首页 > 最新文献

Internet Mathematics最新文献

英文 中文
Tree decompositions and social graphs 树分解和社会图谱
Q3 Mathematics Pub Date : 2014-11-06 DOI: 10.1080/15427951.2016.1182952
Aaron B. Adcock, Blair D. Sullivan, Michael W. Mahoney
Abstract Recent work has established that large informatics graphs such as social and information networks have non-trivial tree-like structure when viewed at moderate size scales. Here, we present results from the first detailed empirical evaluation of the use of tree decomposition (TD) heuristics for structure identification and extraction in social graphs. Although TDs have historically been used in structural graph theory and scientific computing, we show that—even with existing TD heuristics developed for those very different areas—TD methods can identify interesting structure in a wide range of realistic informatics graphs. Our main contributions are the following: we show that TD methods can identify structures that correlate strongly with the core-periphery structure of realistic networks, even when using simple greedy heuristics; we show that the peripheral bags of these TDs correlate well with low-conductance communities (when they exist) found using local spectral computations; and we show that several types of large-scale “ground-truth” communities, defined by demographic metadata on the nodes of the network, are well-localized in the large-scale and/or peripheral structures of the TDs. Our other main contributions are the following: we provide detailed empirical results for TD heuristics on toy and synthetic networks to establish a baseline to understand better the behavior of the heuristics on more complex real-world networks; and we prove a theorem providing formal justification for the intuition that the only two impediments to low-distortion hyperbolic embedding are high tree-width and long geodesic cycles. Our results suggest future directions for improved TD heuristics that are more appropriate for realistic social graphs.
最近的研究表明,在中等规模的尺度上,社会和信息网络等大型信息学图具有非平凡的树状结构。在这里,我们提出了使用树分解(TD)启发式在社会图谱中进行结构识别和提取的首次详细实证评估的结果。尽管TD在历史上一直用于结构图理论和科学计算,但我们表明,即使使用为这些非常不同的领域开发的现有TD启发式方法,TD方法也可以在广泛的现实信息学图中识别有趣的结构。我们的主要贡献如下:我们表明,即使使用简单的贪婪启发式,TD方法也可以识别与现实网络的核心-外围结构密切相关的结构;我们表明,这些td的外围袋与使用局部光谱计算发现的低电导群落(当它们存在时)相关良好;我们表明,由网络节点上的人口统计元数据定义的几种类型的大规模“地面真相”社区,在td的大规模和/或外围结构中被很好地定位。我们的其他主要贡献如下:我们为玩具和合成网络上的TD启发式提供了详细的实证结果,以建立基线,以便更好地理解启发式在更复杂的现实世界网络上的行为;并且我们证明了一个定理,为低失真双曲嵌入的唯一两个障碍是高树宽和长测地线周期的直觉提供了形式化的证明。我们的研究结果为改进的TD启发式提出了未来的方向,使其更适合于现实的社交图。
{"title":"Tree decompositions and social graphs","authors":"Aaron B. Adcock, Blair D. Sullivan, Michael W. Mahoney","doi":"10.1080/15427951.2016.1182952","DOIUrl":"https://doi.org/10.1080/15427951.2016.1182952","url":null,"abstract":"Abstract Recent work has established that large informatics graphs such as social and information networks have non-trivial tree-like structure when viewed at moderate size scales. Here, we present results from the first detailed empirical evaluation of the use of tree decomposition (TD) heuristics for structure identification and extraction in social graphs. Although TDs have historically been used in structural graph theory and scientific computing, we show that—even with existing TD heuristics developed for those very different areas—TD methods can identify interesting structure in a wide range of realistic informatics graphs. Our main contributions are the following: we show that TD methods can identify structures that correlate strongly with the core-periphery structure of realistic networks, even when using simple greedy heuristics; we show that the peripheral bags of these TDs correlate well with low-conductance communities (when they exist) found using local spectral computations; and we show that several types of large-scale “ground-truth” communities, defined by demographic metadata on the nodes of the network, are well-localized in the large-scale and/or peripheral structures of the TDs. Our other main contributions are the following: we provide detailed empirical results for TD heuristics on toy and synthetic networks to establish a baseline to understand better the behavior of the heuristics on more complex real-world networks; and we prove a theorem providing formal justification for the intuition that the only two impediments to low-distortion hyperbolic embedding are high tree-width and long geodesic cycles. Our results suggest future directions for improved TD heuristics that are more appropriate for realistic social graphs.","PeriodicalId":38105,"journal":{"name":"Internet Mathematics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/15427951.2016.1182952","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59948158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Asymptotic degree distribution of a duplication-deletion random graph model 重复-删除随机图模型的渐近度分布
Q3 Mathematics Pub Date : 2014-08-19 DOI: 10.1080/15427951.2015.1009523
Erik Thornblad
We study a discrete–time duplication–deletion random graph model and analyse its asymptotic degree distribution. The random graphs consists of disjoint cliques. In each time step either a new vertex is brought in with probability 0 < p < 1 and attached to an existing clique, chosen with probability proportional to the clique size, or all the edges of a random vertex are deleted with probability 1 − p. We prove almost sure convergence of the asymptotic degree distribution and find its exact values in terms of a hypergeometric integral, expressed in terms of the parameter p. In the regime 0 < p < 1 2 we show that the degree sequence decays exponentially at rate p 1−p , whereas it satisfies a power–law with exponent p 2p−1 if 1 2 < p < 1. At the threshold p = 1 2 the degree sequence lies between a power–law and exponential decay.
研究了一种离散时间重复删除随机图模型,并分析了其渐近度分布。随机图由不相交的团组成。在每个时间步中,要么以概率0 < p < 1的方式引入一个新的顶点,并以与团大小成比例的概率选择一个新的团,要么以概率1−p的方式删除一个随机顶点的所有边。我们证明了渐近度分布的几乎肯定收敛性,并找到了它在超几何积分中的精确值。在区间0 < p < 1 2中,我们证明了度序列以p 1−p的速率呈指数衰减,而当1 2 < p < 1时,它满足指数为p 2p−1的幂律。在阈值p = 12时,度序列位于幂律和指数衰减之间。
{"title":"Asymptotic degree distribution of a duplication-deletion random graph model","authors":"Erik Thornblad","doi":"10.1080/15427951.2015.1009523","DOIUrl":"https://doi.org/10.1080/15427951.2015.1009523","url":null,"abstract":"We study a discrete–time duplication–deletion random graph model and analyse its asymptotic degree distribution. The random graphs consists of disjoint cliques. In each time step either a new vertex is brought in with probability 0 < p < 1 and attached to an existing clique, chosen with probability proportional to the clique size, or all the edges of a random vertex are deleted with probability 1 − p. We prove almost sure convergence of the asymptotic degree distribution and find its exact values in terms of a hypergeometric integral, expressed in terms of the parameter p. In the regime 0 < p < 1 2 we show that the degree sequence decays exponentially at rate p 1−p , whereas it satisfies a power–law with exponent p 2p−1 if 1 2 < p < 1. At the threshold p = 1 2 the degree sequence lies between a power–law and exponential decay.","PeriodicalId":38105,"journal":{"name":"Internet Mathematics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/15427951.2015.1009523","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59948233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
The Degree Distribution and the Number of Edges Between Nodes of given Degrees in Directed Scale-Free Graphs 有向无标度图中给定度节点间的度分布和边数
Q3 Mathematics Pub Date : 2014-08-11 DOI: 10.1080/15427951.2015.1012609
E. Grechnikov
In this article, we introduce our study of some important statistics of the random graph in the directed preferential attachment model introduced by B. Bollobás, C. Borgs, J. Chayes, and O. Riordan. First, we find a new asymptotic formula for the expectation of the number nin(t, d) of nodes of a given in-degree d in a graph in this model with t edges, which covers all possible degrees. The out-degree distribution in the model is symmetrical to the in-degree distribution. Then we prove tight concentration for nin(t, d) while d grows up to the moment when nin(t, d) decreases to ln 2t; if d grows even faster, nin(t, d) is zero whp. Furthermore, we study an average number of edges from a vertex of out-degree d1 to a vertex of in-degree d2. In particular, we prove that it grows proportionally to d1d2/t if and to something between and if , tending to the first expression when d1 is small compared to d2 and to the second one when d1 is large; is such that the main term of nin(t, d) is proportional to , is symmetrical for out-degrees. We also give exact formulas for intermediate cases.
本文介绍了B. Bollobás、C. Borgs、J. Chayes和O. Riordan等人提出的定向优先依恋模型中随机图的一些重要统计量的研究。首先,我们找到了一个新的渐近公式,用于该模型中具有t条边的图中给定的in度d的节点数nin(t, d)的期望,该模型涵盖了所有可能的度。模型的出度分布与入度分布是对称的。然后证明了随着d的增大,nin(t, d)的浓度较紧,直至nin(t, d)减小到ln 2t;如果d增长得更快,n(t, d)等于0 whp。进一步地,我们研究了从出次为d1的顶点到入次为d2的顶点的平均边数。特别地,我们证明了它与d1 /t成比例地增长,当d1比d2小时趋向于第一个表达式当d1比d2大时趋向于第二个表达式;使得nin(t, d)的主项正比于,对于外度是对称的。我们也给出了中间情况的精确公式。
{"title":"The Degree Distribution and the Number of Edges Between Nodes of given Degrees in Directed Scale-Free Graphs","authors":"E. Grechnikov","doi":"10.1080/15427951.2015.1012609","DOIUrl":"https://doi.org/10.1080/15427951.2015.1012609","url":null,"abstract":"In this article, we introduce our study of some important statistics of the random graph in the directed preferential attachment model introduced by B. Bollobás, C. Borgs, J. Chayes, and O. Riordan. First, we find a new asymptotic formula for the expectation of the number nin(t, d) of nodes of a given in-degree d in a graph in this model with t edges, which covers all possible degrees. The out-degree distribution in the model is symmetrical to the in-degree distribution. Then we prove tight concentration for nin(t, d) while d grows up to the moment when nin(t, d) decreases to ln 2t; if d grows even faster, nin(t, d) is zero whp. Furthermore, we study an average number of edges from a vertex of out-degree d1 to a vertex of in-degree d2. In particular, we prove that it grows proportionally to d1d2/t if and to something between and if , tending to the first expression when d1 is small compared to d2 and to the second one when d1 is large; is such that the main term of nin(t, d) is proportional to , is symmetrical for out-degrees. We also give exact formulas for intermediate cases.","PeriodicalId":38105,"journal":{"name":"Internet Mathematics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/15427951.2015.1012609","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59948282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Degree-Degree Dependencies in Random Graphs with Heavy-Tailed Degrees 重尾度随机图中的度-度依赖关系
Q3 Mathematics Pub Date : 2014-07-03 DOI: 10.1080/15427951.2013.850455
R. Hofstad, N. Litvak
Abstract Mixing patterns in large self-organizing networks, such as the Internet, the World Wide Web, social, and biological networks are often characterized by degree-degree dependencies between neighboring nodes. In assortative networks, the degree-degree dependencies are positive (nodes with similar degrees tend to connect to each other), whereas in disassortative networks, these dependencies are negative. One of the problems with the commonly used Pearson correlation coefficient, also known as the assortativity coefficient, is that its magnitude decreases with the network size in disassortative networks. This makes it impossible to compare mixing patterns, for example, in two web crawls of different sizes. As an alternative, we have recently suggested to use rank correlation measures, such as Spearman’s rho. Numerical experiments have confirmed that Spearman’s rho produces consistent values in graphs of different sizes but similar structure, and it is able to reveal strong (positive or negative) dependencies in large graphs. In this study we analytically investigate degree-degree dependencies for scale-free graph sequences. In order to demonstrate the ill behavior of the Pearson’s correlation coefficient, we first study a simple model of two heavy-tailed, highly correlated, random variables X and Y, and show that the sample correlation coefficient converges in distribution either to a proper random variable on [ − 1, 1], or to zero, and the limit is nonnegative a.s. if X, Y ≥ 0. We next adapt these results to the degree-degree dependencies in networks as described by the Pearson correlation coefficient, and show that it is nonnegative in the large graph limit when the asymptotic degree distribution has an infinite third moment. Furthermore, we provide examples where in the Pearson’s correlation coefficient converges to zero in a network with strong negative degree-degree dependencies, and another example where this coefficient converges in distribution to a random variable. We suggest an alternative degree-degree dependency measure, based on Spearman’s rho, and prove that this statistical estimator converges to an appropriate limit under quite general conditions. These conditions are proved to be satisfied in common network models, such as the configuration model and the preferential attachment model. We conclude that rank correlations provide a suitable and informative method for uncovering network mixing patterns.
大型自组织网络(如Internet、万维网、社交网络和生物网络)中的混合模式通常以相邻节点之间的程度依赖为特征。在分类网络中,度-度依赖关系是正的(具有相似度的节点倾向于相互连接),而在非分类网络中,这些依赖关系是负的。常用的Pearson相关系数(也称为选型系数)的问题之一是,在非选型网络中,其大小随着网络规模的增大而减小。这使得比较混合模式变得不可能,例如,在两个不同大小的网络爬虫中。作为替代方案,我们最近建议使用等级相关度量,如斯皮尔曼的rho。数值实验已经证实,Spearman的rho在不同大小但结构相似的图中产生一致的值,并且能够在大型图中显示出强烈的(正或负)依赖性。本文对无标度图序列的度依赖关系进行了分析研究。为了证明皮尔逊相关系数的不良行为,我们首先研究了两个重尾、高度相关的随机变量X和Y的简单模型,并证明了样本相关系数在分布上收敛于[- 1,1]上的一个适当的随机变量,或者收敛于零,并且当X, Y≥0时,极限是非负的。接下来,我们将这些结果应用于皮尔逊相关系数所描述的网络中的度-度依赖关系,并表明当渐近度分布具有无限个第三矩时,它在大图极限中是非负的。此外,我们还提供了在具有强负度依赖关系的网络中Pearson相关系数收敛于零的示例,以及该系数在分布中收敛于随机变量的另一个示例。我们提出了一种基于Spearman 's rho的度-度依赖度量,并证明了该统计估计量在相当一般的条件下收敛到适当的极限。在一般的网络模型中,如配置模型和优先依恋模型,证明了这些条件都是满足的。我们得出结论,等级关联为揭示网络混合模式提供了一种合适且信息丰富的方法。
{"title":"Degree-Degree Dependencies in Random Graphs with Heavy-Tailed Degrees","authors":"R. Hofstad, N. Litvak","doi":"10.1080/15427951.2013.850455","DOIUrl":"https://doi.org/10.1080/15427951.2013.850455","url":null,"abstract":"Abstract Mixing patterns in large self-organizing networks, such as the Internet, the World Wide Web, social, and biological networks are often characterized by degree-degree dependencies between neighboring nodes. In assortative networks, the degree-degree dependencies are positive (nodes with similar degrees tend to connect to each other), whereas in disassortative networks, these dependencies are negative. One of the problems with the commonly used Pearson correlation coefficient, also known as the assortativity coefficient, is that its magnitude decreases with the network size in disassortative networks. This makes it impossible to compare mixing patterns, for example, in two web crawls of different sizes. As an alternative, we have recently suggested to use rank correlation measures, such as Spearman’s rho. Numerical experiments have confirmed that Spearman’s rho produces consistent values in graphs of different sizes but similar structure, and it is able to reveal strong (positive or negative) dependencies in large graphs. In this study we analytically investigate degree-degree dependencies for scale-free graph sequences. In order to demonstrate the ill behavior of the Pearson’s correlation coefficient, we first study a simple model of two heavy-tailed, highly correlated, random variables X and Y, and show that the sample correlation coefficient converges in distribution either to a proper random variable on [ − 1, 1], or to zero, and the limit is nonnegative a.s. if X, Y ≥ 0. We next adapt these results to the degree-degree dependencies in networks as described by the Pearson correlation coefficient, and show that it is nonnegative in the large graph limit when the asymptotic degree distribution has an infinite third moment. Furthermore, we provide examples where in the Pearson’s correlation coefficient converges to zero in a network with strong negative degree-degree dependencies, and another example where this coefficient converges in distribution to a random variable. We suggest an alternative degree-degree dependency measure, based on Spearman’s rho, and prove that this statistical estimator converges to an appropriate limit under quite general conditions. These conditions are proved to be satisfied in common network models, such as the configuration model and the preferential attachment model. We conclude that rank correlations provide a suitable and informative method for uncovering network mixing patterns.","PeriodicalId":38105,"journal":{"name":"Internet Mathematics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/15427951.2013.850455","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59947792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Editorial Board EOV 编辑委员会EOV
Q3 Mathematics Pub Date : 2014-07-03 DOI: 10.1080/15427951.2014.959421
{"title":"Editorial Board EOV","authors":"","doi":"10.1080/15427951.2014.959421","DOIUrl":"https://doi.org/10.1080/15427951.2014.959421","url":null,"abstract":"","PeriodicalId":38105,"journal":{"name":"Internet Mathematics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/15427951.2014.959421","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59947823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special Issue on Searching and Mining the Web and Social Networks 关于搜索和挖掘网络和社会网络的特刊
Q3 Mathematics Pub Date : 2014-07-03 DOI: 10.1080/15427951.2014.916132
N. Litvak, S. Vigna
The past few decades have seen the rise of online social networks as a worldwide phenomenon with a high impact on our society. Beyond the obvious exposure phenomena, with obvious implications on security and privacy, people have started to become acquainted—even married!—in online social networks. In parallel, we have seen an enormous growth in terms of the number of published articles in computer science, mathematics and physics that study the organization of such networks. The availability of large free databases of friendships, collaborations and citations have made possible to study social networks at a scale and with a precision previously unknown. This issue of Internet Mathematics, titled “Searching and Mining the Web and Social Networks,” was born out of the interest of the editors in the problem of searching and analyzing not only the web, but also social networks in a broad sense. In particular, we aimed to publish a collection of articles that take a rigorous mathematical viewpoint on problems most important and common in network applications. The general topics represented in this special issue cover ranking of the nodes, network measurements, and adversarial behavior. Each of these topics has received a large attention in the literature. We believe however that the originality of the articles presented in this volume is in a high level of mathematical rigor.
在过去的几十年里,在线社交网络的兴起已经成为一种全球性的现象,对我们的社会产生了很大的影响。除了明显的暴露现象,以及对安全和隐私的明显影响之外,人们已经开始认识——甚至结婚了!——在线社交网络。与此同时,我们也看到在计算机科学、数学和物理学领域发表的研究这种网络组织的文章数量有了巨大的增长。友谊、合作和引文的大型免费数据库的可用性,使得以前所未有的规模和精度研究社交网络成为可能。这一期《互联网数学》的标题是“搜索和挖掘网络和社交网络”,它的诞生是出于编辑们对搜索和分析网络以及广义上的社交网络问题的兴趣。特别是,我们的目标是发表一系列文章,这些文章对网络应用中最重要和最常见的问题采取严格的数学观点。本期特刊的主题包括节点排名、网络测量和对抗行为。这些主题在文献中都得到了广泛的关注。然而,我们相信,在本卷提出的文章的原创性是在高水平的数学严谨性。
{"title":"Special Issue on Searching and Mining the Web and Social Networks","authors":"N. Litvak, S. Vigna","doi":"10.1080/15427951.2014.916132","DOIUrl":"https://doi.org/10.1080/15427951.2014.916132","url":null,"abstract":"The past few decades have seen the rise of online social networks as a worldwide phenomenon with a high impact on our society. Beyond the obvious exposure phenomena, with obvious implications on security and privacy, people have started to become acquainted—even married!—in online social networks. In parallel, we have seen an enormous growth in terms of the number of published articles in computer science, mathematics and physics that study the organization of such networks. The availability of large free databases of friendships, collaborations and citations have made possible to study social networks at a scale and with a precision previously unknown. \u0000This issue of Internet Mathematics, titled “Searching and Mining the Web and Social Networks,” was born out of the interest of the editors in the problem of searching and analyzing not only the web, but also social networks in a broad sense. In particular, we aimed to publish a collection of articles that take a rigorous mathematical viewpoint on problems most important and common in network applications. The general topics represented in this special issue cover ranking of the nodes, network measurements, and adversarial behavior. Each of these topics has received a large attention in the literature. We believe however that the originality of the articles presented in this volume is in a high level of mathematical rigor.","PeriodicalId":38105,"journal":{"name":"Internet Mathematics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/15427951.2014.916132","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59947662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding Safe Strategies for Competitive Diffusion on Trees 寻找树上竞争扩散的安全策略
Q3 Mathematics Pub Date : 2014-04-21 DOI: 10.1080/15427951.2014.977407
J. Janssen, Celeste Vautour
Abstract We study the two-player safe game of Competitive Diffusion, a game-theoretic model for the diffusion of technologies or influence through a social network. In game theory, safe strategies are mixed strategies with a minimum expected gain against unknown strategies of the opponents. Safe strategies for competitive diffusion lead to maximum spread of influence in the presence of uncertainty about the other players. We study the safe game on two specific classes of trees, spiders and complete trees, and give tight bounds on the minimum expected gain. We then use these results to give an algorithm that suggests a safe strategy for a player on any tree. We test this algorithm on randomly generated trees and show that it finds strategies that are close to optimal.
摘要本文研究了竞争扩散的二人安全博弈,这是一个研究技术或影响通过社会网络扩散的博弈论模型。在博弈论中,安全策略是具有最小预期收益的混合策略,以对抗对手的未知策略。竞争扩散的安全策略导致在其他参与者存在不确定性的情况下最大限度地扩大影响力。研究了蜘蛛树和完全树两类树的安全对策,给出了最小期望收益的紧界。然后,我们使用这些结果给出一个算法,为任何一棵树上的玩家提供一个安全策略。我们在随机生成的树上测试了这个算法,并表明它找到了接近最优的策略。
{"title":"Finding Safe Strategies for Competitive Diffusion on Trees","authors":"J. Janssen, Celeste Vautour","doi":"10.1080/15427951.2014.977407","DOIUrl":"https://doi.org/10.1080/15427951.2014.977407","url":null,"abstract":"Abstract We study the two-player safe game of Competitive Diffusion, a game-theoretic model for the diffusion of technologies or influence through a social network. In game theory, safe strategies are mixed strategies with a minimum expected gain against unknown strategies of the opponents. Safe strategies for competitive diffusion lead to maximum spread of influence in the presence of uncertainty about the other players. We study the safe game on two specific classes of trees, spiders and complete trees, and give tight bounds on the minimum expected gain. We then use these results to give an algorithm that suggests a safe strategy for a player on any tree. We test this algorithm on randomly generated trees and show that it finds strategies that are close to optimal.","PeriodicalId":38105,"journal":{"name":"Internet Mathematics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/15427951.2014.977407","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59947512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Classification Power of Web Features Web特性的分类能力
Q3 Mathematics Pub Date : 2014-04-18 DOI: 10.1080/15427951.2013.850456
M. Erdélyi, A. Benczúr, B. Daróczy, A. Garzó, Tamás Kiss, Dávid Siklósi
Abstract In this article we give a comprehensive overview of features devised for web spam detection and investigate how much various classes, some requiring very high computational effort, add to the classification accuracy. We collect and handle a large number of features based on recent advances in web spam filtering, including temporal ones; in particular, we analyze the strength and sensitivity of linkage change. We propose new, temporal link-similarity-based features and show how to compute them efficiently on large graphs. We show that machine learning techniques, including ensemble selection, LogitBoost, and random forest significantly improve accuracy. We conclude that, with appropriate learning techniques, a simple and computationally inexpensive feature subset outperforms all previous results published so far on our dataset and can be further improved only slightly by computationally expensive features. We test our method on three major publicly available datasets: the Web Spam Challenge 2008 dataset WEBSPAM-UK2007, the ECML/PKDD Discovery Challenge dataset DC2010, and the Waterloo Spam Rankings for ClueWeb09. Our classifier ensemble sets the strongest classification benchmark compared to participants of the Web Spam and ECML/PKDD Discovery Challenges as well as the TREC Web track. To foster research in the area, we make several feature sets and source codes public,1 https://datamining.sztaki.hu/en/download/web-spam-resources including the temporal features of eight .uk crawl snapshots that include WEBSPAM-UK2007 as well as the Web Spam Challenge features for the labeled part of ClueWeb09.
在这篇文章中,我们给出了一个全面的概述为网络垃圾邮件检测设计的特征,并研究了多少不同的类,其中一些需要非常高的计算量,增加了分类的准确性。我们根据网络垃圾邮件过滤的最新进展收集和处理大量功能,包括临时功能;特别地,我们分析了连杆变化的强度和灵敏度。我们提出了新的基于时间链接相似度的特征,并展示了如何在大型图上有效地计算它们。我们表明,包括集成选择、LogitBoost和随机森林在内的机器学习技术显著提高了准确性。我们得出的结论是,通过适当的学习技术,一个简单且计算成本低的特征子集优于迄今为止在我们的数据集上发表的所有先前结果,并且可以通过计算成本高的特征进一步改进。我们在三个主要的公开数据集上测试了我们的方法:Web垃圾邮件挑战2008数据集WEBSPAM-UK2007, ECML/PKDD发现挑战数据集DC2010,以及ClueWeb09的滑铁卢垃圾邮件排名。与Web垃圾邮件和ECML/PKDD发现挑战以及TREC Web赛道的参与者相比,我们的分类器集成设置了最强的分类基准。为了促进该领域的研究,我们公开了几个功能集和源代码,1 https://datamining.sztaki.hu/en/download/web-spam-resources包括八个。uk抓取快照的时间特征,其中包括WEBSPAM-UK2007以及ClueWeb09标记部分的网络垃圾邮件挑战特征。
{"title":"The Classification Power of Web Features","authors":"M. Erdélyi, A. Benczúr, B. Daróczy, A. Garzó, Tamás Kiss, Dávid Siklósi","doi":"10.1080/15427951.2013.850456","DOIUrl":"https://doi.org/10.1080/15427951.2013.850456","url":null,"abstract":"Abstract In this article we give a comprehensive overview of features devised for web spam detection and investigate how much various classes, some requiring very high computational effort, add to the classification accuracy. We collect and handle a large number of features based on recent advances in web spam filtering, including temporal ones; in particular, we analyze the strength and sensitivity of linkage change. We propose new, temporal link-similarity-based features and show how to compute them efficiently on large graphs. We show that machine learning techniques, including ensemble selection, LogitBoost, and random forest significantly improve accuracy. We conclude that, with appropriate learning techniques, a simple and computationally inexpensive feature subset outperforms all previous results published so far on our dataset and can be further improved only slightly by computationally expensive features. We test our method on three major publicly available datasets: the Web Spam Challenge 2008 dataset WEBSPAM-UK2007, the ECML/PKDD Discovery Challenge dataset DC2010, and the Waterloo Spam Rankings for ClueWeb09. Our classifier ensemble sets the strongest classification benchmark compared to participants of the Web Spam and ECML/PKDD Discovery Challenges as well as the TREC Web track. To foster research in the area, we make several feature sets and source codes public,1 https://datamining.sztaki.hu/en/download/web-spam-resources including the temporal features of eight .uk crawl snapshots that include WEBSPAM-UK2007 as well as the Web Spam Challenge features for the labeled part of ClueWeb09.","PeriodicalId":38105,"journal":{"name":"Internet Mathematics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/15427951.2013.850456","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59947342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Communities, Random Walks, and Social Sybil Defense 社区,随机漫步和社会Sybil防御
Q3 Mathematics Pub Date : 2014-04-04 DOI: 10.1080/15427951.2013.865685
L. Alvisi, Allen Clement, Alessandro Epasto, Silvio Lattanzi, A. Panconesi
Abstract Sybil attacks, in which an adversary forges a potentially unbounded number of identities, are a danger to distributed systems and online social networks. The goal of sybil defense is to accurately identify sybil identities. This article surveys the evolution of sybil defense protocols that leverage the structural properties of the social graph underlying a distributed system to identify sybil identities. We make two main contributions. First, we clarify the deep connection between sybil defense and the theory of random walks. This leads us to identify a community detection algorithm that, for the first time, offers provable guarantees in the context of sybil defense. Second, we advocate a new goal for sybil defense that addresses the more limited, but practically useful, goal of securely white-listing a local region of the graph.
Sybil攻击是指攻击者伪造潜在无限数量的身份,对分布式系统和在线社交网络构成威胁。sybil防御的目标是准确识别sybil身份。本文概述了利用分布式系统底层社交图的结构属性来识别符号身份的符号防御协议的演变。我们做出了两个主要贡献。首先,我们阐明了符号防御与随机游走理论之间的深层联系。这使我们首次确定了一种社区检测算法,该算法在符号防御上下文中提供了可证明的保证。其次,我们提倡一个新的符号防御目标,它解决了更有限,但实际有用的目标,即安全地将图的局部区域列入白名单。
{"title":"Communities, Random Walks, and Social Sybil Defense","authors":"L. Alvisi, Allen Clement, Alessandro Epasto, Silvio Lattanzi, A. Panconesi","doi":"10.1080/15427951.2013.865685","DOIUrl":"https://doi.org/10.1080/15427951.2013.865685","url":null,"abstract":"Abstract Sybil attacks, in which an adversary forges a potentially unbounded number of identities, are a danger to distributed systems and online social networks. The goal of sybil defense is to accurately identify sybil identities. This article surveys the evolution of sybil defense protocols that leverage the structural properties of the social graph underlying a distributed system to identify sybil identities. We make two main contributions. First, we clarify the deep connection between sybil defense and the theory of random walks. This leads us to identify a community detection algorithm that, for the first time, offers provable guarantees in the context of sybil defense. Second, we advocate a new goal for sybil defense that addresses the more limited, but practically useful, goal of securely white-listing a local region of the graph.","PeriodicalId":38105,"journal":{"name":"Internet Mathematics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/15427951.2013.865685","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59947430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Some Properties of Random Apollonian Networks 随机阿波罗网络的一些性质
Q3 Mathematics Pub Date : 2014-04-03 DOI: 10.1080/15427951.2013.796300
A. Frieze, Charalampos E. Tsourakakis
Abstract In this work, we analyze fundamental properties of random Apollonian networks [Zhang et al. 06, Zhou et al. 05], a popular random graph model that generates planar graphs with power-law properties. Specifically, we analyze the degree distribution, the k largest degrees, the k largest eigenvalues, and the diameter, where k is a constant.
在这项工作中,我们分析了随机Apollonian网络的基本性质[Zhang et al. 06, Zhou et al. 05],这是一种流行的随机图模型,可以生成具有幂律性质的平面图。具体来说,我们分析度分布、k个最大度、k个最大特征值和直径,其中k是常数。
{"title":"Some Properties of Random Apollonian Networks","authors":"A. Frieze, Charalampos E. Tsourakakis","doi":"10.1080/15427951.2013.796300","DOIUrl":"https://doi.org/10.1080/15427951.2013.796300","url":null,"abstract":"Abstract In this work, we analyze fundamental properties of random Apollonian networks [Zhang et al. 06, Zhou et al. 05], a popular random graph model that generates planar graphs with power-law properties. Specifically, we analyze the degree distribution, the k largest degrees, the k largest eigenvalues, and the diameter, where k is a constant.","PeriodicalId":38105,"journal":{"name":"Internet Mathematics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/15427951.2013.796300","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59946919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
Internet Mathematics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1