Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
GENERATING A SUBGRAPH OF KEY ENTITIES IN A NETWORK AND CATEGORIZING THE SUBGRAPH ENTITIES INTO DIFFERENT TYPES
Document Type and Number:
WIPO Patent Application WO/2011/031790
Kind Code:
A1
Abstract:
A method, system and computer-program product for generating a subgraph of key entities in a network and organizing entities In the subgraph are disclosed. The technique uses social network analysis centrality metrics to identify key entities in a network. The technique also uses social network analysis centrality metrics to categorize key entities into different types.

Inventors:
TOPHAM PHILIP S (US)
PURUSHOTHAMAN SENTHIL KUMAR (US)
PEELER RYAN (US)
PAGE ANTHONY M (US)
VESELY DANIEL (US)
Application Number:
PCT/US2010/048168
Publication Date:
March 17, 2011
Filing Date:
September 08, 2010
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
TOPHAM PHILIP S (US)
PURUSHOTHAMAN SENTHIL KUMAR (US)
PEELER RYAN (US)
PAGE ANTHONY M (US)
VESELY DANIEL (US)
International Classes:
G06F17/30
Foreign References:
US20060143081A12006-06-29
US20090132652A12009-05-21
Attorney, Agent or Firm:
NGUYEN, Quan (4199 Campus DriveSuite 55, Irvine CA, US)
Download PDF:
Claims:
CLAIMS

1. In a computing device, a method of generating a subgraph of key entities in a network, comprising:

(a) executing at least one computer program on one or more processors to deter ine at least two types of network centrality metrics for a plurality of entities in a giant component of the network;

(b) assigning rank-based scores to each network centrality metric value of each entity;

(c) selecting some of the entities to form a tentative subgraph of key entities based on comparisons of the rank-based scores to preset cut-off criteria;

(d) calculating the reach of the entities in the tentative subgraph of key entities and comparing that reach to a reach range;

(e) if the reach falls within the reach range, assigning the entities in the tentative subgraph of key entities to a subgraph of key entities; and

(f) if the reach does not fall within the reach range, iterative!}' repeating (c)- (e) using alternate rank-based scores cut-off criteria until a subgraph of key entities with a reach within the reach range is formed.

2. The method of claim 1, further comprising:

filtering entities from the subgraph of key entities based on publication-based statistics.

3. The method of c laim 1 , further comprising:

contacting one or more of the entities in the subgraph; and

delivering the subgraph to one or more clients.

4. The method of claim 1, wherein the entities include publication authors and links between the publication authors in the network are based upon co-authorships, co- citations, email interactions, human interactions, or a combination of any of the foregoing.

5. The method of claim 1 , wherein the entities include institutions and l inks between the institutions in the network are based upon co-authorships, co-citations, cross- institutional relationships, or a combination of any of the foregoing.

6. T e method of claim 1 , wherein the network is a publication-based network.

7. The method of claim 1 , wherein the reach is the fraction of entities in the giant component which are linked to the entities in the tentative subgraph by first-degree links, second-degree links or a combination thereof.

8. The method o claim 7, wherein the entities arc publication authors and the first- degree and second-degree links are based upon co-authorships, co-citations, email interactions, or a combination of any of the foregoing.

9. The method of claim 7, wherein the entities are insti utions and the first-degree and second-degree links are based upon co-authorships, co-citations, cross-institutional relationships, or a combination thereof.

10. The method of claim 7, wherein the network is a publication-based network.

1 1. The method of claim 1 , wherein the reach is the fraction of entities in the giant component which are linked to the entities in the tentative subgraph of key entities by first-degree links.

12. The method of claim 1 1 , wherein the entities arc publication authors and links between the publication authors in the network are based upon co-authorships, co- citations, email interactions, or a combination thereof.

13. The method of claim 11, wherein the entities are institutions and links between the institutions in the network are based upon co-authorships, co-citations, cross- institutional relationships, or a combination thereof.

14. The method of claim 1 1, wherein the network is a publication-based network.

15. In a computing device, a method of segmenting a subgraph of key entities of a network into sub-groups based, on network centrality metrics, comprising:

(a) executing at least one computer program on one or more processors to calculate at least two different network centrality metric values for each entity in the subgraph of key entities;

(b) assigning a rank-based score to each of the network centrality metric values;

(c) defining two or more rank-based score ranges for each of the network centrality metrics;

(d) for each rank-based score of each entity, determining which of the corresponding rank-based score ranges that the rank-based score falls within; and

(e) assigning each of the subgraph of key entities to one or more sub-groups based upon the rank-based score ranges that their rank-based scores fall within.

16. The method of claim 15, further comprising:

repeating (c)-(e) until a predetermined number of entities is assigned to each subgroup.

17. The method of claim 15, further comprising:

contacting one or more of the entities in one or more of the segmented subgraphs; and

delivering the segmented subgraph to one or more clients.

18. The method of claim 15, wherein at least three different types of network centrality metrics, or at least two different types of network centrality metrics and at least one publication related variable, are used to segment a subgraph of key entities.

1 . The method of claim 1 , wherein the network is a publication-based network.

20. The method of claim 19, wherein at least three different types of network centrality metrics, or two different types of network centrality metrics and at least one publication related variable, are used to segment a subgraph of key entities.

21. A computer-readable medium embodying a set of instructions executable by one or more processors, comprising:

(a) code for determining at least two types of network centrality metrics for a plurality of entities in a giant component of the network;

(b) code for assigning rank-based scores to each network centrality metric value of each entity;

(c) code for selecting some of the entities to form a tentative subgraph of key entities based on comparisons of the rank-based scores to preset cut-off criteria;

(d) code for calculating the reach of the entities in the tentative subgraph of key entities and comparing that reach to a reach range;

(e) code for determining if the reach falls within the reach range, and if so, assigning the entities in the tentative subgraph of key entities to a subgraph of key entities; and

(f) code for determining if the reach does not fall within the reach range, and if so, iteratively repeating (c)-(e) using alternate rank-based scores cut-off criteria until a subgraph of key entities with a reach within the reach range is formed.

22. A computer-readable medium embodying a set of instructions executable by one or more processors, comprising: (a) code for executing at least one statistical computer program on one or more processors to calculate at least two different network central ity metric values for each entity in the subgraph of key entities;

(b) code for assigning a rank-based score to each of the network central ity metric values;

(c) code for defining two or more rank-based score ranges for each of the network centrality metrics;

(d) code for determining, for each rank-based score of each entity, which of the corresponding rank-based score ranges that the rank-based score falls within; and

(e) code for assigning each of the subgraph of key entities to one or more subgroups based upon the rank-based score ranges that their rank-based scores fall within.

23. A system, comprising:

means for determining at least two types of network centrality metrics for a plurality of entities in a giant component of the network;

means for assigning rank-based scores to each network centrality metric value of each entity;

means for selecting some of the entities to form a tentative subgraph of key entities based on comparisons of the rank-based scores to preset cut-off criteria;

means for calculating the reach of the entities in the tentative subgraph of key entities and comparing that reach to a reach range;

means for determining if the reach falls within the reach range, and if so, assigning the entities in the tentative subgraph of key entities to a subgraph of key entities; and

means for determining if the reach does not fall within the reach range, and if so, providing alternate rank-based scores cut-off criteria to the selecting means until a subgraph of key entities with a reach within the reach range is formed.

A system, comprising: means for executing at least one statistical computer program on one or more processors to calculate at least two different network centrality metric values for each entity in the subgraph of key entities:

means for assigning a rank-based score to each of the network centrality metric values;

means for defining two or more rank-based score ranges for each of the network centrality metrics;

means for determining, for each rank-based score of each entity, which of the corresponding rank-based score ranges that the rank-based score falls within; and means for assigning each of the subgraph of key entities to one or more subgroups based upon the rank-based score ranges that their rank-based scores fall within.

Description:
GENERATING A SUBGRAPH OF KEY ENTITIES IN A NETWORK AND CATEGORIZING THE SUBGRAPH ENTITIES INTO DIFFERENT TYPES

Claim of Priority under 35 U.S.C. § 119

[0001] The present Application for Patent claims priority to Provisional Application No.

61 /241 ,801. entitled "A Systematic Method for Generating a Subgraph of Key Entities in a Network and Categorizing the Subgraph Entities Into Different Types Using Social Network Analysis" filed September 1 1 , 2009, and hereby expressly incorporated by reference.

TECHNICAL FIELD

{0002 J The present disclosure is generally " related to social networks, and more specifically, to systems and methods for identifying opinion leaders in a certain field, such as, for example, medicine or science.

BACKGROUND

(0003J Key entities are individuals or institutions whose opinions or actions are influential. They have the ability to influence the behavior of other entities in the same field or a related field. For example, key opinion leaders, in medicine, are generally medical practitioners or researchers relied upon by other practitioners or researchers to provide informative opinions on standard of care, pharmaceuticals, devices, and the importance of various biochemical pathways among other things. These opinions heavily influence the decisions and behaviors of other practitioners and researchers.

[00041 Key opinion leaders in medicine are often targeted by pharmaceutical and biotechnicai companies. Key opinion leaders often provide these companies with marketing feedback and advocacy activity. In addition, key opinion leaders sometimes assist pharmaceutical companies in designing and engaging in clinical trials. Key opinion leaders also spread knowledge throughout the medical community on how and when to properly use a drug or device and provide feedback to the companies from the medical community on their products. [0005J Identifying, establishing relationships with, and maintaining relationships with key opinion leaders is time consuming and expensive. It is therefore desirable to efficiently select key opinion leaders which meet the needs of a contacting company. For example, in the field of medicine, it may be more important to select someone who works on a specific subtype of lymphoma as that individual may have more influence over practitioners who deal with patients with that lymphoma subtype. Also, it may be important to choose a key opinion leader who has influence over practitioners practicing in certain geographic regions.

[β(ϊ ΐ | 1 : 'The most common current method used to for select key entities, such as key opinion leaders, is by using surveys. This technique has disadvantages. For instance, surveys tend to be very biased. Individuals who receive surveys tend to select their friends or close colleagues as key opinion leaders rather than making an objective selection. This is due to, at least in part, the fact that survey responders are limited to those individuals willing to fill in the survey in exchange for an honoraria, and over time subject matter experts whhin a domain respond to the surveys with the same answers producing the similar results.

[0007] Furthermore, the preparation, and interpretation of these surveys can be time consuming. Those who are surveyed generally expect to be monetarily compensated for their time. Moreover, considerable effort may be spent on identifying which persons to send the surveys to.

(0008J Thus, improved techniques for identifying key entities are needed.

[0009] A social network is a structure of nodes which generally represent organizations or individuals but can represent other entities. The nodes are connected to one another by links which represent relationships between entities represented by the nodes. A graphic representation of social network is called a sociogram.

[0010] Social network analysis is a process of generating information from a social network. Using the techniques of social network analysis, information on social prestige and social position can be obtained for entities or groups of entities in a network. Information on the transport of influence and communication in a network can also be harvested. Visualization of sonograms, for instance, assists in determining barriers to the movement of information or paths by which information is likely to diffuse through.

Advanced matrix mathematical methods can be used to obtain numerical variables, called network centrality metrics, which quantitatively indicate characteristics of a node in a network. These characteristics provide insight into the social role of an entity in the network, There are several different types of network centrality metrics, including betweeness, Bonacich's power centrality, closeness, degree, and eigenvector centrality, as well as others. Each provides different information on the status, or importance of an entity in a network. Combinations of values for the different centrality measures, for a particular entity, may be used in combination to assess that entities importance, or role in the network, in addition, non-centrality metric data, for instance a researcher's publication count or an institution's geography may be combined with the centrality metric values to obtain an even clearer picture of the role of an entity in a particular social network.

Recent advances in computer technology, including improvements in the speed at which data may be acquired from remote sources, through the Internet, and the increased ability of a computer to manipulate large amounts of data within a short period of time have made the acquisition, construction, and analysis of large social networks, using network centrality metrics and other procedures, possible. In addition, new text matching software, designed for cleaning of large data sets, allows for the accurate analysis of large social networks from which a wealth of diverse, informative data can be constructed.

Methods for identifying key entities based on network and/or relationship properties have been described previously. For example U.S. Patent Application Publication 2007/0271272A I teaches using connections in a personal-communications network to identify opinion leaders, where connections ma be defined by the quantity of times a person's name is searched in a search engine. The method does not, however, teach segmentation of key entities using network centrality measures or the use of reach in combination with network centrality measures to systematically define adequate numbers of key entities in a subgraph of key entities or subgroups of key entities.

[0014] US 2006/0 i 84464 Al teaches finding individuals in organizations thai are key individuals using profiles built from analyzing metadata including relationship data from a dataset. US 2006/0184464 Al does not teach network centrality metrics or reach or segmentation.

[0015] US 2004/0073476 Al teaches a method for obtaining a subgraph of key opinion leaders based upon an automated surve methodology. The method does not teach social network analysis for identifying key entities.

[0016] US 2002/0169737 Al discloses an Internet accessible method for displaying relationships between people, organizations, and articles. This application also teaches the concept of "reach 3"* to assess the connectedness of an entity in a network. It does not teach network centrality metrics or segmentation of key entities by network centrality metrics or the use of reach in combination with network centrality metric values to systematically define adequate numbers of key entities in a subgraph of key entities or subgroups of key entities.

[0017J US 2005/0080655 A I teaches a method of assessing the quality of collaborative relationships, mentioning the use several different possible approaches including social network analysis (SNA). While reach and centrality metrics are mentioned as possible tools to assess quality of relationships, no systematic method for identifying key entities is presented using reach and centrality measures. The reference does not teach segmentation of key entities by network centrality metrics or the use of reach in combination with network centrality metric values to systematically define adequate numbers of key entities in a subgraph of key entities or subgroups of key entities.

SUMMARY

[0018] Disclosed herein are one or more techniques for identifying key entities in a network, building a subgraph, or invisible college, of these key entities, and segmenting the subgraph of key entitles into specific sub-groups based upon their roles in the network. These techniques may be used as an alternative to the survey method for finding key opinion leaders, which avoids the disadvantages described above.

[001 ] In accordance with an aspect, a method for obtaining a subgraph of key entities is provided. The method comprises determining at least two types of network central ity metrics for all entities i the giant component o the network using statistical computer programs executed by one or more processors. Rank-based scores are then assigned to each network central ity metric value of each entity. Entities are selected to form a tentative subgraph of key entities based on their network centraiity metric rank-based scores using preset cut-off criteria. The reach of the entities in the tentative subgraph is calculated, and the reach is compared to a reach range. If the reach falls within the reach range, then the entities in the tentative subgraph are assigned to a subgraph of key entities. If the reach does not fall within the reach range, then a portion of the above process is repeated using alternate rank-based scores cut-off criteria until a subgraph of key entities having a reach within the desired reach range is formed.

[0020] In accordance with another aspect, a method for segmenting a subgraph of ke entities of a network into sub-groups based on network centraiity metrics is provided. The method includes calculating at least two different network centraiity metric values for each entity in the subgraph of key entities using statistical computer program executed by one or more processors. A rank-based score is assigned to each of the network centraiity metric values. A plurality of rank-based score ranges are defined for each of the network centraiity metrics. For each rank-based score of each entity, it is determined which of the corresponding rank-based score ranges that the rank-based score falls within. Each of the subgraph of key entities is assigned to sub-groups based upon the rank-based score ranges that their rank-based scores fall within.

[0021] Other aspects, features, advantages and variations of the methods, systems, articles of manufacture and techniques disclosed herein will be or will become apparent to one with skill in the art upon examination of the following figures and detailed description. It is intended that all such additional aspects, features, variations and advantages be included within this description and be protected by the accompanying claims.

BRIEF DESCRIPTION OF THE DRAWINGS

(0022] It is to be understood that the drawings are solely for purpose of illustration and do not define the limits of the appended claims. Furthermore, the components in the figures are not necessarily to scale. In the figures, like reference numerals designate corresponding parts throughout the different views.

{0023] FIG. 1 is a flow diagram which depicts an exemplary method of generating a subgraph of key entities in a network.

[0024] FIG. 2 is a flow diagram which depicts an exemplary method of segmenting a subgraph of key entities of a network into sub-groups based on network centrality metrics,

[0025] FIG. 3 is a representation of a network of individuals where nodes represent individual persons and links between nodes represent friendships between the nodes.

[0026] FIG. 4 is an exemplary list containing identifiers for entities in a friendship network, betweeness centrality and eigenvector centrality metric values for these entities, and rank-based scores for each of these entities.

[0027] FIG. 5 is an exemplary list identifying entities in a subgraph of key entities obtained from the friendship network along with betweeness centrality and eigenvector centrality metric values for these entities, rank-based scores for each of these entities, and a combined reach for these entities.

[0028] FIG. 6 is an exemplary list identifying entities in a subgraph of key entities obtained from the friendship network along with betweeness centrality and eigenvector centrality metric values for these entities, rank-based scores for each of these entities, and a combined reach for these entities. (0029] FIG. 7 is an exemplary list identifying the entities in a subgraph of key entities obtained from a scientific research network.

[0030] FIG. 8 is an exemplary list identifying the key entities in a subgraph of key entities obtained from a scientific research network along with closeness centrality and eigenvector central ity metric values for these entities, and rank-based scores for each of these entities.

[0031] FIG. 9 is a figure depicting exemplary subgroups formed by segmentation of a subgraph of key entities using one set of closeness central it and eigen vector central ity rank based score criteria.

[0032] FIG. 10 is a figure depicting exemplary subgroups formed by segmentation of a subgraph of key entities using an alternate set of closeness centrality and eigenvector centrality rank based score criteria.

[0033] FIG. 1 1 is a conceptual block diagram illustrating certain components of an exemplary system for generating a subgraph of key entiti es in a network,

[0034] FIG; 12 is a conceptual block diagram illustrating certain components of an exemplary system for segmenting a subgraph of key entities of a network into sub-groups based on network centrality metrics.

DETAILED DESCRIPTION

[0035] The following detailed description, which references to and incorporates the drawings, describes and illustrates one or more specific embodiments of what is claimed. These embodiments, offered not to limit but only to exemplify and teach the invention, are shown and described in sufficient detail to enable those skilled in the art to practice the invention defined by the claims. Thus, where appropriate to avoid obscuring the invention, the description may omit certain information known to those of skill in the art.

[0036] The word "exemplary" is used throughout this disclosure to mean "serving as an example, instance, or illustration." Any embodiment or feature described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments or features.

[0037] The techniques described herein are generally aimed towards the analysis of networks to identif and key entities, and to split them into key entit subgroups using social network analysis centrality measures.

[0038] FIG. 1 is a flow diagram which illustrates an exemplary method for obtaining a subgraph of key entities and dividing the entities into different subgroups based upon network centrality measures possessed by the entities. The method comprises, determining at least two types of network centrality metrics for all entities in the giant component of the network using statistical algorithms executed by a microprocessor or other mechanical processing device, step 101 ; assigning rank-based scores to each network centrality metric value of each entity, step 102; selecting entities to form a tentative subgraph of key entities based on their network centrality metric rank-based scores using preset cut-off criteria, step 103; calculating the reach of the entities, in the tentative subgraph of key entities, step 104, and comparing that reach to a desired reach range, step 105; if the reach falls within the reach range then assign the entities in the tentative subgraph of key entities to a subgraph of key entities, step 106; if the reach does not fall within the reach range then iteratively repeat the above process using alternate rank-based scores cut-off criteria, step 107, until a subgraph of key entities with a reach within the desired reach range is formed; optionally filtering entities from the subgraph of key entities using publication-based statistics, step 108; and contacting one or more of the entities in the subgraph, and/or delivering the subgraph to one or more clients, step 109.

[0039] The term "network entities" or "entities" generally refer to objects represented by a node in a network. In some instances, an entity is a person, such as a publication author, scientist, inventor political donator, philanthropist, a criminal, a physician, a nurse, a clinical worker, or an infected person.

10040] A "subgraph" is used in this document to describe a set of entities from network of entities. Entities which are part of a subgraph and their associated data including metrics can be indicated in a list or graphically displayed as a set of nodes and links or by other means known to those of ordinary skill in the art.

[0041 J The network may be a publication-based network. Publication-based networks are generally networks whose links are defined, at least in part, by publication commonalities. These may include but are not limited to co-citation, shared institution, shared journal, magazine, or newspaper, or co-authorship.

[0042] This type of information can be obtained, for instance, by searching through journal databases or the Internet and extracting that information either manually or using text mining software from electronic journals or article summaries or other methods known to those of ordinary skill in the art.

[0043] In some circumstances, the entities may be publication authors and links or connections between the entities are based upon co-authorships, co-citations, or email interactions, or other human interactions. In. addition to its ordinary meaning,.. human interaction. a!so : refers to- ;ariy social system in ' which organisms interact with other organisms and their collective ce-exist nce. irrespective of whether ihe..orginismS: are aware of it or not, and irrespective f whether the interaction is voluntary or involuntary. The connections may also include human-machine-hunuin interactions whci e u machine may be an ' intermediary step between any twojtiumans. Links may be single Ti Ks or multiple links or non-integer links! Information on email based relationships between entities can be obtained, for instance, from blogs or personal management software, surveys, or other sources known to those of ordinary skill in the art.

[0044J In other circumstances, the entity may be an institution, a topic, such as a protein, a clinic, or a patent, information on protein networks can be obtained from scientific journals and websites, for example. Information on patents, for example relationships between inventors or assignees, can be obtained from patent databases, for example. An example of where relationships between clinics can be identified, for instance, relationships between clinics defined by joint participation in specific clinical trials, can be obtained from websites, such as www.clinicaltrials.gov. [0045] In another example, the entities are institutions and links are based upon co- authorships, co-citations, or other cross-intuitional relationships. A good source for information on cross-institutional relationships is the Internet, including institution websites and electronic publications.

[0046] The term "reach" is generally defined as the fraction or amount of entities in a network or subcomponent of a network which are connected to another entity or a groap of entities in the network. Reach can be measured in a number of ways including by first- degree links, second-degree links, or higher order finks. First-degree or secoiM'- iegree links refer to the short st link path distance between any two nodes. Nudes with a shortest link path of two are two links apart have a second-degree link. Stated differently, the two nodes are separated by another node. Nodes with a shortest link path distance of ore are directly connected through a single link, and are considered to he adjacent te eicli oi!iei , i.e. , these udjacrau nodes are connected b) a first-degree link.

[6047} In one example, the reach is the fraction of entities in the giant component which are connected to the entities in the tentative subgraph by first-degree links, second-degree links or a combination thereof.

[0048] In another example, the reach is the fraction of entities in the giant component which are connected to the entities in the tentative subgraph of key entities by first-degree links.

[0049] The term "network centrality metrics" includes measures of centrality used in graph theory and network analysis. These measures indicate the importance of a node in a graph. In graphs where nodes correspond to entities and graphs correspond to collections of entities and their connections, these measures indicate the importance of an entity in a collection of entities. Some exemplary network centrality metrics include degree centrality. betweeness centrality, eigenvector centrality, Bonacich's power centrality, and closeness centrality. Computer programs, such as statistics and/or social networking software, e.g., UCINET or SAS, can be used to calculate these metrics from network adjacency matrices constructed for the networks. A person may also write their own code using, for instance, Java, FORTRAN, or C++.

[0050] The networks on which the centraiity metric computer programs are generally applied are large and consist of many nodes and links. Therefore, execution of these programs, on a reasonable timescale, may be performed by computers. The use of a computer involves the translation of social network analysis algorithms into specific computer program code, which may be reasonably accomplished by those of ordinary skill in the art.

[0051) The term "giant component" generally refers to the largest group of connected nodes in a graph. It should be understood, however, that there may be multiple subgraphs in a network and the "giant component" may refer to some or all of these,

[0052] The reach of the tentative subgraph of the key entities may be calculated following its establishment. If the reach falls below or above a particular reach range, then cutoff- values can be changed to alter the number of the rank-based scores which are acceptable to permit inclusion of an entity into the tentative subgraph of key entities.

[0053] The term "publication-based statistics" generally refers to statistics or variables related to extent of publication, for example publication count, but may also refer to geography of publication, impact factor, or other variables associated with publications, or that can be embedded in or extracted from one or more publications.

[0054] FIG. 2 is a flow diagram which illustrates an exemplary method of segmenting a subgraph of key entities of a network into sub-groups based on network centraiity metrics 200.

[0055] The method includes calculating at least two different network centraiity metric values, step 201 , for each entity in the subgraph of key entities using statistical algorithms executed by a microprocessor or other mechanical processing device; assigning a rank- based score to each of the network centraiity metric values, step 202; defining two or more rank-based score ranges for each of the network centraiity metrics, step 203; for each rank-based score of each entity determining which of the corresponding rank-based score ranges that the rank-based score fails within; assigning each of the subgraph of key entities entities to sub-groups based upon the rank-based score ranges that their rank- based scores fall within, step 204; and optionally, step 205, repeating the above steps using alternative rank-based score ranges until a desired number of entities is assigned to each sub-group, step 206: and contacting one or more of the entities in one or more of the segmented subgraphs, and/or delivering the segmented subgraph to one or more clients.

[0056] In at least one embodiment of the invention at least three different types of network central ity metrics or, at least two different types of network central ity metrics and at least one publication related variable are used to segment a subgraph of key entities.

(§057] The term "segmenting" refers to dividing entities into subgroups. The entities in particular subgroups share similarities in their network central ity metric values or publication related statistics. For instance, entities with high betweeness centrality scores and low eigenvector centrality scores may be segmented together into a subgroup, in general, the subgroup in which a particular entity is segmented into will indicate something about the role of that entity in the network. The network may be a publication- based network.

Example 1

[0058] FIG 3. depicts a small network 300 of persons who have relationships with one another defined by survey acknowledged friendship. In this example, we seek to identify a few key persons in the network to communicate information to in order to efficiently spread that information over most of the network. Icons 301 -31 8 represent eighteen persons in the network. Friendship is represented by links connecting the eighteen individuals. In this example the links are not weighted, although the may be weighted in other circumstances. [0059] The betweeness centrality and eigenvector centrality may be determine for this network and betweeness centrality and associated with each network entity. These values are listed in FIG. 4, along wit their associated rank-based scores. Prior to the calculations, cut-off criteria are set, e.g., it was determined that only persons in the friendship network possessing top 15% betweeness centrality scores or top 15% eigenvector centrality scores would be contacted with the information desired to be communicated across the network. Individuals with high betweeness scores should be able to pass the information between the various disconnected subgroups of friends in the network. Individuals in the high eigenvector scores should be able to pass the information to a large number of other individuals in the network as these Individual's possess friendships to popular individuals in the network.

[0060] As 15% of eighteen is about three, the three individuals within the network possessing top 15% betweeness centrality scores (e.g., icons 1 18, 1 15, and 1 13) were selected; and the three individuals within the network possessing the top 15% eigenvector centrality scores(icons 1 18, 1 13, and 1 17) were selected. Obviously, there is overlap between the selected groups of entities. When merged to form a tentative subgraph of key entities there are four unique entities (icons 118, 1 17, 1 13, and 1 15). The reach of these entities in the friendship network was then calculated using first-degree links and found to be 72%. That is, these four individuals, possessed first-degree connections to 72% of the network. These data are displayed in a list in FIG. 5,

10061 J In some situations, it may be desirable to communicate the piece of information to a higher percentage of individuals in the friendship network a larger reach than 72%. In order to achieve a higher reach it was deemed necessary to alter the permissible rank- based betweeness centrality and eigenvector centrality score ranges to top 22% rather than top 15%. The expanded ranges allow for the inclusion of two additional entities (icons 105 and 106) into the tentative subgraph of key entities. This subgraph now includes a total of six entities (icons 1 18, 117, 113, 1 15, 105, and 106). These entities have combined reach of 83%. These data are displayed in a list in FIG. 6. it was determined that this was an acceptable reach and the tentative subgraph of key entities can now be considered a subgraph of key entities, The subgraph of key entities was then delivered to the client as an email attachment.

Example 2

[0062] The second example illustrates segmentation of a subgraph of key entities using network centrality measures. In this example, a subgraph of twenty-three ke entities in a scientific research network is present. The subgraph entities are displayed in a list in FIG. 7. It should be noted that the subgraph of key entities 700 in this example may or may not have been constructed using network centrality measures, in this example, the client's interest is in marketing an expensive computer program to persons in the subgraph of key entities. Note also that the entities' names, profiles, and other descriptors have been replaced by numeric identifiers, 701-723, in this case, the client would like to place more resources into marketing the product to influential peopie in the subgraph of key entities with the hope that if they purchase the program, other entities in the scientific research network will be in swayed into also purchasing the program.

[0063] The entities in the subgraph of key entities are segmented into four different subgroups.

[0064J Subgroup A includes individuals who are close to the center of the network and possess connections to well-connected entities in the network. These individuals, in general, have high values of eigenvector centrality and closeness centrality, and would likely possess the funding necessary to purchase the program and the influence necessary to sway others in the network to purchase the program.

[0065] Subgroup B includes individuals who are well connected to well-connected individuals in the network but are not working in the core of the network. These individuals should have high eigenvector centrality values and low closeness centrality values. It can be hypothesized that these individuals may be very influential in a small subset of the research network but are not very influential to the network on a whole because they may be working on an unpopular research topic. It may also be hypothesized that these individuals may or may not have the funding available to purchase the program.

10066] Subgroup C includes individuals in the subgraph of key entities who are in the core of the network, perhaps because they work on a very popular research topic, but are not well connected to well-connected people in the network. These individuals should have high values of closeness centra! ity but not eigenvector centrality. It may be hypothesized that individuals in this subgroup may have a moderate degree of influence on other researchers in the network because they may be working on a ver popular research topic .and may be publishing in popular journals, but may or may not have enough funding available to purchase the computer program.

[0067] Subgroup D includes individuals who are not that well connected to well- connected individuals in the network and who are not at the core of the network. These individuals may not have funding to purchase the computer software we are marketing. It is also unlikely that these individuals will be able to influence other members of the network to purchase the software.

[0068] From an adjacency matrix containing relationship data for the entire network, eigenvector and closeness central ity metric values are calculated. The values are then ranked for individuals in the subgraph of key entities. The network centrality values and rank scores are appended to the subgraph of key entities and that table is shown in FIG. 8.

(0069] In this example, individuals segmented into Subgroup A have an eigenvector centrality rank that is between 1 and 5 and a closeness centrality rank that is between 1 and 10. Individuals segmented into Subgroup B are individuals not segmented into Subgroup A who have an eigenvector centrality rank score between 1 and 5. individuals segmented into Subgroup C are individuals not segmented into Subgroup A who have a closeness centrality rank score of between 1 and 10. Subgroup D then contains all of the other entities in the key subgraph of entities. [0070] As a result of these rank score criteria, the twenty-three entities are segmented to the four subgroups as indicated in FIG. 9. There are five entities in Subgroup A, no entities in Subgroup B, five entities in Subgroup C, and thirteen entities in Subgroup D.

[0071] To allow for more entities to be included into Subgroup B, the rank-based score ranges are then redefined.

[0072] The new ranges are as follows: Subgroup A has an eigenvector centrality rank that is between 1 and 5 and a closeness centrality rank that is between 1 and 5. Individuals segmented into Subgroup B are individuals not segmented into Subgroup A who have an eigenvector centrality rank score between 1 and 10 and whose eigenvector centrality rank score is greater than or equal to their closeness centrality rank score. Individuals segmented into Subgroup C are individuals not segmented into Subgroup A or Subgroup B who have a closeness centrality rank score of between 1 and 10. Subgroup D, as in the previous scheme, contains all of the other entities in the subgraph of key entities.

[0073] With these revised rank score criteria, the twenty-three entities were again segmented into the four subgroups as indicated in FIG. 10. There are four entities in Subgroup A. four entities in Subgroup B, two entities in Subgroup C. and thirteen entities in Subgroup D. It was decided that this segmentation gave an adequate number of entities in each subgroup and the subgroups should be retained. Several entities in the segmented subgraph were then contacted, by phone to deliver a marketing message to them.

[0074] FIG. 1 1 is a conceptual block diagram illustrating certain components of an exemplary system for generating a subgraph of key entities in a network. The system includes a computing device 1002 having a processor 1006 and a memory 1008 in communication with one another. Among other things, the memory stores a subgraph generation computer program 1010. The memory 1008 may also store other programs and/or data. The processor 1006 includes one or more digital circuits, such as microprocessors, DSPs, embedded controllers, or intellectual property (IP) cores for executing programs stored in the memory 1008. The memory 1008 may be any suitable computer storage medium capable of storing instructions and/or data.

[0075] The computing device 1002 receives data about the network and entities within the network, and in turn, the subgraph generation program 1010 produces a subgraph of key entities by executing some or all of the method steps described above in connection with FIG. 1. More specifically, the subgraph generation program 1010 includes instructions executable by the processor 1006 for causing the computing device 1002 to perform some or all of the steps described above in connection with FIG. 1.

(0076] FIG. 12 is a conceptual block diagram illustrating certain components of an exemplary system for segmenting a subgraph of key entities of a network into sub-groups based on network centra lity metrics. The system includes the computing device 1002 having the processor 1006 and the memory 1008 in communication with one another. Among other things, the memory 1 08 stores a subgraph segmentation computer program 1 100.

[0077] The computing device 1002 receives data about the network, including data about entities within the network, and in turn, the subgraph segmentation program 1100 produces one or more subgraph segments by executing some or all of the method steps described above in connection with FIG. 2. More specifically, the subgraph segmentation program 1 100 includes instructions executable by the processor 1006 for causing the computing device 1002 to perform some or all of the steps described above in connection with FIG. 2.

[0078] It is noted that the computing device 1002 may be configured to store both the subgraph generation and subgraph segmentation programs 1010, 1 100 in memory 1008, and that the functions of each program 1010, 1100 may be combined into a single program, or that the programs 1010, 1100 may be executed together in a cooperative manner. [0079J The functionality of the systems, devices, and their respective components, as well as the method steps and blocks described herein may be implemented in hardware, software, firmware, or any suitable combination thereof " . The software/firmware may be a program having sets of instructions (e.g., code segments) executable by one or more digital circuits, such as microprocessors, DSPs, embedded controllers, or intellectual property (IP) cores. If implemented in software/firmware, the functions may be stored on or transmitted over as instructions or code on one or more computer-readable media. Computer-readable medium includes both computer storage medium and communication medium, including any medium that facilitates transfer of a computer program from one place to another. A storage medium may be any available medium that can be accessed by a computer. By way of example, and not limitation, such computer-readable medium can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that ca be used to carry- or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Disk and disc, as used herein, includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable medium.

[0080] Other embodiments and modifications of the methods, systems and articles of manufacture described above will occur readily to those of ordinar skill in the art in view of these teachings. Thus, the foregoing description is illustrative and not restrictive. The invention is to be limited only by the following claims, which cover all such other embodiments and modifications, when viewed in conjunction with the above specification and accompanying drawings. The scope of the invention should, therefore, not be limited to the above description, but instead should be determined with reference to the appended claims along with their full scope of equivalents.

[0081 j WHAT IS CLAIMED IS :