Connected Components in Software Networks Miloš Savić, Mirjana Ivanović, Miloš Radovanović Department of Mathematics and Informatics Faculty of Science.

Slides:



Advertisements
Similar presentations
Topologies of Complex Networks Functions vs. Structures Lun Li Advisor: John C. Doyle Co-advisor: Steven H. Low Collaborators: David Alderson (NPS) Walter.
Advertisements

Software Systems as Complex Networks by Hema Jayaprakash.
Mobile Communication Networks Vahid Mirjalili Department of Mechanical Engineering Department of Biochemistry & Molecular Biology.
Analysis and Modeling of Social Networks Foudalis Ilias.
Week 5 - Models of Complex Networks I Dr. Anthony Bonato Ryerson University AM8002 Fall 2014.
School of Information University of Michigan Network resilience Lecture 20.
VL Netzwerke, WS 2007/08 Edda Klipp 1 Max Planck Institute Molecular Genetics Humboldt University Berlin Theoretical Biophysics Networks in Metabolism.
Information Networks Generative processes for Power Laws and Scale-Free networks Lecture 4.
Advanced Topics in Data Mining Special focus: Social Networks.
Internet Topology Caterina Scoglio KSU. Why need for Internet Topology models To evaluate performance of algorithms and protocols Realistic models at.
Sergey Buldyrev Department of Physics Yeshiva University
4. PREFERENTIAL ATTACHMENT The rich gets richer. Empirical evidences Many large networks are scale free The degree distribution has a power-law behavior.
Weighted networks: analysis, modeling A. Barrat, LPT, Université Paris-Sud, France M. Barthélemy (CEA, France) R. Pastor-Satorras (Barcelona, Spain) A.
1 Evolution of Networks Notes from Lectures of J.Mendes CNR, Pisa, Italy, December 2007 Eva Jaho Advanced Networking Research Group National and Kapodistrian.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Complex Networks Third Lecture TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA TexPoint fonts used in EMF. Read the.
Masters Thesis Defense Amit Karandikar Advisor: Dr. Anupam Joshi Committee: Dr. Finin, Dr. Yesha, Dr. Oates Date: 1 st May 2007 Time: 9:30 am Place: ITE.
Trends in Object-Oriented Software Evolution: Investigating Network Properties Alexander Chatzigeorgiou George Melas University of Macedonia Thessaloniki,
Emergence of Scaling in Random Networks Barabasi & Albert Science, 1999 Routing map of the internet
Scale-free networks Péter Kómár Statistical physics seminar 07/10/2008.
The Barabási-Albert [BA] model (1999) ER Model Look at the distribution of degrees ER ModelWS Model actorspower grid www The probability of finding a highly.
Scale Free Networks Robin Coope April Abert-László Barabási, Linked (Perseus, Cambridge, 2002). Réka Albert and AL Barabási,Statistical Mechanics.
Networks FIAS Summer School 6th August 2008 Complex Networks 1.
Miloš Savić, Mirjana Ivanović, Miloš Radovanović
From Complex Networks to Human Travel Patterns Albert-László Barabási Center for Complex Networks Research Northeastern University Department of Medicine.
CS 728 Lecture 4 It’s a Small World on the Web. Small World Networks It is a ‘small world’ after all –Billions of people on Earth, yet every pair separated.
Web as Graph – Empirical Studies The Structure and Dynamics of Networks.
Peer-to-Peer and Grid Computing Exercise Session 3 (TUD Student Use Only) ‏
Common Properties of Real Networks. Erdős-Rényi Random Graphs.
AITIA International Inc. and Lorand Eotvos University, Budapest ROBUST NETWORKS FROM LOCAL OPTIMIZATION A Bottom-Up Model to Generate Networks with Skewed.
Advanced Topics in Data Mining Special focus: Social Networks.
Complex Networks Structure and Dynamics Ying-Cheng Lai Department of Mathematics and Statistics Department of Electrical Engineering Arizona State University.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
The structure of the Internet. The Internet as a graph Remember: the Internet is a collection of networks called autonomous systems (ASs) The Internet.
Summary from Previous Lecture Real networks: –AS-level N= 12709, M=27384 (Jan 02 data) route-views.oregon-ix.net, hhtp://abroude.ripe.net/ris/rawdata –
Computer Science 1 Web as a graph Anna Karpovsky.
Peer-to-Peer and Social Networks Random Graphs. Random graphs E RDÖS -R ENYI MODEL One of several models … Presents a theory of how social webs are formed.
Large-scale organization of metabolic networks Jeong et al. CS 466 Saurabh Sinha.
Information Networks Power Laws and Network Models Lecture 3.
(Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Oct 16th, 2012.
1 Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
Topic 13 Network Models Credits: C. Faloutsos and J. Leskovec Tutorial
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
- Anusha Uppaluri. Contents Problem Problems Importance Related Work Conclusion References Questions 2.
Author: M.E.J. Newman Presenter: Guoliang Liu Date:5/4/2012.
Popularity versus Similarity in Growing Networks Fragiskos Papadopoulos Cyprus University of Technology M. Kitsak, M. Á. Serrano, M. Boguñá, and Dmitri.
Data Analysis in YouTube. Introduction Social network + a video sharing media – Potential environment to propagate an influence. Friendship network and.
“Adversarial Deletion in Scale Free Random Graph Process” by A.D. Flaxman et al. Hammad Iqbal CS April 2006.
Complexity and Synchronization of the World trade Web Xiang Li, Yu Ying Jin, Guanrong Chen Fatih Er / System & Control.
Emergence of Scaling and Assortative Mixing by Altruism Li Ping The Hong Kong PolyU
Social Network Analysis Prof. Dr. Daning Hu Department of Informatics University of Zurich Mar 5th, 2013.
Analysis of biological networks Part III Shalev Itzkovitz Shalev Itzkovitz Uri Alon’s group Uri Alon’s group July 2005 July 2005.
Percolation Processes Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopPercolation Processes1.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Complex Network Theory – An Introduction Niloy Ganguly.
Lecture 10: Network models CS 765: Complex Networks Slides are modified from Networks: Theory and Application by Lada Adamic.
Complex Network Theory – An Introduction Niloy Ganguly.
Percolation and diffusion in network models Shai Carmi, Department of Physics, Bar-Ilan University Networks Percolation Diffusion Background picture: The.
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
An Effective Method to Improve the Resistance to Frangibility in Scale-free Networks Kaihua Xu HuaZhong Normal University.
Social Networking: Large scale Networks
Transport in weighted networks: optimal path and superhighways Collaborators: Z. Wu, Y. Chen, E. Lopez, S. Carmi, L.A. Braunstein, S. Buldyrev, H. E. Stanley.
Hierarchical Organization in Complex Networks by Ravasz and Barabasi İlhan Kaya Boğaziçi University.
Response network emerging from simple perturbation Seung-Woo Son Complex System and Statistical Physics Lab., Dept. Physics, KAIST, Daejeon , Korea.
Cascading failures of loads in interconnected networks under intentional attack Yongxiang Xia Department of Information Science and Electronic Engineering.
Complex network of the brain II Attack tolerance vs. Lethality Jaeseung Jeong, Ph.D. Department of Bio and Brain Engineering, KAIST.
Algorithms and Computational Biology Lab, Department of Computer Science and & Information Engineering, National Taiwan University, Taiwan Network Biology.
Scale-free and Hierarchical Structures in Complex Networks L. Barabasi, Z. Dezso, E. Ravasz, S.H. Yook and Z. Oltvai Presented by Arzucan Özgür.
On SNEIPL (software networks extractor) – a part of the SSQSA back end
From the Synthetic networks slide deck (didn’t have a chance to go over them at that time) By: Ralucca Gera, NPS.
Presentation transcript:

Connected Components in Software Networks Miloš Savić, Mirjana Ivanović, Miloš Radovanović Department of Mathematics and Informatics Faculty of Science University of Novi Sad

Content Introduction Data collection Experiments and results Conclusions

Introduction - software networks - Two levels of software complexity: - internal complexity of software entities (classes, functions...) - structural complexity of dependencies between entities Class collaboration networks: nodes: classes/interfaces links: OO relationships Static call graphs: nodes: functions/procedures links: call-return relationships

Introduction - connected components - Connected component: set of mutually reachable nodes Giant connected component: contains the vast majority of nodes Directed networks: strongly connected components weakly connected components

Introduction - theory of complex networks - Random graphs: - Poisson degree distribution - ER model (static + uniform attachment) Scale-free networks: - power-law degree distribution - BA model (growth + preferential attachment) Exponential networks: - exponential degree distribution - Model A (growth + uniform attachment)

Introduction - motivations - Model A: test complementary cummulative in/out/total degree distributions of giant weakly connected components againts a power-law and an exponential distribution “robust yet fragile”: investigate topological stability of giant weakly connected components “hierarchical small-worlds, scale-free networks from optimal design”: determine size of strongly connected components

Data collection Class collaboration networks: - Ant, Tomcat, Lucene, JavaCC, JDK - extractor – Yaccne Static call graphs: - gcc, kernel component of Linux kernel - extractor – Doxygen + our.dot aggregator

Experiments and results - giant weakly connected components - Networklwcc-size [%]wcc2-size [%] Linux Gcc Jdk Ant Tomcat Lucene Javacc Comparable networks sampled by ER, BA and Model A contain GWCC.

Experiments and results - degree distribution of GWCCs -

Experiments and results - Implications - Theoretical implications: model that can reproduce connectivity pattern characteristic to software systems Related to software engineering: in-degree = degree of class/function reuse out-degree = degree of class/function aggregation

Experiments and results - theoretical implications - Superposition model (growth + preferential attachment for out-going links + uniform attachment for in-coming links)

Experiments and results - Analytical solution of the superposition model - Continuum approach: “Mean field theory for scale-free random networks”, (Barabási et al, ’99) D in /D out – number of in-coming/out-going links introduced by each node

Experiments and results - Implications related to SE - First combinatorial principle of graph theory: Avg(reuse) = Avg(aggregation) But: Dispersion(reuse)  ∞ as N  ∞ Dispersion(aggregation) ~ Avg(aggregation) 2 Conslusions: 1. Software systems exhibit a characteristic scale of code aggregation, but there is no characteristic scale of code reuse. 2. Highly reused entities tend to be more reused. 3. Predictability of code reuse and unpredictability of code aggregation as software system evolve.

Experiments and results - Topological stability of GWCCs - Experiments: - removal of one node: to check the existence of articulation points - successive removal of preferential nodes: to check the fragility - successive removal of nodes at random: to check the robustness After each removal, size of the largest weakly connected component is measured fc-pref/fc-rnd: critical fraction of nodes that needed to be removed in order to destroy giant weakly connected component when preferential/random node removal scheme is applied

Experiments and results - Articulation points - Software networks contain APs: [2.91% %] of network size BA model: D total – number of links introduced by each node D total = 1  num(AP) in the range [31% %] D total > 1  num(AP) = 0 BAU model: - D total is not constant value but random variable such that P{D total = 1} > 0 - Modification does not affect scale-free properties of degree distributions and produces APs

Experiments and results - preferential node removal - Software networks are extremely vulnerable: f c (software network) < f c (BAU) < f c (EXP) < f c (RND)

Experiments and results - random node removal- Software networks (except Linux) never lose GWCCs The same situation is for comparable networks generated by theoretical models Linux static call graphs is scale-free, random errors sensitive network: f c (Linux) < f c (RND) < f c (EXP) < f c (BAU) Large real-world networks: f c (RND) < f c (rw-net)

Experiments and results - strongly connected components - Linux: SCCs as a minor effect Other networks: no GSCC, but have relatively large SCCs topological sort cannot be made  there is no elegant systematic testing strategy NetworkNUMMAX1[%]MAX2[%]MAX3[%] Linux GCC JDK Ant Tomcat Lucene JavaCC

Largest strongly connected component in GCC’s giant weakly connected component containing 116 mutually reachable nodes

Conclusions Out-degree sequences of software networks can be better modeled with an exponential distribution than a power-law Scale-free software networks contain articulation points Software networks are extremely vulnerable to the removal of highest degree nodes, and (except Linux) share the same level of robustness as comparable networks generated by theoretical models

Conclusions Linux static call graph is an interesting and intriguing example of a scale-free network which does not display tolerance against random errors Software networks contain relatively large cyclic dependencies - substructures that does not reflect optimal design and hierarchical small-worldliness

Connected Components in Software Networks Miloš Savić, Mirjana Ivanović, Miloš Radovanović Department of Mathematics and Informatics Faculty of Science University of Novi Sad