Power Law Structure Weili Wu Ding-Zhu Du Univ of Texas at Dallas

Slides:



Advertisements
Similar presentations
Chapter 4 Partition (3) Double Partition Ding-Zhu Du.
Advertisements

Approximations for Min Connected Sensor Cover Ding-Zhu Du University of Texas at Dallas.
University of Texas at Dallas
The Connectivity and Fault-Tolerance of the Internet Topology
Scale-free networks Péter Kómár Statistical physics seminar 07/10/2008.
Lecture 3 Power Law Structure Ding-Zhu Du Univ of Texas at Dallas.
Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.
Scalable and Fully Distributed Localization With Mere Connectivity.
Lecture 1-5 Power Law Structure Weili Wu Ding-Zhu Du Univ of Texas at Dallas.
Lecture 3-1 Independent Cascade Weili Wu Ding-Zhu Du University of Texas at Dallas.
1 Latency-Bounded Minimum Influential Node Selection in Social Networks Incheol Shin
Miniconference on the Mathematics of Computation
1 How to burn a graph Anthony Bonato Ryerson University GRASCan 2015.
Approximating Buy-at-Bulk and Shallow-Light k-Steiner Trees Mohammad T. Hajiaghayi (CMU) Guy Kortsarz (Rutgers) Mohammad R. Salavatipour (U. Alberta) Presented.
Maximal Independent Set and Connected Dominating Set Xiaofeng Gao Research Group on Mobile Computing and Wireless Networking Univ. of Texas at Dallas.
Lecture 5-2 Target-Influence and Power Law Graphs Ding-Zhu Du Univ of Texas at Dallas.
Lecture 2-3 Deterministic Difussion Weili Wu Ding-Zhu Du University of Texas at Dallas.
Computational Social Networks --computational data networks Weili Wu Ding-Zhu Du University of Texas at Dallas.
Limit theorems for the number of multiple edges in the configuration graph Irina Cheplyukova Karelian Research Centre of Russian Academy of Sciences
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Introduction to Social Computing
Network (graph) Models
Correlation Clustering
Social Networks Some content from Ding-Zhu Du, Lada Adamic, and Eytan Adar.
Impact of Interference on Multi-hop Wireless Network Performance
Inferring Networks of Diffusion and Influence
Cohesive Subgraph Computation over Large Graphs
Structures of Networks
Seed Selection.
Wenyu Zhang From Social Network Group
Independent Cascade Model and Linear Threshold Model
Heuristic & Approximation
Chapter 7 Linear Programming
Data Center Network Architectures
Lecture 1: Complex Networks
Distance Geometry: NP-Hard, NP-Hard to approximate
Topics In Social Computing (67810)
Influence Maximization
Modularity Maximization
Models of networks (synthetic networks or generative models): Random, Small-world, Scale-free, Configuration model and Random geometric model By: Ralucca.
Section 8.6: Clustering Coefficients
Introduction to Social Computing
Positive Influence Dominating Set
Degree and Eigenvector Centrality
Independent Cascade Model and Linear Threshold Model
Influence Maximization
Section 8.6 of Newman’s book: Clustering Coefficients
Peer-to-Peer and Social Networks Fall 2017
Great Ideas: Algorithm Implementation
Influence-Based Community Detection
Coverage Approximation Algorithms
Advanced Analysis of Algorithms
From the Synthetic networks slide deck (didn’t have a chance to go over them at that time) By: Ralucca Gera, NPS.
General Threshold and Cascade Models
Kempe-Kleinberg-Tardos Conjecture A simple proof
Lecture 21 Network evolution
Log-periodic oscillations due to discrete effects in complex networks
Modelling and Searching Networks Lecture 6 – PA models
Influence Maximization
A Better Approximation for Minimum Total Routing Path Clustering Problem in 2-D Underwater Sensor Networks Wei Wang, Donghyun Kim, and Weili Wu, A Better.
Independent Cascade Model and Linear Threshold Model
Dominating Set By Eric Wengert.
Survey on Coverage Problems in Wireless Sensor Networks - 2
Discrete Mathematics and its Applications Lecture 6 – PA models
Survey on Coverage Problems in Wireless Sensor Networks
at University of Texas at Dallas
And Competitive Influence
Lecture 2-6 Complexity for Computing Influence Spread
Multiple Products.
Data-Dependent Approximation
Presentation transcript:

Power Law Structure Weili Wu Ding-Zhu Du Univ of Texas at Dallas Lecture 1-5 Power Law Structure Weili Wu Ding-Zhu Du Univ of Texas at Dallas First, I want to thank you for you presence. ********In this presentation I will try to introduce The social network which is a theoretical structure to study relationships between individuals, groups, organizations, or even entire societies.  It is related to a wide range of disciplines. These disciplines include, but are not limited to information science, biology, economics, geography, communication studies, and so on.. The study of social networks begins with the late eighteenth century, two sociologists (Émile [ei'mi:l] Durkheim and Ferdinand ['fɝdənænd] Fer迪南de Tönnies) foreshadowed the idea of social networks in their theories and research of social groups. Nowadays, we study social networks using network analysis to identify social communities, pick influential person, and design good software. lidong.wu@utdallas.edu

“The small world network is a type of mathematical graph in which most nodes are not neighbors of one another, but most nodes can be reached from every other by a small number of hops or steps.” Why small distance and large size can stay together?

Power Law During the evolution and growth of a network, the great majority of new edges are to nodes with an already high degree.

Power-law distribution Log-log scale: log f(x) ~ –αlog x Power law distribution: f(x) ~ x–α

Power Law Nodes with high degrees may have “butterfly effect”. Small number Big influence a small change at one place can result in large differences in a later state.

Important Facts on Power-law Many NP-hard network problems are still NP-hard in power-law graphs. While they have no good approximation in general, they have constant-approximation in power-law graphs.

What is Power Law Graph?

Warning In study on Power-law Graph, a lot of real numbers are treated as integers!!!

A.L. Barabasi, et al., Evolution of the social network of scientific collaborations, Physica A, vol. 311, 2002. R. Albert, et al., Erro and attack tolerance of complex networks, Nature, vol. 406, M. Faloutsos, et al., On power-law relationship of the internet topology, SIGCOMM’99,

Why still NP-hard in Power-law?

Proof Techniques NP-hard in graph with constant degree, e.g., the Vertex-Cover is NP-hard in cubic graphs. Embedding a constant-degree graph into a power-law graph.

Why approximate easily in Power-law?

More nodes with low degree Less nodes with high degree Size of opt solution is often determined by # of nodes with low degree.

Modularity Maximization Modularity Function (Newman 2006)

Modularity Maximization

Idea Lower-degree nodes follow higher-degree nodes.

Low-Degree Following Algorithm T.N. Dinh & M.T. Thai, 2013 i j i i i t

Low-Degree Following Algorithm

Low-Degree Following Algorithm Choice of d0

Low-Degree Following Algorithm Theorem

Idea of Proof

Lower bound for positive part

Upper bound for negative part

Can we get same results if not do so? Warning In study on Power-law Graph, a lot of real numbers are treated as integers!!! Can we get same results if not do so?

References

THANK YOU!