuneiform data lends itself more easily to ego-centered analyses (WAERZEGGERS, 8, 16). And see PRELL 2011, 118–133 for an introduction to ego-centered networks. 119 OFFPRINT AKKADICA 134 (2013), fasc. 2 - COPYRIGHT CENTRE ASSYRIOLOGIQUE GEORGES DOSSIN THIS DOCUMENT MAY BE PRINTED FOR PRIVATE USE ONLY. THIS DOCUMENT MAY NOT BE DISTRIBUTED, STORED IN A RETRIEVAL SYSTEM WITHOUT PERMISSION OF THE PUBLISHER Akkadica 134 (2013) help to tackle research questions that cannot be answered with standard methods.” In order for SNA to be advantageous, she adds, we do not have to utilize its entire mathematical apparatus, which assumes availability of data that cuneiform sources often do not have ; SNA can be used to direct research, its perspective and terminology forming a convenient way to ask novel questions and formulate answers concerning ancient societies. Taking Waerzeggers’ conclusion as our departure point, we wish to demonstrate the potential of approaching data gleaned from cuneiform archives from a quantitative SNA perspective. BUILDING BLOCKS OF A NETWORK7 Let us introduce some key SNA terms crucial for understanding the operational procedures used later.8 The fundamental concept of network theory is the graph.9 A graph is a collection of nodes representing, for instance, persons, and edges which encode relationships (ties) between each two nodes. We have already seen in Fig. 1 the common representation of a network, in which nodes are marked as circles and edges as lines connecting them. In a social network, an edge between nodes A and B can represent any kind of relationship between them : A is a neighbor of B, A is the father of B, A gave a loan to B, etc. We note that the first relation is symmetric (if A is a neighbor of B, then B is a neighbor of A) and in this case we say that the corresponding edge is undirected. The other two relationships (where A is the father of B, or A gave a loan to B) are asymmetric, and hence the corresponding edges are directed. Graphically, directed edges are represented as lines with an arrow head going, for instance, from father to son, thus indicating which node is the father of which. For undirected edges there is naturally no need to denote a direction to the relationship (Fig. 2). Edges can also be weighted (or valued) meaning that they are associated with a certain quantity. For instance, the directed tie “A gave a loan to B” might be accompanied by the sum of the loan. These weights could be useful, for instance, to discern the more important business transactions that took place in the network. Fig. 2. Examples of possible tie-types. 7 8 9 See nn. 1 and 3 for relevant references to this section. We slightly elaborate beyond what is strictly required for the current paper (e.g., in the discussion of directed vs. undirected ties) for the sake of completeness of the introduction to a reader unfamiliar with SNA. While the terminology and methodology on which SNA is based borrows heavily from graph theory, the latter field is distinctly different from network studies such as discussed here. See NEWMAN, BARABÁSI, and WATTS 2006, 4–6. 120 OFFPRINT AKKADICA 134 (2013), fasc. 2 - COPYRIGHT CENTRE ASSYRIOLOGIQUE GEORGES DOSSIN THIS DOCUMENT MAY BE PRINTED FOR PRIVATE USE ONLY. THIS DOCUMENT MAY NOT BE DISTRIBUTED, STORED IN A RETRIEVAL SYSTEM WITHOUT PERMISSION OF THE PUBLISHER A. Wagner, Y. Levavi, S. Kedar, K. Abraham, Y. Cohen, R. Zadok, Quantitative Social Network The concepts described so far are quite intuitive, and, no doubt, many scholars have described such relations in words, perhaps at times with the help of diagrams such as the ones presented in Fig. 1., without any awareness of SNA terminology and its applications. Yet here we reach the fundamental obstacle to a successful application of SNA. When a social network spans dozens or even hundreds of individuals, the pattern of interactions becomes too complex to be manually traced.10 For example, each of the two Late-Babylonian networks that Waerzeggers studied contain hundreds of individuals, which makes it difficult to grasp the underlying social structures or dynamics of these networks. In order to tackle this challenge, SNA has developed over the past decades an impressive arsenal of unique mathematical methods. TWO-MODE NETWORKS All networks we have discussed so far were one-mode networks : these are networks in which all nodes represent the same social entity, such as an individual, a family, or an archive. Sometimes, however, it is useful to consider two-mode networks in which nodes represent two different entities. In other words, the nodes are divided into two non-overlapping sets (modes). A particularly common type of two-mode networks is affiliation networks, which relate a set of actors (the first mode) to some social activity (the second mode).11 A hallmark example for an affiliation network is the study of Davis et al. that collected data on 18 rural Mississippi women, who had participated in a series of 14 social events over the course of 9 months.12 Not all the women took part in all of the events, and so the researchers generated a network13 with two categories of nodes : an individual and a social gathering, and traced which women participated in each gathering. Part of their data is shown in Fig. 3 : triangles represent women, circles the social events. A tie indicates that a certain woman participated in a certain social gathering, and so ties are drawn only between the two sets.14 Davis et al. used their data to investigate the extent by which one’s social class effects one’s daily social life. 10 11 12 13 14 In her survey of SNA literature from an Assyriologist’s perspective, Waerzeggers commented : “I get the impression that most studies limit the number of actors under observation so as to make the data set more manageable. I.e. Padgett and Ansell look at important Florentine families, not at individuals. In this way, a dataset of tens of thousands of people is reduced to 92 ‘actors’” (WAERZEGGERS, forthcoming, note 24 ; emphasis is Waerzeggers’). WASSERMAN and FAUST 1994, 291–343. DAVIS, GARDNER and GARDNER 1941, chap. 7, and see especially pp. 147ff. and Fig. 3 which shows a twomode network in matrix form. The data concerning participation of 18 women in 14 social events is actually only a small subset of their data, chosen for illustrative purposes. However, this small subset had substantial impact on SNA and was commonly used to motivate and exemplify further network-flavored analysis, see HOMANS 1951, 82–84 ; BREIGER 1974 ; BREIGER, BOORMAN, and A RABIE 1975, 356–358 ; DOREIAN 1979 ; DOREIAN 1982 ; DOREIAN 1986. As this study was published in 1941 the authors were not aware of network terminology and did not present their data, nor their method, in such a way. We use network-terms, however, to describe their work in order to highlight its relevance to the sociologically-motivated network analysis. In graph theory, a graph in which the nodes can be divided into two non-overlapping sets, and edges are formed only between these two sets is called a bipartite graph. 121 OFFPRINT AKKADICA 134 (2013), fasc. 2 - COPYRIGHT CENTRE ASSYRIOLOGIQUE GEORGES DOSSIN THIS DOCUMENT MAY BE PRINTED FOR PRIVATE USE ONLY. THIS DOCUMENT MAY NOT BE DISTRIBUTED, STORED IN A RETRIEVAL SYSTEM WITHOUT PERMISSION OF THE PUBLISHER Akkadica 134 (2013) Fig. 3. An example of an affiliation network. The network shown is a subset of the data collected by Davis et al. 1941, chap. 7. The ties show which women (triangles) participated in which social events (circles). Two-mode networks are particularly apt in Assyriology, where one can build networks associating persons to the texts that mention them. The two types of nodes are thus individuals and texts. These networks offer two appealing traits : first, they are easily gleaned from the data. When a digital version of the tablets is available, for instance through the ORACC15 or Archibab16 initiatives, the process can be even automated to a large extent. Second, they can be easily transformed back into a one-mode network, the main object of SNA study, via routine mathematical manipulation.17 Admittedly, the simplicity of the procedure does not come without cost. Networks which are reconstructed this way carry less data than straightforward and laborious reconstructions of one-mode networks. For example, they do not differentiate between the different roles of individuals in the texts, such as buyer vs. seller. However, these networks still offer valuable insights. In this study, we took a middle-ground : on the one hand, we rely on an easily-generated affiliation-network. On the other hand, this network was manually curated, and so it was possible to slightly refine the data as described below. AUTOMATIC CLASSIFICATION OF TEXTS FROM PHASES BASED ON A TWO-MODE NETWORK THE MURAŠÛ ARCHIVE INTO CHRONOLOGICAL Classification of archival documents into subgroups, such as separate chronological phases within the archive, is an intricate process, because it involves the collection and the assessment of diverse types of evidence. This process becomes inevitably formidable when dealing with very large archives. Similar problems encountered in many fields of science are 15 16 17 Open Richly Annotated Cuneiform Corpus, http ://oracc.org http ://www.archibab.fr WASSERMAN and FAUST 1994, 307–312 ; NEWMAN 2010, 123–126. 122 OFFPRINT AKKADICA 134 (2013), fasc. 2 - COPYRIGHT CENTRE ASSYRIOLOGIQUE GEORGES DOSSIN THIS DOCUMENT MAY BE PRINTED FOR PRIVATE USE ONLY. THIS DOCUMENT MAY NOT BE DISTRIBUTED, STORED IN A RETRIEVAL SYSTEM WITHOUT PERMISSION OF THE PUBLISHER A. Wagner, Y. Levavi, S. Kedar, K. Abraham, Y. Cohen, R. Zadok, Quantitative Social Network nowadays approached with automated tools based on the discipline of machine learning.18 Here, we focus on the task of unsupervised clustering : the computer is given a set of objects and then it classifies them into groups (clusters), such that the objects in each group are in some sense similar to one another.19 In our case-study the objects are archival documents. Our purpose is to classify the documents into meaningful groups on the basis of network data.20 We will show that our classification scheme successfully divides 75 texts of the Murašû archive into two chronological phases. When discussing automated classification it is important to keep two points in mind. First, the classification suggested by the computer is by no means perfect or complete. It is better to treat the computer-suggested classification as a working hypothesis, rather than as a conclusive result. Second, when proposing a classification scheme (such as the one we propose below), one must offer some objective validation. Simply listing the resulting clusters and finding some coherence in each of them is not enough because such a process is completely subjective. The value of a classification scheme can only be measured against a priori known data that were not used in the process of the clustering itself. For that reason, we purposefully selected many dated texts for our analysis. However we did not make the dates available to the computer. Nonetheless, the resulting subgroups adhere almost completely to two distinct chronological phases, thus validating our method in an objective manner. We have constructed a two-mode network of 883 individuals mentioned in 75 representative documents of the Murašû archive (listed in appendix A).21 A part of the network is shown in Fig. 4.22 The triangles represent individuals and the circles texts. Edges are drawn between persons and the texts which mention them. In order to simplify the network construction process, we do not differentiate between the various roles a person can take in a documented business transaction, although such distinctions can be made in future studies. However, since the network was manually constructed (unlike automated construction, see above), we can refine the data as follows : we exclude from the analysis links between persons and texts, where the former were mentioned as the father, or other ancestor, of one of the parties. Links of this type are obviously less informative because the ancestor is not taking part in the documented transaction. However, the information that can be learned from links 18 19 20 21 22 MITCHELL 1997. See JAIN and DUBES 1988 ; EVERITT et al. 2011. Note that the Girvan-Newman algorithm, which we employ, is not generally considered a method of unsupervised clustering because it is geared towards finding communities in a network (see below and n. 26). This is a related but not an identical concept to clusters. Here, however, we ultimately employ the algorithm to generate clusters of texts by a chronological division, which is a task of unsupervised clustering. Clearly, our sample (less than 10% of the texts in the archive) includes merely a small fraction of the prosopograpy of the Murašû archive, which consists of thousands of individuals. The current contrubtion seeks to present a new method to analyze cuneiform data rather than to offer an exhaustive study of this particular archive. We restrict ourselves to a subset of the network only for visualization purposes, since the full network is too large to be visualized conveniently. 123 OFFPRINT AKKADICA 134 (2013), fasc. 2 - COPYRIGHT CENTRE ASSYRIOLOGIQUE GEORGES DOSSIN THIS DOCUMENT MAY BE PRINTED FOR PRIVATE USE ONLY. THIS DOCUMENT MAY NOT BE DISTRIBUTED, STORED IN A RETRIEVAL SYSTEM WITHOUT PERMISSION OF THE PUBLISHER Akkadica 134 (2013) between persons and texts, where the person serves as a witness to a documented business transaction, is more ambiguous. While there are clear cases of witnesses who were regular participants in the Murašû’s business activity,23 most of the witnesses are mentioned in only one text. It is possible that some of them were present at the occasion of concluding the transaction by pure coincidence, and had nothing to do with the case in hand.24 For these reasons, we link a person to a text in which he appears as a witness only when that person is mentioned in another place in the document, apart from the witness list, or when his seal is impressed to the tablet. A person whose seal is impressed to the tablet was always considered one of the participants in the transaction. In summary, our reconstructed affiliation-network does not simply associate persons with the texts in which they appear. It associates persons with documented business transactions in which they took part : a person is linked to a text only if he actively participated in the business transaction documented therein. This two-mode network can be transformed into a person-to-person one-mode network, and studied in a similar way to the networks we have presented so far. Here, however, we transform it into a one-mode text-to-text network.25 For the purpose of explanation, Fig. 5 presents the text-to-text network that would have been obtained had we limited ourselves to studying only the partial data shown in Fig. 4. Fig. 4. A subset of the two-mode person-to-text network we have constructed for the Murašû archive. Fig. 5. The results of an algebraic procedure that transforms the sub-network shown in Fig. 4 into a valued text-to-text network. 23 24 25 Two striking examples are Aqar-aplu/Iddinâ, who appears in our data set in 19 texts (in 15 as a witness), and ErƯba-Illil/Illil-bana who appears in 17 texts (in 13 as a witness). Aqar-aplu, son of Iddinâ, occurs in over 160 documents of the Murašû archive and ErƯba-Illil, son of Illil-bana, in no less than 140, mostly as a witness. For their function as witnesses, cf. CUSSINI 2013, 46. The phenomenon of recurrent witnesses in this archive has already been noticed by CARDSACIA 1951, 20. For the use of coincidentally-chosen versus deliberately-selected witnesses, see VON DASSOW 1999, 5–7. See n. 17 above. The transformation from two-mode network to one-mode network is algebraic and requires no additional data processing on the part of the researcher. 124 OFFPRINT AKKADICA 134 (2013), fasc. 2 - COPYRIGHT CENTRE ASSYRIOLOGIQUE GEORGES DOSSIN THIS DOCUMENT MAY BE PRINTED FOR PRIVATE USE ONLY. THIS DOCUMENT MAY NOT BE DISTRIBUTED, STORED IN A RETRIEVAL SYSTEM WITHOUT PERMISSION OF THE PUBLISHER A. Wagner, Y. Levavi, S. Kedar, K. Abraham, Y. Cohen, R. Zadok, Quantitative Social Network In this text-to-text network, each node represents one of the 75 texts. An edge is drawn between texts that mention the same individual (more precisely, the individual actively participating in the transactions documented in both texts, see above). Note that this edge is weighted by the number of such individuals. For instance, according to Fig. 4 (based on a subset of our data) there are two persons mentioned both in BE 10 5 and in BE 9 59 – these are Illil-šuma-iddina/Murašû and Illil-šuma-iddina/Tattannu. Therefore, in Fig. 5 (which is based only on the subset of data in Fig. 4) the edge between these texts has a weight of two. All the other pairs of texts share only one person among them in Fig. 4, and therefore their respective edges have a weight of 1. One may wonder what is the purpose of building a two-mode network and then transforming it into a one-mode text-to-text network, in place of building the one-mode text-totext network directly. To answer that, we must remember that manually constructing a onemode text-to-text network is excruciatingly laborious. For instance, in order to accommodate our 75 representative texts we should have considered 2775 pairs of texts, and examine when does a pair of texts make reference to the same individuals. Building the two-mode network, on the other hand, is quite simple, and its transformation to text-to-text network is a matter of pure algebra carried out automatically. The network described in this study was built in several hours of manual work. In order to see how this network can be used to divide the group of texts into meaningful subgroups, we shall now define the notion of a community within a network. Communities are groups of nodes that are tightly connected among themselves, but only loosely connected to others (Fig. 6).26 Since in our network an edge between two texts denotes that both mention the same individual as an active participant, it follows that communities in that network are groups of texts that mention similar sets of individuals (as active participants) while making less frequent references to others. We expected such groups of texts to form distinct units within the archive. Fig 6a. A model network with three communities : three densely connected groups of nodes, which are only sparsely connected among themselves. Wide lines and thin lines are ties that connect two nodes in the same community, or two nodes that belong to two different communities, respectively. After GIRVAN and NEWMAN 2002, 7822. 26 A precise definition and a review of methods for finding community structures in networks can be found in NEWMAN 2004a ; NEWMAN 2010, 371–391, but see on the other hand LESKOVEC et al. 2008 ; LESKOVEC, LANG, and M AHONEY 2010. See also XIE, K ELLEY, and SZYMANSKI 2013 for a review of methods that are capable of detecting overlapping communities. The term “community” is usually used in the complex-networks literatures, while sociological studies prefer the term “cohesive subgroup” (WASSERMAN and FAUST 1994, 249–290 ; PRELL 2011, 151–165). Cohesiveness is a more general concept, however, and encompasses several SNA approaches. The most pertinent approaches, for the purpose of the current study, are ones that emphasize that in order for a subgroup to be cohesive it need not only have relatively strong ties among its members, but also relatively weak ties to the outside. See WASSERMAN and FAUST 1994, 267 and the references therein. 125 OFFPRINT AKKADICA 134 (2013), fasc. 2 - COPYRIGHT CENTRE ASSYRIOLOGIQUE GEORGES DOSSIN THIS DOCUMENT MAY BE PRINTED FOR PRIVATE USE ONLY. THIS DOCUMENT MAY NOT BE DISTRIBUTED, STORED IN A RETRIEVAL SYSTEM WITHOUT PERMISSION OF THE PUBLISHER Akkadica 134 (2013) Fig. 6b : A social network of scientific collaboration within a private research institution. Nodes are scientists, and ties are drawn between scientists who co-authored at least one paper. After NEWMAN 2004b, 5201, who notes : “This particular network appears to divide into a number of subcommunities, as indicated by the shapes of the nodes, and these subcommunities correspond roughly to topics of research” (also indicated in the figure). The Girvan-Newman algorithm27 is a computational method for detecting community structures in networks. Here, we applied it in order to divide a group of texts within the Murašû archive into sub-categories. We supplied a computer program with a list of texts and the people appearing in them (equivalent to the person-to-text network described above). The progam transformed it into a text-to-text network,28 and applied the Girvan-Newman algorithm to that network. The output of the program is thus a proposition as to how to divide the texts in our dataset into sub-groups. We stress that no other information was available to the program, such as chronological information, the number of sub-categories we expect to find in the data etc. All of its computations are based on the associations of people with texts. Having been supplied with this data, the algorithm proposed the classification29 shown in Fig. 7 ; Fig. 8 is a reproduction of Fig. 7, which highlights several texts of particular interest that are discussed below. 27 28 29 GIRVAN and NEWMAN 2002. A full description of the algorithm is mathematically-involved and beyond the scope of the current work. For an evaluation of the Girvan-Newman algorithm compared with possible alternatives, see the references in n. 26 above. The Girvan-Newman algorithm does not use the weights on the edges of this network. We included them in our description of the network for completeness’ sake, and since they hold valuable information on the strength of ties in the network, which can be used in future work. For a proposed generalization of the Girvan-Newman algorithm to weighted networks see NEWMAN 2004c. In fact, the Girvan-Newman algorithm does not produce a unique community structure of the network but rather a hierarchy of communities, representing different levels of granularity. I.e., the hierarchy represents a division into communities, and then a further division of these into smaller communities, and so on. For the 126 OFFPRINT AKKADICA 134 (2013), fasc. 2 - COPYRIGHT CENTRE ASSYRIOLOGIQUE GEORGES DOSSIN THIS DOCUMENT MAY BE PRINTED FOR PRIVATE USE ONLY. THIS DOCUMENT MAY NOT BE DISTRIBUTED, STORED IN A RETRIEVAL SYSTEM WITHOUT PERMISSION OF THE PUBLISHER A. Wagner, Y. Levavi, S. Kedar, K. Abraham, Y. Cohen, R. Zadok, Quantitative Social Network Fig. 7. The clusters generated by running the Girvan-Newman algorithm on the Murašû archive network we have assembled (choosing a granularity as detailed in n. 29). Fig. 8. A reproduction of Fig. 7 highlighting several nodes of special interest that are discussed in the main text. purpose of the current work, we selected the division which had the highest quality. In mathematical terms, we chose the granularity whose community structure had the highest modularity. Modularity – often denoted Q, for instance by the UCINET (BORGATTI, EVERETT and FREEMAN 2002) and NetDraw (BORGATTI 2002) software – quantifies the quality of the partition of the network into communities. More accurately, it quantifies how well does an assumed partition adhere to the rule that communities should have many links among their members, but sparser links to the outside world. The suggested partition into communities of the network discussed in this paper achieves modularity Q = 0.319. No other significantly-different partition of the same network achieves a comparable modularity. The precise defi nition of modularity is mathematically-involved and beyond the scope of this paper ; see NEWMAN and GIRVAN 2004 ; NEWMAN 2004a, 326–327 ; NEWMAN 2010, 223–226. A list of further community-quality measures is given by LESKOVEC, LANG, and M AHONEY 2010, 636–638. 127 OFFPRINT AKKADICA 134 (2013), fasc. 2 - COPYRIGHT CENTRE ASSYRIOLOGIQUE GEORGES DOSSIN THIS DOCUMENT MAY BE PRINTED FOR PRIVATE USE ONLY. THIS DOCUMENT MAY NOT BE DISTRIBUTED, STORED IN A RETRIEVAL SYSTEM WITHOUT PERMISSION OF THE PUBLISHER Akkadica 134 (2013) The resulting classification closely follows two chronological phases within the archive : an earlier phase (blue group, on the left) in which Illil-šuma-iddina/Murašû was the main protagonist, and a later phase (red group on the right) in which his nephew, RƝmnjt-Ninurta// Murašû, assumed that role. One can verify the validity of the classification by inspecting the dates of tablets within each group : clearly, the blue group mostly belongs to the late years of Artaxerxes I (465–424/3), while the red group mostly belongs to the early years of Darius II (424/3–405). We emphasize again that the dates were not used in the process of classification, but rather used only in posterior validation of its accuracy. This proves the validity of our classification method in an objective manner. Once proven valid, our results can bear on the dating of undated texts and on the identification of ambiguously-named persons within them (e.g., people whose names are broken). For example, we can see that the undated texts number 67 and 68 (in the top left, see also Fig. 8) were classified with the blue group, whereas texts 69 and 72 (lower right corner, see also Fig. 8), whose dates are broken or incomplete, were classified as red. We have thus obtained a working hypothesis concerning a chronological division within the archive, and the possible place of undated texts along this division. The main strength of algorithmic, network-based classification is its ability to take into account indirect associations that are not easily seen by a scholar studying the relevant corpus. An example for this is offered by text no. 51 in our dataset (PBS 2/1 185), dated 1 Dar II. This text was correctly classified by the Girvan-Newman algorithm as belonging to RƝmnjt-Ninurta’s phase, although RƝmnjt-Ninurta does not appear in it.30 However, other actors in that text enabled to classify it correctly. Text 51 concerns actors such as the scribe Ninurtaaba-uৢur/Illil-šuma-iddina, who worked for RƝmnjt-Ninurta at other occasions. In fact, he authored 24 texts in our datasets on behalf of RƝmnjt-Ninurta, of which two were written in 40 Art, and the others are subsequent to Darius II’s accession. Hence, texts in which this scribe figures are clearly associated with the later chronological phase in the archive. A late date for Text 51 is also clear from the participation of Murašû, son of Illil-suma-iddina, in the transaction. He appears in three other documents from the archive (not part of our dataset), dated between 424–416 BCE (STOLPER 1985, 20 n. 77), and hence he is roughly contemporary with RƝmnjt-Ninurta (attested between 429–415/414 BCE). Another illuminating example is provided by text no. 75 (UCP 9/3), which mentions both Illil-šuma-iddina and RƝmnjt-Ninurta. The appearance of both actors conforms to its date, 2 Dar II, which lies in the transition between the two chronological phases. The algorithm placed it in the later chronological phase (red group), in which RƝmnjt-Ninurta is the main protagonist. Although both RƝmnjt-Ninurta and Illil-šuma-iddina are associated with this transaction (as opposed to witnesses, or ancestors of the actors, who are excluded, as discussed above), a closer examination of the text shows that it is indeed RƝmnjt-Ninurta who is the leading actor in this case. According to this document, RƝmnjt-Ninurta provides a certain GadalyƗma with a horse, equipment and provisions for the purpose of royal service (‫܈‬ebnjtu 30 The text has Murašû/Illil-šuma-iddin//Murašû among the main actors. As far as our algorithm is concerned this does not count as an appearance of Illil-šuma-iddin in the text, because it ignores father names. 128 OFFPRINT AKKADICA 134 (2013), fasc. 2 - COPYRIGHT CENTRE ASSYRIOLOGIQUE GEORGES DOSSIN THIS DOCUMENT MAY BE PRINTED FOR PRIVATE USE ONLY. THIS DOCUMENT MAY NOT BE DISTRIBUTED, STORED IN A RETRIEVAL SYSTEM WITHOUT PERMISSION OF THE PUBLISHER A. Wagner, Y. Levavi, S. Kedar, K. Abraham, Y. Cohen, R. Zadok, Quantitative Social Network ša šarri, l. 11) in Uruk. The royal service is due for the share of the Murašû family in a horse fief (bƯt sƯsî), and GadalyƗma is being sent as replacement for the Murašûs. Illil-šuma-iddina, on the other hand, is mentioned only as the one who had inherited the share in the horse fief (l. 5), in reference to a past event. As in the case of PBS 2/1 185 mentioned above, the correct assignment of text no. 75 (UCP 9/3) to the late group of RƝmnjt-Ninurta is probably due to the identification by the computer of its author, the scribe Ninurta-aba-uৢur/Illil-šuma-iddina, and two other individuals associated with the business activity of RƝmnjt-Ninurta, ArdƯya/Bullu৬â and Illil-kƝšir/ Arad-Illil. They witnessed the transaction that is recorded in text no. 75 and their seals are impressed on the tablet. The seals of both men are found on six additional texts from RƝmnjtNinurta’s dossier that are in our dataset.31 Incidentally, we have also learned that the algorithm can correctly classify a text that belongs to the Illil-šuma-iddina phase even when both Illil-šuma-iddina and RƝmnjt-Ninurta appear in it due to an error on our part. Early on our research, we introduced an inadvertent error into the dataset by marking that RƝmnjt-Ninurta appears in text no. 62 (EE 86), although only Illil-šuma-iddina is actually mentioned in it. Unaware of our error, and assuming that RƝmnjt-Ninurta is the dominant actor in the text, we were surprised to learn that the Girvan-Newman algorithm associated this text with the earlier chronological phase. A closer inspection revealed the error.32 Even before the error was rectified, however, the correct classification of this text is illuminating. Even though RƝmnjt-Ninurta was (incorrectly) marked as appearing in the text, the text was clearly embedded in the network of texts belonging to the earlier chronological phase, and this is what enabled its correct classification. Text no. 62, whose date is largely broken ([x] Art), records a barley debt owed to Tirikammu, a subordinate (mƗr bƯti) of Illil-šuma-iddina. Tirikammu appears once more in our dataset as a subordinate of Illil-šuma-iddina, in text no. 65 (EE 94) again from 37 Art, which firmly situates him in the early phase of the archive.33 An additional connection between text no. 62 and the early group of Illil-šuma-iddina texts is Iaপnj-natanna/Iadiপyama, the debtor, who is also mentioned in texts nos. 2 (BE 9, 25, dated 31 Art, as a witness only) and 64 (EE 92, 40 Art), both associated with the dossier of Illil-šuma-iddina. Several texts were not classified within either of the two main phases. Text no. 27 (JCS 53, pp. 86-87, no. 1), for example, is set aside and connected to the blue group only by one tie. This text is much earlier than all others in our sample (dated 18 Art), yet it is strongly connected to Text 28 (JCS 53, 2) because they have two common participants (঩annƯya/ Iddina-BƝl and Arad-Illil/Iddinâ). It is interesting to note that a third participant in this transaction is Murašû himself, who is mentioned in other texts in our sample only as a father or 31 32 33 ArdƯya/Bullu৬â : BE 10, 83 ; PBS 2/1, 107 ; Illil-kƝšir/Arad-Illil : BE 10, 94 ; PBS 2/1, 74, 89, 203. For more tablets from the Murašû archive that bear ArdƯya’s or Illil-kƝšir’s seal, see BREGSTEIN 1993, nos. 535 and 247. We repeated all computations described in this paper following the correction of the error. All the results presented, save for the one described in this paragraph, were obtained following the correction. Tirikammu is further attested in another 10 texts of the Murašû archive (ZADOK 2009, 302–303 : 525). The dated ones span from 37 Art to 1 Dar and whenever his master is mentioned (in seven documents) it is Illil-šumaiddina, so that there is little doubt that undated texts that mention him belong to the early phase of the archive. 129 OFFPRINT AKKADICA 134 (2013), fasc. 2 - COPYRIGHT CENTRE ASSYRIOLOGIQUE GEORGES DOSSIN THIS DOCUMENT MAY BE PRINTED FOR PRIVATE USE ONLY. THIS DOCUMENT MAY NOT BE DISTRIBUTED, STORED IN A RETRIEVAL SYSTEM WITHOUT PERMISSION OF THE PUBLISHER Akkadica 134 (2013) an ancestor. All things considered, this text seems to belong to an even earlier phase than the one that revolves around the activity of Illil-šuma-iddina/Murašû. Thus its classification separately from any of the two main phases is well-grounded. Another texts which was listed as not belonging to any of the phases is text no. 74 (JCS 53, pp. 96-99, no. 7). This text is particularly noteworthy since it is, in fact, not a part of the Murašû archive but rather belongs to the šaknu of Nippur (STOLPER 2001). Nevertheless, it has connections with seven other texts in our sample, mainly in the red group, thanks to its participants Iddina-Marduk/Uballissu-Marduk, Ninurta-ana-bƯtišu/Lnj-idƯya and Illil-šumalilbir/NƗdinu, who participated in other transactions as well.34 Although the connections are numerous, the text is not embedded in any of the two phases. This led the algorithm to exclude it from both phases without any prior knowledge that this text does not belong to the Murašû archive. This demonstrates that the algorithm is not only able to leverage indirect ties to associate texts with one of the phases even when there are no apparent connections between them, as we have seen so far ; it can also disassociate a text from a phase, when there are seemingly strong ties between them, that in fact are not as strong as they may seem in a cursory inspection of the data. CONCLUSIONS This study presented one test-case in which quantitative SNA analysis was applied to cuneiform archival data. We reconstructed an affiliation network based on a subset of the Murašû archive, and used it to perform an automatic classification of the texts into two chronological phases. Such an observation is not trivial to come by for a scholar studying that material, and even more so when the number of pertinent texts increases to many hundreds. The importance of this study is two-fold. First, it demonstrates the utility of adopting SNA methodology to the study of cuneiform societies, a trend that seems to strengthen now with the publication of further works that adopt an SNA approach.35 We agree with Waerzeggers that SNA terminology is useful in itself and that one can benefit from it even without adopting complex mathematical means ;36 an SNA perspective allows raising questions and formulating answers that otherwise can not be easily approached.37 Secondly, this study demonstrates the benefits of employing quantitative and computational approaches where large volumes of data are concerned. Computer algorithms are capable of discerning subtle patterns in the data that are not easily seen by a scholar overwhelmed with dozens and hundreds of texts and numerous factual details. We expect that the ongoing progress in the creation of large-scale online 34 35 36 37 Idinna-Marduk/Uballissu-Marduk : IMT 84 and EE 107 ; Illil-šuma-lilbir/NƗdinu : BE 10, 92, PBS 2/1, 107, PBS 2/1, 203 and EE 34 ; Ninurta-ana-bƯtišu/Lnj-idƯya : BE 10, 60, PBS 2/1, 50 and PBS 2/1, 148. This was noticed by STOLPER 2001 : 98-99. See WAERZEGGERS 2012 and STILL 2012. Some of the standard SNA analyses are unsuitable for cuneiform archives and have to be adapted seeing the unique challenges cuneiform evidence presents. See n. 6 above. WAERZEGGERS forthcoming, 16. 130 OFFPRINT AKKADICA 134 (2013), fasc. 2 - COPYRIGHT CENTRE ASSYRIOLOGIQUE GEORGES DOSSIN THIS DOCUMENT MAY BE PRINTED FOR PRIVATE USE ONLY. THIS DOCUMENT MAY NOT BE DISTRIBUTED, STORED IN A RETRIEVAL SYSTEM WITHOUT PERMISSION OF THE PUBLISHER A. Wagner, Y. Levavi, S. Kedar, K. Abraham, Y. Cohen, R. Zadok, Quantitative Social Network repositories of cuneiform data38 will result in an increasing need for such methods, rendering them particularly advantageous. APPENDIX A No. Text 1 BE 9 3 13 Art 2 BE 9 25 31 Art 3 BE 9 28 31 Art 4 BE 9 34 5 BE 9 45 6 BE 9 59 P261607 37 Art 7 BE 9 69 P261612 39 Art 8 BE 9 86a P261499 41 Art 9 BE 10 5 0 Dar II 10 BE 10 7 0 Dar II 11 BE 10 39 P261555 1 Dar II 12 BE 10 60 P261557 2 Dar II 13 BE 10 65 P261555 3 Dar II 14 BE 10 76 P261400 3 Dar II 15 BE 10 77 P261188 3 Dar II 16 BE 10 83 P261553 4 Dar II 17 BE 10 84 P261460 4 Dar II 18 BE 10 85 P261561 4 Dar II 19 BE 10 92 P261335 4 Dar II 20 BE 10 94 P261475 4 Dar II 21 BE 10 118 P261519 7 Dar II 22 BE 10 128 P261470 7 Dar II 23 IMT 7 (Ni 501) 34 Art 24 IMT 84 (Ni 2845+PBS 2/1 64) 3 Dar II 25 IMT 94 (Ni 519) 40 Art 26 IMT 95 (Ni 550) 4 Dar II 27 Stolper, JCS 53, 1 (NBC 6148) P293067 18 Art 28 Stolper, JCS 53, 2 (NBC 6206) P293122 29 Art 29 PBS 2/1 5 P263898 1 Dar II 30 PBS 2/1 12 P267433 1 Dar II 31 PBS 2/1 27 P261368 1 Dar II 38 CDLI No. P261590 Date 34 Art 36 Art Such as ORACC (Open Richly Annotated Cuneiform Corpus, http ://oracc.org) and Archibab (http ://www.archibab.fr) mentioned above. 131 OFFPRINT AKKADICA 134 (2013), fasc. 2 - COPYRIGHT CENTRE ASSYRIOLOGIQUE GEORGES DOSSIN THIS DOCUMENT MAY BE PRINTED FOR PRIVATE USE ONLY. THIS DOCUMENT MAY NOT BE DISTRIBUTED, STORED IN A RETRIEVAL SYSTEM WITHOUT PERMISSION OF THE PUBLISHER Akkadica 134 (2013) No. Text CDLI No. Date 32 PBS 2/1 32 P261384 1 Dar II 33 PBS 2/1 50 P261678 3 Dar II 34 PBS 2/1 53 P261640 2 Dar II 35 PBS 2/1 60 36 PBS 2/1 63 P263897 3 Dar II 37 PBS 2/1 72 P267459 3 Dar II 38 PBS 2/1 74 P267488 3 Dar II 39 PBS 2/1 76 P267454 3 Dar II 40 PBS 2/1 84 P267437 4 Dar II 41 PBS 2/1 85 42 PBS 2/1 89 P263895 4 Dar II 43 PBS 2/1 104 P267470 5 Dar II 44 PBS 2/1 107 P263893 5( !) Dar II 45 PBS 2/1 108 P261517 5 Dar II 46 PBS 2/1 115 P261436 5 Dar II 47 PBS 2/1 119 P267491 6 Dar II 48 PBS 2/1 121 P267468 6 Dar II 49 PBS 2/1 133 P267429 7 Dar II 50 PBS 2/1 148 P267471 11 Dar II 51 PBS 2/1 185 1 Dar II 52 PBS 2/1 203 4 Dar II 53 PBS 2/1 205 4 Dar II 54 PBS 2/1 208 5 Dar II 55 PBS 2/1 222 7 Dar II 56 EE 2 (CBS 04993 + CBS 13050) 57 58 59 EE 34 (BM 12957) 60 EE 35 (CBS 5240) 61 62 3 Dar II 4 Dar II P261186 [24] Art EE 16 (CBS 05186) P261378 34 Art EE 24 (CBS 12986) P267590 [x] Art 7 Dar II P261433 33 Art EE 65 (CBS 04987) P261180 41 Art EE 86 (CBS 12924) P267526 [x] Art 63 EE 91 (CBS 05213) P261406 5 Dar II 64 EE 92 (CBS 05510) P261703 40 Art 65 EE 94 (BM 13264) 66 EE 98 (CBS 5170) P261362 37 Art 36 Art 67 EE 100 (CBS 5212) P261405 ? 68 EE 107 (CBS 12829) P267430 ? 69 EE 111 (CBS 12985) P267589 [7 Dar II] 70 EE 113 (CBS 13089_ P268174 33+ Art 71 Stolper, JCS 53, 3 (NBC 6122) P293043 31 Art 72 Stolper, JCS 53, 5 (L-29-554) 6 [Dar II] 132 OFFPRINT AKKADICA 134 (2013), fasc. 2 - COPYRIGHT CENTRE ASSYRIOLOGIQUE GEORGES DOSSIN THIS DOCUMENT MAY BE PRINTED FOR PRIVATE USE ONLY. THIS DOCUMENT MAY NOT BE DISTRIBUTED, STORED IN A RETRIEVAL SYSTEM WITHOUT PERMISSION OF THE PUBLISHER A. Wagner, Y. Levavi, S. Kedar, K. Abraham, Y. Cohen, R. Zadok, Quantitative Social Network No. Text CDLI No. 73 Stolper, JCS 53, 6 (CBS 5316) P261510 74 Stolper, JCS 53, 7 (YBC 11564) 75 UCP 9/3 275-277, pl. 1 Date 31 Art 4 Dar II P247869 2 Dar II BIBLIOGRAPHY BARABÁSI, A.-L., 2002 : Linked : The New Science of Networks, Cambridge. BORGATTI, S. P., 2002 : NetDraw Software for Network Visualization, Lexington. BORGATTI, S. P., 2005 : « Centrality and network flow », Social Networks 27 (1), 55–71. BORGATTI, S. P., EVERETT, M.G., FREEMAN, L. C., 2002 : Ucinet for Windows : Software for Social Network Analysis, Harvard. BORNHOLDT, S., SCHUSTER, H. G. (Eds.), 2003 : Handbook of Graphs and Networks : from the Genome to the Internet, Weinheim. BREIGER, R. L., 1974 : « The Duality of Persons and Groups », Social Forces 53 (2), 181–190. BREGSTEIN, L. B., 1993 : Seal use in Fifth Century B.C. Nippur, Iraq : A Study of Seal Selection and Sealing practices in the Murašu Archive, Ph.D. Dissertation, University of Pennsylvania. BREIGER, R. L., BOORMAN, S. A., ARABIE, P., 1975 : « An algorithm for clustering relational data with applications to social network analysis and comparison with multidimensional scaling », Journal of Mathematical Psychology 12 (3), 328–383. CARDSACIA, G., 1951 : Les archives des Murashu, Paris. CUSSINI, E., 2013 : « The Career of Some Elephantine and Murašu Scribes and Witnesses » in BOTTA, A. F. (Ed.), In the Shadow of Bezalel, Leiden, 39-52. DAVIS, A., GARDNER, B. B., GARDNER, M. R., 1941 : Deep South : A Social Anthropological Study of Caste and Class, Chicago. DEGENNE, A., FORSÉ, M., 1999 : Introducing Social Networks, London. DOREIAN, P., 1979 : « On the evolution of group and network structure », Social Networks 2 (3), 235– 252. DOREIAN, P., 1982 : « On the Delineation of Small Group Structures » in HUDSON, H. C. (Ed.), Classifying Social Data, San Francisco, 215–230. DOREIAN, P., 1986 : « On the evolution of group and network structure II : Structures within structure », Social Networks 8 (1), 33–64. EVERITT, B. S. et al., 2011 : Cluster Analysis, West Sussex. FREEMAN, L. C., 2004 : The Development of Social Network Analysis : A Study in the Sociology of Science, Vancouver. GIRVAN, M., NEWMAN, M. E. J., 2002 : « Community structure in social and biological networks », Proceedings of the National Academy of Sciences 99 (12), 7821–7826. HOMANS, G. C., 1951 : The Human Group, London. JAIN, A. K., DUBES, R. C., 1988 : Algorithms for Clustering Data, Englewood Cliffs. LESKOVEC, J., LANG, K. J., MAHONEY, M., 2010 : « Empirical comparison of algorithms for network community detection » in R APPA, M. et al. (Eds.), Proceedings of the 19th International Conference on World Wide Web, Raleigh, North Carolina, USA, April 26–30, 2010, New York, 631–640. LESKOVEC, J. et al., 2008 : « Statistical properties of community structure in large social and information networks » in HUAI, J. et al. (Eds.), Proceedings of the 17th International Conference on World Wide Web, Beijing, China, April 21–25, 2008, New York, NY, USA, 695–704. MITCHELL, T. M., 1997 : Machine Learning, Boston. NEWMAN, M. E. J., 2003 : « The Structure and Function of Complex Networks », Society for Industrial 133 OFFPRINT AKKADICA 134 (2013), fasc. 2 - COPYRIGHT CENTRE ASSYRIOLOGIQUE GEORGES DOSSIN THIS DOCUMENT MAY BE PRINTED FOR PRIVATE USE ONLY. THIS DOCUMENT MAY NOT BE DISTRIBUTED, STORED IN A RETRIEVAL SYSTEM WITHOUT PERMISSION OF THE PUBLISHER Akkadica 134 (2013) and Applied Mathematics Review 45 (2), 167–256. NEWMAN, M. E. J., 2004a : « Detecting community structure in networks », The European Physical Journal B - Condensed Matter 38 (2), 321–330. NEWMAN, M. E. J., 2004b : « Coauthorship networks and patterns of scientific collaboration », Proceedings of the National Academy of Sciences of the United States of America 101, 5200– 5205. NEWMAN, M. E. J., 2004 : « Analysis of weighted networks », Physical Review E 70(5), 056131. NEWMAN, M. E. J., 2005 : « A measure of betweenness centrality based on random walks », Social Networks 27 (1), 39–54. NEWMAN, M. E. J., 2010 : Networks : An Introduction, New York. NEWMAN, M. E. J., GIRVAN, M., 2004 : « Finding and evaluating community structure in networks », Physical Review E 69 (026113). NEWMAN, M. E. J., BARABÁSI, A.-L., WATTS, D. J. (Eds.), 2006 : The Structure and Dynamics of Networks, Princeton. PADGETT, J. F., ANSELL, C. K., 1993 : « Robust Action and the Rise of the Medici, 1400–1434 », American Journal of Sociology 98 (6), 1259–1319. PRELL, C., 2011 : Social Network Analysis : History, Theory and Methodology, London. SCOTT, J. P., 1991 : Social Network Analysis : A Handbook, London. STILL, B., 2012 : « Wife-Givers and Wife-Takers : A Network Approach to Marriage and Hierarchy among Babylonian Priests », a paper read at The 58th Rencontre Assyriologique Internationale, Leiden, July 16–20, 2012. STOLPER, M. W., 2001 : « Fifth Century Nippur : Texts of the Murašûs and from their Surroundings », JCS 53, 83–132. VON DASSOW, E., 1999 : « Introducing the Witnesses in Neo-Babylonian Documents » in CHAZAN, R., HALLO, W. W., SCHIFFMAN, L. H. (Eds.), Ki Baruch Hu : Ancient Near Eastern, Biblical, and Judaic Studies in Honor of Baruch A. Levine, Winona Lake, 3–22. WAERZEGGERS, C., 2012 : « The Network of Resistance », a paper read at The 58th Rencontre Assyriologique Internationale, Leiden, 16–20 July, 2012. WAERZEGGERS, C., forthcoming : « Social Network Analysis of Cuneiform Archives : A New Approach » in BAKER, H. D., JURSA, M. (Eds.), Proceedings of the Second START Conference in Vienna (17–19th July 2008) : Too Much Data ? Generalizations and Model-building in Ancient Economic History on the Basis of Large Corpora of Documentary Evidence. WASSERMAN, S., FAUST, K., 1994 : Social Network Analysis : Methods and Applications, Cambridge. WATTS, D. J., 2004 : « The “New” Science of Networks », Annual Review of Sociology 30 (1), 243–270. XIE, J., K ELLEY, S., SZYMANSKI, B. K., 2013 : « Overlapping Community Detection in Networks : the State of the Art and Comparative Study », ACM Computing Surveys 45 (4), 43 :1—43 :35. ZADOK, R., 2009 : Iranisches Personennamenbuch VII : Iranische Namen in semitischen NebenüberlieferungenIranische : Iranische Personennamen in der neu- und spätbabylonischen Neberüberlieferung, ÖAW Phil-hist. Kl. Sitzungsberichte 777, Vienna. 134 OFFPRINT AKKADICA 134 (2013), fasc. 2 - COPYRIGHT CENTRE ASSYRIOLOGIQUE GEORGES DOSSIN THIS DOCUMENT MAY BE PRINTED FOR PRIVATE USE ONLY. THIS DOCUMENT MAY NOT BE DISTRIBUTED, STORED IN A RETRIEVAL SYSTEM WITHOUT PERMISSION OF THE PUBLISHER