# Some questions... Graphs

Save this PDF as:

Size: px
Start display at page:

## Transcription

1 Uni Innsbruck Informatik - 1 Uni Innsbruck Informatik - 2 Some questions... Peer-to to-peer Systems Analysis of unstructured P2P systems How scalable is Gnutella? How robust is Gnutella? Why does FreeNet work? Michael Welzl DPS NSG Team dps.uibk.ac.at/nsg Institute of Computer Science University of Innsbruck, Austria What would an ideal (unstructured) P2P system look like? What is do the overlay networks of existing (unstructured) P2P systems look like? Gnutella snapshot, 2000 Uni Innsbruck Informatik - 3 Uni Innsbruck Informatik - 4 Scalability of Gnutella: quick answer Graphs N=2 N=3 N=4 N=5 N=6 N=7 Bandwidth Generated in Bytes (Message 83 bytes) Searching for a 18 byte string T= ,328 2,075 2,988 4,067 T= ,743 4,316 8,715 15,438 24,983 T= ,735 13,280 35,275 77, ,479 T=5 N = number of connections open T = number of hops 830 7,719 40, , , , , , ,475 1,945,188 5,421,311 1,162 31, ,876 2,266,315 9,726,438 35,528,447 1,328 63,495 1,088,960 9,065,675 48,632, ,171,263 N=8 5,312 37, ,600 1,859,864 13,019,712 91,138, ,971,200 T=6 T=7 T=8 Source: Jordan Ritter: Why Gnutella Can't Scale. No, Really. Rigorous analysis of P2P systems: based on graph theory Refresher of graph theory needed First: graph families and models Random graphs Small world graphs Scale-free graphs Then: graph theory and P2P How are the graph properties reflected in real systems? Users (peers) are represented by vertices in the graph Edges represent connections in the overlay (routing table entries) Concept of self-organization Network structures emerge from simple rules E.g. also in social networks, www, actors playing together in movies What Is a Graph? Uni Innsbruck Informatik - 5 Properties of Graphs Uni Innsbruck Informatik - 6 Definition of a graph: Graph G = (V, E) consists of two finite sets, set V of vertices (nodes) and set E of edges (arcs) for which the following applies: 1. If e E, then exists (v, u) V x V, such that v e and u e 2. If e E and above (v, u) exists, and further for (x, y) V x V applies x e and y e, then {v, u} = {x, y} Example graph with 4 vertices and 5 edges e e 2 e 5 e 4 3 e 3 4 An edge e E is directed if the start and end vertices in condition 2 above are identical: v = x and y = u An edge e E is undirected if v = x and y = u as well as v = y and u = x are possible A graph G is directed (undirected) if the above property holds for all edges A loop is an edge with identical endpoints Graph G 1 = (V 1, E 1 ) is a subgraph of G = (V, E), if V 1 V and E 1 E (such that conditions 1 and 2 are met)

2 Uni Innsbruck Informatik - 7 Uni Innsbruck Informatik - 8 Important Types of Graphs Vertex Degree Vertices v, u V are connected if there is a path from v to u: (v, v 2 ), (v 2, v 3 ),, (v k-1, u) E Graph G is connected if all v, u V are connected Undirected, connected, acyclic graph is called a tree Sidenote: Undirected, acyclic graph which is not connected is called a forest Directed, connected, acyclic graph is also called DAG DAG = Directed Acyclic Graph (connected is assumed) An induced graph G(V C ) = (V C, E C ) is a graph V C V and with edges E C = {e = (i, j) i, j V C } In graph G = (V, E), the degree of vertex v V is the total number of edges (v, u) E and (u, v) E Degree is the number of edges which touch a vertex For directed graph, we distinguish between in-degree and out-degree In-degree is number of edges coming to a vertex Out-degree is number of edges going away from a vertex The degree of a vertex can be obtained as: Sum of the elements in its row in the incidence matrix Length of its vertex incidence list An induced graph is a component if it is connected Uni Innsbruck Informatik - 9 Uni Innsbruck Informatik - 10 Important Graph Metrics Random Graphs Distance: d(v, u) between vertices v and u is the length of the shortest path between v and u Average path length: Sum of the distances over all pairs of nodes divided by the number of pairs Diameter: d(g) of graph G is the maximum of d(v, u) for all v, u V Order: the number of vertices in a graph Clustering coefficient: number of edges between neighbors divided by maximum number of edges between them k neighbors: k(k-1)/2 possible edges between them 2E( N ( i)) C ( i) = d ( i)( d ( i) 1) E(N(i)) = number of edges between neighbors of i d(i) = degree of i Source: Wikipedia Random graphs are first widely studied graph family Many P2P networks choose neighbors more or less randomly Two different notations generally used: Erdös and Renyi Gilbert (we will use this) Gilbert s definition: Graph G n,p (with n nodes) is a graph where the probability of an edge e = (v, w) is p Construction algorithm: For each possible edge, draw a random number If the number is smaller than p, then the edge exists p can be function of n or constant Uni Innsbruck Informatik - 11 Uni Innsbruck Informatik - 12 Basic Results for Random Graphs Random Graphs: Summary Giant Connected Component Let c > 0 be a constant and p = c/n. If c < 1 every component of G n,p has order O(log N) with high probability. If c > 1 then there will be one component of size n*(f(c) + O(1)) where f(c) > 0, with high probability. All other components have size O(log N) In plain English: Giant connected component emerges with high probability when average degree is about 1 Node degree distribution If we take a random node, how high is the probability P(k) that it has degree k? Node degree is Poisson distributed Parameter c = expected number of occurrences P(k) = c k e c k! Clustering coefficient Clustering coefficient of a random graph is asymptotically equal to p with high probability Before random graphs, regular graphs were popular Regular: Every node has same degree Random graphs have two advantages over regular graphs 1. Many interesting properties analytically solvable 2. Much better for applications, e.g., social networks Note: Does not mean social networks are random graphs; just that the properties of social networks are well-described by random graphs Question: How to model networks with local clusters and small diameter? Answer: Small-world networks

3 Uni Innsbruck Informatik - 13 Uni Innsbruck Informatik - 14 Six Degrees of Separation Milgram's Small World Experiment Famous experiment from 1960 s (S. Milgram) Send a letter to random people in Kansas and Nebraska and ask people to forward letter to a person in Boston Person identified by name, profession, and city Rule: Give letter only to people you know by first name and ask them to pass it on according to same rule Some letters reached their goal Letter needed six steps on average to reach the person Graph theoretically: Social networks have dense local structure, but (apparently) small diameter Generally referred to as small world effect Usually, small number of persons act as hubs Uni Innsbruck Informatik - 15 Uni Innsbruck Informatik - 16 Small-World Networks Small-World Networks and Random Graphs Developed/discovered by Watts and Strogatz (1998) Over 30 years after Milgram s experiment! Watts and Strogatz looked at three networks Film collaboration between actors, US power grid, Neural network of worm C. elegans Measured characteristics: Clustering coefficient as a measure for regularity, or locality of the network If it is high, edges are rather build between neighbors than between far away nodes The average path length between vertices Results Compared to a random graph with same number of nodes Diameters similar, slightly higher for real graph Clustering coefficient orders of magnitude higher Definition of small-worlds network Dense local clustering structure and small diameter comparable to that of a same-sized random graph Result Most real-world networks have a high clustering coefficient ( ), but nevertheless a low average path length Grid-like networks: High clustering coefficient high average path length (edges are not random, but rather local ) Constructing Small-World Graphs Uni Innsbruck Informatik - 17 Put all n nodes on a ring, number them consecutively from 1 to n Regular, Small-World, Random Uni Innsbruck Informatik - 18 Regular Small-World Random Connect each node with its k clockwise neighbors Traverse ring in clockwise order For every edge Draw random number r If r < p, then re-wire edge by selecting a random target node from the set of all nodes (no duplicates) Otherwise keep old edge Different values of p give different graphs If p is close to 0, then original structure mostly preserved If p is close to 1, then new graph is random Interesting things happen when p is somewhere in-between p = 0 p = 1

5 Uni Innsbruck Informatik - 25 Uni Innsbruck Informatik - 26 Barabasi-Albert Albert-Model How do power law networks emerge? In a network where new vertices (nodes) are added and new nodes tend to connect to well-connected nodes, the vertex connectivities follow a power-law Barabasi-Albert-Model: power-law network is constructed with two rules 1. Network grows in time 2. New node has preferences to whom it wants to connect Preferential connectivity modeled as Each new node wants to connect to m other nodes Probability that an existing node j gets one of the m connections is proportional to its degree d(j) New nodes tend to connect to well-connected nodes Another way of saying this: the rich get richer Copying model Alternative generative model (R. Kumar, P. Raghavan, et al. 2000) In each time step randomly copy one of the existing nodes keeping all its links Connect the original node and the copy Then randomly remove edges from both nodes with a very small probability, and for each removed edge randomly draw new target nodes In this model the probability of node v getting a new edge in some time step is proportional to its degree at that time The more edges it has, the more likely it is that one of its neighbors is chosen for copying in the next time step In contrast to random networks, scale-free networks show a small number of well-connected hubs and many nodes with few connections Robustness of Scale Free Networks Uni Innsbruck Informatik - 27 Experiment: take network of nodes (random and power-law) and remove nodes randomly Random graph: Take out 5% of nodes: Biggest component 9000 nodes Take out 18% of nodes: No biggest component, all components between 1 and 100 nodes Take out 45% of nodes: Only groups of 1 or 2 survive Power-law graph: Take out 5% of nodes: Only isolated nodes break off Take out 18% of nodes: Biggest component 8000 nodes Take out 45% of nodes: Large cluster persists, fragments small Networks with power law exponent < 3 are very robust against random node failures ONLY true for random failures! Uni Innsbruck Informatik - 28 Robustness of Scale-Free Networks /2 Robustness against random failures = important property of networks with scalefree degree distribution Remove a randomly chosen vertex v from a scale-free network: with high probability, it will be a low-degree vertex and thus the damage to the network will not be high But scale-free networks are very sensitive against attacks If a malicious attacker removes the highest degree vertices first, the network will quickly decompose in very small components Note: random graphs are not robust against random failures, but not sensitive against attacks either (because all vertices more or less have the same degree) Failure of nodes Robustness of Scale-Free Networks /3 Uni Innsbruck Informatik - 29 Uni Innsbruck Informatik - 30 Kleinberg s s Small-World Navigability Model Random failures vs. directed attacks Small-world model and power law explain why short paths exist Random Graph Power Law Graph Missing piece in the puzzle: why can we find these paths? Each node has only local information Even if a short cut exists, how do people know about it? Milgram s experiment: Some additional information (profession, address, hobbies etc.) is used to decide which neighbor is closest to recipient results showed that first steps were the largest Kleinberg s Small-World Model Set of points in an n x n grid Distance is the number of steps separating points d(i, j) = x i -x j + y i -y j Construct graph as follows: Every node i is connected to node j within distance q For every node i, additional q edges are added. Probability that node j is selected is proportional to d(i, j) -r, for some constant r

6 Uni Innsbruck Informatik - 31 Uni Innsbruck Informatik - 32 Navigation in Kleinberg s s Model Unstructured P2P Networks Simple greedy routing: nodes only know local links and target position, always use the link that brings message closest to target If r=2, expected lookup time is O(log 2 n) If r 2, expected lookup time is O(n ε ), where ε depends on r Can be shown: Number of messages needed is proportional to O(log n) iff r=s (s = number of dimensions) Idea behind proof: for any r < s there are too few random edges to make paths short For r > s there are too many random edges too many choices for passing message The message will make a (long) random walk through the network Kleinberg small worlds thus provide a way of building a peer-to-peer overlay network, in which a very simple, greedy and local routing protocol is applicable Practical algorithm: Forward message to contact who is closest to target Assumes some way of associating nodes with points in grid (know about closest ) Compare with CAN DHT (later) What do real (unstructured) Peer-to-Peer Networks look like? Depends on the protocols used It has been found that some peer-to-peer networks, e.g., Freenet, evolve voluntarily in a small-world with a high clustering coefficient and a small diameter Analogously, some protocols, e.g., Gnutella, will implicitly generate a scale-free degree distribution Case study: Gnutella network How does the Gnutella network evolve? Nodes with high degree answer more likely to Ping messages Thus, they are more likely chosen as neighbor Host caches always/often provide addresses of well connected nodes Uni Innsbruck Informatik - 33 Uni Innsbruck Informatik - 34 Gnutella Gnutella /2 Network diameter stayed nearly constant, though the network grew by one order of magnitude Robustness Remember: we said that networks with power law exponent < 3 are very robust against random node failures In Gnutella s case, the exponent is 2.3 Theoretical experiment Subset of Gnutella with 1771 nodes Take out random 30% of nodes, network still survives Take out 4% of best connected nodes, network splinters Node degrees in Gnutella follow Power-Law rule For more information on Gnutella, see: Matei Ripeanu, Adriana Iamnitchi, Ian Foster: Mapping the Gnutella Network, IEEE Internet Computing, Jan/Feb 2002 Zeinalipour-Yazti, Folias, Faloutsos, A Quantitative Analysis of the Gnutella Network Traffic, Tech. Rep. May 2002 Uni Innsbruck Informatik - 35 Summary The network structure of a peer-to-peer system influences: average necessary number of hops (path length) possibility of greedy, decentralized routing algorithms stability against random failures sensitivity against attacks redundancy of routing table entries (edges) many other properties of the system build onto this network Important measures of a network structure are: average path length clustering coefficient the degree distribution Next: how to build systems based on edge generation rules such that a network structure arises supporting the desired properties of the system

### Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003

Graph models for the Web and the Internet Elias Koutsoupias University of Athens and UCLA Crete, July 2003 Outline of the lecture Small world phenomenon The shape of the Web graph Searching and navigation

### A discussion of Statistical Mechanics of Complex Networks P. Part I

A discussion of Statistical Mechanics of Complex Networks Part I Review of Modern Physics, Vol. 74, 2002 Small Word Networks Clustering Coefficient Scale-Free Networks Erdös-Rényi model cover only parts

### Graph Mining Techniques for Social Media Analysis

Graph Mining Techniques for Social Media Analysis Mary McGlohon Christos Faloutsos 1 1-1 What is graph mining? Extracting useful knowledge (patterns, outliers, etc.) from structured data that can be represented

### General Network Analysis: Graph-theoretic. COMP572 Fall 2009

General Network Analysis: Graph-theoretic Techniques COMP572 Fall 2009 Networks (aka Graphs) A network is a set of vertices, or nodes, and edges that connect pairs of vertices Example: a network with 5

### Complex Networks Analysis: Clustering Methods

Complex Networks Analysis: Clustering Methods Nikolai Nefedov Spring 2013 ISI ETH Zurich nefedov@isi.ee.ethz.ch 1 Outline Purpose to give an overview of modern graph-clustering methods and their applications

### Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

, pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and

### Network/Graph Theory. What is a Network? What is network theory? Graph-based representations. Friendship Network. What makes a problem graph-like?

What is a Network? Network/Graph Theory Network = graph Informally a graph is a set of nodes joined by a set of lines or arrows. 1 1 2 3 2 3 4 5 6 4 5 6 Graph-based representations Representing a problem

### Social Media Mining. Graph Essentials

Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures

### In the following we will only consider undirected networks.

Roles in Networks Roles in Networks Motivation for work: Let topology define network roles. Work by Kleinberg on directed graphs, used topology to define two types of roles: authorities and hubs. (Each

### Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Imre Varga Abstract In this paper I propose a novel method to model real online social networks where the growing

### Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis

Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.0, steen@cs.vu.nl Chapter 06: Network analysis Version: April 8, 04 / 3 Contents Chapter

### Dmitri Krioukov CAIDA/UCSD

Hyperbolic geometry of complex networks Dmitri Krioukov CAIDA/UCSD dima@caida.org F. Papadopoulos, M. Boguñá, A. Vahdat, and kc claffy Complex networks Technological Internet Transportation Power grid

### Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...

### The Shape of the Network. The Shape of the Internet. Why study topology? Internet topologies. Early work. More on topologies..

The Shape of the Internet Slides assembled by Jeff Chase Duke University (thanks to and ) The Shape of the Network Characterizing shape : AS-level topology: who connects to whom Router-level topology:

### Introduction to Networks and Business Intelligence

Introduction to Networks and Business Intelligence Prof. Dr. Daning Hu Department of Informatics University of Zurich Sep 17th, 2015 Outline Network Science A Random History Network Analysis Network Topological

### Temporal Dynamics of Scale-Free Networks

Temporal Dynamics of Scale-Free Networks Erez Shmueli, Yaniv Altshuler, and Alex Sandy Pentland MIT Media Lab {shmueli,yanival,sandy}@media.mit.edu Abstract. Many social, biological, and technological

### Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks

Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 08: Computer networks Version: March 3, 2011 2 / 53 Contents

### Network Analysis. BCH 5101: Analysis of -Omics Data 1/34

Network Analysis BCH 5101: Analysis of -Omics Data 1/34 Network Analysis Graphs as a representation of networks Examples of genome-scale graphs Statistical properties of genome-scale graphs The search

### An Alternative Web Search Strategy? Abstract

An Alternative Web Search Strategy? V.-H. Winterer, Rechenzentrum Universität Freiburg (Dated: November 2007) Abstract We propose an alternative Web search strategy taking advantage of the knowledge on

### Random graphs and complex networks

Random graphs and complex networks Remco van der Hofstad Honours Class, spring 2008 Complex networks Figure 2 Ye a s t p ro te in in te ra c tio n n e tw o rk. A m a p o f p ro tein p ro tein in tera c

### Zipf s law and the Internet

Glottometrics 3, 2002,143-150 To honor G.K. Zipf Zipf s law and the Internet Lada A. Adamic 1 Bernardo A. Huberman Abstract. Zipf's law governs many features of the Internet. Observations of Zipf distributions,

### DECENTRALIZED SCALE-FREE NETWORK CONSTRUCTION AND LOAD BALANCING IN MASSIVE MULTIUSER VIRTUAL ENVIRONMENTS

DECENTRALIZED SCALE-FREE NETWORK CONSTRUCTION AND LOAD BALANCING IN MASSIVE MULTIUSER VIRTUAL ENVIRONMENTS Markus Esch, Eric Tobias - University of Luxembourg MOTIVATION HyperVerse project Massive Multiuser

### Distance Degree Sequences for Network Analysis

Universität Konstanz Computer & Information Science Algorithmics Group 15 Mar 2005 based on Palmer, Gibbons, and Faloutsos: ANF A Fast and Scalable Tool for Data Mining in Massive Graphs, SIGKDD 02. Motivation

### Graph Theory and Networks in Biology

Graph Theory and Networks in Biology Oliver Mason and Mark Verwoerd March 14, 2006 Abstract In this paper, we present a survey of the use of graph theoretical techniques in Biology. In particular, we discuss

### Towards Modelling The Internet Topology The Interactive Growth Model

Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS

### The average distances in random graphs with given expected degrees

Classification: Physical Sciences, Mathematics The average distances in random graphs with given expected degrees by Fan Chung 1 and Linyuan Lu Department of Mathematics University of California at San

### Practical Graph Mining with R. 5. Link Analysis

Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities

### GENERATING AN ASSORTATIVE NETWORK WITH A GIVEN DEGREE DISTRIBUTION

International Journal of Bifurcation and Chaos, Vol. 18, o. 11 (2008) 3495 3502 c World Scientific Publishing Company GEERATIG A ASSORTATIVE ETWORK WITH A GIVE DEGREE DISTRIBUTIO JI ZHOU, XIAOKE XU, JIE

### Course on Social Network Analysis Graphs and Networks

Course on Social Network Analysis Graphs and Networks Vladimir Batagelj University of Ljubljana Slovenia V. Batagelj: Social Network Analysis / Graphs and Networks 1 Outline 1 Graph...............................

### Inet-3.0: Internet Topology Generator

Inet-3.: Internet Topology Generator Jared Winick Sugih Jamin {jwinick,jamin}@eecs.umich.edu CSE-TR-456-2 Abstract In this report we present version 3. of Inet, an Autonomous System (AS) level Internet

### Graph theory and network analysis. Devika Subramanian Comp 140 Fall 2008

Graph theory and network analysis Devika Subramanian Comp 140 Fall 2008 1 The bridges of Konigsburg Source: Wikipedia The city of Königsberg in Prussia was set on both sides of the Pregel River, and included

### Structural constraints in complex networks

Structural constraints in complex networks Dr. Shi Zhou Lecturer of University College London Royal Academy of Engineering / EPSRC Research Fellow Part 1. Complex networks and three key topological properties

### Walk-Based Centrality and Communicability Measures for Network Analysis

Walk-Based Centrality and Communicability Measures for Network Analysis Michele Benzi Department of Mathematics and Computer Science Emory University Atlanta, Georgia, USA Workshop on Innovative Clustering

### Graph Mining and Social Network Analysis

Graph Mining and Social Network Analysis Data Mining and Text Mining (UIC 583 @ Politecnico di Milano) References Jiawei Han and Micheline Kamber, "Data Mining: Concepts and Techniques", The Morgan Kaufmann

### IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti

### Asking Hard Graph Questions. Paul Burkhardt. February 3, 2014

Beyond Watson: Predictive Analytics and Big Data U.S. National Security Agency Research Directorate - R6 Technical Report February 3, 2014 300 years before Watson there was Euler! The first (Jeopardy!)

### Chord - A Distributed Hash Table

Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing

### Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks

### Efficient Search in Gnutella-like Small-World Peerto-Peer

Efficient Search in Gnutella-like Small-World Peerto-Peer Systems * Dongsheng Li, Xicheng Lu, Yijie Wang, Nong Xiao School of Computer, National University of Defense Technology, 410073 Changsha, China

### MINFS544: Business Network Data Analytics and Applications

MINFS544: Business Network Data Analytics and Applications March 30 th, 2015 Daning Hu, Ph.D., Department of Informatics University of Zurich F Schweitzer et al. Science 2009 Stop Contagious Failures in

### Social Media Mining. Network Measures

Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users

### 1 Six Degrees of Separation

Networks: Spring 2007 The Small-World Phenomenon David Easley and Jon Kleinberg April 23, 2007 1 Six Degrees of Separation The small-world phenomenon the principle that we are all linked by short chains

### Applying Social Network Analysis to the Information in CVS Repositories

Applying Social Network Analysis to the Information in CVS Repositories Luis Lopez-Fernandez, Gregorio Robles, Jesus M. Gonzalez-Barahona GSyC, Universidad Rey Juan Carlos {llopez,grex,jgb}@gsyc.escet.urjc.es

### The Large-Scale Structure of Semantic Networks: Statistical Analyses and a Model of Semantic Growth

Cognitive Science 29 (2005) 41 78 Copyright 2005 Cognitive Science Society, Inc. All rights reserved. The Large-Scale Structure of Semantic Networks: Statistical Analyses and a Model of Semantic Growth

### From Random Graphs to Complex Networks:

Unterschrift des Betreuers DIPLOMARBEIT From Random Graphs to Complex Networks: A Modelling Approach Ausgeführt am Institut für Diskrete Mathematik und Geometrie der Technischen Universität Wien unter

### Statistical Mechanics of Complex Networks

Statistical Mechanics of Complex Networks Réka Albert 1,2 and Albert-László Barabási 2 1 School of Mathematics, 127 Vincent Hall, University of Minnesota, Minneapolis, Minnesota 55455 2 Department of Physics,

### ! E6893 Big Data Analytics Lecture 10:! Linked Big Data Graph Computing (II)

E6893 Big Data Analytics Lecture 10: Linked Big Data Graph Computing (II) Ching-Yung Lin, Ph.D. Adjunct Professor, Dept. of Electrical Engineering and Computer Science Mgr., Dept. of Network Science and

### Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

### An Incremental Super-Linear Preferential Internet Topology Model

An Incremental Super-Linear Preferential Internet Topology Model Extended Abstract Sagy Bar 1, Mira Gonen 2, and Avishai Wool 3 1 School of Electrical Engineering, Tel Aviv University, Ramat Aviv 69978,

### Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

### Social Network Analysis

Social Network Analysis Challenges in Computer Science April 1, 2014 Frank Takes (ftakes@liacs.nl) LIACS, Leiden University Overview Context Social Network Analysis Online Social Networks Friendship Graph

### Statistical mechanics of complex networks

Statistical mechanics of complex networks Réka Albert* and Albert-László Barabási Department of Physics, University of Notre Dame, Notre Dame, Indiana 46556 (Published 30 January 2002) REVIEWS OF MODERN

### Healthcare Analytics. Aryya Gangopadhyay UMBC

Healthcare Analytics Aryya Gangopadhyay UMBC Two of many projects Integrated network approach to personalized medicine Multidimensional and multimodal Dynamic Analyze interactions HealthMask Need for sharing

### Finding and counting given length cycles

Finding and counting given length cycles Noga Alon Raphael Yuster Uri Zwick Abstract We present an assortment of methods for finding and counting simple cycles of a given length in directed and undirected

### Peer-to-Peer over Ad-hoc Networks: (Re)Configuration Algorithms

Peer-to-Peer over Ad-hoc Networks: (Re)Configuration Algorithms Fernanda P. Franciscani Marisa A. Vasconcelos Rainer P. Couto Antonio A.F. Loureiro Computer Science Department, Federal University of Minas

### The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies

The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies Priya Mahadevan, Dimitri Krioukov, Marina Fomenkov, Brad Huffaker, Xenofontas Dimitropoulos, kc claffy, Amin Vahdat

### Recent Progress in Complex Network Analysis. Models of Random Intersection Graphs

Recent Progress in Complex Network Analysis. Models of Random Intersection Graphs Mindaugas Bloznelis, Erhard Godehardt, Jerzy Jaworski, Valentas Kurauskas, Katarzyna Rybarczyk Adam Mickiewicz University,

### Structure of a large social network

PHYSICAL REVIEW E 69, 036131 2004 Structure of a large social network Gábor Csányi 1, * and Balázs Szendrői 2, 1 TCM Group, Cavendish Laboratory, University of Cambridge, Madingley Road, Cambridge CB3

### Searching in a Small World

THESIS FOR THE DEGREE OF LICENTIATE OF PHILOSOPHY Searching in a Small World Oskar Sandberg Division of Mathematical Statistics Department of Mathematical Sciences Chalmers University of Technology and

### Algorithms for representing network centrality, groups and density and clustered graph representation

COSIN IST 2001 33555 COevolution and Self-organization In dynamical Networks Algorithms for representing network centrality, groups and density and clustered graph representation Deliverable Number: D06

### Evaluation of a New Method for Measuring the Internet Degree Distribution: Simulation Results

Evaluation of a New Method for Measuring the Internet Distribution: Simulation Results Christophe Crespelle and Fabien Tarissan LIP6 CNRS and Université Pierre et Marie Curie Paris 6 4 avenue du président

### Research Article A Comparison of Online Social Networks and Real-Life Social Networks: A Study of Sina Microblogging

Mathematical Problems in Engineering, Article ID 578713, 6 pages http://dx.doi.org/10.1155/2014/578713 Research Article A Comparison of Online Social Networks and Real-Life Social Networks: A Study of

### Six Degrees of Separation in Online Society

Six Degrees of Separation in Online Society Lei Zhang * Tsinghua-Southampton Joint Lab on Web Science Graduate School in Shenzhen, Tsinghua University Shenzhen, Guangdong Province, P.R.China zhanglei@sz.tsinghua.edu.cn

### Identification of Influencers - Measuring Influence in Customer Networks

Submitted to Decision Support Systems manuscript DSS Identification of Influencers - Measuring Influence in Customer Networks Christine Kiss, Martin Bichler Internet-based Information Systems, Dept. of

### The ebay Graph: How Do Online Auction Users Interact?

The ebay Graph: How Do Online Auction Users Interact? Yordanos Beyene, Michalis Faloutsos University of California, Riverside {yordanos, michalis}@cs.ucr.edu Duen Horng (Polo) Chau, Christos Faloutsos

### 14.10.2014. Overview. Swarms in nature. Fish, birds, ants, termites, Introduction to swarm intelligence principles Particle Swarm Optimization (PSO)

Overview Kyrre Glette kyrrehg@ifi INF3490 Swarm Intelligence Particle Swarm Optimization Introduction to swarm intelligence principles Particle Swarm Optimization (PSO) 3 Swarms in nature Fish, birds,

University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

### A SURVEY OF PROPERTIES AND MODELS OF ON- LINE SOCIAL NETWORKS

International Conference on Mathematical and Computational Models PSG College of Technology, Coimbatore Copyright 2009, Narosa Publishing House, New Delhi, India A SURVEY OF PROPERTIES AND MODELS OF ON-

### Social Networks and Social Media

Social Networks and Social Media Social Media: Many-to-Many Social Networking Content Sharing Social Media Blogs Microblogging Wiki Forum 2 Characteristics of Social Media Consumers become Producers Rich

### Self similarity of complex networks & hidden metric spaces

Self similarity of complex networks & hidden metric spaces M. ÁNGELES SERRANO Departament de Química Física Universitat de Barcelona TERA-NET: Toward Evolutive Routing Algorithms for scale-free/internet-like

### Characterizing and Modelling Clustering Features in AS-Level Internet Topology

Characterizing and Modelling Clustering Features in AS-Level Topology Yan Li, Jun-Hong Cui, Dario Maggiorini and Michalis Faloutsos yan.li@uconn.edu, jcui@engr.uconn.edu, dario@dico.unimi.it, michalis@cs.ucr.edu

### Understanding the evolution dynamics of internet topology

Understanding the evolution dynamics of internet topology Shi Zhou* University College London, Adastral Park Campus, Ross Building, Ipswich, IP5 3RE, United Kingdom Received 2 December 2005; revised manuscript

### Cloud Computing is NP-Complete

Working Paper, February 2, 20 Joe Weinman Permalink: http://www.joeweinman.com/resources/joe_weinman_cloud_computing_is_np-complete.pdf Abstract Cloud computing is a rapidly emerging paradigm for computing,

### Tutorial, IEEE SERVICE 2014 Anchorage, Alaska

Tutorial, IEEE SERVICE 2014 Anchorage, Alaska Big Data Science: Fundamental, Techniques, and Challenges (Data Mining on Big Data) 2014. 6. 27. By Neil Y. Yen Presented by Incheon Paik University of Aizu

### Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique

### EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,

### ON THE APPLICATION OF RANDOM LINEAR NETWORK CODING FOR NETWORK SECURITY AND DIAGNOSIS

ON THE APPLICATION OF RANDOM LINEAR NETWORK CODING FOR NETWORK SECURITY AND DIAGNOSIS by Elias Kehdi A thesis submitted in conformity with the requirements for the degree of Master of Applied Science,

### Scalable P2P Overlays of Very Small Constant Degree: an Emerging Security Threat

Scalable P2P Overlays of Very Small Constant Degree: an Emerging Security Threat Márk Jelasity 1 and Vilmos Bilicki 2 1 University of Szeged and Hungarian Academy of Sciences, Hungary, jelasity@inf.u-szeged.hu

### Scalable Source Routing

Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable

### The Internet Is Like A Jellyfish

The Internet Is Like A Jellyfish Michalis Faloutsos UC Riverside Joint work with: Leslie Tauro, Georgos Siganos (UCR) Chris Palmer(CMU) Big Picture: Modeling the Internet Topology Traffic Protocols Routing,

### Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes umberkes@cc.umanitoba.ca University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although

### Degree distribution in random Apollonian networks structures

Degree distribution in random Apollonian networks structures Alexis Darrasse joint work with Michèle Soria ALÉA 2007 Plan 1 Introduction 2 Properties of real-life graphs Distinctive properties Existing

### Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

### CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

### Mathematical issues in network construction and security

Fabrizio Luccio Mathematical issues in network construction and security Dottorato 08 2. The graph structure of Internet, WWW, and DNS Internet: birth and development Born in the Boston area around 1969

### Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems

Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems Kunwadee Sripanidkulchai Bruce Maggs Hui Zhang Carnegie Mellon University, Pittsburgh, PA 15213 {kunwadee,bmm,hzhang}@cs.cmu.edu

### Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic William Acosta and Surendar Chandra University of Notre Dame, Notre Dame IN, 46556, USA {wacosta,surendar}@cse.nd.edu Abstract.

V. Adamchik 1 Graph Theory Victor Adamchik Fall of 2005 Plan 1. Basic Vocabulary 2. Regular graph 3. Connectivity 4. Representing Graphs Introduction A.Aho and J.Ulman acknowledge that Fundamentally, computer

### RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University

### PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS

PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS Hongye Fu, Naoki Wakamiya, Masayuki Murata Graduate School of Information Science and Technology Osaka University

### The Topology of Large-Scale Engineering Problem-Solving Networks

The Topology of Large-Scale Engineering Problem-Solving Networks by Dan Braha 1, 2 and Yaneer Bar-Yam 2, 3 1 Faculty of Engineering Sciences Ben-Gurion University, P.O.Box 653 Beer-Sheva 84105, Israel

### Systems. P2P Principle. Definition of P2P. Grid scope

Uni Innsbruck Informatik - 1 Uni Innsbruck Informatik - 2 What is Peer-to to-peer? Peer-to to-peer Systems What does the word peer mean? Merriam-Webster: one that is of equal standing with another : EQUAL;

### Personalized Reputation Management in P2P Networks

Personalized Reputation Management in P2P Networks Paul - Alexandru Chirita 1, Wolfgang Nejdl 1, Mario Schlosser 2, and Oana Scurtu 1 1 L3S Research Center / University of Hannover Deutscher Pavillon Expo

### Protein Protein Interaction Networks

Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics

### Effects of node buffer and capacity on network traffic

Chin. Phys. B Vol. 21, No. 9 (212) 9892 Effects of node buffer and capacity on network traffic Ling Xiang( 凌 翔 ) a), Hu Mao-Bin( 胡 茂 彬 ) b), and Ding Jian-Xun( 丁 建 勋 ) a) a) School of Transportation Engineering,

### Topological Properties

Advanced Computer Architecture Topological Properties Routing Distance: Number of links on route Node degree: Number of channels per node Network diameter: Longest minimum routing distance between any

### Metabolic Network Analysis

Metabolic Network nalysis Overview -- modelling chemical reaction networks -- Levels of modelling Lecture II: Modelling chemical reaction networks dr. Sander Hille shille@math.leidenuniv.nl http://www.math.leidenuniv.nl/~shille

### CSC2420 Fall 2012: Algorithm Design, Analysis and Theory

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms