首页 > 最新文献

Internet Mathematics最新文献

英文 中文
On the Power of Planned Infections in Networks 论网络中计划性感染的威力
Q3 Mathematics Pub Date : 2015-03-02 DOI: 10.1080/15427951.2014.982312
Mickey Brautbar, M. Draief, S. Khanna
Over the last decade we have witnessed the rapid proliferation of online networks and Internet activity. Although such activity is generally considered a blessing, it also brings with it a large increase in risk of computer malware—malignant software that actively spreads from one computer to another. To date, the majority of existing models of malware spread use stochastic behavior, when the set of neighbors infected from the current set of infected nodes is chosen obliviously. In this work, we initiate the study of planned-infection strategies that can decide intelligently which neighbors of infected nodes to infect next in order to maximize their spread, while maintaining a “signature” similar to the oblivious stochastic infection strategy in order not to be discovered. We first establish that computing optimal and near-optimal planned strategies is computationally hard. We then identify necessary and sufficient conditions in terms of network structure and edge infection probabilities such that the planned process can infect polynomially more nodes than the stochastic process while maintaining a similar “signature” as the oblivious stochastic infection strategy. Among our results is a surprising connection between an additional structural quantity of interest in a network, the network toughness, and planned infections. Based on the network toughness, we characterize networks where existence of planned strategies that are pandemic (infect all nodes) is guaranteed, as well as efficiently computable.
在过去的十年中,我们目睹了在线网络和互联网活动的迅速扩散。虽然这种活动通常被认为是一件好事,但它也带来了计算机恶意软件风险的大幅增加——恶意软件会在一台计算机之间传播。迄今为止,大多数现有的恶意软件传播模型都使用随机行为,即从当前受感染节点中选择受感染的邻居集是不可见的。在这项工作中,我们启动了计划感染策略的研究,该策略可以智能地决定下一个感染感染节点的邻居,以最大化其传播,同时保持类似于遗忘随机感染策略的“特征”,以便不被发现。我们首先确定计算最优和接近最优规划策略在计算上是困难的。然后,我们根据网络结构和边缘感染概率确定必要和充分条件,使得计划过程可以比随机过程多项式地感染更多的节点,同时保持与遗忘随机感染策略相似的“特征”。在我们的研究结果中有一个令人惊讶的联系,那就是网络中额外的结构量、网络韧性和计划感染之间的联系。基于网络韧性,我们描述了保证存在流行病(感染所有节点)的计划策略以及有效可计算的网络。
{"title":"On the Power of Planned Infections in Networks","authors":"Mickey Brautbar, M. Draief, S. Khanna","doi":"10.1080/15427951.2014.982312","DOIUrl":"https://doi.org/10.1080/15427951.2014.982312","url":null,"abstract":"Over the last decade we have witnessed the rapid proliferation of online networks and Internet activity. Although such activity is generally considered a blessing, it also brings with it a large increase in risk of computer malware—malignant software that actively spreads from one computer to another. To date, the majority of existing models of malware spread use stochastic behavior, when the set of neighbors infected from the current set of infected nodes is chosen obliviously. In this work, we initiate the study of planned-infection strategies that can decide intelligently which neighbors of infected nodes to infect next in order to maximize their spread, while maintaining a “signature” similar to the oblivious stochastic infection strategy in order not to be discovered. We first establish that computing optimal and near-optimal planned strategies is computationally hard. We then identify necessary and sufficient conditions in terms of network structure and edge infection probabilities such that the planned process can infect polynomially more nodes than the stochastic process while maintaining a similar “signature” as the oblivious stochastic infection strategy. Among our results is a surprising connection between an additional structural quantity of interest in a network, the network toughness, and planned infections. Based on the network toughness, we characterize networks where existence of planned strategies that are pandemic (infect all nodes) is guaranteed, as well as efficiently computable.","PeriodicalId":38105,"journal":{"name":"Internet Mathematics","volume":"11 1","pages":"319 - 332"},"PeriodicalIF":0.0,"publicationDate":"2015-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/15427951.2014.982312","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59948119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Introduction to Temporal Graphs: An Algorithmic Perspective* 时序图导论:一个算法视角*
Q3 Mathematics Pub Date : 2015-03-01 DOI: 10.1080/15427951.2016.1177801
O. Michail
Abstract A temporal graph is, informally speaking, a graph that changes with time. When time is discrete and only the relationships between the participating entities may change and not the entities themselves, a temporal graph may be viewed as a sequence G1, G2…, Gl of static graphs over the same (static) set of nodes V. Though static graphs have been extensively studied, for their temporal generalization we are still far from having a concrete set of structural and algorithmic principles. Recent research shows that many graph properties and problems become radically different and usually substantially more difficult when an extra time dimension is added to them. Moreover, there is already a rich and rapidly growing set of modern systems and applications that can be naturally modeled and studied via temporal graphs. This, further motivates the need for the development of a temporal extension of graph theory. We survey here recent results on temporal graphs and temporal graph problems that have appeared in the Computer Science community.
时间图,通俗地说,是随时间变化的图。当时间是离散的,只有参与实体之间的关系可能会改变,而不是实体本身,一个时间图可以被看作是一个序列G1, G2…,Gl的静态图在相同的(静态)节点v集合上,尽管静态图已经被广泛研究,但对于它们的时间泛化,我们仍然远远没有一套具体的结构和算法原则。最近的研究表明,当添加额外的时间维度时,许多图的属性和问题会变得完全不同,而且通常会变得更加困难。此外,已经有一组丰富且快速增长的现代系统和应用程序可以通过时间图自然地建模和研究。这进一步激发了发展图论的时间扩展的需要。我们在这里调查了最近在计算机科学界出现的关于时间图和时间图问题的研究成果。
{"title":"An Introduction to Temporal Graphs: An Algorithmic Perspective*","authors":"O. Michail","doi":"10.1080/15427951.2016.1177801","DOIUrl":"https://doi.org/10.1080/15427951.2016.1177801","url":null,"abstract":"Abstract A temporal graph is, informally speaking, a graph that changes with time. When time is discrete and only the relationships between the participating entities may change and not the entities themselves, a temporal graph may be viewed as a sequence G1, G2…, Gl of static graphs over the same (static) set of nodes V. Though static graphs have been extensively studied, for their temporal generalization we are still far from having a concrete set of structural and algorithmic principles. Recent research shows that many graph properties and problems become radically different and usually substantially more difficult when an extra time dimension is added to them. Moreover, there is already a rich and rapidly growing set of modern systems and applications that can be naturally modeled and studied via temporal graphs. This, further motivates the need for the development of a temporal extension of graph theory. We survey here recent results on temporal graphs and temporal graph problems that have appeared in the Computer Science community.","PeriodicalId":38105,"journal":{"name":"Internet Mathematics","volume":"12 1","pages":"239 - 280"},"PeriodicalIF":0.0,"publicationDate":"2015-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/15427951.2016.1177801","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59948080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 192
Network Topology Vulnerability/Cost Trade-Off: Model, Application, and Computational Complexity 网络拓扑脆弱性/成本权衡:模型、应用和计算复杂性
Q3 Mathematics Pub Date : 2015-02-23 DOI: 10.1080/15427951.2015.1018019
Aron Laszka, A. Gueye
Abstract Technological networks (e.g., telephone and sensor networks, Internet) have provided modern society with increased efficiency, but have also exposed us to the risks posed by their vulnerability to attacks. Mitigating these risks involves designing robust network topologies in situations where resources are economically constrained. In this study, we consider the vulnerability of network topologies from an economic viewpoint and propose security metrics, which are necessary for assessing the efficiency of our solutions. We define the vulnerability of a network as the potential loss in connectivity due to the actions of a strategic adversary. To derive vulnerability metrics, we revisit our recently introduced network blocking game models, which provide a framework for quantifying network topology vulnerability in adversarial environments. We assume that the network operator takes both security and economic goals into consideration. To model these goals, we generalize previous models by introducing usage costs and budget constraints for the operator. We study two natural constraint formulations, the maximum and the expected cost constraints, and derive the feasible vulnerability/cost region. Because the proposed metrics are based on game-theoretic models, computing them can be challenging. To elucidate these challenges, we provide a thorough complexity analysis for solving the proposed games.
技术网络(如电话和传感器网络、互联网)为现代社会提供了更高的效率,但也使我们暴露在易受攻击的风险之下。减轻这些风险涉及在资源经济受限的情况下设计健壮的网络拓扑。在本研究中,我们从经济角度考虑网络拓扑的脆弱性,并提出安全指标,这是评估我们的解决方案效率所必需的。我们将网络的脆弱性定义为由于战略对手的行动而导致的连接的潜在损失。为了获得漏洞度量,我们重新审视了我们最近引入的网络阻塞博弈模型,该模型为对抗性环境中网络拓扑脆弱性的量化提供了一个框架。我们假设网络运营商同时考虑了安全和经济目标。为了对这些目标建模,我们通过引入运营商的使用成本和预算约束来推广以前的模型。研究了最大成本约束和期望成本约束两种自然约束形式,导出了可行脆弱性/成本区域。由于提议的指标是基于博弈论模型的,因此计算它们可能具有挑战性。为了阐明这些挑战,我们提供了解决提议游戏的彻底的复杂性分析。
{"title":"Network Topology Vulnerability/Cost Trade-Off: Model, Application, and Computational Complexity","authors":"Aron Laszka, A. Gueye","doi":"10.1080/15427951.2015.1018019","DOIUrl":"https://doi.org/10.1080/15427951.2015.1018019","url":null,"abstract":"Abstract Technological networks (e.g., telephone and sensor networks, Internet) have provided modern society with increased efficiency, but have also exposed us to the risks posed by their vulnerability to attacks. Mitigating these risks involves designing robust network topologies in situations where resources are economically constrained. In this study, we consider the vulnerability of network topologies from an economic viewpoint and propose security metrics, which are necessary for assessing the efficiency of our solutions. We define the vulnerability of a network as the potential loss in connectivity due to the actions of a strategic adversary. To derive vulnerability metrics, we revisit our recently introduced network blocking game models, which provide a framework for quantifying network topology vulnerability in adversarial environments. We assume that the network operator takes both security and economic goals into consideration. To model these goals, we generalize previous models by introducing usage costs and budget constraints for the operator. We study two natural constraint formulations, the maximum and the expected cost constraints, and derive the feasible vulnerability/cost region. Because the proposed metrics are based on game-theoretic models, computing them can be challenging. To elucidate these challenges, we provide a thorough complexity analysis for solving the proposed games.","PeriodicalId":38105,"journal":{"name":"Internet Mathematics","volume":"11 1","pages":"588 - 626"},"PeriodicalIF":0.0,"publicationDate":"2015-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/15427951.2015.1018019","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59948129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Solving Local Linear Systems with Boundary Conditions Using Heat Kernel Pagerank 用热核Pagerank求解具有边界条件的局部线性系统
Q3 Mathematics Pub Date : 2015-01-28 DOI: 10.1080/15427951.2015.1009522
F. Graham, O. Simpson
We present an efficient algorithm for solving local linear systems with a boundary condition using the Green’s function of a connected induced subgraph related to the system. We introduce the method of using the Dirichlet heat kernel pagerank1 vector to approximate local solutions to linear systems in the graph Laplacian, satisfying given boundary conditions over a particular subset of vertices. With an efficient algorithm for approximating Dirichlet heat kernel pagerank, our Local Linear Solver algorithm computes an approximate local solution with multiplicative and additive error ε by performing O(ε−5s3log (s3ε−1)log n) random walk steps, where n is the number of vertices in the full graph, and s is the size of the local system on the induced subgraph.
利用与该系统相关的连通诱导子图的格林函数,给出了求解具有边界条件的局部线性系统的有效算法。我们介绍了使用Dirichlet热核pagerank1向量来近似图拉普拉斯线性系统的局部解的方法,在特定的顶点子集上满足给定的边界条件。我们的局部线性解算器算法是一种有效的近似Dirichlet热核pagerank的算法,通过执行O(ε−5s3log (s3ε−1)log n)个随机漫步步来计算一个近似的局部解,其乘性和可加性误差为ε,其中n为完整图中的顶点数,s为诱导子图上局部系统的大小。
{"title":"Solving Local Linear Systems with Boundary Conditions Using Heat Kernel Pagerank","authors":"F. Graham, O. Simpson","doi":"10.1080/15427951.2015.1009522","DOIUrl":"https://doi.org/10.1080/15427951.2015.1009522","url":null,"abstract":"We present an efficient algorithm for solving local linear systems with a boundary condition using the Green’s function of a connected induced subgraph related to the system. We introduce the method of using the Dirichlet heat kernel pagerank1 vector to approximate local solutions to linear systems in the graph Laplacian, satisfying given boundary conditions over a particular subset of vertices. With an efficient algorithm for approximating Dirichlet heat kernel pagerank, our Local Linear Solver algorithm computes an approximate local solution with multiplicative and additive error ε by performing O(ε−5s3log (s3ε−1)log n) random walk steps, where n is the number of vertices in the full graph, and s is the size of the local system on the induced subgraph.","PeriodicalId":38105,"journal":{"name":"Internet Mathematics","volume":"11 1","pages":"449 - 471"},"PeriodicalIF":0.0,"publicationDate":"2015-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/15427951.2015.1009522","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59948223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Cyber Epidemic Models with Dependences 具有依赖关系的网络流行病模型
Q3 Mathematics Pub Date : 2015-01-02 DOI: 10.1080/15427951.2014.902407
Maochao Xu, Gaofeng Da, Shouhuai Xu
Studying models of cyber epidemics over arbitrary complex networks can deepen our understanding of cyber security from a whole-system perspective. In this work, we initiate the investigation of cyber epidemic models that accommodate the dependences between the cyber attack events. Due to the notorious difficulty in dealing with such dependences, essentially all existing cyber epidemic models have disregarded them. Specifically, we introduce the idea of copulas into cyber epidemic models for accommodating the dependences between the cyber attack events. We investigate the epidemic equilibrium thresholds as well as the bounds for both equilibrium and nonequilibrium infection probabilities. We further characterize the side effects of disregarding the due dependences between the cyber attack events by showing that the results thereof are unnecessarily restrictive or even incorrect.
研究任意复杂网络上的网络流行模型可以从整个系统的角度加深我们对网络安全的理解。在这项工作中,我们开始调查网络流行病模型,以适应网络攻击事件之间的依赖关系。由于处理这种依赖关系的难度众所周知,基本上所有现有的网络流行病模型都忽略了它们。具体来说,我们在网络流行病模型中引入了联结的思想,以适应网络攻击事件之间的依赖关系。我们研究了流行病的平衡阈值以及平衡和非平衡感染概率的界限。我们进一步描述了忽视网络攻击事件之间应有的依赖关系的副作用,表明其结果是不必要的限制甚至是不正确的。
{"title":"Cyber Epidemic Models with Dependences","authors":"Maochao Xu, Gaofeng Da, Shouhuai Xu","doi":"10.1080/15427951.2014.902407","DOIUrl":"https://doi.org/10.1080/15427951.2014.902407","url":null,"abstract":"Studying models of cyber epidemics over arbitrary complex networks can deepen our understanding of cyber security from a whole-system perspective. In this work, we initiate the investigation of cyber epidemic models that accommodate the dependences between the cyber attack events. Due to the notorious difficulty in dealing with such dependences, essentially all existing cyber epidemic models have disregarded them. Specifically, we introduce the idea of copulas into cyber epidemic models for accommodating the dependences between the cyber attack events. We investigate the epidemic equilibrium thresholds as well as the bounds for both equilibrium and nonequilibrium infection probabilities. We further characterize the side effects of disregarding the due dependences between the cyber attack events by showing that the results thereof are unnecessarily restrictive or even incorrect.","PeriodicalId":38105,"journal":{"name":"Internet Mathematics","volume":"11 1","pages":"62 - 92"},"PeriodicalIF":0.0,"publicationDate":"2015-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/15427951.2014.902407","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59947563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
A Stochastic Model of Active Cyber Defense Dynamics 主动网络防御动力学的随机模型
Q3 Mathematics Pub Date : 2015-01-02 DOI: 10.1080/15427951.2013.830583
Shouhuai Xu, Wenlian Lu, Hualun Li
The concept of active cyber defense has appeared in the literature in recent years. However, there are no mathematical models for characterizing the effectiveness of active cyber defense. In this paper, we fill the void by proposing a novel Markov process model that is native to the interaction between cyber attack and active cyber defense. Unfortunately, the native Markov process model cannot be tackled by techniques of which we are aware. We therefore simplify, via mean-field approximation, the Markov process model as a dynamical system model that is amenable to analysis. This allows us to derive a set of valuable analytic results that characterize the effectiveness of four types of active cyber defense dynamics. Simulations show that the analytic results are intrinsic to the native Markov process model, and therefore justify the validity of the dynamical system model. We also discuss side effects of the mean-field approximation and their implications.
近年来,网络主动防御的概念出现在文献中。然而,目前还没有数学模型来表征主动网络防御的有效性。在本文中,我们通过提出一种新的马尔可夫过程模型来填补这一空白,该模型是网络攻击和主动网络防御之间交互的原生模型。不幸的是,本地马尔可夫过程模型不能被我们所知道的技术解决。因此,通过平均场近似,我们将马尔可夫过程模型简化为可用于分析的动力系统模型。这使我们能够得出一组有价值的分析结果,这些结果表征了四种主动网络防御动态的有效性。仿真结果表明,解析结果是固有的马尔可夫过程模型,从而证明了动力系统模型的有效性。我们还讨论了平均场近似的副作用及其含义。
{"title":"A Stochastic Model of Active Cyber Defense Dynamics","authors":"Shouhuai Xu, Wenlian Lu, Hualun Li","doi":"10.1080/15427951.2013.830583","DOIUrl":"https://doi.org/10.1080/15427951.2013.830583","url":null,"abstract":"The concept of active cyber defense has appeared in the literature in recent years. However, there are no mathematical models for characterizing the effectiveness of active cyber defense. In this paper, we fill the void by proposing a novel Markov process model that is native to the interaction between cyber attack and active cyber defense. Unfortunately, the native Markov process model cannot be tackled by techniques of which we are aware. We therefore simplify, via mean-field approximation, the Markov process model as a dynamical system model that is amenable to analysis. This allows us to derive a set of valuable analytic results that characterize the effectiveness of four types of active cyber defense dynamics. Simulations show that the analytic results are intrinsic to the native Markov process model, and therefore justify the validity of the dynamical system model. We also discuss side effects of the mean-field approximation and their implications.","PeriodicalId":38105,"journal":{"name":"Internet Mathematics","volume":"11 1","pages":"23 - 61"},"PeriodicalIF":0.0,"publicationDate":"2015-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/15427951.2013.830583","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59947679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Efficient computation of the Weighted Clustering Coefficient 加权聚类系数的高效计算
Q3 Mathematics Pub Date : 2014-12-17 DOI: 10.1080/15427951.2016.1198281
Silvio Lattanzi, S. Leonardi
Abstract The clustering coefficient of an unweighted network has been extensively used to quantify how tightly connected is the neighbor around a node and it has been widely adopted for assessing the quality of nodes in a social network. The computation of the clustering coefficient is challenging since it requires to count the number of triangles in the graph. Several recent works proposed efficient sampling, streaming and MapReduce algorithms that allow to overcome this computational bottleneck. As a matter of fact, the intensity of the interaction between nodes, that is usually represented with weights on the edges of the graph, is also an important measure of the statistical cohesiveness of a network. Recently various notions of weighted clustering coefficient have been proposed but all those techniques are hard to implement on large-scale graphs. In this work we show how standard sampling techniques can be used to obtain efficient estimators for the most commonly used measures of weighted clustering coefficient. Furthermore we also propose a novel graph-theoretic notion of clustering coefficient in weighted networks.
摘要:非加权网络的聚类系数被广泛用于量化节点周围邻居的连接紧密程度,并被广泛用于评估社会网络中节点的质量。聚类系数的计算具有挑战性,因为它需要计算图中三角形的数量。最近的一些研究提出了有效的采样、流和MapReduce算法来克服这一计算瓶颈。事实上,节点间交互的强度,通常用图边的权重表示,也是衡量网络统计内聚性的重要指标。近年来,人们提出了各种加权聚类系数的概念,但这些技术都难以在大规模图上实现。在这项工作中,我们展示了如何使用标准抽样技术来获得最常用的加权聚类系数度量的有效估计。此外,我们还提出了加权网络中聚类系数的一个新的图论概念。
{"title":"Efficient computation of the Weighted Clustering Coefficient","authors":"Silvio Lattanzi, S. Leonardi","doi":"10.1080/15427951.2016.1198281","DOIUrl":"https://doi.org/10.1080/15427951.2016.1198281","url":null,"abstract":"Abstract The clustering coefficient of an unweighted network has been extensively used to quantify how tightly connected is the neighbor around a node and it has been widely adopted for assessing the quality of nodes in a social network. The computation of the clustering coefficient is challenging since it requires to count the number of triangles in the graph. Several recent works proposed efficient sampling, streaming and MapReduce algorithms that allow to overcome this computational bottleneck. As a matter of fact, the intensity of the interaction between nodes, that is usually represented with weights on the edges of the graph, is also an important measure of the statistical cohesiveness of a network. Recently various notions of weighted clustering coefficient have been proposed but all those techniques are hard to implement on large-scale graphs. In this work we show how standard sampling techniques can be used to obtain efficient estimators for the most commonly used measures of weighted clustering coefficient. Furthermore we also propose a novel graph-theoretic notion of clustering coefficient in weighted networks.","PeriodicalId":38105,"journal":{"name":"Internet Mathematics","volume":"12 1","pages":"381 - 401"},"PeriodicalIF":0.0,"publicationDate":"2014-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/15427951.2016.1198281","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59948615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Player Diffusion Games on Graph Classes 图类上的多玩家扩散博弈
Q3 Mathematics Pub Date : 2014-12-08 DOI: 10.1080/15427951.2016.1197167
L. Bulteau, Vincent Froese, Nimrod Talmon
Abstract We study competitive diffusion games on graphs introduced by Alon et al. [1] to model the spread of influence in social networks. Extending results of Roshanbin [8] for two players, we investigate the existence of pure Nash equilibriafor at least three players on different classes of graphs including paths, cycles, grid graphs and hypercubes; as a main contribution, we answer an open question proving that there is no Nash equilibriumfor three players on m × n grids with min {m, n} ≥ 5. Further, extending results of Etesami and Basar [3] for two players, we prove the existence of pure Nash equilibriafor four players on every d-dimensional hypercube.
本文研究了Alon等人引入的图上的竞争扩散博弈,以模拟社交网络中影响力的传播。推广Roshanbin[8]关于两参与者的结果,研究了至少三个参与者在不同类型的图(包括路径、循环、网格图和超立方体)上的纯纳什均衡的存在性;作为主要贡献,我们回答了一个开放的问题,证明了在m × n个网格上,当min {m, n}≥5时,三个参与者不存在纳什均衡。进一步推广了Etesami和Basar[3]关于两参与人的结果,证明了在每个d维超立方体上4参与人的纯纳什均衡的存在性。
{"title":"Multi-Player Diffusion Games on Graph Classes","authors":"L. Bulteau, Vincent Froese, Nimrod Talmon","doi":"10.1080/15427951.2016.1197167","DOIUrl":"https://doi.org/10.1080/15427951.2016.1197167","url":null,"abstract":"Abstract We study competitive diffusion games on graphs introduced by Alon et al. [1] to model the spread of influence in social networks. Extending results of Roshanbin [8] for two players, we investigate the existence of pure Nash equilibriafor at least three players on different classes of graphs including paths, cycles, grid graphs and hypercubes; as a main contribution, we answer an open question proving that there is no Nash equilibriumfor three players on m × n grids with min {m, n} ≥ 5. Further, extending results of Etesami and Basar [3] for two players, we prove the existence of pure Nash equilibriafor four players on every d-dimensional hypercube.","PeriodicalId":38105,"journal":{"name":"Internet Mathematics","volume":"112 1","pages":"363 - 380"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/15427951.2016.1197167","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59948544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Fast Algorithms for the Maximum Clique Problem on Massive Graphs with Applications to Overlapping Community Detection 海量图上最大团问题的快速算法及其在重叠社区检测中的应用
Q3 Mathematics Pub Date : 2014-11-26 DOI: 10.1080/15427951.2014.986778
B. Pattabiraman, Md. Mostofa Ali Patwary, A. Gebremedhin, W. Liao, A. Choudhary
The maximum clique problem is a well-known NP-hard problem with applications in data mining, network analysis, information retrieval, and many other areas related to the World Wide Web. There exist several algorithms for the problem, with acceptable runtimes for certain classes of graphs, but many of them are infeasible for massive graphs. We present a new exact algorithm that employs novel pruning techniques and is able to find maximum cliques in very large, sparse graphs quickly. Extensive experiments on different kinds of synthetic and real-world graphs show that our new algorithm can be orders of magnitude faster than existing algorithms. We also present a heuristic that runs orders of magnitude faster than the exact algorithm while providing optimal or near-optimal solutions. We illustrate a simple application of the algorithms in developing methods for detection of overlapping communities in networks.
最大团问题是一个众所周知的np困难问题,在数据挖掘、网络分析、信息检索以及与万维网相关的许多其他领域都有应用。有几种算法可以解决这个问题,它们对于某些类型的图具有可接受的运行时间,但其中许多算法对于大规模图是不可行的。我们提出了一种新的精确算法,该算法采用了新颖的修剪技术,能够快速地在非常大的稀疏图中找到最大的团。在不同种类的合成图和真实世界的图上进行的大量实验表明,我们的新算法可以比现有算法快几个数量级。我们还提出了一种启发式算法,它的运行速度比精确算法快几个数量级,同时提供了最优或接近最优的解决方案。我们举例说明了算法在开发网络中重叠社区检测方法中的一个简单应用。
{"title":"Fast Algorithms for the Maximum Clique Problem on Massive Graphs with Applications to Overlapping Community Detection","authors":"B. Pattabiraman, Md. Mostofa Ali Patwary, A. Gebremedhin, W. Liao, A. Choudhary","doi":"10.1080/15427951.2014.986778","DOIUrl":"https://doi.org/10.1080/15427951.2014.986778","url":null,"abstract":"The maximum clique problem is a well-known NP-hard problem with applications in data mining, network analysis, information retrieval, and many other areas related to the World Wide Web. There exist several algorithms for the problem, with acceptable runtimes for certain classes of graphs, but many of them are infeasible for massive graphs. We present a new exact algorithm that employs novel pruning techniques and is able to find maximum cliques in very large, sparse graphs quickly. Extensive experiments on different kinds of synthetic and real-world graphs show that our new algorithm can be orders of magnitude faster than existing algorithms. We also present a heuristic that runs orders of magnitude faster than the exact algorithm while providing optimal or near-optimal solutions. We illustrate a simple application of the algorithms in developing methods for detection of overlapping communities in networks.","PeriodicalId":38105,"journal":{"name":"Internet Mathematics","volume":"11 1","pages":"421 - 448"},"PeriodicalIF":0.0,"publicationDate":"2014-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/15427951.2014.986778","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59948176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Exploiting The Structure of Bipartite Graphs for Algebraic and Spectral Graph Theory Applications 二部图的结构在代数和谱图理论中的应用
Q3 Mathematics Pub Date : 2014-11-19 DOI: 10.1080/15427951.2014.958250
Jérôme Kunegis
Abstract In this article, we extend several algebraic graph analysis methods to bipartite networks. In various areas of science, engineering, and commerce, many types of information can be represented as networks, and thus, the discipline of network analysis plays an important role in these domains. A powerful and widespread class of network analysis methods is based on algebraic graph theory, i.e., representing graphs as square adjacency matrices. However, many networks are of a very specific form that clashes with that representation: they are bipartite. That is, they consist of two node types, with each edge connecting a node of one type with a node of the other type. Examples of bipartite networks (also called two-mode networks) are persons and the social groups they belong to, musical artists and the musical genres they play, and text documents and the words they contain. In fact, any type of feature that can be represented by a categorical variable can be interpreted as a bipartite network. Although bipartite networks are widespread, most literature in the area of network analysis focuses on unipartite networks, i.e., those networks with only a single type of node. The purpose of this article is to extend a selection of important algebraic network analysis methods to bipartite networks, showing that many methods from algebraic graph theory can be applied to bipartite networks, with only minor modifications. We show methods for clustering, visualization, and link prediction. Additionally, we introduce new algebraic methods for measuring the bipartivity in near-bipartite graphs.
摘要本文将几种代数图分析方法推广到二部网络。在科学、工程和商业的各个领域中,许多类型的信息可以表示为网络,因此,网络分析学科在这些领域中起着重要作用。一类强大而广泛的网络分析方法是基于代数图论,即,将图表示为方形邻接矩阵。然而,许多网络具有一种非常特殊的形式,与这种表示相冲突:它们是二分的。也就是说,它们由两种节点类型组成,每条边连接一种类型的节点和另一种类型的节点。双部网络(也称为双模式网络)的例子包括人和他们所属的社会群体,音乐艺术家和他们演奏的音乐类型,以及文本文件和它们包含的单词。事实上,任何可以用分类变量表示的特征都可以被解释为二部网络。虽然二部网络很普遍,但网络分析领域的大多数文献都集中在单部网络上,即那些只有单一类型节点的网络。本文的目的是将一些重要的代数网络分析方法扩展到二部网络,表明代数图论中的许多方法可以应用于二部网络,只需要进行微小的修改。我们展示了聚类、可视化和链接预测的方法。此外,我们引入了新的代数方法来测量近二部图的二部分性。
{"title":"Exploiting The Structure of Bipartite Graphs for Algebraic and Spectral Graph Theory Applications","authors":"Jérôme Kunegis","doi":"10.1080/15427951.2014.958250","DOIUrl":"https://doi.org/10.1080/15427951.2014.958250","url":null,"abstract":"Abstract In this article, we extend several algebraic graph analysis methods to bipartite networks. In various areas of science, engineering, and commerce, many types of information can be represented as networks, and thus, the discipline of network analysis plays an important role in these domains. A powerful and widespread class of network analysis methods is based on algebraic graph theory, i.e., representing graphs as square adjacency matrices. However, many networks are of a very specific form that clashes with that representation: they are bipartite. That is, they consist of two node types, with each edge connecting a node of one type with a node of the other type. Examples of bipartite networks (also called two-mode networks) are persons and the social groups they belong to, musical artists and the musical genres they play, and text documents and the words they contain. In fact, any type of feature that can be represented by a categorical variable can be interpreted as a bipartite network. Although bipartite networks are widespread, most literature in the area of network analysis focuses on unipartite networks, i.e., those networks with only a single type of node. The purpose of this article is to extend a selection of important algebraic network analysis methods to bipartite networks, showing that many methods from algebraic graph theory can be applied to bipartite networks, with only minor modifications. We show methods for clustering, visualization, and link prediction. Additionally, we introduce new algebraic methods for measuring the bipartivity in near-bipartite graphs.","PeriodicalId":38105,"journal":{"name":"Internet Mathematics","volume":"11 1","pages":"201 - 321"},"PeriodicalIF":0.0,"publicationDate":"2014-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/15427951.2014.958250","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59947809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
Internet Mathematics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1