Organization of Complex Networks
|
|
|
- Shona Collins
- 10 years ago
- Views:
Transcription
1 Organization of Complex Networks Maksim Kitsak Boston University Collaborators: L.K. Gallos, S. Havlin, H. A. Makse and H.E. Stanley
2 K-cores: Definitions, Extraction Rules K-core is the sub-graph with nodes of degree at least k within the sub-graph. Pruning Rule: 1) Remove from the graph all nodes with k=1. 2) Some remaining nodes may now have new k = 1 nodes. 3) Repeat until there is no nodes with k = 1. 4) The remaining network forms the 2-core. 5) Repeat the process for higher k to extract other cores K-shell is a set of nodes that belongs to the K-core and NOT to the K+1 core K-crust is a union of all shells with indices <= k Any network can be represented as a number of selfenclosed K-cores!
3 Topology Analysis: Some Facts, Questions and Answers Understanding the topology of a Complex System is often an important step towards understanding its function. Many Systems are extremely large: 4 N ~ 10 Robust techniques are required for exploration of large systems. What characteristics/techniques are employed in studies of network topology? Node degree, Clustering, Cliques, Centrality, Modularity, K-cores K-core is the sub-graph with nodes of degree at least k within the sub-graph. What are the features of the k-core analysis? K-core analysis promotes node degree to a global property of a network K-core analysis allows natural representation of a network as a set of layers. K-core calculation is fast compared to other global characteristics. O(N) 10 7
4 The Internet: Autonomous System Level : K-core structure AS Internet Randomized AS Internet Shell Randomized version of the AS Internet has smaller number of k-shells. Nodes with larger degrees are typically located in higher k-shells.
5 Internet at the Router Level: K-core structure 10 4 RL Internet Randomized RL Internet Shell Randomized version of the RL Internet has very few shells! Nodes with larger degrees are typically located in small k-shells!
6 Are K-shells Fully Determined by Distribution? 10 4 Original Random RL Internet AS Internet Shell# 10 4 Cond-mat WWW 1 00 Shell# No! K-shells depend on the way nodes are connected in the network.
7 Hypotheses 1) K-shell structure depends on clustering: k=1 pruning k=1 pruning Tree-like networks are entirely decomposed at the k=1 step. k=1 pruning Loops are vital for the k-shell structure. Triangle is the simpliest loop. We use clustering as a measure of density of loops. Networks with higher clustering should have more shells
8 Hypotheses 2) K-shell strucrure depends on degree-degree correlation: q=4 k=1 pruning q=4 q=4 q=2 Hubs, mostly connected to small degree nodes tend to loose their links faster under k-pruning. (Compared to hubs that connect to other hubs.) Assortative Networks are resilient under k-pruning and should have more shells! What happens to the k-shell structure if one preserves both P ( q, q 1 2) C(q) and?
9 What if we preserve Correlation and Clustering? RL Internet Original Random) P(k,q) + C(k) preserved C(k) preserved AS Internet Shell# Cond-mat Shell# Both Assortativity and Clustering seem to increase the total number of k-shells. Preserving only clustering allows to achieve Greater number of k-shells in AS internet due to its disassortativity. M.Kitsak, L.K. Gallos, S. Havlin, H.A. Makse, and H.E. Stanley, Organization of Complex Networks (in preparation) (2008).
10 Summary and Conclusions K-core analysis is a powerful tool for the analysis of global network structure. K-shell structure promotes the degree concept to the global level Network is covered with a set of naturally emerging k-shell layers. Real Networks have non-trivial k-shell structure which significantly deviates from random models. The analysis of the k-shells of real networks allows one to reveal new aspects of the network topology. The k-cores appear to be strongly affected by degree correlation and clustering in networks. Assortativity and clustering level strongly affect the k-cores (k-shells) in the network.
11 Credits We express our gratitude for valuable discussions to: Shai Carmi, Dr. Chaoming Song, Dr. Diego Rybsky Dr. S.N. Dorogovtsev We thank for financial support: ONR European project DAPHNet EPRIS project Israel Science Foundation We thank for making the trip to NetSci 2008 possible: ONR USMA
Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network
, pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and
Bioinformatics: Network Analysis
Bioinformatics: Network Analysis Graph-theoretic Properties of Biological Networks COMP 572 (BIOS 572 / BIOE 564) - Fall 2013 Luay Nakhleh, Rice University 1 Outline Architectural features Motifs, modules,
Structural constraints in complex networks
Structural constraints in complex networks Dr. Shi Zhou Lecturer of University College London Royal Academy of Engineering / EPSRC Research Fellow Part 1. Complex networks and three key topological properties
1. Introduction Gene regulation Genomics and genome analyses Hidden markov model (HMM)
1. Introduction Gene regulation Genomics and genome analyses Hidden markov model (HMM) 2. Gene regulation tools and methods Regulatory sequences and motif discovery TF binding sites, microrna target prediction
Active Measurements: traceroute
Active Measurements: traceroute 1 Tools: Traceroute Exploit TTL (Time to Live) feature of IP When a router receives a packet with TTL=1, packet is discarded and ICMP_time_exceeded returned to sender Operational
How To Understand The Network Of A Network
Roles in Networks Roles in Networks Motivation for work: Let topology define network roles. Work by Kleinberg on directed graphs, used topology to define two types of roles: authorities and hubs. (Each
Graph theoretic approach to analyze amino acid network
Int. J. Adv. Appl. Math. and Mech. 2(3) (2015) 31-37 (ISSN: 2347-2529) Journal homepage: www.ijaamm.com International Journal of Advances in Applied Mathematics and Mechanics Graph theoretic approach to
Internet Topology. Yihua He [email protected] Michalis Faloutsos [email protected]. University of California, Riverside. Glossary 2.
Internet Topology Yihua He [email protected] Michalis Faloutsos [email protected] Georgos Siganos [email protected] University of California, Riverside Contents Glossary 2 1 Definition 2 2 Introduction
Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures
Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Dmitri Krioukov, kc claffy, and Kevin Fall CAIDA/UCSD, and Intel Research, Berkeley Problem High-level Routing is
Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks
Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Imre Varga Abstract In this paper I propose a novel method to model real online social networks where the growing
Distance Degree Sequences for Network Analysis
Universität Konstanz Computer & Information Science Algorithmics Group 15 Mar 2005 based on Palmer, Gibbons, and Faloutsos: ANF A Fast and Scalable Tool for Data Mining in Massive Graphs, SIGKDD 02. Motivation
Complex Networks Analysis: Clustering Methods
Complex Networks Analysis: Clustering Methods Nikolai Nefedov Spring 2013 ISI ETH Zurich [email protected] 1 Outline Purpose to give an overview of modern graph-clustering methods and their applications
The architecture of complex weighted networks
The architecture of complex weighted networks A. Barrat*, M. Barthélemy, R. Pastor-Satorras, and A. Vespignani* *Laboratoire de Physique Théorique (Unité Mixte de Recherche du Centre National de la Recherche
TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS
Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2008-2009 Exemplos de Projecto - Network Design Examples 1 Hierarchical Network Design 2 Hierarchical
Temporal Dynamics of Scale-Free Networks
Temporal Dynamics of Scale-Free Networks Erez Shmueli, Yaniv Altshuler, and Alex Sandy Pentland MIT Media Lab {shmueli,yanival,sandy}@media.mit.edu Abstract. Many social, biological, and technological
Structural Cloud Audits that Protect Private Information
Structural Cloud Audits that Protect Private Information Hongda Xiao, Bryan Ford, Joan Feigenbaum Department of Computer Science Yale University Cloud Computing Security Workshop November 8, 2013 Motivation
3. The Junction Tree Algorithms
A Short Course on Graphical Models 3. The Junction Tree Algorithms Mark Paskin [email protected] 1 Review: conditional independence Two random variables X and Y are independent (written X Y ) iff p X ( )
General Network Analysis: Graph-theoretic. COMP572 Fall 2009
General Network Analysis: Graph-theoretic Techniques COMP572 Fall 2009 Networks (aka Graphs) A network is a set of vertices, or nodes, and edges that connect pairs of vertices Example: a network with 5
Internet (IPv4) Topology Mapping. Department of Computer Science The University of Texas at Dallas
Internet (IPv4) Topology Mapping Kamil Sarac ([email protected]) Department of Computer Science The University of Texas at Dallas Internet topology measurement/mapping Need for Internet topology measurement
The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies
The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies Priya Mahadevan, Dimitri Krioukov, Marina Fomenkov, Brad Huffaker, Xenofontas Dimitropoulos, kc claffy, Amin Vahdat
How To Cluster Of Complex Systems
Entropy based Graph Clustering: Application to Biological and Social Networks Edward C Kenley Young-Rae Cho Department of Computer Science Baylor University Complex Systems Definition Dynamically evolving
Research Article A Comparison of Online Social Networks and Real-Life Social Networks: A Study of Sina Microblogging
Mathematical Problems in Engineering, Article ID 578713, 6 pages http://dx.doi.org/10.1155/2014/578713 Research Article A Comparison of Online Social Networks and Real-Life Social Networks: A Study of
TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS
Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2009-2010 Projecto de Rede / Sistema - Network / System Design 1 Hierarchical Network Design 2 Hierarchical
Community Detection Proseminar - Elementary Data Mining Techniques by Simon Grätzer
Community Detection Proseminar - Elementary Data Mining Techniques by Simon Grätzer 1 Content What is Community Detection? Motivation Defining a community Methods to find communities Overlapping communities
Towards a Networks-of-Networks Framework for Cyber Security
Towards a Networks-of-Networks Framework for Cyber Security Mahantesh Halappanavar, Sutanay Choudhury, Emilie Hogan, Peter Hui, and John R. Johnson Pacific Northwest National Laboratory Richland, Washington
KNOWLEDGE NETWORK SYSTEM APPROACH TO THE KNOWLEDGE MANAGEMENT
KNOWLEDGE NETWORK SYSTEM APPROACH TO THE KNOWLEDGE MANAGEMENT ZHONGTUO WANG RESEARCH CENTER OF KNOWLEDGE SCIENCE AND TECHNOLOGY DALIAN UNIVERSITY OF TECHNOLOGY DALIAN CHINA CONTENTS 1. KNOWLEDGE SYSTEMS
Classification of graph metrics
Classification of graph metrics Javier Martín Hernández and Piet Van Mieghem Faculty of Electrical Engineering, Mathematics, and Computer Science Delft University of Technology, 2628 CD Delft November
Machine Learning and Data Analysis overview. Department of Cybernetics, Czech Technical University in Prague. http://ida.felk.cvut.
Machine Learning and Data Analysis overview Jiří Kléma Department of Cybernetics, Czech Technical University in Prague http://ida.felk.cvut.cz psyllabus Lecture Lecturer Content 1. J. Kléma Introduction,
MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL
MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College
! E6893 Big Data Analytics Lecture 10:! Linked Big Data Graph Computing (II)
E6893 Big Data Analytics Lecture 10: Linked Big Data Graph Computing (II) Ching-Yung Lin, Ph.D. Adjunct Professor, Dept. of Electrical Engineering and Computer Science Mgr., Dept. of Network Science and
Valuation of Network Effects in Software Markets
Andreas Kemper Valuation of Network Effects in Software Markets A Complex Networks Approach Physica-Verlag Contents Part I Introduction ^x 1 Background and Motivation 3 1.1 Research Objectives 5 1.2 Research
Visualizing Structured Data About Music
Visualizing Structured Data About Music the k-pie network layout algorithm and applications to music data Kurt Jacobson Centre for Digital Music Queen Mary University of London Mile End, London, UK E1
QUANTITIVE AND SOCIOLOGICAL ANALYSIS OF BLOG NETWORKS
Vol. 36 (2005) ACTA PHYSICA POLONICA B No 0 QUANTITIVE AND SOCIOLOGICAL ANALYSIS OF BLOG NETWORKS Wiktor Bachnik, Stanislaw Szymczyk, Piotr Leszczynski Rafal Podsiadlo, Ewa Rymszewicz, Lukasz Kurylo Students
Social Network Mining
Social Network Mining Data Mining November 11, 2013 Frank Takes ([email protected]) LIACS, Universiteit Leiden Overview Social Network Analysis Graph Mining Online Social Networks Friendship Graph Semantics
http://www.elsevier.com/copyright
This article was published in an Elsevier journal. The attached copy is furnished to the author for non-commercial research and education use, including for instruction at the author s institution, sharing
How To Create A Data Visualization Engine For Your Computer Or Your Brain
Open Source Visualization with OpenGraphiti Thibault Reuille (@ThibaultReuille) [email protected] Abstract Andrew Hay (@andrewsmhay) [email protected] The way a human efficiently digests information
Data Science Center Eindhoven. Big Data: Challenges and Opportunities for Mathematicians. Alessandro Di Bucchianico
Data Science Center Eindhoven Big Data: Challenges and Opportunities for Mathematicians Alessandro Di Bucchianico Dutch Mathematical Congress April 15, 2015 Contents 1. Big Data terminology 2. Various
Sampling Biases in IP Topology Measurements
Sampling Biases in IP Topology Measurements Anukool Lakhina with John Byers, Mark Crovella and Peng Xie Department of Boston University Discovering the Internet topology Goal: Discover the Internet Router
D A T A M I N I N G C L A S S I F I C A T I O N
D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.
Filtering Based Techniques for DDOS Mitigation
Filtering Based Techniques for DDOS Mitigation Comp290: Network Intrusion Detection Manoj Ampalam DDOS Attacks: Target CPU / Bandwidth Attacker signals slaves to launch an attack on a specific target address
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
Course: Model, Learning, and Inference: Lecture 5
Course: Model, Learning, and Inference: Lecture 5 Alan Yuille Department of Statistics, UCLA Los Angeles, CA 90095 [email protected] Abstract Probability distributions on structured representation.
Web Mining using Artificial Ant Colonies : A Survey
Web Mining using Artificial Ant Colonies : A Survey Richa Gupta Department of Computer Science University of Delhi ABSTRACT : Web mining has been very crucial to any organization as it provides useful
Forecasting Traffic Growth and Impact with Cisco MATE Design
White Paper Forecasting Traffic Growth and Impact with Cisco MATE Design Forecasting Scenarios for Planners, Engineers, and Operations What You Will Learn The ability to predict the impact of traffic growth
Graph Mining and Social Network Analysis
Graph Mining and Social Network Analysis Data Mining and Text Mining (UIC 583 @ Politecnico di Milano) References Jiawei Han and Micheline Kamber, "Data Mining: Concepts and Techniques", The Morgan Kaufmann
Network Analysis. BCH 5101: Analysis of -Omics Data 1/34
Network Analysis BCH 5101: Analysis of -Omics Data 1/34 Network Analysis Graphs as a representation of networks Examples of genome-scale graphs Statistical properties of genome-scale graphs The search
Social Network Analysis
Social Network Analysis Challenges in Computer Science April 1, 2014 Frank Takes ([email protected]) LIACS, Leiden University Overview Context Social Network Analysis Online Social Networks Friendship Graph
A Network Management Software Based on Secure Shell (SSH) Channels. and Java Universal Network Graph (JUNG)
A Network Management Software Based on Secure Shell (SSH) Channels and Java Universal Network Graph (JUNG) Students: Simran Khalsa, Gerald Castaneda, Ruben Rivera. Mentor: Dr. Jorge Crichigno Department
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
The Structure of Growing Social Networks
The Structure of Growing Social Networks Emily M. Jin Michelle Girvan M. E. J. Newman SFI WORKING PAPER: 2001-06-032 SFI Working Papers contain accounts of scientific work of the author(s) and do not necessarily
Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)
Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security
The Internet Is Like A Jellyfish
The Internet Is Like A Jellyfish Michalis Faloutsos UC Riverside Joint work with: Leslie Tauro, Georgos Siganos (UCR) Chris Palmer(CMU) Big Picture: Modeling the Internet Topology Traffic Protocols Routing,
Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013
Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics Qin Yin Fall Semester 2013 1 Walmart s Data Center 2 Amadeus Data Center 3 Google s Data Center 4 Data Center
Social Media Mining. Network Measures
Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users
2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above
CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network
5. Binary objects labeling
Image Processing - Laboratory 5: Binary objects labeling 1 5. Binary objects labeling 5.1. Introduction In this laboratory an object labeling algorithm which allows you to label distinct objects from a
The Big Data Paradigm Shift. Insight Through Automation
The Big Data Paradigm Shift Insight Through Automation Agenda The Problem Emcien s Solution: Algorithms solve data related business problems How Does the Technology Work? Case Studies 2013 Emcien, Inc.
RNM Reply Network Manager
RNM Reply Network Manager Introduction The development of the telecommunication market and the stronger competition among operators combined with the introduction of new players (such as Mobile Virtual
Analytical Test Method Validation Report Template
Analytical Test Method Validation Report Template 1. Purpose The purpose of this Validation Summary Report is to summarize the finding of the validation of test method Determination of, following Validation
SIMPLE NETWORKING QUESTIONS?
DECODING SDN SIMPLE NETWORKING QUESTIONS? Can A talk to B? If so which what limitations? Is VLAN Y isolated from VLAN Z? Do I have loops on the topology? SO SDN is a recognition by the Networking industry
CS224W Project Report: Finding Top UI/UX Design Talent on Adobe Behance
CS224W Project Report: Finding Top UI/UX Design Talent on Adobe Behance Susanne Halstead, Daniel Serrano, Scott Proctor 6 December 2014 1 Abstract The Behance social network allows professionals of diverse
Structural and functional analytics for community detection in large-scale complex networks
Chopade and Zhan Journal of Big Data DOI 10.1186/s40537-015-0019-y RESEARCH Open Access Structural and functional analytics for community detection in large-scale complex networks Pravin Chopade 1* and
Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks
Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, [email protected] Chapter 08: Computer networks Version: March 3, 2011 2 / 53 Contents
MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS
MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS Tao Yu Department of Computer Science, University of California at Irvine, USA Email: [email protected] Jun-Jang Jeng IBM T.J. Watson
Gephi Tutorial Quick Start
Gephi Tutorial Welcome to this introduction tutorial. It will guide you to the basic steps of network visualization and manipulation in Gephi. Gephi version 0.7alpha2 was used to do this tutorial. Get
Managing a Fibre Channel Storage Area Network
Managing a Fibre Channel Storage Area Network Storage Network Management Working Group for Fibre Channel (SNMWG-FC) November 20, 1998 Editor: Steven Wilson Abstract This white paper describes the typical
USE OF GRAPH THEORY AND NETWORKS IN BIOLOGY
USE OF GRAPH THEORY AND NETWORKS IN BIOLOGY Ladislav Beránek, Václav Novák University of South Bohemia Abstract In this paper we will present some basic concepts of network analysis. We will present some
Understanding the dynamics and function of cellular networks
Understanding the dynamics and function of cellular networks Cells are complex systems functionally diverse elements diverse interactions that form networks signal transduction-, gene regulatory-, metabolic-
A survey of results on mobile phone datasets analysis
Blondel et al. RESEARCH A survey of results on mobile phone datasets analysis arxiv:1502.03406v1 [physics.soc-ph] 11 Feb 2015 Vincent D Blondel 1*, Adeline Decuyper 1 and Gautier Krings 1,2 * Correspondence:
IP Telephony Management
IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient
